郭振忠(Cheng-Chung Kuo)

職  稱:
助理教授
辦 公 室 :
c208
分  機:
3239
電子郵件:
spotkuo AT stust.edu.tw
個人網站:

OfficeHour:


學歷

博士
國立成功大學
電機工程學系

專長及研究領域:

資訊安全、入侵偵測、滲透測試

相關證照

類別
證照名稱
證照分類
取得日期
CISCO CCNA/RS 網通 2017
EC council Computer Hacking Forensic Investigator 資訊安全 2016
EC council Certified Ethical Hacker 資訊安全 2015
        TOP
4

 榮譽與獎勵

編號
名稱

TOP

 期刊

編號
名稱
1 Kuo, Cheng-Chung, Kai Chain, and Chu-Sing Yang. "Cyber attack and defense training: using emulab as a platform." International Journal of Innovation Computing, Information and Control 14.6 (2018): 2245-2258.
2Kuo, Cheng-Chung, Chia-Ling Hou, and Chu-Sing Yang. "The Study of a Risk Assessment System based on PageRank." Journal of Internet Technology 20.7 (2019): 2255-2264.
3Chain, Kai, Cheng-Chung Kuo, and Chu-Sing Yang. "The analysis and implementation of Botnet and DDoS." International Journal of Computer Science and Information Security 14.10 (2016): 194.
4Cheng-Chung Kuo, Ding-Kai Tseng, Chun-Wei Tsai*, and Chu-Sing Yang, "An Effective Feature Extraction Mechanism for Intrusion Detection System," IEICE Transactions on Information and Systems, vol. E104-D, no.11, pp.1814-1827, 2021.
5
6
 TOP

 國際會議

編號
名稱
1 Kuo Cheng-Chung, Yao Shu Han, Hou Cha-Ling and Yang Chu-Sing . "Design and Implementation of a Host-Based Intrusion Detection System for Linux-Based Web Server." International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Springer, Cham, 2018.
2Kuo, Cheng-Chung, Kai-Chun Hsu, and Chu-Sing Yang. "A novel way to generate the rule patterns for detecting malicious PDF documents." Proceedings of the Asia-Pacific Advanced Network 40 (2015): 43-49.
3Lin, Tien-Chih, Cheng-Chung Kuo, and Chu-Sing Yang. "Detecting Advanced Persistent Threat Malware Using Machine Learning-Based Threat Hunting." European Conference on Cyber Warfare and Security. Academic Conferences International Limited, 2019.
4Zhang, Shao-Huai, Cheng-Chung Kuo, and Chu-Sing Yang. "Static PE Malware Type Classification Using Machine Learning Techniques." 2019 International Conference on Intelligent Computing and its Emerging Applications (ICEA). IEEE, 2019.
5Chain, K., Kuo, C. C., Liu, I. H., Li, J. S., & Yang, C. S. (2018, April). Design and implement of capture the flag based on cloud offense and defense platform. In 2018 IEEE International Conference on Applied System Invention (ICASI) (pp. 686-689).
6Wu, Che-Yu, Cheng-Chung Kuo, and Chu-Sing Yang. "A phishing detection system based on machine learning." 2019 International Conference on Intelligent Computing and its Emerging Applications (ICEA). IEEE, 2019
 7

Che-Yu Wu, Cheng-Chung Kuo and Chu-Sing Yang, "Phishing Detection with Browser Extension Based on Machine Learning", in AsiaJCIS 2023

 TOP

 國內會議

編號
名稱
1郭振忠,吳培銘,林季偉,楊竹星  “基於Net-DPIS之網路流量分類快取機制” NCS2015
2郭振忠, 程凱, 楊竹星, 2016, “設計安全的訓用暨後維管理網站平台”, CISC2016, May. 26-27, Taichung, Taiwan.
3郭振忠, 盧建同, 林敬皇, 李忠憲, 楊竹星, 2013, “基於測試平台之網路攻防演練活動設計與實作”, NCS 2013, Dec. 13-14, Taichung, Taiwan.
4郭振忠, 歐雅惠, 劉奕賢, 王子夏, 郭鎮穎, 陳嘉玫, 李忠憲, 林輝堂, 楊竹星, “網路威脅搜捕、分析、追蹤與過濾技術之研究”, Cyberspace 2014, Dec. 5, Taipei, Taiwan.
 5 許凱竣, 郭振忠, 楊竹星, 2015, “基於靜態分析之可攜式文件格式檔案過濾系統”, CISC2015, May. 28-29, Kaohsiung, Taiwan.
 TOP

 計劃

編號
計劃名稱
起迄日期
擔任工作
補助單位
1



2



3



4



5



6



        TOP