Dr. Professor Shiuh-Jeng WANG

Academic-visiting/Invitations

PhD. National Taiwan University, TAIWAN
Full Professor, Central Police University
Director Information Crypto and Construction Lab.
Chair of ICCL-FROG (Forensic Research develOpment task force Group)
Vice-President, Chinese Cryptography Information Security Association
Chairman of Intelligent Secforensics Lab.
President, Taiwan E-Security Analysis and Management (ESAM, https://www.esam.io)
https://blog.xuite.net/icclsjwang/wretch
Visiting Scholar, Comp. Sc. Dept, Florida State University, 2002, 2003, 2004/2005
Project Study, at Computer School of Carnegie Mellon University, 2007
Visiting Scholar, Computer Engineering & Information Science, University of Florida, 2003, 2004, 2010/2011
GENERAL/PROGRAM -chairs of IEEE-CS/LNCS Proceedings, International conferences:
http://www.sersc.org/SH08/ ,IEEE-sponsored,

http://mpis08.ialab.cs.pu.edu.tw/mpis08 MPIS’08 , IEEE-sponsored,

http://www.ftrg.org/MPIS2009 ,IEEE-sponsored,
http://ncs2009.ntpu.edu.tw/CI/CI.htm ,National Computer Symposium (NCS 2009)

http://www.ftrg.org/futuretech2010 ,IEEE-sponsored,

https://sites.google.com/site/uicuipm2012/ , IEEE-sponsored,

http://www.ftrai.org/music2012

SCI-Journals,
Lead Guest Editor, – IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 7, AUGUST 2011

IEEE J-SAC, http://www.comsoc.org/livepubs/sac/index.html

Guest Editorial – Advances in Digital Forensics for Communications and Networking
Guest Editorial
Issue: Advances in Digital Forensics for Communications and Networking

Computer and Internet crimes are on the rise due to the fast-paced development of computer and Internet technology. Information security in Internet communications and electronic business is essential, and techniques to combat these crimes are required more and more on a daily basis. Network forensics has been an emerging research area for IT-related professionals, researchers, and practitioners since the turn of the century. Crimes committed using data embedding/mining systems, computer systems, network communications, or system detections pose a great threat to information security. Another area of focus in network forensics is how to collect and analyze digital evidence in an existing communication and network environment.
Digital forensics has many challenges, including effective evidence collection and efficient forensic procedures in data mining for evidence trace, custody of evidence chain, digital evidence management and data/image authentication and forensics, cryptography and cryptanalysis in forensics, and network forensics. The interest in digital forensics in network systems can be seen in industrial and standardization efforts accomplished in recent years, including commercial integrated forensic tools developments, the standardization efforts of text interface graphic interface to facilitate evidence mining and speed up investigations, and forensic procedures in communication and network systems. This special issue gives a state-of the-art overview of problems and solution guidelines emerging in current digital forensic research efforts for communication and network systems. A wide variety of topics are addressed, from the physical views such as forensic developments in computer and communication-link environments, to logical views programming of interface connections and testing of forensic tools; from conceptual views, such as effective management of seized evidence and diverse system operations, to user views -in security issues such as authentications, forensic procedures, and ethical and policy issues related to network forensics.

Journal of Internet Technology (JIT)
http://jit.ndhu.edu.tw/

The Computer Journal,
http://comjnl.oxfordjournals.org/ (Oxford Journal)

EURASIP Journal on Wireless Communications and Networking,
http://www.hindawi.com/journals/wcn/2011/si.nass/ (Hindawi)
International Journal of Communication Systems,
http://onlinelibrary.wiley.com/doi/10.1002/dac.1216/abstract (Wiley)
The Journal of Supercomputing,
http://www.springer.com/computer/swe/journal/11227 (Springer)
Peer-to-Peer Networking and Applications,
http://www.editorialmanager.com/ppna/ (Springer)

EiC/AE/Editor
Be at the EiC, Journal of Information, Technology and Society, Editor-in-Chief AT JITAS ( http://jit.ndhu.edu.tw/ )

Be at the AE, Spring Journal- Human-centric Computing and Information Sciences, Associate Editor AT HCIS ( http://www.hcis-journal.com/ )
Be in the Editorial board of International Journal of Information Technology, Communications and Convergence
( http://www.inderscience.com/jhome.php?jcode=ijitcc/ )
BOOK PUBLICATIONS

Cryptography and Network Security (TEXTBOOK)
https://www.drmaster.com.tw/Bookinfo.asp?BookID=BC20044

State of the Art on Internet Security and Digital Forensics (TEXTBOOK)
https://www.drmaster.com.tw/Bookinfo.asp?BookID=BC20062

Computer Forensics and Digital Evidence (TEXTBOOK)
https://www.drmaster.com.tw/Bookinfo.asp?BookID=CNE0007

Information Multimedia Security (TEXTBOOK)
https://www.drmaster.com.tw/Bookinfo.asp?BookID=CNE0006

Computer Forensics and Security Systems (TEXTBOOK)
https://www.drmaster.com.tw/Bookinfo.asp?BookID=NE30012

Computer and Network Security in Practice (TEXTBOOK)
https://www.drmaster.com.tw/Bookinfo.asp?BookID=NE30013

Digital Image Processing and Applications (TEXTBOOK)
http://www.drmaster.com.tw/Bookinfo.asp?BookID=EU31214

The Security in Computer, Network and Mobile-Service in Practice- Applying to High-tech Society (TEXTBOOK)
https://www.drmaster.com.tw/Bookinfo.asp?BookID=EU31215

Secret, Truth, and Forensics (SCIENCE BOOK)
https://bookzone.cwgv.com.tw/

Codes in Lives (LITERATURE)
Computer Forensics and Security Systems (TEXTBOOK)
Forensics with Our Information Society (SCIENCE BOOK)