Sudsanguan Ngamsuriyaroj

According to our database1, Sudsanguan Ngamsuriyaroj authored at least 25 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security Analysis of Android Applications for Hotel and Flight Booking Applications.
Proceedings of the 26th International Conference on Advanced Communications Technology, 2024

Analyzing Security and Privacy Risks in Android Video Game Applications.
Proceedings of the Advanced Information Networking and Applications, 2024

2021
Novel Bi-directional Flow-based Traffic Generation Framework for IDS Evaluation and Exploratory Data Analysis.
J. Inf. Process., 2021

2020
Exploring Vulnerabilities in Solidity Smart Contract.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Automated IT Audit of Windows Server Access Control.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2018
Lightweight scheme of secure outsourcing SVD of a large matrix on cloud.
J. Inf. Secur. Appl., 2018

Tree-based text stream clustering with application to spam mail classification.
Int. J. Data Min. Model. Manag., 2018

Walking Gait Measurement and Analysis via Knee Angle Movement and Foot Plantar Pressures.
Proceedings of the 15th International Joint Conference on Computer Science and Software Engineering, 2018

Classification of Exploit-Kit behaviors via machine learning approach.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

2017
Secure Enclave for TLS Web Server on Untrusted Environment.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

Identifying Dominant Amino Acid Pairs of Known Protein-Protein Interactions via K-Means Clustering.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

2016
Assessment of Hypervisor Vulnerabilities.
Proceedings of the International Conference on Cloud Computing Research and Innovations, 2016

2014
GPShare: Grid Position Sharing in Non-trusted Environment.
Proceedings of the 2014 IEEE International Conference on Internet of Things, 2014

The Effect of Attacks on DCT-Based Features for Image Copy Detection.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2011
Performance Evaluation of Load Balanced Web Proxies.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Placing pipeline stages on a Grid: Single path and multipath pipeline execution.
Future Gener. Comput. Syst., 2010

Performance Evaluation of TPC-H Queries on MySQL Cluster.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Incremental Adaptive Spam Mail Filtering Using Naive Bayesian Classification.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

Incremental Naïve Bayesian Spam Mail Filtering and Variant Incremental Training.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Optimal Placement of Pipeline Applications on Grid.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

A Heuristic Approach for Single Path Pipeline Execution on Grid.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

Web Services for MPI-Based Parallel Applications on a Rocks Cluster.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Column-Based Partitioning for Data in High Dimensional Space.
Proceedings of the 2007 International Conference on Parallel Processing (ICPP 2007), 2007

2002
Maintaining Consistency of the Security Policy using Timestamp Ordering.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

Authorization Model for Summary Schemas Model.
Proceedings of the International Database Engineering & Applications Symposium, 2002


  Loading...