关注
Chetneti Srisa-An
Chetneti Srisa-An
在 rsu.ac.th 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Guideline Of Collinearity-Avoidable Regression Models On Time-Series Analysis
C Srisa-an
The 2nd International/National Conference on Big Data Analytics and …, 2021
212021
Personalized Learning Management System using a Machine Learning Technique
K Kanokngamwitroj, C Srisa-An
TEM Journal 11 (4), 1626 -1633, 2022
122022
A classification of internet pornographic images
C Srisaan
International Journal of Electronic Commerce Studies 7 (1), 95-104, 2016
112016
Location-Based Mobile Community Using Ants-Based Cluster Algorithm
C Srisa-an
International Journal for Applied Information Management 1 (1), 41-46, 2021
82021
Guideline for Data Anonymization for Data Privacy in Thailand
J. Lapwattanaworakul, C. Srisa-An and S. Angsirikul
2022 6th International Conference on Information Technology (InCIT), pp. 211-215, 2022
62022
A performance evaluation of vulnerability detection: NetClarity Audito, Nessus, and Retina
S Chimmanee, T Veeraprasit, C Srisa-An
International Journal of Computer Science and Network Security (IJCSNS) 14 …, 2014
62014
Cell-key Perturbation Data Privacy Procedure for Security Operations Center Team
S Nukrongsin, C Srisa-An
2023 20th International Joint Conference on Computer Science and Software …, 2023
52023
Applying Machine Learning and AI on Self Automated Personalized Online Learning.
C Srisa-An, K Yongsiriwit
Fuzzy System and Data Mining V, IOS Press,2019 320, 137-145, 2019
52019
Blockchain-based Auxiliary Systems for Pseudonymization and Consent Management
CSATA Jiraphat Lapwattanaworakul
TEM Journal 12 (4), 2470-2480, 2023
32023
The effect of data anonymization on a data science project
SK K. Kanokngamwitroj, C. Srisa-An
2022 6th International Conference on Information Technology (InCIT), pp. 201-206, 2022
32022
Observation-Based Hybrid Classification Algorithms for Customer Segmentation
C Kanokngamwitroj, K., & Srisaan
ECTI Transactions on Computer and Information Technology (ECTI-CIT) 18 (3 …, 2024
12024
Cybersecurity Threat Detection Analysis via Exploratory Data Analysis
S Vongsuvat, C Srisaan
2024 8th International Conference on Information Technology (InCIT), 484-489, 2024
2024
e-KYC-based Privacy Preserving Model using Smart Contract on Private Blockchain Network
CSVB W. Manoritthiyarn
2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024
2024
Blockchain-Based Auxiliary Systems for Password Management
AACS T. Vilaidaraga
2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024
2024
Leveraging Blockchain Technology for Carbon Credit Management in Thailand
CSPT S. Trisri
2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024
2024
Strategies for Cyber Risk Assessment and Mitigation in Small and Medium-Sized Enterprises in Thailand
NPC Srisa-An
2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024
2024
Comparative Diagnosis Model for Risk Factors of Heart Disease Using Deep Learning
CSAAA B. Kamkla
2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024
2024
Managing Geographic Information Systems for Chachoengsao Province Administration
CSKP S. Pratapinya
2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024
2024
Applying NIST Framework on Data Privacy Attacks Using K-Anonymity Algorithm
CSJS T. Sae-Ow
2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024
2024
Smart Contract-based Consent Management System for Data Privacy Protection
CSSA W. Neamhom
2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20