Guideline Of Collinearity-Avoidable Regression Models On Time-Series Analysis C Srisa-an The 2nd International/National Conference on Big Data Analytics and …, 2021 | 21 | 2021 |
Personalized Learning Management System using a Machine Learning Technique K Kanokngamwitroj, C Srisa-An TEM Journal 11 (4), 1626 -1633, 2022 | 12 | 2022 |
A classification of internet pornographic images C Srisaan International Journal of Electronic Commerce Studies 7 (1), 95-104, 2016 | 11 | 2016 |
Location-Based Mobile Community Using Ants-Based Cluster Algorithm C Srisa-an International Journal for Applied Information Management 1 (1), 41-46, 2021 | 8 | 2021 |
Guideline for Data Anonymization for Data Privacy in Thailand J. Lapwattanaworakul, C. Srisa-An and S. Angsirikul 2022 6th International Conference on Information Technology (InCIT), pp. 211-215, 2022 | 6 | 2022 |
A performance evaluation of vulnerability detection: NetClarity Audito, Nessus, and Retina S Chimmanee, T Veeraprasit, C Srisa-An International Journal of Computer Science and Network Security (IJCSNS) 14 …, 2014 | 6 | 2014 |
Cell-key Perturbation Data Privacy Procedure for Security Operations Center Team S Nukrongsin, C Srisa-An 2023 20th International Joint Conference on Computer Science and Software …, 2023 | 5 | 2023 |
Applying Machine Learning and AI on Self Automated Personalized Online Learning. C Srisa-An, K Yongsiriwit Fuzzy System and Data Mining V, IOS Press,2019 320, 137-145, 2019 | 5 | 2019 |
Blockchain-based Auxiliary Systems for Pseudonymization and Consent Management CSATA Jiraphat Lapwattanaworakul TEM Journal 12 (4), 2470-2480, 2023 | 3 | 2023 |
The effect of data anonymization on a data science project SK K. Kanokngamwitroj, C. Srisa-An 2022 6th International Conference on Information Technology (InCIT), pp. 201-206, 2022 | 3 | 2022 |
Observation-Based Hybrid Classification Algorithms for Customer Segmentation C Kanokngamwitroj, K., & Srisaan ECTI Transactions on Computer and Information Technology (ECTI-CIT) 18 (3 …, 2024 | 1 | 2024 |
Cybersecurity Threat Detection Analysis via Exploratory Data Analysis S Vongsuvat, C Srisaan 2024 8th International Conference on Information Technology (InCIT), 484-489, 2024 | | 2024 |
e-KYC-based Privacy Preserving Model using Smart Contract on Private Blockchain Network CSVB W. Manoritthiyarn 2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024 | | 2024 |
Blockchain-Based Auxiliary Systems for Password Management AACS T. Vilaidaraga 2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024 | | 2024 |
Leveraging Blockchain Technology for Carbon Credit Management in Thailand CSPT S. Trisri 2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024 | | 2024 |
Strategies for Cyber Risk Assessment and Mitigation in Small and Medium-Sized Enterprises in Thailand NPC Srisa-An 2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024 | | 2024 |
Comparative Diagnosis Model for Risk Factors of Heart Disease Using Deep Learning CSAAA B. Kamkla 2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024 | | 2024 |
Managing Geographic Information Systems for Chachoengsao Province Administration CSKP S. Pratapinya 2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024 | | 2024 |
Applying NIST Framework on Data Privacy Attacks Using K-Anonymity Algorithm CSJS T. Sae-Ow 2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024 | | 2024 |
Smart Contract-based Consent Management System for Data Privacy Protection CSSA W. Neamhom 2024 8th International Conference on Information Technology (InCIT) 1 (1 …, 2024 | | 2024 |