A taxonomy of supervised learning for idss in scada environments J Suaboot, A Fahad, Z Tari, J Grundy, AN Mahmood, A Almalawi, ... ACM Computing Surveys (CSUR) 53 (2), 1-37, 2020 | 55 | 2020 |
Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences J Suaboot, Z Tari, A Mahmood, AY Zomaya, W Li Computers & Security 92, 101773, 2020 | 27 | 2020 |
The Flash Loan Attack Analysis (FAA) Framework—A Case Study of the Warp Finance Exploitation W Werapun, T Karode, T Arpornthip, J Suaboot, E Sangiamkul, P Boonrat Informatics 10 (1), 3, 2022 | 4 | 2022 |
The SWC-Based Security Analysis Tool for Smart Contract Vulnerability Detection N Songsom, W Werapun, J Suaboot, N Rattanavipanon 2022 6th International Conference on Information Technology (InCIT), 74-77, 2022 | 4 | 2022 |
Data Security Threats Z Tari, N Sohrabi, Y Samadi, J Suaboot Wiley-IEEE Press, 2023 | 2 | 2023 |
Integrating group key distribution for securing upnp services J Surbot, S Witosurapot 2010 2nd International Conference on Computer Engineering and Technology 7 …, 2010 | 2 | 2010 |
NativeVRF: A Simplified Decentralized Random Number Generator on EVM Blockchains W Werapun, T Karode, J Suaboot, T Arpornthip, E Sangiamkul Systems 11 (7), 326, 2023 | 1 | 2023 |
Data Exfiltration Threats and Prevention Techniques: Machine Learning and Memory-based Data Security Z Tari, N Sohrabi, Y Samadi, J Suaboot John Wiley & Sons, 2023 | 1 | 2023 |
An EOA Identity Tracing System (AITS) on Ethereum Blockchain S Rattanabunno, W Werapun, J Suaboot, T Karode, M Puongmanee 2023 8th International Conference on Information and Network Technologies …, 2023 | 1 | 2023 |
Survey on Building Block Technologies Z Tari, N Sohrabi, Y Samadi, J Suaboot Wiley-IEEE Press, 2023 | 1 | 2023 |
Data Integrity for Energy Measurement of Sensor Nodes as Home Services W Werapun, J Suaboot the 29th International Technical Conference on Circuits/Systems, Computers …, 2014 | 1 | 2014 |
SVC-MST BWQLB multicast over software-defined networking W Werapun, J Suaboot, P Tantisarkhornkhet, J Thaenthong International Journal of Internet Protocol Technology 16 (4), 204-216, 2024 | | 2024 |
Effects of Malware Detection Parameters on Classical vs Deep ML Techniques T Vhito, J Suaboot, W Werapun, T Kliangsuwan 2023 7th International Conference on Information Technology (InCIT), 440-445, 2023 | | 2023 |
Andaman Token: A Feasibility Study of Blockchain Adoption in the Tourism Industry W Werapun, N Songsom, T Khongfai, A Intrapradit, J Suaboot 2023 14th International Conference on Information and Communication …, 2023 | | 2023 |
From Characters to Chaos: On the Feasibility of Attacking Thai OCR with Adversarial Examples C Jiamsuchon, J Suaboot, N Rattanavipanon 2023 20th International Conference on Electrical Engineering/Electronics …, 2023 | | 2023 |
On the feasibility of attacking Thai LPR systems with adversarial examples C Jiamsuchon, J Suaboot, N Rattanavipanon arXiv preprint arXiv:2301.05506, 2023 | | 2023 |
Memory‐Based Data Exfiltration Detection Methods Z Tari, N Sohrabi, Y Samadi, J Suaboot Wiley-IEEE Press, 2023 | | 2023 |
Behavior‐Based Data Exfiltration Detection Methods Z Tari, N Sohrabi, Y Samadi, J Suaboot Wiley-IEEE Press, 2023 | | 2023 |
Temporal‐Based Data Exfiltration Detection Methods Z Tari, N Sohrabi, Y Samadi, J Suaboot Wiley-IEEE Press, 2023 | | 2023 |
The Flash Loan Attack Analysis (FAA) Framework—A Case Study of the Warp Finance Exploitation. Informatics 2023, 10, 3 W Werapun, T Karode, T Arpornthip, J Suaboot, E Sangiamkul, P Boonrat | | 2022 |