default search action
Sudsanguan Ngamsuriyaroj
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Ratiros Phaenthong, Sudsanguan Ngamsuriyaroj:
Analyzing Security and Privacy Risks in Android Video Game Applications. AINA (6) 2024: 307-319 - [c20]Vatcharavaree Wongsuna, Sudsanguan Ngamsuriyaroj:
Security Analysis of Android Applications for Hotel and Flight Booking Applications. ICACT 2024: 1-6 - 2021
- [j4]Korakoch Wilailux, Sudsanguan Ngamsuriyaroj:
Novel Bi-directional Flow-based Traffic Generation Framework for IDS Evaluation and Exploratory Data Analysis. J. Inf. Process. 29: 256-265 (2021) - 2020
- [c19]Phitchayaphong Tantikul, Sudsanguan Ngamsuriyaroj:
Exploring Vulnerabilities in Solidity Smart Contract. ICISSP 2020: 317-324
2010 – 2019
- 2019
- [c18]Sutthinee Pongsrisomchai, Sudsanguan Ngamsuriyaroj:
Automated IT Audit of Windows Server Access Control. ICACT 2019: 539-544 - 2018
- [j3]Phimphaka Taninpong, Sudsanguan Ngamsuriyaroj:
Tree-based text stream clustering with application to spam mail classification. Int. J. Data Min. Model. Manag. 10(4): 353-370 (2018) - [j2]Chakan Pramkaew, Sudsanguan Ngamsuriyaroj:
Lightweight scheme of secure outsourcing SVD of a large matrix on cloud. J. Inf. Secur. Appl. 41: 92-102 (2018) - [c17]Sukritta Harnmetta, Sudsanguan Ngamsuriyaroj:
Classification of Exploit-Kit behaviors via machine learning approach. ICACT 2018: 468-473 - [c16]Sudsanguan Ngamsuriyaroj, Waree Chira-Adisai, Suppakorn Somnuk, Chayanan Leksunthorn, Kamonthip Saiphim:
Walking Gait Measurement and Analysis via Knee Angle Movement and Foot Plantar Pressures. JCSSE 2018: 1-6 - 2017
- [c15]Sudsanguan Ngamsuriyaroj, Kittirat Thepsutum:
Identifying Dominant Amino Acid Pairs of Known Protein-Protein Interactions via K-Means Clustering. HPCC/SmartCity/DSS 2017: 286-291 - [c14]Chiraphat Chaiphet, Sudsanguan Ngamsuriyaroj, Ahmed Awad, Betran Jacob, Ioannis Gakos, Wiktor Grajkowski:
Secure Enclave for TLS Web Server on Untrusted Environment. ICCNS 2017: 27-31 - 2016
- [c13]Ammarit Thongthua, Sudsanguan Ngamsuriyaroj:
Assessment of Hypervisor Vulnerabilities. ICCCRI 2016: 71-77 - 2014
- [c12]Nirin Thanirat, Sudsanguan Ngamsuriyaroj:
The Effect of Attacks on DCT-Based Features for Image Copy Detection. CSE 2014: 1483-1488 - [c11]Chakan Pramkaew, Sudsanguan Ngamsuriyaroj:
GPShare: Grid Position Sharing in Non-trusted Environment. iThings/GreenCom/CPSCom 2014: 368-373 - 2011
- [c10]Sudsanguan Ngamsuriyaroj, Pak Rattidham, Ittipon Rassameeroj, Pisut Wongbuchasin, Nuttida Aramkul, Suttatip Rungmano:
Performance Evaluation of Load Balanced Web Proxies. AINA Workshops 2011: 746-750 - 2010
- [j1]Ekasit Kijsipongse, Sudsanguan Ngamsuriyaroj:
Placing pipeline stages on a Grid: Single path and multipath pipeline execution. Future Gener. Comput. Syst. 26(1): 50-62 (2010) - [c9]Sudsanguan Ngamsuriyaroj, Rangsan Pornpattana:
Performance Evaluation of TPC-H Queries on MySQL Cluster. AINA Workshops 2010: 1035-1040
2000 – 2009
- 2009
- [c8]Phimphaka Taninpong, Sudsanguan Ngamsuriyaroj:
Incremental Naïve Bayesian Spam Mail Filtering and Variant Incremental Training. ACIS-ICIS 2009: 383-387 - [c7]Phimphaka Taninpong, Sudsanguan Ngamsuriyaroj:
Incremental Adaptive Spam Mail Filtering Using Naive Bayesian Classification. SNPD 2009: 243-248 - 2008
- [c6]Pitch Sajjipanon, Sudsanguan Ngamsuriyaroj:
Web Services for MPI-Based Parallel Applications on a Rocks Cluster. APSCC 2008: 265-270 - [c5]Ekasit Kijsipongse, Sudsanguan Ngamsuriyaroj:
A Heuristic Approach for Single Path Pipeline Execution on Grid. GCC 2008: 117-123 - [c4]Sudsanguan Ngamsuriyaroj, Ekasit Kijsipongse:
Optimal Placement of Pipeline Applications on Grid. ICPADS 2008: 245-252 - 2007
- [c3]Ekasit Kijsipongse, Sudsanguan Ngamsuriyaroj:
Column-Based Partitioning for Data in High Dimensional Space. ICPP 2007: 13 - 2002
- [c2]Sudsanguan Ngamsuriyaroj, Ali R. Hurson, Thomas F. Keefe:
Authorization Model for Summary Schemas Model. IDEAS 2002: 182-191 - [c1]Sudsanguan Ngamsuriyaroj, Ali R. Hurson, Thomas F. Keefe:
Maintaining Consistency of the Security Policy using Timestamp Ordering. ITCC 2002: 164-170
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint