default search action
Vasaka Visoottiviseth
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Thanaporn Sanamontre, Vasaka Visoottiviseth, Chaiyong Ragkhitwetsagul:
Detecting Malicious Android Game Applications on Third-Party Stores Using Machine Learning. AINA (4) 2024: 238-251 - [c21]Akihiro Takai, Yusei Katsura, Nariyoshi Yamai, Rei Nakagawa, Vasaka Visoottiviseth:
Quick Blocking Operation of IDS/SDN Cooperative Firewall Systems by Reducing Communication Overhead. ICACT 2024: 1514-1520 - 2023
- [c20]Pattarakrit Rattanukul, Chansida Makaranond, Pumipat Watanakulcharus, Chaiyong Ragkhitwetsagul, Tanapol Nearunchorn, Vasaka Visoottiviseth, Morakot Choetkiertikul, Thanwadee Sunetnanta:
Microusity: A testing tool for Backends for Frontends (BFF) Microservice Systems. ICPC 2023: 74-78 - [i2]Pattarakrit Rattanukul, Chansida Makaranond, Pumipat Watanakulcharus, Chaiyong Ragkhitwetsagul, Tanapol Nearunchorn, Vasaka Visoottiviseth, Morakot Choetkiertikul, Thanwadee Sunetnanta:
Microusity: A testing tool for Backends for Frontends (BFF) Microservice Systems. CoRR abs/2302.11150 (2023) - 2022
- [c19]Nay Myat Min, Vasaka Visoottiviseth, Songpon Teerakanok, Nariyoshi Yamai:
OWASP IoT Top 10 based Attack Dataset for Machine Learning. ICACT 2022: 317-322 - [c18]Yusei Katsura, Pranpariya Sakarin, Nariyoshi Yamai, Hiroyuki Kimiyama, Vasaka Visoottiviseth:
Quick Blocking Operation of Firewall System Cooperating with IDS and SDN. ICACT 2022: 393-398 - 2020
- [c17]Purit Phan-Udom, Vasaka Visoottiviseth, Ryousei Takano:
Intercontinental Disk-to-Disk Data Transfer Experiment with a Lightweight DTN Software Stack. ICACT 2020: 485-490 - [c16]Vasaka Visoottiviseth, Gannasut Chutaporn, Sorakrit Kungvanruttana, Jirapas Paisarnduangjan:
PITI: Protecting Internet of Things via Intrusion Detection System on Raspberry Pi. ICTC 2020: 75-80 - [c15]Vasaka Visoottiviseth, Pranpariya Sakarin, Jetnipat Thongwilai, Thanakrit Choobanjong:
Signature-based and Behavior-based Attack Detection with Machine Learning for Home IoT Devices. TENCON 2020: 829-834
2010 – 2019
- 2019
- [c14]Navaporn Chockwanich, Vasaka Visoottiviseth:
Intrusion Detection by Deep Learning with TensorFlow. ICACT 2019: 654-659 - 2018
- [c13]Sophon Mongkolluksamee, Vasaka Visoottiviseth, Kensuke Fukuda:
Robust Peer to Peer Mobile Botnet Detection by Using Communication Patterns. AINTEC 2018: 38-45 - [c12]Pongjarun Kosolyudhthasarn, Vasaka Visoottiviseth, Doudou Fall, Shigeru Kashihara:
Drone Detection and Identification by Using Packet Length Signature. JCSSE 2018: 1-6 - [c11]Noppanat Phumkaew, Vasaka Visoottiviseth:
Android Forensic and Security Assessment for Hospital and Stock-and-Trade Applications in Thailand. JCSSE 2018: 1-6 - [c10]Vasaka Visoottiviseth, Pongnapat Jutadhammakorn, Natthamon Pongchanchai, Pongjarun Kosolyudhthasarn:
Firmaster: Analysis Tool for Home Router Firmware. JCSSE 2018: 1-6 - [c9]Thanatorn boonnak, Vasaka Visoottiviseth, Jason Haga, Dylan Kobayashi, Jason Leigh:
Integration of Gesture Control with Large Display Environments Using SAGE2. JCSSE 2018: 1-5 - 2017
- [c8]Poonyavee Kasemsuwan, Vasaka Visoottiviseth:
OSV: OSPF vulnerability checking tool. JCSSE 2017: 1-6 - [c7]Wiriyang Pipatsakulroj, Vasaka Visoottiviseth, Ryousei Takano:
muMQ: A lightweight and scalable MQTT broker. LANMAN 2017: 1-6 - 2016
- [j4]Sophon Mongkolluksamee, Vasaka Visoottiviseth, Kensuke Fukuda:
Combining Communication Patterns & Traffic Patterns to Enhance Mobile Traffic Identification Performance. J. Inf. Process. 24(2): 247-254 (2016) - 2015
- [c6]Supachai Thongprasit, Vasaka Visoottiviseth, Ryousei Takano:
Toward Fast and Scalable Key-Value Stores Based on User Space TCP/IP Stack. AINTEC 2015: 40-47 - [c5]Sophon Mongkolluksamee, Vasaka Visoottiviseth, Kensuke Fukuda:
Enhancing the Performance of Mobile Traffic Identification with Communication Patterns. COMPSAC 2015: 336-345 - [i1]Varat Chawathaworncharoen, Vasaka Visoottiviseth, Ryousei Takano:
Feasibility Evaluation of 6LoWPAN over Bluetooth Low Energy. CoRR abs/1509.06991 (2015) - 2014
- [c4]Tanasak Janpan, Vasaka Visoottiviseth, Ryousei Takano:
A virtual machine consolidation framework for CloudStack platforms. ICOIN 2014: 28-33 - 2012
- [j3]Chalee Vorakulpipat, Vasaka Visoottiviseth, Siwaruk Siwamogsatham:
Polite sender: A resource-saving spam email countermeasure based on sender responsibilities and recipient justifications. Comput. Secur. 31(3): 286-298 (2012) - 2011
- [j2]Vasaka Visoottiviseth, Akkasit Trunganont, Siwaruk Siwamogsatham:
Cross-layer based adaptive wireless traffic control for per-flow and per-station fairness. EURASIP J. Wirel. Commun. Netw. 2011: 97 (2011)
2000 – 2009
- 2009
- [c3]Vasaka Visoottiviseth, Thanakom Piroonsith, Siwaruk Siwamogsatham:
An empirical study on achievable throughputs of IEEE 802.11n devices. WiOpt 2009: 1-6 - 2008
- [c2]Vasaka Visoottiviseth, Niwat Bureenok:
Performance Comparison of ISATAP Implementations on FreeBSD, RedHat, and Windows 2003. AINA Workshops 2008: 547-552 - 2007
- [c1]Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita Pongpaibool:
Lightweight Detection of DoS Attacks. ICON 2007: 77-82 - 2005
- [j1]Vasaka Visoottiviseth, Hiroyuki Kido, Katsuyoshi Iida, Youki Kadobayashi, Suguru Yamaguchi:
Performance Study and Deployment Strategies on the Sender-Initiated Multicast. IEICE Trans. Commun. 88-B(4): 1383-1394 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint