Follow
Songpon TEERAKANOK
Songpon TEERAKANOK
Instructor, Mahidol University
Verified email at mahidol.edu - Homepage
Title
Cited by
Cited by
Year
Copy-move forgery detection: A state-of-the-art technical review and analysis
S Teerakanok, T Uehara
IEEE Access 7, 40550-40568, 2019
902019
Migrating to zero trust architecture: Reviews and challenges
S Teerakanok, T Uehara, A Inomata
Security and Communication Networks 2021, 1-10, 2021
642021
Accelerating asymmetric-key cryptography using Parallel-key Cryptographic Algorithm (PCA)
T Teerakanok, S Kamolphiwong
2009 6th International conference on electrical engineering/electronics …, 2009
252009
The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing.
HV Nguyen, S Teerakanok, A Inomata, T Uehara
ICISSP, 440-449, 2021
152021
Copy-move forgery detection using GLCM-based rotation-invariant feature: A preliminary research
S Teerakanok, T Uehara
2018 IEEE 42nd annual computer software and applications conference (COMPSAC …, 2018
152018
A comprehensive framework for migrating to zero trust architecture
P Phiayura, S Teerakanok
Ieee Access 11, 19487-19511, 2023
122023
The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection.
HN Nguyen, S Teerakanok, A Inomata, T Uehara
ICISSP, 109-120, 2021
112021
Preserving User Anonymity in Context‐Aware Location‐Based Services: A Proposed Framework
S Teerakanok, C Vorakulpipat, S Kamolphiwong, S Siwamogsatham
ETRI journal 35 (3), 501-511, 2013
92013
A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum
S Teerakanok, H Yasuki, T Uehara
2020 IEEE 20th International Conference on Software Quality, Reliability and …, 2020
82020
Anonymity preserving framework for location-based information services
S Teerakanok, C Vorakulpipat, S Kamolphiwong
Proceedings of the International Conference on Management of Emergent …, 2010
82010
Advances in Digital Forensics XIV
G Peterson, S Shenoi
Springer International Publishing, 2018
62018
OWASP IoT top 10 based attack dataset for machine learning
NM Min, V Visoottiviseth, S Teerakanok, N Yamai
2022 24th International Conference on Advanced Communication Technology …, 2022
52022
Digital media tampering detection techniques: an overview
S Teerakanok, T Uehara
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017
52017
A privacy-preserving framework for location-based service: a review of structural design and analysis
S Teerakanok, M Pattaranantakul, C Vorakulpipat, S Kamolphiwong, ...
IETE Technical Review 31 (6), 422-439, 2014
52014
Enhancing digital certificate usability in Long Lifespan IoT devices by utilizing private CA
D Yamakawa, T Okimoto, S Teerakanok, A Inomata, T Uehara
Security and Communication Networks 2021, 1-14, 2021
32021
Lessons learned from penetration testing hands-on training during covid-19 pandemic
S Teerakanok, I Rassameeroj, A Khurat, V Visoottiviseth
2022 6th International Conference on Information Technology (InCIT), 368-373, 2022
22022
A secure cloud-centric iot framework for smart device registration
S Teerakanok, T Uehara, A Inomata
Journal of Information Processing 29, 381-391, 2021
12021
ResTran: Long distance relationship on image forgery detection
J Rao, S Teerakanok, T Uehara
IEEE Access, 2023
2023
Detecting Vulnerable OAuth 2.0 Implementations in Android Applications
W Damkham, S Kunihiro, S Teerakanok, T Uehara
2023 IEEE 23rd International Conference on Software Quality, Reliability …, 2023
2023
The Study on the Blocking Time Reduction of the IDS/SON Cooperative Firewall System
P Nimitkul, A Takai, N Yamai, R Nakagawa, S Teerakanok
2023 IEEE 23rd International Conference on Software Quality, Reliability …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20