Copy-move forgery detection: A state-of-the-art technical review and analysis S Teerakanok, T Uehara IEEE Access 7, 40550-40568, 2019 | 90 | 2019 |
Migrating to zero trust architecture: Reviews and challenges S Teerakanok, T Uehara, A Inomata Security and Communication Networks 2021, 1-10, 2021 | 64 | 2021 |
Accelerating asymmetric-key cryptography using Parallel-key Cryptographic Algorithm (PCA) T Teerakanok, S Kamolphiwong 2009 6th International conference on electrical engineering/electronics …, 2009 | 25 | 2009 |
The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing. HV Nguyen, S Teerakanok, A Inomata, T Uehara ICISSP, 440-449, 2021 | 15 | 2021 |
Copy-move forgery detection using GLCM-based rotation-invariant feature: A preliminary research S Teerakanok, T Uehara 2018 IEEE 42nd annual computer software and applications conference (COMPSAC …, 2018 | 15 | 2018 |
A comprehensive framework for migrating to zero trust architecture P Phiayura, S Teerakanok Ieee Access 11, 19487-19511, 2023 | 12 | 2023 |
The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection. HN Nguyen, S Teerakanok, A Inomata, T Uehara ICISSP, 109-120, 2021 | 11 | 2021 |
Preserving User Anonymity in Context‐Aware Location‐Based Services: A Proposed Framework S Teerakanok, C Vorakulpipat, S Kamolphiwong, S Siwamogsatham ETRI journal 35 (3), 501-511, 2013 | 9 | 2013 |
A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum S Teerakanok, H Yasuki, T Uehara 2020 IEEE 20th International Conference on Software Quality, Reliability and …, 2020 | 8 | 2020 |
Anonymity preserving framework for location-based information services S Teerakanok, C Vorakulpipat, S Kamolphiwong Proceedings of the International Conference on Management of Emergent …, 2010 | 8 | 2010 |
Advances in Digital Forensics XIV G Peterson, S Shenoi Springer International Publishing, 2018 | 6 | 2018 |
OWASP IoT top 10 based attack dataset for machine learning NM Min, V Visoottiviseth, S Teerakanok, N Yamai 2022 24th International Conference on Advanced Communication Technology …, 2022 | 5 | 2022 |
Digital media tampering detection techniques: an overview S Teerakanok, T Uehara 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017 | 5 | 2017 |
A privacy-preserving framework for location-based service: a review of structural design and analysis S Teerakanok, M Pattaranantakul, C Vorakulpipat, S Kamolphiwong, ... IETE Technical Review 31 (6), 422-439, 2014 | 5 | 2014 |
Enhancing digital certificate usability in Long Lifespan IoT devices by utilizing private CA D Yamakawa, T Okimoto, S Teerakanok, A Inomata, T Uehara Security and Communication Networks 2021, 1-14, 2021 | 3 | 2021 |
Lessons learned from penetration testing hands-on training during covid-19 pandemic S Teerakanok, I Rassameeroj, A Khurat, V Visoottiviseth 2022 6th International Conference on Information Technology (InCIT), 368-373, 2022 | 2 | 2022 |
A secure cloud-centric iot framework for smart device registration S Teerakanok, T Uehara, A Inomata Journal of Information Processing 29, 381-391, 2021 | 1 | 2021 |
ResTran: Long distance relationship on image forgery detection J Rao, S Teerakanok, T Uehara IEEE Access, 2023 | | 2023 |
Detecting Vulnerable OAuth 2.0 Implementations in Android Applications W Damkham, S Kunihiro, S Teerakanok, T Uehara 2023 IEEE 23rd International Conference on Software Quality, Reliability …, 2023 | | 2023 |
The Study on the Blocking Time Reduction of the IDS/SON Cooperative Firewall System P Nimitkul, A Takai, N Yamai, R Nakagawa, S Teerakanok 2023 IEEE 23rd International Conference on Software Quality, Reliability …, 2023 | | 2023 |