Effectiveness of and user preferences for security awareness training methodologies KF Tschakert, S Ngamsuriyaroj Heliyon 5 (6), 2019 | 76 | 2019 |
Evaluation studies of three intrusion detection systems under various attacks and rule sets K Thongkanchorn, S Ngamsuriyaroj, V Visoottiviseth 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013), 1-4, 2013 | 61 | 2013 |
Assessment of hypervisor vulnerabilities A Thongthua, S Ngamsuriyaroj 2016 International conference on cloud computing research and innovations …, 2016 | 29 | 2016 |
Exploring Vulnerabilities in Solidity Smart Contract. P Tantikul, S Ngamsuriyaroj ICISSP, 317-324, 2020 | 23 | 2020 |
Package delivery system based on Blockchain infrastructure S Ngamsuriyaroj, T Likittheerameth, A Kahutson, T Pathummasut 2018 Seventh ICT International Student Project Conference (ICT-ISPC), 1-6, 2018 | 16 | 2018 |
Lightweight scheme of secure outsourcing SVD of a large matrix on cloud C Pramkaew, S Ngamsuriyaroj Journal of Information Security and Applications 41, 92-102, 2018 | 15 | 2018 |
Walking gait measurement and analysis via knee angle movement and foot plantar pressures S Ngamsuriyaroj, W Chira-Adisai, S Somnuk, C Leksunthorn, K Saiphim 2018 15th International Joint Conference on Computer Science and Software …, 2018 | 12 | 2018 |
Performance evaluation of tpc-h queries on mysql cluster S Ngamsuriyaroj, R Pornpattana 2010 IEEE 24th International Conference on Advanced Information Networking …, 2010 | 12 | 2010 |
Melody Touch: A game for learning English from songs P Kitichaiwat, M Thongsuk, S Ngamsuriyaroj 2014 Third ICT International Student Project Conference (ICT-ISPC), 13-16, 2014 | 11 | 2014 |
Authorization model for summary schemas model S Ngamsuriyaroj, AR Hurson, TF Keefe Proceedings International Database Engineering and Applications Symposium …, 2002 | 11 | 2002 |
Classification of exploit-kit behaviors via machine learning approach S Harnmetta, S Ngamsuriyaroj 2018 20th International Conference on Advanced Communication Technology …, 2018 | 10 | 2018 |
Performance evaluation of load balanced web proxies S Ngamsuriyaroj, P Rattidham, I Rassameeroj, P Wongbuchasin, ... 2011 IEEE Workshops of International Conference on Advanced Information …, 2011 | 10 | 2011 |
ShrimpGPAT: a gene and protein annotation tool for knowledge sharing and gene discovery in shrimp P Korshkari, S Vaiwsri, TW Flegel, S Ngamsuriyaroj, B Sonthayanon, ... BMC genomics 15, 1-9, 2014 | 9 | 2014 |
Incremental adaptive spam mail filtering using naive Bayesian classification P Taninpong, S Ngamsuriyaroj 2009 10th ACIS International Conference on Software Engineering, Artificial …, 2009 | 9 | 2009 |
Identifying focus research areas of computer science researchers from publications C Noosrikong, S Ngamsuriyaroj, SPN Ayudhya TENCON 2017-2017 IEEE Region 10 Conference, 811-816, 2017 | 7 | 2017 |
Patient information exchange via web services in HL 7 v3 for two different healthcare systems S Ngamsuriyaroj, C Sirichamchaikul, S Hanam, T Tatsanaboonya 2011 Eighth International Joint Conference on Computer Science and Software …, 2011 | 7 | 2011 |
Tree-based text stream clustering with application to spam mail classification P Taninpong, S Ngamsuriyaroj International Journal of Data Mining, Modelling and Management 10 (4), 353-370, 2018 | 6 | 2018 |
The effects of filtering malicious traffic under DoS attacks C Wongvivitkul, S Ngamsuriyaroj APAN 24th Meeting in Xi’An, 2007 | 6 | 2007 |
Maintaining consistency of the security policy in distributed environment S Ngamsuriyaroj, TF Keefe, AR Hurson Conference Proceedings of the IEEE International Performance, Computing, and …, 2002 | 6 | 2002 |
Effectiveness of and user preferences for security awareness training methodologies. Heliyon, 5 (6), e02010 KF Tschakert, S Ngamsuriyaroj | 5 | 2019 |