Folgen
Surasak Sanguanpong
Surasak Sanguanpong
Assoc. Professor, Computer Engineering, Kasetsart University
Bestätigte E-Mail-Adresse bei ku.ac.th - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Search: A collaborative and intelligent nids architecture for sdn-based cloud iot networks
TG Nguyen, TV Phan, BT Nguyen, C So-In, ZA Baig, S Sanguanpong
IEEE access 7, 107678-107694, 2019
1152019
Averaged dependence estimators for DoS attack detection in IoT networks
ZA Baig, S Sanguanpong, SN Firdous, TG Nguyen, C So-In
Future Generation Computer Systems 102, 198-209, 2020
1012020
Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy
TG Nguyen, C So-In, ZA Baig, S Sanguanpong
IEEE Access 6, 23406-23419, 2018
602018
A rule-based approach for port scanning detection
U Kanlayasiri, S Sanguanpong, W Jaratmanachot
Proceedings of the 23rd electrical engineering conference, Chiang Mai …, 2000
382000
Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks With NOMA and SWIPT Over Nakagami- Fading
DD Tran, DB Ha, C So-In, H Tran, TG Nguyen, ZA Baig, S Sanguanpong
IEEE access 6, 56142-56161, 2018
372018
A novel web caching scheme using hybrid least frequently used and support vector machine
P Aimtongkham, C So-In, S Sanguanpong
2016 13th International Joint Conference on Computer Science and Software …, 2016
172016
Measuring and analysis of the thai world wide web
S Sanguanpong, P Piamsa-nga, S Keretho, Y Poovarawan, S Warangrit
Proc. of the Asia Pacific Advance Network conference, 225-330, 2000
162000
High performance large scale web spider architecture
K Koht-arsa, S Sanguanpong
Proc. Internataional Symposium on Communications and Information Technology, 2002
132002
On secure wireless sensor networks with cooperative energy harvesting relaying
AN Nguyen, C So-In, DB Ha, S Sanguanpong, ZA Baig
IEEE Access 7, 139212-139225, 2019
122019
Network-based intrusion detection model for detecting TCP SYN flooding
U Kanlayasiri, S Sanguanpong
Proceedings of the 4th National Computer Science and Engineering Conference …, 2000
112000
Throughput optimization for noma energy harvesting cognitive radio with multi-UAV-assisted relaying under security constraints
VH Dang, H Tran, TD Ho, C So-In, S Sanguanpong
IEEE Transactions on Cognitive Communications and Networking 9 (1), 82-98, 2022
102022
A Design and Implementation of Dual-Stack Aware Authentication System for Enterprise Captive Portal
S Sanguanpong, K Koht-Arsa
Network and Service Management (CNSM), 2013 9th International Conference on …, 2013
82013
Worm damage minimization in enterprise networks
S Sanguanpong, U Kanlayasiri
International journal of human-computer studies 65 (1), 3-16, 2007
82007
In-memory URL compression
K Koht-arsa, S Sanguanpong
National Computer Science and Engineering Conference, 2001
82001
Secrecy performance in the Internet of Things: Optimal energy harvesting time under constraints of sensors and eavesdroppers
VN Vo, TG Nguyen, C So-In, H Tran, S Sanguanpong
Mobile Networks and Applications 25, 193-210, 2020
62020
Building a large-scalable internet super server for academic services with Linux Clusters technology
P Uthayopas, S Sanguanpong, Y Poovaravan
of Internet Workshop2000, 65-71, 2000
62000
A security architecture framework for critical infrastructure with ring-based nested network zones
S Chaisuriya, S Keretho, S Sanguanpong, P Praneetpolgrang
2018 10th International Conference on Knowledge and Smart Technology (KST …, 2018
52018
A Centralized State Repository Approach to Highly Scalable and High-Availability Parallel Firewall.
K Koht-Arsa, S Sanguanpong
J. Comput. 8 (7), 1664-1676, 2013
52013
A practical approach for building a parallel firewall for ten gigabit Ethernet backbone
K Koht-arsa, S Sanguanpong
2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008
52008
Measuring Thai Web Using NontriSpider
S Sanguanpong, P Piamsa-nga, Y Poovarawan, S Warangrit
Proceeding of the International Forum cum Conference on Information …, 2000
52000
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20