Distinguishing drone types based on acoustic wave by IoT device N Siriphun, S Kashihara, D Fall, A Khurat 2018 22nd International Computer Science and Engineering Conference (ICSEC), 1-4, 2018 | 33 | 2018 |
Fault tree analysis-based risk quantification of smart homes C Wongvises, A Khurat, D Fall, S Kashihara 2017 2nd International Conference on Information Technology (INCIT), 1-6, 2017 | 22 | 2017 |
Distributed consensus-based Sybil nodes detection in VANETs C Sowattana, W Viriyasitavat, A Khurat 2017 14th International Joint Conference on Computer Science and Software …, 2017 | 19 | 2017 |
Enabling secure mobile access for electronic health care applications M Shanmugam, S Thiruvengadam, A Khurat, I Maglogiannis 2006 Pervasive Health Conference and Workshops, 1-8, 2006 | 18 | 2006 |
Privacy policies verification in composite services using OWL A Khurat, B Suntisrivaraporn, D Gollmann Computers & security 67, 122-141, 2017 | 12 | 2017 |
Securing and trustworthy blockchain-based multi-tenant cloud computing V Reantongcome, V Visoottiviseth, W Sawangphol, A Khurat, S Kashihara, ... 2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics …, 2020 | 10 | 2020 |
A formal P3P semantics for composite services A Khurat, D Gollmann, J Abendroth Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17 …, 2010 | 9 | 2010 |
An automatic networking device auditing tool based on cis benchmark A Khurat, P Sangkhachantharanan 2021 18th International Conference on Electrical Engineering/Electronics …, 2021 | 5 | 2021 |
An open-source based automatic car detection system using iot A Khurat, N Siriphun, J Saingthong, J Sriwiphasathit 2019 16th International Joint Conference on Computer Science and Software …, 2019 | 5 | 2019 |
An ontology for SNORT rule A Khurat, W Sawangphol 2019 16th International Joint Conference on Computer Science and Software …, 2019 | 5 | 2019 |
A Mechanism for Requesting Hierarchical documetns in XACML A Khurat, J Abendroth 2008 IEEE International Conference on Wireless and Mobile Computing …, 2008 | 5 | 2008 |
Investigation of drone vulnerability and its countermeasure N Pojsomphong, V Visoottiviseth, W Sawangphol, A Khurat, S Kashihara, ... 2020 IEEE 10th symposium on computer applications & industrial electronics …, 2020 | 4 | 2020 |
Privacy policies and their enforcement in composite service environment A Khurat | 4 | 2014 |
Play it safe a personal security application on Android platform K Inso, P Noicharoen, N Meathatanunchai, A Khurat 2016 Fifth ICT International Student Project Conference (ICT-ISPC), 133-136, 2016 | 3 | 2016 |
Formalizing and reasoning with P3P policies using a semantic web ontology B Suntisrivaraporn, A Khurat International Workshop on Multi-disciplinary Trends in Artificial …, 2011 | 3 | 2011 |
Telehealth service for patients receiving continuous ambulatory peritoneal dialysis: a pilot study A Sriyuktasuth, P Chuengsaman, W Kusakunniran, A Khurat, ... Siriraj Medical Journal 75 (1), 46-54, 2023 | 2 | 2023 |
Lessons learned from penetration testing hands-on training during covid-19 pandemic S Teerakanok, I Rassameeroj, A Khurat, V Visoottiviseth 2022 6th International Conference on Information Technology (InCIT), 368-373, 2022 | 2 | 2022 |
An ids rule redundancy verification P Noiprasong, A Khurat 2020 17th International Joint Conference on Computer Science and Software …, 2020 | 2 | 2020 |
An Ontological Approach to Verifying P3P Policies. A Khurat, B Suntisrivaraporn KEOD, 349-353, 2011 | 2 | 2011 |
Towards privacy enhancement in policy-based system A Khurat, J Abendroth WSEAS Transactions on Information Science and Applications 4 (3), 576-583, 2007 | 2 | 2007 |