Follow
Jakapan Suaboot
Title
Cited by
Cited by
Year
A taxonomy of supervised learning for idss in scada environments
J Suaboot, A Fahad, Z Tari, J Grundy, AN Mahmood, A Almalawi, ...
ACM Computing Surveys (CSUR) 53 (2), 1-37, 2020
612020
Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences
J Suaboot, Z Tari, A Mahmood, AY Zomaya, W Li
Computers & Security 92, 101773, 2020
302020
The Flash Loan Attack Analysis (FAA) Framework—A Case Study of the Warp Finance Exploitation
W Werapun, T Karode, T Arpornthip, J Suaboot, E Sangiamkul, P Boonrat
Informatics 10 (1), 3, 2022
52022
The SWC-Based Security Analysis Tool for Smart Contract Vulnerability Detection
N Songsom, W Werapun, J Suaboot, N Rattanavipanon
2022 6th International Conference on Information Technology (InCIT), 74-77, 2022
42022
NativeVRF: A Simplified Decentralized Random Number Generator on EVM Blockchains
W Werapun, T Karode, J Suaboot, T Arpornthip, E Sangiamkul
Systems 11 (7), 326, 2023
22023
Data Exfiltration Threats and Prevention Techniques: Machine Learning and Memory-based Data Security
Z Tari, N Sohrabi, Y Samadi, J Suaboot
John Wiley & Sons, 2023
22023
Data Security Threats
Z Tari, N Sohrabi, Y Samadi, J Suaboot
Wiley-IEEE Press, 2023
22023
Integrating group key distribution for securing upnp services
J Surbot, S Witosurapot
2010 2nd International Conference on Computer Engineering and Technology 7 …, 2010
22010
An EOA Identity Tracing System (AITS) on Ethereum Blockchain
S Rattanabunno, W Werapun, J Suaboot, T Karode, M Puongmanee
2023 8th International Conference on Information and Network Technologies …, 2023
12023
Survey on Building Block Technologies
Z Tari, N Sohrabi, Y Samadi, J Suaboot
Wiley-IEEE Press, 2023
12023
Data Integrity for Energy Measurement of Sensor Nodes as Home Services
W Werapun, J Suaboot
the 29th International Technical Conference on Circuits/Systems, Computers …, 2014
12014
A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Crytography
N Rattanavipanon, J Suaboot, W Werapun
arXiv preprint arXiv:2409.07852, 2024
2024
SVC-MST BWQLB multicast over software-defined networking
W Werapun, J Suaboot, P Tantisarkhornkhet, J Thaenthong
International Journal of Internet Protocol Technology 16 (4), 204-216, 2024
2024
Effects of Malware Detection Parameters on Classical vs Deep ML Techniques
T Vhito, J Suaboot, W Werapun, T Kliangsuwan
2023 7th International Conference on Information Technology (InCIT), 440-445, 2023
2023
Andaman Token: A Feasibility Study of Blockchain Adoption in the Tourism Industry
W Werapun, N Songsom, T Khongfai, A Intrapradit, J Suaboot
2023 14th International Conference on Information and Communication …, 2023
2023
From Characters to Chaos: On the Feasibility of Attacking Thai OCR with Adversarial Examples
C Jiamsuchon, J Suaboot, N Rattanavipanon
2023 20th International Conference on Electrical Engineering/Electronics …, 2023
2023
On the feasibility of attacking Thai LPR systems with adversarial examples
C Jiamsuchon, J Suaboot, N Rattanavipanon
arXiv preprint arXiv:2301.05506, 2023
2023
Memory‐Based Data Exfiltration Detection Methods
Z Tari, N Sohrabi, Y Samadi, J Suaboot
Wiley-IEEE Press, 2023
2023
Behavior‐Based Data Exfiltration Detection Methods
Z Tari, N Sohrabi, Y Samadi, J Suaboot
Wiley-IEEE Press, 2023
2023
Temporal‐Based Data Exfiltration Detection Methods
Z Tari, N Sohrabi, Y Samadi, J Suaboot
Wiley-IEEE Press, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20