Search: A collaborative and intelligent nids architecture for sdn-based cloud iot networks TG Nguyen, TV Phan, BT Nguyen, C So-In, ZA Baig, S Sanguanpong IEEE access 7, 107678-107694, 2019 | 117 | 2019 |
Averaged dependence estimators for DoS attack detection in IoT networks ZA Baig, S Sanguanpong, SN Firdous, TG Nguyen, C So-In Future Generation Computer Systems 102, 198-209, 2020 | 105 | 2020 |
Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy TG Nguyen, C So-In, ZA Baig, S Sanguanpong IEEE Access 6, 23406-23419, 2018 | 60 | 2018 |
Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks With NOMA and SWIPT Over Nakagami- Fading DD Tran, DB Ha, C So-In, H Tran, TG Nguyen, ZA Baig, S Sanguanpong IEEE access 6, 56142-56161, 2018 | 38 | 2018 |
A rule-based approach for port scanning detection U Kanlayasiri, S Sanguanpong, W Jaratmanachot Proceedings of the 23rd electrical engineering conference, Chiang Mai …, 2000 | 38 | 2000 |
A novel web caching scheme using hybrid least frequently used and support vector machine P Aimtongkham, C So-In, S Sanguanpong 2016 13th International Joint Conference on Computer Science and Software …, 2016 | 17 | 2016 |
Measuring and analysis of the thai world wide web S Sanguanpong, P Piamsa-nga, S Keretho, Y Poovarawan, S Warangrit Proc. of the Asia Pacific Advance Network conference, 225-330, 2000 | 16 | 2000 |
High performance large scale web spider architecture K Koht-arsa, S Sanguanpong Proc. Internataional Symposium on Communications and Information Technology, 2002 | 13 | 2002 |
On secure wireless sensor networks with cooperative energy harvesting relaying AN Nguyen, C So-In, DB Ha, S Sanguanpong, ZA Baig IEEE Access 7, 139212-139225, 2019 | 12 | 2019 |
Throughput optimization for noma energy harvesting cognitive radio with multi-UAV-assisted relaying under security constraints VH Dang, H Tran, TD Ho, C So-In, S Sanguanpong IEEE Transactions on Cognitive Communications and Networking 9 (1), 82-98, 2022 | 11 | 2022 |
Network-based intrusion detection model for detecting TCP SYN flooding U Kanlayasiri, S Sanguanpong Proceedings of the 4th National Computer Science and Engineering Conference …, 2000 | 11 | 2000 |
A Design and Implementation of Dual-Stack Aware Authentication System for Enterprise Captive Portal S Sanguanpong, K Koht-Arsa Network and Service Management (CNSM), 2013 9th International Conference on …, 2013 | 8 | 2013 |
Worm damage minimization in enterprise networks S Sanguanpong, U Kanlayasiri International journal of human-computer studies 65 (1), 3-16, 2007 | 8 | 2007 |
In-memory URL compression K Koht-arsa, S Sanguanpong National Computer Science and Engineering Conference, 2001 | 8 | 2001 |
Secrecy performance in the Internet of Things: Optimal energy harvesting time under constraints of sensors and eavesdroppers VN Vo, TG Nguyen, C So-In, H Tran, S Sanguanpong Mobile Networks and Applications 25, 193-210, 2020 | 6 | 2020 |
Building a large-scalable internet super server for academic services with Linux Clusters technology P Uthayopas, S Sanguanpong, Y Poovaravan of Internet Workshop2000, 65-71, 2000 | 6 | 2000 |
A security architecture framework for critical infrastructure with ring-based nested network zones S Chaisuriya, S Keretho, S Sanguanpong, P Praneetpolgrang 2018 10th International Conference on Knowledge and Smart Technology (KST …, 2018 | 5 | 2018 |
A Centralized State Repository Approach to Highly Scalable and High-Availability Parallel Firewall. K Koht-Arsa, S Sanguanpong J. Comput. 8 (7), 1664-1676, 2013 | 5 | 2013 |
A practical approach for building a parallel firewall for ten gigabit Ethernet backbone K Koht-arsa, S Sanguanpong 2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008 | 5 | 2008 |
Measuring Thai Web Using NontriSpider S Sanguanpong, P Piamsa-nga, Y Poovarawan, S Warangrit Proceeding of the International Forum cum Conference on Information …, 2000 | 5 | 2000 |