Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Songpon Teerakanok
@article{DBLP:journals/access/PhiayuraT23, author = {Pacharee Phiayura and Songpon Teerakanok}, title = {A Comprehensive Framework for Migrating to Zero Trust Architecture}, journal = {{IEEE} Access}, volume = {11}, pages = {19487--19511}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3248622}, doi = {10.1109/ACCESS.2023.3248622}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/PhiayuraT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RaoTU23, author = {Jingjing Rao and Songpon Teerakanok and Tetsutaro Uehara}, title = {ResTran: Long Distance Relationship on Image Forgery Detection}, journal = {{IEEE} Access}, volume = {11}, pages = {120492--120501}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3327761}, doi = {10.1109/ACCESS.2023.3327761}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/RaoTU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/DamkhamKTU23, author = {Waris Damkham and Shingo Kunihiro and Songpon Teerakanok and Tetsutaro Uehara}, title = {Detecting Vulnerable OAuth 2.0 Implementations in Android Applications}, booktitle = {23rd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October 22-26, 2023}, pages = {524--531}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/QRS-C60940.2023.00024}, doi = {10.1109/QRS-C60940.2023.00024}, timestamp = {Tue, 05 Mar 2024 11:59:07 +0100}, biburl = {https://dblp.org/rec/conf/qrs/DamkhamKTU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/NimitkulTYNT23, author = {Perakorn Nimitkul and Akihiro Takai and Nariyoshi Yamai and Rei Nakagawa and Songpon Teerakanok}, title = {The Study on the Blocking Time Reduction of the {IDS/SON} Cooperative Firewall System}, booktitle = {23rd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October 22-26, 2023}, pages = {549--554}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/QRS-C60940.2023.00095}, doi = {10.1109/QRS-C60940.2023.00095}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qrs/NimitkulTYNT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/MinVTY22, author = {Nay Myat Min and Vasaka Visoottiviseth and Songpon Teerakanok and Nariyoshi Yamai}, title = {{OWASP} IoT Top 10 based Attack Dataset for Machine Learning}, booktitle = {24th International Conference on Advanced Communication Technology, {ICACT} 2022, Pyeongchang, Korea, February 13-16, 2022}, pages = {317--322}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/ICACT53585.2022.9728969}, doi = {10.23919/ICACT53585.2022.9728969}, timestamp = {Fri, 18 Mar 2022 11:45:43 +0100}, biburl = {https://dblp.org/rec/conf/icact/MinVTY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/TeerakanokUI21, author = {Songpon Teerakanok and Tetsutaro Uehara and Atsuo Inomata}, title = {A Secure Cloud-centric IoT Framework for Smart Device Registration}, journal = {J. Inf. Process.}, volume = {29}, pages = {381--391}, year = {2021}, url = {https://doi.org/10.2197/ipsjjip.29.381}, doi = {10.2197/IPSJJIP.29.381}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/TeerakanokUI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YamakawaOTIU21, author = {Daiki Yamakawa and Takashi Okimoto and Songpon Teerakanok and Atsuo Inomata and Tetsutaro Uehara}, title = {Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private {CA}}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6610863:1--6610863:14}, year = {2021}, url = {https://doi.org/10.1155/2021/6610863}, doi = {10.1155/2021/6610863}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YamakawaOTIU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TeerakanokUI21, author = {Songpon Teerakanok and Tetsutaro Uehara and Atsuo Inomata}, title = {Migrating to Zero Trust Architecture: Reviews and Challenges}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {9947347:1--9947347:10}, year = {2021}, url = {https://doi.org/10.1155/2021/9947347}, doi = {10.1155/2021/9947347}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TeerakanokUI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NguyenTIU21, author = {Hai Ngoc Nguyen and Songpon Teerakanok and Atsuo Inomata and Tetsutaro Uehara}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {109--120}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010232301090120}, doi = {10.5220/0010232301090120}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NguyenTIU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NguyenTIU21a, author = {Hoang Viet Nguyen and Songpon Teerakanok and Atsuo Inomata and Tetsutaro Uehara}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {440--449}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010232504400449}, doi = {10.5220/0010232504400449}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NguyenTIU21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KosakataniUT20, author = {Satoshi Kosakatani and Tetsutaro Uehara and Songpon Teerakanok}, title = {Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351320}, doi = {10.23919/ICITST51030.2020.9351320}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/KosakataniUT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/TeerakanokYU20, author = {Songpon Teerakanok and Hiroaki Yasuki and Tetsutaro Uehara}, title = {A Practical Solution Against Business Email Compromise {(BEC)} Attack using Invoice Checksum}, booktitle = {20th {IEEE} International Conference on Software Quality, Reliability and Security Companion, {QRS} Companion 2020, Macau, China, December 11-14, 2020}, pages = {160--167}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/QRS-C51114.2020.00036}, doi = {10.1109/QRS-C51114.2020.00036}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qrs/TeerakanokYU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TeerakanokU19, author = {Songpon Teerakanok and Tetsutaro Uehara}, title = {Copy-Move Forgery Detection: {A} State-of-the-Art Technical Review and Analysis}, journal = {{IEEE} Access}, volume = {7}, pages = {40550--40568}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2907316}, doi = {10.1109/ACCESS.2019.2907316}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/TeerakanokU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/TeerakanokU19, author = {Songpon Teerakanok and Tetsutaro Uehara}, title = {A Histogram and GLCM-based Approach for Image Copy-Move Forgery Detection}, journal = {J. Inf. Process.}, volume = {27}, pages = {574--584}, year = {2019}, url = {https://doi.org/10.2197/ipsjjip.27.574}, doi = {10.2197/IPSJJIP.27.574}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/TeerakanokU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/TeerakanokU18, author = {Songpon Teerakanok and Tetsutaro Uehara}, title = {Enhancement of Media Splicing Detection: {A} General Framework}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {2}, pages = {8:1--8:12}, year = {2018}, url = {https://doi.org/10.15394/jdfsl.2018.1481}, doi = {10.15394/JDFSL.2018.1481}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/TeerakanokU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/TeerakanokU18, author = {Songpon Teerakanok and Tetsutaro Uehara}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Kamrul Hasan}, title = {Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature: {A} Preliminary Research}, booktitle = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference, {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2}, pages = {365--369}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/COMPSAC.2018.10259}, doi = {10.1109/COMPSAC.2018.10259}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/TeerakanokU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/TeerakanokU17, author = {Songpon Teerakanok and Tetsutaro Uehara}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Kamrul Hasan}, title = {Digital Media Tampering Detection Techniques: An Overview}, booktitle = {41st {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2017, Turin, Italy, July 4-8, 2017. Volume 2}, pages = {170--174}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/COMPSAC.2017.109}, doi = {10.1109/COMPSAC.2017.109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/TeerakanokU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/TeerakanokU16, author = {Songpon Teerakanok and Tetsutaro Uehara}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Enhancing Image Forgery Detection Using 2-D Cross Products}, booktitle = {Advances in Digital Forensics {XII} - 12th {IFIP} {WG} 11.9 International Conference, New Delhi, India, January 4-6, 2016, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {484}, pages = {297--310}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46279-0\_15}, doi = {10.1007/978-3-319-46279-0\_15}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/TeerakanokU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/TeerakanokU15, author = {Songpon Teerakanok and Tetsutaro Uehara}, editor = {Sheikh Iqbal Ahamed and Carl K. Chang and William C. Chu and Ivica Crnkovic and Pao{-}Ann Hsiung and Gang Huang and Jingwei Yang}, title = {Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes}, booktitle = {39th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2015, Taichung, Taiwan, July 1-5, 2015}, pages = {35--39}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/COMPSAC.2015.167}, doi = {10.1109/COMPSAC.2015.167}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/TeerakanokU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medes/TeerakanokVK10, author = {Songpon Teerakanok and Chalee Vorakulpipat and Sinchai Kamolphiwong}, editor = {Richard Chbeir}, title = {Anonymity preserving framework for location-based information services}, booktitle = {{MEDES} '10: International {ACM} Conference on Management of Emergent Digital EcoSystems, Bangkok, Thailand, October 26-29, 2010}, pages = {107--113}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1936254.1936274}, doi = {10.1145/1936254.1936274}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/medes/TeerakanokVK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.