BibTeX records: Songpon Teerakanok

download as .bib file

@article{DBLP:journals/access/PhiayuraT23,
  author       = {Pacharee Phiayura and
                  Songpon Teerakanok},
  title        = {A Comprehensive Framework for Migrating to Zero Trust Architecture},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {19487--19511},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3248622},
  doi          = {10.1109/ACCESS.2023.3248622},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/PhiayuraT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RaoTU23,
  author       = {Jingjing Rao and
                  Songpon Teerakanok and
                  Tetsutaro Uehara},
  title        = {ResTran: Long Distance Relationship on Image Forgery Detection},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {120492--120501},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3327761},
  doi          = {10.1109/ACCESS.2023.3327761},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/RaoTU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/DamkhamKTU23,
  author       = {Waris Damkham and
                  Shingo Kunihiro and
                  Songpon Teerakanok and
                  Tetsutaro Uehara},
  title        = {Detecting Vulnerable OAuth 2.0 Implementations in Android Applications},
  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October
                  22-26, 2023},
  pages        = {524--531},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QRS-C60940.2023.00024},
  doi          = {10.1109/QRS-C60940.2023.00024},
  timestamp    = {Tue, 05 Mar 2024 11:59:07 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/DamkhamKTU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/NimitkulTYNT23,
  author       = {Perakorn Nimitkul and
                  Akihiro Takai and
                  Nariyoshi Yamai and
                  Rei Nakagawa and
                  Songpon Teerakanok},
  title        = {The Study on the Blocking Time Reduction of the {IDS/SON} Cooperative
                  Firewall System},
  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2023 Companion, Chiang Mai, Thailand, October
                  22-26, 2023},
  pages        = {549--554},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QRS-C60940.2023.00095},
  doi          = {10.1109/QRS-C60940.2023.00095},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/NimitkulTYNT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icact/MinVTY22,
  author       = {Nay Myat Min and
                  Vasaka Visoottiviseth and
                  Songpon Teerakanok and
                  Nariyoshi Yamai},
  title        = {{OWASP} IoT Top 10 based Attack Dataset for Machine Learning},
  booktitle    = {24th International Conference on Advanced Communication Technology,
                  {ICACT} 2022, Pyeongchang, Korea, February 13-16, 2022},
  pages        = {317--322},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.23919/ICACT53585.2022.9728969},
  doi          = {10.23919/ICACT53585.2022.9728969},
  timestamp    = {Fri, 18 Mar 2022 11:45:43 +0100},
  biburl       = {https://dblp.org/rec/conf/icact/MinVTY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/TeerakanokUI21,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara and
                  Atsuo Inomata},
  title        = {A Secure Cloud-centric IoT Framework for Smart Device Registration},
  journal      = {J. Inf. Process.},
  volume       = {29},
  pages        = {381--391},
  year         = {2021},
  url          = {https://doi.org/10.2197/ipsjjip.29.381},
  doi          = {10.2197/IPSJJIP.29.381},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/TeerakanokUI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YamakawaOTIU21,
  author       = {Daiki Yamakawa and
                  Takashi Okimoto and
                  Songpon Teerakanok and
                  Atsuo Inomata and
                  Tetsutaro Uehara},
  title        = {Enhancing Digital Certificate Usability in Long Lifespan IoT Devices
                  by Utilizing Private {CA}},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6610863:1--6610863:14},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6610863},
  doi          = {10.1155/2021/6610863},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YamakawaOTIU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TeerakanokUI21,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara and
                  Atsuo Inomata},
  title        = {Migrating to Zero Trust Architecture: Reviews and Challenges},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {9947347:1--9947347:10},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/9947347},
  doi          = {10.1155/2021/9947347},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TeerakanokUI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NguyenTIU21,
  author       = {Hai Ngoc Nguyen and
                  Songpon Teerakanok and
                  Atsuo Inomata and
                  Tetsutaro Uehara},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {The Comparison of Word Embedding Techniques in RNNs for Vulnerability
                  Detection},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {109--120},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010232301090120},
  doi          = {10.5220/0010232301090120},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NguyenTIU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NguyenTIU21a,
  author       = {Hoang Viet Nguyen and
                  Songpon Teerakanok and
                  Atsuo Inomata and
                  Tetsutaro Uehara},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {The Proposal of Double Agent Architecture using Actor-critic Algorithm
                  for Penetration Testing},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {440--449},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010232504400449},
  doi          = {10.5220/0010232504400449},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NguyenTIU21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KosakataniUT20,
  author       = {Satoshi Kosakatani and
                  Tetsutaro Uehara and
                  Songpon Teerakanok},
  title        = {Japan's Act on Wiretapping for Criminal Investigation: How the system
                  is implemented and how it should be},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351320},
  doi          = {10.23919/ICITST51030.2020.9351320},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/KosakataniUT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/TeerakanokYU20,
  author       = {Songpon Teerakanok and
                  Hiroaki Yasuki and
                  Tetsutaro Uehara},
  title        = {A Practical Solution Against Business Email Compromise {(BEC)} Attack
                  using Invoice Checksum},
  booktitle    = {20th {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS} Companion 2020, Macau, China, December
                  11-14, 2020},
  pages        = {160--167},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/QRS-C51114.2020.00036},
  doi          = {10.1109/QRS-C51114.2020.00036},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/TeerakanokYU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TeerakanokU19,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  title        = {Copy-Move Forgery Detection: {A} State-of-the-Art Technical Review
                  and Analysis},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {40550--40568},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2907316},
  doi          = {10.1109/ACCESS.2019.2907316},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/TeerakanokU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/TeerakanokU19,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  title        = {A Histogram and GLCM-based Approach for Image Copy-Move Forgery Detection},
  journal      = {J. Inf. Process.},
  volume       = {27},
  pages        = {574--584},
  year         = {2019},
  url          = {https://doi.org/10.2197/ipsjjip.27.574},
  doi          = {10.2197/IPSJJIP.27.574},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/TeerakanokU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/TeerakanokU18,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  title        = {Enhancement of Media Splicing Detection: {A} General Framework},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {2},
  pages        = {8:1--8:12},
  year         = {2018},
  url          = {https://doi.org/10.15394/jdfsl.2018.1481},
  doi          = {10.15394/JDFSL.2018.1481},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/TeerakanokU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TeerakanokU18,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature:
                  {A} Preliminary Research},
  booktitle    = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference,
                  {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2},
  pages        = {365--369},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMPSAC.2018.10259},
  doi          = {10.1109/COMPSAC.2018.10259},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/TeerakanokU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TeerakanokU17,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {Digital Media Tampering Detection Techniques: An Overview},
  booktitle    = {41st {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2017, Turin, Italy, July 4-8, 2017. Volume 2},
  pages        = {170--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/COMPSAC.2017.109},
  doi          = {10.1109/COMPSAC.2017.109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/TeerakanokU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/TeerakanokU16,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Enhancing Image Forgery Detection Using 2-D Cross Products},
  booktitle    = {Advances in Digital Forensics {XII} - 12th {IFIP} {WG} 11.9 International
                  Conference, New Delhi, India, January 4-6, 2016, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {484},
  pages        = {297--310},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46279-0\_15},
  doi          = {10.1007/978-3-319-46279-0\_15},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/TeerakanokU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TeerakanokU15,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {Enhancment of Image Tampering Detection Using JPEG's Quantization
                  and Re-interpolation Processes},
  booktitle    = {39th Annual Computer Software and Applications Conference, {COMPSAC}
                  Workshops 2015, Taichung, Taiwan, July 1-5, 2015},
  pages        = {35--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.167},
  doi          = {10.1109/COMPSAC.2015.167},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/TeerakanokU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medes/TeerakanokVK10,
  author       = {Songpon Teerakanok and
                  Chalee Vorakulpipat and
                  Sinchai Kamolphiwong},
  editor       = {Richard Chbeir},
  title        = {Anonymity preserving framework for location-based information services},
  booktitle    = {{MEDES} '10: International {ACM} Conference on Management of Emergent
                  Digital EcoSystems, Bangkok, Thailand, October 26-29, 2010},
  pages        = {107--113},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1936254.1936274},
  doi          = {10.1145/1936254.1936274},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/medes/TeerakanokVK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics