# | Document title | Authors | Year | Source | Cited by |
1 | SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks | Nguyen T.G., Phan T.V., Nguyen B.T., Nguyen B.T., So-In C., Baig Z.A., Sanguanpong S. | 2019 | IEEE Access 7,pp. 107678-107694 | 113 |
2 | Averaged dependence estimators for DoS attack detection in IoT networks | Baig Z.A., Sanguanpong S., Firdous S.N., Vo V.N., Vo V.N., Nguyen T.G., So-In C. | 2020 | Future Generation Computer Systems 102,pp. 198-209 | 98 |
3 | Secrecy Outage Performance Analysis for Energy Harvesting Sensor Networks with a Jammer Using Relay Selection Strategy | Vo V.N., Nguyen T.G., So-In C., Baig Z.A., Sanguanpong S. | 2018 | IEEE Access 6,pp. 23406-23419 | 52 |
4 | Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks with NOMA and SWIPT over Nakagami-m Fading | Tran D.D., Ha D.B., Vo V.N., Vo V.N., So-In C., Tran H., Nguyen T.G., Baig Z.A., Sanguanpong S. | 2018 | IEEE Access 6,pp. 56142-56161 | 28 |
5 | Throughput Optimization for NOMA Energy Harvesting Cognitive Radio with Multi-UAV-Assisted Relaying under Security Constraints | Dang V.H., Nguyen L.M.D., Vo V.N., Tran H., Ho T.D., So-In C., Sanguanpong S. | 2022 | IEEE Transactions on Cognitive Communications and Networking
| 20 |
6 | A novel web caching scheme using hybrid least frequently used and support vector machine | Aimtongkham P., So-In C., Sanguanpong S. | 2016 | 2016 13th International Joint Conference on Computer Science and Software Engineering, JCSSE 2016
| 18 |
7 | On secure wireless sensor networks with cooperative energy harvesting relaying | Nguyen A.N., Nhan Vo V., Nhan Vo V., So-In C., Ha D.B., Sanguanpong S., Baig Z.A. | 2019 | IEEE Access 7,pp. 139212-139225 | 18 |
8 | Secrecy Performance Analysis and Optimization for UAV-Relay-Enabled WPT and Cooperative NOMA MEC in IoT Networks | Nguyen A.N., Ha D.B., Truong V.T., Vo V.N., Sanguanpong S., So-In C. | 2023 | IEEE Access
| 12 |
9 | Worm damage minimization in enterprise networks | Sanguanpong S., Kanlayasiri U. | 2007 | International Journal of Human Computer Studies 65(1),pp. 3-16 | 5 |
10 | A practical approach for building a parallel firewall for ten gigabit ethernet backbone | Koht-Arsa K., Sanguanpong S. | 2008 | Proceedings - International Carnahan Conference on Security Technology ,pp. 331-338 | 3 |
11 | Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers | Vo V.N., Vo V.N., Nguyen T.G., So-In C., Tran H., Tran H., Sanguanpong S. | 2020 | Mobile Networks and Applications 25(1),pp. 193-210 | 3 |
12 | A centralized state repository approach to highly scalable and high-availability parallel firewall | Koht-Arsa K., Sanguanpong S. | 2013 | Journal of Computers (Finland) 8(7),pp. 1664-1676 | 2 |
13 | A design and implementation of dual-stack aware authentication system for enterprise captive portal | Sanguanpong S., Koht-Arsa K. | 2013 | 2013 9th International Conference on Network and Service Management, CNSM 2013 and its three collocated Workshops - ICQT 2013, SVM 2013 and SETM 2013 ,pp. 118-121 | 2 |
14 | Comparison of hash strategies for flow-based load balancing | Sanguanpong S., Pittayapitak W., Koht-Arsa K. | 2015 | International Journal of Electronic Commerce Studies 6(2),pp. 259-268 | 1 |
15 | A two-level intelligent web caching scheme with a hybrid extreme learning machine and least frequently used | Imtongkhum P., So-In C., Sanguanpong S., Phoemphon S. | 2018 | Journal of Internet Technology 19(3),pp. 725-740 | 1 |
16 | A Security Architecture Framework for Critical Infrastructure with Ring-based Nested Network Zones | Chaisuriya S., Keretho S., Sanguanpong S., Praneetpolgrang P. | 2018 | 2018 10th International Conference on Knowledge and Smart Technology: Cybernetics in the Next Decades, KST 2018 ,pp. 248-253 | 1 |
17 | Design and implementation of open framework for policy-based network access control | Chitpinityon S., Sanguanpong S., Koht-Arsa K., Chuchuay J. | 2009 | Proceedings - International Carnahan Conference on Security Technology ,pp. 68-71 | 1 |
18 | Architectural design for large-scale campus-wide captive portal | Koht-Arsa K., Phonphoem A., Sanguanpong S. | 2009 | Proceedings - International Carnahan Conference on Security Technology ,pp. 72-76 | 1 |
19 | Achieving 100 Gb/s URL filtering with cots multi-core systems | Chitpinityon S., Sanguanpong S., Erjongmanee S., Koht-Arsa K. | 2017 | International Journal of Electronic Commerce Studies 8(1),pp. 77-95 | 0 |
20 | Key factors influencing worm infection in enterprise networks | Kanlayasiri U., Sanguanpong S. | 2005 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3786 LNCS,pp. 54-67 | 0 |
21 | Effects of SIEM Recovery Time: Case Study on Security Onion | Hongkamnerd W., Tangtrongpairoj W., Watanapongse P., Sanguanpong S. | 2024 | 2024 21st International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, ECTI-CON 2024
| 0 |
22 | Behavioral Analysis of Multi-core Random Forest Models: Case Study on Domain Name Randomness Detection | Chaikangwan K., Tangtrongpairoj W., Watanapongse P., Sanguanpong S. | 2024 | International Computer Science and Engineering Conference (2024) | 0 |