# | Document title | Authors | Year | Source | Cited by |
1 | Information security requirement extraction from regulatory documents using GATE/ANNIC | Janpitak N., Sathitwiriyawong C., Pipatthanaudomdee P. | 2019 | iEECON 2019 - 7th International Electrical Engineering Congress, Proceedings
| 8 |
2 | Run-time enforcement model for dynamic separation of duty | Janpitak N., Sathitwiriyawong C. | 2010 | ISCIT 2010 - 2010 10th International Symposium on Communications and Information Technologies ,pp. 115-120 | 3 |
3 | Coin Recovery from Inaccessible Cryptocurrency Wallet Using Unspent Transaction Output | Rakdej P., Janpitak N., Warasart M., Lilakiatsakun W. | 2019 | Proceedings of 2019 4th International Conference on Information Technology: Encompassing Intelligent Technology and Innovation Towards the New Era of Human Life, InCIT 2019 ,pp. 99-103 | 3 |
4 | The novel secure testament methodology for cryptocurrency wallet using mnemonic seed | Janpitak N., Lilakiatsakun W., Sathitwiriyawong C. | 2020 | Information Security Journal 29(4),pp. 169-182 | 2 |
5 | A Design Of Blockchain-Based Happy Giving Application: Promoting Collaboration And Community Development | Janpitak N., Supeeson A., Pannurat N. | 2023 | 7th International Conference on Information Technology, InCIT 2023 ,pp. 304-308 | 0 |
6 | Automated Compliance Checking Methodology for Non-Log Operations | Janpitak N., Sathitwiriyawong C. | 2015 | Information Security Journal 24(4-6),pp. 98-108 | 0 |