Songpon Teerakanok

Orcid: 0000-0002-1058-149X

According to our database1, Songpon Teerakanok authored at least 20 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ResTran: Long Distance Relationship on Image Forgery Detection.
IEEE Access, 2023

A Comprehensive Framework for Migrating to Zero Trust Architecture.
IEEE Access, 2023

The Study on the Blocking Time Reduction of the IDS/SON Cooperative Firewall System.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Detecting Vulnerable OAuth 2.0 Implementations in Android Applications.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

2022
OWASP IoT Top 10 based Attack Dataset for Machine Learning.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

2021
Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA.
Secur. Commun. Networks, 2021

Migrating to Zero Trust Architecture: Reviews and Challenges.
Secur. Commun. Networks, 2021

A Secure Cloud-centric IoT Framework for Smart Device Registration.
J. Inf. Process., 2021

The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be.
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020

2019
A Histogram and GLCM-based Approach for Image Copy-Move Forgery Detection.
J. Inf. Process., 2019

Copy-Move Forgery Detection: A State-of-the-Art Technical Review and Analysis.
IEEE Access, 2019

2018
Enhancement of Media Splicing Detection: A General Framework.
J. Digit. Forensics Secur. Law, 2018

Copy-move Forgery Detection Using GLCM-Based Rotation-Invariant Feature: A Preliminary Research.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Digital Media Tampering Detection Techniques: An Overview.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Enhancing Image Forgery Detection Using 2-D Cross Products.
Proceedings of the Advances in Digital Forensics XII, 2016

2015
Enhancment of Image Tampering Detection Using JPEG's Quantization and Re-interpolation Processes.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2010
Anonymity preserving framework for location-based information services.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010


  Loading...