Surasak Sanguanpong

Orcid: 0000-0002-7045-7394

According to our database1, Surasak Sanguanpong authored at least 13 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Throughput Optimization for Noma Energy Harvesting Cognitive Radio With Multi-UAV-Assisted Relaying Under Security Constraints.
IEEE Trans. Cogn. Commun. Netw., February, 2023

Secrecy Performance Analysis and Optimization for UAV-Relay-Enabled WPT and Cooperative NOMA MEC in IoT Networks.
IEEE Access, 2023

2020
Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers.
Mob. Networks Appl., 2020

Averaged dependence estimators for DoS attack detection in IoT networks.
Future Gener. Comput. Syst., 2020

2019
On Secure Wireless Sensor Networks With Cooperative Energy Harvesting Relaying.
IEEE Access, 2019

SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks.
IEEE Access, 2019

2018
Secrecy Outage Performance Analysis for Energy Harvesting Sensor Networks With a Jammer Using Relay Selection Strategy.
IEEE Access, 2018

Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks With NOMA and SWIPT Over Nakagami-m Fading.
IEEE Access, 2018

A Security Architecture Framework for Critical Infrastructure with Ring-based Nested Network Zones.
Proceedings of the 10th International Conference on Knowledge and Smart Technology, 2018

2013
A Centralized State Repository Approach to Highly Scalable and High-Availability Parallel Firewall.
J. Comput., 2013

A design and implementation of dual-stack aware authentication system for enterprise captive portal.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2007
Worm damage minimization in enterprise networks.
Int. J. Hum. Comput. Stud., 2007

2005
Key Factors Influencing Worm Infection in Enterprise Networks.
Proceedings of the Information Security Applications, 6th International Workshop, 2005


  Loading...