Author of the publication

Hybrid Tree-Rule Firewall for High Speed Data Transmission.

, , , and . IEEE Trans. Cloud Comput., 8 (4): 1237-1249 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Chomsiri, Thawatchai
add a person with the name Chomsiri, Thawatchai
 

Other publications of authors with the same name

Hybrid Tree-Rule Firewall for High Speed Data Transmission., , , and . IEEE Trans. Cloud Comput., 8 (4): 1237-1249 (2020)Improving cloud network security using the Tree-Rule firewall., , , and . Future Gener. Comput. Syst., (2014)Tree rule firewall. University of Technology Sydney, Australia, (2016)A Stateful Mechanism for the Tree-Rule Firewall., , , and . TrustCom, page 122-129. IEEE Computer Society, (2014)Integrating the Dynamic Password Authentication with Possession Factor and CAPTCHA., and . SCIS&ISIS, page 530-535. IEEE, (2018)Survey and Analysis of NFT and Blockchain Technologies for Developing Agricultural Product Trading Systems., , and . JCSSE, page 145-149. IEEE, (2023)HTTPS Hacking Protection.. AINA Workshops (1), page 590-594. IEEE Computer Society, (2007)P Coin: High Speed Cryptocurrency Based on Random-Checkers Proof of Stake., and . SCIS&ISIS, page 524-529. IEEE, (2018)Firewall Rules Analysis., and . Security and Management, page 213-219. CSREA Press, (2006)Limitation of Listed-Rule Firewall and the Design of Tree-Rule Firewall., , and . IDCS, volume 7646 of Lecture Notes in Computer Science, page 275-287. Springer, (2012)