Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Worm damage minimization in enterprise networks., and . Int. J. Hum. Comput. Stud., 65 (1): 3-16 (2007)Measuring and analysis of the Thai World Wide Web, , , , and . Proceeding of the Asia Pacific Advance Network conference, page 225--230. Beijing, China, (2000)Facts about the Thai Web, , and . (2000)Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks With NOMA and SWIPT Over Nakagami-m Fading., , , , , , , and . IEEE Access, (2018)Secrecy Outage Performance Analysis for Energy Harvesting Sensor Networks With a Jammer Using Relay Selection Strategy., , , , and . IEEE Access, (2018)On Secure Wireless Sensor Networks With Cooperative Energy Harvesting Relaying., , , , , and . IEEE Access, (2019)SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks., , , , , and . IEEE Access, (2019)A Security Architecture Framework for Critical Infrastructure with Ring-based Nested Network Zones., , , and . KST, page 248-253. IEEE, (2018)Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers., , , , and . Mob. Networks Appl., 25 (1): 193-210 (2020)Key Factors Influencing Worm Infection in Enterprise Networks., and . WISA, volume 3786 of Lecture Notes in Computer Science, page 54-67. Springer, (2005)