Improving cloud network security using the Tree-Rule firewall X He, T Chomsiri, P Nanda, Z Tan Future generation computer systems 30, 116-126, 2014 | 72 | 2014 |
HTTPS hacking protection T Chomsiri 21st International Conference on Advanced Information Networking and …, 2007 | 62 | 2007 |
Sniffing packets on LAN without ARP spoofing T Chomsiri 2008 third international conference on convergence and hybrid information …, 2008 | 46 | 2008 |
Firewall rules analysis. T Chomsiri, C Pornavalai Security and management, 213-219, 2006 | 33 | 2006 |
Architecture and protocols for secure LAN by using a software-level certificate and cancellation of ARP protocol D Pansa, T Chomsiri 2008 Third International Conference on Convergence and Hybrid Information …, 2008 | 27 | 2008 |
Top 10 free web-mail security test using session Hijacking P Noiumkar, T Chomsiri 2008 Third International Conference on Convergence and Hybrid Information …, 2008 | 26 | 2008 |
Firewall policy analyzing by relational algebra C Pornavalai, T Chomsiri ITC-CSCC: International Technical Conference on Circuits Systems, Computers …, 2004 | 24 | 2004 |
Hybrid tree-rule firewall for high speed data transmission T Chomsiri, X He, P Nanda, Z Tan IEEE transactions on cloud computing 8 (4), 1237-1249, 2016 | 17 | 2016 |
A stateful mechanism for the tree-rule firewall T Chomsiri, X He, P Nanda, Z Tan 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 16 | 2014 |
Web security improving by using dynamic password authentication D Pansa, T Chomsiri International Conference on Network and Electronics Engineering 11, 32-36, 2011 | 13 | 2011 |
A comparative study of security level of Hotmail, Gmail and Yahoo mail by using session hijacking hacking test T Chomsiri International Journal of Computer Science and Network Security 8 (5), 23-26, 2008 | 12 | 2008 |
Limitation of listed-rule firewall and the design of tree-rule firewall T Chomsiri, X He, P Nanda Internet and Distributed Computing Systems: 5th International Conference …, 2012 | 11 | 2012 |
Authentication model using the bundled CAPTCHA OTP instead of traditional password T Kansuwan, T Chomsiri 2019 joint international conference on digital arts, media and technology …, 2019 | 8 | 2019 |
P coin: High speed cryptocurrency based on random-checkers proof of stake T Chomsiri, K Kongsup 2018 Joint 10th International Conference on Soft Computing and Intelligent …, 2018 | 8 | 2018 |
Integrating the dynamic password authentication with possession factor and captcha D Pansa, T Chomsiri 2018 Joint 10th International Conference on Soft Computing and Intelligent …, 2018 | 7 | 2018 |
An improvement of tree-rule firewall for a large network: Supporting large rule size and low delay T Chomsiri, X He, P Nanda, Z Tan 2016 IEEE Trustcom/BigDataSE/ISPA, 178-184, 2016 | 7 | 2016 |
Analyzing firewall policy with relational algebra and its application SP Pornavalai, T Chomsiri Australian Telecommunication Networks and Applications Conference (ATNAC …, 2004 | 7 | 2004 |
Web’s Dynamic Session IDs: Design and Analysis P Noiumkar, T Chomsiri Journal of Convergence Information Technology 7 (2), 83-91, 2012 | 6 | 2012 |
Design of Blockchain Lottery for Thai Government P Saichua, S Khunthi, T Chomsiri 2019 Joint International Conference on Digital Arts, Media and Technology …, 2019 | 5 | 2019 |
Dynamic Password Authentication: Designing step and security analysis D Pansa, T Chomsiri 2012 7th International Conference on Computing and Convergence Technology …, 2012 | 5 | 2012 |