Follow
Jakapan Suaboot
Title
Cited by
Cited by
Year
A taxonomy of supervised learning for idss in scada environments
J Suaboot, A Fahad, Z Tari, J Grundy, AN Mahmood, A Almalawi, ...
ACM Computing Surveys (CSUR) 53 (2), 1-37, 2020
532020
Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences
J Suaboot, Z Tari, A Mahmood, AY Zomaya, W Li
Computers & Security 92, 101773, 2020
252020
The SWC-based Security Analysis Tool for Smart Contract Vulnerability Detection
N Songsom, W Werapun, J Suaboot, N Rattanavipanon
2022 6th International Conference on Information Technology (InCIT), 74-77, 2022
42022
The Flash Loan Attack Analysis (FAA) Framework—A Case Study of the Warp Finance Exploitation
W Werapun, T Karode, T Arpornthip, J Suaboot, E Sangiamkul, P Boonrat
Informatics 10 (1), 3, 2022
32022
Integrating group key distribution for securing upnp services
J Surbot, S Witosurapot
2010 2nd International Conference on Computer Engineering and Technology 7 …, 2010
22010
Data Exfiltration Threats and Prevention Techniques: Machine Learning and Memory-based Data Security
Z Tari, N Sohrabi, Y Samadi, J Suaboot
John Wiley & Sons, 2023
12023
An EOA Identity Tracing System (AITS) on Ethereum Blockchain
S Rattanabunno, W Werapun, J Suaboot, T Karode, M Puongmanee
2023 8th International Conference on Information and Network Technologies …, 2023
12023
Data Integrity for Energy Measurement of Sensor Nodes as Home Services
W Werapun, J Suaboot
the 29th International Technical Conference on Circuits/Systems, Computers …, 2014
12014
Effects of Malware Detection Parameters on Classical vs Deep ML Techniques
T Vhito, J Suaboot, W Werapun, T Kliangsuwan
2023 7th International Conference on Information Technology (InCIT), 440-445, 2023
2023
Andaman Token: A Feasibility Study of Blockchain Adoption in the Tourism Industry
W Werapun, N Songsom, T Khongfai, A Intrapradit, J Suaboot
2023 14th International Conference on Information and Communication …, 2023
2023
NativeVRF: A Simplified Decentralized Random Number Generator on EVM Blockchains
W Werapun, T Karode, J Suaboot, T Arpornthip, E Sangiamkul
Systems 11 (7), 326, 2023
2023
From Characters to Chaos: On the Feasibility of Attacking Thai OCR with Adversarial Examples
C Jiamsuchon, J Suaboot, N Rattanavipanon
2023 20th International Conference on Electrical Engineering/Electronics …, 2023
2023
On the feasibility of attacking Thai LPR systems with adversarial examples
C Jiamsuchon, J Suaboot, N Rattanavipanon
arXiv preprint arXiv:2301.05506, 2023
2023
Survey on Building Block Technologies
Z Tari, N Sohrabi, Y Samadi, J Suaboot
Wiley-IEEE Press, 2023
2023
Data Security Threats
Z Tari, N Sohrabi, Y Samadi, J Suaboot
Wiley-IEEE Press, 2023
2023
Memory‐Based Data Exfiltration Detection Methods
Z Tari, N Sohrabi, Y Samadi, J Suaboot
Wiley-IEEE Press, 2023
2023
Behavior‐Based Data Exfiltration Detection Methods
Z Tari, N Sohrabi, Y Samadi, J Suaboot
Wiley-IEEE Press, 2023
2023
Temporal‐Based Data Exfiltration Detection Methods
Z Tari, N Sohrabi, Y Samadi, J Suaboot
Wiley-IEEE Press, 2023
2023
The Flash Loan Attack Analysis (FAA) Framework—A Case Study of the Warp Finance Exploitation. Informatics 2023, 10, 3
W Werapun, T Karode, T Arpornthip, J Suaboot, E Sangiamkul, P Boonrat
2022
A holistic approach for efficient host-based data exfiltration detection
J Suaboot
RMIT University, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20