Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Visoottiviseth, Vasaka
add a person with the name Visoottiviseth, Vasaka
 

Other publications of authors with the same name

An empirical study on achievable throughputs of IEEE 802.11n devices., , and . WiOpt, page 1-6. IEEE, (2009)OWASP IoT Top 10 based Attack Dataset for Machine Learning., , , and . ICACT, page 317-322. IEEE, (2022)Intrusion Detection by Deep Learning with TensorFlow., and . ICACT, page 654-659. IEEE, (2019)muMQ: A lightweight and scalable MQTT broker., , and . LANMAN, page 1-6. IEEE, (2017)Drone Detection and Identification by Using Packet Length Signature., , , and . JCSSE, page 1-6. IEEE, (2018)Enhancing the Performance of Mobile Traffic Identification with Communication Patterns., , and . COMPSAC, page 336-345. IEEE Computer Society, (2015)Quick Blocking Operation of Firewall System Cooperating with IDS and SDN., , , , and . ICACT, page 393-398. IEEE, (2022)Intercontinental Disk-to-Disk Data Transfer Experiment with a Lightweight DTN Software Stack., , and . ICACT, page 485-490. IEEE, (2020)Android Forensic and Security Assessment for Hospital and Stock-and-Trade Applications in Thailand., and . JCSSE, page 1-6. IEEE, (2018)Microusity: A testing tool for Backends for Frontends (BFF) Microservice Systems., , , , , , , and . ICPC, page 74-78. IEEE, (2023)