Follow
assadarat khurat
assadarat khurat
Faculty of Information and Communication Technology, Mahidol University
Verified email at mahidol.ac.th
Title
Cited by
Cited by
Year
Distinguishing drone types based on acoustic wave by IoT device
N Siriphun, S Kashihara, D Fall, A Khurat
2018 22nd International Computer Science and Engineering Conference (ICSEC), 1-4, 2018
332018
Fault tree analysis-based risk quantification of smart homes
C Wongvises, A Khurat, D Fall, S Kashihara
2017 2nd International Conference on Information Technology (INCIT), 1-6, 2017
222017
Distributed consensus-based Sybil nodes detection in VANETs
C Sowattana, W Viriyasitavat, A Khurat
2017 14th International Joint Conference on Computer Science and Software …, 2017
192017
Enabling secure mobile access for electronic health care applications
M Shanmugam, S Thiruvengadam, A Khurat, I Maglogiannis
2006 Pervasive Health Conference and Workshops, 1-8, 2006
182006
Privacy policies verification in composite services using OWL
A Khurat, B Suntisrivaraporn, D Gollmann
Computers & security 67, 122-141, 2017
122017
Securing and trustworthy blockchain-based multi-tenant cloud computing
V Reantongcome, V Visoottiviseth, W Sawangphol, A Khurat, S Kashihara, ...
2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics …, 2020
102020
A formal P3P semantics for composite services
A Khurat, D Gollmann, J Abendroth
Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17 …, 2010
92010
An automatic networking device auditing tool based on cis benchmark
A Khurat, P Sangkhachantharanan
2021 18th International Conference on Electrical Engineering/Electronics …, 2021
52021
An open-source based automatic car detection system using iot
A Khurat, N Siriphun, J Saingthong, J Sriwiphasathit
2019 16th International Joint Conference on Computer Science and Software …, 2019
52019
An ontology for SNORT rule
A Khurat, W Sawangphol
2019 16th International Joint Conference on Computer Science and Software …, 2019
52019
A Mechanism for Requesting Hierarchical documetns in XACML
A Khurat, J Abendroth
2008 IEEE International Conference on Wireless and Mobile Computing …, 2008
52008
Investigation of drone vulnerability and its countermeasure
N Pojsomphong, V Visoottiviseth, W Sawangphol, A Khurat, S Kashihara, ...
2020 IEEE 10th symposium on computer applications & industrial electronics …, 2020
42020
Privacy policies and their enforcement in composite service environment
A Khurat
42014
Play it safe a personal security application on Android platform
K Inso, P Noicharoen, N Meathatanunchai, A Khurat
2016 Fifth ICT International Student Project Conference (ICT-ISPC), 133-136, 2016
32016
Formalizing and reasoning with P3P policies using a semantic web ontology
B Suntisrivaraporn, A Khurat
International Workshop on Multi-disciplinary Trends in Artificial …, 2011
32011
Telehealth service for patients receiving continuous ambulatory peritoneal dialysis: a pilot study
A Sriyuktasuth, P Chuengsaman, W Kusakunniran, A Khurat, ...
Siriraj Medical Journal 75 (1), 46-54, 2023
22023
Lessons learned from penetration testing hands-on training during covid-19 pandemic
S Teerakanok, I Rassameeroj, A Khurat, V Visoottiviseth
2022 6th International Conference on Information Technology (InCIT), 368-373, 2022
22022
An ids rule redundancy verification
P Noiprasong, A Khurat
2020 17th International Joint Conference on Computer Science and Software …, 2020
22020
An Ontological Approach to Verifying P3P Policies.
A Khurat, B Suntisrivaraporn
KEOD, 349-353, 2011
22011
Towards privacy enhancement in policy-based system
A Khurat, J Abendroth
WSEAS Transactions on Information Science and Applications 4 (3), 576-583, 2007
22007
The system can't perform the operation now. Try again later.
Articles 1–20