Computer Security
Description
No matching items found.
People
Publications
- ● Exploration and Design of a BYOD-Based CBT Examination System: A Case Study for University Admission; Wanwisa Netsawang, Vajirasak Vanijja, Montri Supattatham; 2026; Conference proceedings article
- ● Hashing Algorithm for Protecting Credential Information Against Channel Interception and Server-Side Data Leakage; Kittipong Piyawanno, Taweechai Nuntawisuttiwong; 2024; Conference proceedings article
- ● Impact of AI on the Cyber Kill Chain: A Systematic Review; Kazimierczak M., Habib N., Chan J.H., et al.; 2024; Journal article
- ● Independence number and connectivity of maximal connected domination vertex critical graphs; Kaemawichanurat P.; Almalki N.; 2024; Journal article
- ● Irredundance chromatic number and gamma chromatic number of trees; David A Kalarkop, Pawaton Kaemawichanurat; 2024; Journal article
Projects
No matching items found.










