Research Publications for Sivadon Chaisiri

Welcome to the University of Waikato research publications search page. This database includes all research publications produced by the University from 1998.

See Also: Research Links | Student Research Theses | Research Commons

Author's Publications

Publications ByCHAISIRI, Sivadon

  Use our Online Phonebook to contact our current staff members.

  • Shute, S., Ko, R. K. L., & Chaisiri, S. (2017). Attribution using keyboard row based behavioural biometrics for handedness recognition. In Proc 16th IEEE International Conference on Trust, Security and Privacy in Computer and Communications (pp. 1131-1138). Sydney, Australia: IEEE. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.363

  • Chase, J., Niyato, D., Wang, P., Chaisiri, S., & Ko, R. (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, PP(99). doi:10.1109/TDSC.2017.2703626

  • Kumar, V., Chaisiri, S., & Ko, R. (2017). Data security in cloud computing. V. Kumar, S. Chaisiri, & R. Ko (Eds.), Institution of Engineering and Technology.

  • Chaisiri, S., & Ko, R. K. L. (2016). From reactionary to proactive security: context-aware security policy management and optimization under uncertainty. In Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 535-543). Tianjin, China: IEEE Computer Society. doi:10.1109/TrustCom.2016.0107

  • Garae, J., Ko, R. K. L., & Chaisiri, S. (2016). UVisP: User-centric visualization of data provenance with gestalt principles. In Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 1923-1930). Tianjin, China: IEEE Computer Society. doi:10.1109/TrustCom.2016.0294

  • Stricot-Tarboton, S., Chaisiri, S., & Ko, R. K. L. (2016). Taxonomy of man-in-the-middle attacks on HTTPS. In Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 527-534). Tianjin, China: IEEE Computer Society. doi:10.1109/TrustCom.2016.0106

  • Liesaputra, V., Yongchareon, S., & Chaisiri, S. (2015). Efficient process model discovery using maximal pattern mining. In R. H. Motahari-Nezhad, J. Recker, & M. Weidlich (Eds.), Proc 13th International Conference on Business Process Management Vol. LNCS 9253 (pp. 441-456). Innsbruck, Austria: Springer. doi:10.1007/978-3-319-23063-4_29

  • Sandar, N. M., Chaisiri, S., Yongchareon, S., & Liesaputra, V. (2015). Cloud-based video monitoring framework: An approach based on software-defined networking for addressing scalability problems. In B. Benatallah, A. Bestavros, B. Catania, A. Haller, Y. Manolopoulos, A. Vakali, & Y. Zhang (Eds.), Proc 15th International Workshops on Web Information Systems Engineering Vol. LNCS 9051 (pp. 176-189). Thessaloniki, Greece: Springer. doi:10.1007/978-3-319-20370-6_14

  • Chase, J., Niyato, D., & Chaisiri, S. (2015). Bring-Your-Own-Application (BYOA): Optimal stochastic application migration in mobile cloud computing. In 2015 IEEE Global Communications Conference. San Diego, CA, USA: IEEE. doi:10.1109/GLOCOM.2015.7417575

  • Sandar, N. M., Myint, L. M. M., & Chaisiri, S. (2015). An optimization approach to capacity planning of aggregators and resource provisioning in cloud providers for meteorological sensor network. In J. Duangsuwan, S. Vanichayobon, & L. Preechaveerakul (Eds.), 12th International Joint Conference on Computer Science and Software Engineering (JCSSE) (pp. 195-200). Songkhla, Thailand: IEEE. doi:10.1109/JCSSE.2015.7219795

This page has been reformatted for printing.