Research Publications for Sivadon Chaisiri

Welcome to the University of Waikato research publications search page. This database includes all research publications produced by the University from 1998.

See Also: Research Links | Student Research Theses | Research Commons

Author's Publications

Publications ByCHAISIRI, Sivadon

  Use our Online Phonebook to contact our current staff members.

  • Shute, S., Ko, R. K. L., & Chaisiri, S. (2017). Attribution using keyboard row based behavioural biometrics for handedness recognition. In Proc 16th IEEE International Conference on Trust, Security and Privacy in Computer and Communications (pp. 1131-1138). Sydney, Australia: IEEE. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.363

  • Chase, J., Niyato, D., Wang, P., Chaisiri, S., & Ko, R. (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, PP(99). doi:10.1109/TDSC.2017.2703626

  • Chaisiri, S., & Ko, R. K. L. (2016). From reactionary to proactive security: context-aware security policy management and optimization under uncertainty. In Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 535-543). Tianjin, China: IEEE Computer Society. doi:10.1109/TrustCom.2016.0107

  • Stricot-Tarboton, S., Chaisiri, S., & Ko, R. K. L. (2016). Taxonomy of man-in-the-middle attacks on HTTPS. In Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 527-534). Tianjin, China: IEEE Computer Society. doi:10.1109/TrustCom.2016.0106

  • Garae, J., Ko, R. K. L., & Chaisiri, S. (2016). UVisP: User-centric visualization of data provenance with gestalt principles. In Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 1923-1930). Tianjin, China: IEEE Computer Society. doi:10.1109/TrustCom.2016.0294

  • Sandar, N. M., Chaisiri, S., Yongchareon, S., & Liesaputra, V. (2015). Cloud-based video monitoring framework: An approach based on software-defined networking for addressing scalability problems. In B. Benatallah, A. Bestavros, B. Catania, A. Haller, Y. Manolopoulos, A. Vakali, & Y. Zhang (Eds.), Proc 15th International Workshops on Web Information Systems Engineering Vol. LNCS 9051 (pp. 176-189). Thessaloniki, Greece: Springer. doi:10.1007/978-3-319-20370-6_14

  • Ko, R. K. L., Russello, G., Nelson, R., Pang, S., Cheang, A., Dobbie, G., . . . Holmes, G. (2015). STRATUS: Towards returning data control to cloud users. In G. Wang, A. Zomaya, G. M. Perez, & K. Li (Eds.), Algorithms and Architectures for Parallel Processing: ICA3PP International Workshops and Symposiums Proceedings Vol. LNCS 9532 (pp. 57-70). Zhangjiajie, China: Springer International Publishing. doi:10.1007/978-3-319-27161-3_6

  • Liesaputra, V., Yongchareon, S., & Chaisiri, S. (2015). Efficient process model discovery using maximal pattern mining. In R. H. Motahari-Nezhad, J. Recker, & M. Weidlich (Eds.), Proc 13th International Conference on Business Process Management Vol. LNCS 9253 (pp. 441-456). Innsbruck, Austria: Springer. doi:10.1007/978-3-319-23063-4_29

  • Bany Taha, M., Chaisiri, S., & Ko, R. K. L. (2015). Trusted tamper-evident data provenance. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 646-653). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.430

  • Liesaputra, V., Yongchareon, S., & Chaisiri, S. (2015). A process mining technique using pattern recognition. In Proc 27th International Conference on Advanced Information Systems Engineering Vol. CEUR-WS 1367 (pp. 57-64). Stockholm, Sweden: CEUR Workshop Proceedings. Retrieved from http://ceur-ws.org/Vol-1367/

This page has been reformatted for printing.