Effective security requirements analysis: Hazop and use cases T Srivatanakul, JA Clark, F Polack Information Security: 7th International Conference, ISC 2004, Palo Alto, CA …, 2004 | 72 | 2004 |
Challenging formal specifications by mutation: a CSP security example T Srivatanakul, JA Clark, S Stepney, F Polack Tenth Asia-Pacific Software Engineering Conference, 2003., 340-350, 2003 | 47 | 2003 |
Security analysis with deviational techniques T Srivatanakul University of York Department of Computer Science-Publications-YCST 12, 2005 | 39 | 2005 |
Incorporating active learning activities to the design and development of an undergraduate software and web security course T Srivatanakul, F Annansingh Journal of Computers in Education 9 (1), 25-50, 2022 | 24 | 2022 |
Assessing digital literacy skills using a self-administered questionnaire S Komlayut, T Srivatanakul Review of Integrative Business and Economics Research 6 (3), 74, 2017 | 22 | 2017 |
Emerging from the pandemic: instructor reflections and students’ perceptions on an introductory programming course in blended learning T Srivatanakul Education and Information Technologies 28 (5), 5673-5695, 2023 | 13 | 2023 |
Mutation testing for concurrency T Srivatanakul Master's thesis, Department of Computer Science, University of York, UK, 2001 | 9 | 2001 |
Security zonal analysis T Srivatanakul, JA Clark, F Polack REPORT-UNIVERSITY OF YORK DEPARTMENT OF COMPUTER SCIENCE YCS, 2004 | 6 | 2004 |
An analysis and case study of using mobile crowdsourcing for weather forecast verification N Wiwatwattana, K Sangkhatad, T Srivatanakul 2015 6th IEEE International Conference on Software Engineering and Service …, 2015 | 5 | 2015 |
Promoting security mindset through hands-on exercises for computer science undergraduate students T Srivatanakul, T Moore 2021 2nd Information Communication Technologies Conference (ICTC), 343-347, 2021 | 4 | 2021 |
Uses of online survey: A case study in Thailand T Srivatanakul, N Wiwatwattana The Emergence of Digital Libraries–Research and Practices: 16th …, 2014 | 4 | 2014 |
Stressing security requirements: Exploiting the flaw hypothesis method with deviational techniques T Srivatanakul, FAC Polack Symposium on Requirements Engineering for Information Security, 2005 | 2 | 2005 |
Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms-A Case Study with Path Sum Algorithm in Graphs and Binary Trees J Shields, T Srivatanakul Proceedings of 39th International Confer 98, 129-139, 2024 | | 2024 |
An Online Community Site that Incorporates the use of Social Networks Software: A Case of an Open University in Thailand T Srivatanakul Proceedings of 32nd International Conference on 63, 211-220, 2019 | | 2019 |
Deviational Analyses for Validating Regulations on Real Systems. F Polack, T Srivatanakul, T Kelly, JA Clark ReMo2V, 2006 | | 2006 |
Writing Effective Abuse Cases T Srivatanakul, JA Clark, F Polack REPORT-UNIVERSITY OF YORK DEPARTMENT OF COMPUTER SCIENCE YCS, 2004 | | 2004 |
Applying Safety Techniques to Security T Srivatanakul | | |
Making Penetration Testing Work: Adding Rigour to Flaw Hypothesis Method T Srivatanakul, JACF Polack | | |