Pilastpongs Subsermsri

Work place: School of Information Technology, Sripatum University, Bangkok 10900, Thailand

E-mail: pilastpongs@yahoo.com

Website:

Research Interests: Information Systems, Information Storage Systems, Multimedia Information System, Information Theory

Biography

Dr. Pilastpongs Subsermsri received Ph.D. in Computer Engineering, University of Houston, USA, M.S.EE. in Electrical Engineering, University of Houston, USA, and B.S. EE. in Electrical Engineering, Khonkaen University. He currently is the Director of the Master of Science Program in Computer Information Systems (CIS) at the Information Science Institute of Sripatum University (ISIS), School of Information Technology, Sripatum University, Thailand. His research interests are in the areas of Agricultural IT, IT Management, IT Strategic Planning and e-Logistics. Dr. Pilastpongs Subsermsri has many published articles in these areas.

Author Articles
Security Visualization Analytics Model in Online Social Networks Using Data Mining and Graphbased Structure Algorithms

By Prajit Limsaiprom Prasong Praneetpolgrang Pilastpongs Subsermsri

DOI: https://doi.org/10.5815/ijitcs.2014.08.01, Pub. Date: 8 Jul. 2014

The rise of the Internet accelerates the creation of various large-scale online social networks, which can be described the relationships and activities between human beings. The online social networks relationships in real world are too big to present with useful information to identify the criminal or cyber-attacks. This research proposed new information security analytic model for online social networks, which called Security Visualization Analytics (SVA) Model. SVA Model used the set of algorithms (1) Graph-based Structure algorithm to analyze the key factors of influencing nodes about density, centrality and the cohesive subgroup to identify the influencing nodes of anomaly and attack patterns (2) Supervised Learning with oneR classification algorithm was used to predict new links from such influencing nodes in online social networks on discovering surprising links in the existing ones of influencing nodes, which nodes in online social networks will be linked next from the attacked influencing nodes to monitor the risk. The results showed 42 influencing nodes of anomaly and attack patterns and can be predict 31 new links from such nodes were achieved by SVA Model with the accuracy of confidence level 95.0%. The new proposed model and results illustrated SVA Model was significance analysis. Such understanding can lead to efficient implementation of tools to links prediction in online social networks. They could be applied as a guide to further investigate of social networks behavior to improve the security model and notify the risk, computer viruses or cyber-attacks for online social networks in advance.

[...] Read more.
Visualization of Influencing Nodes in Online Social Networks

By Prajit Limsaiprom Prasong Praneetpolgrang Pilastpongs Subsermsri

DOI: https://doi.org/10.5815/ijcnis.2014.05.02, Pub. Date: 8 Apr. 2014

The rise of the Internet accelerates the creation of various large-scale online social networks. The online social networks have brought considerable attention as an important medium for the information diffusion model, which can be described the relationships and activities among human beings. The online social networks’ relationships in the real world are too big to present with useful information to identify the criminal or cyber attacks. The methodology for information security analysis was proposed with the complementary of Cluster Algorithm and Social Network Analysis, which presented anomaly and cyber attack patterns in online social networks and visualized the influencing nodes of such anomaly and cyber attacks. The closet vertices of influencing nodes could not avoid from the harmfulness in social networking. The new proposed information security analysis methodology and results were significance analysis and could be applied as a guide for further investigate of social network behavior to improve the security model and notify the risk, computer viruses or cyber attacks for online social networks in advance.

[...] Read more.
Other Articles