{"id":21512,"date":"2022-06-14T11:46:09","date_gmt":"2022-06-14T04:46:09","guid":{"rendered":"https:\/\/www.nectec.or.th\/en\/?p=21512"},"modified":"2025-03-12T15:16:21","modified_gmt":"2025-03-12T08:16:21","slug":"cnwrg-sec","status":"publish","type":"post","link":"https:\/\/www.nectec.or.th\/en\/research\/cnwrg\/cnwrg-sec.html","title":{"rendered":"Information Security Research Team (SEC)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"21512\" class=\"elementor elementor-21512\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-283634c2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"283634c2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2427cbb6\" data-id=\"2427cbb6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d1eb2e6 elementor-widget elementor-widget-text-editor\" data-id=\"d1eb2e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This research team focuses on the research and development of information security technologies by integrating knowledge from various technological fields, known as interdisciplinary, such as Artificial Intelligence, Networking, Cybersecurity, and other related technologies. Our team aims to support the needs of the public sector, citizens, and industries. Furthermore, we prioritize enhancing the security of data and systems in the digital world to protect against threats from attacks and scams, while also supporting cybersecurity and information security measures. As a result, these strategies enhance cyber threat detection and effectively prevent data theft.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6c82dcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6c82dcf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cc9d53f\" data-id=\"cc9d53f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7db7a23 elementor-widget elementor-widget-heading\" data-id=\"7db7a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Vision\u00a0<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7380411 elementor-widget elementor-widget-text-editor\" data-id=\"7380411\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This information security research team is well-known at the national level, dedicated to creating secure and reliable digital systems. The team aims to enhance national cybersecurity and develop innovations to protect against cyber threats and scams.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d45ef28 elementor-widget elementor-widget-heading\" data-id=\"d45ef28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Mission\u00a0<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4903502 elementor-widget elementor-widget-text-editor\" data-id=\"4903502\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Conduct research and develop tools and innovations for effective interdisciplinary technology. This aims to enhance digital system security and support national cybersecurity.<\/li><li>Develop knowledge and skills in information security to support digital transformation.<\/li><li>Establish strong partnerships with the public sector, private sector, and educational institutions to develop secure and sustainable systems.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-709329a elementor-widget elementor-widget-heading\" data-id=\"709329a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Core Technology<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-678677b elementor-widget elementor-widget-text-editor\" data-id=\"678677b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Biometric Security<\/li><li>Network Security<\/li><li>Network Function Virtualization (NFV)<\/li><li>SOC analyst<\/li><li>Privacy Enhancing Technologies<\/li><li>OT\/IT security<\/li><li>Web Application Security<\/li><li>Security Policy and Regulation<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd57790 elementor-widget elementor-widget-heading\" data-id=\"cd57790\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Renown Projects<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc44d97 elementor-widget elementor-widget-text-editor\" data-id=\"bc44d97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>(AtTime<\/strong>) Usable Comprehensive 4-Factor Authentication: Enhancing Secure Time Attendance (<strong>Excellent Research Award<\/strong> in Information Technology and Communication Arts, National Research Award 2025, Honored by NRCT)<\/li><li><strong>Zero-Touch Services<\/strong>: An automated Security Management and Orchestration Platform for Cybersecurity Investigation and Mitigation (<strong>Excellence in Creativity Award<\/strong>: Thailand Cyber Security Product and Service Awards, 2024, Honored by NCSA)<\/li><li><strong>CYBLION<\/strong>: Privacy-Preserving loT Platform by Homomorphic Encryption (<strong>Excellence in Innovation Award<\/strong>.: Thailand Cyber Security Product and Service Awards, 2024, Honored by NCSA)<\/li><li>Biometric Data Anti-Spoofing and Deepfake Detection System<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6d293aa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d293aa\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6d91f92\" data-id=\"6d91f92\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-326ab06 elementor-widget elementor-widget-heading\" data-id=\"326ab06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Members &amp; Expertise\u00a0<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65c7887 elementor-widget elementor-widget-text-editor\" data-id=\"65c7887\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Ekkachan Rattanalerdnusorn<\/strong> : Network Security, Software Security, Security Policy and Standard<\/li><li><strong>Kalika Suksomboon<\/strong> : IoT security, Privacy Enhanching Techmologies, OT\/IT security, SOC analyst, AI\/ML, Photographer<\/li><li><strong>Montida Pattaranantakul<\/strong> : Network Function Virtualization (NFV), Software Defined Networking (SDN), Network Security, Policy-based Network Management, Applied Cryptography<\/li><li><strong>Sasakorn Pichetjamroen<\/strong> : AI-based Video\/Image Processing, Biometric Technologies and Security, AIoT, Mobile Application, System Architecture<\/li><li><strong>Apiwat Chantawibul<\/strong> : Digital Signature, Secure Software Development, Machine Learning, GIS, Program Semantics, Category Theory<\/li><li><strong>Tinthid Jaikla<\/strong> : IoT\/OT Security, Network Security, Web Application Security, Cloud computing<\/li><li><strong>Chayanin Tongphasook<\/strong> : OT\/IT security, Biometric Security<\/li><li><strong>Phithak Thaenkaew<\/strong> : Network Security, Embedded &amp; IoT Security, LPWAN &amp; LoRaWAN Security, Cryptography, Distributed &amp; Parallel Computing, HPC<\/li><li><strong>Parn Sirimanapron<\/strong> : Graphic Design<\/li><li><strong>Kajornsak Piyoungkorn<\/strong> : Network Security, Distributed System, HPC (On leave for PhD study)<\/li><li><strong>Siriboon Chaisawat<\/strong> : Blockchain, Distributed System (On leave for PhD study)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-935c3c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"935c3c4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-598abfa\" data-id=\"598abfa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c1583a1 elementor-widget elementor-widget-heading\" data-id=\"c1583a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Contact<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3335655 elementor-widget elementor-widget-text-editor\" data-id=\"3335655\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"padding-left: 40px;\"><strong>Information Security Research Team (SEC)<br \/><\/strong>Communications and Networks Research Group (CNWRG)\u00a0<br \/>National Electronics and Computer Technology Center<br \/>email : cnwrg-sec[at]nectec.or.th<br \/>Tel: (+66) 02 5646900<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Drawing on expertise in information security and related fields<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[254],"tags":[435,539,523,538],"class_list":["post-21512","post","type-post","status-publish","format-standard","hentry","category-cnwrg","tag-cnwrg","tag-information-security","tag-research-team","tag-security"],"_links":{"self":[{"href":"https:\/\/www.nectec.or.th\/en\/wp-json\/wp\/v2\/posts\/21512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nectec.or.th\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nectec.or.th\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nectec.or.th\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nectec.or.th\/en\/wp-json\/wp\/v2\/comments?post=21512"}],"version-history":[{"count":8,"href":"https:\/\/www.nectec.or.th\/en\/wp-json\/wp\/v2\/posts\/21512\/revisions"}],"predecessor-version":[{"id":22324,"href":"https:\/\/www.nectec.or.th\/en\/wp-json\/wp\/v2\/posts\/21512\/revisions\/22324"}],"wp:attachment":[{"href":"https:\/\/www.nectec.or.th\/en\/wp-json\/wp\/v2\/media?parent=21512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nectec.or.th\/en\/wp-json\/wp\/v2\/categories?post=21512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nectec.or.th\/en\/wp-json\/wp\/v2\/tags?post=21512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}