We have taken the approach formulated to use in analyzing the security of the underlying system, protocol monitor and tell where trains of naresuan University.
We use the method that developed Used in the security analysis of protocols in a prototype system tracking and location of station of Naresuan University