Phongphun Kijsanayothin

According to our database1, Phongphun Kijsanayothin authored at least 23 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
On using MapReduce to scale algorithms for Big Data analytics: a case study.
J. Big Data, 2019

Securing Smart Contracts in Blockchain.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019

A Sub-Linear Scalable MapReduce-based Apriori Algorithm.
Proceedings of the 3rd International Conference on Big Data Research, 2019

2016
Cybersecurity policy verification with declarative programming.
Appl. Intell., 2016

2015
Ranking Intrusion Likelihoods with Exploitability of Network Vulnerabilities in a Large-Scale Attack Model.
Int. J. Netw. Secur., 2015

2014
Smart Grid security: Deriving informed decisions from cyber attack game analysis.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Cyber-security analysis of smart grid SCADA systems with game models.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
Exploit-based Analysis of Attack Models.
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013

Securing system controllers in critical infrastructures.
Proceedings of the Cyber Security and Information Intelligence, 2013

2010
Network security modeling with intelligent and complexity analysis.
PhD thesis, 2010

Analytical Approach to Attack Graph Analysis for Network Security.
Proceedings of the ARES 2010, 2010

2009
On modeling software defect repair time.
Empir. Softw. Eng., 2009

Efficient Optimized Composition of Semantic Web Services.
Proceedings of the IEEE International Conference on Systems, 2009

Automated Test Order Generation for Software Component Integration Testing.
Proceedings of the ASE 2009, 2009

Scalable Optimized Composition of Web Services with Complexity Analysis.
Proceedings of the IEEE International Conference on Web Services, 2009

On securing privacy in composite web service transactions.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Location Contexts in Role-based Security Policy Enforcement.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Authorization constraint enforcement for information system security.
Proceedings of the IEEE International Conference on Systems, 2008

Test Order Generation for Efficient Object-oriented Class Integration Testing.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

Host-Centric Model Checking for Network Vulnerability Analysis.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

Security Analysis of Role-based Separation of Duty with Workflows.
Proceedings of the The Third International Conference on Availability, 2008

2007
Security Risk Analysis in Web Application Design.
Proceedings of the WEBIST 2007, 2007

Predicting Order of Likelihood of Defective Software Modules.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007


  Loading...