Rattikorn Hewett

Orcid: 0000-0002-9021-7777

According to our database1, Rattikorn Hewett authored at least 95 papers between 1989 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Data privacy with heuristic anonymisation.
Int. J. Inf. Comput. Secur., 2023

On Detecting Crypto Ransomware Attacks: Can Simple Strategies be Effective?
Proceedings of the 6th International Conference on Information and Computer Technologies, 2023

2022
Discovering Opioid Use Patterns From Social Media for Relapse Prevention.
Computer, 2022

On Developing Sustainable Deep Learning Applications Using Pre-calculating Energy Usage.
Proceedings of the Smart Cities, Green Technologies, and Intelligent Transport Systems, 2022

Energy-Aware Deep Learning for Green Cyber-Physical Systems.
Proceedings of the 11th International Conference on Smart Cities and Green ICT Systems, 2022

On Using Deep Learning for Business Analytics: At what cost?
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

On Controlling Drones for Disaster Relief.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

Anonymity-driven Measures for Privacy.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

2021
Do Warning Message Design Recommendations Address Why Non-Experts Do Not Protect Themselves from Cybersecurity Threats? A Review.
Int. J. Hum. Comput. Interact., 2021

Analytics on Anonymity for Privacy Retention in Smart Health Data.
Future Internet, 2021

NetScatter: Visual analytics of multivariate time series with a hybrid of dynamic and static variable relationships.
Proceedings of the 14th IEEE Pacific Visualization Symposium, 2021

2020
Link Discovery Attacks in Software-Defined Networks: Topology Poisoning and Impact Analysis.
J. Commun., 2020

Real-Time Tweet Analytics Using Hybrid Hashtags on Twitter Big Data Streams.
Inf., 2020

Detecting host location attacks in SDN-based networks.
Proceedings of the 29th Wireless and Optical Communications Conference, 2020

Provenance Location-based Authentication in Cloud Computing.
Proceedings of the IAIT 2020: The 11th International Conference on Advances in Information Technology, 2020

Visual Features for Multivariate Time Series.
Proceedings of the IAIT 2020: The 11th International Conference on Advances in Information Technology, 2020

Health Data Analytics with an Opportunistic Big Data Algorithm.
Proceedings of the IAIT 2020: The 11th International Conference on Advances in Information Technology, 2020

Privacy Protection in Smart Health.
Proceedings of the IAIT 2020: The 11th International Conference on Advances in Information Technology, 2020

Congnostics: Visual Features for Doubly Time Series Plots.
Proceedings of the 11th International EuroVis Workshop on Visual Analytics, 2020

2019
On using MapReduce to scale algorithms for Big Data analytics: a case study.
J. Big Data, 2019

Securing Smart Contracts in Blockchain.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019

Assessing Reliability of Big Data Stream for Smart City.
Proceedings of the 3rd International Conference on Big Data Research, 2019

Adaptive Normalization in Streaming Data.
Proceedings of the 3rd International Conference on Big Data Research, 2019

A Sub-Linear Scalable MapReduce-based Apriori Algorithm.
Proceedings of the 3rd International Conference on Big Data Research, 2019

SDN-based edge computing security: detecting and mitigating flow rule attacks.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

HackerNets: Visualizing Media Conversations on Internet of Things, Big Data, and Cybersecurity.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
The Sounds of Cyber Threats.
CoRR, 2018

Towards Prediction of Security Attacks on Software Defined Networks: A Big Data Analytic Approach.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Predicting customer behaviors on energy consumption: Why past usage data are not enough?
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Unleashing the Power of Hashtags in Tweet Analytics with Distributed Framework on Apache Storm.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Smart and Connected Water Resource Management Via Social Media and Community Engagement.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Towards Visualizing Big Data with Large-Scale Edge Constraint Graph Drawing.
Big Data Res., 2017

Alleviating eavesdropping attacks in software-defined networking data plane.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

Harnessing the power of hashtags in tweet analytics.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Cybersecurity policy verification with declarative programming.
Appl. Intell., 2016

Sonifying Internet Security Threats.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Ranking Intrusion Likelihoods with Exploitability of Network Vulnerabilities in a Large-Scale Attack Model.
Int. J. Netw. Secur., 2015

2014
Smart Grid security: Deriving informed decisions from cyber attack game analysis.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Cyber-security analysis of smart grid SCADA systems with game models.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
Cyberbulling and game models (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Exploit-based Analysis of Attack Models.
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013

Securing system controllers in critical infrastructures.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
Program Spectra Analysis with Theory of Evidence.
Adv. Softw. Eng., 2012

Protecting Advertisers Against Click Frauds.
Proceedings of the International Conference on IT Convergence and Security, 2012

2011
Mining software defect data to support software testing management.
Appl. Intell., 2011

Toward identification of key breakers in social cyber-physical networks.
Proceedings of the IEEE International Conference on Systems, 2011

Application Runtime Framework for Model-Driven Development.
Proceedings of the Software Engineering, Business Continuity, and Education, 2011

2010
Analytical Approach to Attack Graph Analysis for Network Security.
Proceedings of the ARES 2010, 2010

2009
On modeling software defect repair time.
Empir. Softw. Eng., 2009

Efficient Optimized Composition of Semantic Web Services.
Proceedings of the IEEE International Conference on Systems, 2009

Automated Test Order Generation for Software Component Integration Testing.
Proceedings of the ASE 2009, 2009

Scalable Optimized Composition of Web Services with Complexity Analysis.
Proceedings of the IEEE International Conference on Web Services, 2009

On securing privacy in composite web service transactions.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Location Contexts in Role-based Security Policy Enforcement.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Authorization constraint enforcement for information system security.
Proceedings of the IEEE International Conference on Systems, 2008

Test Order Generation for Efficient Object-oriented Class Integration Testing.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

Automated Negotiations in Web Service Procurement.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

Host-Centric Model Checking for Network Vulnerability Analysis.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

Security Analysis of Role-based Separation of Duty with Workflows.
Proceedings of the The Third International Conference on Availability, 2008

2007
Security Risk Analysis in Web Application Design.
Proceedings of the WEBIST 2007, 2007

Security and Business Risks from Early Design of Web-Based Systems.
Proceedings of the Web Information Systems and Technologies, 2007

Building Business Considerations into Enterprise Application Designs.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007

Software Tradeoff Assistant: An Integrated Framework for Analytical Decision Making and Tradeoffs in Software Development.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007

Predicting Order of Likelihood of Defective Software Modules.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007

2006
Software Defect Data and Predictability for Testing Schedules.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

Alternative Approach to Utilize Software Defect Reports.
Proceedings of the 15th International Conference on Software Engineering and Data Engineering (SEDE-2006), 2006

2005
Assessment of software risks with model-based reasoning.
Proceedings of the IEEE International Conference on Systems, 2005

A Risk Assessment Model of Embedded Software Systems.
Proceedings of the 29th Annual IEEE / NASA Software Engineering Workshop (SEW-29 2005), 2005

Learning from software reuse experience.
Proceedings of the 2005 International Symposium on Empirical Software Engineering (ISESE 2005), 2005

2004
Model extraction for fault isolation.
Proceedings of the IEEE International Conference on Systems, 2004

Decision making using incomplete data.
Proceedings of the IEEE International Conference on Systems, 2004

2003
Analysis of Mutations in the COLIA1 Gene with Second-Order Rule Induction.
Int. J. Pattern Recognit. Artif. Intell., 2003

Restructuring decision tables for elucidation of knowledge.
Data Knowl. Eng., 2003

Data Mining for Generating Predictive Models of Local Hydrology.
Appl. Intell., 2003

Extending Acquisition of High Quality Customer Level Requirements.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003

2002
Knowledge Discovery with Second-Order Relations.
Knowl. Inf. Syst., 2002

The Power of Second-Order Decision Tables.
Proceedings of the Second SIAM International Conference on Data Mining, 2002

Compression-Based Induction and Genome Data.
Proceedings of the Fifteenth International Florida Artificial Intelligence Research Society Conference, 2002

2001
From climate history to prediction of regional water flows with machine learning.
Proceedings of the IEEE International Conference on Systems, 2001

2000
Prediction of lake inflows with neural networks.
Proceedings of the IEEE International Conference on Systems, 2000

XPorM: A Collaborative Knowledge-Based Project Management Tool.
Proceedings of the Intelligent Problem Solving, 2000

1999
A Relational Approach for Learning Minimal Rules from Examples.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999

1997
Efficiency Mechanisms for a Class of Blackboard Systems.
Int. J. Artif. Intell. Tools, 1997

1996
Using programming expertise for controlling software synthesis.
J. Exp. Theor. Artif. Intell., 1996

1994
A knowledge-based framework for automated software synthesis.
Autom. Softw. Eng., 1994

Mechanisms for Efficiency in Blackboard Systems.
Proceedings of the 12th National Conference on Artificial Intelligence, Seattle, WA, USA, July 31, 1994

1992
Guardian: A prototype intelligent agent for intensive-care monitoring.
Artif. Intell. Medicine, 1992

Efficiency in Pure Blackboard Systems.
Proceedings of the Fourth International Conference on Tools with Artificial Intelligence, 1992

Consistent Linear Speedup in Parallel Alpha-Beta Search.
Proceedings of the Computing and Information, 1992

Aggregation in Model-Based Reasoning Using Prime Models: A Preliminary Report.
Proceedings of the Computing and Information, 1992

1991
A Modeling Technique for Generating Causal Explanations of Physical Systems.
Proceedings of the Advances in Computing and Information, 1991

Representing and Reasoning about Physical Systems Using Prime Models.
Proceedings of the Principles of Semantic Networks, 1991

1989
Comparisons Between Some Pumping Conditions for Context-Free Languages.
Math. Syst. Theory, 1989

Intelligent Monitoring and Control.
Proceedings of the 11th International Joint Conference on Artificial Intelligence. Detroit, 1989

Distributing Intelligence within an Individual.
Proceedings of the Distributed Artificial Intelligence, 1989


  Loading...