Follow
Phongphun Kijsanayothin
Phongphun Kijsanayothin
Verified email at nu.ac.th
Title
Cited by
Cited by
Year
Tumor classification ranking from microarray data
R Hewett, P Kijsanayothin
BMC genomics 9, 1-11, 2008
642008
On modeling software defect repair time
R Hewett, P Kijsanayothin
Empirical Software Engineering 14, 165-186, 2009
582009
Cyber-security analysis of smart grid SCADA systems with game models
R Hewett, S Rudrapattana, P Kijsanayothin
Proceedings of the 9th annual cyber and information security research …, 2014
442014
Host-centric model checking for network vulnerability analysis
R Hewett, P Kijsanayothin
2008 Annual Computer Security Applications Conference (ACSAC), 225-234, 2008
432008
Securing smart contracts in blockchain
J Kongmanee, P Kijsanayothin, R Hewett
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
292019
Analytical approach to attack graph analysis for network security
P Kijsanayothin, R Hewett
2010 International Conference on Availability, Reliability and Security, 25-32, 2010
282010
Scalable optimized composition of web services with complexity analysis
R Hewett, P Kijsanayothin, B Nguyen
2009 IEEE International Conference on Web Services, 389-396, 2009
262009
Automated test order generation for software component integration testing
R Hewett, P Kijsanayothin
2009 IEEE/ACM International Conference on Automated Software Engineering …, 2009
222009
Privacy and recovery in composite web service transactions
R Hewett, P Kijsanayothin
International Journal for Infonomics 3 (2), 240-248, 2010
192010
Network security modeling with intelligent and complexity analysis
P Kijsanayothin
162010
On using MapReduce to scale algorithms for Big Data analytics: a case study
P Kijsanayothin, G Chalumporn, R Hewett
Journal of Big Data 6, 1-20, 2019
122019
Security analysis of role-based separation of duty with workflows
R Hewett, P Kijsanayothin, A Thipse
2008 Third International Conference on Availability, Reliability and …, 2008
122008
Smart Grid security: Deriving informed decisions from cyber attack game analysis
R Hewett, S Rudrapattana, P Kijsanayothin
2014 IEEE International Conference on Smart Grid Communications …, 2014
112014
Location contexts in role-based security policy enforcement
R Hewett, P Kijsanayothin
112009
Exploit-based analysis of attack models
P Kijsanayothin, R Hewett
2013 IEEE 12th International Symposium on Network Computing and Applications …, 2013
102013
On securing privacy in composite web service transactions
R Hewett, P Kijsanayothin
2009 International Conference for Internet Technology and Secured …, 2009
82009
Cybersecurity policy verification with declarative programming
R Hewett, P Kijsanayothin, S Bak, M Galbrei
Applied Intelligence 45, 83-95, 2016
72016
Test Order Generation for Efficient Object-oriented Class Integration Testing.
R Hewett, P Kijsanayothin, D Smavatkul
SEKE, 703-708, 2008
62008
A Sub-Linear Scalable MapReduce-based Apriori Algorithm
G Chalumporn, P Kijsanayothin, R Hewett
Proceedings of the 3rd International Conference on Big Data Research, 6-11, 2019
32019
Scalable data integration system using representational state transfer
P MENSIN, P KIJSANAYOTHIN, W SETTHAPUN
Walailak Journal of Science and Technology (WJST) 14 (4), 299-313, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20