Tumor classification ranking from microarray data R Hewett, P Kijsanayothin BMC genomics 9, 1-11, 2008 | 64 | 2008 |
On modeling software defect repair time R Hewett, P Kijsanayothin Empirical Software Engineering 14, 165-186, 2009 | 58 | 2009 |
Cyber-security analysis of smart grid SCADA systems with game models R Hewett, S Rudrapattana, P Kijsanayothin Proceedings of the 9th annual cyber and information security research …, 2014 | 44 | 2014 |
Host-centric model checking for network vulnerability analysis R Hewett, P Kijsanayothin 2008 Annual Computer Security Applications Conference (ACSAC), 225-234, 2008 | 43 | 2008 |
Securing smart contracts in blockchain J Kongmanee, P Kijsanayothin, R Hewett 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 29 | 2019 |
Analytical approach to attack graph analysis for network security P Kijsanayothin, R Hewett 2010 International Conference on Availability, Reliability and Security, 25-32, 2010 | 28 | 2010 |
Scalable optimized composition of web services with complexity analysis R Hewett, P Kijsanayothin, B Nguyen 2009 IEEE International Conference on Web Services, 389-396, 2009 | 26 | 2009 |
Automated test order generation for software component integration testing R Hewett, P Kijsanayothin 2009 IEEE/ACM International Conference on Automated Software Engineering …, 2009 | 22 | 2009 |
Privacy and recovery in composite web service transactions R Hewett, P Kijsanayothin International Journal for Infonomics 3 (2), 240-248, 2010 | 19 | 2010 |
Network security modeling with intelligent and complexity analysis P Kijsanayothin | 16 | 2010 |
On using MapReduce to scale algorithms for Big Data analytics: a case study P Kijsanayothin, G Chalumporn, R Hewett Journal of Big Data 6, 1-20, 2019 | 12 | 2019 |
Security analysis of role-based separation of duty with workflows R Hewett, P Kijsanayothin, A Thipse 2008 Third International Conference on Availability, Reliability and …, 2008 | 12 | 2008 |
Smart Grid security: Deriving informed decisions from cyber attack game analysis R Hewett, S Rudrapattana, P Kijsanayothin 2014 IEEE International Conference on Smart Grid Communications …, 2014 | 11 | 2014 |
Location contexts in role-based security policy enforcement R Hewett, P Kijsanayothin | 11 | 2009 |
Exploit-based analysis of attack models P Kijsanayothin, R Hewett 2013 IEEE 12th International Symposium on Network Computing and Applications …, 2013 | 10 | 2013 |
On securing privacy in composite web service transactions R Hewett, P Kijsanayothin 2009 International Conference for Internet Technology and Secured …, 2009 | 8 | 2009 |
Cybersecurity policy verification with declarative programming R Hewett, P Kijsanayothin, S Bak, M Galbrei Applied Intelligence 45, 83-95, 2016 | 7 | 2016 |
Test Order Generation for Efficient Object-oriented Class Integration Testing. R Hewett, P Kijsanayothin, D Smavatkul SEKE, 703-708, 2008 | 6 | 2008 |
A Sub-Linear Scalable MapReduce-based Apriori Algorithm G Chalumporn, P Kijsanayothin, R Hewett Proceedings of the 3rd International Conference on Big Data Research, 6-11, 2019 | 3 | 2019 |
Scalable data integration system using representational state transfer P MENSIN, P KIJSANAYOTHIN, W SETTHAPUN Walailak Journal of Science and Technology (WJST) 14 (4), 299-313, 2017 | 3 | 2017 |