default search action
Rattikorn Hewett
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j22]Sevgi Arca, Rattikorn Hewett:
Data privacy with heuristic anonymisation. Int. J. Inf. Comput. Secur. 20(1/2): 104-132 (2023) - [c71]Phornsawan Roemsri, Supadchaya Puangpontip, Rattikorn Hewett:
On Detecting Crypto Ransomware Attacks: Can Simple Strategies be Effective? ICICT 2023: 138-143 - 2022
- [j21]Zhou Yang, Spencer Bradshaw, Rattikorn Hewett, Fang Jin:
Discovering Opioid Use Patterns From Social Media for Relapse Prevention. Computer 55(2): 23-33 (2022) - [c70]Sevgi Arca, Rattikorn Hewett:
Anonymity-driven Measures for Privacy. CSP 2022: 6-10 - [c69]Rattikorn Hewett, Supadchaya Puangpontip:
On Controlling Drones for Disaster Relief. KES 2022: 3703-3712 - [c68]Supadchaya Puangpontip, Rattikorn Hewett:
On Using Deep Learning for Business Analytics: At what cost? KES 2022: 3738-3747 - [c67]Supadchaya Puangpontip, Rattikorn Hewett:
On Developing Sustainable Deep Learning Applications Using Pre-calculating Energy Usage. SMARTGREENS/VEHITS (Selected Papers) 2022: 22-46 - [c66]Supadchaya Puangpontip, Rattikorn Hewett:
Energy-Aware Deep Learning for Green Cyber-Physical Systems. SMARTGREENS 2022: 32-43 - 2021
- [j20]Sevgi Arca, Rattikorn Hewett:
Analytics on Anonymity for Privacy Retention in Smart Health Data. Future Internet 13(11): 274 (2021) - [j19]Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Rattikorn Hewett:
Do Warning Message Design Recommendations Address Why Non-Experts Do Not Protect Themselves from Cybersecurity Threats? A Review. Int. J. Hum. Comput. Interact. 37(18): 1709-1719 (2021) - [c65]Bao Dien Quoc Nguyen, Rattikorn Hewett, Tommy Dang:
NetScatter: Visual analytics of multivariate time series with a hybrid of dynamic and static variable relationships. PacificVis 2021: 52-60 - [c64]Bao Dien Quoc Nguyen, Rattikorn Hewett, Tommy Dang:
Multi-resolution Analysis for Vector Plots of Time Series Data. EuroVA@EuroVis 2021: 55-59 - 2020
- [j18]Vibhuti Gupta, Rattikorn Hewett:
Real-Time Tweet Analytics Using Hybrid Hashtags on Twitter Big Data Streams. Inf. 11(7): 341 (2020) - [j17]Sonali Sen Baidya, Rattikorn Hewett:
Link Discovery Attacks in Software-Defined Networks: Topology Poisoning and Impact Analysis. J. Commun. 15(8): 596-606 (2020) - [c63]Bao Dien Quoc Nguyen, Rattikorn Hewett, Tommy Dang:
Congnostics: Visual Features for Doubly Time Series Plots. EuroVA@Eurographics/EuroVis 2020: 49-53 - [c62]Sevgi Arca, Rattikorn Hewett:
Privacy Protection in Smart Health. IAIT 2020: 15:1-15:8 - [c61]Bao Dien Quoc Nguyen, Rattikorn Hewett, Tommy Dang:
Visual Features for Multivariate Time Series. IAIT 2020: 16:1-16:8 - [c60]Gantaphon Chalumporn, Rattikorn Hewett:
Health Data Analytics with an Opportunistic Big Data Algorithm. IAIT 2020: 23:1-23:9 - [c59]Phornsawan Roemsri, Rattikorn Hewett:
Provenance Location-based Authentication in Cloud Computing. IAIT 2020: 24:1-24:8 - [c58]Sonali Sen Baidya, Rattikorn Hewett:
Detecting host location attacks in SDN-based networks. WOCC 2020: 1-6
2010 – 2019
- 2019
- [j16]Phongphun Kijsanayothin, Gantaphon Chalumporn, Rattikorn Hewett:
On using MapReduce to scale algorithms for Big Data analytics: a case study. J. Big Data 6: 105 (2019) - [c57]Hao Van, Huyen N. Nguyen, Rattikorn Hewett, Tommy Dang:
HackerNets: Visualizing Media Conversations on Internet of Things, Big Data, and Cybersecurity. IEEE BigData 2019: 3293-3302 - [c56]Sonali Sen Baidya, Rattikorn Hewett:
SDN-based edge computing security: detecting and mitigating flow rule attacks. SEC 2019: 364-370 - [c55]Gantaphon Chalumporn, Phongphun Kijsanayothin, Rattikorn Hewett:
A Sub-Linear Scalable MapReduce-based Apriori Algorithm. ICBDR 2019: 6-11 - [c54]Vibhuti Gupta, Rattikorn Hewett:
Adaptive Normalization in Streaming Data. ICBDR 2019: 12-17 - [c53]Supadchaya Puangpontip, Rattikorn Hewett:
Assessing Reliability of Big Data Stream for Smart City. ICBDR 2019: 18-23 - [c52]Jaturong Kongmanee, Phongphun Kijsanayothin, Rattikorn Hewett:
Securing Smart Contracts in Blockchain. ASE Workshops 2019: 69-76 - [i4]Vibhuti Gupta, Rattikorn Hewett:
Adaptive Normalization in Streaming Data. CoRR abs/1910.07696 (2019) - [i3]Zhou Yang, Spencer Bradshaw, Rattikorn Hewett, Fang Jin:
Discovering Opioid Use Patterns from Social Media for Relapse Prevention. CoRR abs/1912.01122 (2019) - 2018
- [c51]Long Hoang Nguyen, Rattikorn Hewett, Akbar Siami Namin, Nicholas Alvarez, Cristina Bradatan, Fang Jin:
Smart and Connected Water Resource Management Via Social Media and Community Engagement. ASONAM 2018: 613-616 - [c50]Vibhuti Gupta, Rattikorn Hewett:
Unleashing the Power of Hashtags in Tweet Analytics with Distributed Framework on Apache Storm. IEEE BigData 2018: 4554-4558 - [c49]Supadchaya Puangpontip, Rattikorn Hewett:
Predicting customer behaviors on energy consumption: Why past usage data are not enough? IEEE BigData 2018: 4577-4581 - [c48]Emre Unal, Sonali Sen Baidya, Rattikorn Hewett:
Towards Prediction of Security Attacks on Software Defined Networks: A Big Data Analytic Approach. IEEE BigData 2018: 4582-4588 - [i2]Akbar Siami Namin, Rattikorn Hewett, Keith S. Jones, Rona L. Pogrund:
The Sounds of Cyber Threats. CoRR abs/1805.08272 (2018) - [i1]Vibhuti Gupta, Rattikorn Hewett:
Unleashing the Power of Hashtags in Tweet Analytics with Distributed Framework on Apache Storm. CoRR abs/1812.01141 (2018) - 2017
- [j15]Ariyawat Chonbodeechalermroong, Rattikorn Hewett:
Towards Visualizing Big Data with Large-Scale Edge Constraint Graph Drawing. Big Data Res. 10: 21-32 (2017) - [c47]Vibhuti Gupta, Rattikorn Hewett:
Harnessing the power of hashtags in tweet analytics. IEEE BigData 2017: 2390-2395 - [c46]Ahmed O. Aseeri, Nuttapong Netjinda, Rattikorn Hewett:
Alleviating eavesdropping attacks in software-defined networking data plane. CISRC 2017: 1:1-1:8 - 2016
- [j14]Rattikorn Hewett, Phongphun Kijsanayothin, Stephanie Bak, Marry Galbrei:
Cybersecurity policy verification with declarative programming. Appl. Intell. 45(1): 83-95 (2016) - [c45]Akbar Siami Namin, Rattikorn Hewett, Keith S. Jones, Rona L. Pogrund:
Sonifying Internet Security Threats. CHI Extended Abstracts 2016: 2306-2313 - 2015
- [j13]Rattikorn Hewett, Phongphun Kijsanayothin:
Ranking Intrusion Likelihoods with Exploitability of Network Vulnerabilities in a Large-Scale Attack Model. Int. J. Netw. Secur. 17(4): 383-394 (2015) - 2014
- [c44]Rattikorn Hewett, Sudeeptha Rudrapattana, Phongphun Kijsanayothin:
Cyber-security analysis of smart grid SCADA systems with game models. CISR 2014: 109-112 - [c43]Rattikorn Hewett, Sudeeptha Rudrapattana, Phongphun Kijsanayothin:
Smart Grid security: Deriving informed decisions from cyber attack game analysis. SmartGridComm 2014: 946-951 - 2013
- [c42]Rattikorn Hewett, Phongphun Kijsanayothin:
Securing system controllers in critical infrastructures. CSIIRW 2013: 29 - [c41]Phongphun Kijsanayothin, Rattikorn Hewett:
Exploit-based Analysis of Attack Models. NCA 2013: 183-186 - [c40]Lila Ghemri, Rattikorn Hewett, Colleen Livingston:
Cyberbulling and game models (abstract only). SIGCSE 2013: 732 - 2012
- [j12]Rattikorn Hewett:
Program Spectra Analysis with Theory of Evidence. Adv. Softw. Eng. 2012: 642983:1-642983:12 (2012) - [c39]Rattikorn Hewett, Abhishek Agarwal:
Protecting Advertisers Against Click Frauds. ICITCS 2012: 61-69 - 2011
- [j11]Rattikorn Hewett:
Mining software defect data to support software testing management. Appl. Intell. 34(2): 245-257 (2011) - [c38]Nacha Chondamrongkul, Rattikorn Hewett:
Application Runtime Framework for Model-Driven Development. FGIT-ASEA/DRBC/EL 2011: 256-264 - [c37]Rattikorn Hewett:
Toward identification of key breakers in social cyber-physical networks. SMC 2011: 2731-2736 - 2010
- [c36]Phongphun Kijsanayothin, Rattikorn Hewett:
Analytical Approach to Attack Graph Analysis for Network Security. ARES 2010: 25-32
2000 – 2009
- 2009
- [j10]Rattikorn Hewett, Phongphun Kijsanayothin:
On modeling software defect repair time. Empir. Softw. Eng. 14(2): 165-186 (2009) - [c35]Rattikorn Hewett, Phongphun Kijsanayothin:
Location Contexts in Role-based Security Policy Enforcement. Security and Management 2009: 404-410 - [c34]Rattikorn Hewett, Phongphun Kijsanayothin:
On securing privacy in composite web service transactions. ICITST 2009: 1-6 - [c33]Rattikorn Hewett, Phongphun Kijsanayothin, Bach Tuong Nguyen:
Scalable Optimized Composition of Web Services with Complexity Analysis. ICWS 2009: 389-396 - [c32]Rattikorn Hewett, Phongphun Kijsanayothin:
Automated Test Order Generation for Software Component Integration Testing. ASE 2009: 211-220 - [c31]Rattikorn Hewett, Bach Tuong Nguyen, Phongphun Kijsanayothin:
Efficient Optimized Composition of Semantic Web Services. SMC 2009: 4065-4070 - 2008
- [c30]Rattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse:
Security Analysis of Role-based Separation of Duty with Workflows. ARES 2008: 765-770 - [c29]Rattikorn Hewett, Phongphun Kijsanayothin:
Host-Centric Model Checking for Network Vulnerability Analysis. ACSAC 2008: 225-234 - [c28]Vikram Patankar, Rattikorn Hewett:
Automated Negotiations in Web Service Procurement. ICIW 2008: 620-625 - [c27]Rattikorn Hewett, Phongphun Kijsanayothin, Darunee Smavatkul:
Test Order Generation for Efficient Object-oriented Class Integration Testing. SEKE 2008: 703-708 - [c26]Rattikorn Hewett, Phongphun Kijsanayothin:
Authorization constraint enforcement for information system security. SMC 2008: 3502-3507 - 2007
- [c25]Rattikorn Hewett, Phongphun Kijsanayothin, Alta van der Merwe:
Predicting Order of Likelihood of Defective Software Modules. SEKE 2007: 93-98 - [c24]Rattikorn Hewett, Vikram Patankar:
Software Tradeoff Assistant: An Integrated Framework for Analytical Decision Making and Tradeoffs in Software Development. SEKE 2007: 450-455 - [c23]Rattikorn Hewett, Aashay Thipse:
Building Business Considerations into Enterprise Application Designs. SEKE 2007: 513-518 - [c22]Rattikorn Hewett, Phongphun Kijsanayothin, Meinhard Peters:
Security Risk Analysis in Web Application Design. WEBIST (1) 2007: 28-35 - [c21]Rattikorn Hewett:
Security and Business Risks from Early Design of Web-Based Systems. WEBIST (Selected Papers) 2007: 45-59 - 2006
- [c20]Rattikorn Hewett, Aniruddha Kulkarni:
Alternative Approach to Utilize Software Defect Reports. SEDE 2006: 57-62 - [c19]Rattikorn Hewett, Aniruddha Kulkarni, Catherine Stringfellow, Anneliese Amschler Andrews:
Software Defect Data and Predictability for Testing Schedules. SEKE 2006: 499-504 - 2005
- [c18]Rattikorn Hewett:
Learning from software reuse experience. ISESE 2005: 386-395 - [c17]Rattikorn Hewett, Remzi Seker:
A Risk Assessment Model of Embedded Software Systems. SEW 2005: 142-149 - [c16]Rattikorn Hewett:
Assessment of software risks with model-based reasoning. SMC 2005: 3238-3243 - 2004
- [c15]Rattikorn Hewett:
Decision making using incomplete data. SMC (1) 2004: 182-187 - [c14]Rattikorn Hewett:
Model extraction for fault isolation. SMC (1) 2004: 218-223 - 2003
- [j9]Rattikorn Hewett:
Data Mining for Generating Predictive Models of Local Hydrology. Appl. Intell. 19(3): 157-170 (2003) - [j8]Rattikorn Hewett, John H. Leuchner:
Restructuring decision tables for elucidation of knowledge. Data Knowl. Eng. 46(3): 271-290 (2003) - [j7]Rattikorn Hewett, John H. Leuchner, Sean D. Mooney, Teri E. Klein:
Analysis of Mutations in the COLIA1 Gene with Second-Order Rule Induction. Int. J. Pattern Recognit. Artif. Intell. 17(5): 721-740 (2003) - [c13]Rattikorn Hewett, John H. Leuchner, Ken Ford, Daniel E. Cooke:
Extending Acquisition of High Quality Customer Level Requirements. Software Engineering Research and Practice 2003: 407-413 - 2002
- [j6]Rattikorn Hewett, John H. Leuchner:
Knowledge Discovery with Second-Order Relations. Knowl. Inf. Syst. 4(4): 413-439 (2002) - [c12]Rattikorn Hewett, John H. Leuchner, Choh Man Teng, Sean D. Mooney, Teri E. Klein:
Compression-Based Induction and Genome Data. FLAIRS 2002: 344-348 - [c11]Rattikorn Hewett, John H. Leuchner:
The Power of Second-Order Decision Tables. SDM 2002: 384-399 - 2001
- [c10]Rattikorn Hewett, John H. Leuchner, Marco Carvalho:
From climate history to prediction of regional water flows with machine learning. SMC 2001: 292-297 - 2000
- [c9]Rattikorn Hewett, John W. Coffey:
XPorM: A Collaborative Knowledge-Based Project Management Tool. IEA/AIE 2000: 406-413 - [c8]John F. Kolen, Rattikorn Hewett:
Prediction of lake inflows with neural networks. SMC 2000: 572-576
1990 – 1999
- 1999
- [c7]David Collodi, John H. Leuchner, Rattikorn Hewett:
A Relational Approach for Learning Minimal Rules from Examples. Applied Informatics 1999: 141-144 - 1997
- [j5]Rattikorn Hewett, Micheal Hewett:
Efficiency Mechanisms for a Class of Blackboard Systems. Int. J. Artif. Intell. Tools 6(1): 97-125 (1997) - 1996
- [j4]Rattikorn Hewett:
Using programming expertise for controlling software synthesis. J. Exp. Theor. Artif. Intell. 8(3-4): 293-318 (1996) - 1994
- [j3]Rattikorn Hewett, Micheal Hewett:
A knowledge-based framework for automated software synthesis. Autom. Softw. Eng. 1(3-4): 281-314 (1994) - [c6]Micheal Hewett, Rattikorn Hewett:
Mechanisms for Efficiency in Blackboard Systems. AAAI 1994: 465-470 - 1992
- [j2]Barbara Hayes-Roth, Richard Washington, David Ash, Rattikorn Hewett, Anne Collinot, Ángel Viña, Adam Seiver:
Guardian: A prototype intelligent agent for intensive-care monitoring. Artif. Intell. Medicine 4(2): 165-185 (1992) - [c5]Rattikorn Hewett, Krishnamurthy Ganesan:
Consistent Linear Speedup in Parallel Alpha-Beta Search. ICCI 1992: 237-240 - [c4]Rattikorn Hewett:
Aggregation in Model-Based Reasoning Using Prime Models: A Preliminary Report. ICCI 1992: 292-295 - [c3]Rattikorn Hewett, Micheal Hewett:
Efficiency in Pure Blackboard Systems. ICTAI 1992: 65-72 - 1991
- [c2]Rattikorn Hewett:
A Modeling Technique for Generating Causal Explanations of Physical Systems. ICCI 1991: 657-668 - [p2]Rattikorn Hewett, Barbara Hayes-Roth:
Representing and Reasoning about Physical Systems Using Prime Models. Principles of Semantic Networks 1991: 507-525
1980 – 1989
- 1989
- [j1]Rattikorn Hewett, Giora Slutzki:
Comparisons Between Some Pumping Conditions for Context-Free Languages. Math. Syst. Theory 21(4): 223-233 (1989) - [c1]Barbara Hayes-Roth, Richard Washington, Rattikorn Hewett, Micheal Hewett, Adam Seiver:
Intelligent Monitoring and Control. IJCAI 1989: 243-249 - [p1]Barbara Hayes-Roth, Micheal Hewett, Richard Washington, Rattikorn Hewett, Adam Seiver:
Distributing Intelligence within an Individual. Distributed Artificial Intelligence 1989: 385-412
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-14 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint