Search Results - "Hewett, Rattikorn"
-
1
Real-Time Tweet Analytics Using Hybrid Hashtags on Twitter Big Data Streams
Published in Information (Basel) (01-07-2020)“…Twitter is a microblogging platform that generates large volumes of data with high velocity. This daily generation of unbounded and continuous data leads to…”
Get full text
Journal Article -
2
Analytics on Anonymity for Privacy Retention in Smart Health Data
Published in Future internet (01-11-2021)“…Advancements in smart technology, wearable and mobile devices, and Internet of Things, have made smart health an integral part of modern living to better…”
Get full text
Journal Article -
3
On using MapReduce to scale algorithms for Big Data analytics: a case study
Published in Journal of big data (30-11-2019)“…Introduction Many data analytics algorithms are originally designed for in-memory data. Parallel and distributed computing is a natural first remedy to scale…”
Get full text
Journal Article -
4
Tumor classification ranking from microarray data
Published in BMC genomics (16-09-2008)“…Gene expression profiles based on microarray data are recognized as potential diagnostic indices of cancer. Molecular tumor classifications resulted from these…”
Get full text
Journal Article -
5
Warning users about cyber threats through sounds
Published in SN applied sciences (01-07-2021)“…This paper reports a formative evaluation of auditory representations of cyber security threat indicators and cues, referred to as sonifications, to warn users…”
Get full text
Journal Article -
6
Mining software defect data to support software testing management
Published in Applied intelligence (Dordrecht, Netherlands) (01-04-2011)“…Achieving high quality software would be easier if effective software development practices were known and deployed in appropriate contexts. Because our…”
Get full text
Journal Article -
7
Discovering Opioid Use Patterns From Social Media for Relapse Prevention
Published in Computer (Long Beach, Calif.) (01-02-2022)“…The United States is experiencing an unprecedented opioid crisis. Through a multidisciplinary analytic perspective, we characterize opioid addiction behavior…”
Get full text
Journal Article -
8
Towards Visualizing Big Data with Large-Scale Edge Constraint Graph Drawing
Published in Big data research (01-12-2017)“…Visualization plays an important role in enabling understanding of big data. Graphs are crucial tools for visual analytics of big data networks such as social,…”
Get full text
Journal Article -
9
On modeling software defect repair time
Published in Empirical software engineering : an international journal (01-04-2009)“…The ability to predict the time required to repair software defects is important for both software quality management and maintenance. Estimated repair times…”
Get full text
Journal Article -
10
Do Warning Message Design Recommendations Address Why Non-Experts Do Not Protect Themselves from Cybersecurity Threats? A Review
Published in International journal of human-computer interaction (08-11-2021)“…We aimed to understand whether warning message design recommendations address the reasons why non-experts choose to not protect themselves from cybersecurity…”
Get full text
Journal Article -
11
Cybersecurity policy verification with declarative programming
Published in Applied intelligence (Dordrecht, Netherlands) (01-07-2016)“…Cybersecurity is a growing concern in today’s society. Security policies have been developed to ensure that data and assets remain protected for legitimate…”
Get full text
Journal Article -
12
Toward identification of key breakers in social cyber-physical networks
Published in 2011 IEEE International Conference on Systems, Man, and Cybernetics (01-10-2011)“…Social networks can provide useful information to enhance mobile cyber-physical applications. With advanced sensor and powerful mobile Internet device…”
Get full text
Conference Proceeding -
13
Anonymity-driven Measures for Privacy
Published in 2022 6th International Conference on Cryptography, Security and Privacy (CSP) (01-01-2022)“…In today's world, digital data are enormous due to technologies that advance data collection, storage, and analyses. As more data are shared or publicly…”
Get full text
Conference Proceeding -
14
Device Identification for IoT Security
Published in 2021 IEEE 6th International Conference on Signal and Image Processing (ICSIP) (22-10-2021)“…IoT (Internet of things) devices have become integral parts of our everyday life to function especially in smart homes/offices/cities. However, their huge…”
Get full text
Conference Proceeding -
15
Energy Usage of Deep Learning in Smart Cities
Published in 2020 International Conference on Computational Science and Computational Intelligence (CSCI) (01-12-2020)“…Deep learning has increasingly become an essential component of many Smart City functions including smart city lightings, emergency rescues, smart drainage,…”
Get full text
Conference Proceeding -
16
Is Entropy enough for measuring Privacy?
Published in 2020 International Conference on Computational Science and Computational Intelligence (CSCI) (01-12-2020)“…Anonymization is critical to privacy. It helps protect the identity and sensitive information of individuals from their profile data. Knowing the degree of…”
Get full text
Conference Proceeding -
17
Securing Smart Contracts in Blockchain
Published in 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW) (01-11-2019)“…Blockchain is an emerging technology that underlies creation and exchange of the digital assets, including cryptocurrency such as Bitcoin and Ether, without…”
Get full text
Conference Proceeding -
18
On Detecting Crypto Ransomware Attacks: Can Simple Strategies be Effective?
Published in 2023 6th International Conference on Information and Computer Technologies (ICICT) (01-03-2023)“…Ransomware is a type of malicious software that locks computing services or encrypts data to block its use until ransom demands are met. The latter, known as…”
Get full text
Conference Proceeding -
19
Unleashing the Power of Hashtags in Tweet Analytics with Distributed Framework on Apache Storm
Published in 2018 IEEE International Conference on Big Data (Big Data) (01-12-2018)“…Twitter is a popular social network platform where users can interact and post texts of up to 280 characters called tweets. Hashtags, hyperlinked words in…”
Get full text
Conference Proceeding -
20
Adaptive Normalization in Streaming Data
Published 17-10-2019“…In todays digital era, data are everywhere from Internet of Things to health care or financial applications. This leads to potentially unbounded ever-growing…”
Get full text
Journal Article