Hee Beng Kuan Tan
Hee Beng Kuan Tan
Geverifieerd e-mailadres voor ntu.edu.sg
Titel
Geciteerd door
Geciteerd door
Jaar
Measuring design complexity of semantic web ontologies
H Zhang, YF Li, HBK Tan
Journal of Systems and Software 83 (5), 803-814, 2010
1282010
Defeating SQL injection
LK Shar, HBK Tan
Computer 46 (3), 69-77, 2012
1132012
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis
LK Shar, HBK Tan, LC Briand
2013 35th International Conference on Software Engineering (ICSE), 642-651, 2013
1112013
Automated removal of cross site scripting vulnerabilities in web applications
LK Shar, HBK Tan
Information and Software Technology 54 (5), 467-478, 2012
1042012
Detection of mobile malware in the wild
M Chandramohan, HBK Tan
Computer 45 (9), 65-71, 2012
1042012
Predicting common web application vulnerabilities from input validation and sanitization code patterns
LK Shar, HBK Tan
2012 Proceedings of the 27th IEEE/ACM international conference on automated …, 2012
852012
Bingo: Cross-architecture cross-os binary search
M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho, HBK Tan
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
802016
Defending against cross-site scripting attacks
LK Shar, HBK Tan
Computer 45 (3), 55-62, 2011
792011
Detecting large number of infeasible paths through recognizing their patterns
MN Ngo, HBK Tan
Proceedings of the the 6th Joint Meeting of the European Software …, 2007
782007
Web application vulnerability prediction using hybrid program analysis and machine learning
LK Shar, LC Briand, HBK Tan
IEEE Transactions on dependable and secure computing 12 (6), 688-707, 2014
762014
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities
LK Shar, HBK Tan
2012 34th International Conference on Software Engineering (ICSE), 1293-1296, 2012
712012
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns
LK Shar, HBK Tan
Information and Software Technology 55 (10), 1767-1780, 2013
682013
Heuristics-based infeasible path detection for dynamic test data generation
MN Ngo, HBK Tan
Information and Software Technology 50 (7-8), 641-655, 2008
642008
Detecting clones in android applications through analyzing user interfaces
C Soh, HBK Tan, YL Arnatovich, L Wang
2015 IEEE 23rd international conference on program comprehension, 163-173, 2015
632015
Covering code behavior on input validation in functional testing
H Liu, HBK Tan
Information and Software Technology 51 (2), 546-553, 2009
602009
Conceptual data model-based software size estimation for information systems
HBK Tan, Y Zhao, H Zhang
ACM Transactions on Software Engineering and Methodology (TOSEM) 19 (2), 1-37, 2009
502009
Auditing the XSS defence features implemented in web application programs
LK Shar, HBK Tan
IET software 6 (4), 377-390, 2012
482012
Testing input validation in web applications through automated model recovery
H Liu, HBK Tan
Journal of Systems and Software 81 (2), 222-233, 2008
432008
A scalable approach for malware detection through bounded feature space behavior modeling
M Chandramohan, HBK Tan, LC Briand, LK Shar, BM Padmanabhuni
2013 28th IEEE/ACM International Conference on Automated Software …, 2013
382013
Estimating LOC for information systems from their conceptual data models
HBK Tan, Y Zhao, H Zhang
Proceedings of the 28th international conference on Software engineering …, 2006
372006
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20