Hee Beng Kuan Tan
According to our database1,
Hee Beng Kuan Tan
authored at least 97 papers
between 1993 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
IET Softw., 2016
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016
2015
Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2015
Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension, 2015
Light-Weight Rule-Based Test Case Generation for Detecting Buffer Overflow Vulnerabilities.
Proceedings of the 10th IEEE/ACM International Workshop on Automation of Software Test, 2015
Proceedings of the 10th IEEE/ACM International Workshop on Automation of Software Test, 2015
Buffer Overflow Vulnerability Prediction from x86 Executables Using Static Analysis and Machine Learning.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
2014
Detecting Anomaly in the Usage of Database Attribute.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014
Empirical Comparison of Intermediate Representations for Android Applications.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014
Proceedings of the Symposium on Applied Computing, 2014
Predicting Buffer Overflow Vulnerabilities through Mining Light-Weight Static Code Attributes.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014
Proceedings of the Enterprise Information Systems - 16th International Conference, 2014
Proceedings of the ICEIS 2014, 2014
Proceedings of the 2014 Software Evolution Week, 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
2013
Aiding Maintenance of Database Applications Through Extracting Attribute Dependency Graph.
J. Database Manag., 2013
J. Database Manag., 2013
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns.
Inf. Softw. Technol., 2013
Supporting the adaptation of open-source database applications through extracting data lifecycles.
IET Softw., 2013
Proceedings of the 20th Working Conference on Reverse Engineering, 2013
A scalable approach for malware detection through bounded feature space behavior modeling.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis.
Proceedings of the 35th International Conference on Software Engineering, 2013
Mining Attribute Lifecycle to Predict Faults and Incompleteness in Database Applications.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013
2012
Automated verification and testing of user-interactive undo features in database applications.
Softw. Test. Verification Reliab., 2012
Inf. Softw. Technol., 2012
IET Softw., 2012
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012
Predicting common web application vulnerabilities from input validation and sanitization code patterns.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities.
Proceedings of the 34th International Conference on Software Engineering, 2012
A Survey of Infeasible Path Detection.
Proceedings of the ENASE 2012, 2012
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2012
Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012
2011
Checking enforcement of integrity constraints in database applications based on code patterns.
J. Syst. Softw., 2011
Design verification for database applications through analysing their support to data lifecycle.
Int. J. Data Min. Model. Manag., 2011
Automated Extraction of Data Lifecycle Support from Database Applications.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011
2010
Semi-Automated Verification and Removal of Open Redirect Vulnerabilities in Web Applications.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010
Auditing the Defense Against Cross Site Scripting in Web Applications.
Proceedings of the SECRYPT 2010, 2010
2009
ACM Trans. Softw. Eng. Methodol., 2009
Inf. Softw. Technol., 2009
CoRR, 2009
2008
J. Syst. Softw., 2008
Inf. Softw. Technol., 2008
Applying static analysis for automated extraction of database interactions in web applications.
Inf. Softw. Technol., 2008
2007
J. Softw. Maintenance Res. Pract., 2007
Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007
2006
Systematic Transformation of Functional Analysis Model into OO Design and Implementation.
IEEE Trans. Software Eng., 2006
Proceedings of the 14th International Conference on Program Comprehension (ICPC 2006), 2006
Proceedings of the 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 2006
Proceedings of the 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 2006
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006
Proceedings of the 2006 International Workshop on Automation of Software Test, 2006
2004
Recovery of PTUIE Handling from Source Codes through Recognizing Its Probable Properties.
IEEE Trans. Knowl. Data Eng., 2004
Automated elicitation of functional dependencies from source codes of database transactions.
Inf. Softw. Technol., 2004
Automated extracting code fragments that implement Security functionality from source programs.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004
Proceedings of the Conceptual Modeling, 2004
2003
IEEE Trans. Software Eng., 2003
Automated elicitation of inclusion dependencies from the source code for database transactions.
J. Softw. Maintenance Res. Pract., 2003
Proceedings of the 3rd International Conference on Quality Software (QSIC 2003), 2003
Proceedings of the 9th Americas Conference on Information Systems, 2003
2002
IEEE Trans. Knowl. Data Eng., 2002
Verifying Provisions for Post-Transaction User Input Error Correction through Static Program Analysis.
Proceedings of the 9th Working Conference on Reverse Engineering (WCRE 2002), 28 October, 2002
Proceedings of the 17th IEEE International Conference on Automated Software Engineering (ASE 2002), 2002
2001
An approach for extracting code fragments that implement functionality from source programs.
J. Softw. Maintenance Res. Pract., 2001
Inf. Softw. Technol., 2001
Inf. Softw. Technol., 2001
Design for Post-Transaction Input Error Handling.
Proceedings of the Thirteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2001), 2001
2000
Proceedings of the 1st Asia-Pacific Conference on Quality Software (APAQS 2000), 2000
1999
Proceedings of the 23rd International Computer Software and Applications Conference (COMPSAC '99), 1999
Proceedings of the 6th Asia-Pacific Software Engineering Conference (APSEC '99), 1999
1998
Reuse of components in data-intensive business programs through interface separation.
Inf. Softw. Technol., 1998
1997
A method for the recovery of inclusion dependencies from data-intensive business programs.
Inf. Softw. Technol., 1997
Enhancing the Component Reusability in Data-Intensive Business Programs through Interface Separation.
Proceedings of the 1997 International Conference on Automated Software Engineering, 1997
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997
1996
Components reuse for data-intensive business programs through an object-oriented architecture.
J. Syst. Softw., 1996
Proceedings of the COMPSAC '96, 1996
1995
Inf. Softw. Technol., 1995
1993
The Data Derivation Model: A Program Specification Technique That Improves Reusability.
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, 1993
Improving the Reusability of Program Specification Through Data Flow Modeling.
Proceedings of the Computing and Information, 1993