BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Argentina
1 × Belgium
1 × Canada
1 × China
1 × Croatia
1 × Greece
1 × Italy
1 × Portugal
1 × South Korea
1 × Switzerland
1 × United Kingdom
2 × Germany
6 × USA
Collaborated with:
L.K.Shar H.Zhang K.Liu M.N.Ngo M.Chandramohan S.Ding N.L.Thein Y.Arnatovich L.C.Briand H.Liu W.Li D.Trinh Y.Zhao Y.Li C.Soh Y.L.Arnatovich L.Wang T.W.Ling S.Jarzabek Y.S.Ho B.M.Padmanabhuni X.Chen B.Padmanabhuni Y.Xue Z.Xu Y.L.0003 C.Y.Cho
Talks about:
input (6) program (5) pattern (5) detect (5) applic (5) vulner (4) model (4) cross (4) data (4) databas (3)

Person: Hee Beng Kuan Tan

DBLP DBLP: Tan:Hee_Beng_Kuan

Facilitated 0 volumes:


Contributed to:

ICPC 20152015
CSMR-WCRE 20142014
ICEIS v2 20142014
SAC 20142014
SEKE 20142014
ASE 20132013
ICSE 20132013
WCRE 20132013
ASE 20122012
FSE 20122012
ICSE 20122012
SEKE 20112011
ESEC/FSE 20072007
ICPC 20062006
ICSE 20062006
ICSM 20062006
ASE 20022002
WCRE 20022002
SEKE 20012001
ASE 19971997
SAC 19931993
FSE 20162016

Wrote 25 papers:

ICPC-2015-SohTAW #android #detection #user interface
Detecting clones in Android applications through analyzing user interfaces (CS, HBKT, YLA, LW), pp. 163–173.
CSMR-WCRE-2014-DingZT #branch #detection
Detecting infeasible branches based on code patterns (SD, HZ, HBKT), pp. 74–83.
ICEIS-v2-2014-DingTZ #automation #c #c++ #source code
Automatic Removal of Buffer Overflow Vulnerabilities in C/C++ Programs (SD, HBKT, HZ), pp. 49–59.
SAC-2014-LiuTZ #constraints #mining
Mining key and referential constraints enforcement patterns (KL, HBKT, HZ), pp. 850–854.
SEKE-2014-ArnatovichTDLS #android #comparison #empirical
Empirical Comparison of Intermediate Representations for Android Applications (YA, HBKT, SD, KL, LKS), pp. 205–210.
SEKE-2014-LiuTA #database #detection
Detecting Anomaly in the Usage of Database Attribute (KL, HBKT, YA), pp. 705–710.
ASE-2013-ChandramohanTBSP #approach #behaviour #bound #detection #modelling #scalability
A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
ICSE-2013-SharTB #hybrid #injection #mining #program analysis #sql #using
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis (LKS, HBKT, LCB), pp. 642–651.
WCRE-2013-LiuTZ #debugging #question
Has this bug been reported? (KL, HBKT, HZ), pp. 82–91.
ASE-2012-SharT #predict #validation #web
Predicting common web application vulnerabilities from input validation and sanitization code patterns (LKS, HBKT), pp. 310–313.
FSE-2012-ChandramohanTS #behaviour #clustering #modelling #scalability
Scalable malware clustering through coarse-grained behavior modeling (MC, HBKT, LKS), p. 27.
FSE-2012-LiuTC #debugging #question
Has this bug been reported? (KL, HBKT, MC), p. 28.
ICSE-2012-SharT #injection #mining #predict #sql
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities (LKS, HBKT), pp. 1293–1296.
SEKE-2011-LiuTCZP #automation #database #lifecycle
Automated Extraction of Data Lifecycle Support from Database Applications (KL, HBKT, XC, HZ, BP), pp. 432–437.
ESEC-FSE-2007-NgoT #detection #scalability
Detecting large number of infeasible paths through recognizing their patterns (MNN, HBKT), pp. 215–224.
ICPC-2006-NgoTT #automation #database #interactive #web
Automated Extraction of Database Interactions in Web Applications (MNN, HBKT, DT), pp. 117–126.
ICSE-2006-TanZZ #concept #information management #modelling
Estimating LOC for information systems from their conceptual data models (HBKT, YZ, HZ), pp. 321–330.
ICSM-2006-LiuT #approach #comprehension #maintenance #validation
An Approach to Aid the Understanding and Maintenance of Input Validation (HL, HBKT), pp. 370–379.
ICSM-2006-NgoT #fault #maintenance
A Method to Aid Recovery and Maintenance of the Input Error Correction Features (MNN, HBKT), pp. 360–369.
ASE-2002-TanL #design #object-oriented #requirements
Systematic Bridging the Gap between Requirements and OO Design (HBKT, WL), pp. 249–252.
WCRE-2002-TanT #fault #program analysis #transaction #verification
Verifying Provisions for Post-Transaction User Input Error Correction through Static Program Analysis (HBKT, NLT), p. 233–?.
SEKE-2001-TanTL #design #fault #transaction
Design for Post-Transaction Input Error Handling (HBKT, NLT, YL), pp. 212–219.
ASE-1997-Tan #component #data-driven #interface #reuse #source code #usability
Enhancing the Component Reusability in Data-Intensive Business Programs through Interface Separation (HBKT), pp. 313–314.
SAC-1993-TanLJH #reuse #specification #usability
The Data Derivation Model: A Program Specification Technique That Improves Reusability (HBKT, TWL, SJ, YSH), pp. 95–102.
FSE-2016-ChandramohanXXL #architecture #named
BinGo: cross-architecture cross-OS binary search (MC, YX, ZX, YL0, CYC, HBKT), pp. 678–689.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.