Bei-tseng Chu

According to our database1, Bei-tseng Chu authored at least 26 papers between 1985 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
ShadowMove: A Stealthy Lateral Movement Strategy.
Proceedings of the 29th USENIX Security Symposium, 2020

HoneyBug: Personalized Cyber Deception for Web Applications.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
IoCMiner: Automatic Extraction of Indicators of Compromise from Twitter.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Automated Detecting and Repair of Cross-Site Scripting Vulnerabilities.
CoRR, 2018

PhishMon: A Machine Learning Framework for Detecting Phishing Webpages.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Authentic Learning Secure Software Development (SSD) in Computing Education.
Proceedings of the IEEE Frontiers in Education Conference, 2018

A Natural Language Processing Based Trend Analysis of Advanced Persistent Threat Techniques.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Phishing URL Detection with Oversampling based on Text Generative Adversarial Networks.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies.
J. Inf. Syst. Educ., 2017

Data-driven analytics for cyber-threat intelligence and information sharing.
Comput. Secur., 2017

Predicting Zero-day Malicious IP Addresses.
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 2017

2014
Developing Faculty Expertise in Information Assurance through Case Studies and Hands-On Experiences.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications.
Mob. Networks Appl., 2013

2012
Evaluating interactive support for secure programming.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2007
Collegiate Cyber Game Design Criteria and Participation.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
USIS: A Unified Framework for Secured Information System Lifecycle.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

2004
sSCADA: Securing SCADA Infrastructure Communications.
IACR Cryptol. ePrint Arch., 2004

2003
A rule-based framework for role-based delegation and revocation.
ACM Trans. Inf. Syst. Secur., 2003

Efficient and Secure Storage Systems Based on Peer-to-Peer Systems.
Proceedings of the International Conference on Artificial Intelligence, 2003

2002
A role-based delegation framework for healthcare information systems.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Challenges to Multi-Enterprise Integration.
Proceedings of the Enterprise Inter- and Intra-Organizational Integration: Building International Consensus, 2002

Ontologies as a New Cost Factor in Enterprise Integration.
Proceedings of the Enterprise Inter- and Intra-Organizational Integration: Building International Consensus, 2002

2001
A rule-based framework for role based delegation.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

1999
Agent-Based Approach for Manufacturing Integration: The Ciimplex Experience.
Appl. Artif. Intell., 1999

1998
A Multi-Agent System for Enterprise Integration.
Proceedings of the Third International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, 1998

1985
Update Dependencies.
Proceedings of the IFIP WG 2.6 Working Conference on Data Semantics (DS-1). Hasselt, 1985


  Loading...