Bill Chu

According to our database1, Bill Chu authored at least 37 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Software Vulnerability Detection using Large Language Models.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, 2023

Extracting Actionable Cyber Threat Intelligence from Twitter Stream.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023

2020
From Word Embedding to Cyber-Phrase Embedding: Comparison of Processing Cybersecurity Texts.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

2019
How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool.
IEEE Trans. Software Eng., 2019

Automated Repair of Cross-Site Scripting Vulnerabilities through Unit Testing.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

Learning APT chains from cyber threat intelligence.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

2018
Using Unit Testing to Detect Sanitization Flaws.
CoRR, 2018

Evaluating Two Methods for Integrating Secure Programming Education.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Security During Application Development: an Application Security Expert Perspective.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

A Study on Log Analysis Approaches Using Sandia Dataset.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

The Design of Cyber Threat Hunting Games: A Case Study.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool.
Proceedings of the 2nd Workshop on Security Information Workers, 2016

Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Automatic web security unit testing: XSS vulnerability detection.
Proceedings of the 11th International Workshop on Automation of Software Test, 2016

Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
A study of interactive code annotation for access control vulnerabilities.
Proceedings of the 2015 IEEE Symposium on Visual Languages and Human-Centric Computing, 2015

Questions developers ask while diagnosing potential security vulnerabilities with static analysis.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Embedding Secure Coding Instruction into the IDE: A Field Study in an Advanced CS Course.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Mitigating Access Control Vulnerabilities through Interactive Static Analysis.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

POSTER: Using Unit Testing to Detect Sanitization Flaws.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Moving Target Defense Against Cross-Site Scripting Attacks (Position Paper).
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

SIW 2014: First Workshop on Security Information Workers.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Interactive Code Annotation for Security Vulnerability Detection.
Proceedings of the 2014 ACM Workshop on Security Information Workers, 2014

2013
Interactive support for secure programming education.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

2011
Why do programmers make security errors?
Proceedings of the 2011 IEEE Symposium on Visual Languages and Human-Centric Computing, 2011

A Visualization based Simulator for SYN Flood Attacks.
Proceedings of the IMAGAPP & IVAPP 2011, 2011

Idea: Interactive Support for Secure Software Development.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

The Design and Implementation of a Cryptographic Education Tool.
Proceedings of the CSEDU 2011, 2011

ASIDE: IDE support for web application security.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2009
Using a Practice Oriented Approach to Teach Web Security Course.
Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2009

2007
Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007

Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2003
Authorization management for role-based collaboration.
Proceedings of the IEEE International Conference on Systems, 2003

1998
FAIME: An Object-Oriented Methodology for Application Plug-and-Play.
J. Object Oriented Program., 1998


  Loading...