default search action
Bei-tseng Chu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c19]Amirreza Niakanlahiji, Jafar Haadi Jafarian, Bei-Tseng Chu, Ehab Al-Shaer:
HoneyBug: Personalized Cyber Deception for Web Applications. HICSS 2020: 1-10 - [c18]Amirreza Niakanlahiji, Jinpeng Wei, Md Rabbi Alam, Qingyang Wang, Bei-Tseng Chu:
ShadowMove: A Stealthy Lateral Movement Strategy. USENIX Security Symposium 2020: 559-576
2010 – 2019
- 2019
- [c17]Amirreza Niakanlahiji, Lida Safarnejad, Reginald Harper, Bei-Tseng Chu:
IoCMiner: Automatic Extraction of Indicators of Compromise from Twitter. IEEE BigData 2019: 4747-4754 - 2018
- [c16]Ankesh Anand, Kshitij Gorde, Joel Ruben Antony Moniz, Noseong Park, Tanmoy Chakraborty, Bei-Tseng Chu:
Phishing URL Detection with Oversampling based on Text Generative Adversarial Networks. IEEE BigData 2018: 1168-1177 - [c15]Amirreza Niakanlahiji, Jinpeng Wei, Bei-Tseng Chu:
A Natural Language Processing Based Trend Analysis of Advanced Persistent Threat Techniques. IEEE BigData 2018: 2995-3000 - [c14]Kai Qian, Dan Chia-Tien Lo, Reza M. Parizi, Fan Wu, Emmanuel Agu, Bei-Tseng Chu:
Authentic Learning Secure Software Development (SSD) in Computing Education. FIE 2018: 1-9 - [c13]Amirreza Niakanlahiji, Bei-Tseng Chu, Ehab Al-Shaer:
PhishMon: A Machine Learning Framework for Detecting Phishing Webpages. ISI 2018: 220-225 - [i2]Mahmoud Mohammadi, Bei-Tseng Chu, Heather Richter Lipford:
Automated Detecting and Repair of Cross-Site Scripting Vulnerabilities. CoRR abs/1804.01862 (2018) - 2017
- [j5]Sara Qamar, Zahid Anwar, Mohammad Ashiqur Rahman, Ehab Al-Shaer, Bei-tseng Chu:
Data-driven analytics for cyber-threat intelligence and information sharing. Comput. Secur. 67: 35-58 (2017) - [j4]Xiaohong Yuan, Kenneth Williams, Huiming Yu, Audrey Rorrer, Bei-Tseng Chu, Li Yang, Kathy Winters, Joseph M. Kizza:
Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies. J. Inf. Syst. Educ. 28(1): 11-20 (2017) - [c12]Amirreza Niakanlahiji, Mir Mehedi A. Pritom, Bei-tseng Chu, Ehab Al-Shaer:
Predicting Zero-day Malicious IP Addresses. SafeConfig@CCS 2017: 1-6 - 2014
- [c11]Xiaohong Yuan, Kenneth Williams, Huiming Yu, Bei-tseng Chu, Audrey Rorrer, Li Yang, Kathy Winters, Joseph M. Kizza:
Developing Faculty Expertise in Information Assurance through Case Studies and Hands-On Experiences. HICSS 2014: 4938-4945 - 2013
- [j3]Mehmet Engin Tozal, Yongge Wang, Ehab Al-Shaer, Kamil Saraç, Bhavani Thuraisingham, Bei-tseng Chu:
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications. Mob. Networks Appl. 18(5): 697-711 (2013) - 2012
- [c10]Jing Xie, Heather Richter Lipford, Bei-tseng Chu:
Evaluating interactive support for secure programming. CHI 2012: 2707-2716
2000 – 2009
- 2007
- [c9]Bei-tseng Chu, Gail-Joon Ahn, Steven Blanchard, James Deese, Richard Kelly, Huiming Yu, Ashika Young:
Collegiate Cyber Game Design Criteria and Participation. ACIS-ICIS 2007: 1036-1041 - 2006
- [c8]Bei-tseng Chu, Huiming Yu, Audrey Dance:
USIS: A Unified Framework for Secured Information System Lifecycle. JCIS 2006 - 2004
- [i1]Yongge Wang, Bei-tseng Chu:
sSCADA: Securing SCADA Infrastructure Communications. IACR Cryptol. ePrint Arch. 2004: 265 (2004) - 2003
- [j2]Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu:
A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur. 6(3): 404-441 (2003) - [c7]Yongge Wang, Yuliang Zheng, Bei-tseng Chu:
Efficient and Secure Storage Systems Based on Peer-to-Peer Systems. IC-AI 2003: 17-22 - 2002
- [c6]William J. Tolone, Bei-tseng Chu, Gail-Joon Ahn, Robert G. Wilhelm, John E. Sims:
Challenges to Multi-Enterprise Integration. ICEIMT 2002: 205-216 - [c5]H. Ted Goranson, Bei-tseng Chu, Michael Grüninger, Nenad Ivezic, Boonserm Kulvatunyou, Yannis Labrou, Ryusuke Masuoka, Yun Peng, Amit P. Sheth, David N. Shorter:
Ontologies as a New Cost Factor in Enterprise Integration. ICEIMT 2002: 253-263 - [c4]Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu:
A role-based delegation framework for healthcare information systems. SACMAT 2002: 125-134 - 2001
- [c3]Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu:
A rule-based framework for role based delegation. SACMAT 2001: 153-162
1990 – 1999
- 1999
- [j1]Yun Peng, Timothy W. Finin, Yannis Labrou, R. Scott Cost, Bei-tseng Chu, Junsheng Long, William J. Tolone, Akram Boughannam:
Agent-Based Approach for Manufacturing Integration: The Ciimplex Experience. Appl. Artif. Intell. 13(1-2): 39-63 (1999) - 1998
- [c2]Yun Peng, Tim Finin, Yannis Labrou, Bei-tseng Chu, Junsheng Long, William J. Tolone, Akram Boughannam:
A Multi-Agent System for Enterprise Integration. PAAM 1998: 155-172
1980 – 1989
- 1985
- [c1]Leo Mark, Nick Roussopoulos, Bei-tseng Chu:
Update Dependencies. DS-1 1985: 303-319
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint