


default search action
Bill Chu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c34]Moumita Das Purba, Bill Chu:
Extracting Actionable Cyber Threat Intelligence from Twitter Stream. ISI 2023: 1-6 - [c33]Moumita Das Purba, Arpita Ghosh, Benjamin J. Radford, Bill Chu:
Software Vulnerability Detection using Large Language Models. ISSREW 2023: 112-119 - 2020
- [c32]Moumita Das Purba, Bill Chu, Ehab Al-Shaer:
From Word Embedding to Cyber-Phrase Embedding: Comparison of Processing Cybersecurity Texts. ISI 2020: 1-6
2010 – 2019
- 2019
- [j2]Justin Smith
, Brittany Johnson, Emerson R. Murphy-Hill
, Bill Chu, Heather Richter Lipford:
How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool. IEEE Trans. Software Eng. 45(9): 877-897 (2019) - [c31]Ghaith Husari, Ehab Al-Shaer, Bill Chu, Ruhani Faiheem Rahman:
Learning APT chains from cyber threat intelligence. HotSoS 2019: 19:1-19:2 - [c30]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
Automated Repair of Cross-Site Scripting Vulnerabilities through Unit Testing. ISSRE Workshops 2019: 370-377 - 2018
- [c29]Tyler W. Thomas, Madiha Tabassum
, Bill Chu, Heather Lipford:
Security During Application Development: an Application Security Expert Perspective. CHI 2018: 262 - [c28]Ghaith Husari, Xi Niu, Bill Chu, Ehab Al-Shaer:
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence. ISI 2018: 1-6 - [c27]Madiha Tabassum
, Stacey Watson, Bill Chu, Heather Richter Lipford:
Evaluating Two Methods for Integrating Secure Programming Education. SIGCSE 2018: 390-395 - [i3]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
Using Unit Testing to Detect Sanitization Flaws. CoRR abs/1804.00753 (2018) - [i2]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford, Emerson R. Murphy-Hill:
Automatic Web Security Unit Testing: XSS Vulnerability Detection. CoRR abs/1804.00754 (2018) - [i1]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing. CoRR abs/1804.00755 (2018) - 2017
- [c26]Ghaith Husari, Ehab Al-Shaer, Mohiuddin Ahmed
, Bill Chu, Xi Niu:
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources. ACSAC 2017: 103-115 - [c25]Md. Nazmus Sakib Miazi, Mir Mehedi A. Pritom, Mohamed Shehab
, Bill Chu, Jinpeng Wei:
The Design of Cyber Threat Hunting Games: A Case Study. ICCCN 2017: 1-6 - [c24]Mir Mehedi A. Pritom, Chuqin Li, Bill Chu, Xi Niu:
A Study on Log Analysis Approaches Using Sandia Dataset. ICCCN 2017: 1-6 - [c23]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing. QRS 2017: 364-373 - 2016
- [c22]Spike E. Dog, Alex Tweed, LeRoy Rouse, Bill Chu, Duan Qi, Yueqi Hu, Jing Yang, Ehab Al-Shaer:
Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs. ICCCN 2016: 1-6 - [c21]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford, Emerson R. Murphy-Hill:
Automatic web security unit testing: XSS vulnerability detection. AST@ICSE 2016: 78-84 - [c20]Jun Zhu, Bill Chu, Heather Richter Lipford:
Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code. SACMAT 2016: 73-80 - [c19]Tyler Thomas, Heather Lipford, Bill Chu, Justin Smith, Emerson R. Murphy-Hill:
What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool. WSIW@SOUPS 2016 - 2015
- [c18]Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
POSTER: Using Unit Testing to Detect Sanitization Flaws. CCS 2015: 1659-1661 - [c17]Jun Zhu, Bill Chu, Heather Richter Lipford, Tyler Thomas:
Mitigating Access Control Vulnerabilities through Interactive Static Analysis. SACMAT 2015: 199-209 - [c16]Michael Whitney, Heather Richter Lipford, Bill Chu, Jun Zhu:
Embedding Secure Coding Instruction into the IDE: A Field Study in an Advanced CS Course. SIGCSE 2015: 60-65 - [c15]Justin Smith
, Brittany Johnson, Emerson R. Murphy-Hill, Bill Chu, Heather Richter Lipford:
Questions developers ask while diagnosing potential security vulnerabilities with static analysis. ESEC/SIGSOFT FSE 2015: 248-259 - [c14]Tyler Thomas, Bill Chu, Heather Richter Lipford, Justin Smith
, Emerson R. Murphy-Hill:
A study of interactive code annotation for access control vulnerabilities. VL/HCC 2015: 73-77 - 2014
- [c13]Heather Richter Lipford, Tyler Thomas, Bill Chu, Emerson R. Murphy-Hill:
Interactive Code Annotation for Security Vulnerability Detection. SIW@CCS 2014: 17-22 - [c12]Emerson R. Murphy-Hill, Heather Richter Lipford, Bill Chu, Robert Biddle:
SIW 2014: First Workshop on Security Information Workers. CCS 2014: 1554 - [c11]Joe Portner, Joel Kerr, Bill Chu:
Moving Target Defense Against Cross-Site Scripting Attacks (Position Paper). FPS 2014: 85-91 - [e1]Robert Biddle, Bill Chu, Emerson R. Murphy-Hill, Heather Richter Lipford:
Proceedings of the 2014 ACM Workshop on Security Information Workers, SIW '14, Scottsdale, Arizona, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3152-4 [contents] - 2013
- [c10]Jun Zhu, Heather Richter Lipford, Bill Chu:
Interactive support for secure programming education. SIGCSE 2013: 687-692 - 2011
- [c9]Jing Xie, Bill Chu, Heather Richter Lipford, John T. Melton:
ASIDE: IDE support for web application security. ACSAC 2011: 267-276 - [c8]Abdrah Abuzaid, Xiaohong Yuan, Huiming Yu, Bill Chu:
The Design and Implementation of a Cryptographic Education Tool. CSEDU (1) 2011: 193-198 - [c7]Jing Xie, Bill Chu, Heather Richter Lipford:
Idea: Interactive Support for Secure Software Development. ESSoS 2011: 248-255 - [c6]Tom Terry Jr., Huiming Yu, Kenneth Williams, Xiaohong Yuan, Bill Chu:
A Visualization based Simulator for SYN Flood Attacks. IMAGAPP/IVAPP 2011: 251-255 - [c5]Jing Xie, Heather Richter Lipford, Bill Chu:
Why do programmers make security errors? VL/HCC 2011: 161-164
2000 – 2009
- 2009
- [c4]Huiming Yu, Bill Chu, Xiaohong Yuan, Janelle C. Mason, Monica Barnette:
Using a Practice Oriented Approach to Teach Web Security Course. FECS 2009: 405-409 - 2007
- [c3]Huiming Yu, Xiaohong Yuan, Jinsheng Xu, Stephen Providence
, Bill Chu, Dechang Gu:
Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration. ACIS-ICIS 2007: 1030-1035 - [c2]Napoleon Paxton, Gail-Joon Ahn
, Bill Chu:
Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks. IRI 2007: 73-78 - 2003
- [c1]Gail-Joon Ahn, Longhua Zhang, Dongwan Shin, Bill Chu:
Authorization management for role-based collaboration. SMC 2003: 4128-4134
1990 – 1999
- 1998
- [j1]Bill Chu, Junsheng Long, Michael Matthews, J. G. Barnes, J. Sims, Mark Hamilton, Russ Lambert:
FAIME: An Object-Oriented Methodology for Application Plug-and-Play. J. Object Oriented Program. 11(5): 20-26, 34 (1998)
Coauthor Index
aka: Heather Richter Lipford

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint