| Issue Date | Title | Author(s) |
| 2012 | Auditing the XSS defence features implemented in web application programs | Shar, Lwin Khin; Tan, Hee Beng Kuan |
| 2012 | Automated insertion of exception handling for key and referential constraints | Liu, Kaiping; Tan, Hee Beng Kuan |
| 2011 | Automated removal of cross site scripting vulnerabilities in web applications | Shar, Lwin Khin; Tan, Hee Beng Kuan |
| 2010 | Automated verification and testing of user-interactive undo features in database applications | Tan, Hee Beng Kuan; Ngo, Minh Ngoc |
| 2012 | Defending against cross-site scripting attacks | Shar, Lwin Khin; Tan, Hee Beng Kuan |
| 2012 | Detection of buffer overflow vulnerabilities in C/C++ with pattern based limited symbolic evaluation | Ding, Sun; Tan, Hee Beng Kuan; Liu, Kaiping; Chandramohan, Mahinthan; Zhang, Hongyu |
| 2012 | Detection of mobile malware in the wild | Chandramohan, Mahinthan; Tan, Hee Beng Kuan |
 | 2005 | Empirical analysis of existence dependency properties in object-oriented software | Chang, Hak Hee. |
 | 2000 | Experimenting an extended Visual C++ environment | Cao, Jue |
 | 2005 | Exploring into methods for component-based software development | Liu, Xinying. |
| 2012 | Has this bug been reported? | Liu, Kaiping; Tan, Hee Beng Kuan; Chandramohan, Mahinthan |
| 2012 | Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities | Shar, Lwin Khin; Tan, Hee Beng Kuan |
| 2012 | Predicting common web application vulnerabilities from input validation and sanitization code patterns | Shar, Lwin Khin; Tan, Hee Beng Kuan |
| 2012 | Scalable malware clustering through coarse-grained behavior modeling | Chandramohan, Mahinthan; Tan, Hee Beng Kuan; Shar, Lwin Khin |
| 2012 | Semi-automated verification of defense against SQL injection in web applications | Liu, Kaiping; Tan, Hee Beng Kuan; Shar, Lwin Khin |
 | 2006 | Size estimation through neural network for a common class of web-based systems | Wang, Di |