• Publications
  • Influence
PhishCatch - A Phishing Detection Tool
TLDR
This paper explains the most popular methods used for phishing and the PhishCatch algorithm developed to detect phishing. Expand
  • 40
  • 5
Software Vulnerability Analysis for Web Services Software Systems
TLDR
A methodical approach on assessing the security of Web Services with a hacker's mindset is presented in this paper. Expand
  • 43
  • 4
Modeling the Measurements of QoS Requirements in Web Service Systems
TLDR
This paper gathers together the various techniques that can be used for measuring and optimizing the major QoS requirements for Web services proposed by the World Wide Consortium (W3C), while presenting a methodology to build QoS-aware Web services. Expand
  • 32
  • 4
A software fault prevention approach in coding and root cause analysis
  • W. Yu
  • Engineering, Computer Science
  • Bell Labs Technical Journal
  • 1 June 1998
TLDR
The complexity of Lucent Technologies' advanced 5ES switching system makes the cost of finding, fixing, and retesting a software fault very high. Expand
  • 48
  • 3
Verifying software requirements: a requirement tracing methodology and its software tool-RADIX
  • W. Yu
  • Computer Science
  • IEEE J. Sel. Areas Commun.
  • 1 February 1994
TLDR
The waterfall-based software development methodology usually requires significant efforts and lengthy intervals to develop, review, inspect, and test very large and complex real-time software systems. Expand
  • 24
  • 3
A Privacy Assessment Approach for Serviced Oriented Architecture Application
TLDR
A privacy policy checker engine that automatically verifies and certifies a Web service application based on the levels of overall privacy principle compliance and privacy statement compliance. Expand
  • 13
  • 2
An Approach to Explore Mobile Software Engineering Advances in Cloud Computing Environment
  • W. Yu, H. Yuan
  • Computer Science
  • IEEE 35th Annual Computer Software and…
  • 18 July 2011
TLDR
We perform a study on the state of the art of cloud computing with Service Oriented Architecture in mobile software environment. Expand
  • 8
  • 2
An Approach of Mobile Database Design Methodology for Mobile Software Solutions
TLDR
We develop a viable mobile database design methodology for designing appropriate databases for m-commerce oriented systems involving mobile business applications and services. Expand
  • 4
  • 2
A SOA Based Software Engineering Design Approach in Service Engineering
  • W. Yu, C. H. Ong
  • Computer Science
  • IEEE International Conference on e-Business…
  • 21 October 2009
TLDR
Service-oriented architecture (SOA) is for flexibility and reuse, and enables organizations to easily integrate systems, data, applications and processes through the linking of services. Expand
  • 10
  • 2
PPMLP: A Special Modeling Language Processor for Privacy Policies
  • W. Yu, S. Murthy
  • Computer Science
  • 12th IEEE Symposium on Computers and…
  • 1 July 2007
TLDR
In today's age of information technology, there is an increasing concern for the privacy of an individual's records stored on computers. Expand
  • 6
  • 2