A survey of phishing attacks: Their types, vectors and technical approaches KL Chiew, KSC Yong, CL Tan Expert Systems with Applications 106, 1-20, 2018 | 106 | 2018 |
Utilisation of website logo for phishing detection KL Chiew, EH Chang, WK Tiong Computers & Security 54, 16-26, 2015 | 81 | 2015 |
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system KL Chiew, CL Tan, KS Wong, KSC Yong, WK Tiong Information Sciences 484, 153-166, 2019 | 63 | 2019 |
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder CL Tan, KL Chiew, KS Wong Decision Support Systems 88, 18-27, 2016 | 61 | 2016 |
Phishing detection via identification of website identity EH Chang, KL Chiew, WK Tiong 2013 international conference on IT convergence and security (ICITCS), 1-4, 2013 | 51 | 2013 |
Phishing website detection using URL-assisted brand name weighting system CL Tan, KL Chiew 2014 International Symposium on Intelligent Signal Processing and …, 2014 | 30 | 2014 |
Binary image steganographic techniques classification based on multi-class steganalysis KL Chiew, J Pieprzyk International Conference on Information Security Practice and Experience …, 2010 | 27 | 2010 |
Estimating hidden message length in binary image embedded by using boundary pixels steganography KL Chiew, J Pieprzyk 2010 International Conference on Availability, Reliability and Security, 683-688, 2010 | 20 | 2010 |
Blind steganalysis: A countermeasure for binary image steganography KL Chiew, J Pieprzyk 2010 International Conference on Availability, Reliability and Security, 653-658, 2010 | 20 | 2010 |
Phishing webpage detection using weighted URL tokens for identity keywords retrieval CL Tan, KL Chiew 9th International Conference on Robotic, Vision, Signal Processing and Power …, 2017 | 18 | 2017 |
Leverage website favicon to detect phishing websites KL Chiew, JSF Choo, SN Sze, KSC Yong Security and Communication Networks 2018, 2018 | 17 | 2018 |
Steganography: Dct coefficients reparation technique in jpeg image CK Leng, J Labadin, SFS Juan International Journal of Digital Content Technology and its Applications 2 (2), 2008 | 14 | 2008 |
Phishing email detection technique by using hybrid features LM Form, KL Chiew, WK Tiong 2015 9th International Conference on IT in Asia (CITA), 1-5, 2015 | 12 | 2015 |
Phishdentity: Leverage website favicon to offset polymorphic phishing website JCS Fatt, CK Leng, S San Nah 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 11 | 2014 |
Feature-based phishing detection technique XM Choo, KL Chiew, DHA Ibrahim, N Musa, WK Tiong Journal of Theoretical and Applied Information Technology 91 (1), 101, 2016 | 8 | 2016 |
Building standard offline anti-phishing dataset for benchmarking KL Chiew, EH Chang, CL Tan, J Abdullah, KSC Yong International Journal of Engineering & Technology 7 (4.31), 7-14, 2018 | 6 | 2018 |
Steganalysis of binary images KL Chiew Macquarie University, 2011 | 6 | 2011 |
Identifying steganographic payload location in binary image KL Chiew, J Pieprzyk Pacific-Rim Conference on Multimedia, 590-600, 2010 | 5 | 2010 |
Simulation of internal solitary waves with negative polarity in slowly varying medium MH Hooi, WK Tiong, KG Tay, SN Sze, KL Chiew AIP Conference Proceedings 2013 (1), 020006, 2018 | 4 | 2018 |
Multi-trip vehicle routing and scheduling problem with time window in real life SN Sze, KL Chiew, JF Sze AIP Conference Proceedings 1479 (1), 1151-1154, 2012 | 4 | 2012 |