Kang Leng Chiew
Cited by
Cited by
A survey of phishing attacks: Their types, vectors and technical approaches
KL Chiew, KSC Yong, CL Tan
Expert Systems with Applications 106, 1-20, 2018
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system
KL Chiew, CL Tan, KS Wong, KSC Yong, WK Tiong
Information Sciences 484, 153-166, 2019
Utilisation of website logo for phishing detection
KL Chiew, EH Chang, WK Tiong
Computers & Security 54, 16-26, 2015
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
CL Tan, KL Chiew, KS Wong
Decision Support Systems 88, 18-27, 2016
Phishing detection via identification of website identity
EH Chang, KL Chiew, WK Tiong
2013 international conference on IT convergence and security (ICITCS), 1-4, 2013
Leverage website favicon to detect phishing websites
KL Chiew, JSF Choo, SN Sze, KSC Yong
Security and communication networks 2018 (1), 7251750, 2018
A graph-theoretic approach for the detection of phishing webpages
CL Tan, KL Chiew, KSC Yong, J Abdullah, Y Sebastian
Computers & Security 95, 101793, 2020
Phishing webpage detection using weighted URL tokens for identity keywords retrieval
CL Tan, KL Chiew, SN Sze
9th International Conference on Robotic, Vision, Signal Processing and Power …, 2017
Phishing website detection using URL-assisted brand name weighting system
CL Tan, KL Chiew
2014 International Symposium on Intelligent Signal Processing and …, 2014
Phishing email detection technique by using hybrid features
LM Form, KL Chiew, WK Tiong
2015 9th International Conference on IT in Asia (CITA), 1-5, 2015
Binary image steganographic techniques classification based on multi-class steganalysis
KL Chiew, J Pieprzyk
Information Security, Practice and Experience: 6th International Conference …, 2010
Blind steganalysis: A countermeasure for binary image steganography
KL Chiew, J Pieprzyk
2010 International Conference on Availability, Reliability and Security, 653-658, 2010
Building standard offline anti-phishing dataset for benchmarking
KL Chiew, EH Chang, CL Tan, J Abdullah, KSC Yong
International Journal of Engineering & Technology 7 (4.31), 7-14, 2018
Estimating hidden message length in binary image embedded by using boundary pixels steganography
KL Chiew, J Pieprzyk
2010 International Conference on Availability, Reliability and Security, 683-688, 2010
A survey of the QR code phishing: the current attacks and countermeasures
KSC Yong, KL Chiew, CL Tan
2019 7th International Conference on Smart Computing & Communications (ICSCC …, 2019
Steganography: Dct coefficients reparation technique in jpeg image
CK Leng, J Labadin, SFS Juan
International Journal of Digital Content Technology and its Applications 2 (2), 2008
Phishdentity: Leverage website favicon to offset polymorphic phishing website
JCS Fatt, CK Leng, S San Nah
2014 Ninth International Conference on Availability, Reliability and …, 2014
Feature-based phishing detection technique
XM Choo, KL Chiew, DHA Ibrahim, N Musa, WK Tiong
Journal of Theoretical and Applied Information Technology 91 (1), 101, 2016
Hybrid phishing detection using joint visual and textual identity
CCL Tan, KL Chiew, KSC Yong, Y Sebastian, JCM Than, WK Tiong
Expert systems with applications 220, 119723, 2023
Identifying the most effective feature category in machine learning-based phishing website detection
CL Tan, KL Chiew, N Musa, DHA Ibrahim
International Journal of Engineering & Technology 7 (4.31), 1-6, 2018
The system can't perform the operation now. Try again later.
Articles 1–20