Kang Leng Chiew
Cited by
Cited by
A survey of phishing attacks: Their types, vectors and technical approaches
KL Chiew, KSC Yong, CL Tan
Expert Systems with Applications 106, 1-20, 2018
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system
KL Chiew, CL Tan, KS Wong, KSC Yong, WK Tiong
Information Sciences 484, 153-166, 2019
Utilisation of website logo for phishing detection
KL Chiew, EH Chang, WK Tiong
Computers & Security 54, 16-26, 2015
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
CL Tan, KL Chiew, KS Wong
Decision Support Systems 88, 18-27, 2016
Phishing detection via identification of website identity
EH Chang, KL Chiew, WK Tiong
2013 international conference on IT convergence and security (ICITCS), 1-4, 2013
Binary image steganographic techniques classification based on multi-class steganalysis
KL Chiew, J Pieprzyk
International Conference on Information Security Practice and Experience …, 2010
Leverage website favicon to detect phishing websites
KL Chiew, JSF Choo, SN Sze, KSC Yong
Security and communication networks 2018, 2018
Phishing website detection using URL-assisted brand name weighting system
CL Tan, KL Chiew
2014 International Symposium on Intelligent Signal Processing and …, 2014
Phishing webpage detection using weighted URL tokens for identity keywords retrieval
CL Tan, KL Chiew, SN Sze
9th International Conference on Robotic, Vision, Signal Processing and Power …, 2017
Blind steganalysis: A countermeasure for binary image steganography
KL Chiew, J Pieprzyk
2010 International Conference on Availability, Reliability and Security, 653-658, 2010
Phishing email detection technique by using hybrid features
LM Form, KL Chiew, WK Tiong
2015 9th International Conference on IT in Asia (CITA), 1-5, 2015
Estimating hidden message length in binary image embedded by using boundary pixels steganography
KL Chiew, J Pieprzyk
2010 International Conference on Availability, Reliability and Security, 683-688, 2010
A graph-theoretic approach for the detection of phishing webpages
CL Tan, KL Chiew, KSC Yong, J Abdullah, Y Sebastian
Computers & Security 95, 101793, 2020
Building standard offline anti-phishing dataset for benchmarking
KL Chiew, EH Chang, CL Tan, J Abdullah, KSC Yong
International Journal of Engineering & Technology 7 (4.31), 7-14, 2018
Phishdentity: Leverage website favicon to offset polymorphic phishing website
JCS Fatt, CK Leng, S San Nah
2014 Ninth International Conference on Availability, Reliability and …, 2014
Steganography: Dct coefficients reparation technique in jpeg image
CK Leng, J Labadin, SFS Juan
International Journal of Digital Content Technology and its Applications 2 (2), 2008
Feature-based phishing detection technique
XM Choo, KL Chiew, DHA Ibrahim, N Musa, WK Tiong
Journal of Theoretical and Applied Information Technology 91 (1), 101, 2016
A survey of the QR code phishing: the current attacks and countermeasures
KSC Yong, KL Chiew, CL Tan
2019 7th International Conference on Smart Computing & Communications (ICSCC …, 2019
Simulation of internal solitary waves with negative polarity in slowly varying medium
MH Hooi, WK Tiong, KG Tay, SN Sze, KL Chiew
AIP Conference Proceedings 2013 (1), 020006, 2018
Steganalysis of binary images
KL Chiew
Macquarie University, 2011
The system can't perform the operation now. Try again later.
Articles 1–20