Follow
Kang Leng Chiew
Title
Cited by
Cited by
Year
A survey of phishing attacks: Their types, vectors and technical approaches
KL Chiew, KSC Yong, CL Tan
Expert Systems with Applications 106, 1-20, 2018
2202018
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system
KL Chiew, CL Tan, KS Wong, KSC Yong, WK Tiong
Information Sciences 484, 153-166, 2019
1882019
Utilisation of website logo for phishing detection
KL Chiew, EH Chang, WK Tiong
Computers & Security 54, 16-26, 2015
1242015
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
CL Tan, KL Chiew, KS Wong
Decision Support Systems 88, 18-27, 2016
962016
Phishing detection via identification of website identity
EH Chang, KL Chiew, WK Tiong
2013 international conference on IT convergence and security (ICITCS), 1-4, 2013
672013
Binary image steganographic techniques classification based on multi-class steganalysis
KL Chiew, J Pieprzyk
International Conference on Information Security Practice and Experience …, 2010
352010
Leverage website favicon to detect phishing websites
KL Chiew, JSF Choo, SN Sze, KSC Yong
Security and communication networks 2018, 2018
332018
Phishing website detection using URL-assisted brand name weighting system
CL Tan, KL Chiew
2014 International Symposium on Intelligent Signal Processing and …, 2014
322014
Phishing webpage detection using weighted URL tokens for identity keywords retrieval
CL Tan, KL Chiew, SN Sze
9th International Conference on Robotic, Vision, Signal Processing and Power …, 2017
292017
Blind steganalysis: A countermeasure for binary image steganography
KL Chiew, J Pieprzyk
2010 International Conference on Availability, Reliability and Security, 653-658, 2010
272010
Phishing email detection technique by using hybrid features
LM Form, KL Chiew, WK Tiong
2015 9th International Conference on IT in Asia (CITA), 1-5, 2015
262015
Estimating hidden message length in binary image embedded by using boundary pixels steganography
KL Chiew, J Pieprzyk
2010 International Conference on Availability, Reliability and Security, 683-688, 2010
242010
A graph-theoretic approach for the detection of phishing webpages
CL Tan, KL Chiew, KSC Yong, J Abdullah, Y Sebastian
Computers & Security 95, 101793, 2020
222020
Building standard offline anti-phishing dataset for benchmarking
KL Chiew, EH Chang, CL Tan, J Abdullah, KSC Yong
International Journal of Engineering & Technology 7 (4.31), 7-14, 2018
192018
Phishdentity: Leverage website favicon to offset polymorphic phishing website
JCS Fatt, CK Leng, S San Nah
2014 Ninth International Conference on Availability, Reliability and …, 2014
132014
Steganography: Dct coefficients reparation technique in jpeg image
CK Leng, J Labadin, SFS Juan
International Journal of Digital Content Technology and its Applications 2 (2), 2008
132008
Feature-based phishing detection technique
XM Choo, KL Chiew, DHA Ibrahim, N Musa, WK Tiong
Journal of Theoretical and Applied Information Technology 91 (1), 101, 2016
102016
A survey of the QR code phishing: the current attacks and countermeasures
KSC Yong, KL Chiew, CL Tan
2019 7th International Conference on Smart Computing & Communications (ICSCC …, 2019
82019
Simulation of internal solitary waves with negative polarity in slowly varying medium
MH Hooi, WK Tiong, KG Tay, SN Sze, KL Chiew
AIP Conference Proceedings 2013 (1), 020006, 2018
52018
Steganalysis of binary images
KL Chiew
Macquarie University, 2011
52011
The system can't perform the operation now. Try again later.
Articles 1–20