关注
Kang Leng Chiew
Kang Leng Chiew
在 unimas.my 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A survey of phishing attacks: Their types, vectors and technical approaches
KL Chiew, KSC Yong, CL Tan
Expert Systems with Applications 106, 1-20, 2018
3372018
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system
KL Chiew, CL Tan, KS Wong, KSC Yong, WK Tiong
Information Sciences 484, 153-166, 2019
3302019
Utilisation of website logo for phishing detection
KL Chiew, EH Chang, WK Tiong
Computers & Security 54, 16-26, 2015
1652015
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
CL Tan, KL Chiew, KS Wong
Decision Support Systems 88, 18-27, 2016
1292016
Phishing detection via identification of website identity
EH Chang, KL Chiew, WK Tiong
2013 international conference on IT convergence and security (ICITCS), 1-4, 2013
802013
Leverage website favicon to detect phishing websites
KL Chiew, JSF Choo, SN Sze, KSC Yong
Security and communication networks 2018 (1), 7251750, 2018
522018
A graph-theoretic approach for the detection of phishing webpages
CL Tan, KL Chiew, KSC Yong, J Abdullah, Y Sebastian
Computers & Security 95, 101793, 2020
462020
Phishing webpage detection using weighted URL tokens for identity keywords retrieval
CL Tan, KL Chiew, SN Sze
9th International Conference on Robotic, Vision, Signal Processing and Power …, 2017
382017
Phishing website detection using URL-assisted brand name weighting system
CL Tan, KL Chiew
2014 International Symposium on Intelligent Signal Processing and …, 2014
382014
Binary image steganographic techniques classification based on multi-class steganalysis
KL Chiew, J Pieprzyk
Information Security, Practice and Experience: 6th International Conference …, 2010
382010
Phishing email detection technique by using hybrid features
LM Form, KL Chiew, WK Tiong
2015 9th International Conference on IT in Asia (CITA), 1-5, 2015
362015
Blind steganalysis: A countermeasure for binary image steganography
KL Chiew, J Pieprzyk
2010 International Conference on Availability, Reliability and Security, 653-658, 2010
312010
Building standard offline anti-phishing dataset for benchmarking
KL Chiew, EH Chang, CL Tan, J Abdullah, KSC Yong
International Journal of Engineering & Technology 7 (4.31), 7-14, 2018
262018
Estimating hidden message length in binary image embedded by using boundary pixels steganography
KL Chiew, J Pieprzyk
2010 International Conference on Availability, Reliability and Security, 683-688, 2010
222010
A survey of the QR code phishing: the current attacks and countermeasures
KSC Yong, KL Chiew, CL Tan
2019 7th International Conference on Smart Computing & Communications (ICSCC …, 2019
212019
Steganography: Dct coefficients reparation technique in jpeg image
CK Leng, J Labadin, SFS Juan
International Journal of Digital Content Technology and its Applications 2 (2), 2008
142008
Phishdentity: Leverage website favicon to offset polymorphic phishing website
JCS Fatt, CK Leng, S San Nah
2014 Ninth International Conference on Availability, Reliability and …, 2014
122014
Hybrid phishing detection using joint visual and textual identity
CCL Tan, KL Chiew, KSC Yong, Y Sebastian, JCM Than, WK Tiong
Expert systems with applications 220, 119723, 2023
112023
Feature-based phishing detection technique
XM Choo, KL Chiew, DHA Ibrahim, N Musa, WK Tiong
Journal of Theoretical and Applied Information Technology 91 (1), 101, 2016
102016
Identifying the most effective feature category in machine learning-based phishing website detection
CL Tan, KL Chiew, N Musa, DHA Ibrahim
International Journal of Engineering & Technology 7 (4.31), 1-6, 2018
82018
系统目前无法执行此操作,请稍后再试。
文章 1–20