A survey of phishing attacks: Their types, vectors and technical approaches KL Chiew, KSC Yong, CL Tan Expert Systems with Applications 106, 1-20, 2018 | 337 | 2018 |
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system KL Chiew, CL Tan, KS Wong, KSC Yong, WK Tiong Information Sciences 484, 153-166, 2019 | 330 | 2019 |
Utilisation of website logo for phishing detection KL Chiew, EH Chang, WK Tiong Computers & Security 54, 16-26, 2015 | 165 | 2015 |
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder CL Tan, KL Chiew, KS Wong Decision Support Systems 88, 18-27, 2016 | 129 | 2016 |
Phishing detection via identification of website identity EH Chang, KL Chiew, WK Tiong 2013 international conference on IT convergence and security (ICITCS), 1-4, 2013 | 80 | 2013 |
Leverage website favicon to detect phishing websites KL Chiew, JSF Choo, SN Sze, KSC Yong Security and communication networks 2018 (1), 7251750, 2018 | 52 | 2018 |
A graph-theoretic approach for the detection of phishing webpages CL Tan, KL Chiew, KSC Yong, J Abdullah, Y Sebastian Computers & Security 95, 101793, 2020 | 46 | 2020 |
Phishing webpage detection using weighted URL tokens for identity keywords retrieval CL Tan, KL Chiew, SN Sze 9th International Conference on Robotic, Vision, Signal Processing and Power …, 2017 | 38 | 2017 |
Phishing website detection using URL-assisted brand name weighting system CL Tan, KL Chiew 2014 International Symposium on Intelligent Signal Processing and …, 2014 | 38 | 2014 |
Binary image steganographic techniques classification based on multi-class steganalysis KL Chiew, J Pieprzyk Information Security, Practice and Experience: 6th International Conference …, 2010 | 38 | 2010 |
Phishing email detection technique by using hybrid features LM Form, KL Chiew, WK Tiong 2015 9th International Conference on IT in Asia (CITA), 1-5, 2015 | 36 | 2015 |
Blind steganalysis: A countermeasure for binary image steganography KL Chiew, J Pieprzyk 2010 International Conference on Availability, Reliability and Security, 653-658, 2010 | 31 | 2010 |
Building standard offline anti-phishing dataset for benchmarking KL Chiew, EH Chang, CL Tan, J Abdullah, KSC Yong International Journal of Engineering & Technology 7 (4.31), 7-14, 2018 | 26 | 2018 |
Estimating hidden message length in binary image embedded by using boundary pixels steganography KL Chiew, J Pieprzyk 2010 International Conference on Availability, Reliability and Security, 683-688, 2010 | 22 | 2010 |
A survey of the QR code phishing: the current attacks and countermeasures KSC Yong, KL Chiew, CL Tan 2019 7th International Conference on Smart Computing & Communications (ICSCC …, 2019 | 21 | 2019 |
Steganography: Dct coefficients reparation technique in jpeg image CK Leng, J Labadin, SFS Juan International Journal of Digital Content Technology and its Applications 2 (2), 2008 | 14 | 2008 |
Phishdentity: Leverage website favicon to offset polymorphic phishing website JCS Fatt, CK Leng, S San Nah 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 12 | 2014 |
Hybrid phishing detection using joint visual and textual identity CCL Tan, KL Chiew, KSC Yong, Y Sebastian, JCM Than, WK Tiong Expert systems with applications 220, 119723, 2023 | 11 | 2023 |
Feature-based phishing detection technique XM Choo, KL Chiew, DHA Ibrahim, N Musa, WK Tiong Journal of Theoretical and Applied Information Technology 91 (1), 101, 2016 | 10 | 2016 |
Identifying the most effective feature category in machine learning-based phishing website detection CL Tan, KL Chiew, N Musa, DHA Ibrahim International Journal of Engineering & Technology 7 (4.31), 1-6, 2018 | 8 | 2018 |