Utilisation of website logo for phishing detection KL Chiew, EH Chang, WK Tiong Computers & Security 54, 16-26, 2015 | 165 | 2015 |
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder CL Tan, KL Chiew, KS Wong Decision Support Systems 88, 18-27, 2016 | 128 | 2016 |
Phishing detection via identification of website identity EH Chang, KL Chiew, WK Tiong 2013 international conference on IT convergence and security (ICITCS), 1-4, 2013 | 80 | 2013 |
A Survey of University Course Timetabling Problem: Perspectives, Trends and Opportunities MC Chen, SN Sze, SL Goh, NR Sabar, G Kendall IEEE Access 9, 106515-106529, 2021 | 73 | 2021 |
Leverage website favicon to detect phishing websites KL Chiew, JSF Choo, SN Sze, KSC Yong Security and communication networks 2018 (1), 7251750, 2018 | 51 | 2018 |
A graph-theoretic approach for the detection of phishing webpages CL Tan, KL Chiew, KSC Yong, J Abdullah, Y Sebastian Computers & Security 95, 101793, 2020 | 46 | 2020 |
Phishing webpage detection using weighted URL tokens for identity keywords retrieval CL Tan, KL Chiew, SN Sze 9th International Conference on Robotic, Vision, Signal Processing and Power …, 2017 | 38 | 2017 |
Phishing website detection using URL-assisted brand name weighting system CL Tan, KL Chiew 2014 International Symposium on Intelligent Signal Processing and …, 2014 | 38 | 2014 |
Phishing email detection technique by using hybrid features LM Form, KL Chiew, WK Tiong 2015 9th International Conference on IT in Asia (CITA), 1-5, 2015 | 35 | 2015 |
A survey of the nurse rostering solution methodologies: The state-of-the-art and emerging trends CM Ngoo, SL Goh, NR Sabar, S Abdullah, G Kendall IEEE Access 10, 56504-56524, 2022 | 29 | 2022 |
A comparison between heuristic and meta-heuristic methods for solving the multiple traveling salesman problem WK Tiong International Journal of Mathematical and Computational Sciences 1 (1), 13-16, 2007 | 26 | 2007 |
Phishdentity: Leverage website favicon to offset polymorphic phishing website JCS Fatt, CK Leng, S San Nah 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 12 | 2014 |
Community-centered, Project-based ICT4D Education in the Field A Bon, J Gordijn, H Akkermans, V de Boer, A Baart, CW Shiang, SS Nah Information and Communication Technologies for Development. Strengthening …, 2019 | 9 | 2019 |
Feature-based phishing detection technique XM Choo, KL Chiew, DHA Ibrahim, N Musa, WK Tiong Journal of Theoretical and Applied Information Technology 91 (1), 101, 2016 | 9 | 2016 |
Numerical solution of the Gardner equation WK Tiong, KG Tay, CT Ong, SN Sze Proceedings of the International Conference on Computing, Mathematics and …, 2017 | 7 | 2017 |
Incoming Work‐In‐Progress Prediction in Semiconductor Fabrication Foundry Using Long Short‐Term Memory TC Tin, KL Chiew, SC Phang, SN Sze, PS Tan Computational Intelligence and Neuroscience 2019 (1), 8729367, 2019 | 6 | 2019 |
Case study: University lecture timetabling without pre-registration data SN Sze, CL Bong, KL Chiew, WK Tiong, NA Bolhassan 2017 International Conference on Applied System Innovation (ICASI), 732-735, 2017 | 6 | 2017 |
Simulation of internal undular bores of depression propagating over a slowly varying region MH Hooi, WK Tiong, KG Tay, KL Chiew Journal of Advanced Research in Fluid Mechanics and Thermal Sciences 70 (1 …, 2020 | 5 | 2020 |
Simulation of internal solitary waves with negative polarity in slowly varying medium MH Hooi, WK Tiong, KG Tay, SN Sze, KL Chiew AIP Conference Proceedings 2013 (1), 2018 | 5 | 2018 |
Numerical simulation of shoaling internal solitary waves in two-layer fluid flow MH Hooi, WK Tiong, KG Tay, KL Chiew Matematika, 333-350, 2018 | 4 | 2018 |