关注
Sze San Nah
Sze San Nah
Associate Professor, Universiti Malaysia Sarawak
在 unimas.my 的电子邮件经过验证
标题
引用次数
引用次数
年份
Utilisation of website logo for phishing detection
KL Chiew, EH Chang, WK Tiong
Computers & Security 54, 16-26, 2015
1652015
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
CL Tan, KL Chiew, KS Wong
Decision Support Systems 88, 18-27, 2016
1282016
Phishing detection via identification of website identity
EH Chang, KL Chiew, WK Tiong
2013 international conference on IT convergence and security (ICITCS), 1-4, 2013
802013
A Survey of University Course Timetabling Problem: Perspectives, Trends and Opportunities
MC Chen, SN Sze, SL Goh, NR Sabar, G Kendall
IEEE Access 9, 106515-106529, 2021
732021
Leverage website favicon to detect phishing websites
KL Chiew, JSF Choo, SN Sze, KSC Yong
Security and communication networks 2018 (1), 7251750, 2018
512018
A graph-theoretic approach for the detection of phishing webpages
CL Tan, KL Chiew, KSC Yong, J Abdullah, Y Sebastian
Computers & Security 95, 101793, 2020
462020
Phishing webpage detection using weighted URL tokens for identity keywords retrieval
CL Tan, KL Chiew, SN Sze
9th International Conference on Robotic, Vision, Signal Processing and Power …, 2017
382017
Phishing website detection using URL-assisted brand name weighting system
CL Tan, KL Chiew
2014 International Symposium on Intelligent Signal Processing and …, 2014
382014
Phishing email detection technique by using hybrid features
LM Form, KL Chiew, WK Tiong
2015 9th International Conference on IT in Asia (CITA), 1-5, 2015
352015
A survey of the nurse rostering solution methodologies: The state-of-the-art and emerging trends
CM Ngoo, SL Goh, NR Sabar, S Abdullah, G Kendall
IEEE Access 10, 56504-56524, 2022
292022
A comparison between heuristic and meta-heuristic methods for solving the multiple traveling salesman problem
WK Tiong
International Journal of Mathematical and Computational Sciences 1 (1), 13-16, 2007
262007
Phishdentity: Leverage website favicon to offset polymorphic phishing website
JCS Fatt, CK Leng, S San Nah
2014 Ninth International Conference on Availability, Reliability and …, 2014
122014
Community-centered, Project-based ICT4D Education in the Field
A Bon, J Gordijn, H Akkermans, V de Boer, A Baart, CW Shiang, SS Nah
Information and Communication Technologies for Development. Strengthening …, 2019
92019
Feature-based phishing detection technique
XM Choo, KL Chiew, DHA Ibrahim, N Musa, WK Tiong
Journal of Theoretical and Applied Information Technology 91 (1), 101, 2016
92016
Numerical solution of the Gardner equation
WK Tiong, KG Tay, CT Ong, SN Sze
Proceedings of the International Conference on Computing, Mathematics and …, 2017
72017
Incoming Work‐In‐Progress Prediction in Semiconductor Fabrication Foundry Using Long Short‐Term Memory
TC Tin, KL Chiew, SC Phang, SN Sze, PS Tan
Computational Intelligence and Neuroscience 2019 (1), 8729367, 2019
62019
Case study: University lecture timetabling without pre-registration data
SN Sze, CL Bong, KL Chiew, WK Tiong, NA Bolhassan
2017 International Conference on Applied System Innovation (ICASI), 732-735, 2017
62017
Simulation of internal undular bores of depression propagating over a slowly varying region
MH Hooi, WK Tiong, KG Tay, KL Chiew
Journal of Advanced Research in Fluid Mechanics and Thermal Sciences 70 (1 …, 2020
52020
Simulation of internal solitary waves with negative polarity in slowly varying medium
MH Hooi, WK Tiong, KG Tay, SN Sze, KL Chiew
AIP Conference Proceedings 2013 (1), 2018
52018
Numerical simulation of shoaling internal solitary waves in two-layer fluid flow
MH Hooi, WK Tiong, KG Tay, KL Chiew
Matematika, 333-350, 2018
42018
系统目前无法执行此操作,请稍后再试。
文章 1–20