Utilisation of website logo for phishing detection KL Chiew, EH Chang, WK Tiong Computers & Security 54, 16-26, 2015 | 163 | 2015 |
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder CL Tan, KL Chiew, KS Wong Decision Support Systems 88, 18-27, 2016 | 128 | 2016 |
Phishing detection via identification of website identity EH Chang, KL Chiew, WK Tiong 2013 international conference on IT convergence and security (ICITCS), 1-4, 2013 | 79 | 2013 |
A Survey of University Course Timetabling Problem: Perspectives, Trends and Opportunities MC Chen, SN Sze, SL Goh, NR Sabar, G Kendall IEEE Access 9, 106515-106529, 2021 | 63 | 2021 |
Leverage website favicon to detect phishing websites KL Chiew, JSF Choo, SN Sze, KSC Yong Security and communication networks 2018, 2018 | 50 | 2018 |
A graph-theoretic approach for the detection of phishing webpages CL Tan, KL Chiew, KSC Yong, J Abdullah, Y Sebastian Computers & Security 95, 101793, 2020 | 48 | 2020 |
Phishing webpage detection using weighted URL tokens for identity keywords retrieval CL Tan, KL Chiew, SN Sze 9th International Conference on Robotic, Vision, Signal Processing and Power …, 2017 | 39 | 2017 |
Phishing email detection technique by using hybrid features LM Form, KL Chiew, WK Tiong 2015 9th International Conference on IT in Asia (CITA), 1-5, 2015 | 38 | 2015 |
Phishing website detection using URL-assisted brand name weighting system CL Tan, KL Chiew 2014 International Symposium on Intelligent Signal Processing and …, 2014 | 38 | 2014 |
A survey of the nurse rostering solution methodologies: The state-of-the-art and emerging trends CM Ngoo, SL Goh, NR Sabar, S Abdullah, G Kendall IEEE Access 10, 56504-56524, 2022 | 28 | 2022 |
A comparison between heuristic and meta-heuristic methods for solving the multiple traveling salesman problem WK Tiong International Journal of Mathematical and Computational Sciences 1 (1), 13-16, 2007 | 27 | 2007 |
Phishdentity: Leverage website favicon to offset polymorphic phishing website JCS Fatt, CK Leng, S San Nah 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 12 | 2014 |
Feature-based phishing detection technique XM Choo, KL Chiew, DHA Ibrahim, N Musa, WK Tiong Journal of Theoretical and Applied Information Technology 91 (1), 101, 2016 | 10 | 2016 |
Community-centered, Project-based ICT4D Education in the Field A Bon, J Gordijn, H Akkermans, V de Boer, A Baart, CW Shiang, SS Nah Information and Communication Technologies for Development. Strengthening …, 2019 | 9 | 2019 |
Numerical solution of the Gardner equation WK Tiong, KG Tay, CT Ong, SN Sze Proceedings of the International Conference on Computing, Mathematics and …, 2017 | 7 | 2017 |
Case study: University lecture timetabling without pre-registration data SN Sze, CL Bong, KL Chiew, WK Tiong, NA Bolhassan 2017 International Conference on Applied System Innovation (ICASI), 732-735, 2017 | 6 | 2017 |
Simulation of internal undular bores of depression propagating over a slowly varying region MH Hooi, WK Tiong, KG Tay, KL Chiew Journal of Advanced Research in Fluid Mechanics and Thermal Sciences 70 (1 …, 2020 | 5 | 2020 |
Incoming work-in-progress prediction in semiconductor fabrication foundry using long short-term memory TC Tin, KL Chiew, SC Phang, P San Tan Computational intelligence and neuroscience 2019, 2019 | 5 | 2019 |
Simulation of internal solitary waves with negative polarity in slowly varying medium MH Hooi, WK Tiong, KG Tay, SN Sze, KL Chiew AIP Conference Proceedings 2013 (1), 2018 | 5 | 2018 |
Numerical simulation of shoaling internal solitary waves in two-layer fluid flow MH Hooi, WK Tiong, KG Tay, KL Chiew Matematika, 333-350, 2018 | 4 | 2018 |