A survey of phishing attacks: Their types, vectors and technical approaches
Chiew, Kang Leng, Yong, Kelvin Sheng Chek, Tan, Choon Lin
Published in Expert systems with applications (15.09.2018)
Published in Expert systems with applications (15.09.2018)
Get full text
Journal Article
A graph-theoretic approach for the detection of phishing webpages
Tan, Choon Lin, Chiew, Kang Leng, Yong, Kelvin S.C., Sze, San Nah, Abdullah, Johari, Sebastian, Yakub
Published in Computers & security (01.08.2020)
Published in Computers & security (01.08.2020)
Get full text
Journal Article
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
Tan, Choon Lin, Chiew, Kang Leng, Wong, KokSheik, Sze, San Nah
Published in Decision Support Systems (01.08.2016)
Published in Decision Support Systems (01.08.2016)
Get full text
Journal Article
Hybrid phishing detection using joint visual and textual identity
Tan, Colin Choon Lin, Chiew, Kang Leng, Yong, Kelvin S.C., Sebastian, Yakub, Than, Joel Chia Ming, Tiong, Wei King
Published in Expert systems with applications (15.06.2023)
Published in Expert systems with applications (15.06.2023)
Get full text
Journal Article
A survey of the QR code phishing: the current attacks and countermeasures
Yong, Kelvin S. C., Chiew, Kang Leng, Tan, Choon Lin
Published in 2019 7th International Conference on Smart Computing & Communications (ICSCC) (01.06.2019)
Published in 2019 7th International Conference on Smart Computing & Communications (ICSCC) (01.06.2019)
Get full text
Conference Proceeding