Follow
Sze San Nah
Sze San Nah
Associate Professor, Universiti Malaysia Sarawak
Verified email at unimas.my
Title
Cited by
Cited by
Year
Utilisation of website logo for phishing detection
KL Chiew, EH Chang, WK Tiong
Computers & Security 54, 16-26, 2015
1602015
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
CL Tan, KL Chiew, KS Wong
Decision Support Systems 88, 18-27, 2016
1262016
Phishing detection via identification of website identity
EH Chang, KL Chiew, WK Tiong
2013 international conference on IT convergence and security (ICITCS), 1-4, 2013
752013
A Survey of University Course Timetabling Problem: Perspectives, Trends and Opportunities
MC Chen, SN Sze, SL Goh, NR Sabar, G Kendall
IEEE Access 9, 106515-106529, 2021
592021
Leverage website favicon to detect phishing websites
KL Chiew, JSF Choo, SN Sze, KSC Yong
Security and communication networks 2018, 2018
482018
A graph-theoretic approach for the detection of phishing webpages
CL Tan, KL Chiew, KSC Yong, J Abdullah, Y Sebastian
Computers & Security 95, 101793, 2020
452020
Phishing webpage detection using weighted URL tokens for identity keywords retrieval
CL Tan, KL Chiew, SN Sze
9th International Conference on Robotic, Vision, Signal Processing and Power …, 2017
392017
Phishing email detection technique by using hybrid features
LM Form, KL Chiew, WK Tiong
2015 9th International Conference on IT in Asia (CITA), 1-5, 2015
372015
A comparison between heuristic and meta-heuristic methods for solving the multiple traveling salesman problem
WK Tiong
International Journal of Mathematical and Computational Sciences 1 (1), 13-16, 2007
272007
A survey of the nurse rostering solution methodologies: The state-of-the-art and emerging trends
CM Ngoo, SL Goh, NR Sabar, S Abdullah, G Kendall
IEEE Access 10, 56504-56524, 2022
252022
Phishdentity: Leverage website favicon to offset polymorphic phishing website
JCS Fatt, CK Leng, S San Nah
2014 Ninth International Conference on Availability, Reliability and …, 2014
122014
Feature-based phishing detection technique
XM Choo, KL Chiew, DHA Ibrahim, N Musa, WK Tiong
Journal of Theoretical and Applied Information Technology 91 (1), 101, 2016
102016
Community-centered, Project-based ICT4D Education in the Field
A Bon, J Gordijn, H Akkermans, V de Boer, A Baart, CW Shiang, SS Nah
Information and Communication Technologies for Development. Strengthening …, 2019
92019
Numerical solution of the Gardner equation
WK Tiong, KG Tay, CT Ong, SN Sze
Proceedings of the International Conference on Computing, Mathematics and …, 2017
72017
Case study: University lecture timetabling without pre-registration data
SN Sze, CL Bong, KL Chiew, WK Tiong, NA Bolhassan
2017 International Conference on Applied System Innovation (ICASI), 732-735, 2017
62017
Simulation of internal undular bores of depression propagating over a slowly varying region
MH Hooi, WK Tiong, KG Tay, KL Chiew
Journal of Advanced Research in Fluid Mechanics and Thermal Sciences 70 (1 …, 2020
52020
Incoming work-in-progress prediction in semiconductor fabrication foundry using long short-term memory
TC Tin, KL Chiew, SC Phang, P San Tan
Computational intelligence and neuroscience 2019, 2019
52019
Simulation of internal solitary waves with negative polarity in slowly varying medium
MH Hooi, WK Tiong, KG Tay, SN Sze, KL Chiew
AIP Conference Proceedings 2013 (1), 2018
52018
Numerical simulation of shoaling internal solitary waves in two-layer fluid flow
MH Hooi, WK Tiong, KG Tay, KL Chiew
Matematika, 333-350, 2018
42018
An insertion heuristic manpower scheduling for in-flight catering service application
SN Sze, AN Suk-Fong, KL Chiew
Computational Logistics: Third International Conference, ICCL 2012, Shanghai …, 2012
42012
The system can't perform the operation now. Try again later.
Articles 1–20