Choon Lin Tan

Learn More
This paper proposes a phishing detection technique based on the difference between the target and actual identities of a webpage. The proposed phishing detection approach, called PhishWHO, can be divided into three phases. The first phase extracts identity keywords from the textual contents of the website, where a novel weighted URL tokens system based on(More)
In this paper, we propose an anti-phishing technique to safeguard users against phishing attacks in the internet. The scope of our study focuses primarily on the detection of phishing websites with English content. In order to convince users on whom the website claims to be, phishers normally place brand names in different parts of the URL. We exploit this(More)
In this paper, twenty well known data mining classification methods are applied on ten UCI machine learning medical datasets and the performance of various classification methods are empirically compared while varying the number of categorical and numeric attributes, the types of attributes and the number of instances in datasets. In the performance study,(More)
This manuscript describes a computational approach to identify synthetic lethality genes in p53 mutant cancers samples using microarray data (NCI-60) and RNA-seq data (glioblastoma multiforme from TCGA). The authors performed functional analysis by cross-checking the identified candidate genes with published literatures, and found that some of the genes(More)
This thesis considers two problems related to turbomachinery tip clearance flows, a generic study of a vortex core in an adverse pressure gradient, and an examination of clearance flow blockage in a transonic rotor for both smooth wall and casing treatment. To address the first issue, an experimental study was carried out to examine vortex core flows in(More)
  • 1