Paul A. Watters
Orcid: 0000-0002-1399-7175Affiliations:
- La Trobe University, Melbourne, Australia
- Massey University, School of Engineering & Advanced Technology
- Macquarie University, Division of Information & Computer Science
- University of Ballarat, Graduate School of Information Technology and Mathematical Sciences
According to our database1,
Paul A. Watters
authored at least 134 papers
between 1998 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on massey.ac.nz
On csauthors.net:
Bibliography
2025
Ransomware Reloaded: Re-examining Its Trend, Research and Mitigation in the Era of Data Exfiltration.
ACM Comput. Surv., January, 2025
2024
ACM Trans. Interact. Intell. Syst., September, 2024
The Inadequacy of Reinforcement Learning From Human Feedback - Radicalizing Large Language Models via Semantic Vulnerabilities.
IEEE Trans. Cogn. Dev. Syst., August, 2024
IEEE Trans. Artif. Intell., June, 2024
Over the Edge of Chaos? Excess Complexity as a Roadblock to Artificial General Intelligence.
CoRR, 2024
From COBIT to ISO 42001: Evaluating Cybersecurity Frameworks for Opportunities, Risks, and Regulatory Compliance in Commercializing Large Language Models.
CoRR, 2024
Inadequacies of Large Language Model Benchmarks in the Era of Generative Artificial Intelligence.
CoRR, 2024
From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models.
Comput. Secur., 2024
2023
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation.
Comput. Secur., November, 2023
Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware.
Future Internet, June, 2023
Comput. Secur., May, 2023
From Google Gemini to OpenAI Q* (Q-Star): A Survey of Reshaping the Generative Artificial Intelligence (AI) Research Landscape.
CoRR, 2023
AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity.
CoRR, 2023
2022
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions.
ACM Comput. Surv., 2022
Privacy-preserving cooperative localization in vehicular edge computing infrastructure.
Concurr. Comput. Pract. Exp., 2022
Concurr. Comput. Pract. Exp., 2022
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022
Proceedings of the Databases Theory and Applications, 2022
2021
A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing.
IEEE Trans. Ind. Informatics, 2021
Lightweight Mutual Authentication and Privacy-Preservation Scheme for Intelligent Wearable Devices in Industrial-CPS.
IEEE Trans. Ind. Informatics, 2021
Nat. Lang. Eng., 2021
J. Sens. Actuator Networks, 2021
Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions.
J. Netw. Comput. Appl., 2021
Intelligent Dynamic Malware Detection using Machine Learning in IP Reputation for Forensics Data Analytics.
Future Gener. Comput. Syst., 2021
Future Gener. Comput. Syst., 2021
A Mechanism to Detect and Prevent Ethereum Blockchain Smart Contract Reentrancy Attacks.
Frontiers Comput. Sci., 2021
Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware.
CoRR, 2021
Comput. Secur., 2021
Context-Aware Machine Learning and Mobile Data Analytics - Automated Rule-based Services with Intelligent Decision-Making
Springer, ISBN: 978-3-030-88530-4, 2021
2020
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.
Sensors, 2020
The Ethics of Corporate Censorship of Information-Sharing Behavior: A Nonconsequentialist Perspective.
Libr. Trends, 2020
J. Big Data, 2020
Int. J. Speech Technol., 2020
Automated measurement of attitudes towards social distancing using social media: A COVID-19 case study.
First Monday, 2020
Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control.
Future Gener. Comput. Syst., 2020
CalBehav: A Machine Learning-Based Personalized Calendar Behavioral Model Using Time-Series Smartphone Data.
Comput. J., 2020
Multi-Loss Siamese Neural Network With Batch Normalization Layer for Malware Detection.
IEEE Access, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Neural Information Processing - 27th International Conference, 2020
Proceedings of the IEEE International Conference on Informatics, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the Australasian Conference on Information Systems, 2020
2019
Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage.
J. Big Data, 2019
This would work perfectly if it weren't for all the humans: Two factor authentication in late modern societies.
First Monday, 2019
Aust. J. Intell. Inf. Process. Syst., 2019
AVOCAD: Adaptive Terrorist Comms Surveillance and Interception using Machine Learning.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Neural Information Processing - 26th International Conference, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019
2018
EAI Endorsed Trans. Security Safety, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Modelling the Efficacy of Auto-Internet Warnings to Reduce Demand for Child Exploitation Materials.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2018
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2018
Proceedings of the Neural Information Processing - 25th International Conference, 2018
Investigating Malware Epidemiology and Child Exploitation Using Algorithmic Ethnography.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
2017
Proceedings of the Neural Information Processing - 24th International Conference, 2017
2016
Future Gener. Comput. Syst., 2016
Using Data-Driven and Process Mining Techniques for Identifying and Characterizing Problem Gamblers in New Zealand.
Complex Syst. Informatics Model. Q., 2016
CoRR, 2016
Behav. Inf. Technol., 2016
AI Commun., 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the CAiSE'16 Forum, 2016
2015
Censorship is f̶u̶t̶i̶l̶e̶ possible but difficult: A study in algorithmic ethnography.
First Monday, 2015
Maximising Eyeballs but Facilitating Cybercrime? Ethical Challenges for Online Advertising in New Zealand.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
2014
J. Inf. Secur. Appl., 2014
A Systematic Approach to Measuring Advertising Transparency Online: An Australian Case Study.
Proceedings of the Second Australasian Web Conference, 2014
2013
Nat. Lang. Eng., 2013
Nat. Lang. Eng., 2013
J. Assoc. Inf. Sci. Technol., 2013
Patterns of ownership of child model sites: Profiling the profiteers and consumers of child exploitation material.
First Monday, 2013
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2013
Proceedings of the Working Notes for CLEF 2013 Conference , 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
J. Math. Model. Algorithms, 2012
Proceedings of the International Symposium on Communications and Information Technologies, 2012
Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMIA).
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2011
Inf. Secur. Tech. Rep., 2011
Real-time detection of children's skin on social networking sites using Markov random field modelling.
Inf. Secur. Tech. Rep., 2011
Comput. Law Secur. Rev., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 2011 IEEE International Conference on Signal and Image Processing Applications, 2011
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures.
Proceedings of the Ninth Australasian Data Mining Conference, AusDM 2011, Ballarat, 2011
2010
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010
Proceedings of the 2010 eCrime Researchers Summit, 2010
Proceedings of the 18th European Conference on Information Systems, 2010
2009
Proceedings of the Annual Review of Cybertherapy and Telemedicine 2009, 2009
Proceedings of the 10th International Symposium on Pervasive Systems, 2009
Proceedings of the 2009 eCrime Researchers Summit, 2009
Proceedings of the 2009 eCrime Researchers Summit, 2009
Proceedings of the 2009 eCrime Researchers Summit, 2009
Estimating Cybersickness of Simulated Motion Using the Simulator Sickness Questionnaire (SSQ): A Controlled Study.
Proceedings of the Sixth International Conference on Computer Graphics, 2009
2008
ACM Trans. Appl. Percept., 2008
Forensic Characteristics of Phishing - Petty Theft or Organized Crime?
Proceedings of the WEBIST 2008, 2008
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008
O'Reilly, ISBN: 978-0-596-51049-7, 2008
2007
Visual Detection of High Capacity Natural Image Steganography: Is A Known Cover Effective?
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007
Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007
A New Performance Evaluation Method for Face Identification - Regression Analysis of Misidentification Risk.
Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007
Proceedings of the Computer Analysis of Images and Patterns, 12th International Conference, 2007
2006
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
2005
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005
Proceedings of the International Conference on Pervasive Services 2005, 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005
2004
Coding distributed representations of natural scenes: a comparison of orthogonal and non-orthogonal models.
Neurocomputing, 2004
Proceedings of the IEEE International Conference on Systems, 2004
2003
Int. J. Pattern Recognit. Artif. Intell., 2003
2002
J. Quant. Linguistics, 2002
Solaris 8 administrator's guide.
O'Reilly, ISBN: 978-0-596-00073-8, 2002
2000
Direct Machine Translation Systems as Dynamical Systems: The Iterative Semantic Processing (ISP) Paradigm.
J. Quant. Linguistics, 2000
Int. J. Syst. Sci., 2000
1999
Neural Process. Lett., 1999
Internet Res., 1999
1998
Internet Res., 1998