Tim Watson
Orcid: 0000-0002-3841-3332
According to our database1,
Tim Watson
authored at least 43 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
How Do Public Perceptions Affect the Security of Connected Places? A Systematic Literature Review.
Inf., February, 2024
Know Your Neighborhood: General and Zero-Shot Capable Binary Function Search Powered by Call Graphlets.
CoRR, 2024
2023
J. Comput. Inf. Syst., May, 2023
Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
FASER: Binary Code Similarity Search through the use of Intermediate Representations.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2023
2022
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things.
ACM Trans. Sens. Networks, 2022
Future Gener. Comput. Syst., 2022
Proceedings of the 12th International Conference on the Internet of Things, 2022
2021
Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
2020
Quality standards for digital forensics: Learning from experience in England & Wales.
Digit. Investig., 2020
2019
Internet Technol. Lett., 2019
Int. J. High Perform. Comput. Netw., 2019
An opportunistic resource management model to overcome resource-constraint in the Internet of Things.
Concurr. Comput. Pract. Exp., 2019
2018
Motivation and opportunity based model to reduce information security insider threats in organisations.
J. Inf. Secur. Appl., 2018
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018
2017
Secur. Commun. Networks, 2017
IEEE Access, 2017
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017
A threat based approach to computational offloading for collaborative cruise control.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
A new semantic attribute deep learning with a linguistic attribute hierarchy for spam detection.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
2016
Proceedings of the 2016 International Conference on Cyber Conflict, 2016
Incremental information gain analysis of input attribute impact on RBF-kernel SVM spam detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016
The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016
2015
Proceedings of the 7th International Conference on Cyber Conflict: Architectures in Cyberspace, 2015
Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks.
Proceedings of the Fourth International Conference on Cyber Security, 2015
2014
Critical Infrastructure in the Future City - Developing Secure and Resilient Cyber-Physical Systems.
Proceedings of the Critical Information Infrastructures Security, 2014
2013
Constructive Recursive Deterministic Perceptron Neural Networks with Genetic Algorithms.
Int. J. Pattern Recognit. Artif. Intell., 2013
Assessment of geometric features for individual identification and verification in biometric hand systems.
Expert Syst. Appl., 2013
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013
2012
SOM-Based Techniques towards Hierarchical Visualisation of Network Forensics Traffic Data.
Proceedings of the Computational Intelligence for Privacy and Security, 2012
Proceedings of the Computational Intelligence for Privacy and Security, 2012
Application of growing hierarchical SOM for visualisation of network forensics traffic data.
Neural Networks, 2012
2011
Visualisation of network forensics traffic data with a self-organising map for qualitative features.
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011
2010
Application of artificial neural networks and related techniques to intrusion detection.
Proceedings of the International Joint Conference on Neural Networks, 2010
2009
Proceedings of the Advances in Artificial Life. Darwin Meets von Neumann, 2009
2005
A Novel Method for Extracting Knowledge from Neural Networks with Evolving SQL Queries.
Proceedings of the Artificial Neural Networks: Formal Models and Their Applications, 2005
2003
PhD thesis, 2003
1994
Problems with Using Genetic Algorithms for Neural Network Feature Selection.
Proceedings of the Eleventh European Conference on Artificial Intelligence, 1994