Tim Watson

Orcid: 0000-0002-3841-3332

According to our database1, Tim Watson authored at least 43 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
How Do Public Perceptions Affect the Security of Connected Places? A Systematic Literature Review.
Inf., February, 2024

Know Your Neighborhood: General and Zero-Shot Capable Binary Function Search Powered by Call Graphlets.
CoRR, 2024

2023
Cybersecurity in the Automotive Industry: A Systematic Literature Review (SLR).
J. Comput. Inf. Syst., May, 2023

Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

FASER: Binary Code Similarity Search through the use of Intermediate Representations.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2023

2022
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things.
ACM Trans. Sens. Networks, 2022

Information management for trust computation on resource-constrained IoT devices.
Future Gener. Comput. Syst., 2022

Digital twins: An analysis framework and open issues.
Comput. Ind., 2022

Attributes and Dimensions of Trust in Secure Systems.
Proceedings of the 12th International Conference on the Internet of Things, 2022

2021
Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Trust Trackers for Computation Offloading in Edge-Based IoT Networks.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2020
Quality standards for digital forensics: Learning from experience in England & Wales.
Digit. Investig., 2020

2019
Peer-assisted location authentication and access control for wireless networks.
Internet Technol. Lett., 2019

Hybrid feature selection technique for intrusion detection system.
Int. J. High Perform. Comput. Netw., 2019

An opportunistic resource management model to overcome resource-constraint in the Internet of Things.
Concurr. Comput. Pract. Exp., 2019

2018
Motivation and opportunity based model to reduce information security insider threats in organisations.
J. Inf. Secur. Appl., 2018

Information security collaboration formation in organisations.
IET Inf. Secur., 2018

The industrial internet of things (IIoT): An analysis framework.
Comput. Ind., 2018

ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

2017
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks.
Secur. Commun. Networks, 2017

A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks.
IEEE Access, 2017

CAESAR: A criticality-aware ECDSA signature verification scheme with Markov model.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Data fidelity: Security's soft underbelly.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

A threat based approach to computational offloading for collaborative cruise control.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

A new semantic attribute deep learning with a linguistic attribute hierarchy for spam detection.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

2016
Re-thinking threat intelligence.
Proceedings of the 2016 International Conference on Cyber Conflict, 2016

Incremental information gain analysis of input attribute impact on RBF-kernel SVM spam detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

2015
A renewed approach to serious games for cyber security.
Proceedings of the 7th International Conference on Cyber Conflict: Architectures in Cyberspace, 2015

Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks.
Proceedings of the Fourth International Conference on Cyber Security, 2015

2014
Critical Infrastructure in the Future City - Developing Secure and Resilient Cyber-Physical Systems.
Proceedings of the Critical Information Infrastructures Security, 2014

2013
Constructive Recursive Deterministic Perceptron Neural Networks with Genetic Algorithms.
Int. J. Pattern Recognit. Artif. Intell., 2013

Assessment of geometric features for individual identification and verification in biometric hand systems.
Expert Syst. Appl., 2013

An Initial Investigation into Attribution in SCADA Systems.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

2012
SOM-Based Techniques towards Hierarchical Visualisation of Network Forensics Traffic Data.
Proceedings of the Computational Intelligence for Privacy and Security, 2012

An Introduction to the Use of Neural Networks for Network Intrusion Detection.
Proceedings of the Computational Intelligence for Privacy and Security, 2012

Application of growing hierarchical SOM for visualisation of network forensics traffic data.
Neural Networks, 2012

2011
Visualisation of network forensics traffic data with a self-organising map for qualitative features.
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011

2010
Application of artificial neural networks and related techniques to intrusion detection.
Proceedings of the International Joint Conference on Neural Networks, 2010

2009
Positively versus Negatively Frequency-Dependent Selection.
Proceedings of the Advances in Artificial Life. Darwin Meets von Neumann, 2009

2005
A Novel Method for Extracting Knowledge from Neural Networks with Evolving SQL Queries.
Proceedings of the Artificial Neural Networks: Formal Models and Their Applications, 2005

2003
An investigation into cooperative behaviour : altruism and evolutionary computing.
PhD thesis, 2003

1994
Problems with Using Genetic Algorithms for Neural Network Feature Selection.
Proceedings of the Eleventh European Conference on Artificial Intelligence, 1994


  Loading...