Seguir
Tim Watson
Tim Watson
Professor of Cyber Security, Loughborough University
Dirección de correo verificada de lboro.ac.uk
Título
Citado por
Citado por
Año
The industrial internet of things (IIoT): An analysis framework
H Boyes, B Hallaq, J Cunningham, T Watson
Computers in industry 101, 1-12, 2018
17192018
The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence
H He, C Maple, T Watson, A Tiwari, J Mehnen, Y Jin, B Gabrys
2016 IEEE congress on evolutionary computation (CEC), 1015-1021, 2016
1892016
Motivation and opportunity based model to reduce information security insider threats in organisations
NS Safa, C Maple, T Watson, R Von Solms
Journal of information security and applications 40, 247-257, 2018
1722018
Digital twins: An analysis framework and open issues
H Boyes, T Watson
Computers in Industry 143, 103763, 2022
1212022
A logitboost-based algorithm for detecting known and unknown web attacks
MH Kamarudin, C Maple, T Watson, NS Safa
IEEE Access 5, 26190-26200, 2017
1162017
A renewed approach to serious games for cyber security
A Le Compte, D Elizondo, T Watson
2015 7th International Conference on Cyber Conflict: Architectures in …, 2015
1132015
Assessment of geometric features for individual identification and verification in biometric hand systems
RM Luque-Baena, D Elizondo, E López-Rubio, EJ Palomo, T Watson
Expert systems with applications 40 (9), 3580-3594, 2013
702013
Quality standards for digital forensics: Learning from experience in England & Wales
G Tully, N Cohen, D Compton, G Davies, R Isbell, T Watson
Forensic Science International: Digital Investigation 32, 200905, 2020
562020
Hybrid feature selection technique for intrusion detection system
MH Kamarudin, C Maple, T Watson
International Journal of High Performance Computing and Networking 13 (2 …, 2019
532019
Application of growing hierarchical SOM for visualisation of network forensics traffic data
EJ Palomo, J North, D Elizondo, RM Luque, T Watson
Neural Networks 32, 275-284, 2012
502012
Application of artificial neural networks and related techniques to intrusion detection
C Bitter, DA Elizondo, T Watson
The 2010 International Joint Conference on Neural Networks (IJCNN), 1-8, 2010
472010
Cyber security standards and issues in V2X communications for Internet of Vehicles
I Ivanov, C Maple, T Watson, S Lee
IET Digital Library, 2018
452018
A taxonomy of technical attribution techniques for cyber attacks
A Nicholson, T Watson, P Norris, A Duffy, R Isbell
European conference on information warfare and security, 188, 2012
342012
Information security collaboration formation in organisations
N Sohrabi Safa, C Maple, T Watson, S Furnell
IET Information Security 12 (3), 238-245, 2018
212018
A new semantic attribute deep learning with a linguistic attribute hierarchy for spam detection
H He, T Watson, C Maple, J Mehnen, A Tiwari
2017 International Joint Conference on Neural Networks (IJCNN), 3862-3869, 2017
182017
A new unified intrusion anomaly detection in identifying unseen web attacks
MH Kamarudin, C Maple, T Watson, NS Safa
Security and Communication Networks 2017 (1), 2539034, 2017
182017
Visualisation of network forensics traffic data with a self-organising map for qualitative features
EJ Palomo, J North, D Elizondo, RM Luque, T Watson
The 2011 International Joint Conference on Neural Networks, 1740-1747, 2011
182011
Threat-modeling-guided trust-based task offloading for resource-constrained Internet of Things
M Bradbury, A Jhumka, T Watson, D Flores, J Burton, M Butler
ACM Transactions on Sensor Networks (TOSN) 18 (2), 1-41, 2022
172022
Maritime cyber security: a global challenge tackled through distinct regional approaches
S Karamperidis, C Kapalidis, T Watson
Journal of Marine Science and Engineering 9 (12), 1323, 2021
172021
Packet header intrusion detection with binary logistic regression approach in detecting R2L and U2R attacks
MH Kamarudin, C Maple, T Watson, H Sofian
2015 Fourth International Conference on Cyber Security, Cyber Warfare, and …, 2015
172015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20