The industrial internet of things (IIoT): An analysis framework H Boyes, B Hallaq, J Cunningham, T Watson Computers in industry 101, 1-12, 2018 | 1719 | 2018 |
The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence H He, C Maple, T Watson, A Tiwari, J Mehnen, Y Jin, B Gabrys 2016 IEEE congress on evolutionary computation (CEC), 1015-1021, 2016 | 189 | 2016 |
Motivation and opportunity based model to reduce information security insider threats in organisations NS Safa, C Maple, T Watson, R Von Solms Journal of information security and applications 40, 247-257, 2018 | 172 | 2018 |
Digital twins: An analysis framework and open issues H Boyes, T Watson Computers in Industry 143, 103763, 2022 | 121 | 2022 |
A logitboost-based algorithm for detecting known and unknown web attacks MH Kamarudin, C Maple, T Watson, NS Safa IEEE Access 5, 26190-26200, 2017 | 116 | 2017 |
A renewed approach to serious games for cyber security A Le Compte, D Elizondo, T Watson 2015 7th International Conference on Cyber Conflict: Architectures in …, 2015 | 113 | 2015 |
Assessment of geometric features for individual identification and verification in biometric hand systems RM Luque-Baena, D Elizondo, E López-Rubio, EJ Palomo, T Watson Expert systems with applications 40 (9), 3580-3594, 2013 | 70 | 2013 |
Quality standards for digital forensics: Learning from experience in England & Wales G Tully, N Cohen, D Compton, G Davies, R Isbell, T Watson Forensic Science International: Digital Investigation 32, 200905, 2020 | 56 | 2020 |
Hybrid feature selection technique for intrusion detection system MH Kamarudin, C Maple, T Watson International Journal of High Performance Computing and Networking 13 (2 …, 2019 | 53 | 2019 |
Application of growing hierarchical SOM for visualisation of network forensics traffic data EJ Palomo, J North, D Elizondo, RM Luque, T Watson Neural Networks 32, 275-284, 2012 | 50 | 2012 |
Application of artificial neural networks and related techniques to intrusion detection C Bitter, DA Elizondo, T Watson The 2010 International Joint Conference on Neural Networks (IJCNN), 1-8, 2010 | 47 | 2010 |
Cyber security standards and issues in V2X communications for Internet of Vehicles I Ivanov, C Maple, T Watson, S Lee IET Digital Library, 2018 | 45 | 2018 |
A taxonomy of technical attribution techniques for cyber attacks A Nicholson, T Watson, P Norris, A Duffy, R Isbell European conference on information warfare and security, 188, 2012 | 34 | 2012 |
Information security collaboration formation in organisations N Sohrabi Safa, C Maple, T Watson, S Furnell IET Information Security 12 (3), 238-245, 2018 | 21 | 2018 |
A new semantic attribute deep learning with a linguistic attribute hierarchy for spam detection H He, T Watson, C Maple, J Mehnen, A Tiwari 2017 International Joint Conference on Neural Networks (IJCNN), 3862-3869, 2017 | 18 | 2017 |
A new unified intrusion anomaly detection in identifying unseen web attacks MH Kamarudin, C Maple, T Watson, NS Safa Security and Communication Networks 2017 (1), 2539034, 2017 | 18 | 2017 |
Visualisation of network forensics traffic data with a self-organising map for qualitative features EJ Palomo, J North, D Elizondo, RM Luque, T Watson The 2011 International Joint Conference on Neural Networks, 1740-1747, 2011 | 18 | 2011 |
Threat-modeling-guided trust-based task offloading for resource-constrained Internet of Things M Bradbury, A Jhumka, T Watson, D Flores, J Burton, M Butler ACM Transactions on Sensor Networks (TOSN) 18 (2), 1-41, 2022 | 17 | 2022 |
Maritime cyber security: a global challenge tackled through distinct regional approaches S Karamperidis, C Kapalidis, T Watson Journal of Marine Science and Engineering 9 (12), 1323, 2021 | 17 | 2021 |
Packet header intrusion detection with binary logistic regression approach in detecting R2L and U2R attacks MH Kamarudin, C Maple, T Watson, H Sofian 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and …, 2015 | 17 | 2015 |