Paul A. Watters

According to our database1, Paul A. Watters
  • authored at least 68 papers between 1998 and 2017.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Evaluating Accuracy in Prudence Analysis for Cyber Security.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

2016
Using Data-Driven and Process Mining Techniques for Identifying and Characterizing Problem Gamblers in New Zealand.
CSIMQ, 2016

Controlling information behaviour: the case for access control.
Behaviour & IT, 2016

REPLOT: REtrieving Profile Links On Twitter for malicious campaign discovery.
AI Commun., 2016

Peeking behind the great firewall: Privacy on Chinese file sharing networks.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Characterizing Problem Gamblers in New Zealand: A Novel Expression of Process Cubes.
Proceedings of the CAiSE'16 Forum, 2016

2015
Authorship analysis of aliases: Does topic influence accuracy?
Natural Language Engineering, 2015

Maximising Eyeballs but Facilitating Cybercrime? Ethical Challenges for Online Advertising in New Zealand.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
A methodology for estimating the tangible cost of data breaches.
J. Inf. Sec. Appl., 2014

A Systematic Approach to Measuring Advertising Transparency Online: An Australian Case Study.
Proceedings of the Second Australasian Web Conference, 2014

2013
Evaluating authorship distance methods using the positive Silhouette coefficient.
Natural Language Engineering, 2013

Automated unsupervised authorship analysis using evidence accumulation clustering.
Natural Language Engineering, 2013

Young people, child pornography, and subcultural norms on the Internet.
JASIST, 2013

Patterns of ownership of child model sites: Profiling the profiteers and consumers of child exploitation material.
First Monday, 2013

Indirect Information Linkage for OSINT through Authorship Analysis of Aliases.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2013

Local n-grams for Author Identification Notebook for PAN at CLEF 2013.
Proceedings of the Working Notes for CLEF 2013 Conference , 2013

REPLOT: REtrieving profile links on Twitter for suspicious networks detection.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Recentred local profiles for authorship attribution.
Natural Language Engineering, 2012

The Maximum Degree & Diameter-Bounded Subgraph and its Applications.
J. Math. Model. Algorithms, 2012

A Consolidated Process Model for Identity Management.
IRMJ, 2012

Unsupervised authorship analysis of phishing webpages.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMIA).
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
How much material on BitTorrent is infringing content? A case study.
Inf. Sec. Techn. Report, 2011

Social networking threats.
Inf. Sec. Techn. Report, 2011

Real-time detection of children's skin on social networking sites using Markov random field modelling.
Inf. Sec. Techn. Report, 2011

The factor structure of cybersickness.
Displays, 2011

Child face detection using age specific luminance invariant geometric descriptor.
Proceedings of the 2011 IEEE International Conference on Signal and Image Processing Applications, 2011

Cybercrime: The Case of Obfuscated Malware.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures.
Proceedings of the Ninth Australasian Data Mining Conference, AusDM 2011, Ballarat, 2011

2010
RBACS: Rootkit Behavioral Analysis and Classification System.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010

Automatically determining phishing campaigns using the USCAP methodology.
Proceedings of the 2010 eCrime Researchers Summit, 2010

Descriptive Data Mining on Fraudulent Online Dating Profiles.
Proceedings of the 18th European Conference on Information Systems, 2010

2009
Cybersickness and Anxiety During Simulated Motion: Implications for VRET.
Proceedings of the Annual Review of Cybertherapy and Telemedicine 2009, 2009

Automatically Generating Classifier for Phishing Email Prediction.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Why do users trust the wrong messages? A behavioural model of phishing.
Proceedings of the 2009 eCrime Researchers Summit, 2009

Establishing phishing provenance using orthographic features.
Proceedings of the 2009 eCrime Researchers Summit, 2009

Determining provenance in phishing websites using automated conceptual analysis.
Proceedings of the 2009 eCrime Researchers Summit, 2009

Estimating Cybersickness of Simulated Motion Using the Simulator Sickness Questionnaire (SSQ): A Controlled Study.
Proceedings of the Sixth International Conference on Computer Graphics, 2009

2008
Visual detection of LSB-encoded natural image steganography.
TAP, 2008

Forensic Characteristics of Phishing - Petty Theft or Organized Crime?
Proceedings of the WEBIST 2008, 2008

New Traceability Codes and Identification Algorithm for Tracing Pirates.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Statistics in a nutshell - a desktop quick reference.
O'Reilly, ISBN: 978-0-596-51049-7, 2008

2007
Visual Detection of High Capacity Natural Image Steganography: Is A Known Cover Effective?
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

A Novel Face Hashing Method with Feature Fusion for Biometric Cryptosystems.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007

The Efficiency of Periodic Rekeying in Dynamic Group Key Management.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007

Robustness of the New Owner-Tester Approach for Face Identification Experiments.
Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007

A New Performance Evaluation Method for Face Identification - Regression Analysis of Misidentification Risk.
Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007

Are Younger People More Difficult to Identify or Just a Peer-to-Peer Effect.
Proceedings of the Computer Analysis of Images and Patterns, 12th International Conference, 2007

2006
e-Learning for policing, intelligence and counter-terrorism: Performance.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Detecting and Tracing Copyright Infringements in P2P Networks.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

2005
Trustworthy E-mail Using Secure XML Web Services.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

Trust and authorization in the grid: a recommendation model.
Proceedings of the International Conference on Pervasive Services 2005, 2005

Visual Steganalysis of LSB-Encoded Natural Images.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Accessibility Solutions for Visually Impaired Users of Web Discussion Boards.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Identifying and Blocking Pornographic Content.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

Automated Physical Storage Provision Using a Peer-to-Peer Distributed File System.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

A Trust based Access Control Framework for P2P File-Sharing Systems.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Solving Frame-Based Accessibility Problems in Web Content Management.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

2004
Coding distributed representations of natural scenes: a comparison of orthogonal and non-orthogonal models.
Neurocomputing, 2004

Statistical and structural approaches to filtering Internet pornography.
Proceedings of the IEEE International Conference on Systems, 2004

2003
Distributed Variance In Localized Principal Components Of Whitened Natural Scenes.
IJPRAI, 2003

2002
Discriminating English Word Senses Using Cluster Analysis.
Journal of Quantitative Linguistics, 2002

Solaris 8 administrator's guide.
O'Reilly, ISBN: 978-0-596-00073-8, 2002

2000
Direct Machine Translation Systems as Dynamical Systems: The Iterative Semantic Processing (ISP) Paradigm.
Journal of Quantitative Linguistics, 2000

Time-invariant long-range correlations in electroencephalogram dynamics.
Int. J. Systems Science, 2000

1999
A Neural Network Model of Semantic Processing Errors in Parkinson's Disease.
Neural Processing Letters, 1999

Semantic processing performance of Internet machine translation systems.
Internet Research, 1999

1998
Evaluating Internet information services in the Asia-Pacific region.
Internet Research, 1998


  Loading...