Paul A. Watters

Orcid: 0000-0002-1399-7175

Affiliations:
  • La Trobe University, Melbourne, Australia
  • Massey University, School of Engineering & Advanced Technology
  • Macquarie University, Division of Information & Computer Science
  • University of Ballarat, Graduate School of Information Technology and Mathematical Sciences


According to our database1, Paul A. Watters authored at least 127 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
From COBIT to ISO 42001: Evaluating Cybersecurity Frameworks for Opportunities, Risks, and Regulatory Compliance in Commercializing Large Language Models.
CoRR, 2024

Inadequacies of Large Language Model Benchmarks in the Era of Generative Artificial Intelligence.
CoRR, 2024

2023
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation.
Comput. Secur., November, 2023

Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware.
Future Internet, June, 2023

Applying staged event-driven access control to combat ransomware.
Comput. Secur., May, 2023

From Google Gemini to OpenAI Q* (Q-Star): A Survey of Reshaping the Generative Artificial Intelligence (AI) Research Landscape.
CoRR, 2023

AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity.
CoRR, 2023

Counterintelligence in a Cyber World
Springer, ISBN: 978-3-031-35286-7, 2023

2022
Creating Honeypots to Prevent Online Child Exploitation.
Future Internet, 2022

Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions.
ACM Comput. Surv., 2022

Privacy-preserving cooperative localization in vehicular edge computing infrastructure.
Concurr. Comput. Pract. Exp., 2022

A deep learning model for mining and detecting causally related events in tweets.
Concurr. Comput. Pract. Exp., 2022

Spam Email Categorization with NLP and Using Federated Deep Learning.
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022

Enhancing System Security by Intrusion Detection Using Deep Learning.
Proceedings of the Databases Theory and Applications, 2022

2021
A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing.
IEEE Trans. Ind. Informatics, 2021

Lightweight Mutual Authentication and Privacy-Preservation Scheme for Intelligent Wearable Devices in Industrial-CPS.
IEEE Trans. Ind. Informatics, 2021

Improving speech emotion recognition based on acoustic words emotion dictionary.
Nat. Lang. Eng., 2021

Special Issue "Security Threats and Countermeasures in Cyber-Physical Systems".
J. Sens. Actuator Networks, 2021

Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions.
J. Netw. Comput. Appl., 2021

Intelligent Dynamic Malware Detection using Machine Learning in IP Reputation for Forensics Data Analytics.
Future Gener. Comput. Syst., 2021

Enforcing situation-aware access control to build malware-resilient file systems.
Future Gener. Comput. Syst., 2021

A Mechanism to Detect and Prevent Ethereum Blockchain Smart Contract Reentrancy Attacks.
Frontiers Comput. Sci., 2021

Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware.
CoRR, 2021

Dynamic user-centric access control for detection of ransomware attacks.
Comput. Secur., 2021

2020
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.
Sensors, 2020

The Ethics of Corporate Censorship of Information-Sharing Behavior: A Nonconsequentialist Perspective.
Libr. Trends, 2020

Introduction: The Role of Censorship in Late Modern Societies.
Libr. Trends, 2020

Cybersecurity data science: an overview from machine learning perspective.
J. Big Data, 2020

Significance of Phonological Features in Speech Emotion Recognition.
Int. J. Speech Technol., 2020

Automated measurement of attitudes towards social distancing using social media: A COVID-19 case study.
First Monday, 2020

Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control.
Future Gener. Comput. Syst., 2020

CalBehav: A Machine Learning-Based Personalized Calendar Behavioral Model Using Time-Series Smartphone Data.
Comput. J., 2020

Multi-Loss Siamese Neural Network With Batch Normalization Layer for Malware Detection.
IEEE Access, 2020

Answering Binary Causal Questions: A Transfer Learning Based Approach.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

API Based Discrimination of Ransomware and Benign Cryptographic Programs.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

Responsibility Attribution Against Data Breaches.
Proceedings of the IEEE International Conference on Informatics, 2020

Patient Controlled, Privacy Preserving IoT Healthcare Data Sharing Framework.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Neurodiverse Knowledge, Skills and Ability Assessment for Cyber Security.
Proceedings of the Australasian Conference on Information Systems, 2020

2019
Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage.
J. Big Data, 2019

This would work perfectly if it weren't for all the humans: Two factor authentication in late modern societies.
First Monday, 2019

Masquerade Attacks Against Security Software Exclusion Lists.
Aust. J. Intell. Inf. Process. Syst., 2019

A Comparative Analysis of Distributed Ledger Technology Platforms.
IEEE Access, 2019

AVOCAD: Adaptive Terrorist Comms Surveillance and Interception using Machine Learning.
Proceedings of the 18th IEEE International Conference On Trust, 2019

The Inadequacy of Entropy-Based Ransomware Detection.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Trust Modeling for Blockchain-Based Wearable Data Market.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2018
Human-centered strategies for cyber-physical systems security.
EAI Endorsed Trans. Security Safety, 2018

Steganographic Transports: A Vector for Hidden Secret Internets?
Proceedings of the 17th IEEE International Conference On Trust, 2018

Measuring Personal Privacy Breaches Using Third-Party Trackers.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Modelling the Efficacy of Auto-Internet Warnings to Reduce Demand for Child Exploitation Materials.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2018

Rapid Anomaly Detection Using Integrated Prudence Analysis (IPA).
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2018

Large Scale Behavioral Analysis of Ransomware Attacks.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Investigating Malware Epidemiology and Child Exploitation Using Algorithmic Ethnography.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Clustering Student Participation: Implications for Education.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
Evaluating Accuracy in Prudence Analysis for Cyber Security.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

2016
Editorial for FGCS special issue: Big Data in the cloud.
Future Gener. Comput. Syst., 2016

Using Data-Driven and Process Mining Techniques for Identifying and Characterizing Problem Gamblers in New Zealand.
Complex Syst. Informatics Model. Q., 2016

Investigation of Audience Interaction Tools from the Perspective of Activity Theory.
CoRR, 2016

Controlling information behaviour: the case for access control.
Behav. Inf. Technol., 2016

REPLOT: REtrieving Profile Links On Twitter for malicious campaign discovery.
AI Commun., 2016

Peeking behind the great firewall: Privacy on Chinese file sharing networks.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Characterizing Problem Gamblers in New Zealand: A Novel Expression of Process Cubes.
Proceedings of the CAiSE'16 Forum, 2016

2015
Authorship analysis of aliases: Does topic influence accuracy?
Nat. Lang. Eng., 2015

Censorship is f̶u̶t̶i̶l̶e̶ possible but difficult: A study in algorithmic ethnography.
First Monday, 2015

Maximising Eyeballs but Facilitating Cybercrime? Ethical Challenges for Online Advertising in New Zealand.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
A methodology for estimating the tangible cost of data breaches.
J. Inf. Secur. Appl., 2014

A Systematic Approach to Measuring Advertising Transparency Online: An Australian Case Study.
Proceedings of the Second Australasian Web Conference, 2014

2013
Evaluating authorship distance methods using the positive Silhouette coefficient.
Nat. Lang. Eng., 2013

Automated unsupervised authorship analysis using evidence accumulation clustering.
Nat. Lang. Eng., 2013

Young people, child pornography, and subcultural norms on the Internet.
J. Assoc. Inf. Sci. Technol., 2013

Patterns of ownership of child model sites: Profiling the profiteers and consumers of child exploitation material.
First Monday, 2013

Indirect Information Linkage for OSINT through Authorship Analysis of Aliases.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2013

Local n-grams for Author Identification Notebook for PAN at CLEF 2013.
Proceedings of the Working Notes for CLEF 2013 Conference , 2013

REPLOT: REtrieving profile links on Twitter for suspicious networks detection.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Recentred local profiles for authorship attribution.
Nat. Lang. Eng., 2012

The Maximum Degree & Diameter-Bounded Subgraph and its Applications.
J. Math. Model. Algorithms, 2012

A Consolidated Process Model for Identity Management.
Inf. Resour. Manag. J., 2012

Unsupervised authorship analysis of phishing webpages.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMIA).
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
How much material on BitTorrent is infringing content? A case study.
Inf. Secur. Tech. Rep., 2011

Social networking threats.
Inf. Secur. Tech. Rep., 2011

Real-time detection of children's skin on social networking sites using Markov random field modelling.
Inf. Secur. Tech. Rep., 2011

The factor structure of cybersickness.
Displays, 2011

Internet subcultures and pathways to the use of child pornography.
Comput. Law Secur. Rev., 2011

A Survey on Latest Botnet Attack and Defense.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Child face detection using age specific luminance invariant geometric descriptor.
Proceedings of the 2011 IEEE International Conference on Signal and Image Processing Applications, 2011

Cybercrime: The Case of Obfuscated Malware.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures.
Proceedings of the Ninth Australasian Data Mining Conference, AusDM 2011, Ballarat, 2011

2010
RBACS: Rootkit Behavioral Analysis and Classification System.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010

Automatically determining phishing campaigns using the USCAP methodology.
Proceedings of the 2010 eCrime Researchers Summit, 2010

Descriptive Data Mining on Fraudulent Online Dating Profiles.
Proceedings of the 18th European Conference on Information Systems, 2010

2009
Cybersickness and Anxiety During Simulated Motion: Implications for VRET.
Proceedings of the Annual Review of Cybertherapy and Telemedicine 2009, 2009

Automatically Generating Classifier for Phishing Email Prediction.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Why do users trust the wrong messages? A behavioural model of phishing.
Proceedings of the 2009 eCrime Researchers Summit, 2009

Establishing phishing provenance using orthographic features.
Proceedings of the 2009 eCrime Researchers Summit, 2009

Determining provenance in phishing websites using automated conceptual analysis.
Proceedings of the 2009 eCrime Researchers Summit, 2009

Estimating Cybersickness of Simulated Motion Using the Simulator Sickness Questionnaire (SSQ): A Controlled Study.
Proceedings of the Sixth International Conference on Computer Graphics, 2009

2008
Visual detection of LSB-encoded natural image steganography.
ACM Trans. Appl. Percept., 2008

Forensic Characteristics of Phishing - Petty Theft or Organized Crime?
Proceedings of the WEBIST 2008, 2008

New Traceability Codes and Identification Algorithm for Tracing Pirates.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Statistics in a nutshell - a desktop quick reference.
O'Reilly, ISBN: 978-0-596-51049-7, 2008

2007
Visual Detection of High Capacity Natural Image Steganography: Is A Known Cover Effective?
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

A Novel Face Hashing Method with Feature Fusion for Biometric Cryptosystems.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007

The Efficiency of Periodic Rekeying in Dynamic Group Key Management.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007

Robustness of the New Owner-Tester Approach for Face Identification Experiments.
Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007

A New Performance Evaluation Method for Face Identification - Regression Analysis of Misidentification Risk.
Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007

Are Younger People More Difficult to Identify or Just a Peer-to-Peer Effect.
Proceedings of the Computer Analysis of Images and Patterns, 12th International Conference, 2007

2006
e-Learning for policing, intelligence and counter-terrorism: Performance.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Detecting and Tracing Copyright Infringements in P2P Networks.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

2005
Trustworthy E-mail Using Secure XML Web Services.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

Trust and authorization in the grid: a recommendation model.
Proceedings of the International Conference on Pervasive Services 2005, 2005

Visual Steganalysis of LSB-Encoded Natural Images.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Accessibility Solutions for Visually Impaired Users of Web Discussion Boards.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Identifying and Blocking Pornographic Content.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

Automated Physical Storage Provision Using a Peer-to-Peer Distributed File System.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

A Trust based Access Control Framework for P2P File-Sharing Systems.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Solving Frame-Based Accessibility Problems in Web Content Management.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

2004
Coding distributed representations of natural scenes: a comparison of orthogonal and non-orthogonal models.
Neurocomputing, 2004

Statistical and structural approaches to filtering Internet pornography.
Proceedings of the IEEE International Conference on Systems, 2004

2003
Distributed Variance In Localized Principal Components Of Whitened Natural Scenes.
Int. J. Pattern Recognit. Artif. Intell., 2003

2002
Discriminating English Word Senses Using Cluster Analysis.
J. Quant. Linguistics, 2002

Solaris 8 administrator's guide.
O'Reilly, ISBN: 978-0-596-00073-8, 2002

2000
Direct Machine Translation Systems as Dynamical Systems: The Iterative Semantic Processing (ISP) Paradigm.
J. Quant. Linguistics, 2000

Time-invariant long-range correlations in electroencephalogram dynamics.
Int. J. Syst. Sci., 2000

1999
A Neural Network Model of Semantic Processing Errors in Parkinson's Disease.
Neural Process. Lett., 1999

Semantic processing performance of Internet machine translation systems.
Internet Res., 1999

1998
Evaluating Internet information services in the Asia-Pacific region.
Internet Res., 1998


  Loading...