Tim Watson

According to our database1, Tim Watson authored at least 31 papers between 1994 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Peer-assisted location authentication and access control for wireless networks.
Internet Technol. Lett., 2019

Hybrid feature selection technique for intrusion detection system.
IJHPCN, 2019

An opportunistic resource management model to overcome resource-constraint in the Internet of Things.
Concurrency and Computation: Practice and Experience, 2019

2018
Motivation and opportunity based model to reduce information security insider threats in organisations.
J. Inf. Sec. Appl., 2018

Information security collaboration formation in organisations.
IET Information Security, 2018

The industrial internet of things (IIoT): An analysis framework.
Computers in Industry, 2018

ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

2017
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks.
Security and Communication Networks, 2017

A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks.
IEEE Access, 2017

CAESAR: A criticality-aware ECDSA signature verification scheme with Markov model.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Data fidelity: Security's soft underbelly.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

A threat based approach to computational offloading for collaborative cruise control.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

A new semantic attribute deep learning with a linguistic attribute hierarchy for spam detection.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

2016
Re-thinking threat intelligence.
Proceedings of the 2016 International Conference on Cyber Conflict, 2016

Incremental information gain analysis of input attribute impact on RBF-kernel SVM spam detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

2015
A renewed approach to serious games for cyber security.
Proceedings of the 7th International Conference on Cyber Conflict: Architectures in Cyberspace, 2015

Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks.
Proceedings of the Fourth International Conference on Cyber Security, 2015

2014
Critical Infrastructure in the Future City - Developing Secure and Resilient Cyber-Physical Systems.
Proceedings of the Critical Information Infrastructures Security, 2014

2013
Constructive Recursive Deterministic Perceptron Neural Networks with Genetic Algorithms.
IJPRAI, 2013

Assessment of geometric features for individual identification and verification in biometric hand systems.
Expert Syst. Appl., 2013

An Initial Investigation into Attribution in SCADA Systems.
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013

2012
SOM-Based Techniques towards Hierarchical Visualisation of Network Forensics Traffic Data.
Proceedings of the Computational Intelligence for Privacy and Security, 2012

An Introduction to the Use of Neural Networks for Network Intrusion Detection.
Proceedings of the Computational Intelligence for Privacy and Security, 2012

Application of growing hierarchical SOM for visualisation of network forensics traffic data.
Neural Networks, 2012

2011
Visualisation of network forensics traffic data with a self-organising map for qualitative features.
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011

2010
Application of artificial neural networks and related techniques to intrusion detection.
Proceedings of the International Joint Conference on Neural Networks, 2010

2009
Positively versus Negatively Frequency-Dependent Selection.
Proceedings of the Advances in Artificial Life. Darwin Meets von Neumann, 2009

2005
A Novel Method for Extracting Knowledge from Neural Networks with Evolving SQL Queries.
Proceedings of the Artificial Neural Networks: Formal Models and Their Applications, 2005

2003
An investigation into cooperative behaviour : altruism and evolutionary computing.
PhD thesis, 2003

1994
Problems with Using Genetic Algorithms for Neural Network Feature Selection.
ECAI, 1994


  Loading...