Timothy R. McIntosh

Orcid: 0000-0003-0836-4266

According to our database1, Timothy R. McIntosh authored at least 14 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
From COBIT to ISO 42001: Evaluating Cybersecurity Frameworks for Opportunities, Risks, and Regulatory Compliance in Commercializing Large Language Models.
CoRR, 2024

Inadequacies of Large Language Model Benchmarks in the Era of Generative Artificial Intelligence.
CoRR, 2024

2023
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation.
Comput. Secur., November, 2023

Applying staged event-driven access control to combat ransomware.
Comput. Secur., May, 2023

Towards a Universal Privacy Model for Electronic Health Record Systems: An Ontology and Machine Learning Approach.
Informatics, 2023

From Google Gemini to OpenAI Q* (Q-Star): A Survey of Reshaping the Generative Artificial Intelligence (AI) Research Landscape.
CoRR, 2023

2022
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions.
ACM Comput. Surv., 2022

2021
Enforcing situation-aware access control to build malware-resilient file systems.
Future Gener. Comput. Syst., 2021

Dynamic user-centric access control for detection of ransomware attacks.
Comput. Secur., 2021

MSD-Kmeans: A Hybrid Algorithm for Efficient Detection of Global and Local Outliers.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

2019
MSD-Kmeans: A Novel Algorithm for Efficient Detection of Global and Local Outliers.
CoRR, 2019

Masquerade Attacks Against Security Software Exclusion Lists.
Aust. J. Intell. Inf. Process. Syst., 2019

The Inadequacy of Entropy-Based Ransomware Detection.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

2018
Large Scale Behavioral Analysis of Ransomware Attacks.
Proceedings of the Neural Information Processing - 25th International Conference, 2018


  Loading...