default search action
Tim Watson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Agnieszka Dutkowska-Zuk, Joe Bourne, Chengyuan An, Xuan Gao, Oktay Cetinkaya, Peter Novitzky, Gideon Ogunniye, Rachel Cooper, David De Roure, Julie A. McCann, Jeremy Watson, Tim Watson, Eleri Jones:
How Do Public Perceptions Affect the Security of Connected Places? A Systematic Literature Review. Inf. 15(2): 80 (2024) - [i3]Joshua Collyer, Tim Watson, Iain Phillips:
Know Your Neighborhood: General and Zero-Shot Capable Binary Function Search Powered by Call Graphlets. CoRR abs/2406.02606 (2024) - 2023
- [j16]Ignacio Fernandez De Arroyabe, Tim Watson, Olga Angelopoulou:
Cybersecurity in the Automotive Industry: A Systematic Literature Review (SLR). J. Comput. Inf. Syst. 63(3): 716-734 (2023) - [c22]Josh Collyer, Tim Watson, Iain Phillips:
FASER: Binary Code Similarity Search through the use of Intermediate Representations. CAMLIS 2023: 193-202 - [c21]Chris Hicks, Vasilios Mavroudis, Myles Foley, Thomas Davies, Kate Highnam, Tim Watson:
Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning. AISec@CCS 2023: 91-101 - [i2]Josh Collyer, Tim Watson, Iain Phillips:
FASER: Binary Code Similarity Search through the use of Intermediate Representations. CoRR abs/2310.03605 (2023) - [i1]Chris Hicks, Vasilios Mavroudis, Myles Foley, Thomas Davies, Kate Highnam, Tim Watson:
Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning. CoRR abs/2312.04940 (2023) - 2022
- [j15]Hugh Boyes, Tim Watson:
Digital twins: An analysis framework and open issues. Comput. Ind. 143: 103763 (2022) - [j14]Matthew Bradbury, Arshad Jhumka, Tim Watson:
Information management for trust computation on resource-constrained IoT devices. Future Gener. Comput. Syst. 135: 348-363 (2022) - [j13]Matthew Bradbury, Arshad Jhumka, Tim Watson, Denys A. Flores, Jonathan Burton, Matthew Butler:
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things. ACM Trans. Sens. Networks 18(2): 29:1-29:41 (2022) - [c20]Matthew Bradbury, Daniel Prince, Victoria Marcinkiewicz, Tim Watson:
Attributes and Dimensions of Trust in Secure Systems. IOT 2022: 179-186 - 2021
- [c19]Matthew Bradbury, Arshad Jhumka, Tim Watson:
Trust Trackers for Computation Offloading in Edge-Based IoT Networks. INFOCOM 2021: 1-10 - [c18]Matthew Bradbury, Arshad Jhumka, Tim Watson:
Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes. SAC 2021: 184-193 - 2020
- [j12]Gillian Tully, Neil Cohen, David Compton, Gareth Davies, Roy Isbell, Tim Watson:
Quality standards for digital forensics: Learning from experience in England & Wales. Digit. Investig. 32: 200905 (2020)
2010 – 2019
- 2019
- [j11]Nader Sohrabi Safa, Carsten Maple, Mahboobeh Haghparast, Tim Watson, Mehrdad Dianati:
An opportunistic resource management model to overcome resource-constraint in the Internet of Things. Concurr. Comput. Pract. Exp. 31(8) (2019) - [j10]Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson:
Hybrid feature selection technique for intrusion detection system. Int. J. High Perform. Comput. Netw. 13(2): 232-240 (2019) - [j9]Hu Yuan, Carsten Maple, Yi Lu, Tim Watson:
Peer-assisted location authentication and access control for wireless networks. Internet Technol. Lett. 2(1) (2019) - 2018
- [j8]Hugh Boyes, Bil Hallaq, Joe Cunningham, Tim Watson:
The industrial internet of things (IIoT): An analysis framework. Comput. Ind. 101: 1-12 (2018) - [j7]Nader Sohrabi Safa, Carsten Maple, Tim Watson, Steven Furnell:
Information security collaboration formation in organisations. IET Inf. Secur. 12(3): 238-245 (2018) - [j6]Nader Sohrabi Safa, Carsten Maple, Tim Watson, Rossouw von Solms:
Motivation and opportunity based model to reduce information security insider threats in organisations. J. Inf. Secur. Appl. 40: 247-257 (2018) - [c17]Chao Chen, Sang Woo Lee, Tim Watson, Carsten Maple, Yi Lu:
ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication. VNC 2018: 1-4 - 2017
- [j5]Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, Nader Sohrabi Safa:
A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks. IEEE Access 5: 26190-26200 (2017) - [j4]Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, Nader Sohrabi Safa:
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks. Secur. Commun. Networks 2017: 2539034:1-2539034:18 (2017) - [c16]Hongmei He, Tim Watson, Carsten Maple, Jörn Mehnen, Ashutosh Tiwari:
A new semantic attribute deep learning with a linguistic attribute hierarchy for spam detection. IJCNN 2017: 3862-3869 - [c15]Al Tariq Sheik, Carsten Maple, Tim Watson, Hussam Alhagagi, Nader Sohrabi Safa, Sang Woo Lee:
A threat based approach to computational offloading for collaborative cruise control. ICC 2017: 175:1-175:9 - [c14]Char Sample, Tim Watson, Steve E. Hutchinson, Bil Hallaq, Jennifer Cowley, Carsten Maple:
Data fidelity: Security's soft underbelly. RCIS 2017: 315-320 - [c13]Chao Chen, Sang Woo Lee, Tim Watson, Carsten Maple, Yi Lu:
CAESAR: A criticality-aware ECDSA signature verification scheme with Markov model. VNC 2017: 151-154 - 2016
- [c12]Hongmei He, Carsten Maple, Tim Watson, Ashutosh Tiwari, Jörn Mehnen, Yaochu Jin, Bogdan Gabrys:
The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. CEC 2016: 1015-1021 - [c11]Hongmei He, Ashutosh Tiwari, Jörn Mehnen, Tim Watson, Carsten Maple, Yaochu Jin, Bogdan Gabrys:
Incremental information gain analysis of input attribute impact on RBF-kernel SVM spam detection. CEC 2016: 1022-1029 - [c10]Char Sample, Jennifer Cowley, Tim Watson, Carsten Maple:
Re-thinking threat intelligence. CyCon U.S. 2016: 131-139 - 2015
- [c9]Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, Hasliza Sofian:
Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks. CyberSec 2015: 101-106 - [c8]Alexis Le Compte, David A. Elizondo, Tim Watson:
A renewed approach to serious games for cyber security. CyCon 2015: 203-216 - 2014
- [c7]Hugh Boyes, Roy Isbell, Tim Watson:
Critical Infrastructure in the Future City - Developing Secure and Resilient Cyber-Physical Systems. CRITIS 2014: 13-23 - 2013
- [j3]Rafael M. Luque-Baena, David A. Elizondo, Ezequiel López-Rubio, Esteban J. Palomo, Tim Watson:
Assessment of geometric features for individual identification and verification in biometric hand systems. Expert Syst. Appl. 40(9): 3580-3594 (2013) - [j2]David A. Elizondo, Robert Morris, Tim Watson, Benjamin N. Passow:
Constructive Recursive Deterministic Perceptron Neural Networks with Genetic Algorithms. Int. J. Pattern Recognit. Artif. Intell. 27(6) (2013) - [c6]Andrew Nicholson, Helge Janicke, Tim Watson:
An Initial Investigation into Attribution in SCADA Systems. ICS-CSR 2013 - 2012
- [j1]Esteban J. Palomo, John North, David A. Elizondo, Rafael Marcos Luque, Tim Watson:
Application of growing hierarchical SOM for visualisation of network forensics traffic data. Neural Networks 32: 275-284 (2012) - [p2]Christian Bitter, John North, David A. Elizondo, Tim Watson:
An Introduction to the Use of Neural Networks for Network Intrusion Detection. Computational Intelligence for Privacy and Security 2012: 5-24 - [p1]Esteban J. Palomo, David A. Elizondo, Enrique Domínguez, Rafael Marcos Luque, Tim Watson:
SOM-Based Techniques towards Hierarchical Visualisation of Network Forensics Traffic Data. Computational Intelligence for Privacy and Security 2012: 75-95 - 2011
- [c5]Esteban J. Palomo, John North, David A. Elizondo, Rafael Marcos Luque, Tim Watson:
Visualisation of network forensics traffic data with a self-organising map for qualitative features. IJCNN 2011: 1740-1747 - 2010
- [c4]Christian Bitter, David A. Elizondo, Tim Watson:
Application of artificial neural networks and related techniques to intrusion detection. IJCNN 2010: 1-8
2000 – 2009
- 2009
- [c3]Robert Morris, Tim Watson:
Positively versus Negatively Frequency-Dependent Selection. ECAL (2) 2009: 77-84 - 2005
- [c2]Mario Gongora, Tim Watson, David A. Elizondo:
A Novel Method for Extracting Knowledge from Neural Networks with Evolving SQL Queries. ICANN (2) 2005: 497-502 - 2003
- [b1]Tim Watson:
An investigation into cooperative behaviour : altruism and evolutionary computing. De Montfort University, Leicester, UK, 2003
1990 – 1999
- 1994
- [c1]Chris Hopkins, Tom Routen, Tim Watson:
Problems with Using Genetic Algorithms for Neural Network Feature Selection. ECAI 1994: 221-225
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint