Year |
Citation |
Score |
2020 |
Kayes ASM, Kalaria R, Sarker IH, Islam MS, Watters PA, Ng A, Hammoudeh M, Badsha S, Kumara I. A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues. Sensors (Basel, Switzerland). 20. PMID 32349242 DOI: 10.3390/s20092464 |
0.655 |
|
2020 |
Sarker IH, Kayes ASM, Badsha S, AlQahtani H, Watters PA, Ng A. Cybersecurity data science: an overview from machine learning perspective Journal of Big Data. 7: 1-29. DOI: 10.1186/S40537-020-00318-5 |
0.337 |
|
2020 |
Hammoudeh M, Epiphaniou G, Belguith S, Unal D, Adebisi B, Baker T, Kayes ASM, Watters P. A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases Ieee Sensors Journal. 1-1. DOI: 10.1109/Jsen.2020.2981558 |
0.313 |
|
2020 |
Kayes A, Rahayu W, Watters P, Alazab M, Dillon T, Chang E. Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control Future Generation Computer Systems. 107: 307-323. DOI: 10.1016/j.future.2020.02.001 |
0.389 |
|
2019 |
Watters PA, Scolyer-Gray P, Kayes ASM, Chowdhury MJM. This would work perfectly if it weren’t for all the humans: Two factor authentication in late modern societies First Monday. 24. DOI: 10.5210/Fm.V24I7.10095 |
0.309 |
|
2019 |
Sarker IH, Kayes ASM, Watters PA. Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage Journal of Big Data. 6: 1-28. DOI: 10.1186/S40537-019-0219-Y |
0.322 |
|
2019 |
Chowdhury MJM, Ferdous MS, Biswas K, Chowdhury N, Kayes ASM, Alazab M, Watters PA. A Comparative Analysis of Distributed Ledger Technology Platforms Ieee Access. 7: 167930-167943. DOI: 10.1109/Access.2019.2953729 |
0.322 |
|
2016 |
Watters PA, Ziegler J. Controlling information behaviour: The case for access control Behaviour and Information Technology. 35: 268-276. DOI: 10.1080/0144929X.2015.1128976 |
0.305 |
|
2016 |
Chang V, Ramachandran M, Wills G, Walters RJ, Li CS, Watters P. Editorial for FGCS special issue: Big Data in the cloud Future Generation Computer Systems. DOI: 10.1016/j.future.2016.04.007 |
0.355 |
|
2015 |
Prichard J, Watters P, Krone T, Spiranovic C, Cockburn H. Social Media Sentiment Analysis: A New Empirical Tool for Assessing Public Opinion on Crime? Current Issues in Criminal Justice. 27: 217-236. DOI: 10.1080/10345329.2015.12036042 |
0.313 |
|
2015 |
Layton R, Watters PA, Dazeley R. Authorship analysis of aliases: Does topic influence accuracy? Natural Language Engineering. 21: 497-518. DOI: 10.1017/S1351324913000272 |
0.316 |
|
2013 |
Watters PA. Modelling the effect of deception on investigations using open source intelligence (OSINT) Journal of Money Laundering Control. 16: 238-248. DOI: 10.1108/Jmlc-01-2013-0005 |
0.329 |
|
2012 |
Watters PA, McCombie S, Layton R, Pieprzyk J. Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP) Journal of Money Laundering Control. 15: 430-441. DOI: 10.1108/13685201211266015 |
0.329 |
|
2011 |
Watters PA, McCombie S. A methodology for analyzing the credential marketplace Journal of Money Laundering Control. 14: 32-43. DOI: 10.1108/13685201111098860 |
0.313 |
|
2011 |
Watters PA, Layton R, Dazeley R. How much material on BitTorrent is infringing content? A case study Information Security Technical Report. 16: 79-87. DOI: 10.1016/j.istr.2011.10.001 |
0.32 |
|
2011 |
Islam M, Watters PA, Yearwood J. Real-time detection of children's skin on social networking sites using Markov random field modelling Information Security Technical Report. 16: 51-58. DOI: 10.1016/j.istr.2011.09.004 |
0.304 |
|
2010 |
Kelarev A, Yearwood J, Watters P. Internet security applications of GröBner-Shirshov bases Asian-European Journal of Mathematics. 3: 435-442. DOI: 10.1142/S1793557110000283 |
0.302 |
|
2009 |
McCombie S, Pieprzyk J, Watters P. Cybercrime attribution: An eastern european case study Proceedings of the 7th Australian Digital Forensics Conference. 41-51. DOI: 10.4225/75/57B2880840Ccf |
0.303 |
|
2006 |
Fong W, Lee CS, Watters PA. Using simulation for effective computer security training Journal of Policing, Intelligence and Counter Terrorism. 1: 81-92. DOI: 10.1080/18335300.2006.9686880 |
0.3 |
|
2004 |
Watters PA. Coding distributed representations of natural scenes: A comparison of orthogonal and non-orthogonal models Neurocomputing. 61: 277-289. DOI: 10.1016/j.neucom.2003.11.005 |
0.304 |
|
2003 |
Watters PA. Distributed variance in localized principal components of whitened natural scenes International Journal of Pattern Recognition and Artificial Intelligence. 17: 1431-1446. DOI: 10.1142/S0218001403002940 |
0.302 |
|
2000 |
Willmore B, Watters PA, Tolhurst DJ. A comparison of natural-image-based models of simple-cell coding. Perception. 29: 1017-40. PMID 11144817 DOI: 10.1023/A:1021339707805 |
0.661 |
|
1998 |
Watters PA, Watters MF, Carr SC. Evaluating Internet information services in the Asia-Pacific region Internet Research. 8: 266-271. DOI: 10.1108/10662249810217894 |
0.318 |
|
Show low-probability matches. |