Paul A. Watters - Publications

Affiliations: 
La Trobe University, Flora Hill, Victoria, Australia 
Area:
Cognitive and neural modeling
Website:
http://www.paulwatters.com/

23 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Kayes ASM, Kalaria R, Sarker IH, Islam MS, Watters PA, Ng A, Hammoudeh M, Badsha S, Kumara I. A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues. Sensors (Basel, Switzerland). 20. PMID 32349242 DOI: 10.3390/s20092464  0.655
2020 Sarker IH, Kayes ASM, Badsha S, AlQahtani H, Watters PA, Ng A. Cybersecurity data science: an overview from machine learning perspective Journal of Big Data. 7: 1-29. DOI: 10.1186/S40537-020-00318-5  0.337
2020 Hammoudeh M, Epiphaniou G, Belguith S, Unal D, Adebisi B, Baker T, Kayes ASM, Watters P. A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases Ieee Sensors Journal. 1-1. DOI: 10.1109/Jsen.2020.2981558  0.313
2020 Kayes A, Rahayu W, Watters P, Alazab M, Dillon T, Chang E. Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control Future Generation Computer Systems. 107: 307-323. DOI: 10.1016/j.future.2020.02.001  0.389
2019 Watters PA, Scolyer-Gray P, Kayes ASM, Chowdhury MJM. This would work perfectly if it weren’t for all the humans: Two factor authentication in late modern societies First Monday. 24. DOI: 10.5210/Fm.V24I7.10095  0.309
2019 Sarker IH, Kayes ASM, Watters PA. Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage Journal of Big Data. 6: 1-28. DOI: 10.1186/S40537-019-0219-Y  0.322
2019 Chowdhury MJM, Ferdous MS, Biswas K, Chowdhury N, Kayes ASM, Alazab M, Watters PA. A Comparative Analysis of Distributed Ledger Technology Platforms Ieee Access. 7: 167930-167943. DOI: 10.1109/Access.2019.2953729  0.322
2016 Watters PA, Ziegler J. Controlling information behaviour: The case for access control Behaviour and Information Technology. 35: 268-276. DOI: 10.1080/0144929X.2015.1128976  0.305
2016 Chang V, Ramachandran M, Wills G, Walters RJ, Li CS, Watters P. Editorial for FGCS special issue: Big Data in the cloud Future Generation Computer Systems. DOI: 10.1016/j.future.2016.04.007  0.355
2015 Prichard J, Watters P, Krone T, Spiranovic C, Cockburn H. Social Media Sentiment Analysis: A New Empirical Tool for Assessing Public Opinion on Crime? Current Issues in Criminal Justice. 27: 217-236. DOI: 10.1080/10345329.2015.12036042  0.313
2015 Layton R, Watters PA, Dazeley R. Authorship analysis of aliases: Does topic influence accuracy? Natural Language Engineering. 21: 497-518. DOI: 10.1017/S1351324913000272  0.316
2013 Watters PA. Modelling the effect of deception on investigations using open source intelligence (OSINT) Journal of Money Laundering Control. 16: 238-248. DOI: 10.1108/Jmlc-01-2013-0005  0.329
2012 Watters PA, McCombie S, Layton R, Pieprzyk J. Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP) Journal of Money Laundering Control. 15: 430-441. DOI: 10.1108/13685201211266015  0.329
2011 Watters PA, McCombie S. A methodology for analyzing the credential marketplace Journal of Money Laundering Control. 14: 32-43. DOI: 10.1108/13685201111098860  0.313
2011 Watters PA, Layton R, Dazeley R. How much material on BitTorrent is infringing content? A case study Information Security Technical Report. 16: 79-87. DOI: 10.1016/j.istr.2011.10.001  0.32
2011 Islam M, Watters PA, Yearwood J. Real-time detection of children's skin on social networking sites using Markov random field modelling Information Security Technical Report. 16: 51-58. DOI: 10.1016/j.istr.2011.09.004  0.304
2010 Kelarev A, Yearwood J, Watters P. Internet security applications of GröBner-Shirshov bases Asian-European Journal of Mathematics. 3: 435-442. DOI: 10.1142/S1793557110000283  0.302
2009 McCombie S, Pieprzyk J, Watters P. Cybercrime attribution: An eastern european case study Proceedings of the 7th Australian Digital Forensics Conference. 41-51. DOI: 10.4225/75/57B2880840Ccf  0.303
2006 Fong W, Lee CS, Watters PA. Using simulation for effective computer security training Journal of Policing, Intelligence and Counter Terrorism. 1: 81-92. DOI: 10.1080/18335300.2006.9686880  0.3
2004 Watters PA. Coding distributed representations of natural scenes: A comparison of orthogonal and non-orthogonal models Neurocomputing. 61: 277-289. DOI: 10.1016/j.neucom.2003.11.005  0.304
2003 Watters PA. Distributed variance in localized principal components of whitened natural scenes International Journal of Pattern Recognition and Artificial Intelligence. 17: 1431-1446. DOI: 10.1142/S0218001403002940  0.302
2000 Willmore B, Watters PA, Tolhurst DJ. A comparison of natural-image-based models of simple-cell coding. Perception. 29: 1017-40. PMID 11144817 DOI: 10.1023/A:1021339707805  0.661
1998 Watters PA, Watters MF, Carr SC. Evaluating Internet information services in the Asia-Pacific region Internet Research. 8: 266-271. DOI: 10.1108/10662249810217894  0.318
Show low-probability matches.