default search action
Paul A. Watters
Person information
- affiliation: La Trobe University, Melbourne, Australia
- affiliation: Massey University, School of Engineering & Advanced Technology
- affiliation: Macquarie University, Division of Information & Computer Science
- affiliation: University of Ballarat, Graduate School of Information Technology and Mathematical Sciences
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j64]Timothy R. McIntosh, Teo Susnjak, Tong Liu, Dan Xu, Paul A. Watters, Dongwei Liu, Yaqi Hao, Alex Ng, Malka Halgamuge:
Ransomware Reloaded: Re-examining Its Trend, Research and Mitigation in the Era of Data Exfiltration. ACM Comput. Surv. 57(1): 18:1-18:40 (2025) - 2024
- [j63]Timothy R. McIntosh, Teo Susnjak, Tong Liu, Paul A. Watters, Dan Xu, Dongwei Liu, Raza Nowrozy, Malka N. Halgamuge:
From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models. Comput. Secur. 144: 103964 (2024) - [j62]Timothy R. McIntosh, Tong Liu, Teo Susnjak, Paul A. Watters, Alex Ng, Malka N. Halgamuge:
A Culturally Sensitive Test to Evaluate Nuanced GPT Hallucination. IEEE Trans. Artif. Intell. 5(6): 2739-2751 (2024) - [j61]Timothy R. McIntosh, Teo Susnjak, Tong Liu, Paul A. Watters, Alex Ng, Malka N. Halgamuge:
A Game-Theoretic Approach to Containing Artificial General Intelligence: Insights From Highly Autonomous Aggressive Malware. IEEE Trans. Artif. Intell. 5(12): 6290-6303 (2024) - [j60]Timothy R. McIntosh, Teo Susnjak, Tong Liu, Paul A. Watters, Malka N. Halgamuge:
The Inadequacy of Reinforcement Learning From Human Feedback - Radicalizing Large Language Models via Semantic Vulnerabilities. IEEE Trans. Cogn. Dev. Syst. 16(4): 1561-1574 (2024) - [j59]Timothy R. McIntosh, Tong Liu, Teo Susnjak, Paul A. Watters, Malka N. Halgamuge:
A Reasoning and Value Alignment Test to Assess Advanced GPT Reasoning. ACM Trans. Interact. Intell. Syst. 14(3): 17:1-17:37 (2024) - [i8]Timothy R. McIntosh, Teo Susnjak, Tong Liu, Paul A. Watters, Malka N. Halgamuge:
Inadequacies of Large Language Model Benchmarks in the Era of Generative Artificial Intelligence. CoRR abs/2402.09880 (2024) - [i7]Timothy R. McIntosh, Teo Susnjak, Tong Liu, Paul A. Watters, Raza Nowrozy, Malka N. Halgamuge:
From COBIT to ISO 42001: Evaluating Cybersecurity Frameworks for Opportunities, Risks, and Regulatory Compliance in Commercializing Large Language Models. CoRR abs/2402.15770 (2024) - [i6]Teo Susnjak, Timothy R. McIntosh, Andre L. C. Barczak, Napoleon H. Reyes, Tong Liu, Paul A. Watters, Malka N. Halgamuge:
Over the Edge of Chaos? Excess Complexity as a Roadblock to Artificial General Intelligence. CoRR abs/2407.03652 (2024) - 2023
- [b4]Paul A. Watters:
Counterintelligence in a Cyber World. Springer 2023, ISBN 978-3-031-35286-7, pp. 1-145 - [j58]Timothy R. McIntosh, A. S. M. Kayes, Yi-Ping Phoebe Chen, Alex Ng, Paul A. Watters:
Applying staged event-driven access control to combat ransomware. Comput. Secur. 128: 103160 (2023) - [j57]Timothy R. McIntosh, Tong Liu, Teo Susnjak, Hooman Alavizadeh, Alex Ng, Raza Nowrozy, Paul A. Watters:
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation. Comput. Secur. 134: 103424 (2023) - [j56]Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters, Seyit Camtepe:
Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware. Future Internet 15(6): 214 (2023) - [i5]Iqbal H. Sarker, Helge Janicke, Nazeeruddin Mohammad, Paul A. Watters, Surya Nepal:
AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity. CoRR abs/2310.12162 (2023) - [i4]Timothy R. McIntosh, Teo Susnjak, Tong Liu, Paul A. Watters, Malka N. Halgamuge:
From Google Gemini to OpenAI Q* (Q-Star): A Survey of Reshaping the Generative Artificial Intelligence (AI) Research Landscape. CoRR abs/2312.10868 (2023) - 2022
- [j55]Humayun Kayesh, Md. Saiful Islam, Junhu Wang, A. S. M. Kayes, Paul A. Watters:
A deep learning model for mining and detecting causally related events in tweets. Concurr. Comput. Pract. Exp. 34(2) (2022) - [j54]Rathin Chandra Shit, Suraj Sharma, Paul A. Watters, Kumar Yelamarthi, Biswajeet Pradhan, Richard Davison, Graham Morgan, Deepak Puthal:
Privacy-preserving cooperative localization in vehicular edge computing infrastructure. Concurr. Comput. Pract. Exp. 34(14) (2022) - [j53]Timothy R. McIntosh, A. S. M. Kayes, Yi-Ping Phoebe Chen, Alex Ng, Paul A. Watters:
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions. ACM Comput. Surv. 54(9): 197:1-197:36 (2022) - [j52]Joel Scanlan, Paul A. Watters, Jeremy Prichard, Charlotte Hunn, Caroline Spiranovic, Richard Wortley:
Creating Honeypots to Prevent Online Child Exploitation. Future Internet 14(4): 121 (2022) - [c59]Lakshit Sama, Hua Wang, Paul A. Watters:
Enhancing System Security by Intrusion Detection Using Deep Learning. ADC 2022: 169-176 - [c58]Ikram Ul Haq, Paul Black, Iqbal Gondal, Joarder Kamruzzaman, Paul A. Watters, A. S. M. Kayes:
Spam Email Categorization with NLP and Using Federated Deep Learning. ADMA (2) 2022: 15-27 - 2021
- [b3]Iqbal H. Sarker, Alan Colman, Jun Han, Paul A. Watters:
Context-Aware Machine Learning and Mobile Data Analytics - Automated Rule-based Services with Intelligent Decision-Making. Springer 2021, ISBN 978-3-030-88529-8, pp. 1-157 - [j51]Timothy R. McIntosh, A. S. M. Kayes, Yi-Ping Phoebe Chen, Alex Ng, Paul A. Watters:
Dynamic user-centric access control for detection of ransomware attacks. Comput. Secur. 111: 102461 (2021) - [j50]Ayman Alkhalifah, Alex Ng, Paul A. Watters, A. S. M. Kayes:
A Mechanism to Detect and Prevent Ethereum Blockchain Smart Contract Reentrancy Attacks. Frontiers Comput. Sci. 3: 598780 (2021) - [j49]Timothy R. McIntosh, Paul A. Watters, A. S. M. Kayes, Alex Ng, Yi-Ping Phoebe Chen:
Enforcing situation-aware access control to build malware-resilient file systems. Future Gener. Comput. Syst. 115: 568-582 (2021) - [j48]Nighat Usman, Saeeda Usman, Fazlullah Khan, Mian Ahmad Jan, Ahthasham Sajid, Mamoun Alazab, Paul A. Watters:
Intelligent Dynamic Malware Detection using Machine Learning in IP Reputation for Forensics Data Analytics. Future Gener. Comput. Syst. 118: 124-141 (2021) - [j47]Mian Ahmad Jan, Jinjin Cai, Xiang-chuan Gao, Fazlullah Khan, Spyridon Mastorakis, Muhammad Usman, Mamoun Alazab, Paul A. Watters:
Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions. J. Netw. Comput. Appl. 175: 102918 (2021) - [j46]Mohammad Hammoudeh, Paul A. Watters, Gregory Epiphaniou, A. S. M. Kayes, Pedro Pinto:
Special Issue "Security Threats and Countermeasures in Cyber-Physical Systems". J. Sens. Actuator Networks 10(3): 54 (2021) - [j45]Wei Wang, Xinyi Cao, He Li, Lingjie Shen, Yaqin Feng, Paul A. Watters:
Improving speech emotion recognition based on acoustic words emotion dictionary. Nat. Lang. Eng. 27(6): 747-761 (2021) - [j44]Fazlullah Khan, Mian Ahmad Jan, Ateeq Ur Rehman, Spyridon Mastorakis, Mamoun Alazab, Paul A. Watters:
A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing. IEEE Trans. Ind. Informatics 17(7): 5128-5137 (2021) - [j43]Mian Ahmad Jan, Fazlullah Khan, Rahim Khan, Spyridon Mastorakis, Varun G. Menon, Mamoun Alazab, Paul A. Watters:
Lightweight Mutual Authentication and Privacy-Preservation Scheme for Intelligent Wearable Devices in Industrial-CPS. IEEE Trans. Ind. Informatics 17(8): 5829-5839 (2021) - [i3]Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters, Seyit Camtepe:
Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware. CoRR abs/2110.13409 (2021) - 2020
- [j42]Jinting Zhu, Julian Jang-Jaccard, Paul A. Watters:
Multi-Loss Siamese Neural Network With Batch Normalization Layer for Malware Detection. IEEE Access 8: 171542-171550 (2020) - [j41]Iqbal H. Sarker, Alan Colman, Jun Han, A. S. M. Kayes, Paul A. Watters:
CalBehav: A Machine Learning-Based Personalized Calendar Behavioral Model Using Time-Series Smartphone Data. Comput. J. 63(7): 1109-1123 (2020) - [j40]A. S. M. Kayes, Wenny Rahayu, Paul A. Watters, Mamoun Alazab, Tharam S. Dillon, Elizabeth Chang:
Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control. Future Gener. Comput. Syst. 107: 307-323 (2020) - [j39]A. S. M. Kayes, Md. Saiful Islam, Paul A. Watters, Alex Ng, Humayun Kayesh:
Automated measurement of attitudes towards social distancing using social media: A COVID-19 case study. First Monday 25(11) (2020) - [j38]Wei Wang, Paul A. Watters, Xinyi Cao, Lingjie Shen, Bo Li:
Significance of Phonological Features in Speech Emotion Recognition. Int. J. Speech Technol. 23(3): 633-642 (2020) - [j37]Iqbal H. Sarker, A. S. M. Kayes, Shahriar Badsha, Hamed AlQahtani, Paul A. Watters, Alex Ng:
Cybersecurity data science: an overview from machine learning perspective. J. Big Data 7(1): 41 (2020) - [j36]Paul A. Watters:
Introduction: The Role of Censorship in Late Modern Societies. Libr. Trends 68(4): 557-560 (2020) - [j35]Hanfeng Zhong, Paul A. Watters:
The Ethics of Corporate Censorship of Information-Sharing Behavior: A Nonconsequentialist Perspective. Libr. Trends 68(4): 697-711 (2020) - [j34]A. S. M. Kayes, Rudri Kalaria, Iqbal H. Sarker, Md. Saiful Islam, Paul A. Watters, Alex Ng, Mohammad Hammoudeh, Shahriar Badsha, Indika Kumara:
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues. Sensors 20(9): 2464 (2020) - [c57]Joel Scanlan, Andrew Eddy, Teresa Thomas, Tele Tan, Yi-Ping Phoebe Chen, Paul A. Watters, Michael Fieldhouse, Lawrence Fung, Sonya Girdler:
Neurodiverse Knowledge, Skills and Ability Assessment for Cyber Security. ACIS 2020: 99 - [c56]Mohammad Jabed Morshed Chowdhury, A. S. M. Kayes, Paul A. Watters, Patrick Scolyer-Gray, Alex Ng:
Patient Controlled, Privacy Preserving IoT Healthcare Data Sharing Framework. HICSS 2020: 1-11 - [c55]A. S. M. Kayes, Mohammad Hammoudeh, Shahriar Badsha, Paul A. Watters, Alex Ng, Fatma Mohammed, Mofakharul Islam:
Responsibility Attribution Against Data Breaches. ICIoT 2020: 498-503 - [c54]Paul Black, Ammar Sohail, Iqbal Gondal, Joarder Kamruzzaman, Peter Vamplew, Paul A. Watters:
API Based Discrimination of Ransomware and Benign Cryptographic Programs. ICONIP (2) 2020: 177-188 - [c53]Humayun Kayesh, Md. Saiful Islam, Junhu Wang, Shikha Anirban, A. S. M. Kayes, Paul A. Watters:
Answering Binary Causal Questions: A Transfer Learning Based Approach. IJCNN 2020: 1-9
2010 – 2019
- 2019
- [j33]Mohammad Jabed Morshed Chowdhury, Md. Sadek Ferdous, Kamanashis Biswas, Niaz Chowdhury, A. S. M. Kayes, Mamoun Alazab, Paul A. Watters:
A Comparative Analysis of Distributed Ledger Technology Platforms. IEEE Access 7: 167930-167943 (2019) - [j32]Timothy R. McIntosh, Julian Jang-Jaccard, Paul A. Watters, Teo Susnjak:
Masquerade Attacks Against Security Software Exclusion Lists. Aust. J. Intell. Inf. Process. Syst. 16(4): 1-8 (2019) - [j31]Paul A. Watters, Patrick Scolyer-Gray, A. S. M. Kayes, Mohammad Jabed Morshed Chowdhury:
This would work perfectly if it weren't for all the humans: Two factor authentication in late modern societies. First Monday 24(7) (2019) - [j30]Iqbal H. Sarker, A. S. M. Kayes, Paul A. Watters:
Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage. J. Big Data 6: 57 (2019) - [c52]Mohammad Jabed Morshed Chowdhury, Md. Sadek Ferdous, Kamanashis Biswas, Niaz Chowdhury, A. S. M. Kayes, Paul A. Watters, Alex Ng:
Trust Modeling for Blockchain-Based Wearable Data Market. CloudCom 2019: 411-417 - [c51]L. Jean Camp, Marthie Grobler, Julian Jang-Jaccard, Christian Probst, Karen Renaud, Paul A. Watters:
Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks. HICSS 2019: 1-10 - [c50]Timothy R. McIntosh, Julian Jang-Jaccard, Paul A. Watters, Teo Susnjak:
The Inadequacy of Entropy-Based Ransomware Detection. ICONIP (5) 2019: 181-189 - [c49]Omaru Maruatona, Ahmad Azab, Paul A. Watters:
AVOCAD: Adaptive Terrorist Comms Surveillance and Interception using Machine Learning. TrustCom/BigDataSE 2019: 85-94 - [i2]Iqbal H. Sarker, Alan Colman, Jun Han, A. S. M. Kayes, Paul A. Watters:
CalBehav: A Machine Learning based Personalized Calendar Behavioral Model using Time-Series Smartphone Data. CoRR abs/1909.04724 (2019) - 2018
- [j29]Ebrima N. Ceesay, K. Myers, Paul A. Watters:
Human-centered strategies for cyber-physical systems security. EAI Endorsed Trans. Security Safety 4(14): e5 (2018) - [c48]Shadi Esnaashari, Lesley A. Gardner, Paul A. Watters:
Clustering Student Participation: Implications for Education. AINA Workshops 2018: 313-318 - [c47]Paul A. Watters:
Investigating Malware Epidemiology and Child Exploitation Using Algorithmic Ethnography. HICSS 2018: 1-10 - [c46]Timothy R. McIntosh, Julian Jang-Jaccard, Paul A. Watters:
Large Scale Behavioral Analysis of Ransomware Attacks. ICONIP (6) 2018: 217-229 - [c45]Omaru Maruatona, Peter Vamplew, Richard Dazeley, Paul A. Watters:
Rapid Anomaly Detection Using Integrated Prudence Analysis (IPA). PAKDD (Workshops) 2018: 137-141 - [c44]Paul A. Watters:
Modelling the Efficacy of Auto-Internet Warnings to Reduce Demand for Child Exploitation Materials. PAKDD (Workshops) 2018: 318-329 - [c43]Bernd Troegeler, Paul A. Watters:
Steganographic Transports: A Vector for Hidden Secret Internets? TrustCom/BigDataSE 2018: 891-896 - [c42]Erica Shuford, Tara Kavanaugh, Brian Ralph, Ebrima N. Ceesay, Paul A. Watters:
Measuring Personal Privacy Breaches Using Third-Party Trackers. TrustCom/BigDataSE 2018: 1615-1618 - 2017
- [c41]Omaru Maruatona, Peter Vamplew, Richard Dazeley, Paul A. Watters:
Evaluating Accuracy in Prudence Analysis for Cyber Security. ICONIP (5) 2017: 407-417 - 2016
- [j28]Charles Perez, Babiga Birregah, Robert Layton, Marc Lemercier, Paul A. Watters:
REPLOT: REtrieving Profile Links On Twitter for malicious campaign discovery. AI Commun. 29(1): 107-122 (2016) - [j27]Paul A. Watters, Jacqueline Ziegler:
Controlling information behaviour: the case for access control. Behav. Inf. Technol. 35(4): 268-276 (2016) - [j26]Suriadi Suriadi, Teo Susnjak, Agate M. Ponder-Sutton, Paul A. Watters, Christoph Schumacher:
Using Data-Driven and Process Mining Techniques for Identifying and Characterizing Problem Gamblers in New Zealand. Complex Syst. Informatics Model. Q. 9: 44-66 (2016) - [j25]Victor Chang, Muthu Ramachandran, Gary B. Wills, Robert John Walters, Chung-Sheng Li, Paul A. Watters:
Editorial for FGCS special issue: Big Data in the cloud. Future Gener. Comput. Syst. 65: 73-75 (2016) - [c40]Suriadi Suriadi, Teo Susnjak, Agate M. Ponder-Sutton, Paul A. Watters, Christoph Schumacher:
Characterizing Problem Gamblers in New Zealand: A Novel Expression of Process Cubes. CAiSE Forum 2016: 185-192 - [c39]Matthew Comb, Paul A. Watters:
Peeking behind the great firewall: Privacy on Chinese file sharing networks. PST 2016: 650-656 - [i1]Shadi Esnaashari, Anuradha Mathrani, Paul A. Watters:
Investigation of Audience Interaction Tools from the Perspective of Activity Theory. CoRR abs/1606.01366 (2016) - 2015
- [j24]Paul A. Watters:
Censorship is f̶u̶t̶i̶l̶e̶ possible but difficult: A study in algorithmic ethnography. First Monday 20(1) (2015) - [j23]Robert Layton, Paul A. Watters, Richard Dazeley:
Authorship analysis of aliases: Does topic influence accuracy? Nat. Lang. Eng. 21(4): 497-518 (2015) - [c38]Paul A. Watters, Maya F. Watters, Jacqueline Ziegler:
Maximising Eyeballs but Facilitating Cybercrime? Ethical Challenges for Online Advertising in New Zealand. HICSS 2015: 1742-1749 - 2014
- [j22]Robert Layton, Paul A. Watters:
A methodology for estimating the tangible cost of data breaches. J. Inf. Secur. Appl. 19(6): 321-330 (2014) - [c37]Paul A. Watters:
A Systematic Approach to Measuring Advertising Transparency Online: An Australian Case Study. AWC 2014: 59-68 - 2013
- [j21]Paul A. Watters, Christopher Lueg, Caroline Spiranovic, Jeremy Prichard:
Patterns of ownership of child model sites: Profiling the profiteers and consumers of child exploitation material. First Monday 18(2) (2013) - [j20]Jeremy Prichard, Caroline Spiranovic, Paul A. Watters, Christopher Lueg:
Young people, child pornography, and subcultural norms on the Internet. J. Assoc. Inf. Sci. Technol. 64(5): 992-1000 (2013) - [j19]Robert Layton, Paul Andrew Watters, Richard Dazeley:
Automated unsupervised authorship analysis using evidence accumulation clustering. Nat. Lang. Eng. 19(1): 95-120 (2013) - [j18]Robert Layton, Paul Andrew Watters, Richard Dazeley:
Evaluating authorship distance methods using the positive Silhouette coefficient. Nat. Lang. Eng. 19(4): 517-535 (2013) - [c36]Charles Perez, Babiga Birregah, Robert Layton, Marc Lemercier, Paul Andrew Watters:
REPLOT: REtrieving profile links on Twitter for suspicious networks detection. ASONAM 2013: 1307-1314 - [c35]Robert Layton, Paul A. Watters, Richard Dazeley:
Local n-grams for Author Identification Notebook for PAN at CLEF 2013. CLEF (Working Notes) 2013 - [c34]Robert Layton, Charles Perez, Babiga Birregah, Paul Andrew Watters, Marc Lemercier:
Indirect Information Linkage for OSINT through Authorship Analysis of Aliases. PAKDD Workshops 2013: 36-46 - 2012
- [j17]Alex Ng, Paul Andrew Watters, Shiping Chen:
A Consolidated Process Model for Identity Management. Inf. Resour. Manag. J. 25(3): 1-29 (2012) - [j16]Anthony Dekker, Hebert Pérez-Rosés, Guillermo Pineda-Villavicencio, Paul A. Watters:
The Maximum Degree & Diameter-Bounded Subgraph and its Applications. J. Math. Model. Algorithms 11(3): 249-268 (2012) - [j15]Robert Layton, Paul Andrew Watters, Richard Dazeley:
Recentred local profiles for authorship attribution. Nat. Lang. Eng. 18(3): 293-312 (2012) - [c33]Paul A. Watters, Nigel Phair:
Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMIA). CSS 2012: 66-76 - [c32]Robert Layton, Paul A. Watters, Richard Dazeley:
Unsupervised authorship analysis of phishing webpages. ISCIT 2012: 1104-1109 - 2011
- [j14]Jeremy Prichard, Paul A. Watters, Caroline Spiranovic:
Internet subcultures and pathways to the use of child pornography. Comput. Law Secur. Rev. 27(6): 585-600 (2011) - [j13]Susan Bruck, Paul A. Watters:
The factor structure of cybersickness. Displays 32(4): 153-158 (2011) - [j12]Paul A. Watters:
Social networking threats. Inf. Secur. Tech. Rep. 16(2): 37 (2011) - [j11]Mofakharul Islam, Paul Andrew Watters, John Yearwood:
Real-time detection of children's skin on social networking sites using Markov random field modelling. Inf. Secur. Tech. Rep. 16(2): 51-58 (2011) - [j10]Paul Andrew Watters, Robert Layton, Richard Dazeley:
How much material on BitTorrent is infringing content? A case study. Inf. Secur. Tech. Rep. 16(2): 79-87 (2011) - [c31]Mamoun Alazab, Sitalakshmi Venkatraman, Paul A. Watters, Moutaz Alazab:
Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures. AusDM 2011: 171-182 - [c30]Mamoun Alazab, Sitalakshmi Venkatraman, Paul A. Watters, Moutaz Alazab, Ammar Alazab:
Cybercrime: The Case of Obfuscated Malware. ICGS3/e-Democracy 2011: 204-211 - [c29]Mofakharul Islam, Paul Andrew Watters, John Yearwood:
Child face detection using age specific luminance invariant geometric descriptor. ICSIPA 2011: 34-39 - [c28]Lei Zhang, Shui Yu, Di Wu, Paul A. Watters:
A Survey on Latest Botnet Attack and Defense. TrustCom 2011: 53-60 - 2010
- [c27]Ann Pan, Donald Winchester, Lesley Land, Paul A. Watters:
Descriptive Data Mining on Fraudulent Online Dating Profiles. ECIS 2010: 145 - [c26]Robert Layton, Paul A. Watters, Richard Dazeley:
Automatically determining phishing campaigns using the USCAP methodology. eCrime 2010: 1-8 - [c25]Desmond Lobo, Paul A. Watters, Xinwen Wu:
RBACS: Rootkit Behavioral Analysis and Classification System. WKDD 2010: 75-80
2000 – 2009
- 2009
- [c24]Susan Bruck, Paul Andrew Watters:
Estimating Cybersickness of Simulated Motion Using the Simulator Sickness Questionnaire (SSQ): A Controlled Study. CGIV 2009: 486-488 - [c23]Robert Layton, Paul A. Watters:
Determining provenance in phishing websites using automated conceptual analysis. eCrime 2009: 1-7 - [c22]Liping Ma, John Yearwood, Paul A. Watters:
Establishing phishing provenance using orthographic features. eCrime 2009: 1-10 - [c21]Paul A. Watters:
Why do users trust the wrong messages? A behavioural model of phishing. eCrime 2009: 1-7 - [c20]Liping Ma, Rosemary Torney, Paul A. Watters, Simon Brown:
Automatically Generating Classifier for Phishing Email Prediction. ISPAN 2009: 779-783 - [p1]Susan Bruck, Paul A. Watters:
Cybersickness and Anxiety During Simulated Motion: Implications for VRET. Annual Review of Cybertherapy and Telemedicine 2009: 169-173 - 2008
- [b2]Sarah Boslaugh, Paul Andrew Watters:
Statistics in a nutshell - a desktop quick reference. O'Reilly 2008, ISBN 978-0-596-51049-7, pp. I-XXI, 1-452 - [j9]Paul A. Watters, Frances H. Martin, H. Steffen Stripf:
Visual detection of LSB-encoded natural image steganography. ACM Trans. Appl. Percept. 5(1): 5:1-5:12 (2008) - [c19]Xinwen Wu, Paul Andrew Watters, John Yearwood:
New Traceability Codes and Identification Algorithm for Tracing Pirates. ISPA 2008: 719-724 - [c18]Stephen McCombie, Paul Andrew Watters, Alex Ng, Brett Watson:
Forensic Characteristics of Phishing - Petty Theft or Organized Crime? WEBIST (1) 2008: 149-157 - 2007
- [c17]Wai Han Ho, Paul Andrew Watters, Dominic R. Verity:
Are Younger People More Difficult to Identify or Just a Peer-to-Peer Effect. CAIP 2007: 351-359 - [c16]Wai Han Ho, Paul Andrew Watters:
A New Performance Evaluation Method for Face Identification - Regression Analysis of Misidentification Risk. CVPR 2007 - [c15]Wai Han Ho, Paul Andrew Watters, Dominic R. Verity:
Robustness of the New Owner-Tester Approach for Face Identification Experiments. CVPR 2007 - [c14]Tam Pham, Paul Andrew Watters:
The Efficiency of Periodic Rekeying in Dynamic Group Key Management. ECUMN 2007: 425-432 - [c13]Zhao Zeng, Paul Andrew Watters:
A Novel Face Hashing Method with Feature Fusion for Biometric Cryptosystems. ECUMN 2007: 439-444 - [c12]Paul Andrew Watters, Frances H. Martin, H. Steffen Stripf:
Visual Detection of High Capacity Natural Image Steganography: Is A Known Cover Effective? ICNSC 2007: 380-385 - 2006
- [c11]John Mee, Paul Andrew Watters:
Detecting and Tracing Copyright Infringements in P2P Networks. ICN/ICONS/MCL 2006: 60 - [c10]Paul Andrew Watters:
e-Learning for policing, intelligence and counter-terrorism: Performance. ICN/ICONS/MCL 2006: 215 - 2005
- [c9]Armin Hezart, Sonali Naik, Antonio Araujo, Paul Andrew Watters:
Solving Frame-Based Accessibility Problems in Web Content Management. CIMCA/IAWTIC 2005: 246-250 - [c8]Huu Tran, Michael Hitchens, Vijay Varadharajan, Paul Andrew Watters:
A Trust based Access Control Framework for P2P File-Sharing Systems. HICSS 2005 - [c7]Wai Han Ho, Paul Andrew Watters:
Identifying and Blocking Pornographic Content. ICDE Workshops 2005: 1181 - [c6]Simon Chong, Paul Andrew Watters, Michael Hitchens:
Automated Physical Storage Provision Using a Peer-to-Peer Distributed File System. ICDE Workshops 2005: 1214 - [c5]Paul Andrew Watters, Antonio Araujo, Armin Hezart, Sonali Naik:
Accessibility Solutions for Visually Impaired Users of Web Discussion Boards. ICITA (1) 2005: 488-493 - [c4]Paul Andrew Watters, Frances H. Martin, H. Steffen Stripf:
Visual Steganalysis of LSB-Encoded Natural Images. ICITA (1) 2005: 746-751 - [c3]Huu Tran, Paul A. Watters, Michael Hitchens, Vijay Varadharajan:
Trust and authorization in the grid: a recommendation model. ICPS 2005: 433-436 - [c2]Steven Taylor, Paul Andrew Watters:
Trustworthy E-mail Using Secure XML Web Services. CEC 2005: 307-312 - 2004
- [j8]Paul Andrew Watters:
Coding distributed representations of natural scenes: a comparison of orthogonal and non-orthogonal models. Neurocomputing 61: 277-289 (2004) - [c1]Wai Han Ho, Paul Andrew Watters:
Statistical and structural approaches to filtering Internet pornography. SMC (5) 2004: 4792-4798 - 2003
- [j7]Paul Andrew Watters:
Distributed Variance In Localized Principal Components Of Whitened Natural Scenes. Int. J. Pattern Recognit. Artif. Intell. 17(8): 1431-1446 (2003) - 2002
- [b1]Paul Andrew Watters:
Solaris 8 administrator's guide. O'Reilly 2002, ISBN 978-0-596-00073-8, pp. I-XV, 1-282 - [j6]Paul Andrew Watters:
Discriminating English Word Senses Using Cluster Analysis. J. Quant. Linguistics 9(1): 77-86 (2002) - 2000
- [j5]Paul Andrew Watters:
Time-invariant long-range correlations in electroencephalogram dynamics. Int. J. Syst. Sci. 31(7): 819-825 (2000) - [j4]Paul Andrew Watters, Malti Patel:
Direct Machine Translation Systems as Dynamical Systems: The Iterative Semantic Processing (ISP) Paradigm. J. Quant. Linguistics 7(1): 43-51 (2000)
1990 – 1999
- 1999
- [j3]Paul Andrew Watters, Malti Patel:
Semantic processing performance of Internet machine translation systems. Internet Res. 9(2): 153-160 (1999) - [j2]Paul Andrew Watters, Malti Patel:
A Neural Network Model of Semantic Processing Errors in Parkinson's Disease. Neural Process. Lett. 9(2): 189-199 (1999) - 1998
- [j1]Paul A. Watters, Maya F. Watters, Stuart C. Carr:
Evaluating Internet information services in the Asia-Pacific region. Internet Res. 8(3): 266-271 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint