Cybersecurity data science: an overview from machine learning perspective IH Sarker, ASM Kayes, S Badsha, H Alqahtani, P Watters, A Ng Journal of Big data 7, 1-29, 2020 | 776 | 2020 |
A culturally sensitive test to evaluate nuanced gpt hallucination TR McIntosh, T Liu, T Susnjak, P Watters, A Ng, MN Halgamuge IEEE Transactions on Artificial Intelligence, 2023 | 156 | 2023 |
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters ACM Computing Surveys (CSUR) 54 (9), 1-36, 2021 | 154 | 2021 |
Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration T McIntosh, T Susnjak, T Liu, D Xu, P Watters, D Liu, Y Hao, A Ng, ... ACM Computing Surveys 57 (1), 1-40, 2024 | 125 | 2024 |
A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues ASM Kayes, R Kalaria, IH Sarker, MS Islam, PA Watters, A Ng, ... Sensors 20 (9), 2464, 2020 | 86 | 2020 |
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation T McIntosh, T Liu, T Susnjak, H Alavizadeh, A Ng, R Nowrozy, P Watters Computers & security 134, 103424, 2023 | 69 | 2023 |
An evaluation of contemporary commercial SOAP implementations A Ng, S Chen, P Greenfield Proceedings of the 5th Australasian Workshop on Software and System …, 2004 | 65 | 2004 |
A game-theoretic approach to containing artificial general intelligence: Insights from highly autonomous aggressive malware TR McIntosh, T Susnjak, T Liu, P Watters, A Ng, MN Halgamuge IEEE Transactions on Artificial Intelligence, 2024 | 51 | 2024 |
A taxonomy of blockchain threats and vulnerabilities A Alkhalifah, A Ng, ASM Kayes, J Chowdhury, MAPA Watters Blockchain for Cybersecurity and Privacy Architectures, Challenges, and …, 2020 | 51 | 2020 |
Evaluation and modeling of web services performance S Chen, B Yan, J Zic, R Liu, A Ng 2006 IEEE International Conference on Web Services (ICWS'06), 437-444, 2006 | 49 | 2006 |
Dynamic user-centric access control for detection of ransomware attacks T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters Computers & Security 111, 102461, 2021 | 38 | 2021 |
Applying staged event-driven access control to combat ransomware T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters Computers & Security 128, 103160, 2023 | 37 | 2023 |
A mechanism to detect and prevent Ethereum blockchain smart contract reentrancy attacks A Alkhalifah, A Ng, PA Watters, ASM Kayes Frontiers in Computer Science 3, 598780, 2021 | 35 | 2021 |
Enforcing situation-aware access control to build malware-resilient file systems T McIntosh, P Watters, ASM Kayes, A Ng, YPP Chen Future Generation Computer Systems 115, 568-582, 2021 | 35 | 2021 |
A study of the impact of compression and binary encoding on SOAP performance A Ng, P Greenfield, S Chen Proceedings of the Sixth Australasian Workshop on Software and System …, 2005 | 29 | 2005 |
Automated measurement of attitudes towards social distancing using social media: a COVID-19 case study ASM Kayes, MS Islam, PA Watters, A Ng, H Kayesh Preprints, 2020 | 23 | 2020 |
An empirical analysis of blockchain cybersecurity incidents A Alkhalifah, A Ng, ASM Kayes, J Chowdhury, M Alazab, PA Watters IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE …, 2019 | 21 | 2019 |
An Empirical Analysis of Blockchain Cybersecurity Incidents A Alkhalifah, A Ng, MJM Chowdhury, ASM Kayes, PA Watters In 2019 IEEE Asia-Pacific Conference on Computer Science and Data …, 2019 | 21 | 2019 |
Forensic characteristics of phishing petty theft or organized crime? S McCombie, P Watters, A Ng, B Watson WEBIST 2008-4th International Conference on Web Information Systems and …, 2008 | 21 | 2008 |
Optimising web services performance with table driven xml A Ng Australian Software Engineering Conference (ASWEC'06), 10 pp.-112, 2006 | 18 | 2006 |