Follow
Timothy Mcintosh
Timothy Mcintosh
Other namesTimothy R. Mcintosh, TR McIntosh
Cyberoo Pty Ltd (AU)
Verified email at cyberoo.ai
Title
Cited by
Cited by
Year
ChatGPT: The end of online exam integrity?
T Susnjak, TR McIntosh
Education Sciences 14 (6), 656, 2024
5902024
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
ACM Computing Surveys (CSUR) 54 (9), 1-36, 2021
1352021
A culturally sensitive test to evaluate nuanced gpt hallucination
TR McIntosh, T Liu, T Susnjak, P Watters, A Ng, MN Halgamuge
IEEE Transactions on Artificial Intelligence 5 (6), 2739 - 2751, 2023
1322023
From google gemini to openai q*(q-star): A survey of reshaping the generative artificial intelligence (ai) research landscape
TR McIntosh, T Susnjak, T Liu, P Watters, MN Halgamuge
arXiv preprint arXiv:2312.10868, 2023
912023
The inadequacy of entropy-based ransomware detection
T McIntosh, J Jang-Jaccard, P Watters, T Susnjak
Neural Information Processing: 26th International Conference, ICONIP 2019 …, 2019
862019
Inadequacies of large language model benchmarks in the era of generative artificial intelligence
TR McIntosh, T Susnjak, T Liu, P Watters, MN Halgamuge
arXiv preprint arXiv:2402.09880, 2024
732024
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation
T McIntosh, T Liu, T Susnjak, H Alavizadeh, A Ng, R Nowrozy, P Watters
Computers & security 134, 103424, 2023
582023
The inadequacy of reinforcement learning from human feedback-radicalizing large language models via semantic vulnerabilities
TR McIntosh, T Susnjak, T Liu, P Watters, MN Halgamuge
IEEE Transactions on Cognitive and Developmental Systems, 2024
452024
Large scale behavioral analysis of ransomware attacks
TR McIntosh, J Jang-Jaccard, PA Watters
Neural Information Processing: 25th International Conference, ICONIP 2018 …, 2018
352018
Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration
T McIntosh, T Susnjak, T Liu, D Xu, P Watters, D Liu, Y Hao, A Ng, ...
ACM Computing Surveys, 2024
332024
Dynamic User-Centric Access Control for Detection of Ransomware Attacks
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 111, 102461, 2021
322021
From cobit to iso 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models
TR McIntosh, T Susnjak, T Liu, P Watters, D Xu, D Liu, R Nowrozy, ...
Computers & Security 144, 103964, 2024
312024
Enforcing situation-aware access control to build malware-resilient file systems
T McIntosh, P Watters, ASM Kayes, A Ng, YPP Chen
Future Generation Computer Systems 115, 568-582, 2020
292020
A game-theoretic approach to containing artificial general intelligence: Insights from highly autonomous aggressive malware
TR McIntosh, T Susnjak, T Liu, P Watters, A Ng, MN Halgamuge
IEEE Transactions on Artificial Intelligence, 2024
282024
Applying staged event-driven access control to combat ransomware
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 128, 103160, 2023
262023
A Reasoning and Value Alignment Test to Assess Advanced GPT Reasoning
TR McIntosh, T Liu, T Susnjak, P Watters, MN Halgamuge
ACM Transactions on Interactive Intelligent Systems, 2024
232024
Towards a universal privacy model for electronic health record systems: an ontology and machine learning approach
R Nowrozy, K Ahmed, H Wang, T Mcintosh
Informatics 10 (3), 60, 2023
232023
Privacy preservation of electronic health records in the modern era: A systematic survey
R Nowrozy, K Ahmed, ASM Kayes, H Wang, TR McIntosh
ACM Computing Surveys 56 (8), 1-37, 2024
202024
Msd-kmeans: A hybrid algorithm for efficient detection of global and local outliers
Y Wei, J Jang-Jaccard, F Sabrina, T McIntosh
2021 IEEE 15th International Conference on Big Data Science and Engineering …, 2021
17*2021
Intercepting ransomware attacks with staged event-driven access control
T McIntosh
La Trobe, 2022
152022
The system can't perform the operation now. Try again later.
Articles 1–20