Follow
Timothy Mcintosh
Timothy Mcintosh
Other namesTimothy R. Mcintosh, TR McIntosh
Cyberoo Pty Ltd (AU)
Verified email at cyberoo.au
Title
Cited by
Cited by
Year
ChatGPT: The end of online exam integrity?
T Susnjak, TR McIntosh
Education Sciences 14 (6), 656, 2024
4932024
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
ACM Computing Surveys (CSUR) 54 (9), 1-36, 2021
1152021
A culturally sensitive test to evaluate nuanced gpt hallucination
TR McIntosh, T Liu, T Susnjak, P Watters, A Ng, MN Halgamuge
IEEE Transactions on Artificial Intelligence 5 (6), 2739 - 2751, 2023
832023
The inadequacy of entropy-based ransomware detection
T McIntosh, J Jang-Jaccard, P Watters, T Susnjak
Neural Information Processing: 26th International Conference, ICONIP 2019 …, 2019
782019
From google gemini to openai q*(q-star): A survey of reshaping the generative artificial intelligence (ai) research landscape
TR McIntosh, T Susnjak, T Liu, P Watters, MN Halgamuge
arXiv preprint arXiv:2312.10868, 2023
662023
Inadequacies of large language model benchmarks in the era of generative artificial intelligence
TR McIntosh, T Susnjak, T Liu, P Watters, MN Halgamuge
arXiv preprint arXiv:2402.09880, 2024
562024
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation
T McIntosh, T Liu, T Susnjak, H Alavizadeh, A Ng, R Nowrozy, P Watters
Computers & security 134, 103424, 2023
422023
Large scale behavioral analysis of ransomware attacks
TR McIntosh, J Jang-Jaccard, PA Watters
Neural Information Processing: 25th International Conference, ICONIP 2018 …, 2018
322018
Dynamic User-Centric Access Control for Detection of Ransomware Attacks
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 111, 102461, 2021
272021
Enforcing situation-aware access control to build malware-resilient file systems
T McIntosh, P Watters, ASM Kayes, A Ng, YPP Chen
Future Generation Computer Systems 115, 568-582, 2020
262020
The inadequacy of reinforcement learning from human feedback-radicalizing large language models via semantic vulnerabilities
TR McIntosh, T Susnjak, T Liu, P Watters, MN Halgamuge
IEEE Transactions on Cognitive and Developmental Systems, 2024
232024
Towards a universal privacy model for electronic health record systems: an ontology and machine learning approach
R Nowrozy, K Ahmed, H Wang, T Mcintosh
Informatics 10 (3), 60, 2023
212023
From cobit to iso 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models
TR McIntosh, T Susnjak, T Liu, P Watters, D Xu, D Liu, R Nowrozy, ...
Computers & Security, 103964, 2024
182024
Applying staged event-driven access control to combat ransomware
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 128, 103160, 2023
182023
Msd-kmeans: A hybrid algorithm for efficient detection of global and local outliers
Y Wei, J Jang-Jaccard, F Sabrina, T McIntosh
2021 IEEE 15th International Conference on Big Data Science and Engineering …, 2021
15*2021
Intercepting ransomware attacks with staged event-driven access control
T McIntosh
La Trobe, 2022
142022
Masquerade Attacks Against Security Software Exclusion Lists
T McIntosh, J Jang-Jaccard, P Watters, T Susnjak
Australian Journal of Intelligent Information Processing Systems 16 (4), 1-8, 2019
12*2019
A game-theoretic approach to containing artificial general intelligence: Insights from highly autonomous aggressive malware
TR McIntosh, T Susnjak, T Liu, P Watters, A Ng, MN Halgamuge
IEEE Transactions on Artificial Intelligence, 2024
102024
Privacy preservation of electronic health records in the modern era: A systematic survey
R Nowrozy, K Ahmed, ASM Kayes, H Wang, TR McIntosh
ACM Computing Surveys 56 (8), 1-37, 2024
102024
Automating research synthesis with domain-specific large language model fine-tuning
T Susnjak, P Hwang, NH Reyes, ALC Barczak, TR McIntosh, ...
arXiv preprint arXiv:2404.08680, 2024
102024
The system can't perform the operation now. Try again later.
Articles 1–20