Follow
Professor Paul Watters
Professor Paul Watters
Cyberstronomy Pty Ltd
Verified email at cyberstronomy.com - Homepage
Title
Cited by
Cited by
Year
Statistics in a Nutshell
S Boslaugh
" O'Reilly Media, Inc.", 2012
14132012
Cybersecurity data science: an overview from machine learning perspective
IH Sarker, ASM Kayes, S Badsha, H Alqahtani, P Watters, A Ng
Journal of Big data 7, 1-29, 2020
7872020
Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures.
M Alazab, S Venkatraman, PA Watters, M Alazab
AusDM 11, 171-182, 2011
3092011
Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage
IH Sarker, ASM Kayes, P Watters
Journal of Big Data 6 (1), 1-28, 2019
2952019
Towards understanding malware behaviour by the extraction of API calls
M Alazab, S Venkataraman, P Watters
2010 second cybercrime and trustworthy computing workshop, 52-59, 2010
2282010
A comparative analysis of distributed ledger technology platforms
MJM Chowdhury, MDS Ferdous, K Biswas, N Chowdhury, ASM Kayes, ...
IEEE Access 7, 167930-167943, 2019
2232019
Authorship attribution for twitter in 140 characters or less
R Layton, P Watters, R Dazeley
2010 Second Cybercrime and Trustworthy Computing Workshop, 1-8, 2010
2102010
A trust based access control framework for P2P file-sharing systems
H Tran, M Hitchens, V Varadharajan, P Watters
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
1832005
Web services security
M O'neill
McGraw-Hill Osborne Media, 2003
1802003
Web Services Security
A O’Neill, M., Hallam-Baker, P., Mac Cann, S., Shema
McGraw-Hill, 2003
1802003
A culturally sensitive test to evaluate nuanced gpt hallucination
TR McIntosh, T Liu, T Susnjak, P Watters, A Ng, MN Halgamuge
IEEE Transactions on Artificial Intelligence, 2023
1572023
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
ACM Computing Surveys (CSUR) 54 (9), 1-36, 2021
1562021
Intelligent dynamic malware detection using machine learning in IP reputation for forensics data analytics
N Usman, S Usman, F Khan, MA Jan, A Sajid, M Alazab, P Watters
Future Generation Computer Systems 118, 124-141, 2021
1472021
Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration
T McIntosh, T Susnjak, T Liu, D Xu, P Watters, D Liu, Y Hao, A Ng, ...
ACM Computing Surveys 57 (1), 1-40, 2024
1372024
The factor structure of cybersickness
S Bruck, PA Watters
Displays 32 (4), 153-158, 2011
1352011
A survey on latest botnet attack and defense
L Zhang, S Yu, D Wu, P Watters
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
1202011
Cybercrime: the case of obfuscated malware
M Alazab, S Venkatraman, P Watters, M Alazab, A Alazab
Global Security, Safety and Sustainability & e-Democracy: 7th International …, 2012
1182012
From google gemini to openai q*(q-star): A survey of reshaping the generative artificial intelligence (ai) research landscape
TR McIntosh, T Susnjak, T Liu, P Watters, MN Halgamuge
arXiv preprint arXiv:2312.10868, 2023
1102023
Detecting phishing emails using hybrid features
L Ma, B Ofoghi, P Watters, S Brown
2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing …, 2009
1072009
Malware detection based on structural and behavioural features of API calls
M Alazab, R Layton, S Venkataraman, P Watters
School of Computer and Information Science, Security Research Centre, Edith …, 2010
1052010
The system can't perform the operation now. Try again later.
Articles 1–20