Follow
Tim Watson
Tim Watson
Professor of Cyber Security, Loughborough University
Verified email at lboro.ac.uk
Title
Cited by
Cited by
Year
The industrial internet of things (IIoT): An analysis framework
H Boyes, B Hallaq, J Cunningham, T Watson
Computers in industry 101, 1-12, 2018
15842018
The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence
H He, C Maple, T Watson, A Tiwari, J Mehnen, Y Jin, B Gabrys
2016 IEEE congress on evolutionary computation (CEC), 1015-1021, 2016
1852016
Motivation and opportunity based model to reduce information security insider threats in organisations
NS Safa, C Maple, T Watson, R Von Solms
Journal of information security and applications 40, 247-257, 2018
1642018
A renewed approach to serious games for cyber security
A Le Compte, D Elizondo, T Watson
2015 7th International Conference on Cyber Conflict: Architectures in …, 2015
1132015
A logitboost-based algorithm for detecting known and unknown web attacks
MH Kamarudin, C Maple, T Watson, NS Safa
IEEE Access 5, 26190-26200, 2017
1072017
Digital twins: An analysis framework and open issues
H Boyes, T Watson
Computers in Industry 143, 103763, 2022
872022
Assessment of geometric features for individual identification and verification in biometric hand systems
RM Luque-Baena, D Elizondo, E López-Rubio, EJ Palomo, T Watson
Expert systems with applications 40 (9), 3580-3594, 2013
682013
Application of growing hierarchical SOM for visualisation of network forensics traffic data
EJ Palomo, J North, D Elizondo, RM Luque, T Watson
Neural Networks 32, 275-284, 2012
502012
Quality standards for digital forensics: Learning from experience in England & Wales
G Tully, N Cohen, D Compton, G Davies, R Isbell, T Watson
Forensic Science International: Digital Investigation 32, 200905, 2020
482020
Hybrid feature selection technique for intrusion detection system
MH Kamarudin, C Maple, T Watson
International Journal of High Performance Computing and Networking 13 (2 …, 2019
482019
Application of artificial neural networks and related techniques to intrusion detection
C Bitter, DA Elizondo, T Watson
The 2010 International Joint Conference on Neural Networks (IJCNN), 1-8, 2010
452010
Cyber security standards and issues in V2X communications for Internet of Vehicles
I Ivanov, C Maple, T Watson, S Lee
IET Digital Library, 2018
442018
A taxonomy of technical attribution techniques for cyber attacks
A Nicholson, T Watson, P Norris, A Duffy, R Isbell
European conference on information warfare and security, 188, 2012
342012
Information security collaboration formation in organisations
N Sohrabi Safa, C Maple, T Watson, S Furnell
IET Information Security 12 (3), 238-245, 2018
212018
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained internet of Things
M Bradbury, A Jhumka, T Watson, D Flores, J Burton, M Butler
ACM Transactions on Sensor Networks (TOSN) 18 (2), 1-41, 2022
172022
A new unified intrusion anomaly detection in identifying unseen web attacks
MH Kamarudin, C Maple, T Watson, NS Safa
Security and Communication Networks 2017, 2017
172017
An initial investigation into attribution in SCADA systems
A Nicholson, H Janicke, T Watson
1st International Symposium for ICS & SCADA Cyber Security Research 2013 …, 2013
172013
Visualisation of network forensics traffic data with a self-organising map for qualitative features
EJ Palomo, J North, D Elizondo, RM Luque, T Watson
The 2011 International Joint Conference on Neural Networks, 1740-1747, 2011
172011
A new semantic attribute deep learning with a linguistic attribute hierarchy for spam detection
H He, T Watson, C Maple, J Mehnen, A Tiwari
2017 International Joint Conference on Neural Networks (IJCNN), 3862-3869, 2017
162017
Incremental information gain analysis of input attribute impact on RBF-kernel SVM spam detection
H He, A Tiwari, J Mehnen, T Watson, C Maple, Y Jin, B Gabrys
2016 IEEE Congress on Evolutionary Computation (CEC), 1022-1029, 2016
162016
The system can't perform the operation now. Try again later.
Articles 1–20