Coronavirus (Covid-19): Latest updates and information
Skip to main content Skip to navigation

Publications

View Publications

View Journals        View Books and Chapters        View Conferences        View Other

Journals


  • Tully, Gillian, Cohen, Neil, Compton, David, Davies, Gareth, Isbell, Roy, Watson, Tim. 2020. Quality standards for digital forensics : learning from experience in England & Wales. Forensic Science International: Digital Investigation, 32, View
  • Kamarudin, Muhammad Hilmi, Maple, Carsten, Watson, Tim. 2019. Hybrid feature selection technique for intrusion detection system. International Journal of High Performance Computing and Networking (IJHPCN), 13 (2), pp. 232-240, View
  • Yuan, Hu, Maple, Carsten, Chen, Chao, Watson, Tim. 2018. Cross-device tracking through identification of user typing behaviours. Electronics Letters, 54 (15), pp. 957-959, View
  • Boyes, Hugh, Hallaq, Bilal, Cunningham, Joe, Watson, Tim. 2018. The industrial internet of things (IIoT) : an analysis framework. Computers in Industry, 101, pp. 1-12, View
  • Sohrabi Safa, Nader, Maple, Carsten, Watson, Tim, Von Solms, Rossouw. 2018. Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of Information Security and Applications, View
  • Safa, Nader Sohrabi, Maple, Carsten, Watson, Tim, Von Solms, Rossouw. 2018. Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of Information Security and Applications, 40, pp. 247-257, View
  • Sohrabi Safa, Nader, Maple, Carsten, Haghparast, Mahboobeh, Watson, Tim, Dianati, Mehrdad. 2018. An opportunistic resource management model to overcome resource-constraint in the Internet of Things. Concurrency and Computation: Practice and Experience, View
  • Sohrabi Safa, Nader, Maple, Carsten, Watson, Tim, Furnell, Steven. 2018. Information security collaboration formation in organisations. IET Information Security, 12 (3), View
  • Sohrabi Safa, Nader, Maple, Carsten, Watson, Tim. 2017. The information security landscape in the supply chain. Computer Fraud & Security, 6, pp. 16-20, View
  • Kamarudin, Muhammad Hilmi, Maple, Carsten, Watson, Tim, Sohrabi Safa, Nader. 2017. A new unified intrusion anomaly detection in identifying unseen web attacks. Security and Communication Networks, 2017, pp. 1-18, View
  • Kamarudin, Muhammad Hilmi, Maple, Carsten, Watson, Tim, Sohrabi Safa, Nader. 2017. A LogitBoost-based algorithm for detecting known and unknown web attacks. IEEE Access, 5, pp. 26190 -26200, View
  • Sample, Char, Maple, Carsten, Watson, Tim, Hallaq, Bilal. 2016. A less subjective method for evaluating cyber event threat actors. Computers & Security, View
  • Somer, Tiia, Hallaq, Bilal, Watson, Tim. 2016. Utilising journey mapping and crime scripting to combat cyber crime and cyber warfare attacks. Journal of Information Warfare, 15 (4), pp. 39-49, View
  • Elizondo, David A., Morris, Robert, Watson, Tim, Passow, Benjamin N.. 2013. Constructive recursive deterministic perception neural networks with genetic algorithms. International Journal of Pattern Recognition and Artificial Intelligence, 27 (06), View
  • Luque-Baena, Rafael M., Elizondo, David, López-Rubio, Ezequiel, Palomo, Esteban J., Watson, Tim. 2013. Assessment of geometric features for individual identification and verification in biometric hand systems. Expert Systems with Applications, 40 (9), pp. 3580-3594, View
  • Palomo, E. J., North, J., Elizondo, D., Luque, R. M., Watson, Tim. 2012. Application of growing hierarchical SOM for visualisation of network forensics traffic data. Neural Networks, 32, pp. 275-284, View




Page 1 of 1