Statistics in a Nutshell S Boslaugh " O'Reilly Media, Inc.", 2012 | 1408 | 2012 |
Cybersecurity data science: an overview from machine learning perspective IH Sarker, ASM Kayes, S Badsha, H Alqahtani, P Watters, A Ng Journal of Big data 7, 1-29, 2020 | 776 | 2020 |
Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures. M Alazab, S Venkatraman, PA Watters, M Alazab AusDM 11, 171-182, 2011 | 309 | 2011 |
Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage IH Sarker, ASM Kayes, P Watters Journal of Big Data 6 (1), 1-28, 2019 | 290 | 2019 |
Towards understanding malware behaviour by the extraction of API calls M Alazab, S Venkataraman, P Watters 2010 second cybercrime and trustworthy computing workshop, 52-59, 2010 | 228 | 2010 |
A comparative analysis of distributed ledger technology platforms MJM Chowdhury, MDS Ferdous, K Biswas, N Chowdhury, ASM Kayes, ... IEEE Access 7, 167930-167943, 2019 | 222 | 2019 |
Authorship attribution for twitter in 140 characters or less R Layton, P Watters, R Dazeley 2010 Second Cybercrime and Trustworthy Computing Workshop, 1-8, 2010 | 209 | 2010 |
A trust based access control framework for P2P file-sharing systems H Tran, M Hitchens, V Varadharajan, P Watters Proceedings of the 38th Annual Hawaii International Conference on System …, 2005 | 183 | 2005 |
Web services security M O'neill McGraw-Hill Osborne Media, 2003 | 181 | 2003 |
Web Services Security A O’Neill, M., Hallam-Baker, P., Mac Cann, S., Shema McGraw-Hill, 2003 | 181 | 2003 |
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters ACM Computing Surveys (CSUR) 54 (9), 1-36, 2021 | 154 | 2021 |
A culturally sensitive test to evaluate nuanced gpt hallucination TR McIntosh, T Liu, T Susnjak, P Watters, A Ng, MN Halgamuge IEEE Transactions on Artificial Intelligence, 2023 | 152 | 2023 |
Intelligent dynamic malware detection using machine learning in IP reputation for forensics data analytics N Usman, S Usman, F Khan, MA Jan, A Sajid, M Alazab, P Watters Future Generation Computer Systems 118, 124-141, 2021 | 146 | 2021 |
The factor structure of cybersickness S Bruck, PA Watters Displays 32 (4), 153-158, 2011 | 132 | 2011 |
A survey on latest botnet attack and defense L Zhang, S Yu, D Wu, P Watters 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 119 | 2011 |
Cybercrime: the case of obfuscated malware M Alazab, S Venkatraman, P Watters, M Alazab, A Alazab Global Security, Safety and Sustainability & e-Democracy: 7th International …, 2012 | 118 | 2012 |
Detecting phishing emails using hybrid features L Ma, B Ofoghi, P Watters, S Brown 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing …, 2009 | 106 | 2009 |
Malware detection based on structural and behavioural features of API calls M Alazab, R Layton, S Venkataraman, P Watters School of Computer and Information Science, Security Research Centre, Edith …, 2010 | 105 | 2010 |
From google gemini to openai q*(q-star): A survey of reshaping the generative artificial intelligence (ai) research landscape TR McIntosh, T Susnjak, T Liu, P Watters, MN Halgamuge arXiv preprint arXiv:2312.10868, 2023 | 103 | 2023 |
A methodology for estimating the tangible cost of data breaches R Layton, PA Watters Journal of Information Security and Applications 19 (6), 321-330, 2014 | 103 | 2014 |