Follow
Timothy Mcintosh
Timothy Mcintosh
Other namesTimothy R. Mcintosh, TR McIntosh
Cyberoo Pty Ltd (AU); La Trobe University
Verified email at cyberoo.au
Title
Cited by
Cited by
Year
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
ACM Computing Surveys (CSUR) 54 (9), 1-36, 2021
902021
The inadequacy of entropy-based ransomware detection
T McIntosh, J Jang-Jaccard, P Watters, T Susnjak
Neural Information Processing: 26th International Conference, ICONIP 2019 …, 2019
702019
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation
T McIntosh, T Liu, T Susnjak, H Alavizadeh, A Ng, R Nowrozy, P Watters
Computers & security 134, 103424, 2023
302023
Large scale behavioral analysis of ransomware attacks
TR McIntosh, J Jang-Jaccard, PA Watters
Neural Information Processing: 25th International Conference, ICONIP 2018 …, 2018
302018
Dynamic User-Centric Access Control for Detection of Ransomware Attacks
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 111, 102461, 2021
262021
A culturally sensitive test to evaluate nuanced gpt hallucination
TR McIntosh, T Liu, T Susnjak, P Watters, A Ng, MN Halgamuge
IEEE Transactions on Artificial Intelligence, 2023
252023
From google gemini to openai q*(q-star): A survey of reshaping the generative artificial intelligence (ai) research landscape
TR McIntosh, T Susnjak, T Liu, P Watters, MN Halgamuge
arXiv preprint arXiv:2312.10868, 2023
232023
Enforcing situation-aware access control to build malware-resilient file systems
T McIntosh, P Watters, ASM Kayes, A Ng, YPP Chen
Future Generation Computer Systems 115, 568-582, 2020
212020
Applying staged event-driven access control to combat ransomware
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 128, 103160, 2023
162023
Towards a universal privacy model for electronic health record systems: an ontology and machine learning approach
R Nowrozy, K Ahmed, H Wang, T Mcintosh
Informatics 10 (3), 60, 2023
142023
MSD-Kmeans: A Hybrid Algorithm for Efficient Detection of Global and Local Outliers
Y Wei, J Jang-Jaccard, F Sabrina, T McIntosh
2021 IEEE 15th International Conference on Big Data Science and Engineering …, 2021
14*2021
Intercepting ransomware attacks with staged event-driven access control
T McIntosh
La Trobe, 2022
132022
Inadequacies of large language model benchmarks in the era of generative artificial intelligence
TR McIntosh, T Susnjak, T Liu, P Watters, MN Halgamuge
arXiv preprint arXiv:2402.09880, 2024
112024
Masquerade Attacks Against Security Software Exclusion Lists
T McIntosh, J Jang-Jaccard, P Watters, T Susnjak
Australian Journal of Intelligent Information Processing Systems 16 (4), 1-8, 2019
11*2019
From COBIT to ISO 42001: Evaluating Cybersecurity Frameworks for Opportunities, Risks, and Regulatory Compliance in Commercializing Large Language Models
TR McIntosh, T Susnjak, T Liu, P Watters, R Nowrozy, MN Halgamuge
arXiv preprint arXiv:2402.15770, 2024
62024
Pharmacists' views on and experiences with bowel cancer screening kits in Auckland, New Zealand
N Martini, K Basdew, A Kammona, A Shen, C Taylor, TR McIntosh, ...
International Journal of Pharmacy Practice 22 (4), 257-264, 2014
42014
RanDeter: using novel statistical and physical controls to deter ransomware attacks: a thesis presented in partial fulfillment of the requirements for the degree of Master of …
TR McIntosh
Massey University, 2018
22018
Privacy preservation of electronic health records in the modern era: A systematic survey
R Nowrozy, K Ahmed, ASM Kayes, H Wang, TR McIntosh
ACM Computing Surveys, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–18