팔로우
Professor Paul Watters
Professor Paul Watters
Cyberstronomy Pty Ltd
cyberstronomy.com의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
Statistics in a nutshell: A desktop quick reference
S Boslaugh
" O'Reilly Media, Inc.", 2012
10092012
Zero-day malware detection based on supervised learning algorithms of API call signatures
M Alazab, S Venkatraman, P Watters, M Alazab
Sydney, New South Wales: Australian Computer Society, 2010
2322010
Towards understanding malware behaviour by the extraction of API calls
M Alazab, S Venkataraman, P Watters
2010 second cybercrime and trustworthy computing workshop, 52-59, 2010
1732010
A trust based access control framework for P2P file-sharing systems
H Tran, M Hitchens, V Varadharajan, P Watters
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
1732005
Authorship attribution for twitter in 140 characters or less
R Layton, P Watters, R Dazeley
2010 Second Cybercrime and Trustworthy Computing Workshop, 1-8, 2010
1722010
Web services security
M O'neill
McGraw-Hill Osborne Media, 2003
1702003
Web Services Security
A O’Neill, M., Hallam-Baker, P., Mac Cann, S., Shema
McGraw-Hill, 2003
1702003
Cybersecurity data science: an overview from machine learning perspective
IH Sarker, ASM Kayes, S Badsha, H Alqahtani, P Watters, A Ng
Journal of Big data 7 (1), 1-29, 2020
1492020
Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage
IH Sarker, ASM Kayes, P Watters
Journal of Big Data 6 (1), 1-28, 2019
1132019
A survey on latest botnet attack and defense
L Zhang, S Yu, D Wu, P Watters
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
952011
Wiki pedagogy--a tale of two wikis
M Bower, K Woo, M Roberts, P Watters
2006 7th International Conference on Information Technology Based Higher …, 2006
872006
Malware detection based on structural and behavioural features of api calls
M Alazab, R Layton, S Venkataraman, P Watters
School of Computer and Information Science, Security Research Centre, Edith …, 2010
842010
Detecting phishing emails using hybrid features
L Ma, B Ofoghi, P Watters, S Brown
2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing …, 2009
842009
A comparative analysis of distributed ledger technology platforms
MJM Chowdhury, MDS Ferdous, K Biswas, N Chowdhury, ASM Kayes, ...
IEEE Access 7, 167930-167943, 2019
822019
Cybercrime: the case of obfuscated malware
M Alazab, S Venkatraman, P Watters, M Alazab, A Alazab
Global security, safety and sustainability & e-Democracy, 204-211, 2011
812011
The factor structure of cybersickness
S Bruck, PA Watters
Displays 32 (4), 153-158, 2011
792011
Caffeine and cognitive performance: The nonlinear Yerkes–Dodson law
PA Watters, F Martin, Z Schreter
Human Psychopharmacology: Clinical and Experimental 12 (3), 249-257, 1997
781997
Statistical and structural approaches to filtering internet pornography
WH Ho, PA Watters
2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat …, 2004
732004
A methodology for estimating the tangible cost of data breaches
R Layton, PA Watters
Journal of Information Security and Applications 19 (6), 321-330, 2014
722014
Internet subcultures and pathways to the use of child pornography
J Prichard, PA Watters, C Spiranovic
Computer Law & Security Review 27 (6), 585-600, 2011
682011
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20