Παρακολούθηση
Professor Paul Watters
Professor Paul Watters
Cyberstronomy Pty Ltd
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα cyberstronomy.com - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Statistics in a nutshell: A desktop quick reference
S Boslaugh
" O'Reilly Media, Inc.", 2012
11272012
Zero-day malware detection based on supervised learning algorithms of API call signatures
M Alazab, S Venkatraman, P Watters, M Alazab
Sydney, New South Wales: Australian Computer Society, 2010
2422010
Cybersecurity data science: an overview from machine learning perspective
IH Sarker, ASM Kayes, S Badsha, H Alqahtani, P Watters, A Ng
Journal of Big data 7 (1), 1-29, 2020
2152020
Authorship attribution for twitter in 140 characters or less
R Layton, P Watters, R Dazeley
2010 Second Cybercrime and Trustworthy Computing Workshop, 1-8, 2010
1842010
Towards understanding malware behaviour by the extraction of API calls
M Alazab, S Venkataraman, P Watters
2010 second cybercrime and trustworthy computing workshop, 52-59, 2010
1832010
A trust based access control framework for P2P file-sharing systems
H Tran, M Hitchens, V Varadharajan, P Watters
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
1742005
Web services security
M O'neill
McGraw-Hill Osborne Media, 2003
1712003
Web Services Security
A O’Neill, M., Hallam-Baker, P., Mac Cann, S., Shema
McGraw-Hill, 2003
1712003
Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage
IH Sarker, ASM Kayes, P Watters
Journal of Big Data 6 (1), 1-28, 2019
1362019
A comparative analysis of distributed ledger technology platforms
MJM Chowdhury, MDS Ferdous, K Biswas, N Chowdhury, ASM Kayes, ...
IEEE Access 7, 167930-167943, 2019
1032019
A survey on latest botnet attack and defense
L Zhang, S Yu, D Wu, P Watters
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
1022011
Cybercrime: the case of obfuscated malware
M Alazab, S Venkatraman, P Watters, M Alazab, A Alazab
Global security, safety and sustainability & e-Democracy, 204-211, 2011
902011
Malware detection based on structural and behavioural features of api calls
M Alazab, R Layton, S Venkataraman, P Watters
School of Computer and Information Science, Security Research Centre, Edith …, 2010
892010
Wiki pedagogy--a tale of two wikis
M Bower, K Woo, M Roberts, P Watters
2006 7th International Conference on Information Technology Based Higher …, 2006
892006
The factor structure of cybersickness
S Bruck, PA Watters
Displays 32 (4), 153-158, 2011
872011
Detecting phishing emails using hybrid features
L Ma, B Ofoghi, P Watters, S Brown
2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing …, 2009
872009
Caffeine and cognitive performance: The nonlinear Yerkes–Dodson law
PA Watters, F Martin, Z Schreter
Human Psychopharmacology: Clinical and Experimental 12 (3), 249-257, 1997
801997
A methodology for estimating the tangible cost of data breaches
R Layton, PA Watters
Journal of Information Security and Applications 19 (6), 321-330, 2014
752014
Statistical and structural approaches to filtering internet pornography
WH Ho, PA Watters
2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat …, 2004
742004
Internet subcultures and pathways to the use of child pornography
J Prichard, PA Watters, C Spiranovic
Computer Law & Security Review 27 (6), 585-600, 2011
722011
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20