Journal Articles
Boyes, H and
Watson, T (2022)
Digital twins: An analysis framework and open issues,
COMPUTERS IN INDUSTRY, 143, ARTN 103763, ISSN: 0166-3615. DOI:
10.1016/j.compind.2022.103763.
Kapalidis, C, Karamperidis, S,
Watson, T, Koligiannis, G (2022)
A Vulnerability Centric System of Systems Analysis on the Maritime Transportation Sector Most Valuable Assets: Recommendations for Port Facilities and Ships,
JOURNAL OF MARINE SCIENCE AND ENGINEERING, 10(10), ARTN 1486, DOI:
10.3390/jmse10101486.
Fernandez de Arroyabe, I,
Watson, T, Angelopoulou, O (2022)
Cybersecurity in the Automotive Industry: A Systematic Literature Review (SLR),
Journal of Computer Information Systems, 63(3), pp.716-734, ISSN: 0887-4417. DOI:
10.1080/08874417.2022.2103853.
Bradbury, M, Jhumka, A,
Watson, T, Flores, D, Burton, J, Butler, M (2022)
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things,
ACM Transactions on Sensor Networks, 18(2), 29, ISSN: 1550-4859. DOI:
10.1145/3510424.
Karamperidis, S, Kapalidis, C,
Watson, T (2021)
Maritime Cyber Security: A Global Challenge Tackled through Distinct Regional Approaches,
JOURNAL OF MARINE SCIENCE AND ENGINEERING, 9(12), ARTN 1323, DOI:
10.3390/jmse9121323.
Safa, NS, Maple, C, Haghparast, M,
Watson, T, Dianati, M (2019)
An opportunistic resource management model to overcome resource-constraint in the Internet of Things,
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 31(8), ARTN e5014, ISSN: 1532-0626. DOI:
10.1002/cpe.5014.
Boyes, H, Hallaq, B, Cunningham, J,
Watson, T (2018)
The industrial internet of things (IIoT): An analysis framework,
COMPUTERS IN INDUSTRY, 101, pp.1-12, ISSN: 0166-3615. DOI:
10.1016/j.compind.2018.04.015.
Safa, NS, Maple, C,
Watson, T, Von Solms, R (2018)
Motivation and opportunity based model to reduce information security insider threats in organisations,
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 40, pp.247-257, ISSN: 2214-2126. DOI:
10.1016/j.jisa.2017.11.001.
Safa, NS, Maple, C,
Watson, T, Furnell, S (2018)
Information security collaboration formation in organisations,
IET INFORMATION SECURITY, 12(3), pp.238-245, ISSN: 1751-8709. DOI:
10.1049/iet-ifs.2017.0257.
Kamarudin, MH, Maple, C,
Watson, T, Safa, NS (2017)
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks,
SECURITY AND COMMUNICATION NETWORKS, UNSP 2539034, ISSN: 1939-0114. DOI:
10.1155/2017/2539034.
Kamarudin, MH, Maple, C,
Watson, T, Safa, NS (2017)
A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks,
IEEE ACCESS, 5, pp.26190-26200, ISSN: 2169-3536. DOI:
10.1109/ACCESS.2017.2766844.
Conferences
Peck, A, Norris, P,
Watson, T, Phillips, I (2024)
Matching national strategy to local capability: the design of a novel cyber resilience MSc. In Chova, LG, Martínez, CG, Lees, J (ed)
18th International Technology, Education and Development Conference (INTED2024); INTED2024 Proceedings, Valencia, Spain, pp.5435-5441, ISBN: 9788409592159. DOI:
10.21125/inted.2024.1405.
Chang, S-J,
Watson, T, Phillips, I (2023)
Is your AI in cyber research still capable of leaping forwards: the US and China military’s approach to AI in cyber conflict. In
The International Conference on Recent Advancements in Computing in AI, IoT and Computer Engineering Technology (CICET 2023); International Journal of Design, Analysis and Tools for Integrated Circuits and Systems (IJDATICS), New Taipei, Taiwan, pp.1-6.
Hicks, C, Mavroudis, V, Foley, M, Davies, T, Highnam, K,
Watson, T (2023)
Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning. In
, AISec 2023 - Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, pp.91-101, DOI:
10.1145/3605764.3623986.
Chen, C, Lee, SW,
Watson, T, Maple, C, Lu, Y (2018)
ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication. In
, 2018 IEEE VEHICULAR NETWORKING CONFERENCE (VNC).
Sohrabi Safa, N, Maple, C,
Watson, T (2017)
An Information Security Risk Management Model for Smart Industries. In
, ADVANCES IN MANUFACTURING TECHNOLOGY XXXI, pp.257-262, ISBN: 978-1-61499-791-7. DOI:
10.3233/978-1-61499-792-4-257.
Chen, C, Lee, SW,
Watson, T, Maple, C, Lu, Y (2017)
CAESAR: A Criticality-Aware ECDSA Signature Verification Scheme with Markov Model. In
, 2017 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), pp.151-154.
Sample, C,
Watson, T, Hutchinson, S, Hallaq, B, Cowley, J, Maple, C (2017)
Data Fidelity: Security's Soft Underbelly. In
, 2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), pp.315-320.
He, H,
Watson, T, Maple, C, Mehnen, J, Tiwari, A, IEEE, (2017)
A New Semantic Attribute Deep Learning with a Linguistic Attribute Hierarchy for Spam Detection. In
, 2017 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), pp.3862-3869.
Boyes, H, Isbell, R,
Watson, T (2016)
Critical Infrastructure in the Future City Developing Secure and Resilient Cyber-Physical Systems. In
, CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2014), pp.13-23, ISBN: 978-3-319-31663-5. DOI:
10.1007/978-3-319-31664-2_2.
Sample, C, Cowley, J,
Watson, T, Maple, C (2016)
Re-thinking Threat Intelligence. In
, 2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), pp.131-139.
Somer, T, Hallaq, B,
Watson, T (2016)
Utilising Journey Mapping and Crime Scripting to Combat Cyber Crime. In
, PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), pp.276-281.
Bryant, I, Maple, C,
Watson, T (2016)
A Cross-Disciplinary Approach to Modelling and Expressing Adversity. In
, PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), pp.42-51.
He, H, Tiwari, A, Mehnen, J,
Watson, T, Maple, C, Jin, Y, Gabrys, B, IEEE, (2016)
Incremental Information Gain Analysis of Input Attribute Impact on RBF-Kernel SVM Spam Detection. In
, 2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), pp.1022-1029.
He, H, Maple, C,
Watson, T, Tiwari, A, Mehnen, J, Jin, Y, Gabrys, B, IEEE, (2016)
The Security Challenges in the IoT enabled Cyber-Physical Systems and Opportunities for Evolutionary Computing & Other Computational Intelligence. In
, 2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), pp.1015-1021.
Le Compte, A,
Watson, T, Elizondo, D (2015)
A Renewed Approach to Serious Games for Cyber Security. In
, 2015 7TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT - ARCHITECTURES IN CYBERSPACE (CYCON), pp.203-216.