Loughborough University
Leicestershire, UK
LE11 3TU
+44 (0)1509 263171
Loughborough University

Loughborough University Research Publications


Publications for Tim Watson

From (year): To (year):

Download all publications as Word document


Journal Articles

Boyes, H and Watson, T (2022) Digital twins: An analysis framework and open issues, COMPUTERS IN INDUSTRY, 143, ARTN 103763, ISSN: 0166-3615. DOI: 10.1016/j.compind.2022.103763.

Kapalidis, C, Karamperidis, S, Watson, T, Koligiannis, G (2022) A Vulnerability Centric System of Systems Analysis on the Maritime Transportation Sector Most Valuable Assets: Recommendations for Port Facilities and Ships, JOURNAL OF MARINE SCIENCE AND ENGINEERING, 10(10), ARTN 1486, DOI: 10.3390/jmse10101486.

Fernandez de Arroyabe, I, Watson, T, Angelopoulou, O (2022) Cybersecurity in the Automotive Industry: A Systematic Literature Review (SLR), Journal of Computer Information Systems, 63(3), pp.716-734, ISSN: 0887-4417. DOI: 10.1080/08874417.2022.2103853.

Bradbury, M, Jhumka, A, Watson, T, Flores, D, Burton, J, Butler, M (2022) Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things, ACM Transactions on Sensor Networks, 18(2), 29, ISSN: 1550-4859. DOI: 10.1145/3510424.

Karamperidis, S, Kapalidis, C, Watson, T (2021) Maritime Cyber Security: A Global Challenge Tackled through Distinct Regional Approaches, JOURNAL OF MARINE SCIENCE AND ENGINEERING, 9(12), ARTN 1323, DOI: 10.3390/jmse9121323.

Safa, NS, Maple, C, Haghparast, M, Watson, T, Dianati, M (2019) An opportunistic resource management model to overcome resource-constraint in the Internet of Things, CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 31(8), ARTN e5014, ISSN: 1532-0626. DOI: 10.1002/cpe.5014.

Boyes, H, Hallaq, B, Cunningham, J, Watson, T (2018) The industrial internet of things (IIoT): An analysis framework, COMPUTERS IN INDUSTRY, 101, pp.1-12, ISSN: 0166-3615. DOI: 10.1016/j.compind.2018.04.015.

Safa, NS, Maple, C, Watson, T, Von Solms, R (2018) Motivation and opportunity based model to reduce information security insider threats in organisations, JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 40, pp.247-257, ISSN: 2214-2126. DOI: 10.1016/j.jisa.2017.11.001.

Safa, NS, Maple, C, Watson, T, Furnell, S (2018) Information security collaboration formation in organisations, IET INFORMATION SECURITY, 12(3), pp.238-245, ISSN: 1751-8709. DOI: 10.1049/iet-ifs.2017.0257.

Kamarudin, MH, Maple, C, Watson, T, Safa, NS (2017) A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks, SECURITY AND COMMUNICATION NETWORKS, UNSP 2539034, ISSN: 1939-0114. DOI: 10.1155/2017/2539034.

Kamarudin, MH, Maple, C, Watson, T, Safa, NS (2017) A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks, IEEE ACCESS, 5, pp.26190-26200, ISSN: 2169-3536. DOI: 10.1109/ACCESS.2017.2766844.



Conferences

Peck, A, Norris, P, Watson, T, Phillips, I (2024) Matching national strategy to local capability: the design of a novel cyber resilience MSc. In Chova, LG, Martínez, CG, Lees, J (ed) 18th International Technology, Education and Development Conference (INTED2024); INTED2024 Proceedings, Valencia, Spain, pp.5435-5441, ISBN: 9788409592159. DOI: 10.21125/inted.2024.1405.

Chang, S-J, Watson, T, Phillips, I (2023) Is your AI in cyber research still capable of leaping forwards: the US and China military’s approach to AI in cyber conflict. In The International Conference on Recent Advancements in Computing in AI, IoT and Computer Engineering Technology (CICET 2023); International Journal of Design, Analysis and Tools for Integrated Circuits and Systems (IJDATICS), New Taipei, Taiwan, pp.1-6.

Hicks, C, Mavroudis, V, Foley, M, Davies, T, Highnam, K, Watson, T (2023) Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning. In , AISec 2023 - Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, pp.91-101, DOI: 10.1145/3605764.3623986.

Chen, C, Lee, SW, Watson, T, Maple, C, Lu, Y (2018) ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication. In , 2018 IEEE VEHICULAR NETWORKING CONFERENCE (VNC).

Sohrabi Safa, N, Maple, C, Watson, T (2017) An Information Security Risk Management Model for Smart Industries. In , ADVANCES IN MANUFACTURING TECHNOLOGY XXXI, pp.257-262, ISBN: 978-1-61499-791-7. DOI: 10.3233/978-1-61499-792-4-257.

Chen, C, Lee, SW, Watson, T, Maple, C, Lu, Y (2017) CAESAR: A Criticality-Aware ECDSA Signature Verification Scheme with Markov Model. In , 2017 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), pp.151-154.

Sample, C, Watson, T, Hutchinson, S, Hallaq, B, Cowley, J, Maple, C (2017) Data Fidelity: Security's Soft Underbelly. In , 2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), pp.315-320.

He, H, Watson, T, Maple, C, Mehnen, J, Tiwari, A, IEEE, (2017) A New Semantic Attribute Deep Learning with a Linguistic Attribute Hierarchy for Spam Detection. In , 2017 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), pp.3862-3869.

Boyes, H, Isbell, R, Watson, T (2016) Critical Infrastructure in the Future City Developing Secure and Resilient Cyber-Physical Systems. In , CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2014), pp.13-23, ISBN: 978-3-319-31663-5. DOI: 10.1007/978-3-319-31664-2_2.

Sample, C, Cowley, J, Watson, T, Maple, C (2016) Re-thinking Threat Intelligence. In , 2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), pp.131-139.

Somer, T, Hallaq, B, Watson, T (2016) Utilising Journey Mapping and Crime Scripting to Combat Cyber Crime. In , PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), pp.276-281.

Bryant, I, Maple, C, Watson, T (2016) A Cross-Disciplinary Approach to Modelling and Expressing Adversity. In , PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), pp.42-51.

He, H, Tiwari, A, Mehnen, J, Watson, T, Maple, C, Jin, Y, Gabrys, B, IEEE, (2016) Incremental Information Gain Analysis of Input Attribute Impact on RBF-Kernel SVM Spam Detection. In , 2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), pp.1022-1029.

He, H, Maple, C, Watson, T, Tiwari, A, Mehnen, J, Jin, Y, Gabrys, B, IEEE, (2016) The Security Challenges in the IoT enabled Cyber-Physical Systems and Opportunities for Evolutionary Computing & Other Computational Intelligence. In , 2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), pp.1015-1021.

Le Compte, A, Watson, T, Elizondo, D (2015) A Renewed Approach to Serious Games for Cyber Security. In , 2015 7TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT - ARCHITECTURES IN CYBERSPACE (CYCON), pp.203-216.



Getting in touch

Research Office
Loughborough University
Loughborough
Leicestershire
LE11 3TU
researchpolicy@lboro.ac.uk
+44 (0)1509 222453