Journal Articles
Fernandez de Arroyabe, I,
Watson, T, Phillips, I (2024)
Cybersecurity Maintenance in the Automotive Industry Challenges and Solutions: A Technology Adoption Approach,
Future Internet, 16(11), pp.395-395, DOI:
10.3390/fi16110395.
Boyes, H and
Watson, T (2022)
Digital twins: An analysis framework and open issues,
COMPUTERS IN INDUSTRY, 143, ARTN 103763, ISSN: 0166-3615. DOI:
10.1016/j.compind.2022.103763.
Kapalidis, C, Karamperidis, S,
Watson, T, Koligiannis, G (2022)
A Vulnerability Centric System of Systems Analysis on the Maritime Transportation Sector Most Valuable Assets: Recommendations for Port Facilities and Ships,
JOURNAL OF MARINE SCIENCE AND ENGINEERING, 10(10), ARTN 1486, DOI:
10.3390/jmse10101486.
Fernandez de Arroyabe, I,
Watson, T, Angelopoulou, O (2022)
Cybersecurity in the Automotive Industry: A Systematic Literature Review (SLR),
Journal of Computer Information Systems, 63(3), pp.716-734, ISSN: 0887-4417. DOI:
10.1080/08874417.2022.2103853.
Bradbury, M, Jhumka, A,
Watson, T, Flores, D, Burton, J, Butler, M (2022)
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things,
ACM Transactions on Sensor Networks, 18(2), 29, ISSN: 1550-4859. DOI:
10.1145/3510424.
Karamperidis, S, Kapalidis, C,
Watson, T (2021)
Maritime Cyber Security: A Global Challenge Tackled through Distinct Regional Approaches,
Journal of Marine Science and Engineering, 9(12), 1323, ISSN: 2077-1312. DOI:
10.3390/jmse9121323.
Safa, NS, Maple, C, Haghparast, M,
Watson, T, Dianati, M (2019)
An opportunistic resource management model to overcome resource-constraint in the Internet of Things,
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 31(8), ARTN e5014, ISSN: 1532-0626. DOI:
10.1002/cpe.5014.
Boyes, H, Hallaq, B, Cunningham, J,
Watson, T (2018)
The industrial internet of things (IIoT): An analysis framework,
COMPUTERS IN INDUSTRY, 101, pp.1-12, ISSN: 0166-3615. DOI:
10.1016/j.compind.2018.04.015.
Safa, NS, Maple, C,
Watson, T, Von Solms, R (2018)
Motivation and opportunity based model to reduce information security insider threats in organisations,
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 40, pp.247-257, ISSN: 2214-2126. DOI:
10.1016/j.jisa.2017.11.001.
Safa, NS, Maple, C,
Watson, T, Furnell, S (2018)
Information security collaboration formation in organisations,
IET INFORMATION SECURITY, 12(3), pp.238-245, ISSN: 1751-8709. DOI:
10.1049/iet-ifs.2017.0257.
Kamarudin, MH, Maple, C,
Watson, T, Safa, NS (2017)
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks,
SECURITY AND COMMUNICATION NETWORKS, UNSP 2539034, ISSN: 1939-0114. DOI:
10.1155/2017/2539034.
Kamarudin, MH, Maple, C,
Watson, T, Safa, NS (2017)
A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks,
IEEE ACCESS, 5, pp.26190-26200, ISSN: 2169-3536. DOI:
10.1109/ACCESS.2017.2766844.
Conferences
Oneil, M, Lock, R, Baker, P,
Watson, T (2025)
Preliminary findings of practitioner’s perspectives on AI adoption in engineering processes - an exploratory study in engineering practices. In
Proceedings of the Thirty Fourth Safety Critical Systems Symposium; AI and Safety Critical Systems, York. DOI:
10.65391/r3351.
Peck, A, Phillips, I,
Watson, T (2025)
Shadow users: Cyber-physical threats from a human-computer interaction perspective. In
7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications; 2025 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA), Ankara, Turkiye,ISBN: 9798331510886. DOI:
10.1109/ICHORA65333.2025.11017158.
Peck, A, Phillips, I,
Watson, T (2025)
Treasure maps and special effects: the digital twin offering to threat actors. In
DigitalTwin 2024 (Part of IEEE Smartworld 2024); 2024 IEEE Smart World Congress (SWC), Denerau Island, Fiji, pp.2175-2180, ISBN: 9798331520861. DOI:
10.1109/SWC62898.2024.00332.
Chang, SJ,
Watson, T, Phillips, I (2025)
Understanding the Dynamics of the Cyber Grey Zone: A Conceptual Framework. In
, European Conference on Information Warfare and Security Eccws, pp.745-752, DOI:
10.34190/eccws.24.1.3714.
Chang, SJ, Hicks, C, Mavroudis, V, Phillips, I,
Watson, T (2025)
Towards Autonomous Cyber Defence: Applying Systems Theoretic Process Analysis to Human-Machine Teaming. In
, Proceedings of the International Joint Conference on Neural Networks. DOI:
10.1109/IJCNN64981.2025.11228518.
Chang, SJ, Hicks, C, Mavroudis, V,
Watson, T, Phillips, I (2025)
Enhancing Cyber Resilience in Critical Infrastructure: The Role of AI in Strengthening the Three-Pillar Structure. In
, Iccr 2025 3rd International Conference on Cyber Resilience. DOI:
10.1109/ICCR67387.2025.11292513.
Peck, A, Phillips, I, Watson, T (Accepted for publication) Array. In DigitalTwin 2024 (Part of IEEE Smartworld 2024), FIJI.
Peck, AG, Phillips, I,
Watson, T (2024) DigitalTwin 2024. In
DigitalTwin 2024 / Smartworld 2024, Fiji.
Peck, A, Norris, P,
Watson, T, Phillips, I (2024)
Matching national strategy to local capability: the design of a novel cyber resilience MSc. In Chova, LG, Martínez, CG, Lees, J (ed)
18th International Technology, Education and Development Conference (INTED2024); INTED2024 Proceedings, Valencia, Spain, pp.5435-5441, ISBN: 9788409592159. DOI:
10.21125/inted.2024.1405.
Chang, S-J,
Watson, T, Phillips, I (2023)
Is your AI in cyber research still capable of leaping forwards: the US and China military’s approach to AI in cyber conflict. In
The International Conference on Recent Advancements in Computing in AI, IoT and Computer Engineering Technology (CICET 2023); International Journal of Design, Analysis and Tools for Integrated Circuits and Systems (IJDATICS), New Taipei, Taiwan, pp.1-6.
Hicks, C, Mavroudis, V, Foley, M, Davies, T, Highnam, K,
Watson, T (2023)
Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning. In
, Aisec 2023 Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, pp.91-101, DOI:
10.1145/3605764.3623986.
Collyer, J,
Watson, T, Phillips, I (2023) FASER: Binary Code Similarity Search through the use of Intermediate Representations. In
, Ceur Workshop Proceedings, pp.193-202.
Chen, C, Lee, SW,
Watson, T, Maple, C, Lu, Y (2018)
ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication. In
, 2018 IEEE VEHICULAR NETWORKING CONFERENCE (VNC).
Sohrabi Safa, N, Maple, C,
Watson, T (2017)
An Information Security Risk Management Model for Smart Industries. In
, ADVANCES IN MANUFACTURING TECHNOLOGY XXXI, pp.257-262, ISBN: 978-1-61499-791-7. DOI:
10.3233/978-1-61499-792-4-257.
Chen, C, Lee, SW,
Watson, T, Maple, C, Lu, Y (2017)
CAESAR: A Criticality-Aware ECDSA Signature Verification Scheme with Markov Model. In
, 2017 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), pp.151-154.
Sample, C,
Watson, T, Hutchinson, S, Hallaq, B, Cowley, J, Maple, C (2017)
Data Fidelity: Security's Soft Underbelly. In
, 2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), pp.315-320.
He, H,
Watson, T, Maple, C, Mehnen, J, Tiwari, A, IEEE, (2017)
A New Semantic Attribute Deep Learning with a Linguistic Attribute Hierarchy for Spam Detection. In
, 2017 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), pp.3862-3869.
Boyes, H, Isbell, R,
Watson, T (2016)
Critical Infrastructure in the Future City Developing Secure and Resilient Cyber-Physical Systems. In
, CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2014), pp.13-23, ISBN: 978-3-319-31663-5. DOI:
10.1007/978-3-319-31664-2_2.
Sample, C, Cowley, J,
Watson, T, Maple, C (2016)
Re-thinking Threat Intelligence. In
, 2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), pp.131-139.
Somer, T, Hallaq, B,
Watson, T (2016)
Utilising Journey Mapping and Crime Scripting to Combat Cyber Crime. In
, PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), pp.276-281.
Bryant, I, Maple, C,
Watson, T (2016)
A Cross-Disciplinary Approach to Modelling and Expressing Adversity. In
, PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), pp.42-51.
He, H, Tiwari, A, Mehnen, J,
Watson, T, Maple, C, Jin, Y, Gabrys, B, IEEE, (2016)
Incremental Information Gain Analysis of Input Attribute Impact on RBF-Kernel SVM Spam Detection. In
, 2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), pp.1022-1029.
He, H, Maple, C,
Watson, T, Tiwari, A, Mehnen, J, Jin, Y, Gabrys, B, IEEE, (2016)
The Security Challenges in the IoT enabled Cyber-Physical Systems and Opportunities for Evolutionary Computing & Other Computational Intelligence. In
, 2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), pp.1015-1021.
Le Compte, A,
Watson, T, Elizondo, D (2015)
A Renewed Approach to Serious Games for Cyber Security. In
, 2015 7TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT - ARCHITECTURES IN CYBERSPACE (CYCON), pp.203-216.