Loughborough University Research Publications
Loughborough University
Leicestershire, UK
LE11 3TU
+44 (0)1509 263171
Loughborough University

Loughborough University Research Publications


Publications for Tim Watson

From (year): To (year):

Download all publications as Word document


Journal Articles

Fernandez de Arroyabe, I, Watson, T, Phillips, I (2024) Cybersecurity Maintenance in the Automotive Industry Challenges and Solutions: A Technology Adoption Approach, Future Internet, 16(11), pp.395-395, DOI: 10.3390/fi16110395.

Boyes, H and Watson, T (2022) Digital twins: An analysis framework and open issues, COMPUTERS IN INDUSTRY, 143, ARTN 103763, ISSN: 0166-3615. DOI: 10.1016/j.compind.2022.103763.

Kapalidis, C, Karamperidis, S, Watson, T, Koligiannis, G (2022) A Vulnerability Centric System of Systems Analysis on the Maritime Transportation Sector Most Valuable Assets: Recommendations for Port Facilities and Ships, JOURNAL OF MARINE SCIENCE AND ENGINEERING, 10(10), ARTN 1486, DOI: 10.3390/jmse10101486.

Fernandez de Arroyabe, I, Watson, T, Angelopoulou, O (2022) Cybersecurity in the Automotive Industry: A Systematic Literature Review (SLR), Journal of Computer Information Systems, 63(3), pp.716-734, ISSN: 0887-4417. DOI: 10.1080/08874417.2022.2103853.

Bradbury, M, Jhumka, A, Watson, T, Flores, D, Burton, J, Butler, M (2022) Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things, ACM Transactions on Sensor Networks, 18(2), 29, ISSN: 1550-4859. DOI: 10.1145/3510424.

Karamperidis, S, Kapalidis, C, Watson, T (2021) Maritime Cyber Security: A Global Challenge Tackled through Distinct Regional Approaches, Journal of Marine Science and Engineering, 9(12), 1323, ISSN: 2077-1312. DOI: 10.3390/jmse9121323.

Safa, NS, Maple, C, Haghparast, M, Watson, T, Dianati, M (2019) An opportunistic resource management model to overcome resource-constraint in the Internet of Things, CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 31(8), ARTN e5014, ISSN: 1532-0626. DOI: 10.1002/cpe.5014.

Boyes, H, Hallaq, B, Cunningham, J, Watson, T (2018) The industrial internet of things (IIoT): An analysis framework, COMPUTERS IN INDUSTRY, 101, pp.1-12, ISSN: 0166-3615. DOI: 10.1016/j.compind.2018.04.015.

Safa, NS, Maple, C, Watson, T, Von Solms, R (2018) Motivation and opportunity based model to reduce information security insider threats in organisations, JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 40, pp.247-257, ISSN: 2214-2126. DOI: 10.1016/j.jisa.2017.11.001.

Safa, NS, Maple, C, Watson, T, Furnell, S (2018) Information security collaboration formation in organisations, IET INFORMATION SECURITY, 12(3), pp.238-245, ISSN: 1751-8709. DOI: 10.1049/iet-ifs.2017.0257.

Kamarudin, MH, Maple, C, Watson, T, Safa, NS (2017) A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks, SECURITY AND COMMUNICATION NETWORKS, UNSP 2539034, ISSN: 1939-0114. DOI: 10.1155/2017/2539034.

Kamarudin, MH, Maple, C, Watson, T, Safa, NS (2017) A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks, IEEE ACCESS, 5, pp.26190-26200, ISSN: 2169-3536. DOI: 10.1109/ACCESS.2017.2766844.



Conferences

Oneil, M, Lock, R, Baker, P, Watson, T (2025) Preliminary findings of practitioner’s perspectives on AI adoption in engineering processes - an exploratory study in engineering practices. In Proceedings of the Thirty Fourth Safety Critical Systems Symposium; AI and Safety Critical Systems, York. DOI: 10.65391/r3351.

Peck, A, Phillips, I, Watson, T (2025) Shadow users: Cyber-physical threats from a human-computer interaction perspective. In 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications; 2025 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA), Ankara, Turkiye,ISBN: 9798331510886. DOI: 10.1109/ICHORA65333.2025.11017158.

Peck, A, Phillips, I, Watson, T (2025) Treasure maps and special effects: the digital twin offering to threat actors. In DigitalTwin 2024 (Part of IEEE Smartworld 2024); 2024 IEEE Smart World Congress (SWC), Denerau Island, Fiji, pp.2175-2180, ISBN: 9798331520861. DOI: 10.1109/SWC62898.2024.00332.

Chang, SJ, Watson, T, Phillips, I (2025) Understanding the Dynamics of the Cyber Grey Zone: A Conceptual Framework. In , European Conference on Information Warfare and Security Eccws, pp.745-752, DOI: 10.34190/eccws.24.1.3714.

Chang, SJ, Hicks, C, Mavroudis, V, Phillips, I, Watson, T (2025) Towards Autonomous Cyber Defence: Applying Systems Theoretic Process Analysis to Human-Machine Teaming. In , Proceedings of the International Joint Conference on Neural Networks. DOI: 10.1109/IJCNN64981.2025.11228518.

Chang, SJ, Hicks, C, Mavroudis, V, Watson, T, Phillips, I (2025) Enhancing Cyber Resilience in Critical Infrastructure: The Role of AI in Strengthening the Three-Pillar Structure. In , Iccr 2025 3rd International Conference on Cyber Resilience. DOI: 10.1109/ICCR67387.2025.11292513.

Peck, A, Phillips, I, Watson, T (Accepted for publication) Array. In DigitalTwin 2024 (Part of IEEE Smartworld 2024), FIJI.

Peck, AG, Phillips, I, Watson, T (2024) DigitalTwin 2024. In DigitalTwin 2024 / Smartworld 2024, Fiji.

Peck, A, Norris, P, Watson, T, Phillips, I (2024) Matching national strategy to local capability: the design of a novel cyber resilience MSc. In Chova, LG, Martínez, CG, Lees, J (ed) 18th International Technology, Education and Development Conference (INTED2024); INTED2024 Proceedings, Valencia, Spain, pp.5435-5441, ISBN: 9788409592159. DOI: 10.21125/inted.2024.1405.

Chang, S-J, Watson, T, Phillips, I (2023) Is your AI in cyber research still capable of leaping forwards: the US and China military’s approach to AI in cyber conflict. In The International Conference on Recent Advancements in Computing in AI, IoT and Computer Engineering Technology (CICET 2023); International Journal of Design, Analysis and Tools for Integrated Circuits and Systems (IJDATICS), New Taipei, Taiwan, pp.1-6.

Hicks, C, Mavroudis, V, Foley, M, Davies, T, Highnam, K, Watson, T (2023) Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning. In , Aisec 2023 Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, pp.91-101, DOI: 10.1145/3605764.3623986.

Collyer, J, Watson, T, Phillips, I (2023) FASER: Binary Code Similarity Search through the use of Intermediate Representations. In , Ceur Workshop Proceedings, pp.193-202.

Chen, C, Lee, SW, Watson, T, Maple, C, Lu, Y (2018) ATHENA: A Pagerank-based Scheme to Solve the Thundering Herd in Authentication. In , 2018 IEEE VEHICULAR NETWORKING CONFERENCE (VNC).

Sohrabi Safa, N, Maple, C, Watson, T (2017) An Information Security Risk Management Model for Smart Industries. In , ADVANCES IN MANUFACTURING TECHNOLOGY XXXI, pp.257-262, ISBN: 978-1-61499-791-7. DOI: 10.3233/978-1-61499-792-4-257.

Chen, C, Lee, SW, Watson, T, Maple, C, Lu, Y (2017) CAESAR: A Criticality-Aware ECDSA Signature Verification Scheme with Markov Model. In , 2017 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), pp.151-154.

Sample, C, Watson, T, Hutchinson, S, Hallaq, B, Cowley, J, Maple, C (2017) Data Fidelity: Security's Soft Underbelly. In , 2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), pp.315-320.

He, H, Watson, T, Maple, C, Mehnen, J, Tiwari, A, IEEE, (2017) A New Semantic Attribute Deep Learning with a Linguistic Attribute Hierarchy for Spam Detection. In , 2017 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), pp.3862-3869.

Boyes, H, Isbell, R, Watson, T (2016) Critical Infrastructure in the Future City Developing Secure and Resilient Cyber-Physical Systems. In , CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2014), pp.13-23, ISBN: 978-3-319-31663-5. DOI: 10.1007/978-3-319-31664-2_2.

Sample, C, Cowley, J, Watson, T, Maple, C (2016) Re-thinking Threat Intelligence. In , 2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), pp.131-139.

Somer, T, Hallaq, B, Watson, T (2016) Utilising Journey Mapping and Crime Scripting to Combat Cyber Crime. In , PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), pp.276-281.

Bryant, I, Maple, C, Watson, T (2016) A Cross-Disciplinary Approach to Modelling and Expressing Adversity. In , PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), pp.42-51.

He, H, Tiwari, A, Mehnen, J, Watson, T, Maple, C, Jin, Y, Gabrys, B, IEEE, (2016) Incremental Information Gain Analysis of Input Attribute Impact on RBF-Kernel SVM Spam Detection. In , 2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), pp.1022-1029.

He, H, Maple, C, Watson, T, Tiwari, A, Mehnen, J, Jin, Y, Gabrys, B, IEEE, (2016) The Security Challenges in the IoT enabled Cyber-Physical Systems and Opportunities for Evolutionary Computing & Other Computational Intelligence. In , 2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), pp.1015-1021.

Le Compte, A, Watson, T, Elizondo, D (2015) A Renewed Approach to Serious Games for Cyber Security. In , 2015 7TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT - ARCHITECTURES IN CYBERSPACE (CYCON), pp.203-216.



Posters

Peck, A, Phillips, I, Watson, T (2025) Through a glass brightly: potential QKD hardware vulnerabilities.



Getting in touch

Research Office
Loughborough University
Loughborough
Leicestershire
LE11 3TU
researchpolicy@lboro.ac.uk
+44 (0)1509 222453