Paul Watters
#175,571
Most Influential Person Now
Australian cybersecurity researcher
Paul Watters's AcademicInfluence.com Rankings
Paul Watterscomputer-science Degrees
Computer Science
#11040
World Rank
#11653
Historical Rank
Network Security
#16
World Rank
#16
Historical Rank
Database
#8066
World Rank
#8408
Historical Rank

Download Badge
Computer Science
Why Is Paul Watters Influential?
(Suggest an Edit or Addition)According to Wikipedia, Paul Watters is an Australian academic. He is Academic Dean at AAPoly, and Honorary Professor at Macquarie University. Professor Watters has made significant research contributions to cybercrime detection and prevention, including phishing, malware, piracy and child exploitation.
Paul Watters's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Statistics in a nutshell (2008) (317)
- Statistics in a nutshell - a desktop quick reference (2008) (228)
- Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures (2011) (196)
- Cybersecurity data science: an overview from machine learning perspective (2020) (170)
- Towards Understanding Malware Behaviour by the Extraction of API Calls (2010) (155)
- Authorship Attribution for Twitter in 140 Characters or Less (2010) (146)
- Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage (2019) (122)
- A Trust based Access Control Framework for P2P File-Sharing Systems (2005) (114)
- A Comparative Analysis of Distributed Ledger Technology Platforms (2019) (86)
- A Survey on Latest Botnet Attack and Defense (2011) (81)
- Malware Detection Based on Structural and Behavioural Features of API Calls (2010) (73)
- Detecting Phishing Emails Using Hybrid Features (2009) (69)
- Cybercrime: The Case of Obfuscated Malware (2011) (68)
- Statistical and structural approaches to filtering Internet pornography (2004) (59)
- The factor structure of cybersickness (2011) (58)
- Caffeine and Cognitive Performance: The Nonlinear Yerkes–Dodson Law (1997) (57)
- Automated unsupervised authorship analysis using evidence accumulation clustering (2011) (56)
- Internet subcultures and pathways to the use of child pornography (2011) (54)
- Estimating Cybersickness of Simulated Motion Using the Simulator Sickness Questionnaire (SSQ): A Controlled Study (2009) (51)
- A methodology for estimating the tangible cost of data breaches (2014) (50)
- Intelligent Dynamic Malware Detection using Machine Learning in IP Reputation for Forensics Data Analytics (2021) (50)
- Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP) (2012) (43)
- The living wage: Theoretical integration and an applied research agenda (2016) (41)
- The Inadequacy of Entropy-Based Ransomware Detection (2019) (41)
- Lightweight Mutual Authentication and Privacy-Preservation Scheme for Intelligent Wearable Devices in Industrial-CPS (2021) (38)
- Recentred local profiles for authorship attribution (2011) (38)
- EFFECTIVE DIGITAL FORENSIC ANALYSIS OF THE NTFS DISK IMAGE (2009) (37)
- Automatically determining phishing campaigns using the USCAP methodology (2010) (36)
- A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues (2020) (36)
- The Seven Scam Types: Mapping the Terrain of Cybercrime (2010) (34)
- A Preliminary Profiling of Internet Money Mules: An Australian Perspective (2009) (33)
- Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions (2021) (32)
- Information Security Governance: The Art of Detecting Hidden Malware (2013) (31)
- Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control (2020) (30)
- Young people, child pornography, and subcultural norms on the Internet (2013) (29)
- A method for estimating long-range power law correlations from the electroencephalogram (2004) (27)
- Determining provenance in phishing websites using automated conceptual analysis (2009) (26)
- RBACS: Rootkit Behavioral Analysis and Classification System (2010) (26)
- A Novel Face Hashing Method with Feature Fusion for Biometric Cryptosystems (2007) (26)
- A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing (2021) (25)
- A Taxonomy of Blockchain Threats and Vulnerabilities (2019) (24)
- A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases (2020) (23)
- Computational Approaches to Language Acquisition (1999) (23)
- Unsupervised authorship analysis of phishing webpages (2012) (23)
- Social Media Sentiment Analysis: A New Empirical Tool for Assessing Public Opinion on Crime? (2015) (23)
- The Case for a Consistent Cyberscam Classification Framework (CCCF) (2009) (22)
- Large Scale Behavioral Analysis of Ransomware Attacks (2018) (21)
- Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMIA) (2012) (21)
- Authorship Attribution of IRC Messages Using Inverse Author Frequency (2012) (21)
- Forensic Characteristics of Phishing - Petty Theft or Organized Crime? (2008) (21)
- Multi-Loss Siamese Neural Network With Batch Normalization Layer for Malware Detection (2020) (20)
- The Maximum Degree & Diameter-Bounded Subgraph and its Applications (2012) (20)
- Time-invariant long-range correlations in electroencephalogram dynamics (2000) (20)
- Characterising Network Traffic for Skype Forensics (2012) (20)
- Cybercrime Attribution: An Eastern European Case Study (2009) (20)
- Establishing phishing provenance using orthographic features (2009) (19)
- Cybersickness and Anxiety During Simulated Motion: Implications for VRET (2009) (19)
- Patterns of ownership of child model sites: Profiling the profiteers and consumers of child exploitation material (2013) (19)
- Evaluating authorship distance methods using the positive Silhouette coefficient (2012) (17)
- REES MATRIX CONSTRUCTIONS FOR CLUSTERING OF DATA (2009) (17)
- Automated measurement of attitudes towards social distancing using social media: A COVID-19 case study (2020) (17)
- Quadratic dose-response relationship between caffeine (1,3,7-trimethylxanthine) and EEG correlation dimension (1998) (17)
- Trust and authorization in the grid: a recommendation model (2005) (17)
- Local n-grams for Author Identification Notebook for PAN at CLEF 2013 (2013) (16)
- Indirect Information Linkage for OSINT through Authorship Analysis of Aliases (2013) (16)
- Obfuscation of Stuxnet and Flame Malware (2012) (16)
- Using Differencing to Increase Distinctiveness for Phishing Website Clustering (2009) (16)
- THE GLOBAL CYBER SECURITY WORKFORCE - AN ONGOING HUMAN CAPITAL CRISIS (2014) (14)
- Discriminating English Word Senses Using Cluster Analysis (2002) (14)
- How much material on BitTorrent is infringing content? A case study (2011) (14)
- Can a ‘living wage’ springboard human capability? An exploratory study from New Zealand (2016) (13)
- Visual steganalysis of LSB-encoded natural images (2005) (13)
- Semantic processing performance of Internet machine translation systems (1999) (13)
- Competition, Inhibition, and Semantic Judgment Errors in Parkinson's Disease (2002) (13)
- Detecting and Tracing Copyright Infringements in P2P Networks (2006) (12)
- A Systematic Approach to Measuring Advertising Transparency Online: An Australian Case Study (2014) (12)
- Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware (2021) (12)
- Optimization of classifiers for data mining based on combinatorial semigroups (2011) (12)
- Identifying Rootkit Infections Using Data Mining (2010) (12)
- Establishing Reasoning Communities of Security Experts for Internet Commerce Security (2011) (11)
- Windows Rootkits: Attacks and Countermeasures (2010) (11)
- Identifying and Blocking Pornographic Content (2005) (11)
- Analysis of Malware Behaviour: Using Data Mining Clustering Techniques to Support Forensics Investigation (2014) (11)
- Internet security applications of the Munn rings (2010) (11)
- Real-time detection of children's skin on social networking sites using Markov random field modelling (2011) (11)
- Evaluating Internet information services in the Asia-Pacific region (1998) (11)
- CalBehav: A Machine Learning based Personalized Calendar Behavioral Model using Time-Series Smartphone Data (2019) (10)
- The Efficiency of Periodic Rekeying in Dynamic Group Key Management (2007) (10)
- Tertiary Education Students' Attitudes to the Harmfulness of Viewing and Distributing Child Pornography (2016) (10)
- Why do users trust the wrong messages? A behavioural model of phishing (2009) (10)
- SOCIAL PROCESSES AS DYNAMICAL PROCESSES: QUALITATIVE DYNAMICAL SYSTEMS THEORY IN SOCIAL PSYCHOLOGY* (1996) (10)
- ICANN or ICANT: Is WHOIS an Enabler of Cybercrime? (2013) (10)
- Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions (2021) (9)
- Child sexual abuse material in child-centred institutions: situational crime prevention approaches (2020) (9)
- Modeling lexical-semantic processes using wordnet (1998) (9)
- Visual detection of LSB-encoded natural image steganography (2008) (8)
- Enforcing situation-aware access control to build malware-resilient file systems (2021) (8)
- Tongan Determiners and Semantic Composition (2005) (8)
- Autonomic Nervous System Factors Underlying Anxiety in Virtual Environments: A Regression Model for Cybersickness (2009) (8)
- Are Younger People More Difficult to Identify or Just a Peer-to-Peer Effect (2007) (8)
- Forensic Detection of Child Exploitation Material Using Deep Learning (2019) (7)
- Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks (2019) (7)
- REPLOT: Retrieving profile links on Twitter for suspicious networks detection (2013) (7)
- A Mechanism to Detect and Prevent Ethereum Blockchain Smart Contract Reentrancy Attacks (2021) (7)
- Trust Modeling for Blockchain-Based Wearable Data Market (2019) (6)
- Context-Aware Machine Learning and Mobile Data Analytics (2021) (6)
- Investigating Malware Epidemiology and Child Exploitation Using Algorithmic Ethnography (2018) (6)
- Descriptive Data Mining on Fraudulent Online Dating Profiles (2010) (6)
- Maximising Eyeballs but Facilitating Cybercrime? Ethical Challenges for Online Advertising in New Zealand (2015) (6)
- Answering Binary Causal Questions: A Transfer Learning Based Approach (2020) (6)
- 2010 eCrime Researchers Summit Table of Contents Authorship Attribution of Web Forum Posts (2010) (6)
- Automatically Generating Classifier for Phishing Email Prediction (2009) (6)
- Censorship is f̶u̶t̶i̶l̶e̶ possible but difficult: A study in algorithmic ethnography (2015) (5)
- A deep learning model for mining and detecting causally related events in tweets (2020) (5)
- Identifying Faked Hotel Reviews Using Authorship Analysis (2013) (5)
- Skype Traffic Classification Using Cost Sensitive Algorithms (2013) (5)
- Measuring Online Advertising Transparency in Singapore: An Investigation of Threats to Users (2013) (5)
- Authorship analysis of aliases: Does topic influence accuracy? (2013) (5)
- Effects of Automated Messages on Internet Users Attempting to Access “Barely Legal” Pornography (2021) (5)
- Cyber Security: Concepts and Cases (2012) (5)
- Psychophysiology, Cortical Arousal and Dynamical Complexity (DCX) (1999) (5)
- Controlling information behaviour: the case for access control (2016) (5)
- This would work perfectly if it weren't for all the humans: Two factor authentication in late modern societies (2019) (5)
- Toward Detection of Child Exploitation Material: A Forensic Approach (2019) (5)
- Taming the Cookie Monster How Companies Track Us Online (2012) (5)
- Using Data-Driven and Process Mining Techniques for Identifying and Characterizing Problem Gamblers in New Zealand (2016) (5)
- Semantic processing deficits in patients with Parkinson's disease: degraded representation or defective retrieval? (1999) (5)
- A New Procedure to Help System/Network Administrators Identify Multiple Rootkit Infections (2010) (4)
- Distributed Variance In Localized Principal Components Of Whitened Natural Scenes (2003) (4)
- Measuring Personal Privacy Breaches Using Third-Party Trackers (2018) (4)
- A methodology for analyzing the credential marketplace (2011) (4)
- Data Loss in the British Government: A Bounty of Credentials for Organised Crime (2009) (4)
- Child face detection using age specific luminance invariant geometric descriptor (2011) (4)
- An Empirical Analysis of Blockchain Cybersecurity Incidents (2019) (4)
- Are sparse-coding simple cell receptive field models physiologically plausible? (2006) (4)
- Accessible virtual reality therapy using portable media devices. (2010) (4)
- Illicit Image Detection Using Erotic Pose Estimation Based on Kinematic Constraints (2013) (4)
- Surrogate Data and Differentiation Analyses of Nonlinearity in Normal EEG (1998) (4)
- Significance of Phonological Features in Speech Emotion Recognition (2020) (4)
- Sweet As? Advertising on Rogue Websites in New Zealand (2014) (3)
- Enabling access to british birth cohort studies: A Secure Web Interface for the NSHD (SWIFT) (2009) (3)
- Cybersickness and Anxiety During Simulated Motion: Implications for VRET. (2009) (3)
- API Based Discrimination of Ransomware and Benign Cryptographic Programs (2020) (3)
- Accessibility solutions for visually impaired users of Web discussion boards (2005) (3)
- A Consolidated Process Model for Identity Management (2012) (3)
- Masquerade Attacks Against Security Software Exclusion Lists (2019) (3)
- Trustworthy e-mail using secure XML Web services (2005) (3)
- Conceptualizing human resilience in the face of the global epidemiology of cyber attacks (2019) (3)
- A Neural Network Model of Semantic Processing Errors in Parkinson's Disease (1999) (3)
- Solaris 8: The Complete Reference (2000) (3)
- Indirect Attribution in Cyberspace (2015) (3)
- Enhancing early detection of cognitive impairment in the criminal justice system: feasibility of a proposed method (2019) (3)
- A New Performance Evaluation Method for Face Identification - Regression Analysis of Misidentification Risk (2007) (3)
- Fake File Detection in P2P Networks by Consensus and Reputation (2011) (3)
- Dynamic user-centric access control for detection of ransomware attacks (2021) (3)
- Evaluating Accuracy in Prudence Analysis for Cyber Security (2017) (3)
- Coding distributed representations of natural scenes: a comparison of orthogonal and non-orthogonal models (2004) (3)
- Malicious Advertising and Music Piracy: A New Zealand Case Study (2014) (2)
- A Blockchain-Based Secure Data Sharing Framework for Healthcare (2020) (2)
- A Blockchain-Based Secure Data Sharing Framework for Healthcare (2020) (2)
- Measuring Surveillance in Online Advertising: A Big Data Approach (2013) (2)
- Robustness of the New Owner-Tester Approach for Face Identification Experiments (2007) (2)
- Towards an Implementation of Information Flow Security Using Semantic Web Technologies (2012) (2)
- Improving speech emotion recognition based on acoustic words emotion dictionary (2020) (2)
- Cyber Budget Optimization Through Security Event Clustering (2017) (2)
- e-Learning for policing, intelligence and counter-terrorism: Performance (2006) (2)
- Illicit Image Detection: An MRF Model Based Stochastic Approach (2013) (2)
- Modelling the effect of deception on investigations using open source intelligence (OSINT) (2013) (2)
- The Prevalence of High-Risk and Mainstream Advertisements Targeting Canadians on Rogue Websites (2014) (2)
- Modelling the Efficacy of Auto-Internet Warnings to Reduce Demand for Child Exploitation Materials (2018) (2)
- A review of cognitive and neurolinguistic deficits in Parkinson's disease (1999) (2)
- Solaris 10 the Complete Reference (2005) (2)
- Implications of Distributed Information Technology for South Pacific Development (1997) (2)
- Mainstream Advertising on Rogue Websites in Malaysia: A Comparison of Local and Foreign Content (2014) (2)
- Estimating distributed coding efficiency in orthogonal models of facial processing. (2003) (2)
- Semantic Judgement Errors in Parkinson’s Disease: The Role of Priming (1999) (2)
- Human-centered strategies for cyber-physical systems security (2018) (2)
- Social networking threats (2011) (2)
- AVOCAD: Adaptive Terrorist Comms Surveillance and Interception using Machine Learning (2019) (2)
- New Traceability Codes and Identification Algorithm for Tracing Pirates (2008) (2)
- Mainstream Advertising on Rogue Websites in Hong Kong: A Comparison of Chinese and Western Titles (2014) (2)
- Gathering Intelligence on High-Risk Advertising and Film Piracy: A Study of the Digital Underground (2016) (2)
- Simulating and visualizing neural networks with Mathematica (2000) (1)
- Transdisciplinary research in virtual space (2018) (1)
- Qualitative models in social psychology: A dynamical systems perspective (1996) (1)
- Solving Frame-Based Accessibility Problems in Web Content Management (2005) (1)
- Patient Controlled, Privacy Preserving IoT Healthcare Data Sharing Framework (2020) (1)
- Visual Detection of High Capacity Natural Image Steganography: Is A Known Cover Effective? (2007) (1)
- Privacy‐preserving cooperative localization in vehicular edge computing infrastructure (2020) (1)
- Characterizing Problem Gamblers in New Zealand: A Novel Expression of Process Cubes (2016) (1)
- Steganographic Transports: A Vector for Hidden Secret Internets? (2018) (1)
- Special Issue "Security Threats and Countermeasures in Cyber-Physical Systems" (2021) (1)
- Social psychology and developing countries: A reciprocal relationship (1995) (1)
- University incorporated: implications for professional information security education (2009) (1)
- Automated Physical Storage Provision Using a Peer-to-Peer Distributed File System (2005) (1)
- INTERNET SECURITY APPLICATIONS OF GRÖBNER-SHIRSHOV BASES (2010) (1)
- Neurodiverse Knowledge, Skills and Ability Assessment for Cyber Security (2020) (1)
- Semantica By Richard K. Larson, David S. Warren, Juliana Freiré de Lima e Silva, D. O. Patricia Gomez, and Konstantinos Sagonas (review) (2015) (1)
- Web services in finance (2004) (1)
- A Grobner-Shirshov algorithm for applications in internet security (2011) (1)
- Ecological Validity of Face Recognition Research (2005) (1)
- Direct Machine Translation Systems as Dynamical Systems: The Iterative Semantic Processing (ISP) Paradigm (2000) (1)
- Mainstream Advertising Support for Online Piracy in Taiwan (2014) (1)
- Solaris 8 administrator's guide (2000) (1)
- The Ethics of Corporate Censorship of Information-Sharing Behavior: A Nonconsequentialist Perspective (2020) (1)
- Multi fingerprint biometric verification using XML web services : a funds transfer case study (2006) (1)
- Selecting parameters for phase space reconstruction of the electrocorticogram (ECoG). (2005) (1)
- Security Threats and Countermeasures in Cyber-Physical Systems (2021) (0)
- Writing Secure Applications Using C (2004) (0)
- Using Japanese: A Guide to Contemporary Usage (review) (2005) (0)
- Rapid Anomaly Detection Using Integrated Prudence Analysis (IPA) (2018) (0)
- A New Stochastic Model Based Approach for Object Identification and Segmentation in Textured Color Image (2010) (0)
- A SURVEY OF EASTERN EUROPEAN ORGANISED CRIME & CYBERCRIME A SHORT HISTORY OF EASTERN EUROPEAN ORGANISED CRIME (2010) (0)
- Web Guru Guide to JavaScript (2005) (0)
- Windows 10 Security: Concepts and Challenges (2016) (0)
- Creating Honeypots to Prevent Online Child Exploitation (2022) (0)
- The Yerkes-Dodson Law: Cognitive and psychophysiological evidence (1996) (0)
- Introduction: The Role of Censorship in Late Modern Societies (2020) (0)
- Sun certified system administrator for the Solaris 9 : Exam「310-014」「310-015」 (2003) (0)
- Welcome message: CTC 2012 (2013) (0)
- Do Rogue Websites and High Risk Advertising Undermine Social Policy in Vietnam? (2014) (0)
- Editorial: Neural Dynamics – Models and Complexity (2022) (0)
- A Machine Learning-Based Cyber Defence System for an Intelligent City (2021) (0)
- Preface of CTC'09: The international workshop on cybercrime and trustworthy computing (CTC-2009) (2009) (0)
- Computational approaches to language acquisition Ed. by Michael R. Brent (review) (2015) (0)
- The Impact of High Risk Advertising on Thai Social Values: The Role of Piracy Websites (2015) (0)
- Cyber-Situational Awareness in the Presence of Encryption (2017) (0)
- Linux 4.6 System Administration for Beginners: Ubuntu, Debian, Fedora, CentOS, SUSE & Slackware Explained (2016) (0)
- Named Entity Resolution in Social Media (2016) (0)
- Using Simulation for Effective Computer Security Training (2006) (0)
- Ethical Access Control in the Era of Data Breaches (2019) (0)
- Does Notebook-Based, Accessible Simulation Training Create Cybersickness? (2010) (0)
- BOOK REVIEW: Applied Neural Networks for Signal Processing, by F. L. Luo, & R. Unbehauen, 1997 (2000) (0)
- Peeking behind the great firewall: Privacy on Chinese file sharing networks (2016) (0)
- Responsibility Attribution Against Data Breaches (2020) (0)
- Denial and deception in the digital age: novel trends in an ancient art (2021) (0)
- Cortical arousal, chaotic dynamics and cogntive performance (1996) (0)
- REPLOT: REtrieving Profile Links On Twitter for malicious campaign discovery (2016) (0)
- S.C. Carr, E. McAuliffe, & M. MacLachlan (1998). Psychology of Aid. London: Routledge. ISBN 0-415-14207-5 (Hardcover). (1998) (0)
- The Internet and indigenous language use: A Filipino case study (1999) (0)
- A novel malware detection using hybrid wrapper-filter approach and op-code frequency statistics based on extended x86 IA-32 binary assembly instructions (2012) (0)
- An Unsupervised Stochastic Model for Detection and Identification of Objects in Textured Color Images Using Segmentation Technique (2010) (0)
- Welcome message from the CTC Steering Committee (2013) (0)
- A Technology and Process Analysis for Contemporary Identity Management Frameworks (2019) (0)
- Distributed service and data exchange : a case of study of the ecuadorian legal system (2006) (0)
- UB Researc (2009) (0)
- Using Japanese: A guide to contemporary usage (2005) (0)
- How Risky are Piracy Websites for Indonesians? The Role of Search (2014) (0)
- Spam Email Categorization with NLP and Using Federated Deep Learning (2022) (0)
- An Efficient Model to defend cyber-attack using Data Science (2021) (0)
- Applying staged event-driven access control to combat ransomware (2023) (0)
- Enhancing System Security by Intrusion Detection Using Deep Learning (2022) (0)
- Challenges to Automated Allegory Resolution in Open Source Intelligence (2012) (0)
This paper list is powered by the following services:
Other Resources About Paul Watters
What Schools Are Affiliated With Paul Watters?
Paul Watters is affiliated with the following schools: