ChatGPT: The end of online exam integrity? T Susnjak, TR McIntosh Education Sciences 14 (6), 656, 2024 | 578 | 2024 |
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters ACM Computing Surveys (CSUR) 54 (9), 1-36, 2021 | 132 | 2021 |
A culturally sensitive test to evaluate nuanced gpt hallucination TR McIntosh, T Liu, T Susnjak, P Watters, A Ng, MN Halgamuge IEEE Transactions on Artificial Intelligence 5 (6), 2739 - 2751, 2023 | 128 | 2023 |
From google gemini to openai q*(q-star): A survey of reshaping the generative artificial intelligence (ai) research landscape TR McIntosh, T Susnjak, T Liu, P Watters, MN Halgamuge arXiv preprint arXiv:2312.10868, 2023 | 89 | 2023 |
The inadequacy of entropy-based ransomware detection T McIntosh, J Jang-Jaccard, P Watters, T Susnjak Neural Information Processing: 26th International Conference, ICONIP 2019 …, 2019 | 85 | 2019 |
Inadequacies of large language model benchmarks in the era of generative artificial intelligence TR McIntosh, T Susnjak, T Liu, P Watters, MN Halgamuge arXiv preprint arXiv:2402.09880, 2024 | 70 | 2024 |
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation T McIntosh, T Liu, T Susnjak, H Alavizadeh, A Ng, R Nowrozy, P Watters Computers & security 134, 103424, 2023 | 57 | 2023 |
The inadequacy of reinforcement learning from human feedback-radicalizing large language models via semantic vulnerabilities TR McIntosh, T Susnjak, T Liu, P Watters, MN Halgamuge IEEE Transactions on Cognitive and Developmental Systems, 2024 | 41 | 2024 |
Large scale behavioral analysis of ransomware attacks TR McIntosh, J Jang-Jaccard, PA Watters Neural Information Processing: 25th International Conference, ICONIP 2018 …, 2018 | 35 | 2018 |
From cobit to iso 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models TR McIntosh, T Susnjak, T Liu, P Watters, D Xu, D Liu, R Nowrozy, ... Computers & Security 144, 103964, 2024 | 31 | 2024 |
Dynamic User-Centric Access Control for Detection of Ransomware Attacks T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters Computers & Security 111, 102461, 2021 | 31 | 2021 |
Enforcing situation-aware access control to build malware-resilient file systems T McIntosh, P Watters, ASM Kayes, A Ng, YPP Chen Future Generation Computer Systems 115, 568-582, 2020 | 28 | 2020 |
A game-theoretic approach to containing artificial general intelligence: Insights from highly autonomous aggressive malware TR McIntosh, T Susnjak, T Liu, P Watters, A Ng, MN Halgamuge IEEE Transactions on Artificial Intelligence, 2024 | 25 | 2024 |
Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration T McIntosh, T Susnjak, T Liu, D Xu, P Watters, D Liu, Y Hao, A Ng, ... ACM Computing Surveys, 2024 | 24 | 2024 |
Applying staged event-driven access control to combat ransomware T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters Computers & Security 128, 103160, 2023 | 24 | 2023 |
Towards a universal privacy model for electronic health record systems: an ontology and machine learning approach R Nowrozy, K Ahmed, H Wang, T Mcintosh Informatics 10 (3), 60, 2023 | 23 | 2023 |
A Reasoning and Value Alignment Test to Assess Advanced GPT Reasoning TR McIntosh, T Liu, T Susnjak, P Watters, MN Halgamuge ACM Transactions on Interactive Intelligent Systems, 2024 | 22 | 2024 |
Privacy preservation of electronic health records in the modern era: A systematic survey R Nowrozy, K Ahmed, ASM Kayes, H Wang, TR McIntosh ACM Computing Surveys 56 (8), 1-37, 2024 | 17 | 2024 |
Msd-kmeans: A hybrid algorithm for efficient detection of global and local outliers Y Wei, J Jang-Jaccard, F Sabrina, T McIntosh 2021 IEEE 15th International Conference on Big Data Science and Engineering …, 2021 | 17* | 2021 |
Intercepting ransomware attacks with staged event-driven access control T McIntosh La Trobe, 2022 | 15 | 2022 |