[go: up one dir, main page]

Follow
Timothy Mcintosh
Timothy Mcintosh
Other namesTimothy R. Mcintosh, TR McIntosh
Cyberoo Pty Ltd (AU)
Verified email at cyberoo.ai
Title
Cited by
Cited by
Year
ChatGPT: The end of online exam integrity?
T Susnjak, TR McIntosh
Education Sciences 14 (6), 656, 2024
10412024
A culturally sensitive test to evaluate nuanced gpt hallucination
TR McIntosh, T Liu, T Susnjak, P Watters, A Ng, MN Halgamuge
IEEE Transactions on Artificial Intelligence 5 (6), 2739 - 2751, 2023
3562023
Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration
T Mcintosh, T Susnjak, T Liu, D Xu, P Watters, D Liu, Y Hao, A Ng, ...
ACM Computing Surveys 57 (1), 1-40, 2024
3452024
Inadequacies of large language model benchmarks in the era of generative artificial intelligence
TR McIntosh, T Susnjak, N Arachchilage, T Liu, D Xu, P Watters, ...
IEEE Transactions on Artificial Intelligence, 2025
3222025
From google gemini to openai q*(q-star): A survey on reshaping the generative artificial intelligence (ai) research landscape
TR McIntosh, T Susnjak, T Liu, P Watters, D Xu, D Liu, MN Halgamuge
Technologies 13 (2), 51, 2025
3052025
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
ACM Computing Surveys (CSUR) 54 (9), 1-36, 2021
2872021
From cobit to iso 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models
TR McIntosh, T Susnjak, T Liu, P Watters, D Xu, D Liu, R Nowrozy, ...
Computers & Security 144, 103964, 2024
2572024
The inadequacy of reinforcement learning from human feedback—radicalizing large language models via semantic vulnerabilities
TR McIntosh, T Susnjak, T Liu, P Watters, MN Halgamuge
IEEE Transactions on Cognitive and Developmental Systems 16 (4), 1561-1574, 2024
2352024
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation
T McIntosh, T Liu, T Susnjak, H Alavizadeh, A Ng, R Nowrozy, P Watters
Computers & security 134, 103424, 2023
2262023
A game-theoretic approach to containing artificial general intelligence: Insights from highly autonomous aggressive malware
TR McIntosh, T Susnjak, T Liu, P Watters, A Ng, MN Halgamuge
IEEE Transactions on Artificial Intelligence 5 (12), 6290-6303, 2024
2022024
A reasoning and value alignment test to assess advanced gpt reasoning
TR McIntosh, T Liu, T Susnjak, P Watters, MN Halgamuge
ACM Transactions on Interactive Intelligent Systems 14 (3), 1-37, 2024
1932024
Applying staged event-driven access control to combat ransomware
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 128, 103160, 2023
1302023
Dynamic User-Centric Access Control for Detection of Ransomware Attacks
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 111, 102461, 2021
1222021
Privacy preservation of electronic health records in the modern era: A systematic survey
R Nowrozy, K Ahmed, ASM Kayes, H Wang, TR McIntosh
ACM Computing Surveys 56 (8), 1-37, 2024
1192024
The inadequacy of entropy-based ransomware detection
T McIntosh, J Jang-Jaccard, P Watters, T Susnjak
International conference on neural information processing, 181-189, 2019
1152019
Enforcing situation-aware access control to build malware-resilient file systems
T McIntosh, P Watters, ASM Kayes, A Ng, YPP Chen
Future Generation Computer Systems 115, 568-582, 2020
1052020
Modeling the chaotic semantic states of generative artificial intelligence (ai): A quantum mechanics analogy approach
T Liu, TR McIntosh, T Susnjak, P Watters, MN Halgamuge
ACM Transactions on Intelligent Systems and Technology 16 (6), 1-36, 2025
852025
Automating research synthesis with domain-specific large language model fine-tuning
T Susnjak, P Hwang, N Reyes, ALC Barczak, T McIntosh, S Ranathunga
ACM Transactions on Knowledge Discovery from Data 19 (3), 1-39, 2025
832025
Over the edge of chaos? excess complexity as a roadblock to artificial general intelligence
T Susnjak, TR McIntosh, ALC Barczak, NH Reyes, T Liu, P Watters, ...
IEEE Transactions on Cybernetics, 2025
712025
The erosion of cybersecurity zero-trust principles through generative ai: A survey on the challenges and future directions
D Xu, I Gondal, X Yi, T Susnjak, P Watters, TR McIntosh
Journal of Cybersecurity and Privacy 5 (4), 87, 2025
472025
The system can't perform the operation now. Try again later.
Articles 1–20