Tim Watson

2.6k total citations · 2 hit papers
51 papers, 1.6k citations indexed

About

Tim Watson is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Tim Watson has authored 51 papers receiving a total of 1.6k indexed citations (citations by other indexed papers that have themselves been cited), including 27 papers in Computer Networks and Communications, 22 papers in Information Systems and 17 papers in Artificial Intelligence. Recurrent topics in Tim Watson's work include Network Security and Intrusion Detection (18 papers), Information and Cyber Security (11 papers) and Advanced Malware Detection Techniques (10 papers). Tim Watson is often cited by papers focused on Network Security and Intrusion Detection (18 papers), Information and Cyber Security (11 papers) and Advanced Malware Detection Techniques (10 papers). Tim Watson collaborates with scholars based in United Kingdom, United States and South Africa. Tim Watson's co-authors include Hugh Boyes, Joe Cunningham, Carsten Maple, Nader Sohrabi Safa, David Elizondo, Hongmei He, Ashutosh Tiwari, Jörn Mehnen, Rossouw von Solms and Bogdan Gabryś and has published in prestigious journals such as IEEE Access, Neural Networks and Future Generation Computer Systems.

In The Last Decade

Tim Watson

48 papers receiving 1.5k citations

Hit Papers

The industrial internet of things (IIoT): An analysis fra... 2018 2026 2020 2023 2018 2022 250 500 750

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Tim Watson United Kingdom 15 643 479 458 335 221 51 1.6k
Amit K. Shukla India 20 613 1.0× 521 1.1× 302 0.7× 671 2.0× 157 0.7× 51 2.0k
B. Prabadevi India 14 432 0.7× 529 1.1× 617 1.3× 455 1.4× 92 0.4× 37 2.1k
Chen Yang China 27 731 1.1× 359 0.7× 710 1.6× 196 0.6× 93 0.4× 123 2.2k
Chen Li China 23 307 0.5× 529 1.1× 490 1.1× 501 1.5× 130 0.6× 292 2.2k
Syed Attique Shah Pakistan 21 700 1.1× 334 0.7× 203 0.4× 449 1.3× 223 1.0× 56 1.6k
Kuo‐Ming Chao United Kingdom 28 888 1.4× 1.0k 2.1× 406 0.9× 717 2.1× 166 0.8× 201 2.7k
Khaled Ghédira Tunisia 22 476 0.7× 287 0.6× 920 2.0× 848 2.5× 110 0.5× 229 2.3k
Wei Cao China 20 455 0.7× 459 1.0× 194 0.4× 386 1.2× 265 1.2× 60 1.8k
Saoussen Krichen Tunisia 19 544 0.8× 218 0.5× 431 0.9× 452 1.3× 218 1.0× 115 1.4k
Theo Tryfonas United Kingdom 20 528 0.8× 542 1.1× 120 0.3× 257 0.8× 324 1.5× 141 1.7k

Countries citing papers authored by Tim Watson

Since Specialization
Citations

This map shows the geographic impact of Tim Watson's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tim Watson with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tim Watson more than expected).

Fields of papers citing papers by Tim Watson

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tim Watson. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tim Watson. The network helps show where Tim Watson may publish in the future.

Co-authorship network of co-authors of Tim Watson

This figure shows the co-authorship network connecting the top 25 collaborators of Tim Watson. A scholar is included among the top collaborators of Tim Watson based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tim Watson. Tim Watson is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Bradbury, Matthew, et al.. (2022). Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things. ACM Transactions on Sensor Networks. 18(2). 1–41. 15 indexed citations
3.
Bradbury, Matthew, Arshad Jhumka, & Tim Watson. (2022). Information management for trust computation on resource-constrained IoT devices. Future Generation Computer Systems. 135. 348–363. 5 indexed citations
4.
Watson, Tim, et al.. (2022). Cybersecurity in the Automotive Industry: A Systematic Literature Review (SLR). Journal of Computer Information Systems. 63(3). 716–734. 5 indexed citations
5.
Boyes, Hugh & Tim Watson. (2019). Towards a Secure and Resilient IoT Architecture for Smart Home Energy Management. Warwick Research Archive Portal (University of Warwick). 36 (7 pp.)–36 (7 pp.).
6.
Watson, Tim, et al.. (2019). Hybrid feature selection technique for intrusion detection system. International Journal of High Performance Computing and Networking. 13(2). 232–232. 2 indexed citations
7.
Ivanov, Ivan, et al.. (2018). Cyber Security Standards and Issues in V2X Communications for Internet of Vehicles. Warwick Research Archive Portal (University of Warwick). 46 (6 pp.)–46 (6 pp.). 31 indexed citations
8.
Maple, Carsten, et al.. (2017). A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks. Security and Communication Networks. 2017. 1–18. 8 indexed citations
9.
Maple, Carsten, et al.. (2017). A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks. IEEE Access. 5. 26190–26200. 68 indexed citations
10.
Chen, Chao, et al.. (2017). CAESAR: A criticality-aware ECDSA signature verification scheme with Markov model. Warwick Research Archive Portal (University of Warwick). 151–154. 3 indexed citations
11.
Maple, Carsten, et al.. (2016). A less subjective method for evaluating cyber event threat actors. 1 indexed citations
12.
Watson, Tim, et al.. (2016). Utilising journey mapping and crime scripting to combat cyber crime and cyber warfare attacks. Warwick Research Archive Portal (University of Warwick). 1 indexed citations
13.
Elizondo, David, et al.. (2015). A renewed approach to serious games for cyber security. 203–216. 47 indexed citations
14.
Boyes, Hugh, et al.. (2014). Critical infrastructure in the future city - developing secure and resilient cyber–physical systems. Warwick Research Archive Portal (University of Warwick). 13–23. 2 indexed citations
15.
Palomo, Esteban J., et al.. (2012). Application of growing hierarchical SOM for visualisation of network forensics traffic data. Neural Networks. 32. 275–284. 27 indexed citations
16.
Palomo, Esteban J., et al.. (2011). Visualisation of network forensics traffic data with a self-organising map for qualitative features. DMU Open Research Archive (De Montfort University). 1. 1740–1747. 8 indexed citations
17.
O’Donnell, M., et al.. (2003). GALILEO PERFORMANCE : GPS INTEROPERABILITY AND DISCRIMINATORS FOR URBAN AND INDOOR ENVIRONMENTS. 14(6). 6 indexed citations
18.
Ravin, Yael, Tim Watson, & Nina Wacholder. (2000). Extracting Names from Natural-Language Text. 33 indexed citations
19.
Watson, Tim, et al.. (1998). On Fast Microscopic Browsing of MPEG compressed video. 8 indexed citations
20.
Hopkins, C. W., et al.. (1994). Problems with using genetic algorithms for neural network feature selection. European Conference on Artificial Intelligence. 221–225. 9 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026