default search action
Nathan L. Clarke
Person information
- affiliation: Plymouth University, Centre for Security, Communications and Network Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b2]Joakim Kävrestad, Marcus Birath, Nathan L. Clarke:
Fundamentals of Digital Forensics - A Guide to Theory, Research and Applications, Third Edition. Texts in Computer Science, Springer 2024, ISBN 978-3-031-53648-9, pp. 3-267 - [j43]Nathan L. Clarke, Steven Furnell:
Editorial: Human aspects of cyber security. Inf. Comput. Secur. 32(4): 405-406 (2024) - [i3]Ali Alshumrani, Nathan L. Clarke, Bogdan V. Ghita:
A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence. CoRR abs/2402.13746 (2024) - 2023
- [j42]Nathan L. Clarke, Steven Furnell:
Editorial: Human aspects of cyber security. Inf. Comput. Secur. 31(3): 265-266 (2023) - [c80]Jan Stodt, Christoph Reich, Nathan L. Clarke:
A Novel Metric for XAI Evaluation Incorporating Pixel Analysis and Distance Measurement. ICTAI 2023: 1-9 - [c79]Jan Stodt, Christoph Reich, Nathan L. Clarke:
Unified Intersection Over Union for Explainable Artificial Intelligence. IntelliSys (2) 2023: 758-770 - [c78]Dirk Hölscher, Christoph Reich, Martin Knahl, Frank Gut, Nathan L. Clarke:
Pix2Pix Hyperparameter Optimisation Towards Ideal Universal Image Quality Index Score. IntelliSys (1) 2023: 862-882 - [c77]Dirk Hölscher, Christoph Reich, Frank Gut, Martin Knahl, Nathan L. Clarke:
Pix2Pix Hyperparameter Optimisation Prediction. KES 2023: 1009-1018 - [c76]Ali Alshumrani, Nathan L. Clarke, Bogdan Ghita:
A Unified Knowledge Graph to Permit Interoperability of Heterogenous Digital Evidence. UbiSec 2023: 420-435 - [e19]Steven Furnell, Nathan L. Clarke:
Human Aspects of Information Security and Assurance - 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023, Proceedings. IFIP Advances in Information and Communication Technology 674, Springer 2023, ISBN 978-3-031-38529-2 [contents] - 2022
- [j41]Hind Alobaidi, Nathan L. Clarke, Fudong Li, Abdulrahman Alruban:
Real-world smartphone-based gait recognition. Comput. Secur. 113: 102557 (2022) - [j40]Georgios Vranopoulos, Nathan Luke Clarke, Shirley Atkinson:
Addressing big data variety using an automated approach for data characterization. J. Big Data 9(1): 8 (2022) - [c75]Jan Stodt, Christoph Reich, Nathan L. Clarke:
Explainable AI with Domain Adapted FastCAM for Endoscopy Images. ICCS (3) 2022: 57-64 - [c74]Dirk Hölscher, Christoph Reich, Martin Knahl, Frank Gut, Nathan L. Clarke:
Surface Quality Augmentation for Metalworking Industry with Pix2Pix. KES 2022: 897-906 - [c73]Hendrik Kuijs, Christoph Reich, Martin Knahl, Nathan L. Clarke, Ivana Ognjanovic:
The Need for Emergency-Based Access Control in AAL Systems. MECO 2022: 1-6 - [e18]Nathan L. Clarke, Steven Furnell:
Human Aspects of Information Security and Assurance - 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, Proceedings. IFIP Advances in Information and Communication Technology 658, Springer 2022, ISBN 978-3-031-12171-5 [contents] - [i2]Abdulrahman Alruban, Hind Alobaidi, Nathan L. Clarke, Fudong Li:
Physical Activity Recognition by Utilising Smartphone Sensor Signals. CoRR abs/2201.08688 (2022) - 2021
- [j39]Fayez Ghazai Alotaibi, Nathan Luke Clarke, Steven M. Furnell:
A novel approach for improving information security management and awareness for home environments. Inf. Comput. Secur. 29(1): 25-48 (2021) - [j38]Bilal Naqvi, Nathan Luke Clarke, Jari Porras:
Incorporating the human facet of security in developing systems and services. Inf. Comput. Secur. 29(1): 49-72 (2021) - [e17]Steven Furnell, Nathan L. Clarke:
Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings. IFIP Advances in Information and Communication Technology 613, Springer 2021, ISBN 978-3-030-81110-5 [contents] - [i1]Muhammad Ali, Stavros Shiaeles, Nathan L. Clarke, Dimitrios Kontogeorgis:
A proactive malicious software identification approach for digital forensic examiners. CoRR abs/2109.09567 (2021) - 2020
- [j37]Adéle da Veiga, Ruthea Vorster, Fudong Li, Nathan L. Clarke, Steven M. Furnell:
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements. Inf. Comput. Secur. 28(3): 399-422 (2020) - [e16]Nathan L. Clarke, Steven Furnell:
Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings. IFIP Advances in Information and Communication Technology 593, Springer 2020, ISBN 978-3-030-57403-1 [contents]
2010 – 2019
- 2019
- [j36]Jose Oscar Fajardo, Fidel Liberal, Fudong Li, Nathan L. Clarke, Is-Haka Mkwawa:
End-to-middle-to-end solution for IMS media plane security. Electron. Commer. Res. 19(3): 719-746 (2019) - [j35]Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan L. Clarke:
A framework for reporting and dealing with end-user security policy compliance. Inf. Comput. Secur. 27(1): 2-25 (2019) - [j34]Muhammad Ali, Stavros Shiaeles, Nathan L. Clarke, Dimitrios Kontogeorgis:
A proactive malicious software identification approach for digital forensic examiners. J. Inf. Secur. Appl. 47: 139-155 (2019) - [c72]Manal Alohali, Nathan L. Clarke, Steven Furnell:
Information Security Risk Communication: A User-Centric Approach. AICCSA 2019: 1-10 - [c71]Abdulaziz Altamimi, Nathan L. Clarke, Steven Furnell, Fudong Li:
Multi-Platform Authorship Verification. CECC 2019: 13:1-13:7 - [c70]Thomas Rieger, Stefanie Regier, Ingo Stengel, Nathan L. Clarke:
Fast Predictive Maintenance in Industrial Internet of Things (IIoT) with Deep Learning (DL): A Review. CERC 2019: 69-80 - [c69]Holger Gantikow, Christoph Reich, Martin Knahl, Nathan L. Clarke:
Rule-Based Security Monitoring of Containerized Environments. CLOSER (Selected Papers) 2019: 66-86 - [c68]Hendrik Kuijs, Timo Bayer, Christoph Reich, Martin Knahl, Nathan L. Clarke:
Privacy Enhancing Data Access Control for Ambient Assisted Living. CLOSER 2019: 448-455 - [c67]Holger Gantikow, Christoph Reich, Martin Knahl, Nathan L. Clarke:
Rule-based Security Monitoring of Containerized Workloads. CLOSER 2019: 543-550 - [c66]Fayez Alotaibi, Nathan Luke Clarke, Steven Furnell:
Holistic Information Security Management for Home Environments. HAISA 2019: 20-33 - [c65]Aziz Alshehri, Nathan Luke Clarke, Fudong Li:
Privacy Enhancing Technology Awareness for Mobile Devices . HAISA 2019: 73-88 - [c64]Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, Nathan L. Clarke:
A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications. ICISSP 2019: 246-251 - [c63]Shahlaa Mashhadani, Nathan L. Clarke, Fudong Li:
Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion. ICISSP 2019: 438-448 - [c62]Abdulrahman Alruban, Hind Alobaidi, Nathan L. Clarke, Fudong Li:
Physical Activity Recognition by Utilising Smartphone Sensor Signals. ICPRAM 2019: 342-351 - [c61]Faisal Shaman, Bogdan V. Ghita, Nathan L. Clarke, Abdulrahman Alruban:
User Profiling Based on Application-Level Using Network Metadata. ISDFS 2019: 1-8 - [e15]Steven Furnell, Nathan L. Clarke:
Thirteenth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2019, Nicosia, Cyprus, July 15-16, 2019, Proceedings. University of Plymouth 2019, ISBN 978-0244-19096-5 [contents] - 2018
- [j33]Hiba Al-Kawaz, Nathan L. Clarke, Steven Furnell, Fudong Li:
Facial-Forensic Analysis Tool. Digit. Investig. 26 Supplement: S136 (2018) - [j32]Samah Alshathri, Bogdan V. Ghita, Nathan L. Clarke:
Sharing with Live Migration Energy Optimization Scheduler for Cloud Computing Data Centers. Future Internet 10(9): 86 (2018) - [j31]Steven Furnell, Nathan L. Clarke:
Guest editorial. Inf. Comput. Secur. 26(3): 262-263 (2018) - [j30]Manal Alohali, Nathan L. Clarke, Fudong Li, Steven Furnell:
Identifying and predicting the factors affecting end-users' risk-taking behavior. Inf. Comput. Secur. 26(3): 306-326 (2018) - [j29]Saud Alotaibi, Steven Furnell, Nathan L. Clarke:
A novel transparent user authentication approach for mobile applications. Inf. Secur. J. A Glob. Perspect. 27(5-6): 292-305 (2018) - [c60]Hussam Jasim Mohammed, Nathan L. Clarke, Fudong Li:
Evidence Identification in Heterogeneous Data Using Clustering. ARES 2018: 35 - [c59]Adéle da Veiga, Ruthea Vorster, Fudong Li, Nathan L. Clarke:
A Comparison of compliance with data privacy requirements in two countries. ECIS 2018: 86 - [c58]Burhan Al-Bayati, Nathan L. Clarke, Paul Dowland, Fudong Li:
Misuse Detection in a Simulated IaaS Environment. ETAA@ESORICS 2018: 103-115 - [c57]Neamah Al-Naffakh, Nathan L. Clarke, Fudong Li:
Continuous User Authentication Using Smartwatch Motion Sensor Data. IFIPTM 2018: 15-28 - [c56]Leith Abed, Nathan L. Clarke, Bogdan V. Ghita, Abdulrahman Alruban:
Securing Cloud Storage by Transparent Biometric Cryptography. SecITC 2018: 97-108 - [c55]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Biometrically Linking Document Leakage to the Individuals Responsible. TrustBus 2018: 135-149 - [e14]Nathan L. Clarke, Steven Furnell:
Twelfth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2018, Dundee, Scotland, UK, August 29-31, 2018, Proceedings. University of Plymouth 2018, ISBN 978-0-244-40254-9 [contents] - 2017
- [j28]Nathan L. Clarke, Fudong Li, Steven Furnell:
A novel privacy preserving user identification approach for network traffic. Comput. Secur. 70: 335-350 (2017) - [c54]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Insider Misuse Attribution using Biometrics. ARES 2017: 42:1-42:7 - [c53]Neamah Al-Naffakh, Nathan L. Clarke, Fudong Li, Paul S. Haskell-Dowland:
Unobtrusive Gait Recognition Using Smartwatches. BIOSIG 2017: 211-218 - [c52]Manal Alohali, Nathan L. Clarke, Fudong Li, Steven Furnell:
Identifying the Factors Affecting End-Users’ Risk-Taking Behavior. HAISA 2017: 126-144 - [c51]Nathan L. Clarke, Fudong Li, Abdulrahman Alruban, Steven Furnell:
Insider Misuse Identification using Transparent Biometrics. HICSS 2017: 1-10 - [c50]Fayez Alotaibi, Nathan L. Clarke, Steven Furnell:
An analysis of home user security awareness & education. ICITST 2017: 116-122 - [c49]Timibloudi S. Enamamu, Nathan L. Clarke, Paul S. Haskell-Dowland, Fudong Li:
Transparent authentication: Utilising heart rate for user authentication. ICITST 2017: 283-289 - [c48]Shahlaa Mashhadani, Hiba Al-Kawaz, Nathan L. Clarke, Steven Furnell, Fudong Li:
A novel multimedia-forensic analysis tool (M-FAT). ICITST 2017: 388-395 - [e13]Steven Furnell, Nathan L. Clarke:
Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, Adelaide, Australia, November 28-30, 2017, Proceedings. University of Plymouth 2017, ISBN 978-1-84102-428-8 [contents] - 2016
- [j27]Saad Alqahtany, Nathan L. Clarke, Steven Furnell, Christoph Reich:
A forensic acquisition and analysis system for IaaS. Clust. Comput. 19(1): 439-453 (2016) - [j26]Abdulwahid Al Abdulwahid, Nathan L. Clarke, Ingo Stengel, Steven Furnell, Christoph Reich:
Continuous and transparent multimodal authentication: reviewing the state of the art. Clust. Comput. 19(1): 455-474 (2016) - [j25]M. Al Fahdi, Nathan L. Clarke, Fudong Li, Steven M. Furnell:
A suspect-oriented intelligent and automated computer forensic analysis. Digit. Investig. 18: 65-76 (2016) - [j24]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Leveraging Biometrics for Insider Misuse Identification. Int. J. Cyber Situational Aware. 1(1): 130-151 (2016) - [j23]Nathan Luke Clarke, Jane Symes, Hataichanok Saevanee, Steven M. Furnell:
Awareness of Mobile Device Security: A Survey of User's Attitudes. Int. J. Mob. Comput. Multim. Commun. 7(1): 15-31 (2016) - [j22]Steven Furnell, Nathan Luke Clarke:
Guest editorial. Inf. Comput. Secur. 24(2): 138 (2016) - [j21]Hussam Jasim Mohammed, Nathan Luke Clarke, Fudong Li:
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data. J. Digit. Forensics Secur. Law 11(2): 137-152 (2016) - [c47]Saad Alqahtany, Nathan L. Clarke, Steven Furnell, Christoph Reich:
A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment. ARES 2016: 345-354 - [c46]Thomas Rübsamen, Christoph Reich, Nathan L. Clarke, Martin Knahl:
Evidence Collection in Cloud Provider Chains. CLOSER (1) 2016: 59-70 - [c45]Hendrik Kuijs, Christoph Reich, Martin Knahl, Nathan L. Clarke:
A Scalable Architecture for Distributed OSGi in the Cloud. CLOSER (2) 2016: 109-117 - [c44]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Proactive biometric-enabled forensic imprinting. Cyber Security And Protection Of Digital Services 2016: 1-15 - [c43]Florian Kemmer, Christoph Reich, Martin Knahl, Nathan L. Clarke:
Software Defined Privacy. IC2E Workshops 2016: 25-29 - [c42]Neamah Al-Naffakh, Nathan L. Clarke, Paul Dowland, Fudong Li:
Activity Recognition using wearable computing. ICITST 2016: 189-195 - [c41]Gaseb Alotibi, Nathan L. Clarke, Fudong Li, Steven Furnell:
User profiling from network traffic via novel application-level interactions. ICITST 2016: 279-285 - [c40]Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan L. Clarke:
Information security policies: A review of challenges and influencing factors. ICITST 2016: 352-358 - [c39]Holger Gantikow, Christoph Reich, Martin Knahl, Nathan L. Clarke:
Providing Security in Container-Based HPC Runtime Environments. ISC Workshops 2016: 685-695 - [e12]Nathan L. Clarke, Steven Furnell:
Tenth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. University of Plymouth 2016, ISBN 978-1-84102-413-4 [contents] - 2015
- [j20]Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell, Valerio Biscione:
Continuous user authentication using multi-modal biometrics. Comput. Secur. 53: 234-246 (2015) - [j19]Ioannis Tsimperidis, Vasilios Katos, Nathan L. Clarke:
Language-independent gender identification through keystroke analysis. Inf. Comput. Secur. 23(3): 286-301 (2015) - [c38]Emad Sherif, Steven Furnell, Nathan L. Clarke:
An Identification of Variables Influencing the Establishment of Information Security Culture. HCI (22) 2015: 436-448 - [c37]Emad Sherif, Steven Furnell, Nathan L. Clarke:
Awareness, behaviour and culture: The ABC in cultivating security compliance. ICITST 2015: 90-94 - [c36]Saud Alotaibi, Steven Furnell, Nathan L. Clarke:
Transparent authentication systems for mobile device security: A review. ICITST 2015: 406-413 - [c35]Abdulwahid Al Abdulwahid, Nathan L. Clarke, Ingo Stengel, Steven Furnell, Christoph Reich:
Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes. TrustBus 2015: 153-168 - [e11]Steven Furnell, Nathan L. Clarke:
Ninth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2015 ,Lesvos, Greece, July 1-3, 2015, Proceedings. University of Plymouth 2015, ISBN 978-1-84102-388-5 [contents] - 2014
- [j18]Fudong Li, Nathan L. Clarke, Maria Papadaki, Paul Dowland:
Active authentication for mobile devices utilising behaviour profiling. Int. J. Inf. Sec. 13(3): 229-244 (2014) - [j17]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
A response selection model for intrusion response systems: Response Strategy Model (RSM). Secur. Commun. Networks 7(11): 1831-1848 (2014) - [c34]Fudong Li, Ross Wheeler, Nathan L. Clarke:
An Evaluation of Behavioural Profiling on Mobile Devices. HCI (24) 2014: 330-339 - [c33]Stefan Frey, Claudia Lüthje, Christoph Reich, Nathan L. Clarke:
Cloud QoS Scaling by Fuzzy Logic. IC2E 2014: 343-348 - [c32]Jose Oscar Fajardo, Fidel Liberal, Fudong Li, Nathan L. Clarke, Is-Haka Mkwawa, Lingfen Sun:
Performance-driven evaluation for deploying IMS-based interoperability scenarios. ICC 2014: 3019-3024 - [c31]Dimitrios Kasiaras, Thomas Zafeiropoulos, Nathan L. Clarke, Georgios Kambourakis:
Android forensics: Correlation analysis. ICITST 2014: 157-162 - [c30]Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell, Valerio Biscione:
Text-Based Active Authentication for Mobile Devices. SEC 2014: 99-112 - [c29]Fudong Li, Nathan L. Clarke, Steven Furnell, Is-Haka Mkwawa:
Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks. WiMob 2014: 281-286 - [e10]Nathan L. Clarke, Steven Furnell:
Eighth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2014 ,Plymouth, UK, July 8-9, 2014. Proceedings. University of Plymouth 2014, ISBN 978-1-84102-375-5 [contents] - 2013
- [j16]Chris G. Hocking, Steven M. Furnell, Nathan L. Clarke, Paul L. Reynolds:
Co-operative user identity verification using an Authentication Aura. Comput. Secur. 39: 486-502 (2013) - [j15]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM). Secur. Commun. Networks 6(9): 1087-1116 (2013) - [c28]Frank Dölitzscher, Martin Knahl, Christoph Reich, Nathan L. Clarke:
Anomaly Detection in IaaS Clouds. CloudCom (1) 2013: 387-394 - [c27]M. Al Fahdi, Nathan L. Clarke, Steven M. Furnell:
Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions. ISSA 2013: 1-8 - [c26]Fudong Li, Nathan L. Clarke, Steven Furnell:
A Technology Independent Security Gateway for Real-Time Multimedia Communication. NSS 2013: 14-25 - [e9]Steven Furnell, Nathan L. Clarke, Vasilios Katos:
European Information Security Multi-Conference (EISMC 2013), Lisbon, Portugal, May 8-10, 2013. Proceedings. Plymouth University 2013, ISBN 978-1-84102-345-8 [contents] - 2012
- [j14]Steven Furnell, Nathan L. Clarke:
Power to the people? The evolving recognition of human aspects of security. Comput. Secur. 31(8): 983-988 (2012) - [j13]Frank Doelitzscher, Christoph Reich, Martin Knahl, Alexander Paßfall, Nathan L. Clarke:
An agent based business aware incident detection system for cloud environments. J. Cloud Comput. 1: 9 (2012) - [j12]Dimitrios Damopoulos, Sofia-Anna Menesidou, Georgios Kambourakis, Maria Papadaki, Nathan L. Clarke, Stefanos Gritzalis:
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Secur. Commun. Networks 5(1): 3-14 (2012) - [c25]Witold Thaul, Udo Bleimann, Nathan L. Clarke:
Personal knowledge management beyond versioning. I-KNOW 2012: 28 - [c24]Matthew Dagnell, Nathan Luke Clarke:
A Feasibility Study into Tracking Wi-Fi Enabled Mobile Devices . INC 2012: 85-92 - [c23]Hataichanok Saevanee, Nathan L. Clarke, Steven M. Furnell:
Multi-modal Behavioural Biometric Authentication for Mobile Devices. SEC 2012: 465-474 - [c22]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
A Response Strategy Model for Intrusion Response Systems. SEC 2012: 573-578 - [c21]Frank Dölitzscher, Christian Fischer, Denis Moskal, Christoph Reich, Martin Knahl, Nathan L. Clarke:
Validating Cloud Infrastructure Changes by Cloud Audits. SERVICES 2012: 377-384 - [c20]Nathan L. Clarke, Vasilios Katos, Sofia-Anna Menesidou, Bogdan V. Ghita, Steven Furnell:
A Novel Security Architecture for a Space-Data DTN. WWIC 2012: 342-349 - [e8]Nathan L. Clarke, Steven Furnell:
6th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2012, Crete, Greece, June 6-8, 2012. Proceedings. University of Plymouth 2012, ISBN 978-1-84102-317-5 [contents] - [e7]Nathan L. Clarke, Theodore Tryfonas, Ronald Dodge:
7th International Workshop on Digital Forensics and Incident Analysis, WDFIA 2012, Crete, Greece, June 6-8, 2012. Proceedings. Plymouth University, UK 2012, ISBN 978-1-84102-316-8 [contents] - 2011
- [b1]Nathan L. Clarke:
Transparent User Authentication - Biometrics, RFID and Behavioural Profiling. Springer 2011, ISBN 978-0-85729-804-1, pp. I-XVIII, 1-227 - [j11]Fudong Li, Nathan L. Clarke, Maria Papadaki, Paul Dowland:
Misuse Detection for Mobile Devices Using Behaviour Profiling. Int. J. Cyber Warf. Terror. 1(1): 41-53 (2011) - [j10]Shuhaili Talib, Nathan L. Clarke, Steven Furnell:
Establishing A Personalized Information Security Culture. Int. J. Mob. Comput. Multim. Commun. 3(1): 63-79 (2011) - [c19]Frank Dölitzscher, Christoph Reich, Martin Knahl, Nathan L. Clarke:
An Autonomous Agent Based Incident Detection System for Cloud Environments. CloudCom 2011: 197-204 - [c18]Witold Thaul, Udo Bleimann, Nathan L. Clarke:
Personal Knowledge Management - Beyond Versioning. LWA 2011: 242-249 - [c17]Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell:
SMS linguistic profiling authentication on mobile device. NSS 2011: 224-228 - [c16]Thomas Lederm, Nathan L. Clarke:
Risk Assessment for Mobile Devices. TrustBus 2011: 210-221 - [e6]Steven Furnell, Nathan L. Clarke:
5th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2011, London, UK, July 7-8, 2011. Proceedings. University of Plymouth 2011, ISBN 978-1-84102-284-0 [contents] - [e5]Nathan L. Clarke, Theodore Tryfonas:
6th International Workshop on Digital Forensics and Incident Analysis, WDFIA 2011, London, UK, July 7-8, 2011. Proceedings. Plymouth University, UK 2011, ISBN 978-1-84102-285-7 [contents] - 2010
- [j9]Gina C. Tjhai, Steven Furnell, Maria Papadaki, Nathan L. Clarke:
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. Comput. Secur. 29(6): 712-723 (2010) - [c15]Shuhaili Talib, Nathan L. Clarke, Steven Furnell:
An Analysis of Information Security Awareness within Home and Work Environments. ARES 2010: 196-203 - [c14]Chris G. Hocking, Steven M. Furnell, Nathan L. Clarke, Paul L. Reynolds:
A distributed and cooperative user authentication framework. IAS 2010: 304-310 - [c13]Fudong Li, Nathan L. Clarke, Maria Papadaki, Paul Dowland:
Behaviour Profiling on Mobile Devices. EST 2010: 77-82 - [c12]Hanna V. Shauchenka, Udo Bleimann, Matthias Knoll, Nathan L. Clarke:
Service Quality Assessment in Distance Learning. INC 2010: 269-277 - [c11]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
An investigation and survey of response options for Intrusion Response Systems (IRSs). ISSA 2010 - [c10]Tarik Ibrahim, Steven Furnell, Maria Papadaki, Nathan L. Clarke:
Assessing the Usability of End-User Security Software. TrustBus 2010: 177-189 - [e4]Nathan L. Clarke, Steven Furnell, Rossouw von Solms:
South African Information Security Multi-Conference, SAISMC 2010, Port Elizabeth, South Africa, May 17-18, 2010. Proceedings. University of Plymouth 2010, ISBN 978-1-84102-256-7 [contents]
2000 – 2009
- 2009
- [j8]Reinhardt A. Botha, Steven Furnell, Nathan L. Clarke:
From desktop to mobile: Examining the security experience. Comput. Secur. 28(3-4): 130-137 (2009) - [c9]Nathan L. Clarke, Sevasti Karatzouni, Steven Furnell:
Flexible and Transparent User Authentication for Mobile Devices. SEC 2009: 1-12 - [e3]Steven Furnell, Nathan L. Clarke:
3rd International Conference on Human Aspects of Information Security and Assurance, HAISA 2009, Athens, Greece, June 25-26, 2009. Proceedings. University of Plymouth 2009, ISBN 978-1-84102-231-4 [contents] - [e2]Nathan L. Clarke, Theodore Tryfonas:
4th International Workshop on Digital Forensics and Incident Analysis, WDFIA 2009, Athens, Greece, June 25-26, 2009. Proceedings. Plymouth University, UK 2009, ISBN 978-1-84102-230-7 [contents] - 2008
- [j7]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks 6(7): 1151-1167 (2008) - [c8]Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
Investigating the problem of IDS false alarms: An experimental study using Snort. SEC 2008: 253-267 - [c7]Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. TrustBus 2008: 139-150 - [e1]Nathan L. Clarke, Steven Furnell:
2nd International Conference on Human Aspects of Information Security and Assurance, HAISA 2008, Plymouth, UK, July 8-9, 2008. Proceedings. University of Plymouth 2008, ISBN 978-1-84102-189-8 [contents] - 2007
- [j6]Nathan L. Clarke, Steven Furnell:
Advanced user authentication for mobile devices. Comput. Secur. 26(2): 109-119 (2007) - [j5]Nathan L. Clarke, Steven Furnell:
Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Sec. 6(1): 1-14 (2007) - [j4]Nathan L. Clarke, A. R. Mekala:
The application of signature recognition to transparent handwriting verification for mobile devices. Inf. Manag. Comput. Secur. 15(3): 214-225 (2007) - [c6]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. ADHOC-NOW 2007: 129-141 - [c5]Sevasti Karatzouni, Nathan L. Clarke:
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. SEC 2007: 253-263 - 2006
- [c4]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. ISI 2006: 590-595 - 2005
- [j3]Nathan L. Clarke, Steven Furnell:
Authentication of users on mobile telephones - A survey of attitudes and practices. Comput. Secur. 24(7): 519-527 (2005) - 2004
- [c3]David Clarke, Fritjof Sahlstrom, Cameron Mitchell, Nathan L. Clarke:
Optimising the Use of Available Technology in Educational Research. CATE 2004: 191-196 - 2003
- [j2]Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds:
Keystroke dynamics on a mobile handset: a feasibility study. Inf. Manag. Comput. Secur. 11(4): 161-166 (2003) - [c2]Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds:
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. SEC 2003: 97-108 - 2002
- [j1]Nathan L. Clarke, Steven Furnell, Philip M. Rodwell, Paul L. Reynolds:
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. Comput. Secur. 21(3): 220-228 (2002)
1990 – 1999
- 1994
- [c1]Tim Moors, Nathan L. Clarke, Guven Mercankosk:
Implementing Traffic Shaping. LCN 1994: 307-314
Coauthor Index
aka: Steven M. Furnell
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint