2008 |
12 | EE | Gina C. Tjhai,
Maria Papadaki,
Steven Furnell,
Nathan L. Clarke:
Investigating the problem of IDS false alarms: An experimental study using Snort.
SEC 2008: 253-267 |
11 | EE | Gina C. Tjhai,
Maria Papadaki,
Steven Furnell,
Nathan L. Clarke:
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset.
TrustBus 2008: 139-150 |
10 | EE | Shukor A. Razak,
Steven Furnell,
Nathan L. Clarke,
Phillip J. Brooke:
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks.
Ad Hoc Networks 6(7): 1151-1167 (2008) |
2007 |
9 | EE | Shukor A. Razak,
Steven Furnell,
Nathan L. Clarke,
Phillip J. Brooke:
Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation.
ADHOC-NOW 2007: 129-141 |
8 | EE | Nathan L. Clarke,
Steven Furnell:
Advanced user authentication for mobile devices.
Computers & Security 26(2): 109-119 (2007) |
7 | EE | Nathan L. Clarke,
Steven Furnell:
Authenticating mobile phone users using keystroke analysis.
Int. J. Inf. Sec. 6(1): 1-14 (2007) |
2006 |
6 | EE | Shukor A. Razak,
Steven Furnell,
Nathan L. Clarke,
Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.
ISI 2006: 590-595 |
2005 |
5 | EE | Nathan L. Clarke,
Steven Furnell:
Authentication of users on mobile telephones - A survey of attitudes and practices.
Computers & Security 24(7): 519-527 (2005) |
2003 |
4 | | Nathan L. Clarke,
Steven Furnell,
Benn Lines,
Paul L. Reynolds:
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets.
SEC 2003: 97-108 |
3 | EE | Nathan L. Clarke,
Steven Furnell,
Benn Lines,
Paul L. Reynolds:
Keystroke dynamics on a mobile handset: a feasibility study.
Inf. Manag. Comput. Security 11(4): 161-166 (2003) |
2002 |
2 | | Nathan L. Clarke,
Steven Furnell,
P. M. Rodwell,
Paul L. Reynolds:
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices.
Computers & Security 21(3): 220-228 (2002) |
1994 |
1 | | Tim Moors,
Nathan L. Clarke,
Guven Mercankosk:
Implementing Traffic Shaping.
LCN 1994: 307-314 |