dblp.uni-trier.dewww.uni-trier.de

Nathan L. Clarke

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
12EEGina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke: Investigating the problem of IDS false alarms: An experimental study using Snort. SEC 2008: 253-267
11EEGina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke: The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. TrustBus 2008: 139-150
10EEShukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke: Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks 6(7): 1151-1167 (2008)
2007
9EEShukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke: Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. ADHOC-NOW 2007: 129-141
8EENathan L. Clarke, Steven Furnell: Advanced user authentication for mobile devices. Computers & Security 26(2): 109-119 (2007)
7EENathan L. Clarke, Steven Furnell: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Sec. 6(1): 1-14 (2007)
2006
6EEShukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke: A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. ISI 2006: 590-595
2005
5EENathan L. Clarke, Steven Furnell: Authentication of users on mobile telephones - A survey of attitudes and practices. Computers & Security 24(7): 519-527 (2005)
2003
4 Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds: Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. SEC 2003: 97-108
3EENathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds: Keystroke dynamics on a mobile handset: a feasibility study. Inf. Manag. Comput. Security 11(4): 161-166 (2003)
2002
2 Nathan L. Clarke, Steven Furnell, P. M. Rodwell, Paul L. Reynolds: Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. Computers & Security 21(3): 220-228 (2002)
1994
1 Tim Moors, Nathan L. Clarke, Guven Mercankosk: Implementing Traffic Shaping. LCN 1994: 307-314

Coauthor Index

1Phillip J. Brooke [6] [9] [10]
2Steven Furnell [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12]
3Benn Lines [3] [4]
4Guven Mercankosk [1]
5Tim Moors [1]
6Maria Papadaki [11] [12]
7Shukor A. Razak [6] [9] [10]
8Paul L. Reynolds [2] [3] [4]
9P. M. Rodwell [2]
10Gina C. Tjhai [11] [12]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)