dblp.uni-trier.dewww.uni-trier.de

Paul Dowland

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
13EESteven Furnell, Dimitris Katsabas, Paul Dowland, Fraser Reid: A Practical Usability Evaluation of Security Features in End-User Applications. SEC 2007: 205-216
2006
12EESteven Furnell, Adila Jusoh, Dimitris Katsabas, Paul Dowland: Considering the Usability of End-User Security Software. SEC 2006: 307-316
2004
11 Paul Dowland, Steven Furnell: A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. SEC 2004: 275-290
10EESteven Furnell, I. Papadopoulos, Paul Dowland: A long-term trial of alternative user authentication technologies. Inf. Manag. Comput. Security 12(2): 178-190 (2004)
2003
9 Steven Furnell, Alastair G. Warren, Paul Dowland: Improving Security Awareness Through Computer-based Training. World Conference on Information Security Education 2003: 287-301
2002
8 Paul Dowland, Steven Furnell, Maria Papadaki: Keystroke Analysis as a Method of Advanced User Authentication and Response. SEC 2002: 215-226
7EEI. Irakleous, Steven Furnell, Paul Dowland, Maria Papadaki: An experimental comparison of secret-based user authentication technologies. Inf. Manag. Comput. Security 10(3): 100-108 (2002)
2001
6EEHarjit Singh, Steven Furnell, Benn Lines, Paul Dowland: Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. MMM-ACNS 2001: 153-158
5EESteven Furnell, Pelagia Chiliarchaki, Paul Dowland: Security analysers: administrator assistants or hacker helpers? Inf. Manag. Comput. Security 9(2): 93-101 (2001)
2000
4 Steven Furnell, Paul Dowland, H. M. Illingworth, Paul L. Reynolds: Authentication and Supervision: A Survey of User Attitudes. Computers & Security 19(6): 529-539 (2000)
3EESteven Furnell, Paul Dowland: A conceptual architecture for real-time intrusion monitoring. Inf. Manag. Comput. Security 8(2): 65-75 (2000)
1999
2EEPaul Dowland, Steven Furnell, H. M. Illingworth, Paul L. Reynolds: Computer crime and abuse: A survey of public attitudes and awareness. Computers & Security 18(8): 715-726 (1999)
1EESteven Furnell, Paul Dowland, Peter W. Sanders: Dissecting the "Hacker Manifesto". Inf. Manag. Comput. Security 7(2): 69-75 (1999)

Coauthor Index

1Pelagia Chiliarchaki [5]
2Steven Furnell [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13]
3H. M. Illingworth [2] [4]
4I. Irakleous [7]
5Adila Jusoh [12]
6Dimitris Katsabas [12] [13]
7Benn Lines [6]
8Maria Papadaki [7] [8]
9I. Papadopoulos [10]
10Fraser Reid [13]
11Paul L. Reynolds [2] [4]
12Peter W. Sanders [1]
13Harjit Singh [6]
14Alastair G. Warren [9]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)