2007 |
13 | EE | Steven Furnell,
Dimitris Katsabas,
Paul Dowland,
Fraser Reid:
A Practical Usability Evaluation of Security Features in End-User Applications.
SEC 2007: 205-216 |
2006 |
12 | EE | Steven Furnell,
Adila Jusoh,
Dimitris Katsabas,
Paul Dowland:
Considering the Usability of End-User Security Software.
SEC 2006: 307-316 |
2004 |
11 | | Paul Dowland,
Steven Furnell:
A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies.
SEC 2004: 275-290 |
10 | EE | Steven Furnell,
I. Papadopoulos,
Paul Dowland:
A long-term trial of alternative user authentication technologies.
Inf. Manag. Comput. Security 12(2): 178-190 (2004) |
2003 |
9 | | Steven Furnell,
Alastair G. Warren,
Paul Dowland:
Improving Security Awareness Through Computer-based Training.
World Conference on Information Security Education 2003: 287-301 |
2002 |
8 | | Paul Dowland,
Steven Furnell,
Maria Papadaki:
Keystroke Analysis as a Method of Advanced User Authentication and Response.
SEC 2002: 215-226 |
7 | EE | I. Irakleous,
Steven Furnell,
Paul Dowland,
Maria Papadaki:
An experimental comparison of secret-based user authentication technologies.
Inf. Manag. Comput. Security 10(3): 100-108 (2002) |
2001 |
6 | EE | Harjit Singh,
Steven Furnell,
Benn Lines,
Paul Dowland:
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining.
MMM-ACNS 2001: 153-158 |
5 | EE | Steven Furnell,
Pelagia Chiliarchaki,
Paul Dowland:
Security analysers: administrator assistants or hacker helpers?
Inf. Manag. Comput. Security 9(2): 93-101 (2001) |
2000 |
4 | | Steven Furnell,
Paul Dowland,
H. M. Illingworth,
Paul L. Reynolds:
Authentication and Supervision: A Survey of User Attitudes.
Computers & Security 19(6): 529-539 (2000) |
3 | EE | Steven Furnell,
Paul Dowland:
A conceptual architecture for real-time intrusion monitoring.
Inf. Manag. Comput. Security 8(2): 65-75 (2000) |
1999 |
2 | EE | Paul Dowland,
Steven Furnell,
H. M. Illingworth,
Paul L. Reynolds:
Computer crime and abuse: A survey of public attitudes and awareness.
Computers & Security 18(8): 715-726 (1999) |
1 | EE | Steven Furnell,
Paul Dowland,
Peter W. Sanders:
Dissecting the "Hacker Manifesto".
Inf. Manag. Comput. Security 7(2): 69-75 (1999) |