| 2007 |
| 13 | EE | Steven Furnell,
Dimitris Katsabas,
Paul Dowland,
Fraser Reid:
A Practical Usability Evaluation of Security Features in End-User Applications.
SEC 2007: 205-216 |
| 2006 |
| 12 | EE | Steven Furnell,
Adila Jusoh,
Dimitris Katsabas,
Paul Dowland:
Considering the Usability of End-User Security Software.
SEC 2006: 307-316 |
| 2004 |
| 11 | | Paul Dowland,
Steven Furnell:
A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies.
SEC 2004: 275-290 |
| 10 | EE | Steven Furnell,
I. Papadopoulos,
Paul Dowland:
A long-term trial of alternative user authentication technologies.
Inf. Manag. Comput. Security 12(2): 178-190 (2004) |
| 2003 |
| 9 | | Steven Furnell,
Alastair G. Warren,
Paul Dowland:
Improving Security Awareness Through Computer-based Training.
World Conference on Information Security Education 2003: 287-301 |
| 2002 |
| 8 | | Paul Dowland,
Steven Furnell,
Maria Papadaki:
Keystroke Analysis as a Method of Advanced User Authentication and Response.
SEC 2002: 215-226 |
| 7 | EE | I. Irakleous,
Steven Furnell,
Paul Dowland,
Maria Papadaki:
An experimental comparison of secret-based user authentication technologies.
Inf. Manag. Comput. Security 10(3): 100-108 (2002) |
| 2001 |
| 6 | EE | Harjit Singh,
Steven Furnell,
Benn Lines,
Paul Dowland:
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining.
MMM-ACNS 2001: 153-158 |
| 5 | EE | Steven Furnell,
Pelagia Chiliarchaki,
Paul Dowland:
Security analysers: administrator assistants or hacker helpers?
Inf. Manag. Comput. Security 9(2): 93-101 (2001) |
| 2000 |
| 4 | | Steven Furnell,
Paul Dowland,
H. M. Illingworth,
Paul L. Reynolds:
Authentication and Supervision: A Survey of User Attitudes.
Computers & Security 19(6): 529-539 (2000) |
| 3 | EE | Steven Furnell,
Paul Dowland:
A conceptual architecture for real-time intrusion monitoring.
Inf. Manag. Comput. Security 8(2): 65-75 (2000) |
| 1999 |
| 2 | EE | Paul Dowland,
Steven Furnell,
H. M. Illingworth,
Paul L. Reynolds:
Computer crime and abuse: A survey of public attitudes and awareness.
Computers & Security 18(8): 715-726 (1999) |
| 1 | EE | Steven Furnell,
Paul Dowland,
Peter W. Sanders:
Dissecting the "Hacker Manifesto".
Inf. Manag. Comput. Security 7(2): 69-75 (1999) |