2008 |
56 | | Steven Furnell,
Sokratis K. Katsikas,
Antonio Lioy:
Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings
Springer 2008 |
55 | EE | Gina C. Tjhai,
Maria Papadaki,
Steven Furnell,
Nathan L. Clarke:
Investigating the problem of IDS false alarms: An experimental study using Snort.
SEC 2008: 253-267 |
54 | EE | Gina C. Tjhai,
Maria Papadaki,
Steven Furnell,
Nathan L. Clarke:
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset.
TrustBus 2008: 139-150 |
53 | EE | Shukor A. Razak,
Steven Furnell,
Nathan L. Clarke,
Phillip J. Brooke:
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks.
Ad Hoc Networks 6(7): 1151-1167 (2008) |
52 | EE | Steven Furnell,
Valleria Tsaganidi,
Andrew D. Phippen:
Security beliefs and barriers for novice Internet users.
Computers & Security 27(7-8): 235-240 (2008) |
2007 |
51 | EE | Shukor A. Razak,
Steven Furnell,
Nathan L. Clarke,
Phillip J. Brooke:
Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation.
ADHOC-NOW 2007: 129-141 |
50 | EE | Klaus-Peter Fischer,
Udo Bleimann,
Woldemar F. Fuhrmann,
Steven Furnell:
Security Policy Enforcement in BPEL-Defined Collaborative Business Processes.
ICDE Workshops 2007: 685-694 |
49 | EE | Steven Furnell,
Dimitris Katsabas,
Paul Dowland,
Fraser Reid:
A Practical Usability Evaluation of Security Features in End-User Applications.
SEC 2007: 205-216 |
48 | EE | Klaus-Peter Fischer,
Udo Bleimann,
Steven Furnell:
Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes.
TrustBus 2007: 178-189 |
47 | EE | Steven Furnell:
IFIP workshop - Information security culture.
Computers & Security 26(1): 35 (2007) |
46 | EE | Nathan L. Clarke,
Steven Furnell:
Advanced user authentication for mobile devices.
Computers & Security 26(2): 109-119 (2007) |
45 | EE | Steven Furnell,
P. Bryant,
Andrew D. Phippen:
Assessing the security perceptions of personal Internet users.
Computers & Security 26(5): 410-417 (2007) |
44 | EE | Steven Furnell:
Making security usable: Are things improving?
Computers & Security 26(6): 434-443 (2007) |
43 | EE | Steven Furnell:
An assessment of website password practices.
Computers & Security 26(7-8): 445-451 (2007) |
42 | EE | P. M. Rodwell,
Steven Furnell,
Paul L. Reynolds:
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head.
Computers & Security 26(7-8): 468-478 (2007) |
41 | EE | Nathan L. Clarke,
Steven Furnell:
Authenticating mobile phone users using keystroke analysis.
Int. J. Inf. Sec. 6(1): 1-14 (2007) |
40 | EE | Jörg Preuß,
Steven Furnell,
Maria Papadaki:
Considering the potential of criminal profiling to combat hacking.
Journal in Computer Virology 3(2): 135-141 (2007) |
2006 |
39 | | Simone Fischer-Hübner,
Steven Furnell,
Costas Lambrinoudakis:
Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings
Springer 2006 |
38 | EE | Shukor A. Razak,
Steven Furnell,
Nathan L. Clarke,
Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.
ISI 2006: 590-595 |
37 | EE | Steven Furnell,
Adila Jusoh,
Dimitris Katsabas,
Paul Dowland:
Considering the Usability of End-User Security Software.
SEC 2006: 307-316 |
36 | EE | Steven Furnell,
Adila Jusoh,
Dimitris Katsabas:
The challenges of understanding and using security: A survey of end-users.
Computers & Security 25(1): 27-35 (2006) |
35 | EE | Hazel Lacohée,
Andrew D. Phippen,
Steven Furnell:
Risk and restitution: Assessing how users establish online trust.
Computers & Security 25(7): 486-493 (2006) |
2005 |
34 | | Shukor A. Razak,
Steven Furnell,
Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks.
ECIW 2005: 271-280 |
33 | EE | Steven Furnell:
Why users cannot use security.
Computers & Security 24(4): 274-279 (2005) |
32 | EE | G. Magklaras,
Steven Furnell:
A preliminary model of end user sophistication for insider threat prediction in IT systems.
Computers & Security 24(5): 371-380 (2005) |
31 | EE | Nathan L. Clarke,
Steven Furnell:
Authentication of users on mobile telephones - A survey of attitudes and practices.
Computers & Security 24(7): 519-527 (2005) |
2004 |
30 | | Vassilis Dimopoulos,
Steven Furnell,
Murray Jennex,
Ioannis Kritharas:
Approaches to IT Security in Small and Medium Enterprises.
AISM 2004: 73-82 |
29 | | Aung Htike Phyo,
Steven Furnell,
Francisco Portilla:
A Framework For Role-based Monitoring of Insider Misuse.
International Information Security Workshops 2004: 51-66 |
28 | | Paul Dowland,
Steven Furnell:
A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies.
SEC 2004: 275-290 |
27 | EE | Steven Furnell,
I. Papadopoulos,
Paul Dowland:
A long-term trial of alternative user authentication technologies.
Inf. Manag. Comput. Security 12(2): 178-190 (2004) |
2003 |
26 | EE | Maria Papadaki,
Steven Furnell,
Benn Lines,
Paul L. Reynolds:
Operational Characteristics of an Automated Intrusion Response System.
Communications and Multimedia Security 2003: 65-75 |
25 | EE | Steven Furnell:
Cybercrime: Vandalizing the Information Society.
ICWE 2003: 8-16 |
24 | | Nathan L. Clarke,
Steven Furnell,
Benn Lines,
Paul L. Reynolds:
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets.
SEC 2003: 97-108 |
23 | | Steven Furnell,
Alastair G. Warren,
Paul Dowland:
Improving Security Awareness Through Computer-based Training.
World Conference on Information Security Education 2003: 287-301 |
22 | EE | Nathan L. Clarke,
Steven Furnell,
Benn Lines,
Paul L. Reynolds:
Keystroke dynamics on a mobile handset: a feasibility study.
Inf. Manag. Comput. Security 11(4): 161-166 (2003) |
2002 |
21 | | A. Alayed,
Steven Furnell,
I. M. Barlow:
Addressing Internet Security Vulnerabilities: A Benchmarking Study.
SEC 2002: 121-132 |
20 | | Paul Dowland,
Steven Furnell,
Maria Papadaki:
Keystroke Analysis as a Method of Advanced User Authentication and Response.
SEC 2002: 215-226 |
19 | EE | Michael P. Evans,
Steven Furnell:
A web-based resource migration protocol using WebDAV.
WWW 2002: 263-271 |
18 | | G. Magklaras,
Steven Furnell:
Insider Threat Prediction Tool: Evaluating the probability of IT misuse.
Computers & Security 21(1): 62-73 (2002) |
17 | | Nathan L. Clarke,
Steven Furnell,
P. M. Rodwell,
Paul L. Reynolds:
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices.
Computers & Security 21(3): 220-228 (2002) |
16 | EE | I. Irakleous,
Steven Furnell,
Paul Dowland,
Maria Papadaki:
An experimental comparison of secret-based user authentication technologies.
Inf. Manag. Comput. Security 10(3): 100-108 (2002) |
15 | EE | Steven Furnell:
Cybercrime - vandalizing the information society (Review).
Inf. Manag. Comput. Security 10(4): 196 (2002) |
14 | EE | Steven Furnell:
Cybercrime: vandalizing the information society.
Inf. Res. 7(3): (2002) |
2001 |
13 | | Steven Furnell,
Maria Papadaki,
G. Magklaras,
A. Alayed:
Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks.
Conference on Information Security Management & Small Systems Security 2001: 87-98 |
12 | EE | Harjit Singh,
Steven Furnell,
Benn Lines,
Paul Dowland:
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining.
MMM-ACNS 2001: 153-158 |
11 | EE | Michael P. Evans,
Steven Furnell:
The Resource Locator Service: fixing a flaw in the web.
Computer Networks 37(3/4): 307-330 (2001) |
10 | EE | Steven Furnell,
Pelagia Chiliarchaki,
Paul Dowland:
Security analysers: administrator assistants or hacker helpers?
Inf. Manag. Comput. Security 9(2): 93-101 (2001) |
2000 |
9 | | Steven Furnell,
Paul Dowland,
H. M. Illingworth,
Paul L. Reynolds:
Authentication and Supervision: A Survey of User Attitudes.
Computers & Security 19(6): 529-539 (2000) |
8 | EE | Steven Furnell,
Paul Dowland:
A conceptual architecture for real-time intrusion monitoring.
Inf. Manag. Comput. Security 8(2): 65-75 (2000) |
1999 |
7 | EE | Steven Furnell,
Matthew J. Warren:
Computer hacking and cyber terrorism: the real threats in the new millennium?
Computers & Security 18(1): 28-34 (1999) |
6 | EE | Paul Dowland,
Steven Furnell,
H. M. Illingworth,
Paul L. Reynolds:
Computer crime and abuse: A survey of public attitudes and awareness.
Computers & Security 18(8): 715-726 (1999) |
5 | EE | Steven Furnell,
Paul Dowland,
Peter W. Sanders:
Dissecting the "Hacker Manifesto".
Inf. Manag. Comput. Security 7(2): 69-75 (1999) |
1997 |
4 | | Michael P. Evans,
Kimmo T. Kettunen,
Grahame K. Blackwell,
Steven Furnell,
Andrew D. Phippen,
Stephen Hope,
Paul L. Reynolds:
Network Resource Adaptation in the DOLMEN Service Machine.
IS&N 1997: 25-34 |
3 | | Matthew J. Warren,
Steven Furnell,
Peter W. Sanders:
ODESSA - a new approach to healthcare risk analysis.
SEC 1997: 391-402 |
1996 |
2 | | Steven Furnell,
Nichola Jane Salmons,
Peter W. Sanders,
Colin T. Stockel,
Matthew J. Warren:
Approaches to Security in Healthcare Multimedia Systems.
Communications and Multimedia Security 1996: 25-36 |
1 | | Steven Furnell,
Joseph P. Morrissey,
Peter W. Sanders,
Colin T. Stockel:
Applications of keystroke analysis for improved login security and continuous user authentication.
SEC 1996: 283-294 |