2008 | ||
---|---|---|
56 | Steven Furnell, Sokratis K. Katsikas, Antonio Lioy: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings Springer 2008 | |
55 | EE | Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke: Investigating the problem of IDS false alarms: An experimental study using Snort. SEC 2008: 253-267 |
54 | EE | Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke: The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. TrustBus 2008: 139-150 |
53 | EE | Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke: Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks 6(7): 1151-1167 (2008) |
52 | EE | Steven Furnell, Valleria Tsaganidi, Andrew D. Phippen: Security beliefs and barriers for novice Internet users. Computers & Security 27(7-8): 235-240 (2008) |
2007 | ||
51 | EE | Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke: Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. ADHOC-NOW 2007: 129-141 |
50 | EE | Klaus-Peter Fischer, Udo Bleimann, Woldemar F. Fuhrmann, Steven Furnell: Security Policy Enforcement in BPEL-Defined Collaborative Business Processes. ICDE Workshops 2007: 685-694 |
49 | EE | Steven Furnell, Dimitris Katsabas, Paul Dowland, Fraser Reid: A Practical Usability Evaluation of Security Features in End-User Applications. SEC 2007: 205-216 |
48 | EE | Klaus-Peter Fischer, Udo Bleimann, Steven Furnell: Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes. TrustBus 2007: 178-189 |
47 | EE | Steven Furnell: IFIP workshop - Information security culture. Computers & Security 26(1): 35 (2007) |
46 | EE | Nathan L. Clarke, Steven Furnell: Advanced user authentication for mobile devices. Computers & Security 26(2): 109-119 (2007) |
45 | EE | Steven Furnell, P. Bryant, Andrew D. Phippen: Assessing the security perceptions of personal Internet users. Computers & Security 26(5): 410-417 (2007) |
44 | EE | Steven Furnell: Making security usable: Are things improving? Computers & Security 26(6): 434-443 (2007) |
43 | EE | Steven Furnell: An assessment of website password practices. Computers & Security 26(7-8): 445-451 (2007) |
42 | EE | P. M. Rodwell, Steven Furnell, Paul L. Reynolds: A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head. Computers & Security 26(7-8): 468-478 (2007) |
41 | EE | Nathan L. Clarke, Steven Furnell: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Sec. 6(1): 1-14 (2007) |
40 | EE | Jörg Preuß, Steven Furnell, Maria Papadaki: Considering the potential of criminal profiling to combat hacking. Journal in Computer Virology 3(2): 135-141 (2007) |
2006 | ||
39 | Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings Springer 2006 | |
38 | EE | Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke: A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. ISI 2006: 590-595 |
37 | EE | Steven Furnell, Adila Jusoh, Dimitris Katsabas, Paul Dowland: Considering the Usability of End-User Security Software. SEC 2006: 307-316 |
36 | EE | Steven Furnell, Adila Jusoh, Dimitris Katsabas: The challenges of understanding and using security: A survey of end-users. Computers & Security 25(1): 27-35 (2006) |
35 | EE | Hazel Lacohée, Andrew D. Phippen, Steven Furnell: Risk and restitution: Assessing how users establish online trust. Computers & Security 25(7): 486-493 (2006) |
2005 | ||
34 | Shukor A. Razak, Steven Furnell, Phillip J. Brooke: A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks. ECIW 2005: 271-280 | |
33 | EE | Steven Furnell: Why users cannot use security. Computers & Security 24(4): 274-279 (2005) |
32 | EE | G. Magklaras, Steven Furnell: A preliminary model of end user sophistication for insider threat prediction in IT systems. Computers & Security 24(5): 371-380 (2005) |
31 | EE | Nathan L. Clarke, Steven Furnell: Authentication of users on mobile telephones - A survey of attitudes and practices. Computers & Security 24(7): 519-527 (2005) |
2004 | ||
30 | Vassilis Dimopoulos, Steven Furnell, Murray Jennex, Ioannis Kritharas: Approaches to IT Security in Small and Medium Enterprises. AISM 2004: 73-82 | |
29 | Aung Htike Phyo, Steven Furnell, Francisco Portilla: A Framework For Role-based Monitoring of Insider Misuse. International Information Security Workshops 2004: 51-66 | |
28 | Paul Dowland, Steven Furnell: A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. SEC 2004: 275-290 | |
27 | EE | Steven Furnell, I. Papadopoulos, Paul Dowland: A long-term trial of alternative user authentication technologies. Inf. Manag. Comput. Security 12(2): 178-190 (2004) |
2003 | ||
26 | EE | Maria Papadaki, Steven Furnell, Benn Lines, Paul L. Reynolds: Operational Characteristics of an Automated Intrusion Response System. Communications and Multimedia Security 2003: 65-75 |
25 | EE | Steven Furnell: Cybercrime: Vandalizing the Information Society. ICWE 2003: 8-16 |
24 | Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds: Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. SEC 2003: 97-108 | |
23 | Steven Furnell, Alastair G. Warren, Paul Dowland: Improving Security Awareness Through Computer-based Training. World Conference on Information Security Education 2003: 287-301 | |
22 | EE | Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds: Keystroke dynamics on a mobile handset: a feasibility study. Inf. Manag. Comput. Security 11(4): 161-166 (2003) |
2002 | ||
21 | A. Alayed, Steven Furnell, I. M. Barlow: Addressing Internet Security Vulnerabilities: A Benchmarking Study. SEC 2002: 121-132 | |
20 | Paul Dowland, Steven Furnell, Maria Papadaki: Keystroke Analysis as a Method of Advanced User Authentication and Response. SEC 2002: 215-226 | |
19 | EE | Michael P. Evans, Steven Furnell: A web-based resource migration protocol using WebDAV. WWW 2002: 263-271 |
18 | G. Magklaras, Steven Furnell: Insider Threat Prediction Tool: Evaluating the probability of IT misuse. Computers & Security 21(1): 62-73 (2002) | |
17 | Nathan L. Clarke, Steven Furnell, P. M. Rodwell, Paul L. Reynolds: Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. Computers & Security 21(3): 220-228 (2002) | |
16 | EE | I. Irakleous, Steven Furnell, Paul Dowland, Maria Papadaki: An experimental comparison of secret-based user authentication technologies. Inf. Manag. Comput. Security 10(3): 100-108 (2002) |
15 | EE | Steven Furnell: Cybercrime - vandalizing the information society (Review). Inf. Manag. Comput. Security 10(4): 196 (2002) |
14 | EE | Steven Furnell: Cybercrime: vandalizing the information society. Inf. Res. 7(3): (2002) |
2001 | ||
13 | Steven Furnell, Maria Papadaki, G. Magklaras, A. Alayed: Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks. Conference on Information Security Management & Small Systems Security 2001: 87-98 | |
12 | EE | Harjit Singh, Steven Furnell, Benn Lines, Paul Dowland: Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. MMM-ACNS 2001: 153-158 |
11 | EE | Michael P. Evans, Steven Furnell: The Resource Locator Service: fixing a flaw in the web. Computer Networks 37(3/4): 307-330 (2001) |
10 | EE | Steven Furnell, Pelagia Chiliarchaki, Paul Dowland: Security analysers: administrator assistants or hacker helpers? Inf. Manag. Comput. Security 9(2): 93-101 (2001) |
2000 | ||
9 | Steven Furnell, Paul Dowland, H. M. Illingworth, Paul L. Reynolds: Authentication and Supervision: A Survey of User Attitudes. Computers & Security 19(6): 529-539 (2000) | |
8 | EE | Steven Furnell, Paul Dowland: A conceptual architecture for real-time intrusion monitoring. Inf. Manag. Comput. Security 8(2): 65-75 (2000) |
1999 | ||
7 | EE | Steven Furnell, Matthew J. Warren: Computer hacking and cyber terrorism: the real threats in the new millennium? Computers & Security 18(1): 28-34 (1999) |
6 | EE | Paul Dowland, Steven Furnell, H. M. Illingworth, Paul L. Reynolds: Computer crime and abuse: A survey of public attitudes and awareness. Computers & Security 18(8): 715-726 (1999) |
5 | EE | Steven Furnell, Paul Dowland, Peter W. Sanders: Dissecting the "Hacker Manifesto". Inf. Manag. Comput. Security 7(2): 69-75 (1999) |
1997 | ||
4 | Michael P. Evans, Kimmo T. Kettunen, Grahame K. Blackwell, Steven Furnell, Andrew D. Phippen, Stephen Hope, Paul L. Reynolds: Network Resource Adaptation in the DOLMEN Service Machine. IS&N 1997: 25-34 | |
3 | Matthew J. Warren, Steven Furnell, Peter W. Sanders: ODESSA - a new approach to healthcare risk analysis. SEC 1997: 391-402 | |
1996 | ||
2 | Steven Furnell, Nichola Jane Salmons, Peter W. Sanders, Colin T. Stockel, Matthew J. Warren: Approaches to Security in Healthcare Multimedia Systems. Communications and Multimedia Security 1996: 25-36 | |
1 | Steven Furnell, Joseph P. Morrissey, Peter W. Sanders, Colin T. Stockel: Applications of keystroke analysis for improved login security and continuous user authentication. SEC 1996: 283-294 |