dblp.uni-trier.dewww.uni-trier.de

Steven Furnell

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
56 Steven Furnell, Sokratis K. Katsikas, Antonio Lioy: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings Springer 2008
55EEGina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke: Investigating the problem of IDS false alarms: An experimental study using Snort. SEC 2008: 253-267
54EEGina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke: The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. TrustBus 2008: 139-150
53EEShukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke: Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks 6(7): 1151-1167 (2008)
52EESteven Furnell, Valleria Tsaganidi, Andrew D. Phippen: Security beliefs and barriers for novice Internet users. Computers & Security 27(7-8): 235-240 (2008)
2007
51EEShukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke: Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. ADHOC-NOW 2007: 129-141
50EEKlaus-Peter Fischer, Udo Bleimann, Woldemar F. Fuhrmann, Steven Furnell: Security Policy Enforcement in BPEL-Defined Collaborative Business Processes. ICDE Workshops 2007: 685-694
49EESteven Furnell, Dimitris Katsabas, Paul Dowland, Fraser Reid: A Practical Usability Evaluation of Security Features in End-User Applications. SEC 2007: 205-216
48EEKlaus-Peter Fischer, Udo Bleimann, Steven Furnell: Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes. TrustBus 2007: 178-189
47EESteven Furnell: IFIP workshop - Information security culture. Computers & Security 26(1): 35 (2007)
46EENathan L. Clarke, Steven Furnell: Advanced user authentication for mobile devices. Computers & Security 26(2): 109-119 (2007)
45EESteven Furnell, P. Bryant, Andrew D. Phippen: Assessing the security perceptions of personal Internet users. Computers & Security 26(5): 410-417 (2007)
44EESteven Furnell: Making security usable: Are things improving? Computers & Security 26(6): 434-443 (2007)
43EESteven Furnell: An assessment of website password practices. Computers & Security 26(7-8): 445-451 (2007)
42EEP. M. Rodwell, Steven Furnell, Paul L. Reynolds: A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head. Computers & Security 26(7-8): 468-478 (2007)
41EENathan L. Clarke, Steven Furnell: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Sec. 6(1): 1-14 (2007)
40EEJörg Preuß, Steven Furnell, Maria Papadaki: Considering the potential of criminal profiling to combat hacking. Journal in Computer Virology 3(2): 135-141 (2007)
2006
39 Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings Springer 2006
38EEShukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke: A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. ISI 2006: 590-595
37EESteven Furnell, Adila Jusoh, Dimitris Katsabas, Paul Dowland: Considering the Usability of End-User Security Software. SEC 2006: 307-316
36EESteven Furnell, Adila Jusoh, Dimitris Katsabas: The challenges of understanding and using security: A survey of end-users. Computers & Security 25(1): 27-35 (2006)
35EEHazel Lacohée, Andrew D. Phippen, Steven Furnell: Risk and restitution: Assessing how users establish online trust. Computers & Security 25(7): 486-493 (2006)
2005
34 Shukor A. Razak, Steven Furnell, Phillip J. Brooke: A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks. ECIW 2005: 271-280
33EESteven Furnell: Why users cannot use security. Computers & Security 24(4): 274-279 (2005)
32EEG. Magklaras, Steven Furnell: A preliminary model of end user sophistication for insider threat prediction in IT systems. Computers & Security 24(5): 371-380 (2005)
31EENathan L. Clarke, Steven Furnell: Authentication of users on mobile telephones - A survey of attitudes and practices. Computers & Security 24(7): 519-527 (2005)
2004
30 Vassilis Dimopoulos, Steven Furnell, Murray Jennex, Ioannis Kritharas: Approaches to IT Security in Small and Medium Enterprises. AISM 2004: 73-82
29 Aung Htike Phyo, Steven Furnell, Francisco Portilla: A Framework For Role-based Monitoring of Insider Misuse. International Information Security Workshops 2004: 51-66
28 Paul Dowland, Steven Furnell: A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. SEC 2004: 275-290
27EESteven Furnell, I. Papadopoulos, Paul Dowland: A long-term trial of alternative user authentication technologies. Inf. Manag. Comput. Security 12(2): 178-190 (2004)
2003
26EEMaria Papadaki, Steven Furnell, Benn Lines, Paul L. Reynolds: Operational Characteristics of an Automated Intrusion Response System. Communications and Multimedia Security 2003: 65-75
25EESteven Furnell: Cybercrime: Vandalizing the Information Society. ICWE 2003: 8-16
24 Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds: Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. SEC 2003: 97-108
23 Steven Furnell, Alastair G. Warren, Paul Dowland: Improving Security Awareness Through Computer-based Training. World Conference on Information Security Education 2003: 287-301
22EENathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds: Keystroke dynamics on a mobile handset: a feasibility study. Inf. Manag. Comput. Security 11(4): 161-166 (2003)
2002
21 A. Alayed, Steven Furnell, I. M. Barlow: Addressing Internet Security Vulnerabilities: A Benchmarking Study. SEC 2002: 121-132
20 Paul Dowland, Steven Furnell, Maria Papadaki: Keystroke Analysis as a Method of Advanced User Authentication and Response. SEC 2002: 215-226
19EEMichael P. Evans, Steven Furnell: A web-based resource migration protocol using WebDAV. WWW 2002: 263-271
18 G. Magklaras, Steven Furnell: Insider Threat Prediction Tool: Evaluating the probability of IT misuse. Computers & Security 21(1): 62-73 (2002)
17 Nathan L. Clarke, Steven Furnell, P. M. Rodwell, Paul L. Reynolds: Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. Computers & Security 21(3): 220-228 (2002)
16EEI. Irakleous, Steven Furnell, Paul Dowland, Maria Papadaki: An experimental comparison of secret-based user authentication technologies. Inf. Manag. Comput. Security 10(3): 100-108 (2002)
15EESteven Furnell: Cybercrime - vandalizing the information society (Review). Inf. Manag. Comput. Security 10(4): 196 (2002)
14EESteven Furnell: Cybercrime: vandalizing the information society. Inf. Res. 7(3): (2002)
2001
13 Steven Furnell, Maria Papadaki, G. Magklaras, A. Alayed: Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks. Conference on Information Security Management & Small Systems Security 2001: 87-98
12EEHarjit Singh, Steven Furnell, Benn Lines, Paul Dowland: Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. MMM-ACNS 2001: 153-158
11EEMichael P. Evans, Steven Furnell: The Resource Locator Service: fixing a flaw in the web. Computer Networks 37(3/4): 307-330 (2001)
10EESteven Furnell, Pelagia Chiliarchaki, Paul Dowland: Security analysers: administrator assistants or hacker helpers? Inf. Manag. Comput. Security 9(2): 93-101 (2001)
2000
9 Steven Furnell, Paul Dowland, H. M. Illingworth, Paul L. Reynolds: Authentication and Supervision: A Survey of User Attitudes. Computers & Security 19(6): 529-539 (2000)
8EESteven Furnell, Paul Dowland: A conceptual architecture for real-time intrusion monitoring. Inf. Manag. Comput. Security 8(2): 65-75 (2000)
1999
7EESteven Furnell, Matthew J. Warren: Computer hacking and cyber terrorism: the real threats in the new millennium? Computers & Security 18(1): 28-34 (1999)
6EEPaul Dowland, Steven Furnell, H. M. Illingworth, Paul L. Reynolds: Computer crime and abuse: A survey of public attitudes and awareness. Computers & Security 18(8): 715-726 (1999)
5EESteven Furnell, Paul Dowland, Peter W. Sanders: Dissecting the "Hacker Manifesto". Inf. Manag. Comput. Security 7(2): 69-75 (1999)
1997
4 Michael P. Evans, Kimmo T. Kettunen, Grahame K. Blackwell, Steven Furnell, Andrew D. Phippen, Stephen Hope, Paul L. Reynolds: Network Resource Adaptation in the DOLMEN Service Machine. IS&N 1997: 25-34
3 Matthew J. Warren, Steven Furnell, Peter W. Sanders: ODESSA - a new approach to healthcare risk analysis. SEC 1997: 391-402
1996
2 Steven Furnell, Nichola Jane Salmons, Peter W. Sanders, Colin T. Stockel, Matthew J. Warren: Approaches to Security in Healthcare Multimedia Systems. Communications and Multimedia Security 1996: 25-36
1 Steven Furnell, Joseph P. Morrissey, Peter W. Sanders, Colin T. Stockel: Applications of keystroke analysis for improved login security and continuous user authentication. SEC 1996: 283-294

Coauthor Index

1A. Alayed [13] [21]
2I. M. Barlow [21]
3Grahame K. Blackwell [4]
4Udo Bleimann [48] [50]
5Phillip J. Brooke [34] [38] [51] [53]
6P. Bryant [45]
7Pelagia Chiliarchaki [10]
8Nathan L. Clarke [17] [22] [24] [31] [38] [41] [46] [51] [53] [54] [55]
9Vassilis Dimopoulos [30]
10Paul Dowland [5] [6] [8] [9] [10] [12] [16] [20] [23] [27] [28] [37] [49]
11Michael P. Evans [4] [11] [19]
12Klaus-Peter Fischer [48] [50]
13Simone Fischer-Hübner [39]
14Woldemar F. Fuhrmann [50]
15Stephen Hope [4]
16H. M. Illingworth [6] [9]
17I. Irakleous [16]
18Murray E. Jennex (Murray Jennex) [30]
19Adila Jusoh [36] [37]
20Dimitris Katsabas [36] [37] [49]
21Sokratis K. Katsikas [56]
22Kimmo T. Kettunen [4]
23Ioannis Kritharas [30]
24Hazel Lacohée [35]
25Costas Lambrinoudakis [39]
26Benn Lines [12] [22] [24] [26]
27Antonio Lioy [56]
28G. Magklaras [13] [18] [32]
29Joseph P. Morrissey [1]
30Maria Papadaki [13] [16] [20] [26] [40] [54] [55]
31I. Papadopoulos [27]
32Andrew D. Phippen [4] [35] [45] [52]
33Aung Htike Phyo [29]
34Francisco Portilla [29]
35Jörg Preuß [40]
36Shukor A. Razak [34] [38] [51] [53]
37Fraser Reid [49]
38Paul L. Reynolds [4] [6] [9] [17] [22] [24] [26] [42]
39P. M. Rodwell [17] [42]
40Nichola Jane Salmons [2]
41Peter W. Sanders [1] [2] [3] [5]
42Harjit Singh [12]
43Colin T. Stockel [1] [2]
44Gina C. Tjhai [54] [55]
45Valleria Tsaganidi [52]
46Alastair G. Warren [23]
47Matthew J. Warren [2] [3] [7]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)