| 2008 |
| 7 | EE | Gina C. Tjhai,
Maria Papadaki,
Steven Furnell,
Nathan L. Clarke:
Investigating the problem of IDS false alarms: An experimental study using Snort.
SEC 2008: 253-267 |
| 6 | EE | Gina C. Tjhai,
Maria Papadaki,
Steven Furnell,
Nathan L. Clarke:
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset.
TrustBus 2008: 139-150 |
| 2007 |
| 5 | EE | Jörg Preuß,
Steven Furnell,
Maria Papadaki:
Considering the potential of criminal profiling to combat hacking.
Journal in Computer Virology 3(2): 135-141 (2007) |
| 2003 |
| 4 | EE | Maria Papadaki,
Steven Furnell,
Benn Lines,
Paul L. Reynolds:
Operational Characteristics of an Automated Intrusion Response System.
Communications and Multimedia Security 2003: 65-75 |
| 2002 |
| 3 | | Paul Dowland,
Steven Furnell,
Maria Papadaki:
Keystroke Analysis as a Method of Advanced User Authentication and Response.
SEC 2002: 215-226 |
| 2 | EE | I. Irakleous,
Steven Furnell,
Paul Dowland,
Maria Papadaki:
An experimental comparison of secret-based user authentication technologies.
Inf. Manag. Comput. Security 10(3): 100-108 (2002) |
| 2001 |
| 1 | | Steven Furnell,
Maria Papadaki,
G. Magklaras,
A. Alayed:
Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks.
Conference on Information Security Management & Small Systems Security 2001: 87-98 |