2008 |
7 | EE | Gina C. Tjhai,
Maria Papadaki,
Steven Furnell,
Nathan L. Clarke:
Investigating the problem of IDS false alarms: An experimental study using Snort.
SEC 2008: 253-267 |
6 | EE | Gina C. Tjhai,
Maria Papadaki,
Steven Furnell,
Nathan L. Clarke:
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset.
TrustBus 2008: 139-150 |
2007 |
5 | EE | Jörg Preuß,
Steven Furnell,
Maria Papadaki:
Considering the potential of criminal profiling to combat hacking.
Journal in Computer Virology 3(2): 135-141 (2007) |
2003 |
4 | EE | Maria Papadaki,
Steven Furnell,
Benn Lines,
Paul L. Reynolds:
Operational Characteristics of an Automated Intrusion Response System.
Communications and Multimedia Security 2003: 65-75 |
2002 |
3 | | Paul Dowland,
Steven Furnell,
Maria Papadaki:
Keystroke Analysis as a Method of Advanced User Authentication and Response.
SEC 2002: 215-226 |
2 | EE | I. Irakleous,
Steven Furnell,
Paul Dowland,
Maria Papadaki:
An experimental comparison of secret-based user authentication technologies.
Inf. Manag. Comput. Security 10(3): 100-108 (2002) |
2001 |
1 | | Steven Furnell,
Maria Papadaki,
G. Magklaras,
A. Alayed:
Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks.
Conference on Information Security Management & Small Systems Security 2001: 87-98 |