1999 |
7 | EE | Steven Furnell,
Paul Dowland,
Peter W. Sanders:
Dissecting the "Hacker Manifesto".
Inf. Manag. Comput. Security 7(2): 69-75 (1999) |
1997 |
6 | | Matthew J. Warren,
Steven Furnell,
Peter W. Sanders:
ODESSA - a new approach to healthcare risk analysis.
SEC 1997: 391-402 |
5 | EE | G. P. Ray,
Peter W. Sanders,
Colin T. Stockel:
Fast heuristics for practical TDM network design.
Computer Communications 20(7): 521-527 (1997) |
1996 |
4 | | Steven Furnell,
Nichola Jane Salmons,
Peter W. Sanders,
Colin T. Stockel,
Matthew J. Warren:
Approaches to Security in Healthcare Multimedia Systems.
Communications and Multimedia Security 1996: 25-36 |
3 | | Steven Furnell,
Joseph P. Morrissey,
Peter W. Sanders,
Colin T. Stockel:
Applications of keystroke analysis for improved login security and continuous user authentication.
SEC 1996: 283-294 |
2 | EE | G. P. Ray,
Peter W. Sanders,
Colin T. Stockel:
New technique for the representation of access network performance.
Computer Communications 19(6-7): 564-570 (1996) |
1983 |
1 | EE | Peter W. Sanders,
V. Varadharajan:
Secure communications between microcomputer systems.
Computer Communications 6(5): 245-252 (1983) |