|
Search the dblp DataBase
Paul Dowland:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Steven Furnell, Alastair G. Warren, Paul Dowland
Improving Security Awareness Through Computer-based Training. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2003, pp:287-301 [Conf]
- Harjit Singh, Steven Furnell, Benn Lines, Paul Dowland
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2001, pp:153-158 [Conf]
- Paul Dowland, Steven Furnell
A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. [Citation Graph (0, 0)][DBLP] SEC, 2004, pp:275-290 [Conf]
- Paul Dowland, Steven Furnell, Maria Papadaki
Keystroke Analysis as a Method of Advanced User Authentication and Response. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:215-226 [Conf]
- Steven Furnell, Adila Jusoh, Dimitris Katsabas, Paul Dowland
Considering the Usability of End-User Security Software. [Citation Graph (0, 0)][DBLP] SEC, 2006, pp:307-316 [Conf]
- Paul Dowland, Steven Furnell, H. M. Illingworth, Paul L. Reynolds
Computer crime and abuse: A survey of public attitudes and awareness. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:8, pp:715-726 [Journal]
- Steven Furnell, Paul Dowland, H. M. Illingworth, Paul L. Reynolds
Authentication and Supervision: A Survey of User Attitudes. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:529-539 [Journal]
- Steven Furnell, Pelagia Chiliarchaki, Paul Dowland
Security analysers: administrator assistants or hacker helpers? [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:93-101 [Journal]
- Steven Furnell, Paul Dowland
A conceptual architecture for real-time intrusion monitoring. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2000, v:8, n:2, pp:65-75 [Journal]
- Steven Furnell, Paul Dowland, Peter W. Sanders
Dissecting the "Hacker Manifesto". [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1999, v:7, n:2, pp:69-75 [Journal]
- Steven Furnell, I. Papadopoulos, Paul Dowland
A long-term trial of alternative user authentication technologies. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2004, v:12, n:2, pp:178-190 [Journal]
- I. Irakleous, Steven Furnell, Paul Dowland, Maria Papadaki
An experimental comparison of secret-based user authentication technologies. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2002, v:10, n:3, pp:100-108 [Journal]
A Practical Usability Evaluation of Security Features in End-User Applications. [Citation Graph (, )][DBLP]
Search in 0.037secs, Finished in 0.038secs
|