The SCEAS System
Navigation Menu

Search the dblp DataBase


Paul Dowland: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Steven Furnell, Alastair G. Warren, Paul Dowland
    Improving Security Awareness Through Computer-based Training. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:287-301 [Conf]
  2. Harjit Singh, Steven Furnell, Benn Lines, Paul Dowland
    Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:153-158 [Conf]
  3. Paul Dowland, Steven Furnell
    A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:275-290 [Conf]
  4. Paul Dowland, Steven Furnell, Maria Papadaki
    Keystroke Analysis as a Method of Advanced User Authentication and Response. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:215-226 [Conf]
  5. Steven Furnell, Adila Jusoh, Dimitris Katsabas, Paul Dowland
    Considering the Usability of End-User Security Software. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:307-316 [Conf]
  6. Paul Dowland, Steven Furnell, H. M. Illingworth, Paul L. Reynolds
    Computer crime and abuse: A survey of public attitudes and awareness. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:8, pp:715-726 [Journal]
  7. Steven Furnell, Paul Dowland, H. M. Illingworth, Paul L. Reynolds
    Authentication and Supervision: A Survey of User Attitudes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:529-539 [Journal]
  8. Steven Furnell, Pelagia Chiliarchaki, Paul Dowland
    Security analysers: administrator assistants or hacker helpers? [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:93-101 [Journal]
  9. Steven Furnell, Paul Dowland
    A conceptual architecture for real-time intrusion monitoring. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:2, pp:65-75 [Journal]
  10. Steven Furnell, Paul Dowland, Peter W. Sanders
    Dissecting the "Hacker Manifesto". [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1999, v:7, n:2, pp:69-75 [Journal]
  11. Steven Furnell, I. Papadopoulos, Paul Dowland
    A long-term trial of alternative user authentication technologies. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2004, v:12, n:2, pp:178-190 [Journal]
  12. I. Irakleous, Steven Furnell, Paul Dowland, Maria Papadaki
    An experimental comparison of secret-based user authentication technologies. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2002, v:10, n:3, pp:100-108 [Journal]

  13. A Practical Usability Evaluation of Security Features in End-User Applications. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002