The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nathan L. Clarke: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke
    A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:590-595 [Conf]
  2. Tim Moors, Nathan L. Clarke, Guven Mercankosk
    Implementing Traffic Shaping. [Citation Graph (0, 0)][DBLP]
    LCN, 1994, pp:307-314 [Conf]
  3. Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds
    Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:97-108 [Conf]
  4. Nathan L. Clarke, Steven Furnell
    Authentication of users on mobile telephones - A survey of attitudes and practices. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:7, pp:519-527 [Journal]
  5. Nathan L. Clarke, Steven Furnell, P. M. Rodwell, Paul L. Reynolds
    Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:3, pp:220-228 [Journal]
  6. Nathan L. Clarke, Steven Furnell
    Advanced user authentication for mobile devices. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2007, v:26, n:2, pp:109-119 [Journal]
  7. Nathan L. Clarke, Steven Furnell
    Authenticating mobile phone users using keystroke analysis. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:1, pp:1-14 [Journal]
  8. Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds
    Keystroke dynamics on a mobile handset: a feasibility study. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2003, v:11, n:4, pp:161-166 [Journal]
  9. Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke
    Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2007, pp:129-141 [Conf]

  10. An Analysis of Information Security Awareness within Home and Work Environments. [Citation Graph (, )][DBLP]


  11. Investigating the problem of IDS false alarms: An experimental study using Snort. [Citation Graph (, )][DBLP]


  12. Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. [Citation Graph (, )][DBLP]


  13. Flexible and Transparent User Authentication for Mobile Devices. [Citation Graph (, )][DBLP]


  14. The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. [Citation Graph (, )][DBLP]


  15. Assessing the Usability of End-User Security Software. [Citation Graph (, )][DBLP]


  16. Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  17. From desktop to mobile: Examining the security experience. [Citation Graph (, )][DBLP]


  18. A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002