|
Search the dblp DataBase
Nathan L. Clarke:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. [Citation Graph (0, 0)][DBLP] ISI, 2006, pp:590-595 [Conf]
- Tim Moors, Nathan L. Clarke, Guven Mercankosk
Implementing Traffic Shaping. [Citation Graph (0, 0)][DBLP] LCN, 1994, pp:307-314 [Conf]
- Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:97-108 [Conf]
- Nathan L. Clarke, Steven Furnell
Authentication of users on mobile telephones - A survey of attitudes and practices. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:7, pp:519-527 [Journal]
- Nathan L. Clarke, Steven Furnell, P. M. Rodwell, Paul L. Reynolds
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. [Citation Graph (0, 0)][DBLP] Computers & Security, 2002, v:21, n:3, pp:220-228 [Journal]
- Nathan L. Clarke, Steven Furnell
Advanced user authentication for mobile devices. [Citation Graph (0, 0)][DBLP] Computers & Security, 2007, v:26, n:2, pp:109-119 [Journal]
- Nathan L. Clarke, Steven Furnell
Authenticating mobile phone users using keystroke analysis. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:1, pp:1-14 [Journal]
- Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds
Keystroke dynamics on a mobile handset: a feasibility study. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2003, v:11, n:4, pp:161-166 [Journal]
- Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke
Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. [Citation Graph (0, 0)][DBLP] ADHOC-NOW, 2007, pp:129-141 [Conf]
An Analysis of Information Security Awareness within Home and Work Environments. [Citation Graph (, )][DBLP]
Investigating the problem of IDS false alarms: An experimental study using Snort. [Citation Graph (, )][DBLP]
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. [Citation Graph (, )][DBLP]
Flexible and Transparent User Authentication for Mobile Devices. [Citation Graph (, )][DBLP]
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. [Citation Graph (, )][DBLP]
Assessing the Usability of End-User Security Software. [Citation Graph (, )][DBLP]
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. [Citation Graph (, )][DBLP]
From desktop to mobile: Examining the security experience. [Citation Graph (, )][DBLP]
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. [Citation Graph (, )][DBLP]
Search in 0.094secs, Finished in 0.096secs
|