The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Steven Furnell: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Vassilis Dimopoulos, Steven Furnell, Murray Jennex, Ioannis Kritharas
    Approaches to IT Security in Small and Medium Enterprises. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:73-82 [Conf]
  2. Maria Papadaki, Steven Furnell, Benn Lines, Paul L. Reynolds
    Operational Characteristics of an Automated Intrusion Response System. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:65-75 [Conf]
  3. Steven Furnell, Nichola Jane Salmons, Peter W. Sanders, Colin T. Stockel, Matthew J. Warren
    Approaches to Security in Healthcare Multimedia Systems. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:25-36 [Conf]
  4. Shukor A. Razak, Steven Furnell, Phillip J. Brooke
    A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:271-280 [Conf]
  5. Steven Furnell
    Cybercrime: Vandalizing the Information Society. [Citation Graph (0, 0)][DBLP]
    ICWE, 2003, pp:8-16 [Conf]
  6. Steven Furnell, Maria Papadaki, G. Magklaras, A. Alayed
    Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:87-98 [Conf]
  7. Steven Furnell, Alastair G. Warren, Paul Dowland
    Improving Security Awareness Through Computer-based Training. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:287-301 [Conf]
  8. Aung Htike Phyo, Steven Furnell, Francisco Portilla
    A Framework For Role-based Monitoring of Insider Misuse. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:51-66 [Conf]
  9. Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke
    A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:590-595 [Conf]
  10. Michael P. Evans, Kimmo T. Kettunen, Grahame K. Blackwell, Steven Furnell, Andrew D. Phippen, Stephen Hope, Paul L. Reynolds
    Network Resource Adaptation in the DOLMEN Service Machine. [Citation Graph (0, 0)][DBLP]
    IS&N, 1997, pp:25-34 [Conf]
  11. Harjit Singh, Steven Furnell, Benn Lines, Paul Dowland
    Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:153-158 [Conf]
  12. Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds
    Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:97-108 [Conf]
  13. A. Alayed, Steven Furnell, I. M. Barlow
    Addressing Internet Security Vulnerabilities: A Benchmarking Study. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:121-132 [Conf]
  14. Paul Dowland, Steven Furnell
    A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:275-290 [Conf]
  15. Paul Dowland, Steven Furnell, Maria Papadaki
    Keystroke Analysis as a Method of Advanced User Authentication and Response. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:215-226 [Conf]
  16. Steven Furnell, Adila Jusoh, Dimitris Katsabas, Paul Dowland
    Considering the Usability of End-User Security Software. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:307-316 [Conf]
  17. Steven Furnell, Joseph P. Morrissey, Peter W. Sanders, Colin T. Stockel
    Applications of keystroke analysis for improved login security and continuous user authentication. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:283-294 [Conf]
  18. Matthew J. Warren, Steven Furnell, Peter W. Sanders
    ODESSA - a new approach to healthcare risk analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:391-402 [Conf]
  19. Michael P. Evans, Steven Furnell
    A web-based resource migration protocol using WebDAV. [Citation Graph (0, 0)][DBLP]
    WWW, 2002, pp:263-271 [Conf]
  20. Michael P. Evans, Steven Furnell
    The Resource Locator Service: fixing a flaw in the web. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:37, n:3/4, pp:307-330 [Journal]
  21. Nathan L. Clarke, Steven Furnell
    Authentication of users on mobile telephones - A survey of attitudes and practices. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:7, pp:519-527 [Journal]
  22. Nathan L. Clarke, Steven Furnell, P. M. Rodwell, Paul L. Reynolds
    Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:3, pp:220-228 [Journal]
  23. Paul Dowland, Steven Furnell, H. M. Illingworth, Paul L. Reynolds
    Computer crime and abuse: A survey of public attitudes and awareness. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:8, pp:715-726 [Journal]
  24. Steven Furnell
    Why users cannot use security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:4, pp:274-279 [Journal]
  25. Steven Furnell, Paul Dowland, H. M. Illingworth, Paul L. Reynolds
    Authentication and Supervision: A Survey of User Attitudes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:529-539 [Journal]
  26. Steven Furnell, Adila Jusoh, Dimitris Katsabas
    The challenges of understanding and using security: A survey of end-users. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:1, pp:27-35 [Journal]
  27. Steven Furnell, Matthew J. Warren
    Computer hacking and cyber terrorism: the real threats in the new millennium? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:1, pp:28-34 [Journal]
  28. G. Magklaras, Steven Furnell
    Insider Threat Prediction Tool: Evaluating the probability of IT misuse. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:1, pp:62-73 [Journal]
  29. G. Magklaras, Steven Furnell
    A preliminary model of end user sophistication for insider threat prediction in IT systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:5, pp:371-380 [Journal]
  30. Hazel Lacohée, Andrew D. Phippen, Steven Furnell
    Risk and restitution: Assessing how users establish online trust. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:7, pp:486-493 [Journal]
  31. Nathan L. Clarke, Steven Furnell
    Advanced user authentication for mobile devices. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2007, v:26, n:2, pp:109-119 [Journal]
  32. Steven Furnell
    IFIP workshop - Information security culture. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2007, v:26, n:1, pp:35- [Journal]
  33. Nathan L. Clarke, Steven Furnell
    Authenticating mobile phone users using keystroke analysis. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:1, pp:1-14 [Journal]
  34. Steven Furnell
    Cybercrime - vandalizing the information society (Review). [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2002, v:10, n:4, pp:196- [Journal]
  35. Steven Furnell, Pelagia Chiliarchaki, Paul Dowland
    Security analysers: administrator assistants or hacker helpers? [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:93-101 [Journal]
  36. Steven Furnell, Paul Dowland
    A conceptual architecture for real-time intrusion monitoring. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:2, pp:65-75 [Journal]
  37. Steven Furnell, Paul Dowland, Peter W. Sanders
    Dissecting the "Hacker Manifesto". [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1999, v:7, n:2, pp:69-75 [Journal]
  38. Steven Furnell, I. Papadopoulos, Paul Dowland
    A long-term trial of alternative user authentication technologies. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2004, v:12, n:2, pp:178-190 [Journal]
  39. Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds
    Keystroke dynamics on a mobile handset: a feasibility study. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2003, v:11, n:4, pp:161-166 [Journal]
  40. I. Irakleous, Steven Furnell, Paul Dowland, Maria Papadaki
    An experimental comparison of secret-based user authentication technologies. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2002, v:10, n:3, pp:100-108 [Journal]
  41. Steven Furnell
    Cybercrime: vandalizing the information society. [Citation Graph (0, 0)][DBLP]
    Inf. Res., 2002, v:7, n:3, pp:- [Journal]
  42. Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke
    Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2007, pp:129-141 [Conf]
  43. Klaus-Peter Fischer, Udo Bleimann, Steven Furnell
    Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:178-189 [Conf]
  44. Jörg Preuß, Steven Furnell, Maria Papadaki
    Considering the potential of criminal profiling to combat hacking. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:135-141 [Journal]

  45. An Analysis of Information Security Awareness within Home and Work Environments. [Citation Graph (, )][DBLP]


  46. Security Policy Enforcement in BPEL-Defined Collaborative Business Processes. [Citation Graph (, )][DBLP]


  47. A Practical Usability Evaluation of Security Features in End-User Applications. [Citation Graph (, )][DBLP]


  48. Investigating the problem of IDS false alarms: An experimental study using Snort. [Citation Graph (, )][DBLP]


  49. Flexible and Transparent User Authentication for Mobile Devices. [Citation Graph (, )][DBLP]


  50. The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. [Citation Graph (, )][DBLP]


  51. Assessing the Usability of End-User Security Software. [Citation Graph (, )][DBLP]


  52. Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  53. Making security usable: Are things improving? [Citation Graph (, )][DBLP]


  54. An assessment of website password practices. [Citation Graph (, )][DBLP]


  55. Assessing the security perceptions of personal Internet users. [Citation Graph (, )][DBLP]


  56. A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head. [Citation Graph (, )][DBLP]


  57. Security beliefs and barriers for novice Internet users. [Citation Graph (, )][DBLP]


  58. Editorial. [Citation Graph (, )][DBLP]


  59. From desktop to mobile: Examining the security experience. [Citation Graph (, )][DBLP]


  60. A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. [Citation Graph (, )][DBLP]


Search in 0.158secs, Finished in 0.160secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002