Search the dblp DataBase
Steven Furnell :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Vassilis Dimopoulos , Steven Furnell , Murray Jennex , Ioannis Kritharas Approaches to IT Security in Small and Medium Enterprises. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:73-82 [Conf ] Maria Papadaki , Steven Furnell , Benn Lines , Paul L. Reynolds Operational Characteristics of an Automated Intrusion Response System. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:65-75 [Conf ] Steven Furnell , Nichola Jane Salmons , Peter W. Sanders , Colin T. Stockel , Matthew J. Warren Approaches to Security in Healthcare Multimedia Systems. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1996, pp:25-36 [Conf ] Shukor A. Razak , Steven Furnell , Phillip J. Brooke A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:271-280 [Conf ] Steven Furnell Cybercrime: Vandalizing the Information Society. [Citation Graph (0, 0)][DBLP ] ICWE, 2003, pp:8-16 [Conf ] Steven Furnell , Maria Papadaki , G. Magklaras , A. Alayed Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks. [Citation Graph (0, 0)][DBLP ] Conference on Information Security Management & Small Systems Security, 2001, pp:87-98 [Conf ] Steven Furnell , Alastair G. Warren , Paul Dowland Improving Security Awareness Through Computer-based Training. [Citation Graph (0, 0)][DBLP ] World Conference on Information Security Education, 2003, pp:287-301 [Conf ] Aung Htike Phyo , Steven Furnell , Francisco Portilla A Framework For Role-based Monitoring of Insider Misuse. [Citation Graph (0, 0)][DBLP ] International Information Security Workshops, 2004, pp:51-66 [Conf ] Shukor A. Razak , Steven Furnell , Nathan L. Clarke , Phillip J. Brooke A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:590-595 [Conf ] Michael P. Evans , Kimmo T. Kettunen , Grahame K. Blackwell , Steven Furnell , Andrew D. Phippen , Stephen Hope , Paul L. Reynolds Network Resource Adaptation in the DOLMEN Service Machine. [Citation Graph (0, 0)][DBLP ] IS&N, 1997, pp:25-34 [Conf ] Harjit Singh , Steven Furnell , Benn Lines , Paul Dowland Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:153-158 [Conf ] Nathan L. Clarke , Steven Furnell , Benn Lines , Paul L. Reynolds Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. [Citation Graph (0, 0)][DBLP ] SEC, 2003, pp:97-108 [Conf ] A. Alayed , Steven Furnell , I. M. Barlow Addressing Internet Security Vulnerabilities: A Benchmarking Study. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:121-132 [Conf ] Paul Dowland , Steven Furnell A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. [Citation Graph (0, 0)][DBLP ] SEC, 2004, pp:275-290 [Conf ] Paul Dowland , Steven Furnell , Maria Papadaki Keystroke Analysis as a Method of Advanced User Authentication and Response. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:215-226 [Conf ] Steven Furnell , Adila Jusoh , Dimitris Katsabas , Paul Dowland Considering the Usability of End-User Security Software. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:307-316 [Conf ] Steven Furnell , Joseph P. Morrissey , Peter W. Sanders , Colin T. Stockel Applications of keystroke analysis for improved login security and continuous user authentication. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:283-294 [Conf ] Matthew J. Warren , Steven Furnell , Peter W. Sanders ODESSA - a new approach to healthcare risk analysis. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:391-402 [Conf ] Michael P. Evans , Steven Furnell A web-based resource migration protocol using WebDAV. [Citation Graph (0, 0)][DBLP ] WWW, 2002, pp:263-271 [Conf ] Michael P. Evans , Steven Furnell The Resource Locator Service: fixing a flaw in the web. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2001, v:37, n:3/4, pp:307-330 [Journal ] Nathan L. Clarke , Steven Furnell Authentication of users on mobile telephones - A survey of attitudes and practices. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:7, pp:519-527 [Journal ] Nathan L. Clarke , Steven Furnell , P. M. Rodwell , Paul L. Reynolds Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:3, pp:220-228 [Journal ] Paul Dowland , Steven Furnell , H. M. Illingworth , Paul L. Reynolds Computer crime and abuse: A survey of public attitudes and awareness. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:8, pp:715-726 [Journal ] Steven Furnell Why users cannot use security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:274-279 [Journal ] Steven Furnell , Paul Dowland , H. M. Illingworth , Paul L. Reynolds Authentication and Supervision: A Survey of User Attitudes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:6, pp:529-539 [Journal ] Steven Furnell , Adila Jusoh , Dimitris Katsabas The challenges of understanding and using security: A survey of end-users. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:1, pp:27-35 [Journal ] Steven Furnell , Matthew J. Warren Computer hacking and cyber terrorism: the real threats in the new millennium? [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:1, pp:28-34 [Journal ] G. Magklaras , Steven Furnell Insider Threat Prediction Tool: Evaluating the probability of IT misuse. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:1, pp:62-73 [Journal ] G. Magklaras , Steven Furnell A preliminary model of end user sophistication for insider threat prediction in IT systems. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:5, pp:371-380 [Journal ] Hazel Lacohée , Andrew D. Phippen , Steven Furnell Risk and restitution: Assessing how users establish online trust. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:7, pp:486-493 [Journal ] Nathan L. Clarke , Steven Furnell Advanced user authentication for mobile devices. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:2, pp:109-119 [Journal ] Steven Furnell IFIP workshop - Information security culture. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2007, v:26, n:1, pp:35- [Journal ] Nathan L. Clarke , Steven Furnell Authenticating mobile phone users using keystroke analysis. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2007, v:6, n:1, pp:1-14 [Journal ] Steven Furnell Cybercrime - vandalizing the information society (Review). [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:4, pp:196- [Journal ] Steven Furnell , Pelagia Chiliarchaki , Paul Dowland Security analysers: administrator assistants or hacker helpers? [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:93-101 [Journal ] Steven Furnell , Paul Dowland A conceptual architecture for real-time intrusion monitoring. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2000, v:8, n:2, pp:65-75 [Journal ] Steven Furnell , Paul Dowland , Peter W. Sanders Dissecting the "Hacker Manifesto". [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1999, v:7, n:2, pp:69-75 [Journal ] Steven Furnell , I. Papadopoulos , Paul Dowland A long-term trial of alternative user authentication technologies. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2004, v:12, n:2, pp:178-190 [Journal ] Nathan L. Clarke , Steven Furnell , Benn Lines , Paul L. Reynolds Keystroke dynamics on a mobile handset: a feasibility study. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2003, v:11, n:4, pp:161-166 [Journal ] I. Irakleous , Steven Furnell , Paul Dowland , Maria Papadaki An experimental comparison of secret-based user authentication technologies. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:3, pp:100-108 [Journal ] Steven Furnell Cybercrime: vandalizing the information society. [Citation Graph (0, 0)][DBLP ] Inf. Res., 2002, v:7, n:3, pp:- [Journal ] Shukor A. Razak , Steven Furnell , Nathan L. Clarke , Phillip J. Brooke Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. [Citation Graph (0, 0)][DBLP ] ADHOC-NOW, 2007, pp:129-141 [Conf ] Klaus-Peter Fischer , Udo Bleimann , Steven Furnell Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes. [Citation Graph (0, 0)][DBLP ] TrustBus, 2007, pp:178-189 [Conf ] Jörg Preuß , Steven Furnell , Maria Papadaki Considering the potential of criminal profiling to combat hacking. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2007, v:3, n:2, pp:135-141 [Journal ] An Analysis of Information Security Awareness within Home and Work Environments. [Citation Graph (, )][DBLP ] Security Policy Enforcement in BPEL-Defined Collaborative Business Processes. [Citation Graph (, )][DBLP ] A Practical Usability Evaluation of Security Features in End-User Applications. [Citation Graph (, )][DBLP ] Investigating the problem of IDS false alarms: An experimental study using Snort. [Citation Graph (, )][DBLP ] Flexible and Transparent User Authentication for Mobile Devices. [Citation Graph (, )][DBLP ] The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. [Citation Graph (, )][DBLP ] Assessing the Usability of End-User Security Software. [Citation Graph (, )][DBLP ] Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. [Citation Graph (, )][DBLP ] Making security usable: Are things improving? [Citation Graph (, )][DBLP ] An assessment of website password practices. [Citation Graph (, )][DBLP ] Assessing the security perceptions of personal Internet users. [Citation Graph (, )][DBLP ] A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head. [Citation Graph (, )][DBLP ] Security beliefs and barriers for novice Internet users. [Citation Graph (, )][DBLP ] Editorial. [Citation Graph (, )][DBLP ] From desktop to mobile: Examining the security experience. [Citation Graph (, )][DBLP ] A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. [Citation Graph (, )][DBLP ] Search in 0.037secs, Finished in 0.042secs