Skip to main contentSkip to contextural navigationSkip to main navigationIf you are having problems using this page with a screen reader follow this link for a more compatible version
University of Plymouth home page
home |  Help |  contact us |  sitemap |  search  University Logo

Nathan Clarke

 

Personal photograph uploaded by Nathan Clarke

Nathan Clarke

  • Job title: Associate Professor (Senior Lecturer) in Information Security & Digital Forensic,
  • Telephone: +441752586218
  • Email: N.Clarke@plymouth.ac.uk


Qualifications & background
2004-2005 PGCert Learning & Teaching in Higher Education
2001-2004 PhD, "Advanced User Authentication for Mobile Devices"
1996-2001 BEng (Hons) Electronic Engineering (1st Class)

2010 IEEE Certified Biometrics Professional
2010 AccessData Certified Examiner (ACE)
2013 Fellow of the Higher Education Academy 

Professional membership
Chartered Engineer (CEng), July 2006
Fellow of the British Computing Society (FBCS), April 2010
Senior Member of the Institute for Electrical and Electronic Engineering (IEEE)

Journal Editorships:


Editorial Board Member, Computers & Security, Elsevier
Associate Editor, Security & Communication Networks, John Wiley

Associate Editor, Communications and Computer Security, ACTA Press

Editorial Board Member, The Scientific World Journal (Communications & Networking), Hindawi Publishing

Editorial Board Member, Mobile Computing, World Academic Publishing


Referring for Journals:

Referee, International Journal of Pattern Recognition and Artificial Intelligence, World Scientific.
Referee, International Journal of Interdisciplinary Telecommunications & Networking, IGI Global
Referee, Information Security Technical Report, Elsevier
Referee, EURASIP Journal on Advances in Signal Processing, Springer

Referee, Journal on Personal and Ubiquitous Computing: Special Issue: Security and Trust in Context-Aware Systems, Springer

Referee, International Journal of Electronic Governance (IJEG), Inderscience
Referee, IET Information Security, IET
Referee, KSII Transactions on Internet and Information Systems
Guest Editor, Information Management & Computer Security, Vol. 18, No. 5, 2010
Associate Editor, Communications and Computer Security, ACTA Press
Referee, Computer Standards and Interfaces, Elsevier
Referee, Journal of Mobile Networks & Applications, Springer
Guest Editor, Information Management & Computer Security, Vol. 18, No. 1, 2010
Referee, IEEE Journal on Selected Areas in Communications Special Issue on Advances in Digital Forensics for Communications and Networking
Referee, International Journal of Information Technologies and Systems Approach, IGI Global
Referee, International Journal of Computer Science and Security, Computer Science Journals
Referee, Journal of Systems and Software, Elsevier
Referee, IEEE Transactions on Information Forensics & Security, IEEE
Referee, The Computer Journal, Oxford Journals
Guest Editor, Information Management & Computer Security, Vol. 17, No. 1, 2009
Referee, Computers & Security, Elsevier
Referee, Recent Patents in Computer Science, Bentham Science
Referee, IET Signal Processing, IET
Referee, Security & Communication Networks, John Wiley & Sons
Referee, Journal of Network and Computer Applications, Elsevier
Guest Editor, Information Management & Computer Security, Vol. 15, No. 5, 2007
Referee, Information Sciences, Elsevier
Referee, Journal for Information Warfare
 

Roles on external bodies
Adjunct Associate Professor, Edith Cowan University, Western Australia

Chair, IFIP TC11 Working Group 11.12 Human Aspects of Information Security & Assurance
Member, IFIP TC11 Working Group 11.1 on Information Security Management
Member, IFIP TC11 Working Group 11.6 on Identity Management
 


Teaching interests
Module Delivery

CNET115 Computer & Information Security* 
CNET117 Digital Forensics*
CNET335/522 Cybercrime & Forensic Investigation* 

Previous Module Delivery:

SOFT230 Remote Data Access Technology
CNET221 Network Security
CNET232/525 Systems Security* 
COMP212 Software Engineering and High Level Programming
COMP223 High Level Programming
CNET338/538 Security for Mobile Systems*
CNET336/532 Cryptography & Applications*  
CNET520 Applications of Security 
CNET531 Intrusion Prevention, Detection & Response* 

*Developed module 

Staff serving as external examiners
External Examiner for MSc in Cybersecurity and Management, University of Warwick (2012 – Present)
Programme Approval of MComp/BSc (Hons) Computer Security with Forensics, Sheffield Hallam University (April 2011)
Programme Approval of BSc (Hons) Computer Forensics, Liverpool John Moores University (Beckett College) (March 2011)
Programme Approval of MSc Computer Systems and MSc Computer Applications, University of Bedfordshire (June 2010)
Programme Approval of MSc Web Technologies, MSc Media Technology Management and MSc Sound Engineering, Birmingham City University (May 2010)
External Examiner for MSc Computer Applications in Accounting and MSc Computer Systems Auditing, London Metropolitan University (2009 - Present)
Programme Approval of BSc (Hons) Mobile Communications Technology, University of Central England (March 2007)
External Examiner for MSc Computer Forensics & Security, University of Bedfordshire, UK (2007-Present)
Programme Approval of BSc (Hons) Computing & Information Security, Sheffield Halam University (March 2008)

Research Degree Examiner: 


2013 Service Quality and Profit Control in Utility Computing Service Life Cycles, PhD Thesis, Plymouth University (Internal Examiner)
2012 The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice, PhD Thesis, Murdoch University, Australia
2012 Security Usability in IT Systems, MPhil Thesis, Plymouth University (Internal Examiner)

2011 Behavioural Profiling in Mobile Neworks, PhD Thesis, University of Plymouth (Internal Examiner), UK
2010 An Investigation into Remote Transactions, PhD Thesis, Edith Cowan University, Australia
2010 Intrusion Detection Method using a Combination of Neural Network Algorithms, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
2010 Parameter Based Identification, Authentication and Authorisation Method for Mobile Devices, PhD Thesis, City University, London, UK
2010 An Automatic Bank System for Client Credit Rating, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
2009 Smartcard Architecture for Dynamic and Secure Authentication, MSc, University of Pretoria, South Africa 
2008 Models and Methods of Information Security Risks Assessment in the Circumstances of Input Information Ambiguity, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK 
2008 Adoption of Criminal Profiling to Combat Hacking, MPhil Thesis, University of Plymouth, UK - Internal Examiner
2007 Establishing Information Security Culture in Australian Small and Medium Enterprises, PhD Thesis, Deakin University, Australia
2007 A Key Management Framework for Secure Group Communication in Wireless Mobile Environments, PhD Thesis, Royal Holloway, University of London, UK
2006 The Effectiveness of Graphical Authentication: An Exploratory Study, PhD Thesis, Deakin University, Australia
2006 Ontology Modelling for the Information Sharing Process within the Labour Market, MPhil Thesis, Wessex Institute of Technology, UK
2006 Corporate Information Risk: An Information Security Governance Framework, MTech Dissertation, Nelson Mandela Metropolitan University, South Africa.
 


Research interests
Biometric Authentication
Digital Forensics

Information Systems Security
Intrusion Detection Systems
Security Management and Risk Assessment
Security Education and Awareness 

UoP Research group membership

Centre for Security, Communications and Network Research (CSCAN) 

Grants & contracts
EPSRC. Identifying and Responding to Human and Software Behaviours in a Changing Cyber Threat Landscape. 2013: £173,383 (Total Award: £1.0M)
Teaching Fellowship Award – e-Invigilator. Plymouth University. 2012: £8100
EU Framework 7 Grant. Centre of Excellence in Cybercrime and Forensics: 2012: £7800 (Total Award: £800k)
EU Framework 7 Grant. Geryon. 2011: €478K (Total Award: €2.5M)
EU Framework 7 Grant. Space Data Routers. 2010: £220,000 (Total Award: £1.6)
Knowledge Transfer Partnership. Absolute Software Limited. 2010: £183,094
Knowledge Transfer Partnership. K2 Medical Systems. 2008: £115,804.
Teaching Fellowship Award – Peer Assessment. University of Plymouth. 2008: £4900
Knowledge Transfer Partnership. Spinnaker International. 2008: £141,599
Knowledge Transfer Partnership. Westland Geoprojects Limited. 2008: £109,633
DTI Funded project into Behavioural Monitoring of Network Communications. 2007: £40,000
End Point Compliance. Symantec.2007: £7,000
Flexible and non-intrusive user authentication for mobile devices. EduServ Foundation. 2006: £80,390
Knowledge Transfer Partnership. Parker Hannifin 2005: £174,000
Subscriber Authentication via Keystroke Analysis on a mobile handset. Orange Personal Communication Services Limited. 2004. £19,814
Biometric Terminal, Phase 1. Orange Personal Communication Services Limited. 2003: £55,000
PC Integrity Testing. Plymouth Trading Standards. 2003-2004: £1,250
WinCPR Software Development. SAHFOS. 2002: £4,000 


Journals
Articles
Doelitzscher F, Reich C, Knahl M & Clarke N  (2013)  'Understanding Cloud Audits' Privacy and Security for Cloud Computing  pp 125 - 163
Doelitzscher F, Reich C, Knahl M, Passfall A & Clarke N  (2012)  'An agent based business aware incident detection system for cloud environments' Journal of Cloud Computing: Advances, Systems and Applications  1,  pp 9 - 9
Li F  (2012)  'Behaviour Profiling for Mobile Devices'
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N & Gritzalis S  (2012)  'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers' SECURITY AND COMMUNICATION NETWORKS  (1),  pp 3 - 14  Author Site , DOI 
Furnell S & Clarke N  (2012)  'Power to the people? The evolving recognition of human aspects of security' Computers & Security 
Hocking CG, Furnell SM, Clarke NL & Reynolds PL  (2011)  'A preliminary investigation of distributed and cooperative user authentication'
Anuar NB, Furnell S, Papadaki M & Clarke N  (2011)  'A risk index model for security incident prioritisation'
Hocking CG, Furnell SM, Clarke NL & Reynolds PL  (2011)  'Authentication Aura - A distributed approach to user authentication' Journal of Information Assurance and Security  (2),  pp 149 - 156  Publisher Site
Hocking CG, Furnell SM, Clarke NL & Reynolds PL  (2011)  'Authentication Aura - A distributed approach to user authentication' Journal of Information Assurance and Security  (2),  pp 149 - 156  Publisher Site
Talib S, Clarke NL & Furnell SM  (2011)  'Establishing A Personalized Information Security Culture' International Journal of Mobile Computing and Multimedia Communications (IJMCMC)  3,  pp 63 - 79
Chaerani W, Clarke N & Bolan C  (2011)  'Information leakage through second hand USB flash drives within the United Kingdom'
Li F, Clarke N, Papadaki M & Dowland P  (2011)  'Misuse detection for mobile devices using behaviour profiling' International Journal of Cyber Warfare and Terrorism (IJCWT)  1,  pp 41 - 53
Hocking CG, Furnell S, Clarke N & Reynolds PL  (2010)  'A distributed and cooperative user authentication framework'
Tjhai GC, Furnell SM, Papadaki M & Clarke NL  (2010)  'A preliminary two-stage alarm correlation and filtering system using SOM neural network and< i> K</i>-means algorithm' Computers & Security  29,  pp 712 - 723
Anuar NB, Papadaki M, Furnell S & Clarke N  (2010)  'An investigation and survey of response options for Intrusion Response Systems (IRSs)' Information Security for South Africa (ISSA)  2010,  pp 1 - 8
Clarke N & Dowland PS  (2009)  'A CRITICAL EVALUATION OF OPAS (ONLINE PEER ASSESSMENT SYSTEM)' ICERI2009 Proceedings  pp 5124 - 5135
Anuar NB, Furnell SM, Papadaki M & Clarke NL  (2009)  'Response Mechanisms for Intrusion Response Systems (IRSs)'
Li F, Clarke N, Bolan C & Australia W  (2007)  'User Perception of the Security & Privacy Concerns of RFID Technology' Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2007)  pp 156 - 156
Furnell S, Katos V & Clarke N  (2005)  'Considering the role of academic qualifications for IT security professionals'
Clarke N & Furnell S  (2005)  'User authentication for mobile devices: a composite approach'
Razak SA, Samian N, Ma'arof MA, Furnell SM, Clarke NL & Brooke PJ  'A Friend Mechanism for Mobile Ad Hoc Networks' Journal of Information Assurance and Security  (4),  pp 440 - 448
Furnell SM, Clarke NL & Karatzouni S  'Beyond the PIN: Enhancing user authentication for mobile devices' Computer Fraud & Security  2008  (8),  pp 12 - 17
Levy Y, Ramim MM, Furnell SM & Clarke NL  'Comparing intentions to use university-provided vs vendor-provided multibiometric authentication in online exams' Campus-Wide Information Systems  28  (2),  pp 102 - 113
Michalopoulos DS & Clarke NL  'Intrusion Detection System for mobile devices' Advances in Networks, Computing and Communications 4  pp 205 - 205
Kanellos A, Dimopoulos V & Clarke N  'Security policies for small and medium enterprises' Advances in Networks, Computing and Communications 3  pp 20 - 20
Marston J & Clarke NL  'Web-based risk analysis and education for home users' Advances in Networks, Computing and Communications 4  pp 89 - 89
Books
Clarke N & Tryfonas T  (2011)  Proceedings of the Sixth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2011).  University of Plymouth 
Clarke N  (2011)  Transparent User Authentication.  Springer Verlag 
CLARKE N  (2011)  Transparent user authentication: biometrics, RFID and behavioural profiling [e-book]. 
Clarke N & Tryfonas T  (2009)  Proceedings of the Fourth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2009): Athens, Greece, 25-26 June 2009.  Centre for Information Security & Network Research, University of Plymouth 
Furnell S & Clarke N  (2009)  Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009).  Lulu. com 
FURNELL S & CLARKE N  (2007)  International Symposium on Human Aspects of Information Security (HAISA).  Emerald  15 
Chapters
Clarke NL, Dowland P & Furnell SM  (2008)  'User Authentication Technologies' in Furnell S; Katsikas SK; Lopez J; Patel A (ed.)  Securing information and communications systems  Artech House Publishers  pp 35 - 59
Conference Papers
Clarke N, Katos V, Menesidou SA, Ghita B & Furnell S  (2012)  'A novel security architecture for a space-data DTN' Springer Berlin/Heidelberg  pp 342 - 349
Anuar N, Papadaki M, Furnell S & Clarke N  (2012)  'A Response Strategy Model for Intrusion Response Systems' Springer Boston  pp 573 - 578
Saevanee H, Clarke N & Furnell S  (2012)  'Multi-modal Behavioural Biometric Authentication for Mobile Devices' Springer Boston  pp 465 - 474
Thaul W, Bleimann U & Clarke N  (2012)  'Personal knowledge management beyond versioning' pp 28 - 28
Doelitzscher F, Fischer C, Moskal D, Reich C, Knahl M & Clarke N  (2012)  'Validating Cloud Infrastructure Changes by Cloud Audits' pp 377 - 384
Doelitzscher F, Reich C, Knahl M & Clarke N  (2011)  'An autonomous agent based incident detection system for cloud environments' pp 197 - 204
Li F, Clarke N, Papadaki M & Dowland P  (2011)  'Behaviour Profiling for Transparent Authentication for Mobile Devices' pp 307 - 314
Doelitzscher F, Reich C, Knahl M & Clarke N  (2011)  'Incident detection for cloud environments' pp 100 - 105
Lederm T & Clarke N  (2011)  'Risk assessment for mobile devices' Springer Berlin/Heidelberg  pp 210 - 221
Saevanee H, Clarke N & Furnell S  (2011)  'SMS linguistic profiling authentication on mobile device' pp 224 - 228
Li F, Clarke NL & Papadaki M  (2009)  'Intrusion Detection System for Mobile Devices: Investigation on Calling Activity'
Stienne DS, Clarke N & Reynolds P  (2009)  'Strong Authentication for Web Services using Smartcards' pp 8 - 8
Ibrahim T, Furnell SM, Papadaki M & Clarke NL  (2008)  'Assessing the Challenges of Intrusion Detection Systems'
Buchoux A & Clarke NL  (2008)  'Deployment of keystroke analysis on a smartphone' pp 48 - 48
Tjhai GC, Papadaki M, Furnell SM & Clarke NL  (2008)  'Investigating the problem of IDS false alarms: An experimental study using Snort' Springer  pp 253 - 267
Karatzouni S & Clarke N  (2007)  'Keystroke analysis for thumb-based keyboards on mobile devices' Springer Boston  pp 253 - 263
Karatzouni S, Furnell SM, Clarke NL & Botha RA  (2007)  'Perceptions of user authentication on mobile devices' pp 11 - 13
Furnell S & Clarke N  (2007)  'Proceedings of the International Symposium on Human Aspects of Information Security and Assurance (HAISA 2007)' University of Plymouth, School Of Computing, Communications And Electronics 
Razak SA, Furnell S, Clarke N & Brooke P  (2006)  'Part II-Short Papers-Infrastructure Protection and Cyber Security-A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks–A Friend Approach' Berlin: Springer-Verlag, 1973-  pp 590 - 595
Furnell S & Clarke N  (2005)  'Organisational security culture: embedding security awareness, education and training' pp 67 - 74
Clarke N, Furnell S, Lines B & Reynolds P  (2004)  'Application of keystroke analysis to mobile text messaging' pp 14 - 15
Clarke NL, Furnell SM & Reynolds PL  (2002)  'Biometric authentication for mobile devices' pp 61 - 69
Clarke N, Furnell S, Lines B & Reynolds P  (2002)  'Subscriber authentication for mobile phones using keystroke dynamics' pp 16 - 18
Reports
Karatzouni S, Clarke NL & Furnell SM  (2007)  Device-versus Network-Centric Authentication Paradigms for Mobile Devices.  School of Computer and Information Science, Edith Cowan University, Perth, Western Australia 
Clarke NL, Furnell SM & Karatzouni S  Applicable Authentication Methods for Mobile Devices and Services. 
Clarke NL, Furnell SM & Karatzouni S  Design Specification (Architectural & Operational Design). 
Software
Vezzulli L, Dowland PS, Reid PC, Clarke N & Papadaki M  (2005)  Gridded database browser of North Sea plankton: fifty years (1948–1997) of monthly plankton abundance from the continuous plankton recorder (CPR) survey [CD-ROM]. 
Patents
Clarke N, Kosmas C, Tripp N, Westington A & Tjhai C  Adjusting an operating mode of a security container in response to an unexpected received radio signal.  GB2472632 (A) 
Other Publications
Jaeger M & Clarke NL  (2006)  The Awareness and Perception of Spyware amongst Home PC Computer Users.  Lulu. com  pp 60 - 60
Lecomte J, Clarke N & Furnell S  (2005)  Artifical Impostor Profiling for Keystroke Analysis on a Mobile Handset. 
KOSMAS C, TRIPP N, WESTINGTON A, CLARKE N & TJHAI C  A CONTAINER AND SECURITY SYSTEMS. 
Krishnasamy M & Clarke NL  Biometrics for Mobile Devices: A Comparison of Performance and Pattern Classification Approaches.  Lulu. com  pp 57 - 57
Karatzouni S, Clarke NL & Furnell SM  Device versus network-centric authentication models for mobile devices–operational and perceptual trade-offs.  Lulu. com  pp 23 - 23
Karatzouni S & Clarke NL  Keystroke analysis as an authentication method for thumb-based keyboards on mobile handsets.  Lulu. com  pp 213 - 213
Sklikas V & Clarke NL  Mobile Devices-Future Security Threats & Vulnerabilities.  Lulu. com  pp 100 - 100

Conferences organised
Chair: Emergency Telecommunication Systems (ETS 2013) special track, Wrexham, UK, September 2013
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2013), Lisbon, Portugal, May 2013

Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2013), Lisbon, Portugal, May 2013
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2012), Crete, Greece, June 2012

Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2012), Crete, Greece, June 2012
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2011), Kingston University, United Kingdom

Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2011), Kingston University, United Kingdom
Co-Chair: Workshop on Digital Forensics and Incident Analysis (WDFIA 2010), Port Elizabeth, South Africa, May 2010.
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2010), Port Elizabeth, South Africa, May 2010.
Co-Chair: Workshop on Digital Forensics and Incident Analysis (WDFIA 2009), Athens, Greece, June 2009.
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, June 2009. 
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2008), Plymouth, UK, July 2008. 
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2007), Plymouth, UK, July 2007. 
Track Chair: Mobility & Security, 6th Security Conference, Las Vegas, USA, April 2007. 
Local organising committee: International Networking Conference (INC2006), Plymouth, UK, July 2006. 
Local organising committee: International Networking Conference (INC2004), Plymouth, UK, July 2004
 



Links

The Centre's research website can be located at: www.cscan.org