Textbooks - image courtesy of Getty Images

CSCAN publications

  • Ben Salamah F, Palomino MA, Craven MJ, Papadaki M & Furnell S 2023 'An Adaptive Cybersecurity Training Framework for the Education of Social Media Users at Work' Applied Sciences 13, (17) 9595-9595 , DOI Open access
  • Salamah FB, Palomino MA, Papadaki M, Craven MJ & Furnell S 2023 'Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats' Springer Nature Switzerland 349-363 , DOI Open access
  • Vranopoulos G, Clarke N & Atkinson S 2022 'Addressing big data variety using an automated approach for data characterization' Journal Of Big Data 9, (1) , DOI Open access
  • Alobaidi H, Clarke N, Li F & AbdulrahmanAlruban 2021 'Real-World Smartphone-based Gait Recognition' Computers and Security 113, , DOI Open access
  • Craven MJ & Woodward JR 2021 'Evolution of group-theoretic cryptology attacks using hyper-heuristics' Journal of Mathematical Cryptology 16, (1) 49-63 , DOI Open access
  • Asad H 2021 'Dynamical Analysis of Diversity in Rule-Based Open Source Network Intrusion Detection Systems' Empirical Software Engineering: an international journal 27, (4) , DOI Open access
  • Tam K, Hopcraft R, Crichton T & Jones K 2021 'The potential mental health effects of remote control in an autonomous maritime world' Journal of International Maritime Safety, Environmental Affairs, and Shipping 5, (2) 51-66 , DOI Open access
  • DesLauriers J, Kiss T, Ariyattu RC, Dang H, Ullah A, Bowden J, Krefting D, Pierantoni G & Terstyanszky G 2020 'Cloud apps to‐go: Cloud portability with TOSCA and MiCADO' Wiley , DOI
  • Barakabitze AA, Mkwawa I-H, Hines A, Sun L & Ifeachor E 2020 'QoEMultiSDN: Management of Multimedia Services using MPTCP/SR in Softwarized and Virtualized Networks' IEEE Access 1-1 , DOI Open access
  • Naqvi B, Clarke N & Porras J 2020 'Incorporating the Human Facet of Security in Developing Systems and Services' Information and Computer Security , DOI Open access
  • Alotaibi F, Clarke N & Furnell S 2020 'A novel approach for improving information security management and awareness for home environments' Information and Computer Security , DOI Open access
  • Hock D, Kappes M & Ghita B 2019 'Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric' Sustainable Energy, Grids and Networks 21, 100290-100290 , DOI Open access
  • Alohali M, Clarke N & Furnell S 2019 'Information Security Risk Communication: A User-Centric Approach' 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA) 1-/-1/2019 1-/-1/2019 IEEE , DOI
  • Tam K & Jones K 2019 'MaCRA: a model-based framework for maritime cyber-risk assessment' Wmu Journal of Maritime Affairs , DOI Open access
  • Dash W & Craven MJ 2017 'Exploring Botnet Evolution via Multidimensional Models and Visualisation' STM 2017 Oslo, Norway 9-/-0/2017 9-/-0/2017 , DOI Open access
  • Alqahtani N, Furnell S, Atkinson S & Stengel I 2017 'Internet risks for children: Parents' perceptions and attitudes: An investigative study of the Saudi Context' 2017 Internet Technologies and Applications (ITA) IEEE , DOI Open access
  • Marchang J, Ghita B & Lancaster D 2017 'Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks' Ad Hoc Networks 63, 62-78 , DOI Open access
  • Mansfield TO, Ghita BV & Ambroze MA 2017 'Signals of opportunity geolocation methods for urban and indoor environments' Annals of Telecommunications 72, (3-4) 145-155 , DOI Open access
  • Bakhshi T & Ghita B 2016 'On Internet Traffic Classification: A Two-Phased Machine Learning Approach' Journal of Computer Networks and Communications 2016, 0-0 , DOI Open access
  • Craven MJ & Robertz D 2016 'A parallel evolutionary approach to solving systems of equations in polycyclic groups' Groups Complexity Cryptology 8, (2) , DOI Open access
  • Ambroze MA, Martin PA, Tomlinson M & Taylor DP 2015 'Multi-user indoor ultra-wideband wireless communication using polyphase spreading sequences' IET COMMUNICATIONS 9, (5) 585-595 , DOI Open access
  • Fajardo JO, Liberal F, Li F, Clarke N & Mkwawa I-H 2014 'End-to-middle-to-end solution for IMS media plane security' Electronic Commerce Research , DOI Open access
  • Rosnes E, Ambroze MA & Tomlinson M 2014 'On the Minimum/Stopping Distance of Array Low-Density Parity-Check Codes' IEEE Transactions on Information Theory 60, (9) 5204-5214 , DOI Open access
  • Frei S, Fuhrmann WF & Ghita BV 2013 'Framework for Generic Context- and Policy-Based Traffic Distribution in Heterogeneous Wireless Networks: Black Rider' Barolli L; Xhafa F; Takizawa M; Enokido T; Hsu H-H IEEE Computer Society 534-541 Publisher Site , DOI
  • Hocking CG, Furnell SM, Clarke NL & Reynolds PL 2013 'Co-operative user identity verification using an Authentication Aura' COMPUTERS & SECURITY 39, 486-502 , DOI
  • Rosnes E, Ytrehus O, Ambroze MA & Tomlinson M 2012 'Addendum to "An Efficient Algorithm to Find All Small-Size Stopping Sets of Low-Density Parity-Check Matrices"' IEEE TRANSACTIONS ON INFORMATION THEORY 58, (1) 164-171 Author Site , DOI
  • Clarke N, Katos V, Menesidou SA, Ghita B & Furnell S 2012 'A novel security architecture for a space-data DTN' Springer Berlin/Heidelberg 342-349
  • Frei S, Fuhrmann WF, Rinkel A & Ghita BV 2012 'Prospects for WLAN in the Evolved Packet Core Environment' Levi A; Badra M; Cesana M; Ghassemian M; Gürbüz Ö; Jabeur N; Klonowski M; Maña A; Sargento S; Zeadally S IEEE 1-5 Publisher Site
  • Anuar N, Papadaki M, Furnell S & Clarke N 2012 'A Response Strategy Model for Intrusion Response Systems' Springer Boston 573-578
  • Saevanee H, Clarke N & Furnell S 2012 'Multi-modal Behavioural Biometric Authentication for Mobile Devices' Springer Boston 465-474
  • Thaul W, Bleimann U & Clarke N 2012 'Personal knowledge management beyond versioning' 28-28
  • Doelitzscher F, Fischer C, Moskal D, Reich C, Knahl M & Clarke N 2012 'Validating Cloud Infrastructure Changes by Cloud Audits' 377-384
  • Doelitzscher F, Reich C, Knahl M, Passfall A & Clarke N 2012 'An agent based business aware incident detection system for cloud environments' Journal of Cloud Computing: Advances, Systems and Applications 1, 9-9
  • Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N & Gritzalis S 2012 'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers' SECURITY AND COMMUNICATION NETWORKS 5, (1) 3-14 , DOI
  • Furnell S & Clarke N 2012 'Power to the people? The evolving recognition of human aspects of security' Computers & Security
  • Clarke N 2011 Transparent User Authentication. Springer Verlag
  • Lehmann A, Trick U, Fuhrmann W & Ghita B 2011 'A new service description language as basis for service composition in SIP-based peer-to-peer infrastructures' 1 -8-1 -8 , DOI
  • Arabi M & Ghita B 2011 'Transmission rate control through MAC layer acknowledgements feedback' 1 -7-1 -7 , DOI
  • Culverhouse ME, Ghita BV & Reynolds P 2011 'User-centric quality of service provisioning' 35 -41-35 -41 , DOI
  • Wacht P, Eichelmann T, Lehmann A, Fuhrmann W, Trick U & Ghita BV 2011 'A New Approach to Model a Formalised Description of a Communication Service for the Purpose of Functional Testing' 262-269-262-269
  • Eichelmann T, Fuhrmann W, Trick U & Ghita BV 2011 'Discussion on a Framework and its Service Structures for generating JSLEE based Value-Added Services' 169-177-169-177
  • Frei S, Fuhrmann W, Rinkel A & Ghita BV 2011 'EPS QoS Enforcement on Layer 3 with Diffserv' 199-204-199-204
  • Arabi M & Ghita BV 2011 'Improving Fairness in Ad Hoc Networks Based on Neighbour’s Transmission Rate' 292-299-292-299
  • Frei S, Fuhrmann W, Rinkel A & Ghita BV 2011 'Improvements to Inter System Handover in the EPC Environment' 1 -5-1 -5 , DOI
  • CLARKE N 2011 Transparent user authentication: biometrics, RFID and behavioural profiling [e-book].
  • Frei S, Fuhrmann W, Rinkel A & Ghita BV 2011 'Improvements to Inter System Handover in the EPC Environment' New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on 1-5
  • Doelitzscher F, Reich C, Knahl M & Clarke N 2011 'An autonomous agent based incident detection system for cloud environments' 197-204
  • Li F, Clarke N, Papadaki M & Dowland P 2011 'Behaviour Profiling for Transparent Authentication for Mobile Devices' 307-314
  • Doelitzscher F, Reich C, Knahl M & Clarke N 2011 'Incident detection for cloud environments' 100-105
  • Lederm T & Clarke N 2011 'Risk assessment for mobile devices' Springer Berlin/Heidelberg 210-221

Select a staff member to see a full list of publications

Core staff