Centre for Cyber Security, Communications and Network Research (CSCAN)
CSCAN publications
Ben Salamah F, Palomino MA, Craven MJ, Papadaki M & Furnell S2023'An Adaptive Cybersecurity Training Framework for the Education of Social Media Users at Work'Applied Sciences13,(17)9595-9595, DOIOpen access
Salamah FB, Palomino MA, Papadaki M, Craven MJ & Furnell S2023'Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats'Springer Nature Switzerland349-363, DOIOpen access
Vranopoulos G, Clarke N & Atkinson S2022'Addressing big data variety using an automated approach for data characterization'Journal Of Big Data9,(1), DOIOpen access
Alobaidi H, Clarke N, Li F & AbdulrahmanAlruban2021'Real-World Smartphone-based Gait Recognition'Computers and Security113,, DOIOpen access
Craven MJ & Woodward JR2021'Evolution of group-theoretic cryptology attacks using hyper-heuristics'Journal of Mathematical Cryptology16,(1)49-63, DOIOpen access
Asad H2021'Dynamical Analysis of Diversity in Rule-Based Open Source Network Intrusion Detection Systems'Empirical Software Engineering: an international journal27,(4), DOIOpen access
Tam K, Hopcraft R, Crichton T & Jones K2021'The potential mental health effects of remote control in an autonomous maritime world'Journal of International Maritime Safety, Environmental Affairs, and Shipping5,(2)51-66, DOIOpen access
DesLauriers J, Kiss T, Ariyattu RC, Dang H, Ullah A, Bowden J, Krefting D, Pierantoni G & Terstyanszky G2020'Cloud apps to‐go: Cloud portability with TOSCA and MiCADO'Wiley, DOI
Barakabitze AA, Mkwawa I-H, Hines A, Sun L & Ifeachor E2020'QoEMultiSDN: Management of Multimedia Services using MPTCP/SR in Softwarized and Virtualized Networks'IEEE Access1-1, DOIOpen access
Naqvi B, Clarke N & Porras J2020'Incorporating the Human Facet of Security in Developing Systems and
Services'Information and Computer Security, DOIOpen access
Alotaibi F, Clarke N & Furnell S2020'A novel approach for improving information security management and awareness for home environments'Information and Computer Security, DOIOpen access
Hock D, Kappes M & Ghita B2019'Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric'Sustainable Energy, Grids and Networks21,100290-100290, DOIOpen access
Alohali M, Clarke N & Furnell S2019'Information Security Risk Communication: A User-Centric Approach'2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)1-/-1/20191-/-1/2019IEEE, DOI
Tam K & Jones K2019'MaCRA: a model-based framework for maritime cyber-risk assessment'Wmu Journal of Maritime Affairs, DOIOpen access
Barakabitze AA, Sun L, Mkwawa IH & Ifeachor E2018'A Novel QoE-Centric SDN-Based Multipath Routing Approach for Multimedia Services over 5G Networks', DOIOpen access
Barakabitze A, Mkwawa I-H, Sun L & Ifeachor EC2018'QualitySDN: Improving Video Quality using MPTCP and Segment Routing in SDN/NFV'2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)IEEE182-186Publisher Site, DOIOpen access
Dash W & Craven MJ2017'Exploring Botnet Evolution via Multidimensional Models and Visualisation'STM 2017Oslo, Norway9-/-0/20179-/-0/2017, DOIOpen access
Alqahtani N, Furnell S, Atkinson S & Stengel I2017'Internet risks for children: Parents' perceptions and attitudes: An investigative study of the Saudi Context'2017 Internet Technologies and Applications (ITA)IEEE, DOIOpen access
Asan A, Robitza W, Mkwawa I-H, Sun L, Ifeachor E, Raake A & IEEE2017'IMPACT OF VIDEO RESOLUTION CHANGES ON QoE FOR ADAPTIVE VIDEO STREAMING'499-504Open access
Al-Juboori S, Mkwawa I-H, Sun L, Ifeachor E & IEEE2017'INVESTIGATION OF RELATIONSHIPS BETWEEN CHANGES IN EEG FEATURES AND SUBJECTIVE QUALITY OF HDR IMAGES'91-96Open access
Marchang J, Ghita B & Lancaster D2017'Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks'Ad Hoc Networks63,62-78, DOIOpen access
Mkwawa IH, Barakabitze AA & Sun L2017'Video quality management over the software defined networking'6-/-0/20166-/-0/2016559-564, DOIOpen access
Mansfield TO, Ghita BV & Ambroze MA2017'Signals of opportunity geolocation methods for urban and indoor environments'Annals of Telecommunications72,(3-4)145-155, DOIOpen access
Liu L, Sun L & Ifeachor EC2016'User-centric QoE-driven vertical handover framework in heterogeneous wireless networks', DOIOpen access
Ifeachor E, Mkwawa IM, Sun L & Al-Juboori S2016'Impact of tone-mapping operators and viewing devices on visual quality of experience', DOIOpen access
Bakhshi T & Ghita B2016'On Internet Traffic Classification: A Two-Phased Machine Learning Approach'Journal of Computer Networks and Communications2016,0-0, DOIOpen access
Craven MJ & Robertz D2016'A parallel evolutionary approach to solving systems of equations in polycyclic groups'Groups Complexity Cryptology8,(2), DOIOpen access
Ambroze MA, Martin PA, Tomlinson M & Taylor DP2015'Multi-user indoor ultra-wideband wireless communication using polyphase spreading sequences'IET COMMUNICATIONS9,(5)585-595Author Site, DOIOpen access
Fajardo JO, Liberal F, Li F, Clarke N & Mkwawa I-H2014'End-to-middle-to-end solution for IMS media plane security'Electronic Commerce Research, DOIOpen access
Rosnes E, Ambroze MA & Tomlinson M2014'On the Minimum/Stopping Distance of Array Low-Density Parity-Check Codes'IEEE Transactions on Information Theory60,(9)5204-5214, DOIOpen access
Hocking CG, Furnell SM, Clarke NL & Reynolds PL2013'Co-operative user identity verification using an Authentication Aura'COMPUTERS & SECURITY39,486-502Author Site, DOI
Anuar NB, Papadaki M, Furnell SM & Clarke N2013'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)'Security and Communication Networks6,(9)1087-1116, DOI
Sun L, Mkwawa I-H, Jammeh E & Ifeachor E2013Guide to Voice and Video over IP.Springer-Verlag LondonPublisher Site, DOI
Frei S, Fuhrmann WF & Ghita BV2013'Framework for Generic Context- and Policy-Based Traffic Distribution in Heterogeneous Wireless Networks: Black Rider'Barolli L; Xhafa F; Takizawa M; Enokido T; Hsu H-HIEEE Computer Society534-541Publisher Site, DOI
Khan A, Sun L & Ifeachor E2012'Learning models for video quality prediction over wireless local area network and universal mobile telecommunication system networks'IET COMMUNICATIONS4,(12)1389-1403Author Site, DOI
Khan A, Sun L & Ifeachor E2012'QoE Prediction Model and its Application in Video Quality Adaptation Over UMTS Networks'Multimedia, IEEE Transactions on14,(2)431-442, DOI
Rosnes E, Ytrehus O, Ambroze MA & Tomlinson M2012'Addendum to "An Efficient Algorithm to Find All Small-Size Stopping Sets of Low-Density Parity-Check Matrices"'IEEE TRANSACTIONS ON INFORMATION THEORY58,(1)164-171Author Site, DOI
Alfayly A, Mkwawa I-H, Sun L & Ifeachor E2012'QoE-based performance evaluation of scheduling algorithms over LTE'1362-1366-1362-1366, DOI
Clarke N, Katos V, Menesidou SA, Ghita B & Furnell S2012'A novel security architecture for a space-data DTN'Springer Berlin/Heidelberg342-349
Frei S, Fuhrmann WF, Rinkel A & Ghita BV2012'Prospects for WLAN in the Evolved Packet Core Environment'Levi A; Badra M; Cesana M; Ghassemian M; Gürbüz Ö; Jabeur N; Klonowski M; Maña A; Sargento S; Zeadally SIEEE1-5Publisher Site
Anuar N, Papadaki M, Furnell S & Clarke N2012'A Response Strategy Model for Intrusion Response Systems'Springer Boston573-578
Saevanee H, Clarke N & Furnell S2012'Multi-modal Behavioural Biometric Authentication for Mobile Devices'Springer Boston465-474
Doelitzscher F, Fischer C, Moskal D, Reich C, Knahl M & Clarke N2012'Validating Cloud Infrastructure Changes by Cloud Audits'377-384
Doelitzscher F, Reich C, Knahl M, Passfall A & Clarke N2012'An agent based business aware incident detection system for cloud environments'Journal of Cloud Computing: Advances, Systems and Applications1,9-9
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N & Gritzalis S2012'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers'SECURITY AND COMMUNICATION NETWORKS5,(1)3-14Author Site, DOI
Furnell S & Clarke N2012'Power to the people? The evolving recognition of human aspects of security'Computers & Security
Clarke N2011Transparent User Authentication.Springer Verlag
Lehmann A, Trick U, Fuhrmann W & Ghita B2011'A new service description language as basis for service composition in SIP-based peer-to-peer infrastructures'1 -8-1 -8, DOI
Arabi M & Ghita B2011'Transmission rate control through MAC layer acknowledgements feedback'1 -7-1 -7, DOI
Select a staff member to see a full list of publications