Textbooks - image courtesy of Getty Images

CSCAN publications

  • Ben Salamah F, Palomino MA, Craven MJ, Papadaki M & Furnell S 2023 'An Adaptive Cybersecurity Training Framework for the Education of Social Media Users at Work' Applied Sciences 13, (17) 9595-9595 , DOI Open access
  • Salamah FB, Palomino MA, Papadaki M, Craven MJ & Furnell S 2023 'Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats' Springer Nature Switzerland 349-363 , DOI Open access
  • Vranopoulos G, Clarke N & Atkinson S 2022 'Addressing big data variety using an automated approach for data characterization' Journal Of Big Data 9, (1) , DOI Open access
  • Alobaidi H, Clarke N, Li F & AbdulrahmanAlruban 2021 'Real-World Smartphone-based Gait Recognition' Computers and Security 113, , DOI Open access
  • Craven MJ & Woodward JR 2021 'Evolution of group-theoretic cryptology attacks using hyper-heuristics' Journal of Mathematical Cryptology 16, (1) 49-63 , DOI Open access
  • Asad H 2021 'Dynamical Analysis of Diversity in Rule-Based Open Source Network Intrusion Detection Systems' Empirical Software Engineering: an international journal 27, (4) , DOI Open access
  • Tam K, Hopcraft R, Crichton T & Jones K 2021 'The potential mental health effects of remote control in an autonomous maritime world' Journal of International Maritime Safety, Environmental Affairs, and Shipping 5, (2) 51-66 , DOI Open access
  • DesLauriers J, Kiss T, Ariyattu RC, Dang H, Ullah A, Bowden J, Krefting D, Pierantoni G & Terstyanszky G 2020 'Cloud apps to‐go: Cloud portability with TOSCA and MiCADO' Wiley , DOI
  • Barakabitze AA, Mkwawa I-H, Hines A, Sun L & Ifeachor E 2020 'QoEMultiSDN: Management of Multimedia Services using MPTCP/SR in Softwarized and Virtualized Networks' IEEE Access 1-1 , DOI Open access
  • Naqvi B, Clarke N & Porras J 2020 'Incorporating the Human Facet of Security in Developing Systems and Services' Information and Computer Security , DOI Open access
  • Alotaibi F, Clarke N & Furnell S 2020 'A novel approach for improving information security management and awareness for home environments' Information and Computer Security , DOI Open access
  • Hock D, Kappes M & Ghita B 2019 'Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric' Sustainable Energy, Grids and Networks 21, 100290-100290 , DOI Open access
  • Alohali M, Clarke N & Furnell S 2019 'Information Security Risk Communication: A User-Centric Approach' 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA) 1-/-1/2019 1-/-1/2019 IEEE , DOI
  • Tam K & Jones K 2019 'MaCRA: a model-based framework for maritime cyber-risk assessment' Wmu Journal of Maritime Affairs , DOI Open access
  • Barakabitze AA, Sun L, Mkwawa IH & Ifeachor E 2018 'A Novel QoE-Centric SDN-Based Multipath Routing Approach for Multimedia Services over 5G Networks' , DOI Open access
  • Barakabitze A, Mkwawa I-H, Sun L & Ifeachor EC 2018 'QualitySDN: Improving Video Quality using MPTCP and Segment Routing in SDN/NFV' 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft) IEEE 182-186 Publisher Site , DOI Open access
  • Dash W & Craven MJ 2017 'Exploring Botnet Evolution via Multidimensional Models and Visualisation' STM 2017 Oslo, Norway 9-/-0/2017 9-/-0/2017 , DOI Open access
  • Alqahtani N, Furnell S, Atkinson S & Stengel I 2017 'Internet risks for children: Parents' perceptions and attitudes: An investigative study of the Saudi Context' 2017 Internet Technologies and Applications (ITA) IEEE , DOI Open access
  • Asan A, Robitza W, Mkwawa I-H, Sun L, Ifeachor E, Raake A & IEEE 2017 'IMPACT OF VIDEO RESOLUTION CHANGES ON QoE FOR ADAPTIVE VIDEO STREAMING' 499-504 Open access
  • Al-Juboori S, Mkwawa I-H, Sun L, Ifeachor E & IEEE 2017 'INVESTIGATION OF RELATIONSHIPS BETWEEN CHANGES IN EEG FEATURES AND SUBJECTIVE QUALITY OF HDR IMAGES' 91-96 Open access
  • Marchang J, Ghita B & Lancaster D 2017 'Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks' Ad Hoc Networks 63, 62-78 , DOI Open access
  • Mkwawa IH, Barakabitze AA & Sun L 2017 'Video quality management over the software defined networking' 6-/-0/2016 6-/-0/2016 559-564 , DOI Open access
  • Mansfield TO, Ghita BV & Ambroze MA 2017 'Signals of opportunity geolocation methods for urban and indoor environments' Annals of Telecommunications 72, (3-4) 145-155 , DOI Open access
  • Liu L, Sun L & Ifeachor EC 2016 'User-centric QoE-driven vertical handover framework in heterogeneous wireless networks' , DOI Open access
  • Ifeachor E, Mkwawa IM, Sun L & Al-Juboori S 2016 'Impact of tone-mapping operators and viewing devices on visual quality of experience' , DOI Open access
  • Bakhshi T & Ghita B 2016 'On Internet Traffic Classification: A Two-Phased Machine Learning Approach' Journal of Computer Networks and Communications 2016, 0-0 , DOI Open access
  • Craven MJ & Robertz D 2016 'A parallel evolutionary approach to solving systems of equations in polycyclic groups' Groups Complexity Cryptology 8, (2) , DOI Open access
  • Ambroze MA, Martin PA, Tomlinson M & Taylor DP 2015 'Multi-user indoor ultra-wideband wireless communication using polyphase spreading sequences' IET COMMUNICATIONS 9, (5) 585-595 Author Site , DOI Open access
  • Fajardo JO, Liberal F, Li F, Clarke N & Mkwawa I-H 2014 'End-to-middle-to-end solution for IMS media plane security' Electronic Commerce Research , DOI Open access
  • Rosnes E, Ambroze MA & Tomlinson M 2014 'On the Minimum/Stopping Distance of Array Low-Density Parity-Check Codes' IEEE Transactions on Information Theory 60, (9) 5204-5214 , DOI Open access
  • Hocking CG, Furnell SM, Clarke NL & Reynolds PL 2013 'Co-operative user identity verification using an Authentication Aura' COMPUTERS & SECURITY 39, 486-502 Author Site , DOI
  • Anuar NB, Papadaki M, Furnell SM & Clarke N 2013 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks 6, (9) 1087-1116 , DOI
  • Sun L, Mkwawa I-H, Jammeh E & Ifeachor E 2013 Guide to Voice and Video over IP. Springer-Verlag London Publisher Site , DOI
  • Frei S, Fuhrmann WF & Ghita BV 2013 'Framework for Generic Context- and Policy-Based Traffic Distribution in Heterogeneous Wireless Networks: Black Rider' Barolli L; Xhafa F; Takizawa M; Enokido T; Hsu H-H IEEE Computer Society 534-541 Publisher Site , DOI
  • Khan A, Sun L & Ifeachor E 2012 'Learning models for video quality prediction over wireless local area network and universal mobile telecommunication system networks' IET COMMUNICATIONS 4, (12) 1389-1403 Author Site , DOI
  • Khan A, Sun L & Ifeachor E 2012 'QoE Prediction Model and its Application in Video Quality Adaptation Over UMTS Networks' Multimedia, IEEE Transactions on 14, (2) 431-442 , DOI
  • Rosnes E, Ytrehus O, Ambroze MA & Tomlinson M 2012 'Addendum to "An Efficient Algorithm to Find All Small-Size Stopping Sets of Low-Density Parity-Check Matrices"' IEEE TRANSACTIONS ON INFORMATION THEORY 58, (1) 164-171 Author Site , DOI
  • Alfayly A, Mkwawa I-H, Sun L & Ifeachor E 2012 'QoE-based performance evaluation of scheduling algorithms over LTE' 1362-1366-1362-1366 , DOI
  • Clarke N, Katos V, Menesidou SA, Ghita B & Furnell S 2012 'A novel security architecture for a space-data DTN' Springer Berlin/Heidelberg 342-349
  • Frei S, Fuhrmann WF, Rinkel A & Ghita BV 2012 'Prospects for WLAN in the Evolved Packet Core Environment' Levi A; Badra M; Cesana M; Ghassemian M; Gürbüz Ö; Jabeur N; Klonowski M; Maña A; Sargento S; Zeadally S IEEE 1-5 Publisher Site
  • Anuar N, Papadaki M, Furnell S & Clarke N 2012 'A Response Strategy Model for Intrusion Response Systems' Springer Boston 573-578
  • Saevanee H, Clarke N & Furnell S 2012 'Multi-modal Behavioural Biometric Authentication for Mobile Devices' Springer Boston 465-474
  • Thaul W, Bleimann U & Clarke N 2012 'Personal knowledge management beyond versioning' 28-28
  • Doelitzscher F, Fischer C, Moskal D, Reich C, Knahl M & Clarke N 2012 'Validating Cloud Infrastructure Changes by Cloud Audits' 377-384
  • Doelitzscher F, Reich C, Knahl M, Passfall A & Clarke N 2012 'An agent based business aware incident detection system for cloud environments' Journal of Cloud Computing: Advances, Systems and Applications 1, 9-9
  • Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N & Gritzalis S 2012 'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers' SECURITY AND COMMUNICATION NETWORKS 5, (1) 3-14 Author Site , DOI
  • Furnell S & Clarke N 2012 'Power to the people? The evolving recognition of human aspects of security' Computers & Security
  • Clarke N 2011 Transparent User Authentication. Springer Verlag
  • Lehmann A, Trick U, Fuhrmann W & Ghita B 2011 'A new service description language as basis for service composition in SIP-based peer-to-peer infrastructures' 1 -8-1 -8 , DOI
  • Arabi M & Ghita B 2011 'Transmission rate control through MAC layer acknowledgements feedback' 1 -7-1 -7 , DOI

Select a staff member to see a full list of publications

Core staff