Publications

2020

Journal papers

Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric
D. Hock, M. Kappes, B. Ghita,
Sustainable Energy, Grids and Networks, Volume 21,2020, 100290, ISSN 2352-4677, doi: 10.1016/j.segan.2019.100290

Conference papers

Synergy of Trust, Blockchain and Smart Contracts for Optimization of Decentralized IoT Service Platforms
Shala B., Trick U., Lehmann A.,Ghita B., Shiaeles S. (2020) 
In: Barolli L., AmatoF., Moscato F., Enokido T., Takizawa M. (eds) Advanced Information Networkingand Applications. AINA 2020. Advances in Intelligent Systems and Computing, vol1151. Springer, doi: 10.1007/978-3-030-44041-1_49

Trusted, Decentralized and Blockchain-Based M2M Application Service Provision
Shala B., Trick U., Lehmann A.,Ghita B., Shiaeles S. (2020)  In: Barolli L., Hellinckx P., Enokido T. (eds)Advances on Broad-Band Wireless Computing, Communication and Applications.BWCCA 2019. Lecture Notes in Networks and Systems, vol 97. Springer, doi:10.1007/978-3-030-33506-9_19

2019

Journal papers

Intelligent Building Systems: Security and Facility Professionals' Understanding of System Threats, Vulnerabilities and Mitigation Practice
Brooks D, Coole M, Haskell-Dowland PS (Dowland PS)
Security Journal, pp1-22, 0955-1662, 2019

An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques
Abdel Hameed M, Hassaballah M, Aly S, Awad AI
IEEE Access, doi.org/10.1109/ACCESS.2019.2960254, 2019

Bag-of-Visual-Words for Cattle Identification from Muzzle Print Images
Awad AI, Hassaballah M
Applied Sciences, doi.org/10.3390/app9224914, 2019

Behavioral Profiling for Transparent Verification in Cloud Storage Services
Al-Bayati B, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F
Journal of Information Warfare, pp88-105, 2019

FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management
Bendiab, K., Shiaeles, S., Boucherkha, S., Ghita, B. (2019)
Computers and Security, 86, pp. 270-290. doi: 10.1016/j.cose.2019.06.011

Formal Application Description of Autonomous and Cooperative M2M Application Services
M. Steinheimer, U. Trick , B. Ghita (2019)
Journal of Communications, vol. 14, no. 1, pp. 33-39, 2018. doi: 10.12720/jcm.14.1.33-39

Using Burstiness for Network Applications Classification
Hussein Oudah, Bogdan Ghita, Taimur Bakhshi, Abdulrahman Alruban, and David J. Walker. (2019)
Journal of Computer Networks and Communications, vol. 2019. doi:10.1155/2019/5758437.

A framework for reporting and dealing with end-user security policy compliance
Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan Clarke
Information and Computer Security 2019 DOI: 10.1108/ICS-12-2017-0097

A proactive malicious software identification approach for digital forensic examiners
Muhammad Ali, Stavros Shiaeles, Nathan Clarke, Dimitrios Kontogeorgis
Journal of Information Security and Applications 2019 DOI: 10.1016/j.jisa.2019.04.013EID: 2-s2.0-85065611544

End-to-middle-to-end solution for IMS media plane security
Jose Oscar Fajardo, Fidel Liberal, Fudong Li, Nathan Clarke & Is-Haka Mkwawa
Electronic Commerce Research 2019 DOI: 10.1007/s10660-019-09367-2EID: 2-s2.0-85069738287

MaCRA: a model-based framework for maritime cyber-risk assessment
Kevin Jones
WMU Journal of Maritime Affairs

Books

Cybersecurity Education for Awareness and Compliance
Vasileiou I, Furnell SM
IGI Global, Hershey, PA, ISBN: 978-1-52257-847-5, 2019

Securing cloud storage by transparent biometric cryptography
Nathan Clarke, Bogdan Ghita, Abdulrahman Alruban
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) DOI: 10.1007/978-3-030-12942-2_9EID: 2-s2.0-85062973806

Edited books  

Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Furnell SM, Clarke NL
Nicosia, Cyprus, 15-16 July, ISBN: 978-0-244-19096-5, 226pp, 2019

Conference papers

Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks
Kang J, Fahd K, Venkatraman S, Trujillo-Rasua R, Haskell-Dowland PS (Dowland PS)
2019 29th International Telecommunication Networks and Applications Conference (ITNAC), ISBN: 978-1-7281-3674-5, pp. 1-6, 2019

Addressing STEM Geek Culture Through Peer Learning
Vasileiou I, Haskell-Dowland PS (Dowland PS)
EDULEARN19 Proceedings, pp5289-5293, Palma, Mallorca, Spain, 2019

From Model B To Micro:Bit – Teaching Computer Science
Ellis M, Thompson G, Haskell-Dowland PS (Dowland PS)
Proceedings of EDULEARN19 Conference, pp2725-2731, Palma, Mallorca, Spain, 2019

Value of Smart Data for Supply Chain decisions in a rich uncertain world
Sankaran G, Knahl MH, Siestrup G, Vasileiou I
Collaborative European Research Conference (CERC), Darmstadt, Germany, 29 March, 2019

Student-centred analytics: Putting analytics into the hands of students
Banyard C, Vasileiou I
Collaborative European Research Conference (CERC), Darmstadt, Germany, 29 March, 2019

Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation
Shire R., Shiaeles S., Bendiab K., Ghita B., Kolokotronis N. (2019)
In: Galinina O., Andreev S., Balandin S., Koucheryavy Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2019, ruSMART 2019. Lecture Notes in Computer Science, vol 11660. Springer, Cham, doi: 10.1007/978-3-030-30859-9_6

Requirements for a Distributed NFV Orchestration in a WMN-Based Disaster Network
G. Frick, A. P. Tchinda, B. Shala, U. Trick, A. Lehmann and B. Ghita
2019 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), Paris, France, 2019, pp. 1-6, doi: 10.1109/ICT-DM47966.2019.9032953.

A Novel Features Set for Internet Traffic Classification using Burstiness
H. Oudah, B. Ghita, T. Bakhshi, (2019).
In Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-359-9, ISSN 2184-4356, pages 397-404. DOI: 10.5220/0007384203970404

Enhancing Data Security in Cloud using Random Pattern Fragmentation and a Distributed NoSQL Database
N. L. Santos, B. Ghita and G. L. Masala
2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy, 2019, pp. 3735-3740, doi: 10.1109/SMC.2019.8914454.

FaceWallGraph: Using Machine Learning for Profiling User Behaviour from Facebook Wall
Panagiotou A., Ghita B., Shiaeles S., Bendiab K. (2019)
In: Galinina O., Andreev S., Balandin S., Koucheryavy Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2019, ruSMART 2019. Lecture Notes in Computer Science, vol 11660. Springer, Cham, doi: 10.1007/978-3-030-30859-9_11

User Profiling Based on Application-Level Using Network Metadata (2019)
Faisal, S., Ghita, B.V., Clarke, N., Abdulrahman, A. (2019).
In Proceedings of the 7th International Symposium on Digital Forensics and Security (ISDFS), Barcelos, Portugal, pp. 1-8. doi: 10.1109/ISDFS.2019.8757503

Distributed Ledger Technology for Trust Management Optimisation in M2M
B. Shala, U. Trick, A. Lehmann, B. Ghita and S. Shiaeles. (2019)
In Proceedings of the Mobile Communication - Technologies and Applications; 24. ITG-Symposium, Osnabrueck, Germany, 2019, pp. 1-6.

BBGDASH: A Max-Min Bounded Bitrate Guidance for SDN Enabled Adaptive Video Streaming
Al-Issa, A. E., Bentaleb, A., Zinner, T., Mkwawa, I. H., & Ghita, B. (2019).
In Proceedings of the 2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops, ICIN 2019 (pp. 307–314). doi: 10.1109/ICIN.2019.8685894

Bandwidth Prediction Schemes for Defining Bitrate Levels in SDN-enabled Adaptive Streaming
A. E. Al-Issa, A. Bentaleb, A. A. Barakabitze, T. Zinner and B. Ghita
2019 15th International Conference on Network and Service Management (CNSM), Halifax, NS, Canada, 2019, pp. 1-7, doi: 10.23919/CNSM46954.2019.9012713

A novel approach for performance-based clustering and management of network traffic flows
M. Al-Saadi, B. V. Ghita, S. Shiaeles and P. Sarigiannidis
2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 2019, pp. 2025-2030, doi: 10.1109/IWCMC.2019.8766728.

A Novel Online Incremental Learning Intrusion Prevention System
C. Constantinides, S. Shiaeles, B. Ghita and N. Kolokotronis
2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), CANARY ISLANDS, Spain, 2019, pp. 1-6, doi: 10.1109/NTMS.2019.8763842.

Willingness impact to the PAR optimisation of R-users community using EMS
Yaseen, Y., & Ghita, B. (2019).
In Energy Procedia (Vol. 156, pp. 315–320). Elsevier Ltd. doi: 10.1016/j.egypro.2018.11.148

Securing cloud storage by transparent biometric cryptography
Abed, L., Clarke, N., Ghita, B., & Alruban, A. (2019).
In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11359 LNCS, pp. 97–108). Springer Verlag. doi: 10.1007/978-3-030-12942-2_9

Blockchain-Based Trust Communities for Decentralized M2M Application Services
Shala, B., Trick, U., Lehmann, A., Ghita, B., & Shiaeles, S. (2019).
In Proceedings of the 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2018) (pp. 62–73). doi: 10.1007/978-3-030-02607-3_6

A novel behaviour profiling approach to continuous authentication for mobile applications
Saud Alotaibi, Abdulrahman Alruban, Nathan L. Clarke
ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy 2019 EID: 2-s2.0-85064596456

Fast predictive maintenance in Industrial Internet of Things (IIoT) with Deep Learning (DL): A review
Thomas Rieger, Stefanie Regier, Ingo Stengel, Nathan Clarke
CEUR Workshop Proceedings 2019 EID: 2-s2.0-85064814805

Identification and extraction of digital forensic evidence from multimedia data sources using multi-algorithmic fusion
Shahlaa Mashhadani, Nathan Clarke, Dr Fudong Li
ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy EID: 2-s2.0-85064656339

Physical activity recognition by utilising smartphone sensor signals
Abdulrahman Alruban, Hind Alobaidi, Nathan Clarke, Dr Fudong Li
ICPRAM 2019 - Proceedings of the 8th International Conference on Pattern Recognition Applications and Methods EID: 2-s2.0-85064590705

Privacy enhancing data access control for ambient assisted living
Hendrik Kuijs, Timo Bayer, Nathan L. Clarke
CLOSER 2019 - Proceedings of the 9th International Conference on Cloud Computing and Services Science EID: 2-s2.0-85067446928

Rule-based security monitoring of containerized workloads
Holger Gantikow, Christoph Reich, Martin Knahl and Nathan Clarke
CLOSER 2019 - Proceedings of the 9th International Conference on Cloud Computing and Services Science EID: 2-s2.0-85067486294

Contributions to edited books

"A Holistic View of Cybersecurity Education Requirements", in Cybersecurity Education for Awareness and Compliance
Furnell SM, Vasileiou I
I.Vasileiou and S.Furnell (Eds.), IGI Global, Hershey, PA, pp1-18, ISBN: 978-1-52257-847-5, 2019

2018

Journal papers

A Survey of Distributed Certificate Authorities in MANETs
Chaudhry J, Saleem K, Haskell-Dowland PS (Dowland PS), Miraz M
Annals of Emerging Technologies in Computing (AETiC),, vol. 2, iss. 3, pp11-18, 2018

Information security collaboration formation in organisations
Sohrabi Safa N, Maple C, Watson T, Furnell SM
IET Information Security, Volume 12, Issue 3, May 2018, p.238–245, 2018

Towards Bayesian-based Trust Management for Insider Attacks in Healthcare Software-Defined Networks
Meng W, Choo KKR, Furnell SM, Vasilakos AV, Probst CW
IEEE Transactions on Network and Service Management, 2018

Enhancing security behaviour by supporting the user
Furnell SM, Khern-am-nuai W, Esmael R, Yang W, Li N
Computers & Security, Volume 75, June 2018, Pages 1-9, 2018

Sharing with live migration energy optimization scheduler for cloud computing data centers
Alshathri, S., Ghita, B., & Clarke, N. (2018).
Future Internet, 10(9).

Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Dawood, M., Fuhrmann, W., Ghita, B.V. (2018).
International Journal of Mobile Network Communications & Telematics (IJMNCT), Vol.8, No.1/2/3/4. 

Dynamic Neighbour Aware Power-controlled MAC for Multi-hop Ad-hoc networks
Marchang, J., Douglas, R., Ghita, B., Lancaster, D., & Sanders, B.
(2018) Ad Hoc Networks, 75-76, 119-134. 

A novel transparent user authentication approach for mobile applications
Saud Nejr Alotaibi, Steven Furnell & Nathan Clarke
Information Security Journal: A Global Perspective 2018-11-02 DOI: 10.1080/19393555.2019.1609628

Guest editorial
Steven Furnell, Nathan Clarke
Information and Computer Security 2018 DOI: 10.1108/ICS-06-2018-0065 EID: 2-s2.0-85051290240

Identifying and predicting the factors affecting end-users’ risk-taking behavior
Manal Alohali, Nathan Clarke, Fudong Li, Steven Furnell
Information and Computer Security 2018 DOI: 10.1108/ICS-03-2018-0037 EID: 2-s2.0-85051288068

The design and evaluation of a user-centric information security risk assessment and response framework
Manal Alohali, Nathan Clarke, Steven Furnell
International Journal of Advanced Computer Science and Applications 2018 DOI: 10.14569/IJACSA.2018.091018 EID: 2-s2.0-85057285042

Maritime cybersecurity policy: the scope and impact of evolving technology on international shipping
Kimberly Tam and Kevin D. Jones
Journal of Cyber Policy, DOI: 10.1080/23738871.2018.1513053

Books

Biometrically linking document leakage to the individuals responsible
Abdulrahman Alruban, Nathan Clarke, Fudong Li, Steven Furnell
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
DOI: 10.1007/978-3-319-98385-1_10EID: 2-s2.0-85052853636

Continuous user authentication using smartwatch motion sensor data
Neamah Al-Naffakh, Nathan Clarke, Fudong Li
IFIP Advances in Information and Communication Technology
DOI: 10.1007/978-3-319-95276-5_2EID: 2-s2.0-85049809585

Misuse detection in a simulated IaaS environment
Burhan Al-Bayati, Nathan Clarke, Paul Dowland, Fudong Li
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
DOI: 10.1007/978-3-030-04372-8_9EID: 2-s2.0-85057862439

Edited books  

Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018)
Clarke NL, Furnell SM
Dundee, Scotland, UK, 29-31 August, ISBN: 978-024440-254-9, 292pp, 2018

Conference papers

Design Principles and Guidelines for Targeted Security Awareness
Mahmoud N, Furnell SM, Haskell-Dowland PS (Dowland PS)
Proceedings of the Annual Information Institute Conference, March 26-28, Las Vegas, USA, ISBN: 978-1-935160-19-9, 2018

Misuse Detection in a Simulated IaaS Environment
Al-Bayati B, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F
1st International Workshop on Emerging Technologies for Authorization and Authentication, ISBN: 978-3-030-04371-1, pp103-115, 2018

Continuous identity verification in cloud storage services using behavioural profiling
Al-Bayati B, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F
17th European Conference on Cyber Warfare and Security ECCWS 2018, 28-29 June, ISBN: 978-1-911218-85-2, pp1-10, 2018

The Cyber Security Degree Apprenticeship: An Academic Route to Embedding Professional Skills
Vasileiou I, Clarke NL
17th Annual Security Conference, Las Vegas, 26- 28 March 2018, 2018

An evaluation of Accelerated Learning Degrees
Vasileiou I
HEA STEM Conference , Newcastle, UK, 31 January - 1 February 2018, 2018

Enhancing Security Education Recognising Threshold Concepts and other influencing factors
Vasileiou I, Furnell SM
Proceedings of ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy, Funchal, Madeira, Portugal, 22-24 January 2018, pp398-403, 2018

Non-Intrusive Appliance Load Monitoring using Genetic Algorithms
Hock, D., Kappes, M., & Ghita, B. (2018).
In IOP Conference Series: Materials Science and Engineering Vol. 366 (pp. 012003). 

Trust-Based Composition of M2M Application Services
Shala, B., Trick, U., Lehmann, A., Ghita, B., & Shiaeles, S. (2018).
In International Conference on Ubiquitous and Future Networks, ICUFN Vol. 2018-July (pp. 250-255).

Distributed NFV Orchestration in a WMN-Based Disaster Network
Frick, G., Lehmann, A., Frick, G., Tchinda, A. P., & Ghita, B. (2018).
In International Conference on Ubiquitous and Future Networks, ICUFN Vol. 2018-July (pp. 168-173).

A multi-algorithmic approach for gait recognition
Al-Obaidi, H., Li, F., Clarke, N., Ghita, B., & Ketab, S. (2018).
In European Conference on Information Warfare and Security, ECCWS Vol. 2018-June (pp. 20-28).

Towards dynamic network policy composition and conflict resolution in software defined networking
Bakhshi, T., & Ghita, B. (2018).
In 2017 International Conference on Information and Communication Technologies, ICICT 2017 Vol. 2017-December (pp. 34-39).

A comparison of compliance with data privacy requirements in two countries
Adéle Da Veiga, Ruthea Vorster, Dr Fudong Li, Nathan Clarke, Steven Furnell
26th European Conference on Information Systems: Beyond Digitization - Facets of Socio-Technical Change, ECIS 2018 EID: 2-s2.0-85061306122

A Holistic Framework for Enhancing Privacy Awareness
A. Alshehri, N.L. Clarke, F. Li
21st Saudi Computer Society National Computer Conference, NCC 2018 DOI: 10.1109/NCG.2018.8592972EID: 2-s2.0-85061509838

A novel multimedia-forensic analysis tool (M-FAT)
Shahlaa Mashhadani, Hiba Al-kawaz, Nathan Clarke, Steven Furnell, Fudong Li
2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017 DOI: 10.23919/ICITST.2017.8356429EID: 2-s2.0-85048058900

Advanced facial recognition for digital forensics
Hiba Al-Kawaz, N. Clark, Steven M. Furnell, Dr Fudong Li, A. Alburan
European Conference on Information Warfare and Security, ECCWS EID: 2-s2.0-85050819340

An analysis of home user security awareness & education
Fayez Alotaibi, Nathan Clarke, Steven Furnell
2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017 DOI: 10.23919/ICITST.2017.8356359EID: 2-s2.0-85048046127

Automating the harmonisation of heterogeneous data in digital forensics
Hussam J. Mohammed, Nathan L. Clarke, Fudong Li
European Conference on Information Warfare and Security, ECCWS 2018 EID: 2-s2.0-85050796624

Evidence identification in heterogeneous data using clustering
Hussam Mohammed, Nathan L Clarke, Fudong Li
ACM International Conference Proceeding Series 2018 DOI: 10.1145/3230833.3233271EID: 2-s2.0-85055265106

Information security behavior: Recognizing the influencers
Manal Alohali, Nathan Clarke, Steven Furnell, Saad Albakri
Proceedings of Computing Conference 2017DOI: 10.1109/SAI.2017.8252194EID: 2-s2.0-85046038115

The Current Situation of Insider Threats Detection: An Investigative Review
Alotibi Gaseb, Clarke Nathan, Li Fudong, Steven Furnell
21st Saudi Computer Society National Computer Conference, NCC 2018 DOI: 10.1109/NCG.2018.8592986EID: 2-s2.0-85061507058

Transparent authentication: Utilising heart rate for user authentication
Timibloudi S Enamamu, Nathan Clarke, Paul Haskell-Dowland, Fudong Li
2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017 DOI: 10.23919/ICITST.2017.8356401EID: 2-s2.0-85048052371

Contributions to edited books

Personalising Security Education ‐ Factors influencing individual awareness and compliance
Vasileiou I, Furnell SM
Information Systems Security and Privacy, Fourth International Conference, ICISSP 2018, Madeira, Portugal, Jaruary 22-24, 2018, Revised Selected Papers, P.Mori, S.Furnell and O.Camp (Eds.), Communications in Computer and Information Science, Springer, 2018

2017

Journal papers

The ABC of ransomware protection
Furnell SM, Emm D
Computer Fraud & Security, Volume 2017, Issue 10, October 2017, Pages 5-11, 2017

Security education and awareness: just let them burn?
Furnell SM, Vasileiou I
Network Security, Volume 2017, Issue 12, December 2017, Pages 5-9, 2017

A toolkit approach to information security awareness and education
Korovessis P, Furnell SM, Papadaki M, Haskell-Dowland PS (Dowland PS)
Journal of Cybersecurity Education, Research and Practice, Vol. 2017, Iss. 2, Art. 5, ISSN: 2472-2707, 2017

A novel privacy preserving user identification approach for network traffic
Clarke NL, Li F, Furnell SM
Computers & Security, Volume 70, September 2017, Pages 335-350, 2017

The impact of security and its antecedents in behaviour intention of using e-government services
Alharbi N, Papadaki M, Haskell-Dowland PS (Dowland PS)
Journal of Behaviour and Information Technology, ISSN: 0144-929X, Vol 36, Iss 6, pp620-636, 2017

Signals of opportunity geolocation methods for urban and indoor environments
Mansfield T, Ghita BV, Ambroze MA
Annals of Telecommunications, Springer Paris, pp 1-11, 2017

Can't get the staff? The growing need for cyber-security skills
Furnell SM, Fischer P, Finch A
Computer Fraud & Security, Volume 2017, Issue 2, February 2017, Pages 5-10, 2017

AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection
Feizollah A, Anuar NB, Salleh R, Suarez-Tangil G, Furnell SM
Computers & Security, Volume 65, Pages 121-134, 2017

Evaluating the effect of guidance and feedback upon password compliance
Furnell SM, Esmael R
Computer Fraud & Security, Volume 2017, Issue 1, January, Pages 5-10, 2017

M2M Application Service Provision: An Autonomous and Decentralised Approach
Steinheimer, M., Trick, U., Fuhrmann, W., Ghita, B., & Frick, G. (2017).
Journal of Communications, 12(9), 489-498. 

Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks
Marchang, J., Ghita, B., & Lancaster, D. (2017).
Ad Hoc Networks, 63, 62-78. 

Signals of opportunity geolocation methods for urban and indoor environments
Mansfield, T. O., Ghita, B. V., & Ambroze, M. A. (2017).
Annals of Telecommunications, 72(3-4), 145-155.

Edited books  

Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017)
Furnell SM, Clarke NL
Adelaide, Australia, 28-30 November, ISBN: 978-1-84102-428-8, pp314, 2017
Support independent publishing: Buy this book on Lulu.

Information Systems Security and Privacy
Camp O, Furnell SM, Mori P
Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Springer, Revised Selected Papers, 2017

Conference papers

Transparent Authentication: Utilising Heart Rate for User Authentication
Enamamu T, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F
International Conference for Internet Technology and Secured Transactions (ICITST-2017) , pp283-289, ISBN:978-1-9083-207-97, 2017

iPads in Education: Positive Pedagogy versus Problematic Practicalities
Furnell SM, Vasileiou I, Outram N
Proceedings of the London International Conference on Education (LICE-2017), Cambridge, UK, 11-14 December 2017, 2017

Body Temperature Authentication for Secure Smartwatch to Smart Device Communication
Enamamu T, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F
Proceedings of the IEEE International Conference on Computing, Networking and Informatics (ICCNI 2017) , ISBN: 978-1-5090-4643-0, pp1-7, 2017

Insider Misuse Attribution using Biometrics
Alruban A, Clarke NL, Li F, Furnell SM
Proceedings of the 12th International Conference on Availability, Reliability and Security (p. 42). ACM. ISBN: 978-1-4503-5257-4, , doi:10.1145/3098954.3103160, 2017

Enabling Secure Cloud Storage through Transparent Authentication
Abed L, Clarke NL, Ghita BV
Proceedings of the 8th Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2017), Singapore, 21st- 22nd August, pp 14-23, ISSN: 2251-2136, E-periodical: 2251-2144, 2017, 2017

Unobtrusive Gait Recognition Using Smartwatches
Al-Naffakh N, Clarke NL, Li F, Haskell-Dowland PS (Dowland PS)
International Conference of the Biometrics Special Interest Group (BIOSIG), 20-22 September, Darmstadt, Germany, pp211-218, ISBN 978-3-88579-664-0, 10.23919/BIOSIG.2017.8053523, 2017

Towards Targeted Security Awareness Raising
Mahmoud N, Furnell SM, Haskell-Dowland PS (Dowland PS)
Proceedings of the Annual Information Institute Conference, 18-20 April, Las Vegas, USA, ISBN: 978-1-935160-18-2, 2017

Information Security Behavior: Recognizing The Influencers
Alohali M, Clarke NL, Furnell SM
Proceedings of The SAI Computing Conference 2017, 2017

A Forensic Acquisition Based upon A Cluster Analysis of Non-Volatile Memory in IaaS
Alqahtany S, Clarke NL, Furnell SM, Reich C
Anti-Cyber Crimes (ICACC), 2nd International Conference on, pp 123-128, 2017

Insider Misuse Identification using Transparent Biometrics
Clarke NL, Li F, Alruban A, Furnell SM
Proceedings of the 50th Hawaii International Conference on System Sciences, January 04 - 07, Hawaii USA, 2017

Evaluating cloud computing scheduling algorithms under different environments and scenarios
Vijay, Y., Ghita, B. V., & IEEE. (2017).
In 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

Peak-to-Average Reduction by Community-Based DSM
Yaseen, Y., Ghita, B., & IEEE. (2017).
In 2017 5th IEEE International Conference on Smart Energy Grid Engineering (SEGE) (pp. 194-199).

Decentralised System Architecture for Autonomous and Cooperative M2M Application Service Provision
Steinheimer, M., Trick, U., Ghita, B., Fuhrmann, W., & IEEE. (2017).
In 2017 IEEE International Conference on Smart Grid and Smart Cities (ICSGSC) (pp. 312-317).

Trust Integration for Security Optimisation in P2P-based M2M Applications
Shala, B., Wacht, P., Trick, U., Lehmann, A., Shala, B., Ghita, B., IEEE. (2017).
In 2017 16TH IEEE International Conference on Trust, Security and Privacy in Computing and Communications / 11th IEEE International Conference on Big Data Science and Engineering / 14th IEEE International Conference on Embedded Software and Systems (pp. 949-954). 

Framework for Automated Functional Testing of P2P-based M2M Applications
Shala, B., Wacht, P., Trick, U., Lehmann, A., Shala, B., Ghita, B., IEEE. (2017).
In 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN 2017)(pp. 916-921).

Bit precision and Cyclic prefix effect on OFDM power consumption estimation
Al-Obaidi, S., Ambroze, M., Outram, N., & Ghita, B. (2017).
In ACM International Conference Proceeding Series Vol. Part F128004 (pp. 36-40). doi:10.1145/3057109.3057123

QoE-Driven Video Enhancements in Wireless Networks through Predictive Packet Drops
Khambari, N., Ghita, B., Sun, L., & IEEE. (2017).
In 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB) (pp. 355-361).

Performance Analysis of WMN Routing Protocols for Disaster Networks
Tchinda, A. P., Frick, G., Trick, U., Lehmann, A., Tchinda, A. P., Ghita, B., & IEEE. (2017).
In 2017 IEEE Symposium on Communications and Vehicular Technology (SCVT).

Ensuring Trustworthiness for P2P-based M2M Applications
Shala, B., Wacht, P., Trick, U., Lehmann, A., Shala, B., Ghita, B., & Shiaeles, S. (2017).
In Proceedings of the 2017 7th International Conference Internet Technologies and Applications (ITA) (pp. 58-63).

Autonomous decentralised M2M Application Service Provision
Steinheimer, M., Trick, U., Steinheimer, M., Ghita, B., & Fuhrmann, W. (2017).
In Proceedings of the 2017 7th International Conference Internet Technologies and Applications (ITA) (pp. 18-23).

Automated Functional Testing of P2P-based M2M Applications
Shala, B., Wacht, P., Trick, U., Lehmann, A., Shala, B., Ghita, B., & Shiaeles, S. (2017).
In Proceedings of the 2017 7th International Conference Internet Technologies and Applications (ITA) (pp. 29-34).

Assay of IP Mobility Management in SDN based Mobile Network Architecture
Dawood, M., Fuhrmann, W., & Ghita, B. V. (2017).
In Proceedings of the 2017 7th International Conference Internet Technologies and Applications (ITA) (pp. 69-74).

2016

Journal papers

Literature Studies on Security Warnings Development
Zaaba ZF, Furnell SM, Haskell-Dowland PS (Dowland PS)
International Journal on Perceptive and Cognitive Computing, Vol 2, Iss 1, pp8-18, 2016

Identifying Users by Network Traffic Metadata
Alotibi G, Clarke NL, Li F, Furnell SM
International Journal of Chaotic Computing, Volume 4, Issue 2, 2016

A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches
Al-Naffakh N, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F
International Journal for Information Security Research, Volume 6, Issue 3, 2016

Graphical One-Time Password (GOTPass): A usability evaluation
Alsaiari H, Papadaki M, Haskell-Dowland PS (Dowland PS), Furnell SM
Information Security Journal: a Global Perspective, ISSN: 1939-3547, Vol 25, Iss 1-3, pp94-108, 2016

On Internet Traffic Classification: A Two-Phased Machine Learning Approach
Bakhshi T, Ghita BV
Journal of Computer Networks and Communications, Volume 2016 (2016), Article ID 2048302, 21 pages, 2016

An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data
Mohammed H, Clarke NL, Li F
The Journal of Digital Forensics, Security and Law: JDFSL, Volume 11 Issue 2 Pages 137-152, 2016

Leveraging Biometrics for Insider Misuse Identification
Alruban A, Clarke NL, Li F, Furnell SM
International Journal on Cyber Situational Awareness (IJCSA), Vol. 1, No. 1, 2016, article 7, 2016

The usability of security - revisited
Furnell SM
Computer Fraud & Security, ISSN: 1361-3723, September 2016, pp5-11, 2016

Assessing Staff Acceptance and Compliance with Information Security
Alotaibi T, Furnell SM
International Journal of Computing Academic Research (IJCAR), ISSN 2305-9184, Volume 5, Number 4 (August 2016), pp.195-201, 2016

Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis
Al-Bayati B, Clarke NL, Haskell-Dowland PS (Dowland PS)
GSTF Journal on Computing (JOC), ISSN:2251-3043, Vol. 5, Iss.1, pp21-28, 2016
Winner of the Best Student Paper award at the 7th Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2016).

A suspect-oriented intelligent and automated computer forensic analysis
Al Fahdi M, Clarke NL, Li F, Furnell SM
Digital Investigation, Volume 18, pp. 65-76, 2016

Awareness of Mobile Device Security: A Survey of User's Attitudes
Clarke NL, Symes JE, Saevanee H, Furnell SM
International Journal of Mobile Computing and Multimedia Communications (IJMCMC), Vol 7, Iss 1, 2016

A Novel Taxonomy for Mobile Applications Data
Alotaibi S, Furnell SM, Clarke NL
International Journal of Cyber-Security and Digital Forensics (IJCSDF), ISSN: 2305-0012, Vol. 5, No. 3, pp115-121, 2016

On Internet Traffic Classification: A Two-Phased Machine Learning Approach
Bakhshi, T., & Ghita, B. (2016).
Journal of Computer Networks and Communications, 2016, 1-21.

Continuous and transparent multimodal authentication: reviewing the state of the art
Abdulwahid Al Abdulwahid, Nathan Clarke, Ingo Stengel, Steven Furnell & Christoph Reich
Cluster Computing 2016, DOI: 10.1007/s10586-015-0510-4EID: 2-s2.0-84948415695

Information security policy compliance model in organizations
Nader Sohrabi Safa, Rossouw Von Solms, Steven Furnell
Computers and Security 2016, DOI: 10.1016/j.cose.2015.10.006EID: 2-s2.0-84947072811

Verifying Inevitability of Oscillation in Ring Oscillators Using the Deductive SOS-QE Approach
Hafiz ul Asad, Kevin D. Jones
IEEE Design and Test, DOI: 10.1109/MDAT.2016.2573588EID: 2-s2.0-84983757579

Edited books  

Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016
Katsikas SK, Lambrinoudakis C, Furnell SM
Porto, Portugal, September 7-8. Lecture Notes in Computer Science 9830, Springer, ISBN 978-3-319-44340-9 123pp, 2016
  
Advances in Communications, Electronics, Networks, Robotics and Security Volume 13
Haskell-Dowland PS (Dowland PS)
Plymouth University, ISBN: 978-1-326-72810-6, pp160, 2016
  
Proceedings of the Eleventh International Network Conference (INC 2016)
Alekseev S, Haskell-Dowland PS (Dowland PS), Ghita BV, Schneider O
Frankfurt, Germany, 19-21 July, ISBN: 978-1-84102-410-3, pp192, 2016
  
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016)
Clarke NL, Furnell SM
Frankfurt, Germany, 19-21 July, ISBN: 978-1-84102-413-4, pp313, 2016

Conference papers

Traffic profiling: Evaluating stability in multi-device user environments
Bakhshi T, Ghita BV
Advanced Information Networking and Applications Workshops (WAINA), 2016 30th International Conference on, Crans-Montana, pp. 731-736, 2016

User-centric traffic optimization in residential software defined networks
Bakhshi T, Ghita BV
Telecommunications (ICT), 2016 23rd International Conference on, Thessaloniki, pp. 1-6, 2016

IP Prefix Hijack Detection Using BGP Attack Signatures and Connectivity Tracking
Alshamrani H, Ghita BV
2016 International Conference on Software Networking (ICSN), Jeju, pp. 1-7, 2016

IP prefix hijack detection using BGP connectivity monitoring
Alshamrani H, Ghita BV
High Performance Switching and Routing (HPSR), 2016 IEEE 17th International Conference on, 14-17 June, Yokohama, pp 35-41, 2016

User-Centric Network Provisioning in Software Defined Data Center Environment
Bakhshi T, Ghita BV
Local Computer Networks (LCN), 2016 IEEE 41st Conference on, 7-10 November, Dubai, pp 289-297, 2016

Software Defined Privacy
Kemmer F, Reich C, Knahl MH, Clarke NL
International Conference on High Performance Computing, Cloud Engineering Workshop (IC2EW), 2016 IEEE International Conference on, pp 25-39, Berlin, 4-8 April 2016, 2016

Providing Security in Container-Based HPC Runtime Environments
Gantikow H, Reich C, Knahl MH, Clarke NL
International Conference on High Performance Computing, In: Taufer M., Mohr B., Kunkel J. (eds) High Performance Computing. ISC High Performance 2016. Lecture Notes in Computer Science, vol 9945. Springer, Cham, 2016

Information Security Policies: A Review of Challenges and Influencing Factors
Alotaibi M, Furnell SM, Clarke NL
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp 352-358, Barcelona, Spain, 2016

User profiling from network traffic via novel application-level interactions
Alotibi G, Clarke NL, Li F, Furnell SM
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp 279-285, Barcelona, Spain, 2016

Activity Recognition using wearable computing
Al-Naffakh N, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 189-195, Barcelona, Spain, 2016

The role of Visualisation in the study of Computer Programming
Alhammad S, Atkinson S, Stuart L
the Proceedings of the 27th Annual Workshop of the Psychology of Programming Interest Group - PPIG 2016, pp. 5-16, Cambridge, UK, 2016

A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment
Alqahtany S, Clarke NL, Furnell SM, Reich C
11th International Conference on Availability, Reliability and Security, 31 August -2 September, 2016

Increasing eLearning Engagement Using Mobile Technologies
Triantafyllidis A, Clarke NL, Haskell-Dowland PS (Dowland PS), Vranopoulos G
9th annual International Conference of Education, Research and Innovation (ICERI2016), 14-16 November, Seville, Spain, pp8644-8653, ISBN: 978-84-617-5895-1, ISSN: 2350-1095, 2016

The Value of the Biometrics in Invigilated E-Assessments
Ketab S, Clarke NL, Haskell-Dowland PS (Dowland PS)
Proceedings of the the 8th Annual International Conference on Education and New Learning Technologies, Barcelona, Spain, 4-6 July, ISBN: 978-84-608-8860-4, ISSN: 2340-1117, 2016

Assay of Multipath TCP for Session Continuity in Distributed Mobility Management
Dawood M, Fuhrmann W, Ghita BV
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp141-146, ISBN: 978-1-84102-410-3, 2016

Efficient Test Case Derivation from Statecharts-Based Models
Wacht P, Trick U, Fuhrmann W, Ghita BV
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp127-132, ISBN: 978-1-84102-410-3, 2016

P2P-based M2M Community Applications
Steinheimer M, Trick U, Fuhrmann W, Ghita BV
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp115-120, ISBN: 978-1-84102-410-3, 2016

QoE Enhancements in IEEE 802.11e EDCA for Video Transmission through Selective Queueing
Khambari MBM, Ghita BV, Lancaster D, Sun L
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp85-90, ISBN: 978-1-84102-410-3, 2016

A Field Study on Linked and Open Data at Datahub.io
Heuss T, Fengel J, Humm B, Harriehausen-Mühlbauer B, Atkinson S
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp79-84, ISBN: 978-1-84102-410-3, 2016

Acceptance Factors of Wearable Computing: An Empirical Investigation
Gribel L, Regier S, Stengel I
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp67-72, ISBN: 978-1-84102-410-3, 2016

Mobile Edge Computing: Requirements for Powerful Mobile Near Real-Time Applications
Frank H, Fuhrmann W, Ghita BV
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp63-66, ISBN: 978-1-84102-410-3, 2016

A Review on Power Consumption Reduction Techniques on OFDM
Al-Obaidi S, Ambroze MA, Ghita BV, Giacoumidis E, Tsokanos A
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp3-8, ISBN: 978-1-84102-410-3, 2016

Proactive Biometric-Enabled Forensic Imprinting
Alruban A, Clarke NL, Li F, Furnell SM
International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016), June 13-14, London, UK, 2016
Winner of the Best Paper Award (Cyber Incident 2016)

Location Based Transmission Using a Neighbour Aware-Cross Layer MAC for Ad Hoc Networks
Marchang J, Ghita BV, Lancaster D
Wired/Wireless Internet Communications (WWIC), 14th IFIP WG 6.2 International Conference, Thessaloniki, Greece, May 25-27, Volume 9674 of the series Lecture Notes in Computer Science pp 15-27, Springer, ISBN: 978-3-319-33935-1, 2016

A Scalable Architecture for Distributed OSGi in the Cloud
Kuijs H, Knahl MH, Clarke NL, Reich C
Proceedings of the 6th International Conference on Cloud Computing and Services Science, CLOSER 2016, pp109-117, ISBN: 978-989-758-182-3, 2016
Awarded 'Best Student Paper Award"

Evidence collection in cloud provider chains
Rübsamen, T., Reich, C., Clarke, N., Knahl, M.
Proceedings of the 6th International Conference on Cloud Computing and Services Science,  CLOSER 2016, pp59-70   EID: 2-s2.0-84979736756

Information Security and Practice: The User's Perspective
Clarke NL, Li F, Furnell SM, Stengel I, Ganis G
Proceedings of the 11th International Conference On Cyber Warfare and Security (ICCWS-2016), pp81-89, ISSN:2048-9870, ISBN:9781910810835, 17-18 March 2016, Boston, USA, 2016

2015

Journal papers

Active Authentication: The Panacea of Access Control
Clarke NL, Li F
Journal of Information System Security, Volume 11, Number 3, pp185-199, ISSN 1551-0123, 2015

A Fine-Grained Analysis of User Activity on Mobile Applications: The Sensitivity Level Perception
Alotaibi S, Furnell SM, Clarke NL
International Journal for Information Security Research (IJISR), Volume 5, Issue 3, pp591-599, 2015

A Conceptual Model for Cultivating an Information Security Culture
Sherif E, Furnell SM
International Journal for Information Security Research (IJISR), Volume 5, Issue 2, pp565-573, 2015

Secure Graphical One Time Password (GOTPass): An Empirical Study
Alsaiari H, Papadaki M, Haskell-Dowland PS (Dowland PS), Furnell SM
Information Security Journal: A Global Perspective, 24, pp207-220, 2015

A forensic acquisition and analysis system for IaaS
Alqahtany S, Clarke NL, Furnell SM, Reich C
Cluster Computing, pp1-15, 2015

Continuous and transparent multimodal authentication: reviewing the state of the art
Al Abdulwahid A, Clarke NL, Stengel I, Furnell SM, Reich C
Cluster Computing, pp1-20, 2015

Dynamic Queue Utilization Based MAC for Multi-Hop Ad Hoc Networks
Marchang J, Ghita BV, Lancaster D
Infocommunications Journal - A Scientific Association for Infocommunications (HTE), Volume VII Number 3 ISSN 2061-2079, pages: 25-32, 2015

Continuous user authentication using multi-modal biometrics
Saevanee H, Clarke NL, Furnell SM, Biscioneb V
Computers & Security, Vol. 53, pp234-246, 2015

Language-independent gender identification through keystroke analysis
Tsimperidis I, Katos V, Clarke NL
Information and Computer Security, Vol. 23 Iss. 3, pp.286-301, 2015

A systematic review of approaches to assessing cybersecurity awareness
Noor Hayani Abd Rahim , Suraya Hamid , Miss Laiha Mat Kiah , Shahaboddin Shamshirband , Steven Furnell
Kybernetes 2015, DOI: 10.1108/K-12-2014-0283EID: 2-s2.0-84930789675

Information security conscious care behaviour formation in organizations
Nader Sohrabi Safa, Mehdi Sookhak, Rossouw Von Solms, Steven Furnell, Norjihan Abdul Ghania, Tutut Herawan
Computers and Security, DOI: 10.1016/j.cose.2015.05.012, EID: 2-s2.0-84935921946

Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions
Adnan Akhunzadaa, Mehdi Sookhaka, Nor Badrul Anuar,  Abdullah Gani, Ejaz Ahmeda, Muhammad Shiraz, Steven Furnell, Amir Hayat,  Muhammad Khurram Khand
Journal of Network and Computer Applications, DOI: 10.1016/j.jnca.2014.10.009, EID: 2-s2.0-84913528992

Managing privacy settings: Lots of options, but beyond control?
Steve Furnell
Computer Fraud and Security, DOI: 10.1016/S1361-3723(15)30027-0, EID: 2-s2.0-84928232130

Security transparency: the next frontier for security research in the cloud
Moussa Ouedraogo, Severine Mignon, Herve Cholez, Steven Furnell & Eric Dubois
Journal of Cloud Computing, DOI: 10.1186/s13677-015-0037-5EID: 2-s2.0-85006218746

Surveying the development of biometric user authentication on mobile phones
Weizhi Meng, Duncan S. Wong, Steven Furnell, Jianying Zhou
IEEE Communications Surveys and Tutorials, DOI: 10.1109/COMST.2014.2386915, EID: 2-s2.0-84929796028

The challenge of measuring cyber-dependent crimes
Steven Furnell, David Emm, Maria Papadaki
Computer Fraud and Security, DOI: 10.1016/S1361-3723(15)30093-2EID: 2-s2.0-8494558956

Books

An identification of variables influencing the establishment of information security culture
Emad Sherif, Steven Furnell, Nathan Clarke
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
DOI: 10.1007/978-3-319-20376-8_39EID: 2-s2.0-84944032457


From passwords to biometrics: In pursuit of a panacea
S. M. Furnell
Communications in Computer and Information Science
DOI: 10.1007/978-3-319-27668-7_1EID: 2-s2.0-84955302679

Security, privacy and usability – a survey of users’ perceptions and attitudes
Abdulwahid Al Abdulwahid, Nathan Clarke, Ingo Stengel, Steven Furnell, Christoph Reich
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
DOI: 10.1007/978-3-319-22906-5_12EID: 2-s2.0-84943623741

Conference papers

Prospects for TV White Space access in the Evolved Packet Core Environment
Dawood M, Fuhrmann W, Ghita BV
Internet Technologies and Applications (ITA), Wrexham, UK, 8-11 Sept, pp47-52, ISBN: 978-1-4799-8036-9, 2015

Towards privacy for ambient assisted living in a hybrid cloud environment
Kuijs H, Reich C, Knahl MH, Clarke NL
Proceedings of the 2nd Baden-Württemberg Center of Applied Research Symposium on Information and Communication Systems - SInCom 2015, pp41-45; ISBN 978-3-00-051859-1, 2015

A Context-aware, Intelligent and Flexible Ambient Assisted Living Platform Architecture
Kuijs H, Rosencrantz C, Reich C
Proceedings of Cloud Computing 2015: The Sixth International Conference on Cloud Computing, GRIDs and Virtualization, pp70-76 ISBN: 978-1-510801561, 2015

Transparent Authentication Systems for Mobile Device Security: A Review
Alotaibi S, Furnell SM, Clarke NL
10th International Conference for Internet Technology and Secured Transactions (ICITST), 14-16 Dec, pp. 406-413, 2015

Awareness, behaviour and culture: The ABC in cultivating security compliance
Emad Sherif, Steven Furnell, Nathan Clarke
10th International Conference for Internet Technology and Secured Transactions, ICITST 2015

A secure sharing design for multi-tag RFID authentication protocol
Al-Adhami AH, Ambroze MA, Christopher C, Stengel I, Tomlinson M
Proceedings of the 8th Australian Security and Intelligence Conference, Perth, Australia, 30 Nov-2 Dec, pp 87-93, ISBN: 0-7298-0735-5, 2015

A Review of Graphical Authentication Utilising a Keypad Input Method
Alsaiari H, Papadaki M, Haskell-Dowland PS (Dowland PS), Furnell SM
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, pp359-374, 2015

Towards Dynamic Adaption of User's Organisational Information Security Behaviour
Alotaibi M, Furnell SM, Clarke NL
Proceedings of the 13th Australian Information Security Management Conference (AISM2015), Perth, Australia, pp28-36, ISBN 0-7298-0733-9, 2015

Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes
Al Abdulwahid A, Clarke NL, Furnell SM, Stengel I, Reich C
12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2015), Valencia, Spain, September 1-2, pp153-168, ISBN 978-3-319-22906-5, 2015

Active Authentication: The Panacea of Access Control?
Clarke NL, Li F
Proceedings of the 14th Annual Security Conference, May 19-21, Las Vegas, USA, 2015

A Survey of Continuous and Transparent Multibiometric Authentication Systems
Al Abdulwahid A, Clarke NL, Furnell SM, Stengel I, Reich C
Proceedings of the 14th European Conference on Cyber Warfare and Security (ECCWS-2015), pp 1-10, ISBN: 978--91081-2-3, ISSN: 204-8610, 2015

Forensic Investigation of Network Traffic: A Study into the Derivation of Application-Level features from Network-Level Metadata
Li F, Clarke NL, Alotibi G, Joy D
6th Annual International Conference on ICT: Big data, Could and Security (ICT-BDCS 2015), 27-28 July, ISSN: 2382-5669, pp68-73, 2015

Queue Utilization with Hop Based Enhanced Arbitrary Inter Frame Spacing MAC for Saturated Ad Hoc Networks
Marchang J, Ghita BV, Lancaster D
Med-Hoc-Net 2015, The 14th IFIP Annual Mediterranean Ad Hoc Networking Workshop, June 17-18, Vilamoura, Algarve, Portugal, ISBN 978-1-4673-7306-7, 2015

Dynamic Queue Utilization Based MAC for Multi-Hop Ad Hoc Networks
Marchang J, Ghita BV, Lancaster D
European Wireless 2015 - 21th European Wireless Conference, 20-22 May, Budapest, Hungary, ISBN 978-3-8007-3976-9, ISSN 2198-3909, pp362-367, 2015

The Current Use of Authentication Technologies: An Investigative Review
Al Abdulwahid A, Clarke NL, Stengel I, Furnell SM, Reich C
Proceedings of the IEEE 2015 International Conference on Cloud Computing (ICCC15), pp 239-246, ISBN 15: 978-1-4673-6618-2, 2015

Cloud Forensics: A Review of Challenges, Solutions and Open Problems
Alqahtany S, Clarke NL, Furnell SM, Reich C
Proceedings of the IEEE 2015 International Conference on Cloud Computing (ICCC15), pp 88-96, ISBN 15: 978-1-4673-6618-2, 2015

Behavioral-Based Feature Abstraction from Network Traffic
Alotibi G, Li F, Clarke NL, Furnell SM
10th International Conference on Cyber warfare and Security, Kruger National Park, South Africa, 24-25 March, pp1-9, ISBN 978-1-910309-97-1, 2015

E-Invigilation of E-Assessments
Ketab S, Clarke NL, Haskell-Dowland PS (Dowland PS)
Proceedings of INTED2015 Conference 2nd-4th March 2015, Madrid, Spain, ISBN: 978-84-606-5763-7, 2015

Inevitability of phase-locking in a charge pump phase lock loop using deductive verification
Hafiz ul Asad, Kevin D Jones
Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI, DOI: 10.1145/2742060.2742072, EID: 2-s2.0-84955442331

Verifying inevitability of phase-locking in a charge pump phase lock loop using sum of squares programming
Hafiz ul Asad, Kevin D Jones
Proceedings - Design Automation Conference, DOI: 10.1145/2744769.2744926, EID: 2-s2.0-84944088581

Edited books  

Advances in Communications, Computing, Electronics, Networks, Robotics and Security Volume 12
Haskell-Dowland PS (Dowland PS)
Plymouth University, ISBN: 978-1-326-72586-0, pp172, 2015
Support independent publishing: Buy this book on Lulu.
 
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015)
Furnell SM, Clarke NL
Lesvos, Greece, July 1-3, ISBN: 978-1-84102-388-5, pp295, 2015
Support independent publishing: Buy this book on Lulu.

2014

Journal papers

Android Forensic Data Analyzer (AFDA): An Opensource Tool to Automatize Event Correlation Analysis on Android Devices
Kasiaras D, Zafeiropoulos T, Clarke NL, Kambourakis G
International Journal for Information Security Research (IJISR), Vol. 4, Iss. 4, pp501-509, 2014

A Self-Learning Network Anomaly Detection System using Majority Voting
Hock D, Kappes M
Proceedings of the Tenth International Network Conference (INC 2014), Plymouth, UK, July 8-9, pp59-69, ISBN: 978-1-84102-373-1, 2014
Can be ordered on-line.
Download PDF

Security Factors Influencing End Users' Adoption of E-Government
Alharbi N, Papadaki M, Haskell-Dowland PS (Dowland PS)
Journal of Internet Technology and Secured Transaction (JITST), Volume 3, Issues 3/4, pp320-328, 2014

The Price of Patching
Furnell SM, van Niekerk J, Clarke NL
Computer Fraud and Security, Issue 8, pp8-13, 2014

An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks
Sedjelmaci H, Senouci S-M, Abu-Rgheff MA
Internet of Things Journal, IEEE, Volume:1, Issue: 6, pp570 - 577, 2014

Artificial Neural Network Nonlinear Equalizer for Coherent Optical OFDM
Jarajreh MA, Giacoumidis E, Aldaya I, Le ST, Tsokanos A, Ghassemlooy Z, Doran NJ
IEEE Photonics Technology Letters, Issue: 99, 2014

End-to-middle-to-end solution for IMS media plane security
Fajardo JO, Liberal F, Li F, Clarke NL, Mkwawa IH
Electronic Commerce Research, Springer US, 2014

Volterra-Based Reconfigurable Nonlinear Equalizer for Coherent OFDM
Giacoumidis E, Aldaya I, Jarajreh MA, Tsokanos A, Le ST, Farjady F, Jaouën Y, Ellis AD, Doran NJ
Photonics Technology Letters, IEEE, Volume 26, Issue 14, pp1383-1386, 2014

Factors for Measuring Password-Based Authentication Practices
Mattord HJ, Levy Y, Furnell SM
Journal of Information Privacy and Security, pp71-94, 2014

D-FICCA: A Density-based Fuzzy Imperialist Competitive Clustering Algorithm for Intrusion Detection in Wireless Sensor Networks
Shamshirband S, Amini A, Anuar NB, Kiah LM, Wah TY, Furnell SM
Measurement, Volume 55, September, pp212–226, 2014

Dual-polarization multi-band optical OFDM transmission and transceiver limitations for up to 500 Gb/s uncompensated long-haul links
Giacoumidis E, Jarajreh MA, Sygletos S, Le ST, Farjady F, Tsokanos A, Hamié A, Pincemin E, Jaouën Y, Ellis AD, Doran NJ
Optics Express, Vol. 22, Issue 9, pp10975-10986, 2014

Investigating the Viability of Multifactor Graphical Passwords for User Authentication
Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS)
Information Security Journal: A Global Perspective, 00:1–12, ISSN: 1939-3555, Published online: 18 Apr 2014, 2014

FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks
Shiaeles SN, Papadaki M
The Computer Journal, Vol. 58, No.4, pp892-903, 2014

Active authentication for mobile devices utilising behaviour profiling
Li F, Clarke NL, Papadaki M, Haskell-Dowland PS (Dowland PS)
International Journal of Information Security, Volume 13, Issue 3, pp229-244, ISSN:1615-5262, 2014

Edited books  

Advances in Communications, Computing, Networks and Security Volume 11
Haskell-Dowland PS (Dowland PS)
Plymouth University, ISBN: 978-184102-374-8, pp144, 2014
 
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014)
Clarke NL, Furnell SM
Plymouth, 8-10 July, ISBN: 978-1-84102-375-5, pp239, 2014
 
Proceedings of the Tenth International Network Conference (INC 2014)
Haskell-Dowland PS (Dowland PS), Furnell SM, Ghita BV
Plymouth, 8-10 July, ISBN: 978-1-84102-373-1, pp197, 2014

Conference papers

Nonvisual Presentation, Navigation and Manipulation of Structured Documents on Mobile and Wearable Devices
Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Haskell-Dowland PS (Dowland PS)
International Conference on Computers for Handicapped Persons, ISBN: 978-3-319-08595-1, pp383-390, 2014

Text-Based Active Authentication for Mobile Devices
Saevanee H, Clarke NL, Furnell SM, Biscioneb V
29th IFIP TC11 International Conference on ICT Systems Security & Privacy Protection, Marrakech, Morocco, 2-4 June 2014, pp 99-112, ISBN: 978-3-642-55414-8, 2014

A Forensically-Enabled IAAS Cloud Computing Architecture
Alqahtany S, Clarke NL, Furnell SM, Reich C
Proceedings of the 12th Australian Digital Forensics Conference, pp75-83, ISBN: 978-0-7298-0719-7, 2014

A User-oriented Network Forensic Analyser: The Design of a High-Level Protocol Analyser
Joy D, Li F, Clarke NL, Furnell SM
Proceedings of the 12th Australian Digital Forensics Conference, 1-3 December, ECU Joondalup Campus, Perth, Western Australia, pp 84-93, ISBN 978-0-7298-0719-7, 2014

Security challenges of e-government adoption based on end users' perspective
Alharbi N, Papadaki M, Haskell-Dowland PS (Dowland PS)
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions (ICITST 2014), London, UK, pp78-82, ISBN: 978-1-908320-39-1, 2014

Android Forensics: Correlation Analysis
Kasiaras D, Zafeiropoulos T, Clarke NL, Kambourakis G
9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, IEEE Press, 2014

Performance Evaluation of A Technology Independent Security Gateway for Next Generation Networks
Li F, Clarke NL, Furnell SM, Mkwawa IH
Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE 10th International Conference on Emergency Networks for Public Protection and Disaster Relief, 8-10 October 2014 in Larnaca, Cyprus, page 281-286, 2014

Performance-driven evaluation for deploying IMS-based interoperability scenarios
Fajardo JO, Liberal F, Li F, Clarke NL, Mkwawa IH, Sun L
IEEE International Conference on Communications (IEEE ICC 2014), 10-14 June 2014, Sydney, Australia, pp.3019-3024, 2014

Towards A Unified OAI-PMH Registry
Goebert S, Harriehausen-Mühlbauer B, Furnell SM
Proceedings of the 11th IS&T Archiving Conference, pp97-100, ISBN: 978-0-89208-309-1, 2014

An Evaluation of Behavioural Profiling on Mobile Devices
Li F, Wheeler R, Clarke NL
Proceedings of the Second International Conference HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, pp330-339 in Human Aspects of Information Security, Privacy, and Trust, Lecture Notes in Computer Science, Volume 8533, 2014

Alternative Graphical Authentication for Online Banking Environments
Alsaiari H, Papadaki M, Haskell-Dowland PS (Dowland PS), Furnell SM
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014), Plymouth, UK, July 8-9, pp122-136, ISBN: 978-1-84102-375-5, 2014

Achieving Improved Network Subscriber Geo-Location
Mansfield T, Ghita BV, Ambroze MA
Proceedings of the Tenth International Network Conference (INC 2014), Plymouth, UK, July 8-9, pp107-116, ISBN: 978-1-84102-373-1, 2014

Connected In-Car Multimedia: Qualities Affecting Composability of Dynamic Functionality
Knirsch A, Wietzke J, Moore R, Haskell-Dowland PS (Dowland PS)
Proceedings of the Tenth International Network Conference (INC 2014), Plymouth, UK, July 8-9, pp81-93, ISBN: 978-1-84102-373-1, 2014

A M2M-based Automotive Service Delivery Platform for Distributed Vehicular Applications
Glaab M, Fuhrmann W, Wietzke J, Ghita BV
Proceedings of the Tenth International Network Conference (INC 2014), Plymouth, UK, July 8-9, pp35-45, ISBN: 978-1-84102-373-1, 2014

Assay of White Space Technology Standards for Vehicular Cognitive Access
Dawood M, Fuhrmann W, Ghita BV
Proceedings of the Tenth International Network Conference (INC 2014), Plymouth, UK, July 8-9, pp23-33, ISBN: 978-1-84102-373-1, 2014

Data Carving using Artificial Headers
Daniel R, Clarke NL, Li F
Proceedings of the 13th Annual Security Conference, Las Vegas, USA, 2014

Cloud Forensics Challenges
Alqahtany S, Clarke NL, Furnell SM
Proceedings of the 7th SSC Saudi Students Conference - UK, pp86-93, ISBN: 9780956904522, 2014

Verifying robust frequency domain properties of non linear oscillators using SMT
Hafiz ul Asad, Kevin D. Jones, Frederic Surre
Proceedings of the 2014 IEEE 17th International Symposium on Design and Diagnostics of Electronic Circuits and Systems, DDECS 2014
DOI: 10.1109/DDECS.2014.6868816EID: 2-s2.0-84926663627

Contributions to edited books  

Delay-tolerant networks (DTNs) for deep-space communications
Clarke NL, Ghita BV, Furnell SM
in "Advances In Delay-Tolerant Networks (DTNs)" Edited by J Rodrigues, ISBN: 978-0-85709-840-5, Woodhead Publishing, 298p, 2014

2013

Journal papers

On-scene triage open source forensic tool chests: Are they effective?
Shiaeles SN, Chryssanthou A, Katos V
Digital Investigation, Volume 10, Issue 2, pp99-115, 2013

SHARB: Shared Resource Arbitration in Partitioned Multicore Systems via Library Interposition
Knirsch A, Schnarz P, Wietzke J
International Journal of Design, Analysis and Tools for Integrated Circuits and Systems (IJDATICS), Volume 4, Issue 2, ISSN: 2223523X, pp18-27, 2013

Co-operative user identity verification using an Authentication Aura
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Computers & Security, Volume 39, Part B, November, pp486–502, 2013

Reductions of peak-to-average power ratio and optical beat interference in cost-effective OFDMA-PONs
Tsokanos A, Giacoumidis E, Zardas G, Kavatzikidis A, Diamantopoulos NP, Aldaya I, Tomkos I
Photonic Network Communications, Springer, Volume 26, Issue 2 Page(s) 44-52, 2013

A response selection model for intrusion response systems: Response Strategy Model (RSM)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Security and Communication Networks, 2013

Sun Behind Clouds - On Automatic Cloud Security Audits and a Cloud Audit Policy Language
Doelitzscher F, Rübsamen T, Karbe T, Reich C, Knahl MH, Clarke NL
International Journal on Advances in Networks and Services, vol 6 no 1 & 2, ISSN: 1942-2644, pp1-16, 2013

Books

Modeling security policy and the effect for end-users
Kevin Jones
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
DOI: 10.1007/978-3-642-39345-7-27, EID: 2-s2.0-84880727000

Conference papers

Decentralized Hosting and Preservation of Open Data
Goebert S, Harriehausen-Mühlbauer B, Wentzel C
Proceedings of the 10th IS&T Archiving Conference, pp264-269, ISBN: 978-1-63266-642-0, 2013

Compositing User Interfaces in Partitioned In-Vehicle Infotainment
Knirsch A, Theis A, Wietzke J, Moore R
2nd Workshop Automotive HMI, Bremen, DE, September 8, Mensch & Computer 2013 - Workshopband, Oldenbourg Verlag, ISBN: 978-3-486-77855-7, pp63-70, 2013

Cloud Audits and Privacy Risks
Rübsamen T, Reich C
On the Move to Meaningful Internet Systems: OTM 2013 Conferences, pp403-413, ISBN: 978-3-642-41029-1, 2013

Supporting Cloud Accountability by Collecting Evidence Using Audit Agents
Rübsamen T, Reich C
IEEE 5th International Conference on Cloud Computing Technology and Science, pp185-190, 2013

Anomaly Detection In IaaS Clouds
Doelitzscher F, Knahl MH, Reich C, Clarke NL
5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom2013), Bristol, UK, Dec 2-5, ISBN: 978-0-7695-5095-4, pp387-394, 2013

Hop-Based Dynamic Fair Scheduler for Wireless Ad-Hoc Networks
Marchang J, Ghita BV, Lancaster D
Proceedings of 7th IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 15-18 December 2013, Chennai, India, ISBN: 978-1-4799-1477-7, pp1-6, 2013

Towards an Automated Forensic Examiner (AFE) Based upon Criminal Profiling & Artificial Intelligence
Al Fahdi M, Clarke NL, Furnell SM
Proceedings of the 11th Australian Digital Forensics Conference, Perth, Australia, 2-4 December, pp 1-9, ISBN 978-0-7298-0711-1, 2013

A Conceptual Model for Federated Authentication in the Cloud
Al Abdulwahid A, Clarke NL, Furnell SM, Stengel I
Proceedings of the 11th Australian Information Security Management Conference (AISM2013), Perth, Australia, 2-4 December, pp 1-11, ISBN 978-0-7298-0710-4, 2013

Nonvisual Presentation and Navigation within the Structure of Digital Text-Documents on Mobile Devices
Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Haskell-Dowland PS (Dowland PS)
7th International Conference, UAHCI 2013, Las Vegas, NV, USA, July 21-26, ISBN: 978-3-642-39193-4, pp311-320, 2013

Learning management systems in higher education: a faculty perspective
Triantafyllidis A, Clarke NL, Haskell-Dowland PS (Dowland PS)
6th International Conference of Education, Research and Innovation (ICERI2013), Madrid, Spain, ISBN: 978-84-616-3847-5, pp5120-5130, 2013

Monte-Carlo-based method for group delay ripple reduction in cascaded dispersion compensation FBGs
Aldaya I, Giacoumidis E, Tsyier S, Tsokanos A, Ghassemlooy Z, Martins IB, Perez-Sanchez G, Tomkos I
Network and Optical Communications (NOC), 2013 18th European Conference on Network and Optical Communications , Page(s): 171 – 174, Print ISBN: 978-1-4673-5821-7 , 2013

Cost-effective broadband GaAs IQ modulator array for long-reach OFDM-PONs
Stampoulidis LN, Giacoumidis E, O'Keefe MF, Aldaya I, Walker RG, Zhou Y, Cameron N, Kehayas E, Tsokanos A, Tomkos I, Doran NJ, Zimmermann L
Optical Communication (ECOC 2013), 39th European Conference and Exhibition on communications, Page(s): 1 – 3, E-ISBN : 978-1-84919-759-5, 2013

Framework for Generic Context- and Policy-Based Traffic Distribution in Heterogeneous Wireless Networks: Black Rider
Frei S, Fuhrmann W, Ghita BV
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA 2013) , pp 534 - 541, ISBN 978-1-4673-6239-9, 2013

Generic Real-Time Traffic Distribution Framework: Black Rider
Frei S, Fuhrmann W, Ghita BV
Proceedings of the 22nd International Conference on Computer Communications and Networks (ICCCN 2013), pp 1-8, ISBN: 978-1-4673-5774-6, 2013

E-government Security Modeling: Explaining Main Factors and Analysing Existing Models
Alharbi N
ICBG 2013: International Conference on e-Business and e-Government, Turkey, Istanbul September 19-20, Vol. 7, No. 9, pp675-678, 2013

User Requirements for Future Wideband Critical Communications
Liberal F, Ramos M, Fajardo JO, Goi N, Bizkarguenaga A, Mesogiti I, Theodoropoulou E, Lyberopoulos G, Koumaras H, Sun L, Clarke NL, Li F
Proceeding of the International Workshop on Emergency Telecommunications Systems (ETS 2013), Wrexham, UK, 12 September, pp341-348, 2013

A Technology Independent Security Gateway for Future Emergency Telecommunication Systems (ETS)
Li F, Clarke NL, Furnell SM, Fajardo JO, Liberal F, Sidibe M
Proceeding of the International Workshop on Emergency Telecommunications Systems (ETS 2013), Wrexham, UK, 12 September, pp299-308, 2013

Challenges to Digital Forensics: A Survey of Researchers & Practitioners Attitudes and Opinions
Al Fahdi M, Clarke NL, Furnell SM
Proceedings of ISSA (Information Security South Africa), Johannesburg, 14-16 August, ISBN:978-1-4799-0809-7, 2013

Towards Continuous and Convenient User Authentication
Furnell SM, Clarke NL
The Future of Identity: A compilation of research papers from a workshop, City University London / EPSRC, April, 2013

E-Invigilator: A Biometric-Based Supervision System for e-Assessments
Clarke NL, Haskell-Dowland PS (Dowland PS), Furnell SM
The International Conference on Information Society (i-Society 2013), Toronto, Canada, 24-26 June, 2013

A Technology Independent Security Gateway for Real-Time Multimedia Communication
Li F, Clarke NL, Furnell SM
Proceedings of the 7th International Conference on Network and System Security (NSS2013), 3-4 June 2013, Madrid, Spain, pp14-25, 2013

Multimodal Biometric Surveillance using a Kinect Sensor
Savage R, Clarke NL, Li F
Proceedings of the 12th Annual Security Conference, April, Las Vegas, USA, 2013

Edited books

 
Trust, Privacy and Security in Digital Business - 10th International Conference, TrustBus 2013
Furnell SM, Lambrinoudakis C, Lopez J
Prague, Czech Republic, August 28-29, Lecture Notes in Computer Science 8058, Springer, ISBN 978-3-642-40342-2. 199pp, 2013
  
Advances in Communications, Computing, Networks and Security Volume 10
Haskell-Dowland PS (Dowland PS), Furnell SM
Plymouth University, ISBN: 978-184102-358-8, pp229, 2013
 
Proceedings of the European Information Security Multi-Conference (EISMC 2013)
Furnell SM, Clarke NL, Katos V
Lisbon, Portugal, 8-10 May, ISBN: 978-1-84102-345-8, pp153, 2013

2012

Journal papers

Real time DDoS detection using fuzzy estimators
Shiaeles SN, Katos V, Karakos AS, Papadopoulous BK
Computer & Security, Volume 31, Issue 6, pp782-790, 2012

Application Outsourcing in Europe: Long-term Outcomes, Success Factors and Implications for IT Industrialisation
Kronawitter K, Wentzel C, Papadaki M
Issues in Information Systems, Volume 13, Issue 2, pp. 369 - 379, 2012

Traceability in Model-Based Testing
George M, Fischer KP, Knahl MH, Bleimann U, Atkinson S
Future Internet, Vol. 4, Iss.4, pp1026-1036, 2012

Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Security and Communication Networks, 2012

Power to the people? The evolving recognition of human aspects of security
Furnell SM, Clarke NL
Computers & Security, Volume 31, Issue 8, pp983–988, 2012

Adaptive Loading Algorithms for IMDD Optical OFDM PON Systems Using Directly Modulated Lasers
Giacoumidis E, Kavatzikidis A, Tsokanos A, Tang JM, Tomkos I
IEEE/OSA Journal of Optical Communications and Networking, Volume 4, Issue 10, pp769-778 , 2012

Extensive Comparisons of Optical Fast-OFDM and Conventional Optical OFDM for Local and Access Networks
Giacoumidis E, Tsokanos A, Mouchos H, Zardas G, Alves C, Wei JL, Tang JM, Gosset C, Jaouën Y, Tomkos I
IEEE/OSA Journal of Optical Communications and Networking, Volume 4, Issue 10, pp724-733, 2012

An agent based business aware incident detection system for cloud environments
Doelitzscher F, Reich C, Knahl MH, Passfall A, Clarke NL
Journal of Cloud Computing: Advances, Systems and Applications, 1:9, ISSN: 2192-113X, 2012

Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke NL, Gritzalis S
Security and Communication Networks, vol. 5, issue 1, 2012

Books  

Embedded Technologies - Vom Treiber bis zur Grafik-Anbindung
Wietzke J
Xpert.press, Springer, ISBN: 978-3-642-23995-3, 321pp, 2012
 
Information Flow Based Security Control Beyond RBAC
Fischer KP
Springer Vieweg, ISBN 978-3-8348-2617-6, pp161, 2012

Edited books  

Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012
Gritzalis D, Furnell SM, Theoharidou M
Heraklion, Crete, Greece, June 4-6, 2012, IFIP Advances in Information and Communication Technology, Springer, ISBN 978-3-642-30435-4. 592pp, 2012
 
Proceedings of the Ninth International Network Conference (INC 2012)
Botha RA, Haskell-Dowland PS (Dowland PS), Furnell SM
Port Elizabeth, South Africa, 11-12 July, ISBN: 9781841023151, pp238, 2012
 
Advances in Communications, Computing, Networks and Security Volume 9
Haskell-Dowland PS (Dowland PS), Furnell SM
Plymouth University, ISBN: 978-184102-320-5, pp217, 2012
 
Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012)
Clarke NL, Furnell SM
Plymouth University, ISBN: 978-1-84102-317-5, 222pp, 2012
 
Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012)
Clarke NL, Tryfonas T, Dodge RC
Plymouth University, ISBN: 978-1-84102-316-8, 156pp, 2012

Conference papers

Prioritized Access Arbitration to Shared Resources on Integrated Software Systems in Multicore Environments
Knirsch A, Schnarz P, Wietzke J
3rd IEEE International Conference on Networked Embedded Systems for Every Application (NESEA), Liverpool, UK, December 13-14, IEEE, ISBN: 978-1-4673-4721-1, pp1-8, 2012

Strukturierung von Multimediasystemen für Fahrzeuge
Knirsch A, Vergata S, Wietzke J
Kommunikation unter Echtzeitbedingungen, Echtzeit 2012, Boppard, DE, November 22-23, Springer, ISBN: 978-3-642-33707-9, pp69-78, 2012

Learning management systems in higher education: a student perspective
Triantafyllidis A, Clarke NL, Haskell-Dowland PS (Dowland PS)
5th International Conference of Education, Research and Innovation (ICERI2012), Madrid, Spain, ISBN: 978-84-616-0763-1, pp4046-4055, 2012

IT Application Outsourcing in Europe: Long-term Outcomes, Success Factors and Implications for ITO Maturity
Kronawitter K, Wentzel C, Papadaki M
Proceedings of the 46th Hawaii International Conference on System Sciences (HICSS-46), pp.4456-4465, 2012

Assessing the usability of application level security warnings
Zaaba ZF, Furnell SM, Haskell-Dowland PS (Dowland PS), Stengel I
Eleventh Annual Security Conference, Las Vegas, Nevada, US, 11-13 April, 2012

Case-based reasoning approach for re-use activities
Zinn M, Fischer KP, Schoop R
Proceedings of the 3th International Workshop on Software Knowledge (SKY 2012), pp. 31-42, ISBN: 978-989-8565-32-7, 2012

Automated Reuse of Software Reuse Activities in an industrial environment – Case Study Results
Zinn M, Fischer KP, Schoop R
Proceedings of the 6th International Conference on Software Engineering Advances (ICSEA 2012), pp. 331-340, ISBN: 978-1-61208-230-1, 2012

Web-Based Risk Analysis for Home Users
Magaya RT, Clarke NL
10th Information Security Management Conference, Perth, Australia, Dec 3-5, 2012

Economic Efficiency Control on Data Centre Resources in Heterogeneous Cost Scenarios
Heckmann B, Zinn M, Phippen AD, Moore DJ, Wentzel C
ICITST-2012 Proceedings, pp675-679, ISBN: 978-1-908320-08-7, 2012

Validating Cloud Infrastructure Changes by Cloud Audits
Doelitzscher F, Fischer C, Moskal D, Reich C, Knahl MH, Clarke NL
Proceedings of the 8th IEEE World Congress on Services (SERVICES2012), ISBN: 978-0-7695-4756-5/12, pp377-384, 2012

Prospects for WLAN in the Evolved Packet Core Environment
Frei S, Fuhrmann W, Rinkel A, Ghita BV
Proceedings of the 5th IFIP International Conference on new Technologies, Mobility and Security (NTMS 2012), pp1-5, ISBN: 978-1-4673-0228-9, 2012

Simulation Environment for the Evolved Packet System
Frei S, Fuhrmann W, Vergakis D, Rinkel A
ITG-Fachbericht Band 234: Mobilkommunikation Technologien und Anwendungen, pp83-88, ISBN 987-3-8007-3438-2, 2012

A Response Strategy Model for Intrusion Response Systems
Anuar NB, Papadaki M, Furnell SM, Clarke NL
27th IFIP International Information Security and Privacy Conference - SEC2012, Heraklion, Crete, Greece, 4-6 June, pp573-578, 2012

Model Driven Engineering in Systems Integration
Minich M, Harriehausen-Mühlbauer B, Wentzel C
Proceedings of the Ninth International Network Conference (INC2012), Port Elizabeth, South Africa, July, ISBN: 978-1-84102-315-1, pp159-173, 2012

A Feasibility Study into Tracking Wi-Fi Enabled Mobile Devices
Dagnall M, Clarke NL
Proceedings of the Ninth International Network Conference (INC2012), Port Elizabeth, South Africa, July, ISBN: 978-1-84102-315-1, pp85-92, 2012

The Insider Threat Prediction and Specification Language
Magklaras GB, Furnell SM
Proceedings of the Ninth International Network Conference (INC2012), Port Elizabeth, South Africa, July, ISBN: 978-1-84102-315-1, pp51-61, 2012

A Novel Security Architecture for a Space-Data DTN
Clarke NL, Katos V, Menesidou SA, Ghita BV, Furnell SM
10th International Conference on Wired/Wireless Internet Communications – WWIC 2012, Santorini, Greece, June 6-8, pp342-349, 2012

Multi-Modal Behavioural Biometric Authentication for Mobile Devices
Saevanee H, Clarke NL, Furnell SM
27th IFIP International Information Security and Privacy Conference - SEC2012, Heraklion, Crete, Greece, 4-6 June, pp465-474, 2012

Education in the 'Virtual' Community: Can beating Malware Man teach users about Social Networking Security?
Sercombe AA, Papadaki M
Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012), Crete, Greece, ISBN: 978-1-84102-317-5, pp33-39, 2012

Reuseable Software Unit Knowledge for Device Deployment
Zinn M, Fischer KP, Schoop R
Proceedings of the third conference of "Conception of complex automation systems (Entwurf komplexer Automatisierungssysteme)" EKA 2012, pp99-110, ISBN: 978-3-940961-72-3, 2012

Agreeing on and Controlling Service Levels in Service-Oriented Architectures
Heckmann B, Phippen AD, Moore R, Wentzel C
CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Service Science, pp267-270, ISBN: 978-989-8565-05-1, 2012

Contributions to edited books  

Understanding Cloud Audits
Doelitzscher F, Reich C, Knahl MH, Clarke NL
in "Privacy and Security for Cloud Computing", Pearson, S. and Yee, G. (Eds.), ISBN 978-1-4471-4188-4, 2012

2011

Journal papers

MusicPedia: Retrieving and Merging- Interlinking Music Metadata
Nikolaidou P, Shiaeles SN, Karakos AS
Journal of Computing, Volume 3, Issue 8, pp11-17, 2011

Private Cloud for Collaboration and e-Learning Services: from IaaS to SaaS
Doelitzscher F, Sulistio A, Reich C, Kuijs H, Wolf D
Computing, Vol. 91, No. 1, pp23-42, ISSN: 0010-485X, 2011

Agreeing on and Controlling Business Service Levels in Service-Oriented Architectures
Heckmann B, Phippen AD, Moore R, Wentzel C
International Transactions on Systems Science and Applications, Vol. 7, No. 3/4, December, pp. 173-178, 2011

Sicherheitsprobleme für IT Outsourcing basierend auf Cloud Computing
Doelitzscher F, Ardelt M, Knahl MH, Reich C
Praxis der Wirtschaftsinformatik, Volume 281, ISSN 1436-3011, 2011

Information Security Awareness in Academia
Korovessis P
International Journal of Knowledge Society Research (IJKSR), Vol. 2, Iss. 4, pp1-17, ISSN: 1947-8429, EISSN: 1947-8437, 2011

Misuse Detection for Mobile Devices Using Behaviour Profiling
Li F, Clarke NL, Papadaki M, Haskell-Dowland PS (Dowland PS)
International Journal of Cyber Warfare & Terrorism, Volume 1, Issue 1, pp43-55, ISSN: 1947-3435, 2011

Optimal and Suboptimal Multi Antenna Spectrum Sensing Techniques with Master Node Cooperation for Cognitive Radio Systems
Alghamdi OA, Ahmed MZ
Journal of Communications (JCM) , vol. 6, No.7, pp 512-523, ISSN 1796-2021, 2011

Authentication Aura - A distributed approach to user authentication
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Journal of Information Assurance and Security, vol. 6 (2011), issue 2, pp149-156, ISSN 1554-1010, 2011

Massively Multi-Player Online Role Playing Games: What’s the Risk?
Sanders B, Haskell-Dowland PS (Dowland PS), Atkinson S, Furnell SM
Journal of Virtual Worlds Research, vol. 3, no. 3, ISSN: 1941-8477, 2011

Heavier, or just colder? A new approach to perception research
Sanders B, Zahra D, Hedge C, Summerscales J
PsyMag, Issue 78, March, pp4-8, 2011

Establishing A Personalized Information Security Culture
Talib S, Clarke NL, Furnell SM
International Journal of Mobile Computing and Multimedia Communications (IJMCMC), Vol 3, Iss 1, pp63-79, 2011

Comparing Intentions to Use University-Provided vs. Vendor-Provided Multibiometric Authentication in Online Exams
Levy Y, Ramim MM, Furnell SM, Clarke NL
Campus-Wide Information Systems, Vol. 28 Iss: 2, 2011

Books  

Transparent User Authentication
Clarke NL
Springer, ISBN 978-0-85729-804-1, pp229, 2011

Edited books

 
Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011
Furnell SM, Lambrinoudakis C, Pernul G
Toulouse, France, August 29 - September 2. Lecture Notes in Computer Science 6863, Springer, ISBN 978-3-642-22889-6, 223pp, 2011
  
Advances in Communications, Computing, Networks and Security Volume 8
Haskell-Dowland PS (Dowland PS), Furnell SM
Plymouth University, ISBN: 978-1-84102-293-2, pp293, 2011
  
Proceedings of the Seventh Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2011)
Haskell-Dowland PS (Dowland PS), Grout VM, Humm B, Knahl MH
Plymouth University, ISBN: 978-1-84102-295-6, pp117, 2011
  
Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011)
Furnell SM, Clarke NL
University of Plymouth, ISBN: 978-1-84102-284-0, 148pp, 2011
  
Proceedings of the Sixth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2011)
Clarke NL, Tryfonas T
University of Plymouth, ISBN: 978-1-84102-285-7, 177pp, 2011

Conference papers

Teleoperation of mobile robots over wireless internet
Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Haskell-Dowland PS (Dowland PS)
Proceedings of the 4th International Conference on Internet Technologies and Applications, ITA 11; Wrexham, Wales; United Kingdom, ISBN:978-094688168-0, pp145-151, 2011

What is to be a Teacher in Higher Education: The relationship between Teaching and Research
Vasileiou I
6th International Conference on Open and Distance Learning, Loutraki, Greece, pp568-578, 2011

A non-proprietary RAID replacement for long term preservation systems
Goebert S, Sarti A
8th International Conference on Preservation of Digital Objects, November 1-4, 2011, Singapore, pp254-256, ISBN: 978-981-07-0441-4, 2011

Performance optimization of adaptive loading algorithms for SMF-based optical OFDM transceivers
Giacoumidis E, Wei JL, Tsokanos A, Kavatzikidis A, Hugues-Salas E, Tang JM, Tomkos I
Networks and Optical Communications (NOC), 2011 16th European Conference on Network and Optical Communications, Page(s): 56 – 59, E-ISBN : 978-1-86135-373-3 Print ISBN: 978-1-61284-753-5 , 2011

Survey: improving document accessibility from the blind and visually impaired user's point of view
Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Haskell-Dowland PS (Dowland PS)
Proceedings of the 6th International Conference on Universal Access in Human-Computer Interaction. Applications and Services, pp129-135, 978-3-642-21656-5, 2011

The Early Years Online
Atkinson S, Staunton T
EU Kids Online II Conference, LSE, September, 2011

Reusable Software Units Integration Knowledge in a Distributed Development Environment
Zinn M, Fischer KP, Schütte A, Phippen AD
Proceedings of the 2nd International Workshop on Software Knowledge, 26 October, Paris, France, pp24-35, ISBN: 978-989-8425-82-9, 2011

Information Demand Model for Software Unit Reuse
Zinn M, Fischer KP, Schütte A, Phippen AD
Proceedings of the 20th International Conference on Software Engineering, June 20-22, Las Vegas, USA, pp32-39, ISBN: 978-1-880843-82-6, 2011
Won Best Paper Award

Information Leakage Through Second Hand Usb Flash Drives within the United Kingdom
Chaerani W, Clarke NL, Bolan C
Australian Digital Forensics Conference, Perth, Australia, 5-7 December, 2011

Bridging the gaps in model based testing
George M, Fischer KP, Knahl MH, Bleimann U, Atkinson S
Proceedings of the Fourth International Conference on Internet Technologies and Applications (ITA 11), 6-9 September 2011, Wrexham, UK, pp 300-307, ISBN: 978-0-946881-68-0, 2011

ViteraaS: Virtual Cluster as a Service
Doelitzscher F, Sulistio A, Held M, Reich C
Proceedings of the 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom2011), ISBN: 978-0-7695-4622-3/11, pp652-657, 2011

Incident detection for cloud environments
Doelitzscher F, Reich C, Knahl MH, Clarke NL
Proceedings of the Third International Conference on Emerging Network Intelligence (EMERGING 2011), ISBN: 978-1-61208-174-8, pp100-105, 2011

An autonomous agent based incident detection system for cloud environments
Doelitzscher F, Reich C, Knahl MH, Clarke NL
Proceedings of the 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom2011), ISBN: 978-0-7695-4622-3/11, pp197-204, 2011

A Risk Index Model for Security Incident Prioritisation
Anuar NB, Furnell SM, Papadaki M, Clarke NL
Proceedings of the 9th Australian Information Security Management Conference (ASIM 2011), Perth, Australia, 5-7 December, 2011

A preliminary investigation of distributed and cooperative user authentication
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Proceedings of the 9th Australian Information Security Management Conference (secAU 2011), Perth, Australia, 5-7 December, 2011

Multifactor Graphical Passwords: An Assessment of End-User Performance
Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS)
Proceedings of the 7th International Conference of Information Assurance & Security (IAS2011), Melaka, Malaysia, 5-8 December 2011. IEEE 978-1-4577-2153-3, 2011

Quantifying the effect of graphical password guidelines for better security
Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS)
Future Challenges in Security and Privacy for Academia and Industry (SEC 2011), Lucerne, Switzerland, 7-9 June 2011. Volume 354/2011, Springer-Verlag, pp80-91, 2011

Improving Fairness in Ad Hoc Networks Based on Neighbour's Transmission Rate
Arabi M, Ghita BV
Proceedings of the Fourth International Conference on Internet Technologies and Applications (ITA 11), 6-9 September 2011, Wrexham, UK, pp 292-299, ISBN: 978-0-946881-68-0, 2011

A New Approach to Model a Formalised Description of a Communication Service for the Purpose of Functional Testing
Wacht P, Eichelmann T, Lehmann A, Fuhrmann W, Trick U, Ghita BV
Proceedings of the Fourth International Conference on Internet Technologies and Applications (ITA 11), 6-9 September 2011, Wrexham, UK, pp 262-269, ISBN: 978-0-946881-68-0, 2011

EPS QoS Enforcement on Layer 3 with Diffserv
Frei S, Fuhrmann W, Rinkel A, Ghita BV
Proceedings of the Fourth International Conference on Internet Technologies and Applications (ITA 11), 6-9 September 2011, Wrexham, UK, pp 199-204, ISBN: 978-0-946881-68-0, 2011

Discussion on a Framework and its Service Structures for generating JSLEE based Value-Added Services
Eichelmann T, Fuhrmann W, Trick U, Ghita BV
Proceedings of the Fourth International Conference on Internet Technologies and Applications (ITA 11), 6-9 September 2011, Wrexham, UK, pp 169-177, ISBN: 978-0-946881-68-0, 2011

Entscheidungskriterien für die Verteilung zukünftiger automotiver Anwendungen im Kontext vernetzter Fahrzeuge
Glaab M, Fuhrmann W, Wietzke J
Mobilkommunikation : Technologien und Anwendungen ; Vorträge der 16. ITG-Fachtagung vom 18. bis 19. Mai 2011 in Osnabrück, pp149-154, ISDN: 978-3-8007-3352-1, 2011

Virtual System Design for Embedded Automotive Systems
Vergata S, Wietzke J, Schütte A
Interactive Systems and Technologies: the Problems of Human Computer Interaction,Ulyanovsk: UlSTU, pp43-50, ISBN: 978-5-9795-0825-2, 2011

Integration zukünftiger In-Car-Multimediasysteme unter Verwendung von Virtualisierung und Multi-Core-Plattformen
Vergata S, Knirsch A, Wietzke J
Herausforderungen durch Echtzeitbetrieb, Echtzeit 2011, Informatik aktuell, Springer, pp21-28, ISBN: 978-3-642-24658-6, 2011

Resource Management for Multicore Aware Software Architectures of In-Car Multimedia Systems
Knirsch A, Wietzke J, Moore R, Haskell-Dowland PS (Dowland PS)
Lecture Notes in Informatics (LNI) - Proceedings, Series of the Gesellschaft für Informatik (GI), Volume P-192, 9th Workshop Automotive Software Engineering, INFORMATIK 2011: Informatik schafft Communities, 4.–7. October 2011, Berlin, p216, ISBN: 978-3-88579-286-4, (full text is available online), 2011

SMS Linguistic Profiling Authentication on Mobile Devices
Saevanee H, Clarke NL, Furnell SM
5th International Conference on Network and System Security (NSS 2011), p224-229, 2011

New optimization method for cooperative spectrum sensing in cognitive radio networks
Alghamdi OA, Ahmed MZ
WiAd 2011 : IEEE Wireless Advanced (WiAd) Conference, London, UK, pp329-335, ISBN: 0-9539572-2-5, 2011

Personal Knowledge Management - Beyond Versioning
Thaul W, Bleimann U, Clarke NL
LWA 2011, FG-WM, Magdeburg, Germany, 28-30 Sept , pp24-31, 2011

Emerging risks in massively multiplayer online role playing games
Sanders B, Atkinson S, Haskell-Dowland PS (Dowland PS), Furnell SM, Papadaki M
EU Kids Online Conference, Friday 23 September, New Academic Building LSE, 2011

Risk Assessment for Mobile Devices
Ledermuller T, Clarke NL
Proceedings of Privacy and Security in Digital Business – 8th International Conference, TrustBus 2011, Toulouse, France, 30 August - 2 September, pp210-221, LNCS (LNCS6863), ISBN: 978-3-642-22889-6, 2011

Behaviour Profiling for Transparent Authentication for Mobile Devices
Li F, Clarke NL, Papadaki M, Haskell-Dowland PS (Dowland PS)
Proceedings of the 10th European Conference on Information Warfare and Security (ECIW), Tallinn, Estonia 7-8 July, pp307-314, 2011
Awarded best PhD paper.

End-User Perception and Usability of Information Security
Zaaba ZF, Furnell SM, Haskell-Dowland PS (Dowland PS)
Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011), London, UK, ISBN: 978-1-84102-284-0, pp97-107, 2011

LUARM – An Audit Engine for Insider Misuse Detection
Magklaras GB, Furnell SM, Papadaki M
Proceedings of the Sixth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2011), London, UK, ISBN: 978-1-84102-285-7, pp133-148, 2011

The Positive and Negative Implications of Emerging Mobile Technologies
Bolitho T, Sanders B
Proceedings of the 10th Annual Security Conference, 4th-6th May, Las Vegas, USA, 2011

Towards a Flexible, Multi-Level Security Framework for Mobile Devices
Clarke NL, Karatzouni S, Furnell SM
Proceedings of the 10th Security Conference, Las Vegas, USA, 4-6 May, 2011

Improvements to Inter System Handover in the EPC Environment
Frei S, Fuhrmann W, Rinkel A, Ghita BV
Proceedings of the Fourth IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2011, pp1-5, ISBN: 978-1-4244-8705-9 , 2011

Culture of Integration: Literacy Tools for the Masses
Darracott A, Clarke NL
International Technology, Education and Development Conference (INTED 2011), 7-9 March, Valencia, Spain, ISBN:978-84-614-7423-3, pp4278-4285, 2011

Behavioural Biometric Authentication For Mobile Devices
Saevanee H, Clarke NL, Furnell SM
Proceedings of the Collaborative European Research Conference (CERC2011), 14-15 January, Cork, Ireland, ISSN: 2220-4164, pp175-184, 2011

Contributions to edited books  

Traffic Modelling and Performance Analysis of Optical Networks
Mouchos H, Tsokanos A, Kouvatsos DD
A Handbook on Convergent Multi-Service Networks and Next Generation Internet, Springer, ISBN: 978-3-642-02741-3, 2011
 
Automated Virtual Machine Creation with On-Demand Software Installation
Sulistio A, Doelitzscher F, Reich C
Computer Science Research and Technology, Vol. 3, pp159-177, ISBN: 978-1-61122-074-2, 2011

2010

Journal papers

Blended Learning: the transformation of Higher Education curriculum
Vasileiou I
Ανοικτή Εκπαίδευση: το περιοδικό για την Ανοικτή και εξ Αποστάσεως Εκπαίδευση και την Εκπαιδευτική Τεχνολογία, vol. 5, iss. 1, pp77-87, 2010

Dynamic OBS Offset Allocation in WDM Networks
Mouchos H, Tsokanos A, Kouvatsos DD
Journal Computer Communications, Volume 33, Issue 1, supplement 1, pp s130-s145, 2010

Statistical Performance Comparisons of Optical OFDM Adaptive Loading Algorithms in Multimode Fiber-Based Transmission Systems
Giacoumidis E, Tsokanos A, Xianqing J, Tang JM
IEEE Photonics Journal, Volume: 2 Issue 6, pp1051 – 1059, 2010

Adaptive-Modulation-Enabled WDM Impairment Reduction in Multichannel Optical OFDM Transmission Systems for Next-Generation PONs
Giacoumidis E, Wei JL, Yang XL, Tsokanos A, Tang JM
IEEE Photonics Journal, Volume: 2 Issue: 2, pages: 130 – 140, 2010

A Scalable Model for the Performance Evaluation of ROADMs with Generic Switching Capabilities
Tsokanos A, Mouchos H, Giacoumidis E, Tang JM
Journal of networks, Volume 5, Issue 10, pp1215-1220, 2010

Long-term archiving of digital data on microfilm
Schilke SW, Rauber A
International Journal of Electronic Governance, Vol. 3, No. 3, pp237-253, 2010

Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments
Sanders B, Haskell-Dowland PS (Dowland PS), Atkinson S, Zahra D, Furnell SM, Papadaki M
Journal of Multimedia Processing Technologies, vol. 1, no. 3, September, pp181-193, ISSN: 0976-4127, 2010

A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
Tjhai GC, Furnell SM, Papadaki M, Clarke NL
Computers & Security, Volume 29, Issue 6, pp712-723 , 2010

Assessing image-based authentication techniques in a web-based environment
Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS)
Information Management & Computer Security, Vol.18, Iss.1, pp43-53, 2010

Mac security: An Apple that can't be bitten?
Furnell SM
Network Security, Volume 2010, Issue 1, pp7-11, 2010

Analog property checkers: A DDR2 case study
Kevin D. Jones, Victor Konrad & Dejan Ničković
Formal Methods in System Design, DOI: 10.1007/s10703-009-0085-xEID: 2-s2.0-77955713369

Fast, non-Monte-Carlo estimation of transient performance variation due to device mismatch
IEEE Transactions on Circuits and Systems I: Regular Papers, DOI: 10.1109/TCSI.2009.2035418, EID: 2-s2.0-77954861838

Books  

E-mail Security: A Pocket Guide
Furnell SM, Haskell-Dowland PS (Dowland PS)
IT Governance Publishing, ISBN: 978-1849280969, pp108, 2010
 
Computer Forensics: A Pocket Guide
Clarke NL
IT Governance Publishing, ISBN: 978-1849280396, 80pp, 2010

Edited books  

Advances in Communications, Computing, Networks and Security Volume 7
Haskell-Dowland PS (Dowland PS), Furnell SM
Plymouth University, ISBN: 978-1-84102-283-3, pp285, 2010
 
Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010)
Haskell-Dowland PS (Dowland PS), Humm B, Knahl MH
University of Plymouth, ISBN: 978-1-84102-269-7, pp81, 2010
 
Proceedings of the Eighth International Network Conference (INC 2010)
Bleimann U, Haskell-Dowland PS (Dowland PS), Furnell SM, Schneider O
Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp413, 2010
 
Proceedings of the South African Information Security Multi-Conference (SAISMC 2010)
Clarke NL, Furnell SM, von Solms R
University of Plymouth, ISBN: 978-1-84102-256-7, pp291, 2010

Conference papers

Barriers to E-Safety Peer Education: An analysis of teacher concerns
Atkinson S, Furnell SM, Phippen AD
Proceedings of E-Youth Conference, Antwerp, 27-28 May, 2010

Optimising Quality of Service through the controlled aggregation of traffic
Culverhouse ME, Ghita BV, Reynolds PL, Wang XG
Proceedings of the fifth International Conference for Internet Technology and Secured Transactions (ICITST), 8-11 Nov, pp1-7, ISBN: 978-1-4244-8862-9, 2010

Decoding low-density parity-check codes with error-floor free over the AWGN channel
Yang L, Tomlinson M, Ambroze MA
2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), pp192-196, 25-27 June, Beijing, China, 2010

Extended optimum decoding for LDPC codes based on exhaustive tree search algorithm
Yang L, Tomlinson M, Ambroze MA, Cai J
2010 IEEE International Conference on Communication Systems (ICCS), Singapore, 17-19 Nov, ISBN: 978-1-4244-7005-1, pp208 - 212, 2010

A tree-based ML decoding algorithm with adaptive thresholding
Cai J, Tomlinson M, Tjhai CJ, Yang L
2010 IEEE International Conference on Communication Systems (ICCS), Singapore, 17-19 Nov, ISBN: 978-1-4244-7005-1, pp223 - 227, 2010

Designing Cloud Services Adhering to Government Privacy Laws
Doelitzscher F, Reich C, Sulistio A
3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-10), June 29-July 1, Bradford, UK, pp930-935, 2010

Non-intrusive Identification of Peer-to-Peer Traffic
Ulliac A, Ghita BV
Proceedings of the Third International Conference on Communication Theory, Reliability, and Quality of Service (CTRQ), 13-19 June, pp116-121, ISBN: 978-1-4244-7273-4, 2010

Probabilities of Detection and False Alarm in MTM- Based Spectrum Sensing for Cognitive Radio Systems
Alghamdi OA, Abu-Rgheff MA, Ahmed MZ
EMERGING 2010 : The Second International Conference on Emerging Network Intelligence, Florence, Italy, 25-30 Oct, ISBN: 978-1-61208-103-8, pp114-119, 2010

MTM Parameters Optimization for 64-FFT Cognitive Radio Spectrum Sensing using Monte Carlo Simulation
Alghamdi OA, Abu-Rgheff MA, Ahmed MZ
EMERGING 2010 : The Second International Conference on Emerging Network Intelligence, Florence, Italy, 25-30 Oct, ISBN: 978-1-61208-103-8, pp107-113, 2010

Probabilities of Detection and False Alarm in Multitaper Based Spectrum Sensing for Cognitive Radio Systems in AWGN
Alghamdi OA, Ahmed MZ, Abu-Rgheff MA
The IEEE International Conference on Communication Systems (IEEE ICCS 2010) Singapore, 17-19 Nov, ISBN: 978-1-4244-7005-1, pp579-584, 2010

Online Addiction: Privacy Risks in Online Gaming Environments
Sanders B, Chen V, Zahra D, Haskell-Dowland PS (Dowland PS), Atkinson S, Papadaki M, Furnell SM
Proceedings of the International Conference on Management of Emergent Digital EcoSystems (MEDES), October 26-29, Bangkok, Thailand, 2010

Local MTM-SVD based spectrum sensing in SIMO OFDM cognitive radio under bandwidth constraint
Alghamdi OA, Abu-Rgheff MA
Proceedings of the Fifth International Conference on Cognitive Radio Oriented Wireless Networks & Communications (CROWNCOM), Cannes, France, 9-11 June, pp1-6, 2010

Device services as reusable units of modelling in a service-oriented environment - - An analysis case study
Zinn M, Bepperling A, Schoop R, Phippen AD, Fischer KP
Proceedings of the 2010 IEEE International Symposium on Industrial Electronic (ISIE2010), 4-7 July, Bari, Italy, pp1728-1735, ISBN 978-1-4244-6391-6, 2010

Behaviour Profiling on Mobile Devices
Li F, Clarke NL, Papadaki M, Haskell-Dowland PS (Dowland PS)
International Conference on Emerging Security Technologies, 6-8 September, Canterbury, UK, pp77-82, 2010

Assessing the Usability of End-User Security Software
Ibrahim T, Furnell SM, Papadaki M, Clarke NL
Lecture Notes in Computer Science, Volume 6264/2010, pp177-189, 2010

A distributed and cooperative user authentication framework
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Proceedings of the 6th International Confernece on Information Assurance and Security (IAS 2010), Atlanta, USA, 23-25 August, pp304-310, 2010

An investigation and survey of response options for Intrusion Response Systems (IRSs)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Proceedings of the 9th Annual Information Security South Africa Conference, Sandton, South Africa, 2 - 4 August, pp1-8, ISBN: 978-1-4244-5493-8, 2010

An Organisational Approach for Industrialized Systems Integration
Minich M, Harriehausen-Mühlbauer B, Wentzel C
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp399-407, 2010

Finding Reusable Units of Modelling - an Ontology Approach
Zinn M, Fischer KP, Phippen AD, Schütte A
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp377-386, 2010

ITO Success Factor Model - First Steps Towards a Guide for IT Outsourcing (ITO) Success
Kronawitter K, Wentzel C, Papadaki M
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp355-359, 2010

Psycho-Analytical Considerations in Internet Marketing – Focusing on Human Needs and Personal Trust
Rimbach F, Bleimann U, Furnell SM
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp345-354, 2010

Quantitative and Qualitative Description of the Consumer to Provider Relation in the Context of Utility Computing
Heckmann B, Phippen AD
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp335-344, 2010

Exploration of Learner Preferences and their Impact Within a Media Module
Stengel I, Schneider O, Bleimann U
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp279-288, 2010

Service Quality Assessment in Distance Learning
Shauchenka H, Bleimann U, Knoll M, Clarke NL
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp269-277, 2010

Signalling Effort Evaluation of Mobility Protocols within Evolved Packet Core Network
Frei S, Fuhrmann W, Rinkel A, Ghita BV
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp99-108, 2010

Enhanced Concept of the TeamCom SCE for Automated Generated Services Based on JSLEE
Eichelmann T, Fuhrmann W, Trick U, Ghita BV
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp75-84, 2010

A Bootstrap Mechanism for NGN QoS Profiling
Weber F, Fuhrmann W, Trick U, Bleimann U, Ghita BV
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp61-70, 2010

Improving Fairness in Ad Hoc Networks through Collision Rate Control
Arabi M, Ghita BV, Wang XG
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp51-59, 2010

E-Book readers in academic personal knowledge management
Thaul W, Bleimann U, Wentzel C, Clarke NL
Plymouth e-Learning Conference 2010, Plymouth, UK, 08-09 April, 2010
Abstract only publication.

FFT-based frequency offset estimation in OFDM systems
Wu F, Abu-Rgheff MA
Proceedings of the 15th IEEE Mediterranean Electrotechnical conference (Melcon 2010), Valletta, Malta, 26-28 April, pp1326-1331 , 2010

Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy
Sanders B, Haskell-Dowland PS (Dowland PS), Furnell SM
Proceedings of the South African Information Security Multi-Conference (SAISMC 2010), Port Elizabeth, South Africa, 17-18 May, ISBN: 978-1-84102-256-7, pp61-73, 2010

Statistical analysis of Snort alarms for a medium-sized network
Chantawutt K, Ghita BV
Ninth Annual Security Conference, Las Vegas, Nevada, US, 7-8 April, 2010

An Analysis of Information Security Awareness within Home and Work Environments
Talib S, Clarke NL, Furnell SM
Fifth International Conference on Availability, Reliability and Security (“ARES 2010 – The International Dependability Conference”), Krakow, Poland, 15-18th Feb, , 2010

Contributions to edited books  

Insider Threat Specification as a Threat Mitigation Technique
Magklaras GB, Furnell SM
in "Insider Threats in Cyber Security", Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter (Eds.), Springer, ISBN 978-1-4419-7132-6, 244pp, 2010