Professor Nathan Clarke
Profiles

Professor Nathan Clarke

Professor in Cyber Security and Digital Forensics

Role

Professor of Cyber Security & Digital Forensics

Adjunct Professor, Edith Cowan University, Australia

Qualifications

PGCert Learning & Teaching in Higher Education
PhD, "Advanced User Authentication for Mobile Devices"
BEng (Hons) Electronic Engineering (1st Class)

IEEE Certified Biometrics Professional
AccessData Certified Examiner (ACE)

Professional membership

Senior Fellow of the Higher Education Academy (SFHEA)
Chartered Engineer (CEng)
Fellow of the British Computing Society (FBCS)
Senior Member of the Institute for Electrical and Electronic Engineering (IEEE)

Journal Editorships:

Editorial Board Member, Computers & Security, Elsevier
Associate Editor, Security & Communication Networks, John Wiley
Associate Editor, Transactions on Internet and Information Systems, KIIS
Associate Editor, Communications and Computer Security, ACTA Press
Editorial Board Member, International Journal of Cyber Warfare and Terrorism, IGI Global

Referring for Journals:

Computer Standards and Interfaces, Elsevier
Computers & Security, Elsevier
EURASIP Journal on Advances in SignalProcessing, Springer
IEEE Communications Surveys and Tutorials
IEEE Journal on Selected Areas in Communications Special Issue on Advances in Digital Forensics for Communications and Networking
IEEE Transactions on Cybernetics, IEEE
IEEE Transactions on Human-Machine Systems,IEEE
IEEE Transactions on Information Forensics& Security, IEEE
IET Information Security, IET
IET Signal Processing, IET

Information Security Journal: A GlobalPerspective
Information Security Technical Report,Elsevier
International Journal of Computer Science andSecurity, Computer Science Journals
International Journal of ElectronicGovernance (IJEG), Inderscience
International Journal of InformationTechnologies and Systems Approach, IGI Global
International Journal of InterdisciplinaryTelecommunications & Networking, IGI Global.
International Journal of Pattern Recognitionand Artificial Intelligence, World Scientific.
Internet Research, Emerald
Journal for Information Warfare
Information Sciences, Elsevier
Journal of Internet Services andApplications, Springer.
Journal of Mobile Networks &Applications, Springer
Journal of Network and Computer Applications,Elsevier
Journal of Systems and Software,Elsevier
Journal on Personal and Ubiquitous Computing:Special Issue: Security and Trust in Context-Aware Systems, Springer
KSII Transactions on Internet and InformationSystems
Recent Patents in Computer Science, BenthamScience
Security & Communication Networks, JohnWiley & Sons
The Computer Journal, Oxford Journals

Roles on external bodies

Chair, IFIP TC11 Working Group 11.12 Human Aspects of Information Security & Assurance

Member, IFIP TC11 Working Group 11.1 on Information Security Management
Member, IFIP TC11 Working Group 11.6 on Identity Management

External Research Council Grant Reviewing:

Engineering and Physical Sciences Research Council (EPSRC), UK
National Research Foundation (NRF), South Africa
National Research Council Canada (NRC), Canada
Portuguese Foundation for Science and Technology (FCT), Portugal
Technology Foundation STW, The Netherlands
Flanders Innovation & Entrepreneurship, Belgium



Teaching interests

Module Delivery

SEC101 Introduction to Computer Security*

SEC102PP Cybersecurity Essentials*
SEC201 Digital Forensic Investigation*
SEC305/505 Digital Forensic Investigation*

Previous Module Delivery:

CNET115 Computer & Information Security* 
CNET117 Digital Forensics*
CNET335/522 Cybercrime & Forensic Investigation* 
SOFT230 Remote Data Access Technology
CNET221 Network Security
CNET232/525 Systems Security* 
COMP212 Software Engineering and High Level Programming
COMP223 High Level Programming
CNET338/538 Security for Mobile Systems*
CNET336/532 Cryptography & Applications*  
CNET520 Applications of Security 
CNET531 Intrusion Prevention, Detection & Response* 

*Developed module

Staff serving as external examiners

External Examiner for MSc in Cyber Security and Forensics, University of Westminster (2015-Present)
External Advisor for Programme Approval of Comp Computer Forensics, Computer Security & Computer Networks, Liverpool John Moores University (December 2015)
External Examiner for MSc in Cybersecurity and Management, University of Warwick (2012 – Present)
Programme Approval of MComp/BSc (Hons) Computer Security with Forensics, Sheffield Hallam University (April 2011)
Programme Approval of BSc (Hons) Computer Forensics, Liverpool John Moores University (Beckett College) (March 2011)
Programme Approval of MSc Computer Systems and MSc Computer Applications, University of Bedfordshire (June 2010)
Programme Approval of MSc Web Technologies, MSc Media Technology Management and MSc Sound Engineering, Birmingham City University (May 2010)
External Examiner for MSc Computer Applications in Accounting and MSc Computer Systems Auditing, London Metropolitan University (2009 - Present)
Programme Approval of BSc (Hons) Mobile Communications Technology, University of Central England (March 2007)
External Examiner for MSc Computer Forensics & Security, University of Bedfordshire, UK (2007-Present)
Programme Approval of BSc (Hons) Computing & Information Security, Sheffield Halam University (March 2008)

Research Degree Examiner: 

2016, PhD Thesis, A Generic Smartphone Forensic Investigation Process Model, University Putra Malaysia
2016, PhD Thesis, The Role of Security and its Antecedents in E-Government Adoption, Plymouth University (Internal)
2016, PhD Thesis, Defending Against Network and Application Level Denial of Service Attacks, Indian Institute of Technology, Patna, India
2016, PhD Thesis, Opportunities & Risks in Online Gaming Environments, Plymouth University (Internal)
2015, PhD Thesis, Techniques for Analysis & Detection of Android Malware, Malaviya National Institute of Technology, India.
2015, PhD Thesis, Asymmetric Encryption for Wiretap Channels, Plymouth University (Internal)
2015, PhD Thesis, Identifying Memory Address Disclosures, De Montfort University, UK
2015, PhD Thesis, Resolving Semantic Disparities in Digital Forensics, University of Pretoria, South Africa
2015, PhD Thesis, User Controlled Identity Management Systems using Mobile Devices, Glasgow University, UK
2015, PhD Thesis, Secure BPMN – A Graphical Extension for BPMN 2.0 Based pm a Reference Model of Information Assurance and Security, Cardiff University, UK
2015, PhD Thesis, Improved Composability of Software Components through Parallel Hardware Platforms for In-Car Multimedia Systems, University of Plymouth (Internal)
2015, PhD Thesis, A Near-Miss Analysis Model for Improving the Forensic Investigation of Software Failures, University of Pretoria, South Africa
2015, MTech Thesis, Guidelines to Address the Human Factor in the South African National Research and Education Network Beneficiary Institutions.
2015, PhD Thesis, Establishing an Information Security Awareness and Culture, Plymouth University (Internal)
2014, PhD Thesis, Context-Aware Attribute-Based Techniques for Data Security and Access Control in Mobile Cloud Environment, City University, UK
2014, DPhil Thesis, A Public Safety, Participatory Crowdsourcing Smart City Model for a Developing Country, University of Fort Hare, South Africa
2014, PhD Thesis, The Practical Implementation of Optimal and Pseudo-Optimal Routing Algorithms, Glyndwr University, United Kingdom
2014, PhD Thesis, Anonymous Authenticated Announcement Schemes in Vehicular Ad Hoc Networks, Royal Holloway, University of London
2014, PhD Thesis, Method for the Adoption of Information Technology Governance, Risk Management and Compliance in Swiss Hospitals, Plymouth University (Internal)
2013, MSc Thesis, Forensic Evidence Isolation in Clouds, University of Pretoria, South Africa
2013, PhD Thesis, Digital Forensics: An Integrated Approach for the Investigation of Cyber/Computer Related Crimes, University of Bedfordshire
2013 Service Quality and Profit Control in Utility Computing Service Life Cycles, PhD Thesis, Plymouth University (Internal Examiner)
2012 The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice, PhD Thesis, Murdoch University, Australia
2012 Security Usability in IT Systems, MPhil Thesis, Plymouth University (Internal Examiner)
2011 Behavioural Profiling in Mobile Neworks, PhD Thesis, University of Plymouth (Internal Examiner), UK
2010 An Investigation into Remote Transactions, PhD Thesis, Edith Cowan University, Australia
2010 Intrusion Detection Method using a Combination of Neural Network Algorithms, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
2010 Parameter Based Identification, Authentication and Authorisation Method for Mobile Devices, PhD Thesis, City University, London, UK
2010 An Automatic Bank System for Client Credit Rating, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
2009 Smartcard Architecture for Dynamic and Secure Authentication, MSc, University of Pretoria, South Africa 
2008 Models and Methods of Information Security Risks Assessment in the Circumstances of Input Information Ambiguity, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK 
2008 Adoption of Criminal Profiling to Combat Hacking, MPhil Thesis, University of Plymouth, UK - Internal Examiner
2007 Establishing Information Security Culture in Australian Small and Medium Enterprises, PhD Thesis, Deakin University, Australia
2007 A Key Management Framework for Secure Group Communication in Wireless Mobile Environments, PhD Thesis, Royal Holloway, University of London, UK
2006 The Effectiveness of Graphical Authentication: An Exploratory Study, PhD Thesis, Deakin University, Australia
2006 Ontology Modelling for the Information Sharing Process within the Labour Market, MPhil Thesis, Wessex Institute of Technology, UK
2006 Corporate Information Risk: An Information Security Governance Framework, MTech Dissertation, Nelson Mandela Metropolitan University, South Africa.

Research interests

Biometric Authentication
Digital Forensics

Information Systems Security
Intrusion Detection Systems
Security Management and Risk Assessment
Security Education and Awareness

Research degrees awarded to supervised students

1. Dr Vassilis Dimopoulos, Effective Information Assurance with Risk Management (2007)
2. Dr Tarik Ibrahim, Improving Intrusion Prevention, Detection and Response (2011)
3. Dr Nor Badrul Anuar Jumaat, Incident Prioritisation for Intrusion Response Systems (2012)
4. Dr Shukor Razak, A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks (2007)
5. Dr Gina C Tjhai, Anomaly-Based Correlation of IDS Alarms (2011)
6. Dr Fudong Li, Intrusion Prevention and Detection for Mobile Systems (2012)
7. Dr Shuhaili Talib, Personalising Information Security Education (2013)
8. Dr Witold Thaul, The Support of Learning Processes via Personal Knowledge Management Education (2013)
9. Dr Frank Doelitzscher, Security & Privacy for Cloud Computing (2014)
10. Dr Hataichanok Saevanee, Enhancing Authentication over a Touch Screen Interface (2014)
11. Dr Christopher Kosmas, Secure Tracking System for Next Generation CIT Products (2014)
12. Dr Chris Hocking, Authentication Aura (2015)

Grants & contracts

Knowledge Transfer Partnership. Essential 6 Ltd. 2015: £124,000
Security Consultancy. Kernow Health Solutions. 2014: £5000
EPSRC. Identifying and Responding to Human and Software Behaviours in a Changing Cyber Threat Landscape. 2013: £173,383 (Total Award: £1.0M)
Teaching Fellowship Award – e-Invigilator. Plymouth University. 2012: £8100
EU Framework 7 Grant. Centre of Excellence in Cybercrime and Forensics: 2012: £7800 (Total Award: £800k)
EU Framework 7 Grant. Geryon. 2011: €478K (Total Award: €2.5M)
EU Framework 7 Grant. Space Data Routers. 2010: £220,000 (Total Award: £1.6)
Knowledge Transfer Partnership. Absolute Software Limited. 2010: £183,094
Knowledge Transfer Partnership. K2 Medical Systems. 2008: £115,804.
Teaching Fellowship Award – Peer Assessment. University of Plymouth. 2008: £4900
Knowledge Transfer Partnership. Spinnaker International. 2008: £141,599
Knowledge Transfer Partnership. Westland Geoprojects Limited. 2008: £109,633
DTI Funded project into Behavioural Monitoring of Network Communications. 2007: £40,000
End Point Compliance. Symantec.2007: £7,000
Flexible and non-intrusive user authentication for mobile devices. EduServ Foundation. 2006: £80,390
Knowledge Transfer Partnership. Parker Hannifin 2005: £174,000
Subscriber Authentication via Keystroke Analysis on a mobile handset. Orange Personal Communication Services Limited. 2004. £19,814
Biometric Terminal, Phase 1. Orange Personal Communication Services Limited. 2003: £55,000
PC Integrity Testing. Plymouth Trading Standards. 2003-2004: £1,250
WinCPR Software Development. SAHFOS. 2002: £4,000

Research groups

  • Centre for Security, Communications and Network Research (CSCAN)

Key publications are highlighted

Journals
Articles
Alqahtany S, Clarke N, Furnell S & Reich C 2016 'A forensic acquisition and analysis system for IaaS' Cluster Computing 19, (1) 439-453 , DOI PEARL
Al Fahdi M, Clarke NL, Li F & Furnell SM 2016 'A suspect-oriented intelligent and automated computer forensic analysis' Digital Investigation , DOI PEARL
Clarke N, Symes J, Saevanee H & Furnell S 2016 'Awareness of Mobile Device Security' International Journal of Mobile Computing and Multimedia Communications 7, (1) 15-31 , DOI
Al Abdulwahid A, Clarke N, Stengel I, Furnell S & Reich C 2016 'Continuous and transparent multimodal authentication: reviewing the state of the art' Cluster Computing 19, (1) 455-474 , DOI PEARL
Saevanee H, Clarke N, Furnell S & Biscione V 2015 'Continuous user authentication using multi-modal biometrics' COMPUTERS & SECURITY 53, 234-246 Author Site , DOI
Tsimperidis I, Katos V & Clarke N 2015 'Language-independent gender identification through keystroke analysis' Information and Computer Security 23, (3) 286-301 , DOI
Anuar NB, Papadaki M, Furnell S & Clarke N 2014 'A response selection model for intrusion response systems: Response Strategy Model (RSM)' SECURITY AND COMMUNICATION NETWORKS 7, (11) 1831-1848 Author Site , DOI
Li F, Clarke N, Papadaki M & Dowland P 2014 'Active authentication for mobile devices utilising behaviour profiling' INTERNATIONAL JOURNAL OF INFORMATION SECURITY 13, (3) 229-244 Author Site , DOI
Furnell S & Clarke N 2014 'Biometrics: making the mainstream' Biometric Technology Today 2014, (1) 5-9 , DOI
Furnell S, van Niekerk J & Clarke N 2014 'The price of patching' Computer Fraud & Security 2014, (8) 8-13 , DOI
Hocking CG, Furnell SM, Clarke NL & Reynolds PL 2013 'Co-operative user identity verification using an Authentication Aura' COMPUTERS & SECURITY 39, 486-502 Author Site , DOI
Anuar NB, Papadaki M, Furnell SM & Clarke N 2013 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks 6, (9) 1087-1116 , DOI
Doelitzscher F, Reich C, Knahl M & Clarke N 2013 'Understanding Cloud Audits' Privacy and Security for Cloud Computing 125-163
Doelitzscher F, Reich C, Knahl M, Passfall A & Clarke N 2012 'An agent based business aware incident detection system for cloud environments' Journal of Cloud Computing: Advances, Systems and Applications 1, (1) 9-9 , DOI
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N & Gritzalis S 2012 'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers' SECURITY AND COMMUNICATION NETWORKS 5, (1) 3-14 Author Site , DOI
Furnell S & Clarke N 2012 'Power to the people? The evolving recognition of human aspects of security' COMPUTERS & SECURITY 31, (8) 983-988 Author Site , DOI
Hocking CG, Furnell SM, Clarke NL & Reynolds PL 2011 'Authentication Aura - A distributed approach to user authentication' Journal of Information Assurance and Security 6, (2) 149-156 Publisher Site
Tjhai GC, Furnell SM, Papadaki M & Clarke NL 2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm' COMPUTERS & SECURITY 29, (6) 712-723 Author Site , DOI
Tjhai GC, Furnell SM, Papadaki M & Clarke NL 2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and< i> K</i>-means algorithm' Computers & Security 29, 712-723
Anuar NB, Papadaki M, Furnell S & Clarke N 2010 'An investigation and survey of response options for Intrusion Response Systems (IRSs)' Information Security for South Africa (ISSA) 2010, 1-8
Clarke N & Dowland PS 2009 'A CRITICAL EVALUATION OF OPAS (ONLINE PEER ASSESSMENT SYSTEM)' ICERI2009 Proceedings 5124-5135
Razak SA, Samian N, Ma'arof MA, Furnell SM, Clarke NL & Brooke PJ 2009 'A Friend Mechanism for Mobile Ad Hoc Networks' Journal of Information Assurance and Security 4, (4) 440-448
Botha RA, Furnell SM & Clarke NL 2009 'From desktop to mobile: Examining the security experience' COMPUTERS & SECURITY 28, (3-4) 130-137 Author Site , DOI
Razak SA, Furnell SM, Clarke NL & Brooke PJ 2008 'Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks' AD HOC NETWORKS 6, (7) 1151-1167 Author Site , DOI
Clarke NL & Furnell SM 2007 'Advanced user authentication for mobile devices' COMPUTERS & SECURITY 26, (2) 109-119 Author Site , DOI
Clarke NL & Furnell SM 2007 'Authenticating mobile phone users using keystroke analysis' INTERNATIONAL JOURNAL OF INFORMATION SECURITY 6, (1) 1-14 Author Site , DOI
Clarke NL & Mekala AR 2007 'The application of signature recognition to transparent handwriting verification for mobile devices' Information Management & Computer Security 15, (3) 214-225 , DOI
Li F, Clarke N, Bolan C & Australia W 2007 'User Perception of the Security & Privacy Concerns of RFID Technology' Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2007) 156-156
Clarke NL & Furnell SM 2006 'A Composite User Authentication Architecture for Mobile Devices' Journal of Information Warfare 5, (2) 11-29
Razak SA, Fumell S, Clarke N & Brooke P 2006 'A two-tier intrusion detection system for mobile ad hoc networks - A friend approach' INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS 3975, 590-595 Author Site
Clarke NL & Furnell SM 2005 'Authentication of users on mobile telephones - A survey of attitudes and practices' COMPUTERS & SECURITY 24, (7) 519-527 Author Site , DOI
Clarke N & Furnell S 2005 'Biometrics – The promise versus the practice' Computer Fraud & Security 2005, (9) 12-16 , DOI
Furnell S & Clarke N 2005 'Biometrics: no silver bullets' Computer Fraud & Security 2005, (8) 9-14 , DOI
Furnell SM, Katos V & Clarke NL 2005 'The role of academic qualifications in the IT security profession' DATAWATCH, Information Systems Audit and Control Association (ISACA) winter, 8-15
Clarke NL, Furnell SM, Lines BM & Reynolds PL 2003 'Keystroke dynamics on a mobile handset: a feasibility study' Information Management & Computer Security 11, (4) 161-166 , DOI
Clarke NL, Furnell SM, Rodwell PM & Reynolds PL 2002 'Acceptance of subscriber authentication methods for mobile telephony devices' COMPUTERS & SECURITY 21, (3) 220-228 Author Site , DOI
Furnell SM, Clarke NL & Karatzouni S 0 'Beyond the PIN: Enhancing user authentication for mobile devices' Computer Fraud & Security 2008, (8) 12-17
Levy Y, Ramim MM, Furnell SM & Clarke NL 0 'Comparing intentions to use university-provided vs vendor-provided multibiometric authentication in online exams' Campus-Wide Information Systems 28, (2) 102-113
Fajardo JO, Liberal F, Li F, Clarke N & Mkwawa I-H 0 'End-to-middle-to-end solution for IMS media plane security' Electronic Commerce Research , DOI
Talib S, Clarke NL & Furnell SM 0 'Establishing A Personalized Information Security Culture' International Journal of Mobile Computing and Multimedia Communications 3, (1) 63-79 , DOI
Li F, Clarke N, Papadaki M & Dowland P 0 'Misuse Detection for Mobile Devices Using Behaviour Profiling' International Journal of Cyber Warfare and Terrorism 1, (1) 41-53 , DOI
Books
Clarke N & Tryfonas T 2011 Proceedings of the Sixth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2011). University of Plymouth
Clarke N 2011 Transparent User Authentication. Springer Verlag
CLARKE N 2011 Transparent user authentication: biometrics, RFID and behavioural profiling [e-book].
Clarke N 2010 Computer Forensics. It Governance Pub
Clarke N & Tryfonas T 2009 Proceedings of the Fourth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2009): Athens, Greece, 25-26 June 2009. Centre for Information Security & Network Research, University of Plymouth
Furnell S & Clarke N 2009 Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009). Lulu. com
FURNELL S & CLARKE N 2007 International Symposium on Human Aspects of Information Security (HAISA). Emerald 15
Chapters
Clarke NL, Dowland P & Furnell SM 2008 'User Authentication Technologies' in Furnell S; Katsikas SK; Lopez J; Patel A Securing information and communications systems Artech House Publishers 35-59
Conference Papers
Clarke N, Katos V, Menesidou SA, Ghita B & Furnell S 2012 'A novel security architecture for a space-data DTN' //0 //0 Springer Berlin/Heidelberg 342-349
Anuar NB, Papadaki M, Furnell S & Clarke N 2012 'A Response Strategy Model for Intrusion Response Systems' //0 //0 573-578
Saevanee H, Clarke NL & Furnell SM 2012 'Multi-modal Behavioural Biometric Authentication for Mobile Devices' //0 //0 465-474
Thaul W, Bleimann U & Clarke N 2012 'Personal knowledge management beyond versioning' //0 //0 28-28
Doelitzscher F, Fischer C, Moskal D, Reich C, Knahl M & Clarke N 2012 'Validating Cloud Infrastructure Changes by Cloud Audits' //0 //0 377-384
Doelitzscher F, Reich C, Knahl M & Clarke N 2011 'An autonomous agent based incident detection system for cloud environments' //0 //0 197-204
Li F, Clarke N, Papadaki M & Dowland P 2011 'Behaviour Profiling for Transparent Authentication for Mobile Devices' //0 //0 307-314
Doelitzscher F, Reich C, Knahl M & Clarke N 2011 'Incident detection for cloud environments' //0 //0 100-105
Lederm T & Clarke N 2011 'Risk assessment for mobile devices' //0 //0 Springer Berlin/Heidelberg 210-221
Saevanee H, Clarke N & Furnell S 2011 'SMS linguistic profiling authentication on mobile device' //0 //0 224-228
Talib S, Clarke NL, Furnell SM & IEEE 2010 'An Analysis of Information Security Awareness within Home and Work Environments' //0 //0 196-203 , DOI
Ibrahim T, Furnell SM, Papadaki M & Clarke NL 2010 'Assessing the Usability of End-User Security Software' //0 //0 177-189
Ibrahim T, Furnell S, Papadaki M & Clarke N 2009 'Assessing the Usability of Personal Internet Security Tools' //0 //0 102-111
Clarke N, Karatzouni S & Furnell S 2009 'Flexible and Transparent User Authentication for Mobile Devices' //0 //0 1-12
Li F, Clarke NL & Papadaki M 2009 'Intrusion Detection System for Mobile Devices: Investigation on Calling Activity' //0 //0
Stienne DS, Clarke N & Reynolds P 2009 'Strong Authentication for Web Services using Smartcards' //0 //0 8-8
Ibrahim T, Furnell SM, Papadaki M & Clarke NL 2008 'Assessing the Challenges of Intrusion Detection Systems' //0 //0
Buchoux A & Clarke NL 2008 'Deployment of keystroke analysis on a smartphone' //0 //0 48-48
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2008 'Investigating the problem of IDS false alarms: An experimental study using Snort' //0 //0 Springer 253-267
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2008 'The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset' //0 //0 139-150
Razak SA, Furnell S, Clarke N & Brooke P 2007 'Building a trusted community for mobile ad hoc networks using friend recommendation' //0 //0 129-141
Karatzouni S, Clarke NL & Furnell SM 2007 'Device-versus Network-Centric Authentication Paradigms for Mobile Devices' //0 //0 School of Computer and Information Science, Edith Cowan University, Perth, Western Australia
Karatzouni S & Clarke N 2007 'Keystroke analysis for thumb-based keyboards on mobile devices' //0 //0 Springer Boston 253-263
Karatzouni S, Furnell SM, Clarke NL & Botha RA 2007 'Perceptions of user authentication on mobile devices' //0 //0 11-13
Furnell S & Clarke N 2007 'Proceedings of the International Symposium on Human Aspects of Information Security and Assurance (HAISA 2007)' //0 //0 University of Plymouth, School Of Computing, Communications And Electronics
Razak SA, Furnell S, Clarke N & Brooke P 2006 'Part II-Short Papers-Infrastructure Protection and Cyber Security-A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks–A Friend Approach' //0 //0 Berlin: Springer-Verlag, 1973- 590-595
Furnell S & Clarke N 2005 'Organisational security culture: embedding security awareness, education and training' //0 //0 67-74
Clarke N, Furnell S, Lines B & Reynolds P 2004 'Application of keystroke analysis to mobile text messaging' //0 //0 14-15
Clarke NL, Furnell SM, Lines BM & Reynolds PL 2003 'Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets' //0 //0 97-108
Clarke NL, Furnell SM, Lines BM & Reynolds PL 2003 'Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets' //0 //0 97-108
Clarke NL, Furnell SM, Reynolds PL, Rodwell PM, IEE & IEE 2002 'Advanced subscriber authentication approaches for third generation mobile systems' //0 //0 319-323
Clarke NL, Furnell SM, Reynolds PL & Rodwell PM 2002 'Advanced subscriber authentication approaches for third generation mobile systems' Third International Conference on 3G Mobile Communication Technologies //0 //0 319-323
Clarke NL, Furnell SM & Reynolds PL 2002 'Biometric authentication for mobile devices' //0 //0 61-69
Clarke NL, Furnell S, Lines BM & Reynolds PL 2002 'Subscriber Authentication for Mobile Phones through the Implementation of Keystroke Dynamics' Furnell S; Dowland PS //0 //0 University of Plymouth 347-355
Clarke N, Furnell S, Lines B & Reynolds P 2002 'Subscriber authentication for mobile phones using keystroke dynamics' //0 //0 16-18
Patents
Clarke N, Kosmas C, Tripp N, Westington A & Tjhai C 0 Adjusting an operating mode of a security container in response to an unexpected received radio signal. GB2472632 (A)
Other Publications
Jaeger M & Clarke NL 2006 The Awareness and Perception of Spyware amongst Home PC Computer Users. Lulu. com 0 0 60-60
Lecomte J, Clarke N & Furnell S 2005 Artifical Impostor Profiling for Keystroke Analysis on a Mobile Handset. 0 0
KOSMAS C, TRIPP N, WESTINGTON A, CLARKE N & TJHAI C 0 A CONTAINER AND SECURITY SYSTEMS. 0 0
Krishnasamy M & Clarke NL 0 Biometrics for Mobile Devices: A Comparison of Performance and Pattern Classification Approaches. Lulu. com 0 0 57-57
Karatzouni S, Clarke NL & Furnell SM 0 Device versus network-centric authentication models for mobile devices–operational and perceptual trade-offs. Lulu. com 0 0 23-23
Karatzouni S & Clarke NL 0 Keystroke analysis as an authentication method for thumb-based keyboards on mobile handsets. Lulu. com 0 0 213-213
Sklikas V & Clarke NL 0 Mobile Devices-Future Security Threats & Vulnerabilities. Lulu. com 0 0 100-100

Links

The Centre's research website can be located at: www.cscan.org