Professor Nathan Clarke
Profiles

Professor Nathan Clarke

Deputy Head of School

School of Engineering, Computing and Mathematics (Faculty of Science and Engineering)

Nathan can be contacted through arrangement with our Press Office, to speak to the media on these areas of expertise.
  • Information security
  • Biometrics
  • Computer forensics
  • Computing

Role

Prof Clarke is a Professor of Cyber Security and Digital Forensics at Plymouth University. Prof Clarke is also an adjunct Professor at Edith Cowan University, Western Australia. His research interests reside in the area of information security, biometrics, forensics and intrusion detection and has over 200 outputs consisting of journal papers, conference papers, books, edited books, book chapters and patents. He is the Chair of the IFIP TC11.12 Working Group on the Human Aspects of Information Security & Assurance. Prof Clarke is a chartered engineer, a fellow of the British Computing Society (BCS) and a senior member of the IEEE and the author of Transparent Authentication: Biometrics, RFID and Behavioural Profiling published by Springer and Computer Forensics: A Pocket Guide published by IT Governance.

Roles:

Deputy Head of School
Professor of Cyber Security & Digital Forensics
Adjunct Professor, Edith Cowan University, Australia

Qualifications

  • PGCert Learning & Teaching in Higher Education (2005)
  • PhD, "Advanced User Authentication for Mobile Devices" (2004)
  • BEng (Hons) Electronic Engineering (1st Class) (2001)

Professional membership

  • Senior Fellow of the Higher Education Academy (SFHEA)
  • Chartered Engineer (CEng)
  • Fellow of the British Computing Society (FBCS)
  • Senior Member of the Institute for Electrical and Electronic Engineering (SMIEEE)
  • Member of the Chartered Institute of Information Security (MCIIS)

Roles on external bodies

  • Chair, IFIP TC11 Working Group 11.12 Human Aspects of Information Security & Assurance (2013-2019)
  • Member, IFIP TC11 Working Group 11.12 on Human Aspects of Information Security & Assurance (2010-)
  • Member, IFIP TC11 Working Group 11.1 on Information Security Management
  • Member, IFIP TC11 Working Group 11.6 on Identity Management

External Research Council Grant Reviewing:

  • Engineering and Physical Sciences Research Council (EPSRC), UK
  • National Research Foundation (NRF), South Africa
  • National Research Council Canada (NRC), Canada
  • Portuguese Foundation for Science and Technology (FCT), Portugal
  • Technology Foundation STW, The Netherlands
  • Flanders Innovation & Entrepreneurship, Belgium
  • The Royal Society, United Kingdom
  • European Research Council
  • Swiss National Science Foundation



Teaching interests

Module Delivery

  • COMP1002 Cyber Security & Networks*
  • COMP3012 Digital Forensics & Malware Analysis*
  • COMP5004 Digital Forensics & Malware Analysis*

Previous Module Delivery:

  • CNET115 Computer & Information Security* 
  • CNET117 Digital Forensics*
  • CNET335/522 Cybercrime & Forensic Investigation* 
  • SOFT230 Remote Data Access Technology 
  • CNET221 Network Security 
  • CNET232/525 Systems Security* 
  • COMP212 Software Engineering and High Level Programming 
  • COMP223 High Level Programming 
  • CNET338/538 Security for Mobile Systems*
  • CNET336/532 Cryptography & Applications* 
  • CNET520 Applications of Security 
  • CNET531 Intrusion Prevention, Detection & Response* 
  • SEC101 Introduction to Computer Security*
  • SEC102PP Cybersecurity Essentials*
  • SEC201 Digital Forensic Investigation*
  • SEC104 Cybersecurity & Networks*
  • SEC305/505 Digital Forensic Investigation*

*Developed module

Staff serving as external examiners

External Teaching Roles:

  • External Advisor for MSc in Artificial Intelligence, National Commission for Further and Higher Education, Malta (March 2020)
  • External Examiner for Undergraduate Programmes in Cyber Security, Edinburgh Napier University (2016-Present)
  • External Examiner for MSc in Cyber Security and Forensics, University of Westminster (2015-2019)
  • External Advisor for Programme Approval of Comp Computer Forensics, Computer Security & Computer Networks, Liverpool John Moores University (December 2015)
  • External Examiner for MSc in Cybersecurity and Management, University of Warwick (2012 – 2017)
  • Programme Approval of MComp/BSc (Hons) Computer Security with Forensics, Sheffield Hallam University (April 2011)
  • Programme Approval of BSc (Hons) Computer Forensics, Liverpool John Moores University (Beckett College) (March 2011)
  • Programme Approval of MSc Computer Systems and MSc Computer Applications, University of Bedfordshire (June 2010)
  • Programme Approval of MSc Web Technologies, MSc Media Technology Management and MSc Sound Engineering, Birmingham City University (May 2010)
  • External Examiner for MSc Computer Applications in Accounting and MSc Computer Systems Auditing, London Metropolitan University (2009 - 2013)
  • Programme Approval of BSc (Hons) Mobile Communications Technology, University of Central England (March 2007)
  • External Examiner for MSc Computer Forensics & Security, University of Bedfordshire, UK (2007-Present)
  • Programme Approval of BSc (Hons) Computing & Information Security, Sheffield Halam University (March 2008)

Research Degree Examiner: 

  • 2020, PhD Thesis. Continuous Authentication on Mobile Devices, City University of London
  • 2020, PhD Thesis, Risk Communication Framework for Parental Control in the Digital World, University of Plymouth (Internal)
  • 2019, PhD Thesis, Strengthening Password-Based Authentication, Royal Holloway, University of London, UK
  • 2019, PhD Thesis, Relevance Feedback Optimization for Digital Forensic Investigations, The British University in Dubai, UAE
  • 2019, PhD Thesis, Advancing User Authentication and Access Management, University of Plymouth, UK (Internal)
  • 2019, PhD Thesis, Towards a Standardized Attack Graph Visual Syntax, The University of Warwick, UK
  • 2019, PhD Thesis, An Evaluation and Enhancement of Public Cyber Security Awareness, University of Plymouth, UK (Internal)
  • 2019, PhD Thesis, Honeypot for Wireless Sensor Networks, University of Plymouth, UK (Internal)
  • 2019, PhD Thesis, Social Engineering Attack Detection Model, University of Pretoria, South Africa
  • 2018, PhD Thesis, System Steganalysis: Implementation Vulnerabilities and Side Channel Attacks against Digital Steganography Systems, University of Kent, UK
  • 2018, PhD Thesis, An Investigation Framework for the IoT Forensics, University of Southampton, UK
  • 2018, PhD Thesis, Towards a framework to promote the development of secure and usable online information security applications, University of South Africa, South Africa
  • 2018, PhD Thesis, A Multi-Domain Approach for Insider Threat Modelling and Security Compliance, University of Bristol, UK
  • 2017, PhD Thesis, Big Data Forensic as a Service, University of South Wales
  • 2017, PhD Thesis, A Novel Human Visual Psychophysics Based Approach to Distinguish Between Human Users and Computer Robots, City University
  • 2017, PhD Thesis, A Method to Enhance the Accuracy of Digital Forensics in the Absence of Complete Evidence in Saudi Arabia, De Montfort University
  • 2017, PhD Thesis, A Malware Analysis and Detection System for Mobile Devices, University of Malaya
  • 2016, PhD Thesis, A Generic Smartphone Forensic Investigation Process Model, University Putra Malaysia
  • 2016, PhD Thesis, The Role of Security and its Antecedents in E-Government Adoption, Plymouth University (Internal)
  • 2016, PhD Thesis, Defending Against Network and Application Level Denial of Service Attacks, Indian Institute of Technology, Patna, India
  • 2016, PhD Thesis, Opportunities & Risks in Online Gaming Environments, Plymouth University (Internal)
  • 2015, PhD Thesis, Techniques for Analysis & Detection of Android Malware, Malaviya National Institute of Technology, India.
  • 2015, PhD Thesis, Asymmetric Encryption for Wiretap Channels, Plymouth University (Internal)
  • 2015, PhD Thesis, Identifying Memory Address Disclosures, De Montfort University, UK
  • 2015, PhD Thesis, Resolving Semantic Disparities in Digital Forensics, University of Pretoria, South Africa
  • 2015, PhD Thesis, User Controlled Identity Management Systems using Mobile Devices, Glasgow University, UK
  • 2015, PhD Thesis, Secure BPMN – A Graphical Extension for BPMN 2.0 Based pm a Reference Model of Information Assurance and Security, Cardiff University, UK
  • 2015, PhD Thesis, Improved Composability of Software Components through Parallel Hardware Platforms for In-Car Multimedia Systems, University of Plymouth (Internal)
  • 2015, PhD Thesis, A Near-Miss Analysis Model for Improving the Forensic Investigation of Software Failures, University of Pretoria, South Africa
  • 2015, MTech Thesis, Guidelines to Address the Human Factor in the South African National Research and Education Network Beneficiary Institutions.
  • 2015, PhD Thesis, Establishing an Information Security Awareness and Culture, Plymouth University (Internal)
  • 2014, PhD Thesis, Context-Aware Attribute-Based Techniques for Data Security and Access Control in Mobile Cloud Environment, City University, UK
  • 2014, DPhil Thesis, A Public Safety, Participatory Crowdsourcing Smart City Model for a Developing Country, University of Fort Hare, South Africa
  • 2014, PhD Thesis, The Practical Implementation of Optimal and Pseudo-Optimal Routing Algorithms, Glyndwr University, United Kingdom
  • 2014, PhD Thesis, Anonymous Authenticated Announcement Schemes in Vehicular Ad Hoc Networks, Royal Holloway, University of London
  • 2014, PhD Thesis, Method for the Adoption of Information Technology Governance, Risk Management and Compliance in Swiss Hospitals, Plymouth University (Internal)
  • 2013, MSc Thesis, Forensic Evidence Isolation in Clouds, University of Pretoria, South Africa
  • 2013, PhD Thesis, Digital Forensics: An Integrated Approach for the Investigation of Cyber/Computer Related Crimes, University of Bedfordshire
  • 2013 Service Quality and Profit Control in Utility Computing Service Life Cycles, PhD Thesis, Plymouth University (Internal Examiner)
  • 2012 The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice, PhD Thesis, Murdoch University, Australia
  • 2012 Security Usability in IT Systems, MPhil Thesis, Plymouth University (Internal Examiner) 
  • 2011 Behavioural Profiling in Mobile Neworks, PhD Thesis, University of Plymouth (Internal Examiner), UK
  • 2010 An Investigation into Remote Transactions, PhD Thesis, Edith Cowan University, Australia
  • 2010 Intrusion Detection Method using a Combination of Neural Network Algorithms, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
  • 2010 Parameter Based Identification, Authentication and Authorisation Method for Mobile Devices, PhD Thesis, City University, London, UK
  • 2010 An Automatic Bank System for Client Credit Rating, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
  • 2009 Smartcard Architecture for Dynamic and Secure Authentication, MSc, University of Pretoria, South Africa 
  • 2008 Models and Methods of Information Security Risks Assessment in the Circumstances of Input Information Ambiguity, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK 
  • 2008 Adoption of Criminal Profiling to Combat Hacking, MPhil Thesis, University of Plymouth, UK - Internal Examiner 
  • 2007 Establishing Information Security Culture in Australian Small and Medium Enterprises, PhD Thesis, Deakin University, Australia 
  • 2007 A Key Management Framework for Secure Group Communication in Wireless Mobile Environments, PhD Thesis, Royal Holloway, University of London, UK 
  • 2006 The Effectiveness of Graphical Authentication: An Exploratory Study, PhD Thesis, Deakin University, Australia 
  • 2006 Ontology Modelling for the Information Sharing Process within the Labour Market, MPhil Thesis, Wessex Institute of Technology, UK 
  • 2006 Corporate Information Risk: An Information Security Governance Framework, MTech Dissertation, Nelson Mandela Metropolitan University, South Africa.

Research interests

  • Biometric Authentication
  • Digital Forensics
  • Cyber security
  • Information Systems Security
  • Intrusion Detection Systems
  • Security Management and Risk Assessment
  • Security Education and Awareness

Research degrees awarded to supervised students

Completed PhD Project Supervision as Director of Studies:

  • Dr Fudong Li, Intrusion Prevention and Detection for Mobile Systems (2012)
  • Dr Shuhaili Talib, Personalising Information Security Education (2013)
  • Dr Hataichanok Saevanee, Enhancing Authentication over a Touch Screen Interface (2014)
  • Dr Sevasti Karatzouni, Non-Intrusive Continuous User Authentication for Mobile Devices (2014)
  • Dr Mahmood Al Fahdi, Automated Digital Forensics & Cybercrime Profiling (2016)
  • Dr Christopher Kosmas, Secure tracking system for next generation CIT products (2014)
  • Dr Salam Ketab, E-Invigilator of E-Assessment (2017)
  • Dr Saad Alqahtany, A Forensically-Enabled Cloud Computing Architecture (2017)
  • Dr Gaseb Alotibi, Behavioural Monitoring for Network Communications (2017)
  • Dr Abdulwahid Al Abdulwahid, Federated Authentication using the Cloud (Cloud Aura) (2017)
  • Dr Athanassios Triantafyllidis, eLearning Web-Based Applications: Enhancing Productivity and Commercial Value (2017)
  • Dr Burhan Al-Bayati, Continuous Identity Verification in Cloud Computing Services (2018)
  • Dr Hussam Mohammed, Digital Forensic Analysis of Big Data (2018)
  • Dr Manal Alohali, Information Security Risk Assessment for The General Public (2018)
  • Dr Leith Abed, Securing Cloud Storage by Transparent Biometric Cryptography (2019)
  • Dr Hiba Al-Kawaz, Forensic Facial Recognition of Multimedia Files (2019)
  • Dr Hind Al-Obaidi, Transparent Authentication Utilising Gait Recognition (2019)
  • Dr Timibloudi Stephen Enamamu, Bioelectrical User Authentication (2019)
  • Dr Shahlaa Mashhadani, Image Forensics (2019)
  • Dr Abdulrahman Alruban, Applying biometrics to digital forensics (2020)
  • Dr Dany Joy, An Intelligent Network Forensic Analyzer (2020)
  • Dr Fayez Alotaibi, Improving Cyber Security Management and Awareness for Home Users (2020)
  • Dr Aziz Alshehri, A Privacy Enhancing Framework for Mobile Devices (2020)
  • Dr Abdulaziz Altamimi, Author Identification of Text Limited Messages (2020)
  • Dr Neamah Al-Naffakh, Wearable Computing and Transparent Authentication (2020)

Completed PhD Project Supervision as Supervisor:

  • Dr Shukor Razak, A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks (2007)
  • Dr Vassilis Dimopoulos, Effective Information Assurance with Risk Management (2007)
  • Dr Gina C Tjhai, Anomaly-Based Correlation of IDS Alarms (2011)
  • Dr Tarik Ibrahim, Improving Intrusion Prevention, Detection and Response (2011)
  • Dr Nor Badrul Anuar Jumaat, Incident Prioritisation for Intrusion Response Systems (2012)
  • Dr Garrett Smiley, Investigating the Role of Multibiometric Authentication on Professional Certification E-Examination (2013)
  • Dr Witold Thaul, The support of learning processes via personal knowledge management Education (2013)
  • Dr Frank Doelitzscher, Security and Privacy for Cloud Computing (2014)
  • Dr Chris Hocking, Authentication Aura (2015)
  • Dr Hanna Shauchenka, Marketing of virtual Universities (Atlantis University) – Application of Quantitative Analysis (2015)
  • Dr Thomas Rübsamen, Privacy Protection in Cloud Computing (2016)
  • Dr Mutlaq Alotaibi, User's behaviour with Organisational Information Security Policies (2017)
  • Dr Saud Nejr Alotaibi, Taxonomy of Application-Based Behaviour Authentication for Mobile Security (2019)
  • Dr Reem Alkanhel, Designing a usable security framework for IoT (2019)
  • Dr Samah Alshathri, Energy Consumption Optimisation in Cloud Computing Data Centres (2020)
  • Dr Stefan Frey, Autonomic SLA Management as a Service (2020)
  • Dr Faisal Shaman, User Traffic Profiling in Computer Networks (2020)

Grants & contracts

  • European Research Development Fund. EPIC 2. 2020-2023. €3.3M (Total Award: €4.1M)
  • Research England Development Fund. Cyber-Ship Lab. 2019-2022: £1.682 M (Total Award: £3M)
  • EU Horizon 2020. Foresight. 2019-2022: €290,000 (Total Award: €6M)
  • EU Horizon 2020. Cyber-Trust. 2017-2020: €398,000 (Total Award: €3M)
  • Knowledge Transfer Partnership. Essential 6 Ltd. 2015: £124,000
  • Security Consultancy. Kernow Health Solutions. 2014: £5000
  • EPSRC. Identifying and Responding to Human and Software Behaviours in a Changing Cyber Threat Landscape. 2013: £173,383 (Total Award: £1.0M)
  • Teaching Fellowship Award – e-Invigilator. Plymouth University. 2012: £8100
  • EU Framework 7 Grant. Centre of Excellence in Cybercrime and Forensics: 2012: £7800 (Total Award: £800k)
  • EU Framework 7 Grant. Geryon. 2011: €478K (Total Award: €2.5M)
  • EU Framework 7 Grant. Space Data Routers. 2010: £220,000 (Total Award: £1.6)
  • Knowledge Transfer Partnership. Absolute Software Limited. 2010: £183,094
  • Knowledge Transfer Partnership. K2 Medical Systems. 2008: £115,804.
  • Teaching Fellowship Award – Peer Assessment. University of Plymouth. 2008: £4900
  • Knowledge Transfer Partnership. Spinnaker International. 2008: £141,599
  • Knowledge Transfer Partnership. Westland Geoprojects Limited. 2008: £109,633
  • DTI Funded project into Behavioural Monitoring of Network Communications. 2007: £40,000
  • End Point Compliance. Symantec.2007: £7,000
  • Flexible and non-intrusive user authentication for mobile devices. EduServ Foundation. 2006: £80,390
  • Knowledge Transfer Partnership. Parker Hannifin 2005: £174,000
  • Subscriber Authentication via Keystroke Analysis on a mobile handset. Orange Personal Communication Services Limited. 2004. £19,814
  • Biometric Terminal, Phase 1. Orange Personal Communication Services Limited. 2003: £55,000
  • PC Integrity Testing. Plymouth Trading Standards. 2003-2004: £1,250
  • WinCPR Software Development. SAHFOS. 2002: £4,000

Research groups

Key publications are highlighted

Journals
Articles
Da Veiga A, Vorster R, Li F, Clarke N & Furnell SM 2019 'Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements' Information & Computer Security ahead-of-print, (ahead-of-print) , DOI
Fajardo JO, Liberal F, Li F, Clarke N & Mkwawa I-H 2019 'End-to-middle-to-end solution for IMS media plane security' Electronic Commerce Research 19, (3) 719-746 , DOI
Ali M, Shiaeles S, Clarke N & Kontogeorgis D 2019 'A proactive malicious software identification approach for digital forensic examiners' Journal of Information Security and Applications , DOI PEARL
Alotaibi S, Furnell S & Clarke N 2019 'A Novel Transparent User Authentication Approach for Mobile Applications' Information Security Journal: A Global Perspective 27, (5-6) 292-305 , DOI PEARL
Alotaibi M, Furnell SM & Clarke N 2019 'A Framework for Reporting and Dealing with End-User Security Policy Compliance' Information and Computer Security 27, (1) 2-25 , DOI PEARL
Alshathri S, Ghita B & Clarke N 2018 'Sharing with live migration energy optimization scheduler for cloud computing data centers' Future Internet 10, (9) , DOI
Furnell S & Clarke N 2018 'Inhabiting the Biometric Society' ITNOW 60, (3) 42-43 , DOI
Furnell S & Clarke N 2018 'Guest editorial' Information and Computer Security 26, (3) 262-263 , DOI
Clarke N, Alohali M, Li F & Furnell S 2018 'Identifying and Predicting the Factors Affecting End-Users’ Risk-Taking Behavior' Information and Computer Security 26, (3) 306-326 , DOI PEARL
Alohali M, Clarke N & Furnell S 2018 'The Design and Evaluation of a User-Centric Information Security Risk Assessment and Response Framework' International Journal of Advanced Computer Science and Applications 9, (10) , DOI
Clarke N, Furnell S & Li F 2017 'A novel privacy preserving user identification approach for network traffic' Computers and Security , DOI PEARL
Al Fahdi M, Clarke NL, Li F & Furnell SM 2016 'A suspect-oriented intelligent and automated computer forensic analysis' DIGITAL INVESTIGATION 18, 65-76 Author Site , DOI PEARL
Furnell S & Clarke N 2016 'Guest editorial' Information and Computer Security 24, (2) 138-138 , DOI
Clarke N, Symes J, Saevanee H & Furnell S 2016 'Awareness of Mobile Device Security' International Journal of Mobile Computing and Multimedia Communications 7, (1) 15-31 , DOI
Al Abdulwahid A, Clarke N, Stengel I, Furnell S & Reich C 2015 'Continuous and transparent multimodal authentication: reviewing the state of the art' Cluster Computing 19, (1) 455-474 , DOI PEARL
Alqahtany S, Clarke N, Furnell S & Reich C 2015 'A forensic acquisition and analysis system for IaaS' Cluster Computing 19, (1) 439-453 , DOI PEARL
Saevanee H, Clarke N, Furnell S & Biscione V 2015 'Continuous user authentication using multi-modal biometrics' Computers & Security 53, 234-246 , DOI PEARL
Tsimperidis I, Katos V & Clarke N 2015 'Language-independent gender identification through keystroke analysis' Information and Computer Security 23, (3) 286-301 , DOI
Fajardo JO, Liberal F, Li F, Clarke N & Mkwawa I-H 2014 'End-to-middle-to-end solution for IMS media plane security' Electronic Commerce Research , DOI PEARL
Furnell S, van Niekerk J & Clarke N 2014 'The price of patching' Computer Fraud & Security 2014, (8) 8-13 , DOI
Furnell S & Clarke N 2014 'Biometrics: making the mainstream' Biometric Technology Today 2014, (1) 5-9 , DOI
Anuar NB, Papadaki M, Furnell S & Clarke N 2013 'A response selection model for intrusion response systems: Response Strategy Model (RSM)' Security and Communication Networks 7, (11) 1831-1848 , DOI
Hocking CG, Furnell SM, Clarke NL & Reynolds PL 2013 'Co-operative user identity verification using an Authentication Aura' COMPUTERS & SECURITY 39, 486-502 Author Site , DOI
Li F, Clarke N, Papadaki M & Dowland P 2013 'Active authentication for mobile devices utilising behaviour profiling' International Journal of Information Security 13, (3) 229-244 , DOI PEARL
Anuar NB, Papadaki M, Furnell SM & Clarke N 2013 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks 6, (9) 1087-1116 , DOI
Komatsu A, Takagi D & Takemura T 2013 'Human aspects of information security' Information Management & Computer Security 21, (1) 5-15 , DOI
Doelitzscher F, Reich C, Knahl M, Passfall A & Clarke N 2012 'An agent based business aware incident detection system for cloud environments' Journal of Cloud Computing: Advances, Systems and Applications 1, 9-9
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N & Gritzalis S 2012 'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers' SECURITY AND COMMUNICATION NETWORKS 5, (1) 3-14 Author Site , DOI
Furnell S & Clarke N 2012 'Power to the people? The evolving recognition of human aspects of security' Computers & Security
Tryfonas T & Clarke N 2011 'Special issue from the sixth international annual workshop on digital forensics and incident analysis' International Journal of Digital Crime and Forensics 3, (3)
Hocking CG, Furnell SM, Clarke NL & Reynolds PL 2011 'Authentication Aura - A distributed approach to user authentication' Journal of Information Assurance and Security 6, (2) 149-156 Publisher Site
Talib S, Clarke NL & Furnell SM 2011 'Establishing A Personalized Information Security Culture' International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 3, 63-79
Li F, Clarke N, Papadaki M & Dowland P 2011 'Misuse detection for mobile devices using behaviour profiling' International Journal of Cyber Warfare and Terrorism (IJCWT) 1, 41-53
Tjhai GC, Furnell SM, Papadaki M & Clarke NL 2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm' COMPUTERS & SECURITY 29, (6) 712-723 Author Site , DOI
Spafford EH 2010 'Editorial' Computers & Security 29, (6) 641-642 , DOI
Razak SA, Samian N, Ma'arof MA, Furnell SM, Clarke NL & Brooke PJ 2009 'A Friend Mechanism for Mobile Ad Hoc Networks' Journal of Information Assurance and Security 4, (4) 440-448
Botha RA, Furnell SM & Clarke NL 2009 'From desktop to mobile: Examining the security experience' COMPUTERS & SECURITY 28, (3-4) 130-137 Author Site , DOI
Razak SA, Furnell SM, Clarke NL & Brooke PJ 2008 'Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks' AD HOC NETWORKS 6, (7) 1151-1167 Author Site , DOI
Furnell S & Clarke N 2007 'Guest editorial' Information Management & Computer Security 15, (5) , DOI
Clarke NL 2007 'The Application of Signature Recognition to Transparent Handwriting Verification for Mobile Devices' Information Management & Computer Security 15 (3), 214-225 , DOI
Clarke NL & Furnell SM 2007 'Advanced user authentication for mobile devices' COMPUTERS & SECURITY 26, (2) 109-119 Author Site , DOI
Clarke NL & Furnell SM 2007 'Advanced user authentication for mobile devices' Computers & Security 26, (2) 109-119
Clarke NL & Furnell SM 2007 'Authenticating mobile phone users using keystroke analysis' INTERNATIONAL JOURNAL OF INFORMATION SECURITY 6, (1) 1-14 Author Site , DOI
Clarke NL & Furnell SM 2006 'A Composite User Authentication Architecture for Mobile Devices' Journal of Information Warfare 5, (2) 11-29
Clarke NL & Furnell SM 2005 'Authentication of users on mobile telephones - A survey of attitudes and practices' COMPUTERS & SECURITY 24, (7) 519-527 Author Site , DOI
Clarke NL & Furnell SM 2005 'Biometrics - The promise versus the practice' Computer Fraud and Security September, 12-16
Clarke NL & Furnell SM 2005 'Biometrics: No silver bullets' Computer Fraud and Security August, 9-14
Furnell SM, Katos V & Clarke NL 2005 'The role of academic qualifications in the IT security profession' DATAWATCH, Information Systems Audit and Control Association (ISACA) winter, 8-15
Clarke NL 2003 'Keystroke Dynamics on a Mobile Handset: A Feasibility Study' Information Management & Computer Security 11 (4), 161-166 , DOI
Clarke NL, Furnell SM, Rodwell PM & Reynolds PL 2002 'Acceptance of subscriber authentication methods for mobile telephony devices' COMPUTERS & SECURITY 21, (3) 220-228 Author Site , DOI
Alotaibi F, Clarke N & Furnell S 0 'A novel approach for improving information security management and awareness for home environments' Information and Computer Security , DOI PEARL
Furnell SM, Clarke NL & Karatzouni S 0 'Beyond the PIN: Enhancing user authentication for mobile devices' Computer Fraud & Security 2008, (8) 12-17
Levy Y, Ramim MM, Furnell SM & Clarke NL 0 'Comparing intentions to use university-provided vs vendor-provided multibiometric authentication in online exams' Campus-Wide Information Systems 28, (2) 102-113
Naqvi B, Clarke N & Porras J 0 'Incorporating the Human Facet of Security in Developing Systems and Services' Information and Computer Security , DOI PEARL
Books
Clarke N 2011 Transparent User Authentication. Springer Verlag
CLARKE N 2011 Transparent user authentication: biometrics, RFID and behavioural profiling [e-book].
Clarke N 2010 Computer Forensics. It Governance Pub
Chapters
Gantikow H, Reich C, Knahl M & Clarke N 2020 'Rule-Based Security Monitoring of Containerized Environments' Communications in Computer and Information Science Springer International Publishing 66-86 , DOI PEARL
Clarke N 2018 'Biometric systems, modalities and attacks' in Awad AI; Fairhurst M Information Security Foundations, Technologies and Applications
Clarke N, Ghita B & Furnell S 2014 'Delay-tolerant networks (DTNs) for deep-space communications' in Rodrigues JJPC Advances in Delay-tolerant Networks (DTNs) Architecture and Enhanced Performance Elsevier
Doelitzscher F, Reich C, Knahl M & Clarke N 2012 'Understanding Cloud Audits' in Pearson S; Yee G Privacy and Security for Cloud Computing Springer
Clarke NL, Dowland P & Furnell SM 2008 'User Authentication Technologies' in Furnell S; Katsikas SK; Lopez J; Patel A Securing information and communications systems Artech House Publishers 35-59
Conference Papers
Alohali M, Clarke N & Furnell S 2019 'Information Security Risk Communication: A User-Centric Approach' 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA) 1-/-1/2019 1-/-1/2019 IEEE , DOI
Shaman F, Ghita B, Clarke N & Alruban A 2019 'User Profiling Based on Application-Level Using Network Metadata' 2019 7th International Symposium on Digital Forensics and Security (ISDFS) 6-/-0/2019 6-/-0/2019 IEEE , DOI PEARL
Altamimi A, Clarke N, Furnell S & Li F 2019 'Multi-Platform Authorship Verification' the Third Central European Cybersecurity Conference 1-/-1/2019 1-/-1/2019 ACM Press , DOI
Kuijs H, Bayer T, Reich C, Knahl M & Clarke N 2019 'Privacy Enhancing Data Access Control for Ambient Assisted Living' 9th International Conference on Cloud Computing and Services Science 5-/-0/2019 5-/-0/2019 SCITEPRESS - Science and Technology Publications , DOI
Alotaibi S, Alruban A, Furnell S & Clarke N 2019 'A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications' 5th International Conference on Information Systems Security and Privacy 2-/-0/2019 2-/-0/2019 SCITEPRESS - Science and Technology Publications , DOI
Mashhadani S, Clarke N & Li F 2019 'Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion' 5th International Conference on Information Systems Security and Privacy 2-/-0/2019 2-/-0/2019 SCITEPRESS - Science and Technology Publications , DOI
Alruban A, Alobaidi H, Clarke N & Li F 2019 'Physical Activity Recognition by Utilising Smartphone Sensor Signals' 8th International Conference on Pattern Recognition Applications and Methods 2-/-0/2019 2-/-0/2019 SCITEPRESS - Science and Technology Publications , DOI
Rieger T, Regier S, Stengel I & Clarke N 2019 'Fast predictive maintenance in Industrial Internet of Things (IIoT) with Deep Learning (DL): A review' 1-/-0/1900 1-/-0/1900 69-79
Gantikow H, Reich C, Knahl M & Clarke N 2019 'Rule-based security monitoring of containerized workloads' 1-/-0/1900 1-/-0/1900 543-550
Abed L, Clarke N, Ghita B & Alruban A 2019 'Securing Cloud Storage by Transparent Biometric Cryptography' 1-/-0/1900 1-/-0/1900 Springer International Publishing 97-108 , DOI
Al-Naffakh N, Clarke N & Li F 2018 'Continuous user authentication using smartwatch motion sensor data' The 12th IFIP International Conference on Trust Management Toronto, Canada 7-/-0/2018 7-/-0/2018 15-28 , DOI PEARL
Alshehri A, Clarke NL & Li F 2018 'A Holistic Framework for Enhancing Privacy Awareness' 2018 21st Saudi Computer Society National Computer Conference (NCC) 4-/-0/2018 4-/-0/2018 IEEE , DOI
Gaseb A, Nathan C, Fudong L & Furnell S 2018 'The Current Situation of Insider Threats Detection: An Investigative Review' 2018 21st Saudi Computer Society National Computer Conference (NCC) 4-/-0/2018 4-/-0/2018 IEEE , DOI
Mohammed H, Clarke N & Li F 2018 'Evidence Identification in Heterogeneous Data Using Clustering' the 13th International Conference 8-/-0/2018 8-/-0/2018 ACM Press , DOI
Da Veiga A, Vorster R, Li F, Clarke N & Furnell S 2018 'A comparison of compliance with data privacy requirements in two countries' 1-/-0/1900 1-/-0/1900
Al-Obaidi H, Li F, Clarke N, Ghita B & Ketab S 2018 'A multi-algorithmic approach for gait recognition' 1-/-0/1900 1-/-0/1900 20-28
Al-Kawaz H, Clarke N, Furnell S, Li F & Alruban A 2018 'Advanced facial recognition for digital forensics' 1-/-0/1900 1-/-0/1900 11-19
Mohammed H, Clarke N & Li F 2018 'Automating the harmonisation of heterogeneous data in digital forensics' 1-/-0/1900 1-/-0/1900 299-306
Alruban A, Clarke N, Li F & Furnell S 2018 'Biometrically Linking Document Leakage to the Individuals Responsible' 1-/-0/1900 1-/-0/1900 Springer International Publishing 135-149 , DOI
Al-Bayati B, Clarke N, Dowland P & Li F 2018 'Continuous identity verification in cloud storage services using behavioural profiling' 1-/-0/1900 1-/-0/1900 1-10
Al-Bayati B, Clarke N, Dowland P & Li F 2018 'Misuse Detection in a Simulated IaaS Environment' 1-/-0/1900 1-/-0/1900 Springer International Publishing 103-115 , DOI
Mashhadani S, Al-kawaz H, Clarke N, Furnell S & Li F 2017 'A novel multimedia-forensic analysis tool (M-FAT)' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/2017 2-/-1/2017 IEEE , DOI
Alotaibi F, Clarke N & Furnell S 2017 'An analysis of home user security awareness & education' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/2017 2-/-1/2017 IEEE , DOI
Enamamu TS, Clarke N, Haskell-Dowland P & Li F 2017 'Transparent authentication: Utilising heart rate for user authentication' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/2017 2-/-1/2017 IEEE , DOI
Enamamu TS, Clarke N, Haskell-Dowland P & Li F 2017 'Smart watch based body-temperature authentication' 2017 International Conference on Computing Networking and Informatics (ICCNI) 0-/-1/2017 0-/-1/2017 IEEE , DOI
Al-Naffakh N, Clarke N, Li F & Haskell-Dowland P 2017 'Unobtrusive Gait Recognition Using Smartwatches' 9-/-0/2017 1-/-0/1900 , DOI PEARL
Alruban A, Clarke N, Li F & Furnell S 2017 'Insider Misuse Attribution using Biometrics' ARES '17: International Conference on Availability, Reliability and Security 1-/-0/1900 1-/-0/1900 ACM , DOI
Alohali M, Clarke N, Furnell S & Albakri S 2017 'Information security behavior: Recognizing the influencers' 2017 Computing Conference 7-/-0/2017 7-/-0/2017 IEEE , DOI
Alqahtany S, Clarke N, Furnell S & Reich C 2017 'A forensic acquisition based upon a cluster analysis of non-volatile memory in IaaS' 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) 3-/-0/2017 3-/-0/2017 IEEE , DOI
Al-Naffakh N, Clarke N, Dowland P & Fudong Li 2016 'Activity Recognition using wearable computing' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/2016 2-/-1/2016 IEEE , DOI PEARL
Alotaibi M, Furnell S & Clarke N 2016 'Information security policies: A review of challenges and influencing factors' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/2016 2-/-1/2016 IEEE , DOI
Alotibi G, Clarke N, Fudong Li & Furnell S 2016 'User profiling from network traffic via novel application-level interactions' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/2016 2-/-1/2016 IEEE , DOI
Alqahtany S, Clarke N, Furnell S & Reich C 2016 'A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment' 2016 11th International Conference on Availability, Reliability and Security (ARES ) 8-/-0/2016 9-/-0/2016 IEEE , DOI
Alruban A, Clarke N, Li F & Furnell S 2016 'Proactive biometric-enabled forensic imprinting' 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) 6-/-0/2016 6-/-0/2016 IEEE , DOI
Kemmer F, Reich C, Knahl M & Clarke N 2016 'Software Defined Privacy' 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW) 4-/-0/2016 4-/-0/2016 IEEE , DOI
Kuijs H, Reich C, Knahl M & Clarke N 2016 'A Scalable Architecture for Distributed OSGi in the Cloud' 6th International Conference on Cloud Computing and Services Science 4-/-0/2016 4-/-0/2016 SCITEPRESS - Science and and Technology Publications , DOI
Rübsamen T, Reich C, Clarke N & Knahl M 2016 'Evidence Collection in Cloud Provider Chains' 6th International Conference on Cloud Computing and Services Science 4-/-0/2016 4-/-0/2016 SCITEPRESS - Science and and Technology Publications , DOI
Triantafyllidis A, Clarke N, Dowland P & Vranopoulos G 2016 'INCREASING ELEARNING ENGAGEMENT USING MOBILE TECHNOLOGIES' 1-/-0/1900 1-/-0/1900 8644-8653
Clarke N, Li F, Furnell S, Stengel I, Ganis G & Ltd AC 2016 'Information Security and Practice: The User's Perspective' 1-/-0/1900 1-/-0/1900 81-89
Gantikow H, Reich C, Knahl M & Clarke N 2016 'Providing Security in Container-Based HPC Runtime Environments' 1-/-0/1900 1-/-0/1900 Springer International Publishing 685-695 , DOI
Ketab SS, Clarke NL & Dowland PS 2016 'THE VALUE OF THE BIOMETRICS IN INVIGILATED E-ASSESSMENTS' 1-/-0/1900 1-/-0/1900 7648-7658
Sherif E, Furnell S & Clarke N 2015 'Awareness, behaviour and culture: The ABC in cultivating security compliance' 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/2015 2-/-1/2015 IEEE , DOI
Alotaibi S, Furnell S & Clarke N 2015 'Transparent authentication systems for mobile device security: A review' 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/2015 2-/-1/2015 IEEE , DOI
Alqahtany S, Clarke N, Furnell S & Reich C 2015 'Cloud Forensics: A Review of Challenges, Solutions and Open Problems' 2015 International Conference on Cloud Computing (ICCC) 4-/-0/2015 4-/-0/2015 IEEE , DOI
Al Abdulwahid A, Clarke N, Furnell S, Stengel I & Reich C 2015 'The Current Use of Authentication Technologies: An Investigative Review' 2015 International Conference on Cloud Computing (ICCC) 4-/-0/2015 4-/-0/2015 IEEE , DOI
Al Abdulwahid A, Clarke N, Stengel I, Furnell S & Reich C 2015 'A Survey of Continuous and Transparent Multibiometric Authentication Systems' 1-/-0/1900 1-/-0/1900 1-10
Sherif E, Furnell S & Clarke N 2015 'An Identification of Variables Influencing the Establishment of Information Security Culture' 1-/-0/1900 1-/-0/1900 Springer International Publishing 436-448 , DOI
Alotibi G, Li F, Clarke N & Furnell S 2015 'Behavioral-Based Feature Abstraction From Network Traffic' 1-/-0/1900 1-/-0/1900 1-9
Ketab SS, Clarke NL & Dowland PS 2015 'E-INVIGILATION OF E-ASSESSMENTS' 1-/-0/1900 1-/-0/1900 1582-1591
Al Abdulwahid A, Clarke N, Stengel I, Furnell S & Reich C 2015 'Security, Privacy and Usability – A Survey of Users’ Perceptions and Attitudes' 1-/-0/1900 1-/-0/1900 Springer International Publishing 153-168 , DOI
Kasiaras D, Zafeiropoulos T, Clarke N & Kambourakis G 2014 'Android forensics: Correlation analysis' 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/2014 2-/-1/2014 IEEE , DOI
Li F, Clarke N, Furnell S & Mkwawa I-H 2014 'Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks' 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) 0-/-1/2014 0-/-1/2014 IEEE , DOI
Fajardo JO, Liberal F, Li F, Clarke N, Mkwawa I-H & Sun L 2014 'Performance-driven evaluation for deploying IMS-based interoperability scenarios' ICC 2014 - 2014 IEEE International Conference on Communications 6-/-0/2014 6-/-0/2014 IEEE , DOI
Frey S, Luthje C, Reich C & Clarke N 2014 'Cloud QoS Scaling by Fuzzy Logic' 2014 IEEE International Conference on Cloud Engineering (IC2E) 3-/-0/2014 3-/-0/2014 IEEE , DOI
Al Abdulwahid A, Clarke N, Furnell S & Stengel I 2014 'A conceptual model for federated authentication in the cloud' 1-/-0/1900 1-/-0/1900 1-11
Alqahtany S, Clarke N, Furnell S & Reich C 2014 'A forensically-enabled IAAS cloud computing architecture' 1-/-0/1900 1-/-0/1900 75-83 , DOI
Joy D, Li F, Clarke NL & Furnell SM 2014 'A user-oriented network forensic analyser: The design of a high-level protocol analyser' 1-/-0/1900 1-/-0/1900 84-93 , DOI
Li F, Wheeler R & Clarke N 2014 'An Evaluation of Behavioural Profiling on Mobile Devices' 1-/-0/1900 1-/-0/1900 Springer International Publishing 330-339 , DOI
Saevanee H, Clarke N, Furnell S & Biscione V 2014 'Text-Based Active Authentication for Mobile Devices' 1-/-0/1900 1-/-0/1900 Springer Berlin Heidelberg 99-112 , DOI
AlFahdi M, Clarke NL & Furnell SM 2014 'Towards an automated forensic examiner (AFE) based upon criminal profiling & artificial intelligence' 1-/-0/1900 1-/-0/1900 1-9
Doelitzscher F, Knahl M, Reich C & Clarke N 2013 'Anomaly Detection in IaaS Clouds' 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom) 2-/-1/2013 2-/-1/2013 IEEE , DOI
Al Fahdi M, Clarke NL & Furnell SM 2013 'Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions' 2013 Information Security for South Africa 8-/-0/2013 8-/-0/2013 IEEE , DOI
Li F, Clarke N, Furnell S, Oscar Fajardo J, Liberal F & Sidibe M 2013 'A TECHNOLOGY INDEPENDENT SECURITY GATEWAY FOR FUTURE EMERGENCY TELECOMMUNICATION SYSTEMS (ETS)' 1-/-0/1900 1-/-0/1900 299-308
Li F, Clarke N & Furnell S 2013 'A Technology Independent Security Gateway for Real-Time Multimedia Communication' 1-/-0/1900 1-/-0/1900 Springer Berlin Heidelberg 14-25 , DOI
Clarke NL, Dowland P, Furnell SM & IEEE 2013 'e-Invigilator: A Biometric-Based Supervision System for e-Assessments' 1-/-0/1900 1-/-0/1900 238-242
Furnell S, Clarke N & Katos V 2013 'Preface' 1-/-0/1900 1-/-0/1900
Liberal F, Ramos M, Oscar Fajardo J, Goia N, Bizkarguenaga A, Mesogiti J, Theodoropoulou E, Lyberopoulos G, Koumaras H & Sun L 2013 'USER REQUIREMENTS FOR FUTURE WIDEBAND CRITICAL COMMUNICATIONS' 1-/-0/1900 1-/-0/1900 341-348
Dagnall M & Clarke NL 2012 'A feasibility study into tracking Wi-Fi enabled mobile devices' 1-/-0/1900 1-/-0/1900 85-92
Clarke N, Katos V, Menesidou SA, Ghita B & Furnell S 2012 'A novel security architecture for a space-data DTN' 1-/-0/1900 1-/-0/1900 Springer Berlin/Heidelberg 342-349
Anuar N, Papadaki M, Furnell S & Clarke N 2012 'A Response Strategy Model for Intrusion Response Systems' 1-/-0/1900 1-/-0/1900 Springer Boston 573-578
Triantafyllidis A, Clarke NL & Dowland PS 2012 'LEARNING MANAGEMENT SYSTEMS IN HIGHER EDUCATION: A STUDENT PERSPECTIVE' 1-/-0/1900 1-/-0/1900 4046-4055
Saevanee H, Clarke N & Furnell S 2012 'Multi-modal Behavioural Biometric Authentication for Mobile Devices' 1-/-0/1900 1-/-0/1900 Springer Boston 465-474
Thaul W, Bleimann U & Clarke N 2012 'Personal knowledge management beyond versioning' 1-/-0/1900 1-/-0/1900 28-28
Clarke N & Furnell S 2012 'Preface' 1-/-0/1900 1-/-0/1900
Doelitzscher F, Fischer C, Moskal D, Reich C, Knahl M & Clarke N 2012 'Validating Cloud Infrastructure Changes by Cloud Audits' 1-/-0/1900 1-/-0/1900 377-384
Magaya RT & Clarke NL 2012 'Web-based risk analysis for home users' 1-/-0/1900 1-/-0/1900 19-27
Thaul W, Bleimann U & Clarke N 2011 'Personal knowledge management - Beyond versioning' 1-/-0/1900 1-/-0/1900 242-249
Doelitzscher F, Reich C, Knahl M & Clarke N 2011 'An autonomous agent based incident detection system for cloud environments' 1-/-0/1900 1-/-0/1900 197-204
Li F, Clarke N, Papadaki M & Dowland P 2011 'Behaviour Profiling for Transparent Authentication for Mobile Devices' 1-/-0/1900 1-/-0/1900 307-314
Doelitzscher F, Reich C, Knahl M & Clarke N 2011 'Incident detection for cloud environments' 1-/-0/1900 1-/-0/1900 100-105
Furnell S & Clarke N 2011 'Preface' 1-/-0/1900 1-/-0/1900
Lederm T & Clarke N 2011 'Risk assessment for mobile devices' 1-/-0/1900 1-/-0/1900 Springer Berlin/Heidelberg 210-221
Saevanee H, Clarke N & Furnell S 2011 'SMS linguistic profiling authentication on mobile device' 1-/-0/1900 1-/-0/1900 224-228
Talib S, Clarke NL, Furnell SM & IEEE 2010 'An Analysis of Information Security Awareness within Home and Work Environments' 1-/-0/1900 1-/-0/1900 196-203 , DOI
Anuar NB, Papadaki M, Furnell S & Clarke N 2010 'An investigation and survey of response options for Intrusion Response Systems (IRSs)' 1-/-0/1900 1-/-0/1900 1-8
Ibrahim T, Furnell SM, Papadaki M & Clarke NL 2010 'Assessing the Usability of End-User Security Software' 1-/-0/1900 1-/-0/1900 177-189
Clarke N, Furnell S & Von Solms R 2010 'Preface' 1-/-0/1900 1-/-0/1900
Shauchenka HV, Bleimann U, Knoll M & Clarke NL 2010 'Service Quality Assessment in Distance Learning' 1-/-0/1900 1-/-0/1900 269-277
Stienne DS, Clarke N & Reynolds P 2009 'Strong Authentication for web services using smartcards' 1-/-0/1900 1-/-0/1900 55-62
Clarke N & Dowland PS 2009 'A CRITICAL EVALUATION OF OPAS (ONLINE PEER ASSESSMENT SYSTEM)' 1-/-0/1900 1-/-0/1900 IATED 5124-5135
Ibrahim T, Furnell S, Papadaki M & Clarke N 2009 'Assessing the Usability of Personal Internet Security Tools' 1-/-0/1900 1-/-0/1900 102-111
Clarke N, Karatzouni S & Furnell S 2009 'Flexible and Transparent User Authentication for Mobile Devices' 1-/-0/1900 1-/-0/1900 1-12
Li F, Clarke NL & Papadaki M 2009 'Intrusion Detection System for Mobile Devices: Investigation on Calling Activity' 1-/-0/1900 1-/-0/1900
Furnell S & Clarke N 2009 'Preface' 1-/-0/1900 1-/-0/1900
Stienne DS, Clarke N & Reynolds P 2009 'Strong Authentication for Web Services using Smartcards' 1-/-0/1900 1-/-0/1900 8-8
Buchoux A & Clarke NL 2008 'Deployment of keystroke analysis on a Smartphone' 1-/-0/1900 1-/-0/1900 29-39
Ibrahim T, Furnell SM, Papadaki M & Clarke NL 2008 'Assessing the Challenges of Intrusion Detection Systems' 1-/-0/1900 1-/-0/1900
Buchoux A & Clarke NL 2008 'Deployment of keystroke analysis on a smartphone' 1-/-0/1900 1-/-0/1900 48-48
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2008 'Investigating the problem of IDS false alarms: An experimental study using Snort' 1-/-0/1900 1-/-0/1900 Springer 253-267
Clarke N & Furnell S 2008 'Preface' 1-/-0/1900 1-/-0/1900
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2008 'The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset' 1-/-0/1900 1-/-0/1900 139-+
Karatzouni S, Clarke NL & Furnell SM 2007 'Device-versus network-centric authentication paradigms for mobile devices: Operational and perceptual trade-offs' 1-/-0/1900 1-/-0/1900 117-126
Karatzouni S, Clarke NL & Furnell SM 2007 'Utilising biometrics for transparent user authentication on mobile devices' 1-/-0/1900 1-/-0/1900 549-557
Razak SA, Furnell S, Clarke N & Brooke P 2007 'Building a trusted community for mobile ad hoc networks using friend recommendation' 1-/-0/1900 1-/-0/1900 129-+
Karatzouni S, Clarke NL & Furnell SM 2007 'Device-versus Network-Centric Authentication Paradigms for Mobile Devices' 1-/-0/1900 1-/-0/1900 School of Computer and Information Science, Edith Cowan University, Perth, Western Australia
Karatzouni S & Clarke N 2007 'Keystroke analysis for thumb-based keyboards on mobile devices' 1-/-0/1900 1-/-0/1900 Springer Boston 253-263
Karatzouni S, Furnell SM, Clarke NL & Botha RA 2007 'Perceptions of user authentication on mobile devices' 1-/-0/1900 1-/-0/1900 11-13
Furnell S & Clarke N 2007 'Preface' 1-/-0/1900 1-/-0/1900
Furnell S & Clarke N 2007 'Proceedings of the International Symposium on Human Aspects of Information Security and Assurance (HAISA 2007)' 1-/-0/1900 1-/-0/1900 University of Plymouth, School Of Computing, Communications And Electronics
Li F, Clarke N, Bolan C & Australia W 2007 'User Perception of the Security & Privacy Concerns of RFID Technology' 1-/-0/1900 1-/-0/1900 Lulu. com 156-156
Razak SA, Fumell S, Clarke N & Brooke P 2006 'A two-tier intrusion detection system for mobile ad hoc networks - A friend approach' 1-/-0/1900 1-/-0/1900 590-595
Razak SA, Furnell S, Clarke N & Brooke P 2006 'Part II-Short Papers-Infrastructure Protection and Cyber Security-A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks–A Friend Approach' 1-/-0/1900 1-/-0/1900 Berlin: Springer-Verlag, 1973- 590-595
Clarke NL & Mekala AR 2006 'Transparent handwriting verification for mobile devices' 1-/-0/1900 1-/-0/1900 277-287
Furnell S & Clarke N 2005 'Organisational security culture: embedding security awareness, education and training' 1-/-0/1900 1-/-0/1900 67-74
Clarke N, Furnell S, Lines B & Reynolds P 2004 'Application of keystroke analysis to mobile text messaging' 1-/-0/1900 1-/-0/1900 14-15
Clarke NL, Furnell SM, Lines BM & Reynolds PL 2003 'Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets' 1-/-0/1900 1-/-0/1900 97-108
Clarke NL, Furnell SM, Lines BM & Reynolds PL 2003 'Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets' 1-/-0/1900 1-/-0/1900 97-108
Clarke NL, Furnell SM, Reynolds PL, Rodwell PM, IEE & IEE 2002 'Advanced subscriber authentication approaches for third generation mobile systems' 1-/-0/1900 1-/-0/1900 319-323
Clarke NL, Furnell SM, Reynolds PL & Rodwell PM 2002 'Advanced subscriber authentication approaches for third generation mobile systems' Third International Conference on 3G Mobile Communication Technologies 1-/-0/1900 1-/-0/1900 319-323
Clarke NL, Furnell SM & Reynolds PL 2002 'Biometric authentication for mobile devices' 1-/-0/1900 1-/-0/1900 61-69
Clarke NL, Furnell S, Lines BM & Reynolds PL 2002 'Subscriber Authentication for Mobile Phones through the Implementation of Keystroke Dynamics' Furnell S; Dowland PS 1-/-0/1900 1-/-0/1900 University of Plymouth 347-355
Clarke N, Furnell S, Lines B & Reynolds P 2002 'Subscriber authentication for mobile phones using keystroke dynamics' 1-/-0/1900 1-/-0/1900 16-18
Patents
0 A CONTAINER AND SECURITY SYSTEMS.
0 Adjusting an operating mode of a security container in response to an unexpected received radio signal. GB2472632 (A)
0 Method of Associating a Person with a Digital Object. WO/2017/207998

Reports & invited lectures

  • Invited Keynote, "Frictionless Authentication: The Panacea to the Problem?", 7th International Conference on Computer Science and Information Technology, Khartoum, Sudan, Jan 2020
  • Invited Presentation, "Maritime Cyber Threats", Marine and Maritime Cyber Security, Plymouth, November 2019
  • Invited Panel, "Cyber Security Skills: Do we know what we need?", Secure South West 13, Plymouth, October 2019
  • Invited Presentation, “Is Digital Forensics a Necessity for Organisations?”, University of Nevada (Reno), May 2019
  • Invited Lecturer, “Introduction to Digital Forensics”, IPICS Summer School, Lesvos, Greece, July 2018
  • Invited Presentation, “Cyber Security”, Romney Street Group, Athenaeum Club, London, 6th February 2018
  • Invited Briefing, House of Lords - Science and Technology Committee on Digital Forensics, 30th January 2018
  • Invited Panel, “Privacy, Encryption and Hacktivism: Is your Information Safe Online?”, Chatham House – The Royal Institute of International Affairs, London, UK, September 2017
  • Invited Lecturer, “Introduction to Digital Forensics”, IPICS Summer School, Corfu, Greece, June 2017
  • Invited Panel, “Insider Misuse”, The Security Conference, Las Vegas, April 2017
  • Invited Presentation, “Usable Authentication”, City University, March 2017
  • Invited Panel, “Cybercrime, Can we Keep Up?”, Plymouth University, February 2017
  • Invited Lecturer, “Introduction to Cloud Security & Forensics”, IPICS Summer School, Ghent, Belgium, July 2016
  • Invited Lecturer, “Introduction to Cloud Security & Forensics”, IPICS Summer School, Lesvos, Greece, July 2015
  • Invited Presentation, “Transparent & Continuous Authentication”, De Montfort University, 11th March 2015
  • Invited Presentations, “Digital Forensic Challenges & Research”, ESIEA – Sciences et Technologies du Numerique, Paris, 23rd February 2015
  • Invited Presentation, “Continuous Authentication”, Princess Nora University, Saudi Arabia, 27th November 2014
  • Invited Presentation, “Active Authentication: The Natural Evolution”, Biometrics 2014, London, 21st October 2014
  • Invited Lecturer, Digital Forensics, IPICS Summer School, Lesvos, Greece, July 2014
  • Invited Scholar, University of Fort Hare, South Africa, April 2014
  • Invited Presentation, “The Role of Digital Forensics within Organisations”, Secure South West, Plymouth, December 2013
  • Invited Presentation, "Information Security: Impacts and Consequences", Brunel University, London, November 2010 
  • Invited Presentation, “Security and Privacy”, Brunel University, London, UK, November 2009
  • Invited Presentation, “The Future of Biometrics in E-Learning Systems”, Biometric Consortium Conference, Florida, USA, September 2009
  • Invited Presentation, "Effective User Authentication for Mobile Devices", University of Nevada, London, July 2009

  • Invited Presentation, "Applications Security", University of Tunis-Carthage, Tunis, Tunisia, March, 2009

  • Invited Presentation, "Biometrics - No Silver Bullet", University of Portsmouth, Portsmouth, UK, January 2009
  • Invited Lecturer, IPICS Summer School, Regensburg, Germany, July 2008
  • Invited Presentation, "Flexible and Transparent User Authentication for Mobile Devices", Oviedo, Spain, May 2008
  • Invited Presentation, "User Authentication for Mobile Devices", University of Portsmouth, Portsmouth, UK, March 2007
  • Invited Presentation, "Biometric Authentication for Mobile Devices", Aston University, Birmingham, UK, February 2007
  • Keynote Speech, The Art of Computing Technology 2006, "Biometrics: The Future of Personal Authentication", University of Technology Malaysia, March 2006
  • Invited Lecturer/Scholar, University of Technology Malaysia, March/April 2006
  • Keynote Speech, 11th Conference on Human Computer Interaction, "Biometrics: The Promise Versus the Practice", Oviedo, Spain, 22-24 March 2006
  • Invited Lecturer/Scholar, Nelson Mandela Metropolitan University, August/September 2005
  • Invited Lecturer, IPICS Summer School, Chios, Greece, July 2005
  • Invited Lecturer, IPICS Winter School, Oulu, Finland, April 2005

Other academic activities

Journal Editorships/Reviewing:
Current Journal Editorships:

  • Editorial Board Member, Computers & Security, Elsevier
  • Editorial Board Member, International Journal of Cyber Warfare and Terrorism, IGI Global
  • Sub Editor, South African Computer Journal, South African Institute of Computer Scientists and Information Technologists.

Previous Journal Editorships:

  • Associate Editor, KIIS Transactions on Internet and Information Systems, KIIS
  • Associate Editor, Security & Communication Networks, John Wiley

  • Associate Editor, Communications and Computer Security, ACTA Press
  • Editorial Board Member, Future Internet, MDPI Publishing.
  • Editorial Board Member, Mobile Computing, World Academic Publishing 

Guest Editor:

  • Information & Computer Security, Vol. 26, No. 3, 2018
  • Information & Computer Security, Vol. 24, No. 2, 2016
  • Computers & Security (Special Section on Active Authentication), Vol. 39, Part B. 
  • Information Management & Computer Security, Vol. 21, No. 1, 2013
  • International Journal of Digital Crime and Forensics, Vol. 4, No. 4, 2012
  • International Journal of Digital Crime and Forensics, Vol. 3, No. 3, 2011

  • Information Management & Computer Security, Vol. 18, No. 1, 2010

  • Information Management & Computer Security, Vol. 18, No. 5, 2010

  • Information Management & Computer Security, Vol. 17, No. 1, 2009

  • Information Management & Computer Security, Vol. 15, No. 5, 2007


Journal Referee:

  • Computer Standards and Interfaces, Elsevier
  • Computers & Security, Elsevier
  • EURASIP Journal on Advances in Signal Processing, Springer
  • IEEE Communications Surveys and Tutorials
  • IEEE Journal on Selected Areas in Communications Special Issue on Advances in Digital Forensics for Communications and Networking
  • IEEE Transactions on Cybernetics, IEEE
  • IEEE Transactions on Human-Machine Systems, IEEE
  • IEEE Transactions on Information Forensics & Security, IEEE
  • IET Information Security, IET
  • IET Signal Processing, IET
  • Information Security Journal: A Global Perspective
  • Information Security Technical Report, Elsevier
  • International Journal of Computer Science and Security, Computer Science Journals
  • International Journal of Electronic Governance (IJEG), Inderscience
  • International Journal of Information Technologies and Systems Approach, IGI Global
  • International Journal of Interdisciplinary Telecommunications & Networking, IGI Global.
  • International Journal of Pattern Recognition and Artificial Intelligence, World Scientific.
  • Internet Research, Emerald
  • Journal for Information Warfare
  • Information Sciences, Elsevier
  • Journal of Internet Services and Applications, Springer. 
  • Journal of Mobile Networks & Applications, Springer
  • Journal of Network and Computer Applications, Elsevier
  • Journal of Systems and Software, Elsevier
Referee, 
  • Journal on Personal and Ubiquitous Computing: Special Issue: Security and Trust in Context-Aware Systems, Springer
  • KSII Transactions on Internet and Information Systems
  • Recent Patents in Computer Science, Bentham Science
  • Security & Communication Networks, John Wiley & Sons
  • The Computer Journal, Oxford Journals

Links

The Centre's research website can be located at: www.cscan.org