Publications from 2016

Home Publications
Year:
Publication Title:
Search abstracts:
Search author name:

Journal papers

On Internet Traffic Classification: A Two-Phased Machine Learning Approach
Bakhshi T, Ghita BV
Journal of Computer Networks and Communications, Volume 2016 (2016), Article ID 2048302, 21 pages, 2016
More details | External link available

An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data
Mohammed H, Clarke NL, Li F
The Journal of Digital Forensics, Security and Law: JDFSL, Volume 11 Issue 2 Pages 137-152, 2016
More details | External link available

Leveraging Biometrics for Insider Misuse Identification
Alruban A, Clarke NL, Li F, Furnell SM
International Journal on Cyber Situational Awareness (IJCSA), Vol. 1, No. 1, 2016, article 7, 2016
More details | External link available

The usability of security - revisited
Furnell SM
Computer Fraud & Security, ISSN: 1361-3723, September 2016, pp5-11, 2016
More details

Assessing Staff Acceptance and Compliance with Information Security
Alotaibi T, Furnell SM
International Journal of Computing Academic Research (IJCAR), ISSN 2305-9184, Volume 5, Number 4 (August 2016), pp.195-201, 2016
More details | External link available

Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis
Al-Bayati B, Clarke NL, Dowland PS
GSTF Journal on Computing (JOC), ISSN:2251-3043, Vol. 5, Iss.1, pp21-28, 2016
Winner of the Best Student Paper award at the 7th Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2016).
More details | External link available

A suspect-oriented intelligent and automated computer forensic analysis
Al Fahdi M, Clarke NL, Li F, Furnell SM
Digital Investigation, Volume 18, pp. 65-76, 2016
More details | External link available

Awareness of Mobile Device Security: A Survey of User's Attitudes
Clarke NL, Symes JE, Saevanee H, Furnell SM
International Journal of Mobile Computing and Multimedia Communications (IJMCMC), Vol 7, Iss 1, 2016
More details | External link available

A Novel Taxonomy for Mobile Applications Data
Alotaibi S, Furnell SM, Clarke NL
International Journal of Cyber-Security and Digital Forensics (IJCSDF), ISSN: 2305-0012, Vol. 5, No. 3, pp115-121, 2016
More details | External link available

9 Journal papers

Conference papers

Traffic profiling: Evaluating stability in multi-device user environments
Bakhshi T, Ghita BV
Advanced Information Networking and Applications Workshops (WAINA), 2016 30th International Conference on, Crans-Montana, pp. 731-736, 2016
More details | External link available

User-centric traffic optimization in residential software defined networks
Bakhshi T, Ghita BV
Telecommunications (ICT), 2016 23rd International Conference on, Thessaloniki, pp. 1-6, 2016
More details | External link available

IP Prefix Hijack Detection Using BGP Attack Signatures and Connectivity Tracking
Alshamrani H, Ghita BV
2016 International Conference on Software Networking (ICSN), Jeju, pp. 1-7, 2016
More details | External link available

IP prefix hijack detection using BGP connectivity monitoring
Alshamrani H, Ghita BV
High Performance Switching and Routing (HPSR), 2016 IEEE 17th International Conference on, 14-17 June, Yokohama, pp 35-41, 2016
More details | External link available

User-Centric Network Provisioning in Software Defined Data Center Environment
Bakhshi T, Ghita BV
Local Computer Networks (LCN), 2016 IEEE 41st Conference on, 7-10 November, Dubai, pp 289-297, 2016
More details | External link available

Software Defined Privacy
Kemmer F, Reich C, Knahl MH, Clarke NL
International Conference on High Performance Computing, Cloud Engineering Workshop (IC2EW), 2016 IEEE International Conference on, pp 25-39, Berlin, 4-8 April 2016, 2016
More details | External link available

Providing Security in Container-Based HPC Runtime Environments
Gantikow H, Reich C, Knahl MH, Clarke NL
International Conference on High Performance Computing, In: Taufer M., Mohr B., Kunkel J. (eds) High Performance Computing. ISC High Performance 2016. Lecture Notes in Computer Science, vol 9945. Springer, Cham, 2016
More details | External link available

Information Security Policies: A Review of Challenges and Influencing Factors
Alotaibi M, Furnell SM, Clarke NL
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp 352-358, Barcelona, Spain, 2016
More details | External link available

User profiling from network traffic via novel application-level interactions
Alotibi G, Clarke NL, Li F, Furnell SM
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp 279-285, Barcelona, Spain, 2016
More details | External link available

Activity Recognition using wearable computing
Al-Naffakh N, Clarke NL, Dowland PS, Li F
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 189-195, Barcelona, Spain, 2016
More details | External link available

The role of Visualisation in the study of Computer Programming
Alhammad S, Atkinson S, Stuart L
the Proceedings of the 27th Annual Workshop of the Psychology of Programming Interest Group - PPIG 2016, pp. 5-16, Cambridge, UK, 2016
More details

A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment
Alqahtany S, Clarke NL, Furnell SM, Reich C
11th International Conference on Availability, Reliability and Security, 31 August -2 September, 2016
More details | External link available

Increasing eLearning Engagement Using Mobile Technologies
Triantafyllidis A, Clarke NL, Dowland PS, Vranopoulos G
9th annual International Conference of Education, Research and Innovation (ICERI2016), 14-16 November, Seville, Spain, pp8644-8653, ISBN: 978-84-617-5895-1, ISSN: 2350-1095, 2016
More details | External link available

The Value of the Biometrics in Invigilated E-Assessments
Ketab S, Clarke NL, Dowland PS
Proceedings of the the 8th Annual International Conference on Education and New Learning Technologies, Barcelona, Spain, 4-6 July, ISBN: 978-84-608-8860-4, ISSN: 2340-1117, 2016
More details | External link available

Assay of Multipath TCP for Session Continuity in Distributed Mobility Management
Dawood M, Fuhrmann W, Ghita BV
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp141-146, ISBN: 978-1-84102-410-3, 2016
Can be ordered on-line.
More details | Download PDF

Efficient Test Case Derivation from Statecharts-Based Models
Wacht P, Trick U, Fuhrmann W, Ghita BV
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp127-132, ISBN: 978-1-84102-410-3, 2016
Can be ordered on-line.
More details | Download PDF

P2P-based M2M Community Applications
Steinheimer M, Trick U, Fuhrmann W, Ghita BV
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp115-120, ISBN: 978-1-84102-410-3, 2016
Can be ordered on-line.
More details | Download PDF

QoE Enhancements in IEEE 802.11e EDCA for Video Transmission through Selective Queueing
Khambari MBM, Ghita BV, Lancaster D, Sun L
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp85-90, ISBN: 978-1-84102-410-3, 2016
Can be ordered on-line.
More details | Download PDF

A Field Study on Linked and Open Data at Datahub.io
Heuss T, Fengel J, Humm B, Harriehausen-Mühlbauer B, Atkinson S
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp79-84, ISBN: 978-1-84102-410-3, 2016
Can be ordered on-line.
More details | Download PDF

Acceptance Factors of Wearable Computing: An Empirical Investigation
Gribel L, Regier S, Stengel I
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp67-72, ISBN: 978-1-84102-410-3, 2016
Can be ordered on-line.
More details | Download PDF

Mobile Edge Computing: Requirements for Powerful Mobile Near Real-Time Applications
Frank H, Fuhrmann W, Ghita BV
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp63-66, ISBN: 978-1-84102-410-3, 2016
Can be ordered on-line.
More details | Download PDF

A Review on Power Consumption Reduction Techniques on OFDM
Al-Obaidi S, Ambroze MA, Ghita BV, Giacoumidis E, Tsokanos A
Proceedings of the Eleventh International Network Conference (INC 2016), Frankfurt, Germany, July 19-21, pp3-8, ISBN: 978-1-84102-410-3, 2016
Can be ordered on-line.
More details | Download PDF

Proactive Biometric-Enabled Forensic Imprinting
Alruban A, Clarke NL, Li F, Furnell SM
International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016), June 13-14, London, UK, 2016
Winner of the Best Paper Award (Cyber Incident 2016)
More details

Location Based Transmission Using a Neighbour Aware-Cross Layer MAC for Ad Hoc Networks
Marchang J, Ghita BV, Lancaster D
Wired/Wireless Internet Communications (WWIC), 14th IFIP WG 6.2 International Conference, Thessaloniki, Greece, May 25-27, Volume 9674 of the series Lecture Notes in Computer Science pp 15-27, Springer, ISBN: 978-3-319-33935-1, 2016
More details | External link available

A Scalable Architecture for Distributed OSGi in the Cloud
Kuijs H, Knahl MH, Clarke NL, Reich C
Proceedings of the 6th International Conference on Cloud Computing and Services Science, CLOSER 2016, pp109-117, ISBN: 978-989-758-182-3, 2016
Awarded 'Best Student Paper Award"
More details | Download PDF

Information Security and Practice: The User's Perspective
Clarke NL, Li F, Furnell SM, Stengel I, Ganis G
Proceedings of the 11th International Conference On Cyber Warfare and Security (ICCWS-2016), pp81-89, ISSN:2048-9870, ISBN:9781910810835, 17-18 March 2016, Boston, USA, 2016
More details

26 Conference papers

Edited books

Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016
Katsikas SK, Lambrinoudakis C, Furnell SM
Porto, Portugal, September 7-8. Lecture Notes in Computer Science 9830, Springer, ISBN 978-3-319-44340-9 123pp, 2016
More details | External link available

Advances in Communications, Electronics, Networks, Robotics and Security Volume 13
Dowland PS
Plymouth University, ISBN: 978-1-326-72810-6, pp160, 2016
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Eleventh International Network Conference (INC 2016)
Alekseev S, Dowland PS, Ghita BV, Schneider O
Frankfurt, Germany, 19-21 July, ISBN: 978-1-84102-410-3, pp192, 2016
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016)
Clarke NL, Furnell SM
Frankfurt, Germany, 19-21 July, ISBN: 978-1-84102-413-4, pp313, 2016
Support independent publishing: Buy this book on Lulu.
More details | External link available

4 Edited books

Patents filed

Method of Associating a Person with a Digital Object
Alruban A, Clarke NL
UK Intellectual Property Office, UK Patent number: GB1609673.7, Filed 02/06/2016, 2016
More details

1 Patents filed

Posters

3D Facial Recognition and Eye Tracking
Ketab S, Clarke NL, Dowland PS
The Postgraduate Society Conference, 16th March 2016, Plymouth University, 2016
More details

1 Posters

Technical articles

Threats and Impacts in Maritime Cyber Security
Jones K, Tam K, Papadaki M
Engineering & Technology Reference (Technical Case Studies and Lessons Learned), pp5, ISSN: 2056-4007, 2016
More details | External link available

1 Technical articles

42 publication(s) - all categories.