Publications from 2017

Home Publications
Year:
Publication Title:
Search abstracts:
Search author name:

Journal papers

A novel privacy preserving user identification approach for network traffic
Clarke NL, Li F, Furnell SM
Computers & Security, Volume 70, September 2017, Pages 335-350, 2017
More details | External link available

The impact of security and its antecedents in behaviour intention of using e-government services
Alharbi N, Papadaki M, Dowland PS
Journal of Behaviour and Information Technology, ISSN: 0144-929X, Vol 36, Iss 6, pp620-636, 2017
More details | External link available

Signals of opportunity geolocation methods for urban and indoor environments
Mansfield T, Ghita BV, Ambroze MA
Annals of Telecommunications, Springer Paris, pp 1-11, 2017
More details | External link available

Can't get the staff? The growing need for cyber-security skills
Furnell SM, Fischer P, Finch A
Computer Fraud & Security, Volume 2017, Issue 2, February 2017, Pages 5-10, 2017
More details | External link available

AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection
Feizollah A, Anuar NB, Salleh R, Suarez-Tangil G, Furnell SM
Computers & Security, Volume 65, Pages 121-134, 2017
More details | External link available

Evaluating the effect of guidance and feedback upon password compliance
Furnell SM, Esmael R
Computer Fraud & Security, Volume 2017, Issue 1, January, Pages 5-10, 2017
More details | External link available

6 Journal papers

Conference papers

Unobtrusive Gait Recognition Using Smartwatches
Al-Naffakh N, Clarke NL, Li F, Dowland PS
International Conference of the Biometrics Special Interest Group (BIOSIG), 20-22 September, Darmstadt, Germany, pp211-218, ISBN 978-3-88579-664-0, 10.23919/BIOSIG.2017.8053523, 2017
More details | External link available

Towards Targeted Security Awareness Raising
Mahmoud N, Furnell SM, Dowland PS
Proceedings of the Annual Information Institute Conference, 18-20 April, Las Vegas, USA, ISBN: 978-1-935160-18-2, 2017
More details | External link available

Information Security Behavior: Recognizing The Influencers
Alohali M, Clarke NL, Furnell SM
Proceedings of The SAI Computing Conference 2017, 2017
More details

A Forensic Acquisition Based upon A Cluster Analysis of Non-Volatile Memory in IaaS
Alqahtany S, Clarke NL, Furnell SM, Reich C
Anti-Cyber Crimes (ICACC), 2nd International Conference on, pp 123-128, 2017
More details | External link available

Insider Misuse Identification using Transparent Biometrics
Clarke NL, Li F, Alruban A, Furnell SM
Proceedings of the 50th Hawaii International Conference on System Sciences, January 04 - 07, Hawaii USA, 2017
More details | External link available

5 Conference papers

Edited books

Information Systems Security and Privacy
Camp O, Furnell SM, Mori P
Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Springer, Revised Selected Papers, 2017
More details | External link available

1 Edited books

Other publications

Three ways the ‘NotPetya’ cyberattack is more complex than WannaCry
Dowland PS
The Conversation, 30th June, 2017
More details | External link available

1 Other publications

13 publication(s) - all categories.