Research Student Profile

Home People Profile...

Dr Paul S Dowland PhD FBCS

Brief biographical information

paul.dowland@plymouth.ac.uk

  Access thesis on-line

User authentication and supervision in networked systems

This thesis considers the problem of user authentication and supervision in networked systems. The issue of user authentication is one of on-going concern in modern IT systems with the increased use of computer systems to store and provide access to sensitive information resources. While the traditional username/password login combination can be used to protect access to resources (when used appropriately), users often compromise the security that these methods can provide. While alternative (and often more secure) systems are available, these alternatives usually require expensive hardware to be purchased and integrated into IT systems. Even if alternatives are available (and financially viable), they frequently require users to authenticate in an intrusive manner (e.g. forcing a user to use a biometric technique relying on fingerprint recognition). Assuming an acceptable form of authentication is available, this still does not address the problem of on-going confidence in the users? identity ? i.e. once the user has logged in at the beginning of a session, there is usually no further confirmation of the users? identity until they logout or lock the session in which they are operating. Hence there is a significant requirement to not only improve login authentication but to also introduce the concept of continuous user supervision.

Before attempting to implement a solution to the problems outlined above, a range of currently available user authentication methods are identified and evaluated. This is followed by a survey conducted to evaluate user attitudes and opinions relating to login and continuous authentication. The results reinforce perceptions regarding the weaknesses of the traditional username/password combination, and suggest that alternative techniques can be acceptable. This provides justification for the work described in the latter part of the thesis.

A number of small-scale trials are conducted to investigate alternative authentication techniques, using ImagePIN?s and associative/cognitive questions. While these techniques are of an intrusive nature, they offer potential improvements as either initial login authentication methods or, as a challenge during a session to confirm the identity of the logged-in user.

A potential solution to the problem of continuous user authentication is presented through the design and implementation of a system to monitor user activity throughout a logged-in session. The effectiveness of this system is evaluated through a series of trials investigating the use of keystroke analysis using digraph, trigraph and keyword-based metrics (with the latter two methods representing novel approaches to the analysis of keystroke data). The initial trials demonstrate the viability of these techniques, wheras later trials are used to prove the potential for a composite approach. The final trial described in this thesis was conducted over a three month period with 35 trial participants and resulted in over five million samples. Due to the scope, duration, and the volume of data collected, this trial provides a significant contribution to the domain, with the use of a composite analysis method representing entirely new work. The results of these trials show that the technique of keystroke analysis is one that can be effective for the majority of users. Finally, a prototype composite authentication and response system is presented, which demonstrates how transparent, non-intrusive, continuous user authentication can be achieved.

Dr Paul S Dowland

Director of studies: Dr Steven M. Furnell
Other supervisors: Prof. Paul Reynolds, Prof. Emmanuel Ifeachor

Journal papers

The impact of security and its antecedents in behaviour intention of using e-government services
Alharbi N, Papadaki M, Dowland PS
Journal of Behaviour and Information Technology, ISSN: 0144-929X, Vol 36, Iss 6, pp620-636, 2017
More details | External link available

A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches
Al-Naffakh N, Clarke NL, Dowland PS, Li F
International Journal for Information Security Research, Volume 6, Issue 3, 2016
More details | External link available

Graphical One-Time Password (GOTPass): A usability evaluation
Alsaiari H, Papadaki M, Dowland PS, Furnell SM
Information Security Journal: a Global Perspective, ISSN: 1939-3547, Vol 25, Iss 1-3, pp94-108, 2016
More details | External link available

Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis
Al-Bayati B, Clarke NL, Dowland PS
GSTF Journal on Computing (JOC), ISSN:2251-3043, Vol. 5, Iss.1, pp21-28, 2016
Winner of the Best Student Paper award at the 7th Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2016).
More details | External link available

Secure Graphical One Time Password (GOTPass): An Empirical Study
Alsaiari H, Papadaki M, Dowland PS, Furnell SM
Information Security Journal: A Global Perspective, 24, pp207-220, 2015
More details | External link available

Security Factors Influencing End Users' Adoption of E-Government
Alharbi N, Papadaki M, Dowland PS
Journal of Internet Technology and Secured Transaction (JITST), Volume 3, Issues 3/4, pp320-328, 2014
More details | External link available

Investigating the Viability of Multifactor Graphical Passwords for User Authentication
Jali MZ, Furnell SM, Dowland PS
Information Security Journal: A Global Perspective, 00:1–12, ISSN: 1939-3555, Published online: 18 Apr 2014, 2014
More details | External link available

Active authentication for mobile devices utilising behaviour profiling
Li F, Clarke NL, Papadaki M, Dowland PS
International Journal of Information Security, Volume 13, Issue 3, pp229-244, ISSN:1615-5262, 2014
More details | External link available

Misuse Detection for Mobile Devices Using Behaviour Profiling
Li F, Clarke NL, Papadaki M, Dowland PS
International Journal of Cyber Warfare & Terrorism, Volume 1, Issue 1, pp43-55, ISSN: 1947-3435, 2011
More details | External link available

Massively Multi-Player Online Role Playing Games: What’s the Risk?
Sanders B, Dowland PS, Atkinson S, Furnell SM
Journal of Virtual Worlds Research, vol. 3, no. 3, ISSN: 1941-8477, 2011
More details | External link available

Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments
Sanders B, Dowland PS, Atkinson S, Zahra D, Furnell SM, Papadaki M
Journal of Multimedia Processing Technologies, vol. 1, no. 3, September, pp181-193, ISSN: 0976-4127, 2010
More details | External link available

Assessing image-based authentication techniques in a web-based environment
Jali MZ, Furnell SM, Dowland PS
Information Management & Computer Security, Vol.18, Iss.1, pp43-53, 2010
More details | External link available

An automated framework for managing security vulnerabilities
Alayed A, Furnell SM, Zhao D, Dowland PS
Information Management & Computer Security, vol. 13, no. 2, pp156-166, 2005
More details

A long-term trial of alternative user authentication technologies
Furnell SM, Papadopoulos I, Dowland PS
Information Management and Computer Security, Vol. 12, No. 2, pp178-190, 2004
More details

A prototype tool for information security awareness and training
Furnell SM, Gennatou M, Dowland PS
International Journal of Logisitics Information Management, vol. 15, no. 5, pp352-357, 2002
More details | Download PDF

An experimental comparison of secret-based user authentication technologies
Irakleous I, Furnell SM, Dowland PS, Papadaki M
Information Management and Computer Security, vol. 10, no. 3, pp100-108, 2002
More details | Download PDF

Security analysers: Administrator Assistants or Hacker Helpers?
Furnell SM, Chiliarchaki P, Dowland PS
Information Management and Computer Security, vol. 9, no.2, pp93-101, 2001
More details | Download PDF

Authentication and Supervision: A survey of user attitudes
Furnell SM, Dowland PS, Illingworth HM, Reynolds PL
Computers & Security, vol. 19, no. 6, pp529-539, 2000
Please note: the electronic copy of the survey referred to in this paper is no longer available.
More details | Download PDF

A conceptual architecture for real-time intrusion monitoring
Furnell SM, Dowland PS
Information Management and Computer Security, vol. 8, no. 2, pp65-74, 2000
More details | Download PDF

Computer Crime and Abuse: A Survey of Public Attitudes and Awareness
Dowland PS, Furnell SM, Illingworth HM, Reynolds PL
Computers & Security, vol. 18, no. 8, pp715-726, 1999
Please note: the electronic copy of the survey referred to in this paper is no longer available.
More details | Download PDF

Dissecting the 'Hacker Manifesto'
Furnell SM, Dowland PS, Sanders P
Information Management and Computer Security, vol.7, no.2 pp69-75, 1999
More details | Download PDF

21 Journal papers

Conference papers

Unobtrusive Gait Recognition Using Smartwatches
Al-Naffakh N, Clarke NL, Li F, Dowland PS
International Conference of the Biometrics Special Interest Group (BIOSIG), 20-22 September, Darmstadt, Germany, pp211-218, ISBN 978-3-88579-664-0, 10.23919/BIOSIG.2017.8053523, 2017
More details | External link available

Towards Targeted Security Awareness Raising
Mahmoud N, Furnell SM, Dowland PS
Proceedings of the Annual Information Institute Conference, 18-20 April, Las Vegas, USA, ISBN: 978-1-935160-18-2, 2017
More details | External link available

Activity Recognition using wearable computing
Al-Naffakh N, Clarke NL, Dowland PS, Li F
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 189-195, Barcelona, Spain, 2016
More details | External link available

Increasing eLearning Engagement Using Mobile Technologies
Triantafyllidis A, Clarke NL, Dowland PS, Vranopoulos G
9th annual International Conference of Education, Research and Innovation (ICERI2016), 14-16 November, Seville, Spain, pp8644-8653, ISBN: 978-84-617-5895-1, ISSN: 2350-1095, 2016
More details | External link available

The Value of the Biometrics in Invigilated E-Assessments
Ketab S, Clarke NL, Dowland PS
Proceedings of the the 8th Annual International Conference on Education and New Learning Technologies, Barcelona, Spain, 4-6 July, ISBN: 978-84-608-8860-4, ISSN: 2340-1117, 2016
More details | External link available

A Review of Graphical Authentication Utilising a Keypad Input Method
Alsaiari H, Papadaki M, Dowland PS, Furnell SM
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, pp359-374, 2015
More details | External link available

E-Invigilation of E-Assessments
Ketab S, Clarke NL, Dowland PS
Proceedings of INTED2015 Conference 2nd-4th March 2015, Madrid, Spain, ISBN: 978-84-606-5763-7, 2015
More details

Nonvisual Presentation, Navigation and Manipulation of Structured Documents on Mobile and Wearable Devices
Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Dowland PS
International Conference on Computers for Handicapped Persons, ISBN: 978-3-319-08595-1, pp383-390, 2014
More details | External link available

Security challenges of e-government adoption based on end users' perspective
Alharbi N, Papadaki M, Dowland PS
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions (ICITST 2014), London, UK, pp78-82, ISBN: 978-1-908320-39-1, 2014
More details | External link available

Alternative Graphical Authentication for Online Banking Environments
Alsaiari H, Papadaki M, Dowland PS, Furnell SM
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014), Plymouth, UK, July 8-9, pp122-136, ISBN: 978-1-84102-375-5, 2014
Can be ordered on-line.
More details | Download PDF

Connected In-Car Multimedia: Qualities Affecting Composability of Dynamic Functionality
Knirsch A, Wietzke J, Moore R, Dowland PS
Proceedings of the Tenth International Network Conference (INC 2014), Plymouth, UK, July 8-9, pp81-93, ISBN: 978-1-84102-373-1, 2014
Can be ordered on-line.
More details | Download PDF

Nonvisual Presentation and Navigation within the Structure of Digital Text-Documents on Mobile Devices
Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Dowland PS
7th International Conference, UAHCI 2013, Las Vegas, NV, USA, July 21-26, ISBN: 978-3-642-39193-4, pp311-320, 2013
More details | External link available

Learning management systems in higher education: a faculty perspective
Triantafyllidis A, Clarke NL, Dowland PS
6th International Conference of Education, Research and Innovation (ICERI2013), Madrid, Spain, ISBN: 978-84-616-3847-5, pp5120-5130, 2013
More details | External link available

E-Invigilator: A Biometric-Based Supervision System for e-Assessments
Clarke NL, Dowland PS, Furnell SM
The International Conference on Information Society (i-Society 2013), Toronto, Canada, 24-26 June, 2013
More details

Learning management systems in higher education: a student perspective
Triantafyllidis A, Clarke NL, Dowland PS
5th International Conference of Education, Research and Innovation (ICERI2012), Madrid, Spain, ISBN: 978-84-616-0763-1, pp4046-4055, 2012
More details | External link available

Assessing the usability of application level security warnings
Zaaba ZF, Furnell SM, Dowland PS, Stengel I
Eleventh Annual Security Conference, Las Vegas, Nevada, US, 11-13 April, 2012
More details

Teleoperation of mobile robots over wireless internet
Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Dowland PS
Proceedings of the 4th International Conference on Internet Technologies and Applications, ITA 11; Wrexham, Wales; United Kingdom, ISBN:978-094688168-0, pp145-151, 2011
More details

Survey: improving document accessibility from the blind and visually impaired user's point of view
Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Dowland PS
Proceedings of the 6th International Conference on Universal Access in Human-Computer Interaction. Applications and Services, pp129-135, 978-3-642-21656-5, 2011
More details | External link available

Multifactor Graphical Passwords: An Assessment of End-User Performance
Jali MZ, Furnell SM, Dowland PS
Proceedings of the 7th International Conference of Information Assurance & Security (IAS2011), Melaka, Malaysia, 5-8 December 2011. IEEE 978-1-4577-2153-3, 2011
More details

Quantifying the effect of graphical password guidelines for better security
Jali MZ, Furnell SM, Dowland PS
Future Challenges in Security and Privacy for Academia and Industry (SEC 2011), Lucerne, Switzerland, 7-9 June 2011. Volume 354/2011, Springer-Verlag, pp80-91, 2011
More details | External link available

Resource Management for Multicore Aware Software Architectures of In-Car Multimedia Systems
Knirsch A, Wietzke J, Moore R, Dowland PS
Lecture Notes in Informatics (LNI) - Proceedings, Series of the Gesellschaft für Informatik (GI), Volume P-192, 9th Workshop Automotive Software Engineering, INFORMATIK 2011: Informatik schafft Communities, 4.–7. October 2011, Berlin, p216, ISBN: 978-3-88579-286-4, (full text is available online), 2011
More details | External link available

Emerging risks in massively multiplayer online role playing games
Sanders B, Atkinson S, Dowland PS, Furnell SM, Papadaki M
EU Kids Online Conference, Friday 23 September, New Academic Building LSE, 2011
More details | External link available

Behaviour Profiling for Transparent Authentication for Mobile Devices
Li F, Clarke NL, Papadaki M, Dowland PS
Proceedings of the 10th European Conference on Information Warfare and Security (ECIW), Tallinn, Estonia 7-8 July, pp307-314, 2011
Awarded best PhD paper.
More details

End-User Perception and Usability of Information Security
Zaaba ZF, Furnell SM, Dowland PS
Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011), London, UK, ISBN: 978-1-84102-284-0, pp97-107, 2011
Can be ordered on-line.
More details | Download PDF

Online Addiction: Privacy Risks in Online Gaming Environments
Sanders B, Chen V, Zahra D, Dowland PS, Atkinson S, Papadaki M, Furnell SM
Proceedings of the International Conference on Management of Emergent Digital EcoSystems (MEDES), October 26-29, Bangkok, Thailand, 2010
More details

Behaviour Profiling on Mobile Devices
Li F, Clarke NL, Papadaki M, Dowland PS
International Conference on Emerging Security Technologies, 6-8 September, Canterbury, UK, pp77-82, 2010
More details | External link available

Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy
Sanders B, Dowland PS, Furnell SM
Proceedings of the South African Information Security Multi-Conference (SAISMC 2010), Port Elizabeth, South Africa, 17-18 May, ISBN: 978-1-84102-256-7, pp61-73, 2010
Can be ordered on-line.
More details | Download PDF

A Critical Evaluation of an Online Peer Assessment System (OPAS)
Clarke NL, Dowland PS
Proceedings of the International Conference of Education, Research and Innovation (ICERI 2009), 16-18th November, Madrid, Spain, 2009
More details | Download PDF

Evaluating Web-Based User Authentication using Graphical Techniques
Jali MZ, Furnell SM, Dowland PS
Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, ISBN: 978-1-84102-231-4, pp108-118, 2009
Can be ordered on-line.
More details | Download PDF

An Assessment of People’s Vulnerabilities in Relation to Personal and Sensitive Data
Sanders B, Dowland PS, Furnell SM
Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, ISBN: 978-1-84102-231-4, pp50-60, 2009
Can be ordered on-line.
More details | Download PDF

Service-Oriented Architecture: Performance Issues and Approaches
Swientek M, Bleimann U, Dowland PS
Proceedings of the Seventh International Network Conference (INC2008), Plymouth, UK, 8-10 July, pp261-269, 2008
Can be ordered on-line.
More details

A practical usability evaluation of security features in end-user applications
Furnell SM, Katsabas D, Dowland PS, Reid F
Proceedings of the 22nd IFIP International Information Security Conference (IFIP SEC 2007), Sandton, South Africa, 14-16 May, pp. 205-216, 2007
More details

Considering the Usability of End-User Security Software
Furnell SM, Jusoh A, Katsabas D, Dowland PS
Proceedings of 21st IFIP International Information Security Conference (IFIP SEC 2006), Karlstad, Sweden, 22-24 May, pp307-316, 2006
More details

Using Human Computer Interaction principles to promote usable security
Katsabas D, Furnell SM, Dowland PS
Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp235-242, 2005
More details | Download PDF

Identifying the security requirements for virtual university environments
Ruiz VC, Furnell SM, Phippen AD, Dowland PS, Stengel I, Bleimann U
Proceedings of the Fourth Security Conference 2005, Las Vegas, USA, 30-31 March, 2005
More details | Download PDF

Survey of Wireless Access Point Security
Voisin M, Ghita BV, Dowland PS
Proceedings of the Fourth Security Conference 2005, Las Vegas, USA, 30-31 March, 2005
More details | Download PDF

PassImages : an alternative method of user authentication
Charruau D, Furnell SM, Dowland PS
Proceedings of the ISOneWorld 2005, Las Vegas, USA, 30 March - 1 April, 2005
More details | Download PDF

A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies
Dowland PS, Furnell SM
Proceedings of IFIP/SEC 2004 - 19th International Conference on Information Security, Toulouse, France, 23-26 August, pp275-289, 2004
More details

A Correlation Framework for Continuous User Authentication Using Data Mining
Singh H, Furnell SM, Dowland PS, Lines BL, Kaur S
Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004, pp237-245, 2004
More details | Download PDF

Improving Security Awareness And Training Through Computer-Based Training
Furnell SM, Warren A, Dowland PS
Proceedings of the WISE Conference, Monterey, USA, July, pp287-301, 2003
More details | Download PDF

Assessing IT Security Culture: System Administrator and End-User
Finch J, Furnell SM, Dowland PS
Proceedings of ISOneWorld Conference 2003, Las Vegas, USA, April 23-25, CD Only, 2003
More details | Download PDF

Critical awareness ? The problem of monitoring security vulnerabilities
Furnell SM, Alayed A, Barlow I, Dowland PS
Proceedings of European Conference on Information Warfare and Security, 8-9 July 2002, Brunel, UK, pp85-92, 2002
More details | Download PDF

Keystroke Analysis as a Method of Advanced User Authentication and Response
Dowland PS, Furnell SM, Papadaki M
Proceedings of IFIP/SEC 2002 - 17th International Conference on Information Security, Cairo, Egypt, 7-9 May, pp215-226, 2002
More details

A Preliminary Investigation of User Authentication Using Continuous Keystroke Analysis
Dowland PS, Singh H, Furnell SM
Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, 27-28 September, 2001
More details | Download PDF

Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining
Singh H, Furnell SM, Lines BL, Dowland PS
Proceedings of International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, St. Petersburg, Russia, 21-23 May, 2001
More details | Download PDF

A Generic Taxonomy for Intrusion Specification and Response
Furnell SM, Magklaras GB, Papadaki M, Dowland PS
Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001
More details | Download PDF

Promoting security awareness and training within small organisations
Furnell SM, Gennatou M, Dowland PS
Proceedings of the First Australian Information Security Management (AISM) Workshop, Geelong, Australia, 7 November, 2000
More details | Download PDF

A conceptual intrusion monitoring architecture and thoughts on practical implementation
Dowland PS, Furnell SM
Proceedings of the World Computer Congress 2000, 21-25 August, 2000
More details | Download PDF

Enhancing Operating System Authentication Techniques
Dowland PS, Furnell SM
Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK, pp253-261, 3-6 July, 2000
More details | Download PDF

Developing tools to support online distance learning
Furnell SM, Evans MP, Dowland PS
Proceedings of EUROMEDIA 2000, Antwerp, Belgium, 8-10 May, 2000
More details | Download PDF

50 Conference papers

Books

E-mail Security: A Pocket Guide
Furnell SM, Dowland PS
IT Governance Publishing, ISBN: 978-1849280969, pp108, 2010
More details | External link available

1 Books

Edited books

Advances in Communications, Electronics, Networks, Robotics and Security Volume 13
Dowland PS
Plymouth University, ISBN: 978-1-326-72810-6, pp160, 2016
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Eleventh International Network Conference (INC 2016)
Alekseev S, Dowland PS, Ghita BV, Schneider O
Frankfurt, Germany, 19-21 July, ISBN: 978-1-84102-410-3, pp192, 2016
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Electronics, Networks, Robotics and Security Volume 12
Dowland PS
Plymouth University, ISBN: 978-1-326-72586-0, pp172, 2015
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 11
Dowland PS
Plymouth University, ISBN: 978-184102-374-8, pp144, 2014
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Tenth International Network Conference (INC 2014)
Dowland PS, Furnell SM, Ghita BV
Plymouth, 8-10 July, ISBN: 978-1-84102-373-1, pp197, 2014
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 10
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-184102-358-8, pp229, 2013
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Ninth International Network Conference (INC 2012)
Botha RA, Dowland PS, Furnell SM
Port Elizabeth, South Africa, 11-12 July, ISBN: 9781841023151, pp238, 2012
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 9
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-184102-320-5, pp217, 2012
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Advances in Communications, Computing, Networks and Security Volume 8
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-1-84102-293-2, pp293, 2011
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Seventh Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2011)
Dowland PS, Grout VM, Humm B, Knahl MH
Plymouth University, ISBN: 978-1-84102-295-6, pp117, 2011
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 7
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-1-84102-283-3, pp285, 2010
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010)
Dowland PS, Humm B, Knahl MH
University of Plymouth, ISBN: 978-1-84102-269-7, pp81, 2010
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Eighth International Network Conference (INC 2010)
Bleimann U, Dowland PS, Furnell SM, Schneider O
Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp413, 2010
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security 6
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-258-1, pp321, 2009
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009)
Bleimann U, Dowland PS, Furnell SM, Grout VM
University of Plymouth, ISBN: 978-1-84102-236-9, 223pp, 2009
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the 11th IFIP TC 11.1 Working Conference on Information Security Management
Dowland PS, Furnell SM
Richmond, Virginia on 16-17 October, ISBN: 978-3-901882-31-9, pp127, 2008
Support independent publishing: Buy this book on Lulu.
More details

Advances in Communications, Computing, Networks and Security 5
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-257-4, pp323, 2008
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008)
Bleimann U, Dowland PS, Furnell SM, Grout VM
University of Plymouth, ISBN: 978-1-84102-196-6, 215pp, 2008
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the 7th International Network Conference (INC 2008)
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-188-1, 289pp, 2008
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Networks, Computing and Communications 4
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-180-5, pp304, 2007
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007)
Bleimann U, Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-8410-2173-7, 273pp, 2007
Support independent publishing: Buy this book on Lulu.
More details

Advances in Networks, Computing and Communications 3
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-8410-2179-9, pp277, 2006
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the 6th International Network Conference (INC 2006)
Furnell SM, Dowland PS
University of Plymouth, ISBN 1-84102-157-1, 428pp, 2006
Support independent publishing: Buy this book on Lulu.
More details | External link available

Security Management, Integrity, and Internal Control in Information Systems
Dowland PS, Furnell SM, Thuraisingham B, Wang XS
Springer, ISBN 0-387-29826-6. 373pp, 2005
More details

Advances in Network and Communications Engineering 2
Furnell SM, Dowland PS
University of Plymouth, ISBN: 1-84102-140-7, pp191, 2005
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the 5th International Network Conference (INC 2005)
Furnell SM, Dowland PS, Kormentzas G
University of the Aegean & University of Plymouth, ISBN 978-1-84102-272-7, 576pp, 2005
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the 4th International Network Conference (INC 2004)
Furnell SM, Dowland PS
University of Plymouth, ISBN 1 84102 125 3, 592pp, 2004
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the 8th Annual Scientific Conference (Euromedia 2003)
Furnell SM, Dowland PS
Eurosis, ISBN 90-77301-01-5, 222pp, 2003
More details

Proceedings of the 3rd International Network Conference (INC 2002)
Furnell SM, Dowland PS
University of Plymouth, ISBN 1-84102-105-9, 638pp, 2002
Support independent publishing: Buy this book on Lulu.
More details | External link available

29 Edited books

Contributions to edited books

User Authentication Technologies
Clarke NL, Dowland PS, Furnell SM
in Securing Information and Communications Systems: Principles, Technologies, and Applications. S.M.Furnell, S.K.Katsikas, J.Lopez and A.Patel (Eds), Artech House, ISBN 978-1-59693-228-9, pp35-59, 2008
Available on-line.
More details

Security Concepts, Services, and Threats
Dowland PS, Furnell SM
in Securing Information and Communications Systems: Principles, Technologies, and Applications. S.M.Furnell, S.K.Katsikas, J.Lopez and A.Patel (Eds), Artech House, ISBN 978-1-59693-228-9, pp5-20, 2008
Available on-line.
More details

2 Contributions to edited books

Posters

3D Facial Recognition and Eye Tracking
Ketab S, Clarke NL, Dowland PS
The Postgraduate Society Conference, 16th March 2016, Plymouth University, 2016
More details

E-invigilation of E-Assessments
Ketab S, Clarke NL, Dowland PS
The Postgraduate Society Conference, 19th March, Plymouth University, 2014
More details | Download PDF

Enhancing Intrusion Response in Networked System
Papadaki M, Furnell SM, Dowland PS, Lines BL, Reynolds PL
Poster presentation at Britain's Younger Engineers in 2002, House of Commons, London, 9 December, 2002
More details | Download PDF

Non-Intrusive Subscriber Authentication for 3G Mopbile System
Clarke NL, Dowland PS, Furnell SM, Reynolds PL, Rodwell PM
Poster presentation at Britain's Younger Engineers in 2001, House of Commons, London, 3 December, 2001
More details | Download PDF

Advanced Authentication and Intrusion Detection Technologies
Dowland PS, Furnell SM, Magklaras GB, Papadaki M, Reynolds PL, Rodwell PM, Singh H
Poster presentation at Britain's Younger Engineers in 2000, House of Commons, London, 4 December, 2000
More details | Download PDF

5 Posters

Internal publications

Firewall Rulebase Analysis Tool
Jain P, Dowland PS
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp96-103, 2013
Can be ordered on-line.
More details | Download PDF

Evaluation of Current E-Safety Software
Latif Z, Dowland PS
Advances in Communications, Computing, Networks and Security Volume 8, ISBN: 978-1-84102-293-2, pp76-87, 2011
Can be ordered on-line.
More details | Download PDF

Operational Business Intelligence – A Key to Just-in-Time Decision Making (JDM)
Saeed B, Knahl MH, Frey-Luxemburger M, Dowland PS
Proceedings of the Seventh Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2011), Furtwangen, Germany, ISBN: 978-1-84102-295-6, pp77-87, 2011
Can be ordered on-line.
More details | Download PDF | External link available

System Design for Embedded Automotive Systems
Vergata S, Wietzke J, Schütte A, Dowland PS
Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Plymouth, UK, ISBN: 978-1-84102-269-7, pp53-60, 2010
Can be ordered on-line.
More details | Download PDF

An Approach for Structuring Heterogeneous Automotive Software Systems by use of Multicore Architectures
Knirsch A, Wietzke J, Moore R, Dowland PS
Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Plymouth, UK, ISBN: 978-1-84102-269-7, pp19-30, 2010
Can be ordered on-line.
More details | Download PDF

Web-Based Plankton Data Visualisation
Ho TT, Dowland PS
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp285-293, 2009
Can be ordered on-line.
More details | Download PDF

Implementation of the Least Privilege Principle on Windows XP, Windows Vista and Linux
Scalbert L, Dowland PS
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp226-233, 2009
Can be ordered on-line.
More details | Download PDF

An Assessment of People's Vulnerabilities in Relation to Personal and Sensitive Data
Sanders B, Dowland PS
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp124-134, 2009
Can be ordered on-line.
More details | Download PDF

CentOS Linux 5.2 and Apache 2.2 vs. Microsoft Windows Web Server 2008 and IIS 7.0 when Serving Static and PHP Content
Moore DJ, Dowland PS
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp92-97, 2009
Can be ordered on-line.
More details | Download PDF

Network Security, Guidelines to Build a Security Perimeter for SMEs
Godon S, Dowland PS
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp40-47, 2009
Can be ordered on-line.
More details | Download PDF

A SOA Middleware for High-Performance Communication
Swientek M, Humm B, Bleimann U, Dowland PS
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp123-133, 2009
Can be ordered on-line.
More details | Download PDF

Online Gaming: An Emerging Avenue for Exploitation?
Sanders B, Dowland PS, Furnell SM
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp29-42, 2009
Can be ordered on-line.
More details | Download PDF

Investigating Options of Securing Web Application
Meemeskul T, Dowland PS
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp267-273, 2008
Can be ordered on-line.
More details | Download PDF

Investigating, Implementing and Evaluating Client-Side Keystroke Analysis User Authentication for Web Sites
Hocking C, Dowland PS
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp126-134, 2008
Can be ordered on-line.
More details | Download PDF

Implementing a Visual Network Management Console
Agbai OC, Dowland PS
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp89-98, 2008
Can be ordered on-line.
More details | Download PDF

A Survey of User Opinions and Preference Towards Graphical Authentication
Jali MZ, Furnell SM, Dowland PS, Reid F
Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008), Wrexham, UK, ISBN: 978-1-84102-196-6, pp11-20, 2008
Can be ordered on-line.
More details | Download PDF

Web-based Plankton Data Visualisation
Aung TY, Dowland PS
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp173-181, 2007
Can be ordered on-line.
More details | Download PDF

Information Security Awareness & Training
Al-Ghatam H, Dowland PS
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp157-163, 2007
Can be ordered on-line.
More details | Download PDF

A guide for small and medium enterprise of implementing security and firewall system
Zhang R, Dowland PS
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp146-153, 2007
Can be ordered on-line.
More details | Download PDF

VoIP Security Threats and Vulnerabilities
Rizvi SMA, Dowland PS
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp114-122, 2007
Can be ordered on-line.
More details | Download PDF

The Art of Network Monitoring
Mohyuddin A, Dowland PS
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp100-105, 2007
Can be ordered on-line.
More details | Download PDF

Implementing Network Monitoring Tools
Asiwe VC, Dowland PS
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp3-10, 2007
Can be ordered on-line.
More details | Download PDF

Social Engineering: A growing threat, with diverging directions
Chelleth JV, Furnell SM, Papadaki M, Pinkney G, Dowland PS
Advances in Network & Communication Engineering 3, pp179-184, 2006
Can be ordered on-line.
More details | Download PDF

Security and Risk Analysis of VoIP Networks
Feroz S, Dowland PS
Advances in Network & Communication Engineering 3, pp83-89, 2006
Can be ordered on-line.
More details | Download PDF

Implementing a network operations centre management console: Netmates
Bali R, Dowland PS
Advances in Network & Communication Engineering 3, pp75-82, 2006
Can be ordered on-line.
More details | Download PDF

Design of an Architecture for Wireless Community Networks
Perry A, Dowland PS
Advances in Network & Communication Engineering 2, pp93-101, 2005
More details

Approaches to Establishing IT Security Culture
Langue C, Furnell SM, Dowland PS
Advances in Network & Communication Engineering 2, pp43-48, 2005
More details

Passimages : An Alternative Method of User Authentication
Charruau D, Furnell SM, Dowland PS
Advances in Network & Communication Engineering 2, pp3-10, 2005
More details

Security Analysis Tools - Do They Make Any Difference?
Bolakis S, Furnell SM, Dowland PS
Advances in Network & Communication Engineering, pp29-37, 2004
More details

29 Internal publications

Other publications

Three ways the ‘NotPetya’ cyberattack is more complex than WannaCry
Dowland PS
The Conversation, 30th June, 2017
More details | External link available

Using student analytics to improve the student experience and underpin success at university
Dowland PS
Professionals in International Education, June 27, 2014
More details | External link available

Adapting to analytics
Dowland PS
Education Technology & Wildfire Comms, 2 June 2014, 2014
More details | External link available

Collecting data on students: is it useful to know which books they've read?
Dowland PS
The Guardian Higher Education Network , 29 April 2014, 2014
More details | External link available

4 Other publications

141 publication(s) - all categories.