Research Student Profile

Home People Profile...

Dr Nathan L Clarke PhD

Brief biographical information

nathan.clarke@plymouth.ac.uk

Access thesis on-line

Advanced User Authentication for Mobile Devices

Recent years have witnessed widespread adoption of mobile devices. Whereas initial popularity was driven by voice telephony services, capabilities are now broadening to allow an increasing range of data orientated services. Such services serve to extend the range of sensitive data accessible through such devices and will in turn increase the requirement for reliable authentication of users.

This thesis considers the authentication requirements of mobile devices and proposes novel mechanisms to improve upon the current state of the art. The investigation begins with an examination of existing authentication techniques, and illustrates a wide range of drawbacks. A survey of end-users reveals that current methods are frequently misused and considered inconvenient, and that enhanced methods of security are consequently required. To this end, biometric approaches are identified as a potential means of overcoming the perceived constraints, offering an opportunity for security to be maintained beyond point-of-entry, in a continuous and transparent fashion.

The research considers the applicability of different biometric approaches for mobile device implementation, and identifies keystroke analysis as a technique that can offer significant potential within mobile telephony. Experimental evaluations reveal the potential of the technique when applied to a Personal Identification Number (PIN), telephone number and text message, with best case equal error rates (EER) of 9%, 8% and 18% respectively. In spite of the success of keystroke analysis for many users, the results demonstrate the technique is not uniformly successful across the whole of a given population. Further investigation suggests that the same will be true for other biometrics, and therefore that no single authentication technique could be relied upon to account for all the users in all interaction scenarios. As such, a novel authentication architecture is specified, which is capable of utilising the particular hardware configurations and computational capabilities of devices to provide a robust, modular and composite authentication mechanism. The approach, known as IAMS (Intelligent Authentication Management System), is capable of utilising a broad range of biometric and secret knowledge based approaches to provide a continuous confidence measure in the identity of the user. With a high confidence, users are given immediate access to sensitive services and information, whereas with lower levels of confidence, restrictions can be placed upon access to sensitive services, until subsequent reassurance of a user?s identity.

The novel architecture is validated through a proof-of-concept prototype. A series of test scenarios are used to illustrate how IAMS would behave, given authorised and impostor authentication attempts. The results support the use of a composite authentication approach to enable the non-intrusive authentication of users on mobile devices.

Dr Nathan L Clarke

Director of studies: Dr Steven M. Furnell
Other supervisors: Prof. Paul Reynolds, Dr Benn Lines

Journal papers

A novel privacy preserving user identification approach for network traffic
Clarke NL, Li F, Furnell SM
Computers & Security, Volume 70, September 2017, Pages 335-350, 2017
More details | External link available

Identifying Users by Network Traffic Metadata
Alotibi G, Clarke NL, Li F, Furnell SM
International Journal of Chaotic Computing, Volume 4, Issue 2, 2016
More details | External link available

A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches
Al-Naffakh N, Clarke NL, Dowland PS, Li F
International Journal for Information Security Research, Volume 6, Issue 3, 2016
More details | External link available

An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data
Mohammed H, Clarke NL, Li F
The Journal of Digital Forensics, Security and Law: JDFSL, Volume 11 Issue 2 Pages 137-152, 2016
More details | External link available

Leveraging Biometrics for Insider Misuse Identification
Alruban A, Clarke NL, Li F, Furnell SM
International Journal on Cyber Situational Awareness (IJCSA), Vol. 1, No. 1, 2016, article 7, 2016
More details | External link available

Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis
Al-Bayati B, Clarke NL, Dowland PS
GSTF Journal on Computing (JOC), ISSN:2251-3043, Vol. 5, Iss.1, pp21-28, 2016
Winner of the Best Student Paper award at the 7th Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2016).
More details | External link available

A suspect-oriented intelligent and automated computer forensic analysis
Al Fahdi M, Clarke NL, Li F, Furnell SM
Digital Investigation, Volume 18, pp. 65-76, 2016
More details | External link available

Awareness of Mobile Device Security: A Survey of User's Attitudes
Clarke NL, Symes JE, Saevanee H, Furnell SM
International Journal of Mobile Computing and Multimedia Communications (IJMCMC), Vol 7, Iss 1, 2016
More details | External link available

A Novel Taxonomy for Mobile Applications Data
Alotaibi S, Furnell SM, Clarke NL
International Journal of Cyber-Security and Digital Forensics (IJCSDF), ISSN: 2305-0012, Vol. 5, No. 3, pp115-121, 2016
More details | External link available

Active Authentication: The Panacea of Access Control
Clarke NL, Li F
Journal of Information System Security, Volume 11, Number 3, pp185-199, ISSN 1551-0123, 2015
More details | External link available

A Fine-Grained Analysis of User Activity on Mobile Applications: The Sensitivity Level Perception
Alotaibi S, Furnell SM, Clarke NL
International Journal for Information Security Research (IJISR), Volume 5, Issue 3, pp591-599, 2015
More details | External link available

A forensic acquisition and analysis system for IaaS
Alqahtany S, Clarke NL, Furnell SM, Reich C
Cluster Computing, pp1-15, 2015
More details | External link available

Continuous and transparent multimodal authentication: reviewing the state of the art
Al Abdulwahid A, Clarke NL, Stengel I, Furnell SM, Reich C
Cluster Computing, pp1-20, 2015
More details | External link available

Continuous user authentication using multi-modal biometrics
Saevanee H, Clarke NL, Furnell SM, Biscioneb V
Computers & Security, Vol. 53, pp234-246, 2015
More details | External link available

Language-independent gender identification through keystroke analysis
Tsimperidis I, Katos V, Clarke NL
Information and Computer Security, Vol. 23 Iss. 3, pp.286-301, 2015
More details | External link available

Android Forensic Data Analyzer (AFDA): An Opensource Tool to Automatize Event Correlation Analysis on Android Devices
Kasiaras D, Zafeiropoulos T, Clarke NL, Kambourakis G
International Journal for Information Security Research (IJISR), Vol. 4, Iss. 4, pp501-509, 2014
More details | External link available

The Price of Patching
Furnell SM, van Niekerk J, Clarke NL
Computer Fraud and Security, Issue 8, pp8-13, 2014
More details | External link available

End-to-middle-to-end solution for IMS media plane security
Fajardo JO, Liberal F, Li F, Clarke NL, Mkwawa IH
Electronic Commerce Research, Springer US, 2014
More details | External link available

Active authentication for mobile devices utilising behaviour profiling
Li F, Clarke NL, Papadaki M, Dowland PS
International Journal of Information Security, Volume 13, Issue 3, pp229-244, ISSN:1615-5262, 2014
More details | External link available

Co-operative user identity verification using an Authentication Aura
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Computers & Security, Volume 39, Part B, November, pp486–502, 2013
More details | External link available

A response selection model for intrusion response systems: Response Strategy Model (RSM)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Security and Communication Networks, 2013
More details | External link available

Sun Behind Clouds - On Automatic Cloud Security Audits and a Cloud Audit Policy Language
Doelitzscher F, Rübsamen T, Karbe T, Reich C, Knahl MH, Clarke NL
International Journal on Advances in Networks and Services, vol 6 no 1 & 2, ISSN: 1942-2644, pp1-16, 2013
More details | External link available

Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Security and Communication Networks, 2012
More details | External link available

Power to the people? The evolving recognition of human aspects of security
Furnell SM, Clarke NL
Computers & Security, Volume 31, Issue 8, pp983–988, 2012
More details | External link available

An agent based business aware incident detection system for cloud environments
Doelitzscher F, Reich C, Knahl MH, Passfall A, Clarke NL
Journal of Cloud Computing: Advances, Systems and Applications, 1:9, ISSN: 2192-113X, 2012
More details | External link available

Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke NL, Gritzalis S
Security and Communication Networks, vol. 5, issue 1, 2012
More details | External link available

Misuse Detection for Mobile Devices Using Behaviour Profiling
Li F, Clarke NL, Papadaki M, Dowland PS
International Journal of Cyber Warfare & Terrorism, Volume 1, Issue 1, pp43-55, ISSN: 1947-3435, 2011
More details | External link available

Authentication Aura - A distributed approach to user authentication
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Journal of Information Assurance and Security, vol. 6 (2011), issue 2, pp149-156, ISSN 1554-1010, 2011
More details | External link available

Establishing A Personalized Information Security Culture
Talib S, Clarke NL, Furnell SM
International Journal of Mobile Computing and Multimedia Communications (IJMCMC), Vol 3, Iss 1, pp63-79, 2011
More details | External link available

Comparing Intentions to Use University-Provided vs. Vendor-Provided Multibiometric Authentication in Online Exams
Levy Y, Ramim MM, Furnell SM, Clarke NL
Campus-Wide Information Systems, Vol. 28 Iss: 2, 2011
More details

A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
Tjhai GC, Furnell SM, Papadaki M, Clarke NL
Computers & Security, Volume 29, Issue 6, pp712-723 , 2010
More details | External link available

A Friend Mechanism for Mobile Ad Hoc Networks
Razak SA, Samian N, Ma’arof MA, Furnell SM, Clarke NL, Brooke PJ
Journal of Information Assurance and Security, Volume 4, Issue 5, pp440-448, 2009
More details

From desktop to mobile: Examining the security experience
Botha RA, Furnell SM, Clarke NL
Computers & Security, Volume 28, Issues 3-4, pp130-137, 2009
More details | External link available

Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
Razak SA, Furnell SM, Clarke NL, Brooke PJ
Ad Hoc Networks, Volume 6, Issue 7, September, pp1151-1167, 2008
More details | External link available

Beyond the PIN: Enhancing user authentication for mobile devices
Furnell SM, Clarke NL, Karatzouni S
Computer Fraud & Security, Volume 2008, Issue 8, pp12-17, 2008
More details | External link available

The application of signature recognition to transparent handwriting verification for mobile devices
Clarke NL, Mekala AR
Information Management & Computer Security, volume 15, issue 3, pp214-225, 2007
More details

Advanced user authentication for mobile devices
Clarke NL, Furnell SM
Computers & Security, vol. 26, no. 2, pp109-119, 2007
More details

A Composite User Authentication Architecture for Mobile Devices
Clarke NL, Furnell SM
Journal of Information Warfare, vol. 5, no. 2, pp11-29, 2006
More details

Authenticating Mobile Phone Users Using Keystroke Analysis
Clarke NL, Furnell SM
International Journal of Information Security, vol. 6, no. 1, pp1-14, 2006
More details

The role of academic qualifications in the IT security profession
Furnell SM, Katos V, Clarke NL
DATAWATCH, Information Systems Audit and Control Association (ISACA) - London Chapter, Winter, pp8-15, 2005
More details | External link available

Authentication of users on mobile telephones - A survey of attitudes and practices
Clarke NL, Furnell SM
Computers & Security, vol. 24, no. 7, pp519-527, 2005
More details

Biometrics - The promise versus the practice
Clarke NL, Furnell SM
Computer Fraud and Security, September, pp12-16, 2005
More details

Biometrics: No silver bullets
Furnell SM, Clarke NL
Computer Fraud & Security, August, pp9-14, 2005
More details

Keystroke Dynamics on a Mobile Handset: A Feasibility Study
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Information Management and Computer Secuirty, vol. 11, no. 4, pp161-166, 2003
More details | Download PDF

Acceptance of subscriber authentication methods for mobile telephony devices
Clarke NL, Furnell SM, Rodwell PM, Reynolds PL
Computers & Security, vol. 21, no.3, pp220-228, 2002
More details | Download PDF

45 Journal papers

Conference papers

A Forensic Acquisition Based upon A Cluster Analysis of Non-Volatile Memory in IaaS
Alqahtany S, Clarke NL, Furnell SM, Reich C
Anti-Cyber Crimes (ICACC), 2nd International Conference on, pp 123-128, 2017
More details | External link available

Insider Misuse Identification using Transparent Biometrics
Clarke NL, Li F, Alruban A, Furnell SM
Proceedings of the 50th Hawaii International Conference on System Sciences, January 04 - 07, Hawaii USA, 2017
More details | External link available

Software Defined Privacy
Kemmer F, Reich C, Knahl MH, Clarke NL
International Conference on High Performance Computing, Cloud Engineering Workshop (IC2EW), 2016 IEEE International Conference on, pp 25-39, Berlin, 4-8 April 2016, 2016
More details | External link available

Providing Security in Container-Based HPC Runtime Environments
Gantikow H, Reich C, Knahl MH, Clarke NL
International Conference on High Performance Computing, In: Taufer M., Mohr B., Kunkel J. (eds) High Performance Computing. ISC High Performance 2016. Lecture Notes in Computer Science, vol 9945. Springer, Cham, 2016
More details | External link available

Information Security Policies: A Review of Challenges and Influencing Factors
Alotaibi M, Furnell SM, Clarke NL
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp 352-358, Barcelona, Spain, 2016
More details | External link available

User profiling from network traffic via novel application-level interactions
Alotibi G, Clarke NL, Li F, Furnell SM
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp 279-285, Barcelona, Spain, 2016
More details | External link available

Activity Recognition using wearable computing
Al-Naffakh N, Clarke NL, Dowland PS, Li F
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 189-195, Barcelona, Spain, 2016
More details | External link available

A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment
Alqahtany S, Clarke NL, Furnell SM, Reich C
11th International Conference on Availability, Reliability and Security, 31 August -2 September, 2016
More details | External link available

Increasing eLearning Engagement Using Mobile Technologies
Triantafyllidis A, Clarke NL, Dowland PS, Vranopoulos G
9th annual International Conference of Education, Research and Innovation (ICERI2016), 14-16 November, Seville, Spain, pp8644-8653, ISBN: 978-84-617-5895-1, ISSN: 2350-1095, 2016
More details | External link available

The Value of the Biometrics in Invigilated E-Assessments
Ketab S, Clarke NL, Dowland PS
Proceedings of the the 8th Annual International Conference on Education and New Learning Technologies, Barcelona, Spain, 4-6 July, ISBN: 978-84-608-8860-4, ISSN: 2340-1117, 2016
More details | External link available

Proactive Biometric-Enabled Forensic Imprinting
Alruban A, Clarke NL, Li F, Furnell SM
International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016), June 13-14, London, UK, 2016
Winner of the Best Paper Award (Cyber Incident 2016)
More details

A Scalable Architecture for Distributed OSGi in the Cloud
Kuijs H, Knahl MH, Clarke NL, Reich C
Proceedings of the 6th International Conference on Cloud Computing and Services Science, CLOSER 2016, pp109-117, ISBN: 978-989-758-182-3, 2016
Awarded 'Best Student Paper Award"
More details | Download PDF

Information Security and Practice: The User's Perspective
Clarke NL, Li F, Furnell SM, Stengel I, Ganis G
Proceedings of the 11th International Conference On Cyber Warfare and Security (ICCWS-2016), pp81-89, ISSN:2048-9870, ISBN:9781910810835, 17-18 March 2016, Boston, USA, 2016
More details

Towards privacy for ambient assisted living in a hybrid cloud environment
Kuijs H, Reich C, Knahl MH, Clarke NL
Proceedings of the 2nd Baden-Württemberg Center of Applied Research Symposium on Information and Communication Systems - SInCom 2015, pp41-45; ISBN 978-3-00-051859-1, 2015
More details

Transparent Authentication Systems for Mobile Device Security: A Review
Alotaibi S, Furnell SM, Clarke NL
10th International Conference for Internet Technology and Secured Transactions (ICITST), 14-16 Dec, pp. 406-413, 2015
More details | External link available

Towards Dynamic Adaption of User's Organisational Information Security Behaviour
Alotaibi M, Furnell SM, Clarke NL
Proceedings of the 13th Australian Information Security Management Conference (AISM2015), Perth, Australia, pp28-36, ISBN 0-7298-0733-9, 2015
More details

Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes
Al Abdulwahid A, Clarke NL, Furnell SM, Stengel I, Reich C
12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2015), Valencia, Spain, September 1-2, pp153-168, ISBN 978-3-319-22906-5, 2015
More details | External link available

Active Authentication: The Panacea of Access Control?
Clarke NL, Li F
Proceedings of the 14th Annual Security Conference, May 19-21, Las Vegas, USA, 2015
More details

A Survey of Continuous and Transparent Multibiometric Authentication Systems
Al Abdulwahid A, Clarke NL, Furnell SM, Stengel I, Reich C
Proceedings of the 14th European Conference on Cyber Warfare and Security (ECCWS-2015), pp 1-10, ISBN: 978--91081-2-3, ISSN: 204-8610, 2015
More details | External link available

Forensic Investigation of Network Traffic: A Study into the Derivation of Application-Level features from Network-Level Metadata
Li F, Clarke NL, Alotibi G, Joy D
6th Annual International Conference on ICT: Big data, Could and Security (ICT-BDCS 2015), 27-28 July, ISSN: 2382-5669, pp68-73, 2015
More details | External link available

The Current Use of Authentication Technologies: An Investigative Review
Al Abdulwahid A, Clarke NL, Stengel I, Furnell SM, Reich C
Proceedings of the IEEE 2015 International Conference on Cloud Computing (ICCC15), pp 239-246, ISBN 15: 978-1-4673-6618-2, 2015
More details | External link available

Cloud Forensics: A Review of Challenges, Solutions and Open Problems
Alqahtany S, Clarke NL, Furnell SM, Reich C
Proceedings of the IEEE 2015 International Conference on Cloud Computing (ICCC15), pp 88-96, ISBN 15: 978-1-4673-6618-2, 2015
More details

Behavioral-Based Feature Abstraction from Network Traffic
Alotibi G, Li F, Clarke NL, Furnell SM
10th International Conference on Cyber warfare and Security, Kruger National Park, South Africa, 24-25 March, pp1-9, ISBN 978-1-910309-97-1, 2015
More details

E-Invigilation of E-Assessments
Ketab S, Clarke NL, Dowland PS
Proceedings of INTED2015 Conference 2nd-4th March 2015, Madrid, Spain, ISBN: 978-84-606-5763-7, 2015
More details

Text-Based Active Authentication for Mobile Devices
Saevanee H, Clarke NL, Furnell SM, Biscioneb V
29th IFIP TC11 International Conference on ICT Systems Security & Privacy Protection, Marrakech, Morocco, 2-4 June 2014, pp 99-112, ISBN: 978-3-642-55414-8, 2014
More details | External link available

A Forensically-Enabled IAAS Cloud Computing Architecture
Alqahtany S, Clarke NL, Furnell SM, Reich C
Proceedings of the 12th Australian Digital Forensics Conference, pp75-83, ISBN: 978-0-7298-0719-7, 2014
More details | External link available

A User-oriented Network Forensic Analyser: The Design of a High-Level Protocol Analyser
Joy D, Li F, Clarke NL, Furnell SM
Proceedings of the 12th Australian Digital Forensics Conference, 1-3 December, ECU Joondalup Campus, Perth, Western Australia, pp 84-93, ISBN 978-0-7298-0719-7, 2014
More details

Android Forensics: Correlation Analysis
Kasiaras D, Zafeiropoulos T, Clarke NL, Kambourakis G
9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, IEEE Press, 2014
More details

Performance Evaluation of A Technology Independent Security Gateway for Next Generation Networks
Li F, Clarke NL, Furnell SM, Mkwawa IH
Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE 10th International Conference on Emergency Networks for Public Protection and Disaster Relief, 8-10 October 2014 in Larnaca, Cyprus, page 281-286, 2014
More details | External link available

Performance-driven evaluation for deploying IMS-based interoperability scenarios
Fajardo JO, Liberal F, Li F, Clarke NL, Mkwawa IH, Sun L
IEEE International Conference on Communications (IEEE ICC 2014), 10-14 June 2014, Sydney, Australia, pp.3019-3024, 2014
More details | External link available

An Evaluation of Behavioural Profiling on Mobile Devices
Li F, Wheeler R, Clarke NL
Proceedings of the Second International Conference HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, pp330-339 in Human Aspects of Information Security, Privacy, and Trust, Lecture Notes in Computer Science, Volume 8533, 2014
More details | External link available

Data Carving using Artificial Headers
Daniel R, Clarke NL, Li F
Proceedings of the 13th Annual Security Conference, Las Vegas, USA, 2014
More details

Cloud Forensics Challenges
Alqahtany S, Clarke NL, Furnell SM
Proceedings of the 7th SSC Saudi Students Conference - UK, pp86-93, ISBN: 9780956904522, 2014
More details | External link available

Anomaly Detection In IaaS Clouds
Doelitzscher F, Knahl MH, Reich C, Clarke NL
5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom2013), Bristol, UK, Dec 2-5, ISBN: 978-0-7695-5095-4, pp387-394, 2013
More details | External link available

Towards an Automated Forensic Examiner (AFE) Based upon Criminal Profiling & Artificial Intelligence
Al Fahdi M, Clarke NL, Furnell SM
Proceedings of the 11th Australian Digital Forensics Conference, Perth, Australia, 2-4 December, pp 1-9, ISBN 978-0-7298-0711-1, 2013
More details

A Conceptual Model for Federated Authentication in the Cloud
Al Abdulwahid A, Clarke NL, Furnell SM, Stengel I
Proceedings of the 11th Australian Information Security Management Conference (AISM2013), Perth, Australia, 2-4 December, pp 1-11, ISBN 978-0-7298-0710-4, 2013
More details | External link available

Learning management systems in higher education: a faculty perspective
Triantafyllidis A, Clarke NL, Dowland PS
6th International Conference of Education, Research and Innovation (ICERI2013), Madrid, Spain, ISBN: 978-84-616-3847-5, pp5120-5130, 2013
More details | External link available

User Requirements for Future Wideband Critical Communications
Liberal F, Ramos M, Fajardo JO, Goi N, Bizkarguenaga A, Mesogiti I, Theodoropoulou E, Lyberopoulos G, Koumaras H, Sun L, Clarke NL, Li F
Proceeding of the International Workshop on Emergency Telecommunications Systems (ETS 2013), Wrexham, UK, 12 September, pp341-348, 2013
More details

A Technology Independent Security Gateway for Future Emergency Telecommunication Systems (ETS)
Li F, Clarke NL, Furnell SM, Fajardo JO, Liberal F, Sidibe M
Proceeding of the International Workshop on Emergency Telecommunications Systems (ETS 2013), Wrexham, UK, 12 September, pp299-308, 2013
More details

Challenges to Digital Forensics: A Survey of Researchers & Practitioners Attitudes and Opinions
Al Fahdi M, Clarke NL, Furnell SM
Proceedings of ISSA (Information Security South Africa), Johannesburg, 14-16 August, ISBN:978-1-4799-0809-7, 2013
More details

Towards Continuous and Convenient User Authentication
Furnell SM, Clarke NL
The Future of Identity: A compilation of research papers from a workshop, City University London / EPSRC, April, 2013
More details

E-Invigilator: A Biometric-Based Supervision System for e-Assessments
Clarke NL, Dowland PS, Furnell SM
The International Conference on Information Society (i-Society 2013), Toronto, Canada, 24-26 June, 2013
More details

A Technology Independent Security Gateway for Real-Time Multimedia Communication
Li F, Clarke NL, Furnell SM
Proceedings of the 7th International Conference on Network and System Security (NSS2013), 3-4 June 2013, Madrid, Spain, pp14-25, 2013
More details

Multimodal Biometric Surveillance using a Kinect Sensor
Savage R, Clarke NL, Li F
Proceedings of the 12th Annual Security Conference, April, Las Vegas, USA, 2013
More details | Download PDF

Learning management systems in higher education: a student perspective
Triantafyllidis A, Clarke NL, Dowland PS
5th International Conference of Education, Research and Innovation (ICERI2012), Madrid, Spain, ISBN: 978-84-616-0763-1, pp4046-4055, 2012
More details | External link available

Web-Based Risk Analysis for Home Users
Magaya RT, Clarke NL
10th Information Security Management Conference, Perth, Australia, Dec 3-5, 2012
More details

Validating Cloud Infrastructure Changes by Cloud Audits
Doelitzscher F, Fischer C, Moskal D, Reich C, Knahl MH, Clarke NL
Proceedings of the 8th IEEE World Congress on Services (SERVICES2012), ISBN: 978-0-7695-4756-5/12, pp377-384, 2012
More details | External link available

A Response Strategy Model for Intrusion Response Systems
Anuar NB, Papadaki M, Furnell SM, Clarke NL
27th IFIP International Information Security and Privacy Conference - SEC2012, Heraklion, Crete, Greece, 4-6 June, pp573-578, 2012
More details

A Feasibility Study into Tracking Wi-Fi Enabled Mobile Devices
Dagnall M, Clarke NL
Proceedings of the Ninth International Network Conference (INC2012), Port Elizabeth, South Africa, July, ISBN: 978-1-84102-315-1, pp85-92, 2012
Can be ordered on-line.
More details | Download PDF

A Novel Security Architecture for a Space-Data DTN
Clarke NL, Katos V, Menesidou SA, Ghita BV, Furnell SM
10th International Conference on Wired/Wireless Internet Communications – WWIC 2012, Santorini, Greece, June 6-8, pp342-349, 2012
More details | External link available

Multi-Modal Behavioural Biometric Authentication for Mobile Devices
Saevanee H, Clarke NL, Furnell SM
27th IFIP International Information Security and Privacy Conference - SEC2012, Heraklion, Crete, Greece, 4-6 June, pp465-474, 2012
More details

Information Leakage Through Second Hand Usb Flash Drives within the United Kingdom
Chaerani W, Clarke NL, Bolan C
Australian Digital Forensics Conference, Perth, Australia, 5-7 December, 2011
More details

Incident detection for cloud environments
Doelitzscher F, Reich C, Knahl MH, Clarke NL
Proceedings of the Third International Conference on Emerging Network Intelligence (EMERGING 2011), ISBN: 978-1-61208-174-8, pp100-105, 2011
More details | External link available

An autonomous agent based incident detection system for cloud environments
Doelitzscher F, Reich C, Knahl MH, Clarke NL
Proceedings of the 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom2011), ISBN: 978-0-7695-4622-3/11, pp197-204, 2011
More details | External link available

A Risk Index Model for Security Incident Prioritisation
Anuar NB, Furnell SM, Papadaki M, Clarke NL
Proceedings of the 9th Australian Information Security Management Conference (ASIM 2011), Perth, Australia, 5-7 December, 2011
More details

A preliminary investigation of distributed and cooperative user authentication
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Proceedings of the 9th Australian Information Security Management Conference (secAU 2011), Perth, Australia, 5-7 December, 2011
More details

SMS Linguistic Profiling Authentication on Mobile Devices
Saevanee H, Clarke NL, Furnell SM
5th International Conference on Network and System Security (NSS 2011), p224-229, 2011
More details

Personal Knowledge Management - Beyond Versioning
Thaul W, Bleimann U, Clarke NL
LWA 2011, FG-WM, Magdeburg, Germany, 28-30 Sept , pp24-31, 2011
More details

Risk Assessment for Mobile Devices
Ledermuller T, Clarke NL
Proceedings of Privacy and Security in Digital Business – 8th International Conference, TrustBus 2011, Toulouse, France, 30 August - 2 September, pp210-221, LNCS (LNCS6863), ISBN: 978-3-642-22889-6, 2011
More details

Behaviour Profiling for Transparent Authentication for Mobile Devices
Li F, Clarke NL, Papadaki M, Dowland PS
Proceedings of the 10th European Conference on Information Warfare and Security (ECIW), Tallinn, Estonia 7-8 July, pp307-314, 2011
Awarded best PhD paper.
More details

Towards a Flexible, Multi-Level Security Framework for Mobile Devices
Clarke NL, Karatzouni S, Furnell SM
Proceedings of the 10th Security Conference, Las Vegas, USA, 4-6 May, 2011
More details | Download PDF

Culture of Integration: Literacy Tools for the Masses
Darracott A, Clarke NL
International Technology, Education and Development Conference (INTED 2011), 7-9 March, Valencia, Spain, ISBN:978-84-614-7423-3, pp4278-4285, 2011
More details | Download PDF

Behavioural Biometric Authentication For Mobile Devices
Saevanee H, Clarke NL, Furnell SM
Proceedings of the Collaborative European Research Conference (CERC2011), 14-15 January, Cork, Ireland, ISSN: 2220-4164, pp175-184, 2011
More details

Behaviour Profiling on Mobile Devices
Li F, Clarke NL, Papadaki M, Dowland PS
International Conference on Emerging Security Technologies, 6-8 September, Canterbury, UK, pp77-82, 2010
More details | External link available

Assessing the Usability of End-User Security Software
Ibrahim T, Furnell SM, Papadaki M, Clarke NL
Lecture Notes in Computer Science, Volume 6264/2010, pp177-189, 2010
More details | External link available

A distributed and cooperative user authentication framework
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Proceedings of the 6th International Confernece on Information Assurance and Security (IAS 2010), Atlanta, USA, 23-25 August, pp304-310, 2010
More details

An investigation and survey of response options for Intrusion Response Systems (IRSs)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Proceedings of the 9th Annual Information Security South Africa Conference, Sandton, South Africa, 2 - 4 August, pp1-8, ISBN: 978-1-4244-5493-8, 2010
More details | External link available

Service Quality Assessment in Distance Learning
Shauchenka H, Bleimann U, Knoll M, Clarke NL
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp269-277, 2010
Can be ordered on-line.
More details | Download PDF

E-Book readers in academic personal knowledge management
Thaul W, Bleimann U, Wentzel C, Clarke NL
Plymouth e-Learning Conference 2010, Plymouth, UK, 08-09 April, 2010
Abstract only publication.
More details

An Analysis of Information Security Awareness within Home and Work Environments
Talib S, Clarke NL, Furnell SM
Fifth International Conference on Availability, Reliability and Security (“ARES 2010 – The International Dependability Conference”), Krakow, Poland, 15-18th Feb, , 2010
More details | Download PDF

Strong Authentication for Web Services using Smartcards
Stienne DS, Clarke NL, Reynolds PL
Proceedings of the 7th Australian Information Security Management Conference (SECAU 2009), 1-3 December, Perth, Australia, On-line proceedings only, 2009
More details | Download PDF | External link available

A Critical Evaluation of an Online Peer Assessment System (OPAS)
Clarke NL, Dowland PS
Proceedings of the International Conference of Education, Research and Innovation (ICERI 2009), 16-18th November, Madrid, Spain, 2009
More details | Download PDF

Assessing the Usability of Personal Internet Security Tools
Ibrahim T, Furnell SM, Papadaki M, Clarke NL
8th European Conference on Information Warfare and Security (ECIW), Military Academy, Lisbon & the University of Minho, Braga, Portugal, 6-7 July, 2009
More details | Download PDF

Flexible and Transparent User Authentication for Mobile Devices
Clarke NL, Karatzouni S, Furnell SM
Proceedings of the 24th IFIP TC 11 International Information Security Conference, Pafos, Cyprus, May 18-20, ISBN: 978-3-642-01243-3, pp1-12, 2009
More details

Creation of logic-linguistic structure defining the educational services of Atlantis University
Shauchenka H, Bleimann U, Knoll M, Clarke NL
Plymouth e-Learning Conference 2009, Plymouth, UK, 23-24 April, 2009
Abstract only publication.
More details

How recommender systems applied in personal knowledge management environments can improve learning processes
Thaul W, Bleimann U, Wentzel C, Clarke NL
Plymouth e-Learning Conference 2009, Plymouth, UK, 23-24 April, 2009
More details | Download PDF

Intrusion Detection System for Mobile Devices: Investigation on Calling Activity
Li F, Clarke NL, Papadaki M
Proceedings of the 8th Security Conference, April, Las Vegas, USA, 2009
More details | Download PDF

Deployment of Keystroke Analysis on a Smartphone
Buchoux A, Clarke NL
Proceedings of the 6th Australian Information Security & Management Conference, 1-3 December, Perth, Australia, 2008
More details | Download PDF

Effective Information Assurance for SMEs
Dimopoulos V, Furnell SM, Clarke NL
Proceedings of he 11th Annual Working Conference on Information Security Management, 16-17 October, Richmond, USA, pp27-45, ISBN: 978-3-901882-31-9, 2008
Can be ordered on-line.
More details | Download PDF

The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset
Tjhai GC, Papadaki M, Furnell SM, Clarke NL
Lecture Notes in Computer Science, Volume 5185/2008, ISBN: 978-3-540-85734-1, pp139-150, 2008
More details | External link available

Investigating the problem of IDS false alarms: An experimental study using Snort
Tjhai GC, Papadaki M, Furnell SM, Clarke NL
Proceeding of the 23rd International Information Security Conference (SEC 2008), Milan, Italy, 8-10 September, pp253-267, 2008
More details

Assessing the challenges of Intrusion Detection Systems
Ibrahim T, Furnell SM, Papadaki M, Clarke NL
Proceedings of the 7th Security Conference, Las Vegas, USA, 2nd-3rd June, 2008
More details | Download PDF

Transparent Facial Recognition for Mobile Devices
Clarke NL, Karatzouni S, Furnell SM
Proceedings of the 7th Security Conference, Las Vegas, USA, 2nd-3rd June, 2008
More details | Download PDF

Device- versus Network-Centric Authentication Paradigms for Mobile Devices: Operational and Perceptual Trade-Offs
Karatzouni S, Clarke NL, Furnell SM
5th Australian Information Security Management Conference, Mount Lawley, Australia, 5th December, 2007
More details | Download PDF

Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation
Razak SA, Furnell SM, Clarke NL, Brooke PJ
Ad-Hoc, Mobile, and Wireless Networks, LNCS, vol: 4686/2007, pp129-141, 2007
More details | External link available

Utilising Biometrics for Transparent Authentication on Mobile Devices
Karatzouni S, Clarke NL, Furnell SM
Proceedings of the 2nd International Conference on Internet Technologies and Applications, 4-7 September, Wrexham, UK, ISBN: 978-0-946881-54-3, pp549–557, 2007
More details | Download PDF | External link available

User Perception of the Security & Privacy Concerns of RFID Technology
Li F, Clarke NL, Bolan C
Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2007), Plymouth, UK, ISBN: 978-1-84102-174-4, pp156-169, 2007
Can be ordered on-line.
More details | Download PDF

Keystroke Analysis for Thumb-based Keyboards on Mobile Devices
Karatzouni S, Clarke NL
Proceedings of the 22nd IFIP International Information Security Conference (IFIP SEC 2007), Sandton, South Africa, 14-16 May, pp. 253-263, 2007
More details

Perceptions of User Authentication on Mobile Devices
Karatzouni S, Furnell SM, Clarke NL, Botha RA
Proceedings of the ISOneWorld Conference, Las Vegas, USA, April 11-13, CD Proceedings (0-9772107-6-6), 2007
More details | Download PDF

Web-Based Risk Analysis and Education for Home Users
Marston J, Clarke NL
Proceedings of the 6th Annual Security Conference, Las Vegas, USA, April 11-12, CD Proceedings (ISBN: 0-9772107-5-8), 2007
More details | Download PDF

The Awarenesss and Perception of Spyware Amongst Home PC Computer Users
Jaeger M, Clarke NL
Proceedings of the 7th Information Warfare & Security Conference, Perth, Australia, 4-5th December, 2006
More details | Download PDF

Transparent Handwriting Verification for Mobile Devices
Clarke NL, Mekala AR
Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK, 11-14 July, pp277-288, 2006
More details | Download PDF

A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks – A Friend Approach
Razak SA, Furnell SM, Clarke NL, Brooke PJ
Proceedings of the IEEE International Conference on Intelligence and Security Informatics Conference (ISI 2006), San Diego, CA, USA, pp590-595, May 23-24, 2006
More details | External link available

Attack Pattern Analysis: Trends in Malware Variant Development
Papadaki M, Furnell SM, Clarke NL, Abu-Bakar UA, Pinkney G
Proceedings of the 5th Security Conference, Las Vegas, April 19 -20, 2006
More details

Considering the role of academic qualifications for IT security professionals
Furnell SM, Katos V, Clarke NL
Proceedings of the 1st Colloquium for Information Systems Security Education, Asia Pacific, Adelaide, Australia, 21-22 November, pp1-11, 2005
More details

User Authentication for Mobile Devices: A Composite Approach
Clarke NL, Furnell SM
Proceedings of the 6th Australian Information Warfare and Security Conference, Geelong, Australia, 25-26 November, pp48-56, 2005
More details | Download PDF

Artificial Impostor Profiling for Keystroke Dynamics on a Mobile Handset
Lecomte J, Clarke NL, Furnell SM
Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp199-206, 2005
More details | Download PDF

Organisational Security Culture: Embedding Security Awareness, Education and Training
Furnell SM, Clarke NL
Proceedings of the 4th World Conference on Information Security Education WISE 2005, 18-20 May, Moscow, Russia, pp67-74, 2005
More details | Download PDF

User Authentication by Service Utilisation Profiling
Aupy A, Clarke NL
Proceedings of the ISOneWorld 2005, Las Vegas, USA, 30 March - 1 April, 2005
More details | Download PDF

Application of Keystroke Analysis to Mobile Text Messaging
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the 3rd Security Conference, Las Vegas, USA, 14-15 April, 2004
More details | Download PDF

Using Keystroke Analysis as a mechanism for Subscriber Authentication on Mobile Handsets
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the IFIP SEC 2003 Conference, Athens, Greece, May, pp97-108, 2003
More details | Download PDF

Biometric Authentication for Mobile Devices
Clarke NL, Furnell SM, Reynolds PL
Proceedings of the 3rd Australian Information Warfare and Security Conference, Perth, Western Australia, 28-29 November 2002, pp61-69, 2002
More details | Download PDF

Subscriber Authentication for Mobile Phones through the Implementation of Keystroke Dynamics
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July, pp347-355, 2002
More details | Download PDF

Advanced Subscriber Authentication Approaches For Third Generation Mobile Systems
Clarke NL, Furnell SM, Reynolds PL, Rodwell PM
Proceedings of the Third International Conference on 3G Mobile Communication Technologies, London, UK, 8-10 May, 2002
More details | Download PDF

104 Conference papers

Books

Transparent User Authentication
Clarke NL
Springer, ISBN 978-0-85729-804-1, pp229, 2011
Use Amazon Look Inside! facility.
More details | External link available

Computer Forensics: A Pocket Guide
Clarke NL
IT Governance Publishing, ISBN: 978-1849280396, 80pp, 2010
More details | External link available

2 Books

Edited books

Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016)
Clarke NL, Furnell SM
Frankfurt, Germany, 19-21 July, ISBN: 978-1-84102-413-4, pp313, 2016
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015)
Furnell SM, Clarke NL
Lesvos, Greece, July 1-3, ISBN: 978-1-84102-388-5, pp295, 2015
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014)
Clarke NL, Furnell SM
Plymouth, 8-10 July, ISBN: 978-1-84102-375-5, pp239, 2014
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the European Information Security Multi-Conference (EISMC 2013)
Furnell SM, Clarke NL, Katos V
Lisbon, Portugal, 8-10 May, ISBN: 978-1-84102-345-8, pp153, 2013
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012)
Clarke NL, Furnell SM
Plymouth University, ISBN: 978-1-84102-317-5, 222pp, 2012
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012)
Clarke NL, Tryfonas T, Dodge RC
Plymouth University, ISBN: 978-1-84102-316-8, 156pp, 2012
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011)
Furnell SM, Clarke NL
University of Plymouth, ISBN: 978-1-84102-284-0, 148pp, 2011
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Sixth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2011)
Clarke NL, Tryfonas T
University of Plymouth, ISBN: 978-1-84102-285-7, 177pp, 2011
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the South African Information Security Multi-Conference (SAISMC 2010)
Clarke NL, Furnell SM, von Solms R
University of Plymouth, ISBN: 978-1-84102-256-7, pp291, 2010
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Fourth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2009)
Clarke NL, Tryfonas T
University of Plymouth, ISBN: 978-1-84102-230-7, 126pp, 2009
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009)
Furnell SM, Clarke NL
University of Plymouth, ISBN: 978-1-84102-231-4, 147pp, 2009
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the Second International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008)
Clarke NL, Furnell SM
University of Plymouth, ISBN: 978-1-84102-189-8, 151pp, 2008
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2007)
Furnell SM, Clarke NL
University of Plymouth, ISBN: 978-1-84102-174-4, 178pp, 2007
Support independent publishing: Buy this book on Lulu.
More details

13 Edited books

Contributions to edited books

Delay-tolerant networks (DTNs) for deep-space communications
Clarke NL, Ghita BV, Furnell SM
in "Advances In Delay-Tolerant Networks (DTNs)" Edited by J Rodrigues, ISBN: 978-0-85709-840-5, Woodhead Publishing, 298p, 2014
More details | External link available

Understanding Cloud Audits
Doelitzscher F, Reich C, Knahl MH, Clarke NL
in "Privacy and Security for Cloud Computing", Pearson, S. and Yee, G. (Eds.), ISBN 978-1-4471-4188-4, 2012
More details | External link available

User Authentication Technologies
Clarke NL, Dowland PS, Furnell SM
in Securing Information and Communications Systems: Principles, Technologies, and Applications. S.M.Furnell, S.K.Katsikas, J.Lopez and A.Patel (Eds), Artech House, ISBN 978-1-59693-228-9, pp35-59, 2008
Available on-line.
More details

3 Contributions to edited books

Patents filed

Method of Associating a Person with a Digital Object
Alruban A, Clarke NL
UK Intellectual Property Office, UK Patent number: GB1609673.7, Filed 02/06/2016, 2016
More details

Adjusting an operating mode of a security container in response to an unexpected received radio signal
Kosmas C, Tripp N, Westington A, Clarke NL, Tjhai CJ
UK Intellectual Property Office, UK Patent number: GB2472632 (A), 2011
Filed: 13/08/2009; Published: 16/02/2011
More details | Download PDF | External link available

A container and security systems
Kosmas C, Tripp N, Westington A, Clarke NL, Tjhai CJ
EU Patent Office, EU Patent WO2011018652, 2010
Filed: 31/08/2010
More details | External link available

3 Patents filed

Posters

3D Facial Recognition and Eye Tracking
Ketab S, Clarke NL, Dowland PS
The Postgraduate Society Conference, 16th March 2016, Plymouth University, 2016
More details

User Behaviour with Organisational Information Security Policies
Alotaibi M, Furnell SM, Clarke NL
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, 2015
More details | Download PDF | External link available

A Framework of User Identification From Network Traffic
Alotibi G, Clarke NL, Furnell SM, Li F
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, 2015
More details | Download PDF

A Review of Cloud Forensics issues, solutions & open problems
Alqahtany S, Clarke NL, Furnell SM
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, 2015
More details | Download PDF | External link available

E-invigilation of E-Assessments
Ketab S, Clarke NL, Dowland PS
The Postgraduate Society Conference, 19th March, Plymouth University, 2014
More details | Download PDF

Non-Intrusive Biometric Authentication for Mobile Devices
Clarke NL, Furnell SM, Reynolds PL, Rodwell PM
Poster presentation at Biometrics 2002, Excel Center, London, UK, 6-8 November, 2002
Recipient of Best Student Prize
More details | Download PDF

Non-Intrusive Subscriber Authentication for 3G Mopbile System
Clarke NL, Dowland PS, Furnell SM, Reynolds PL, Rodwell PM
Poster presentation at Britain's Younger Engineers in 2001, House of Commons, London, 3 December, 2001
More details | Download PDF

7 Posters

Internal publications

Web-Based Risk Analysis for Home Users
Magaya RT, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp136-145, 2013
Can be ordered on-line.
More details | Download PDF

Web-based Risk Analysis for SMEs
Kunder R, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp120-127, 2013
Can be ordered on-line.
More details | Download PDF

A Crime Depended Automated Search and Engine for Digital Forensics
Fizaine JP, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp73-87, 2013
Can be ordered on-line.
More details | Download PDF

Developing a Mobile WiFi Tracking Unit
Dagnall M, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp65-72, 2013
Can be ordered on-line.
More details | Download PDF

Improving Online Collaboration within the IFIP Working Group on Human Aspects of Information Security and Assurance
Burton O, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp58-64, 2013
Can be ordered on-line.
More details | Download PDF

Study of RSA Performance in Java Cards
Bernabé G, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp45-57, 2013
Can be ordered on-line.
More details | Download PDF

Security on Mobile Devices: A Survey of Users’ Attitudes and Opinions
Symes JE, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 9, ISBN: 978-1-84102-320-5, pp59-68, 2012
Can be ordered on-line.
More details | Download PDF

Culture of Integration: Literacy Tools for the Masses
Darracott A, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 8, ISBN: 978-1-84102-293-2, pp127-136, 2011
Can be ordered on-line.
More details | Download PDF

Web-based Risk Analysis Tool for Home Users
Jain M, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp151-158, 2010
Can be ordered on-line.
More details | Download PDF

Information Leakage through Second Hand USB Flash Drives
Chaerani W, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp143-150, 2010
Can be ordered on-line.
More details | Download PDF

Usability of Security Mechanism
Ofomata J, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp59-68, 2010
Can be ordered on-line.
More details | Download PDF

Design and Development of Hard Disk Images for use in Computer Forensics
Siddiqui S, Clarke NL
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp234-242, 2009
Can be ordered on-line.
More details | Download PDF

Comparative Study and Evaluation of Six Face Recognition Algorithms with a View of their Application on Mobile Phones
Mahmoud N, Clarke NL
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp212-225, 2009
Can be ordered on-line.
More details | Download PDF

School Children! A Security Aware Generation?
Littlejohns JWG, Clarke NL
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp206-211, 2009
Can be ordered on-line.
More details | Download PDF

Smartphone Deployment of Keystroke Analysis
Buchoux A, Clarke NL
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp190-197, 2009
Can be ordered on-line.
More details | Download PDF

Information Security Leakage: A Forensic Analysis of USB Storage Disks
Adam A, Clarke NL
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp171-178, 2009
Can be ordered on-line.
More details | Download PDF

Implementing Biometrics to Curb Examination Malpractices In Nigeria
Odejobi OA, Clarke NL
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp115-123, 2009
Can be ordered on-line.
More details | Download PDF

Information Security Awareness and Culture
Al-Shehri Y, Clarke NL
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp12-22, 2009
Can be ordered on-line.
More details | Download PDF

Customer Satisfaction Monitoring System in Higher Education
Shauchenka H, Bleimann U, Knoll M, Clarke NL
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp45-55, 2009
Can be ordered on-line.
More details | Download PDF

Response Mechanisms for Intrusion Response Systems (IRSs)
Anuar NB, Furnell SM, Papadaki M, Clarke NL
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp3-14, 2009
Can be ordered on-line.
More details | Download PDF

Novel Single Sign On Architecture Based on the Subscriber Identity Module for Web Services
Stienne DS, Clarke NL, Reynolds PL
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp152-161, 2008
Can be ordered on-line.
More details | Download PDF

A Generic Information Security Framework for Mobile Systems
Sharma A, Clarke NL
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp78-88, 2008
Can be ordered on-line.
More details | Download PDF

Analysis and Evaluation of IDS Alerts on a Corporate Network
Rousseau C, Clarke NL, Ghita BV
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp68-77, 2008
Can be ordered on-line.
More details | Download PDF

Public Opinion Towards RFID Technology
Li F, Clarke NL
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp29-38, 2008
Can be ordered on-line.
More details | Download PDF

Mobile Devices- Personal or Corporate: Providing a Mechanism for Security
Eyetan GG, Clarke NL
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp20-28, 2008
Can be ordered on-line.
More details | Download PDF

Mobile Devices Personal or Corporate providing a Mechanism for Security
Chaudhury D, Clarke NL
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp3-10, 2008
Can be ordered on-line.
More details | Download PDF

Quantitative Analysis of Educational Services for Innovative Marketing in Higher Education
Shauchenka H, Bleimann U, Knoll M, Clarke NL
Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008), Wrexham, UK, ISBN: 978-1-84102-196-6, pp35-45, 2008
Can be ordered on-line.
More details | Download PDF

Intrusion Detection System for Mobile Devices: Preliminary Investigation
Li F, Clarke NL, Papadaki M
Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008), Wrexham, UK, ISBN: 978-1-84102-196-6, pp21-31, 2008
Can be ordered on-line.
More details | Download PDF

Keystroke analysis as an authentication method for thumb-based keyboards on mobile handsets
Karatzouni S, Clarke NL
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp213-221, 2007
Can be ordered on-line.
More details | Download PDF

Intrusion Detection System for mobile devices
Michalopoulos DS, Clarke NL
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp205-212, 2007
Can be ordered on-line.
More details | Download PDF

Web-Based Risk Analysis and Education for Home Users
Marston J, Clarke NL
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp89-99, 2007
Can be ordered on-line.
More details | Download PDF

The Awareness and Perception of Spyware amongst Home PC Computer Users
Jaeger M, Clarke NL
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp60-71, 2007
Can be ordered on-line.
More details | Download PDF

Device versus network-centric authentication models for mobile devices – operational and perceptual trade-offs
Karatzouni S, Clarke NL, Furnell SM
Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007), Plymouth, UK, ISBN: 978-1-8410-2173-7, pp23-39, 2007
Can be ordered on-line.
More details | Download PDF

Mobile Devices - Future Security Threats & Vulnerabilities
Sklikas V, Clarke NL
Advances in Network & Communication Engineering 3, pp100-108, 2006
Can be ordered on-line.
More details | Download PDF

Biometrics for Mobile Devices: A Comparison of Performance and Pattern Classification Approaches
Krishnasamy M, Clarke NL
Advances in Network & Communication Engineering 3, pp57-66, 2006
Can be ordered on-line.
More details | Download PDF

Security policies for small and medium enterprises
Kanellos A, Dimopoulos V, Clarke NL
Advances in Network & Communication Engineering 3, pp20-29, 2006
Can be ordered on-line.
More details | Download PDF

User Authentication by Service Utilisation Profiling
Aupy A, Clarke NL
Advances in Network & Communication Engineering 2, pp18-26, 2005
More details

Reliability of Commercial Biometric Authentication Solutions
Mustiere C, Clarke NL
Advances in Network & Communication Engineering 2, pp11-17, 2005
More details

Artificial Impostor Profiling for Keystroke Analysis on a Mobile Handset
Lecomte J, Clarke NL, Furnell SM
Advances in Network & Communication Engineering, pp55-62, 2004
More details | Download PDF

39 Internal publications

216 publication(s) - all categories.