Остановите войну!
for scientists:
default search action
Nathan L. Clarke
- > Home > Persons > Nathan L. Clarke
Publications
- 2023
- [j42]Nathan L. Clarke, Steven Furnell:
Editorial: Human aspects of cyber security. Inf. Comput. Secur. 31(3): 265-266 (2023) - [e19]Steven Furnell, Nathan L. Clarke:
Human Aspects of Information Security and Assurance - 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023, Proceedings. IFIP Advances in Information and Communication Technology 674, Springer 2023, ISBN 978-3-031-38529-2 [contents] - 2022
- [e18]Nathan L. Clarke, Steven Furnell:
Human Aspects of Information Security and Assurance - 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, Proceedings. IFIP Advances in Information and Communication Technology 658, Springer 2022, ISBN 978-3-031-12171-5 [contents] - 2021
- [j39]Fayez Ghazai Alotaibi, Nathan Luke Clarke, Steven M. Furnell:
A novel approach for improving information security management and awareness for home environments. Inf. Comput. Secur. 29(1): 25-48 (2021) - [e17]Steven Furnell, Nathan L. Clarke:
Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings. IFIP Advances in Information and Communication Technology 613, Springer 2021, ISBN 978-3-030-81110-5 [contents] - 2020
- [j37]Adéle da Veiga, Ruthea Vorster, Fudong Li, Nathan L. Clarke, Steven M. Furnell:
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements. Inf. Comput. Secur. 28(3): 399-422 (2020) - [e16]Nathan L. Clarke, Steven Furnell:
Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings. IFIP Advances in Information and Communication Technology 593, Springer 2020, ISBN 978-3-030-57403-1 [contents] - 2019
- [j35]Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan L. Clarke:
A framework for reporting and dealing with end-user security policy compliance. Inf. Comput. Secur. 27(1): 2-25 (2019) - [c72]Manal Alohali, Nathan L. Clarke, Steven Furnell:
Information Security Risk Communication: A User-Centric Approach. AICCSA 2019: 1-10 - [c71]Abdulaziz Altamimi, Nathan L. Clarke, Steven Furnell, Fudong Li:
Multi-Platform Authorship Verification. CECC 2019: 13:1-13:7 - [c66]Fayez Alotaibi, Nathan Luke Clarke, Steven Furnell:
Holistic Information Security Management for Home Environments. HAISA 2019: 20-33 - [c64]Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, Nathan L. Clarke:
A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications. ICISSP 2019: 246-251 - [e15]Steven Furnell, Nathan L. Clarke:
Thirteenth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2019, Nicosia, Cyprus, July 15-16, 2019, Proceedings. University of Plymouth 2019, ISBN 978-0244-19096-5 [contents] - 2018
- [j33]Hiba Al-Kawaz, Nathan L. Clarke, Steven Furnell, Fudong Li:
Facial-Forensic Analysis Tool. Digit. Investig. 26 Supplement: S136 (2018) - [j31]Steven Furnell, Nathan L. Clarke:
Guest editorial. Inf. Comput. Secur. 26(3): 262-263 (2018) - [j30]Manal Alohali, Nathan L. Clarke, Fudong Li, Steven Furnell:
Identifying and predicting the factors affecting end-users' risk-taking behavior. Inf. Comput. Secur. 26(3): 306-326 (2018) - [j29]Saud Alotaibi, Steven Furnell, Nathan L. Clarke:
A novel transparent user authentication approach for mobile applications. Inf. Secur. J. A Glob. Perspect. 27(5-6): 292-305 (2018) - [c55]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Biometrically Linking Document Leakage to the Individuals Responsible. TrustBus 2018: 135-149 - [e14]Nathan L. Clarke, Steven Furnell:
Twelfth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2018, Dundee, Scotland, UK, August 29-31, 2018, Proceedings. University of Plymouth 2018, ISBN 978-0-244-40254-9 [contents] - 2017
- [j28]Nathan L. Clarke, Fudong Li, Steven Furnell:
A novel privacy preserving user identification approach for network traffic. Comput. Secur. 70: 335-350 (2017) - [c54]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Insider Misuse Attribution using Biometrics. ARES 2017: 42:1-42:7 - [c52]Manal Alohali, Nathan L. Clarke, Fudong Li, Steven Furnell:
Identifying the Factors Affecting End-Users’ Risk-Taking Behavior. HAISA 2017: 126-144 - [c51]Nathan L. Clarke, Fudong Li, Abdulrahman Alruban, Steven Furnell:
Insider Misuse Identification using Transparent Biometrics. HICSS 2017: 1-10 - [c50]Fayez Alotaibi, Nathan L. Clarke, Steven Furnell:
An analysis of home user security awareness & education. ICITST 2017: 116-122 - [c48]Shahlaa Mashhadani, Hiba Al-Kawaz, Nathan L. Clarke, Steven Furnell, Fudong Li:
A novel multimedia-forensic analysis tool (M-FAT). ICITST 2017: 388-395 - [e13]Steven Furnell, Nathan L. Clarke:
Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, Adelaide, Australia, November 28-30, 2017, Proceedings. University of Plymouth 2017, ISBN 978-1-84102-428-8 [contents] - 2016
- [j27]Saad Alqahtany, Nathan L. Clarke, Steven Furnell, Christoph Reich:
A forensic acquisition and analysis system for IaaS. Clust. Comput. 19(1): 439-453 (2016) - [j26]Abdulwahid Al Abdulwahid, Nathan L. Clarke, Ingo Stengel, Steven Furnell, Christoph Reich:
Continuous and transparent multimodal authentication: reviewing the state of the art. Clust. Comput. 19(1): 455-474 (2016) - [j25]M. Al Fahdi, Nathan L. Clarke, Fudong Li, Steven M. Furnell:
A suspect-oriented intelligent and automated computer forensic analysis. Digit. Investig. 18: 65-76 (2016) - [j24]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Leveraging Biometrics for Insider Misuse Identification. Int. J. Cyber Situational Aware. 1(1): 130-151 (2016) - [j23]Nathan Luke Clarke, Jane Symes, Hataichanok Saevanee, Steven M. Furnell:
Awareness of Mobile Device Security: A Survey of User's Attitudes. Int. J. Mob. Comput. Multim. Commun. 7(1): 15-31 (2016) - [j22]Steven Furnell, Nathan Luke Clarke:
Guest editorial. Inf. Comput. Secur. 24(2): 138 (2016) - [c47]Saad Alqahtany, Nathan L. Clarke, Steven Furnell, Christoph Reich:
A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment. ARES 2016: 345-354 - [c44]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Proactive biometric-enabled forensic imprinting. Cyber Security And Protection Of Digital Services 2016: 1-15 - [c41]Gaseb Alotibi, Nathan L. Clarke, Fudong Li, Steven Furnell:
User profiling from network traffic via novel application-level interactions. ICITST 2016: 279-285 - [c40]Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan L. Clarke:
Information security policies: A review of challenges and influencing factors. ICITST 2016: 352-358 - [e12]Nathan L. Clarke, Steven Furnell:
Tenth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. University of Plymouth 2016, ISBN 978-1-84102-413-4 [contents] - 2015
- [j20]Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell, Valerio Biscione:
Continuous user authentication using multi-modal biometrics. Comput. Secur. 53: 234-246 (2015) - [c38]Emad Sherif, Steven Furnell, Nathan L. Clarke:
An Identification of Variables Influencing the Establishment of Information Security Culture. HCI (22) 2015: 436-448 - [c37]Emad Sherif, Steven Furnell, Nathan L. Clarke:
Awareness, behaviour and culture: The ABC in cultivating security compliance. ICITST 2015: 90-94 - [c36]Saud Alotaibi, Steven Furnell, Nathan L. Clarke:
Transparent authentication systems for mobile device security: A review. ICITST 2015: 406-413 - [c35]Abdulwahid Al Abdulwahid, Nathan L. Clarke, Ingo Stengel, Steven Furnell, Christoph Reich:
Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes. TrustBus 2015: 153-168 - [e11]Steven Furnell, Nathan L. Clarke:
Ninth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2015 ,Lesvos, Greece, July 1-3, 2015, Proceedings. University of Plymouth 2015, ISBN 978-1-84102-388-5 [contents] - 2014
- [j17]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
A response selection model for intrusion response systems: Response Strategy Model (RSM). Secur. Commun. Networks 7(11): 1831-1848 (2014) - [c30]Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell, Valerio Biscione:
Text-Based Active Authentication for Mobile Devices. SEC 2014: 99-112 - [c29]Fudong Li, Nathan L. Clarke, Steven Furnell, Is-Haka Mkwawa:
Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks. WiMob 2014: 281-286 - [e10]Nathan L. Clarke, Steven Furnell:
Eighth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2014 ,Plymouth, UK, July 8-9, 2014. Proceedings. University of Plymouth 2014, ISBN 978-1-84102-375-5 [contents] - 2013
- [j16]Chris G. Hocking, Steven M. Furnell, Nathan L. Clarke, Paul L. Reynolds:
Co-operative user identity verification using an Authentication Aura. Comput. Secur. 39: 486-502 (2013) - [j15]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM). Secur. Commun. Networks 6(9): 1087-1116 (2013) - [c27]M. Al Fahdi, Nathan L. Clarke, Steven M. Furnell:
Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions. ISSA 2013: 1-8 - [c26]Fudong Li, Nathan L. Clarke, Steven Furnell:
A Technology Independent Security Gateway for Real-Time Multimedia Communication. NSS 2013: 14-25 - [e9]Steven Furnell, Nathan L. Clarke, Vasilios Katos:
European Information Security Multi-Conference (EISMC 2013), Lisbon, Portugal, May 8-10, 2013. Proceedings. Plymouth University 2013, ISBN 978-1-84102-345-8 [contents] - 2012
- [j14]Steven Furnell, Nathan L. Clarke:
Power to the people? The evolving recognition of human aspects of security. Comput. Secur. 31(8): 983-988 (2012) - [c23]Hataichanok Saevanee, Nathan L. Clarke, Steven M. Furnell:
Multi-modal Behavioural Biometric Authentication for Mobile Devices. SEC 2012: 465-474 - [c22]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
A Response Strategy Model for Intrusion Response Systems. SEC 2012: 573-578 - [c20]Nathan L. Clarke, Vasilios Katos, Sofia-Anna Menesidou, Bogdan V. Ghita, Steven Furnell:
A Novel Security Architecture for a Space-Data DTN. WWIC 2012: 342-349 - [e8]Nathan L. Clarke, Steven Furnell:
6th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2012, Crete, Greece, June 6-8, 2012. Proceedings. University of Plymouth 2012, ISBN 978-1-84102-317-5 [contents] - 2011
- [j10]Shuhaili Talib, Nathan L. Clarke, Steven Furnell:
Establishing A Personalized Information Security Culture. Int. J. Mob. Comput. Multim. Commun. 3(1): 63-79 (2011) - [c17]Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell:
SMS linguistic profiling authentication on mobile device. NSS 2011: 224-228 - [e6]Steven Furnell, Nathan L. Clarke:
5th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2011, London, UK, July 7-8, 2011. Proceedings. University of Plymouth 2011, ISBN 978-1-84102-284-0 [contents] - 2010
- [j9]Gina C. Tjhai, Steven Furnell, Maria Papadaki, Nathan L. Clarke:
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. Comput. Secur. 29(6): 712-723 (2010) - [c15]Shuhaili Talib, Nathan L. Clarke, Steven Furnell:
An Analysis of Information Security Awareness within Home and Work Environments. ARES 2010: 196-203 - [c14]Chris G. Hocking, Steven M. Furnell, Nathan L. Clarke, Paul L. Reynolds:
A distributed and cooperative user authentication framework. IAS 2010: 304-310 - [c11]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
An investigation and survey of response options for Intrusion Response Systems (IRSs). ISSA 2010 - [c10]Tarik Ibrahim, Steven Furnell, Maria Papadaki, Nathan L. Clarke:
Assessing the Usability of End-User Security Software. TrustBus 2010: 177-189 - [e4]Nathan L. Clarke, Steven Furnell, Rossouw von Solms:
South African Information Security Multi-Conference, SAISMC 2010, Port Elizabeth, South Africa, May 17-18, 2010. Proceedings. University of Plymouth 2010, ISBN 978-1-84102-256-7 [contents] - 2009
- [j8]Reinhardt A. Botha, Steven Furnell, Nathan L. Clarke:
From desktop to mobile: Examining the security experience. Comput. Secur. 28(3-4): 130-137 (2009) - [c9]Nathan L. Clarke, Sevasti Karatzouni, Steven Furnell:
Flexible and Transparent User Authentication for Mobile Devices. SEC 2009: 1-12 - [e3]Steven Furnell, Nathan L. Clarke:
3rd International Conference on Human Aspects of Information Security and Assurance, HAISA 2009, Athens, Greece, June 25-26, 2009. Proceedings. University of Plymouth 2009, ISBN 978-1-84102-231-4 [contents] - 2008
- [j7]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks 6(7): 1151-1167 (2008) - [c8]Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
Investigating the problem of IDS false alarms: An experimental study using Snort. SEC 2008: 253-267 - [c7]Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. TrustBus 2008: 139-150 - [e1]Nathan L. Clarke, Steven Furnell:
2nd International Conference on Human Aspects of Information Security and Assurance, HAISA 2008, Plymouth, UK, July 8-9, 2008. Proceedings. University of Plymouth 2008, ISBN 978-1-84102-189-8 [contents] - 2007
- [j6]Nathan L. Clarke, Steven Furnell:
Advanced user authentication for mobile devices. Comput. Secur. 26(2): 109-119 (2007) - [j5]Nathan L. Clarke, Steven Furnell:
Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Sec. 6(1): 1-14 (2007) - [c6]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. ADHOC-NOW 2007: 129-141 - 2006
- [c4]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. ISI 2006: 590-595 - 2005
- [j3]Nathan L. Clarke, Steven Furnell:
Authentication of users on mobile telephones - A survey of attitudes and practices. Comput. Secur. 24(7): 519-527 (2005) - 2003
- [j2]Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds:
Keystroke dynamics on a mobile handset: a feasibility study. Inf. Manag. Comput. Secur. 11(4): 161-166 (2003) - [c2]Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds:
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. SEC 2003: 97-108 - 2002
- [j1]Nathan L. Clarke, Steven Furnell, Philip M. Rodwell, Paul L. Reynolds:
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. Comput. Secur. 21(3): 220-228 (2002)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint