Follow
Fudong Li
Fudong Li
Senior Lecturer in Cyber Security, Bournemouth University, UK
Verified email at bournemouth.ac.uk
Title
Cited by
Cited by
Year
Active authentication for mobile devices utilising behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International journal of information security 13 (3), 229-244, 2014
1142014
Identifying and Predicting the Factors Affecting End-Users’ Risk-Taking Behavior
M Alohali1, N Clarke, F Li, S Furnell
Information & Computer Security, 00-00, 2018
792018
Behaviour profiling for transparent authentication for mobile devices
F Li, N Clarke, M Papadaki, P Dowland
Proceedings of the 10th European Conference on Information Warfare (ECIW …, 2011
632011
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data
H Mohammed, N Clarke, F Li
The Journal of Digital Forensics, Security and Law: JDFSL 11 (2), 137, 2016
602016
Behaviour Profiling for Mobile Devices
F Li
University of Plymouth, 2012
602012
Behaviour profiling on mobile devices
F Li, N Clarke, M Papadaki, P Dowland
Emerging Security Technologies (EST), 2010 International Conference on, 77-82, 2010
602010
A suspect-oriented intelligent and automated computer forensic analysis
M Al Fahdi, NL Clarke, F Li, SM Furnell
Digital Investigation 18, 65-76, 2016
422016
Unobtrusive Gait Recognition using Smartwatches
N Al-Naffakh, N Clarke, F Li, P Haskell-Dowland
382017
Real-world smartphone-based gait recognition
H Alobaidi, N Clarke, F Li
Computers & Security, 102557, 2021
362021
A novel privacy preserving user identification approach for network traffic
N Clarke, F Li, S Furnell
Computers & Security, 2017
352017
Misuse detection for mobile devices using behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International Journal of Cyber Warfare and Terrorism (IJCWT) 1 (1), 41-53, 2011
312011
Continuous User Authentication Using Smartwatch Motion Sensor Data
N Al-Naffakh, N Clarke, F Li
IFIP International Conference on Trust Management, 15-28, 2018
282018
Activity Recognition using wearable computing
N Al-Naffakh, N Clarke, P Dowland, F Li
Internet Technology and Secured Transactions (ICITST), 2016 11th …, 2016
252016
Smart watch based body-temperature authentication
TS Enamamu, N Clarke, P Haskell-Dowland, F Li
Computing Networking and Informatics (ICCNI), 2017 International Conference …, 2017
242017
User profiling from network traffic via novel application-level interactions
G Alotibi, N Clarke, F Li, S Furnell
Internet Technology and Secured Transactions (ICITST), 2016 11th …, 2016
172016
Physical activity recognition by utilising smartphone sensor signals
A Alruban, H Alobaidi, N Clarke, F Li
8th International Conference on Pattern Recognition Applications and Methods …, 2019
162019
Behavioral-Based Feature Abstraction from Network Traffic
G Alotibi, F Li, N Clarke, S Furnell
Iccws 2015-The Proceedings of the 10th International Conference on Cyber …, 2015
152015
Multi-Platform Authorship Verification
A Altamimi, N Clarke, S Furnell, F Li
Proceedings of the Third Central European Cybersecurity Conference, 13, 2019
132019
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements
A Da Veiga, R Vorster, F Li, N Clarke, SM Furnell
Information and Computer Security, 2019
132019
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing
M Clasen, F Li, D Williams
International Symposium on Human Aspects of Information Security and …, 2021
112021
The system can't perform the operation now. Try again later.
Articles 1–20