Nathan Clarke
Nathan Clarke
Professor of Cyber Security & Digital Forensics, University of Plymouth
Verified email at - Homepage
Cited by
Cited by
Authenticating mobile phone users using keystroke analysis
NL Clarke, SM Furnell
International journal of information security 6, 1-14, 2007
Authentication of users on mobile telephones–A survey of attitudes and practices
NL Clarke, SM Furnell
Computers & Security 24 (7), 519-527, 2005
Power to the people? The evolving recognition of human aspects of security
S Furnell, N Clarke
computers & security 31 (8), 983-988, 2012
Advanced user authentication for mobile devices
NL Clarke, SM Furnell
computers & security 26 (2), 109-119, 2007
An analysis of information security awareness within home and work environments
S Talib, NL Clarke, SM Furnell
2010 International Conference on Availability, Reliability and Security, 196-203, 2010
From desktop to mobile: Examining the security experience
RA Botha, SM Furnell, NL Clarke
Computers & Security 28 (3-4), 130-137, 2009
Continuous user authentication using multi-modal biometrics
H Saevanee, N Clarke, S Furnell, V Biscione
Computers & Security 53, 234-246, 2015
Beyond the pin: Enhancing user authentication for mobile devices
S Furnell, N Clarke, S Karatzouni
Computer fraud & security 2008 (8), 12-17, 2008
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
GC Tjhai, SM Furnell, M Papadaki, NL Clarke
Computers & Security 29 (6), 712-723, 2010
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
Active authentication for mobile devices utilising behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International journal of information security 13, 229-244, 2014
Deployment of keystroke analysis on a smartphone
A Buchoux, NL Clarke
Security Research Centre, School of Computer and Security Science, Edith …, 2008
Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions
M Al Fahdi, NL Clarke, SM Furnell
2013 Information Security for South Africa, 1-8, 2013
Acceptance of subscriber authentication methods for mobile telephony devices
NL Clarke, SM Furnell, PM Rodwell, PL Reynolds
Computers & Security 21 (3), 220-228, 2002
Multi-modal behavioural biometric authentication for mobile devices
H Saevanee, NL Clarke, SM Furnell
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
Transparent user authentication: biometrics, RFID and behavioural profiling
N Clarke
Springer Science & Business Media, 2011
An agent based business aware incident detection system for cloud environments
F Doelitzscher, C Reich, M Knahl, A Passfall, N Clarke
Journal of Cloud Computing: Advances, Systems and Applications 1, 1-19, 2012
Information security policies: A review of challenges and influencing factors
M Alotaibi, S Furnell, N Clarke
2016 11th International Conference for Internet Technology and Secured …, 2016
Investigating the problem of IDS false alarms: An experimental study using Snort
GC Tjhai, M Papadaki, SM Furnell, NL Clarke
Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008
Flexible and transparent user authentication for mobile devices
N Clarke, S Karatzouni, S Furnell
Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 …, 2009
The system can't perform the operation now. Try again later.
Articles 1–20