Follow
Paul Haskell-Dowland
Paul Haskell-Dowland
Verified email at ecu.edu.au - Homepage
Title
Cited by
Cited by
Year
Authentication and supervision: A survey of user attitudes
SM Furnell, PS Dowland, HM Illingworth, PL Reynolds
Computers & Security 19 (6), 529-539, 2000
1692000
A prototype tool for information security awareness and training
SM Furnell, M Gennatou, PS Dowland
Logistics Information Management 15 (5/6), 352-357, 2002
1602002
Active authentication for mobile devices utilising behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International journal of information security 13, 229-244, 2014
1132014
IoT threat detection advances, challenges and future directions
NM Karie, NM Sahri, P Haskell-Dowland
2020 workshop on emerging technologies for security in IoT (ETSecIoT), 22-29, 2020
1102020
A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies
PS Dowland, SM Furnell
Security and Protection in Information Processing Systems: IFIP 18 th World …, 2004
1102004
The impact of security and its antecedents in behaviour intention of using e-government services
N Alharbi, M Papadaki, P Dowland
Behaviour & Information Technology 36 (6), 620-636, 2017
1002017
Keystroke analysis as a method of advanced user authentication and response
PS Dowland, SM Furnell, M Papadaki
Security in the Information Society: Visions and Perspectives, 215-226, 2002
772002
Computer crime and abuse: A survey of public attitudes and awareness
PS Dowland, SM Furnell, HM Illingworth, PL Reynolds
Computers & Security 18 (8), 715-726, 1999
711999
Behaviour profiling for transparent authentication for mobile devices
F Li, N Clarke, M Papadaki, P Dowland
Academic Publishing Ltd, UK, 2011
632011
Behaviour profiling on mobile devices
F Li, N Clarke, M Papadaki, P Dowland
2010 International conference on emerging security technologies, 77-82, 2010
592010
A preliminary investigation of user authentication using continuous keystroke analysis
P Dowland
Proc IFIP Annual Working Conf on Information Security Management and Small …, 2001
582001
No soldiers left behind: an IoT-based low-power military mobile health system design
JJ Kang, W Yang, G Dermody, M Ghasemian, S Adibi, P Haskell-Dowland
IEEE access 8, 201498-201515, 2020
522020
A long‐term trial of alternative user authentication technologies
SM Furnell, I Papadopoulos, P Dowland
Information Management & Computer Security 12 (2), 178-190, 2004
482004
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things
M Ahmed, S Byreddy, A Nutakki, LF Sikos, P Haskell-Dowland
Ad Hoc Networks 122, 102621, 2021
472021
An experimental comparison of secret‐based user authentication technologies
I Irakleous, SM Furnell, PS Dowland, M Papadaki
Information Management & Computer Security 10 (3), 100-108, 2002
432002
Hybrid routing for Man-in-the-Middle (MITM) attack detection in IoT networks
JJ Kang, K Fahd, S Venkatraman, R Trujillo-Rasua, P Haskell-Dowland
2019 29th International Telecommunication Networks and Applications …, 2019
392019
Promoting security awareness and training within small organisations
SM Furnell, M Gennatou, PS Dowland
Proceedings of the 1st Australian Information Security Management Workshop …, 2000
382000
Unobtrusive gait recognition using smartwatches
N Al-Naffakh, N Clarke, F Li, P Haskell-Dowland
2017 International Conference of the Biometrics Special Interest Group …, 2017
372017
Anomaly detection in cybersecurity datasets via cooperative co-evolution-based feature selection
ANMB Rashid, M Ahmed, LF Sikos, P Haskell-Dowland
ACM Transactions on Management Information Systems (TMIS) 13 (3), 1-39, 2022
342022
Misuse detection for mobile devices using behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International Journal of Cyber Warfare and Terrorism (IJCWT) 1 (1), 41-53, 2011
312011
The system can't perform the operation now. Try again later.
Articles 1–20