Authentication and supervision: A survey of user attitudes SM Furnell, PS Dowland, HM Illingworth, PL Reynolds Computers & Security 19 (6), 529-539, 2000 | 169 | 2000 |
A prototype tool for information security awareness and training SM Furnell, M Gennatou, PS Dowland Logistics Information Management 15 (5/6), 352-357, 2002 | 159 | 2002 |
Active authentication for mobile devices utilising behaviour profiling F Li, N Clarke, M Papadaki, P Dowland International journal of information security 13, 229-244, 2014 | 112 | 2014 |
A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies PS Dowland, SM Furnell Security and Protection in Information Processing Systems: IFIP 18 th World …, 2004 | 110 | 2004 |
IoT threat detection advances, challenges and future directions NM Karie, NM Sahri, P Haskell-Dowland 2020 workshop on emerging technologies for security in IoT (ETSecIoT), 22-29, 2020 | 102 | 2020 |
The impact of security and its antecedents in behaviour intention of using e-government services N Alharbi, M Papadaki, P Dowland Behaviour & Information Technology 36 (6), 620-636, 2017 | 88 | 2017 |
Keystroke analysis as a method of advanced user authentication and response PS Dowland, SM Furnell, M Papadaki Security in the Information Society: Visions and Perspectives, 215-226, 2002 | 77 | 2002 |
Computer crime and abuse: A survey of public attitudes and awareness PS Dowland, SM Furnell, HM Illingworth, PL Reynolds Computers & Security 18 (8), 715-726, 1999 | 71 | 1999 |
Behaviour profiling for transparent authentication for mobile devices F Li, N Clarke, M Papadaki, P Dowland Academic Publishing Ltd, UK, 2011 | 63 | 2011 |
Behaviour profiling on mobile devices F Li, N Clarke, M Papadaki, P Dowland 2010 International conference on emerging security technologies, 77-82, 2010 | 59 | 2010 |
A preliminary investigation of user authentication using continuous keystroke analysis P Dowland Proc IFIP Annual Working Conf on Information Security Management and Small …, 2001 | 58 | 2001 |
A long‐term trial of alternative user authentication technologies SM Furnell, I Papadopoulos, P Dowland Information Management & Computer Security 12 (2), 178-190, 2004 | 48 | 2004 |
No soldiers left behind: an IoT-based low-power military mobile health system design JJ Kang, W Yang, G Dermody, M Ghasemian, S Adibi, P Haskell-Dowland IEEE access 8, 201498-201515, 2020 | 46 | 2020 |
An experimental comparison of secret‐based user authentication technologies I Irakleous, SM Furnell, PS Dowland, M Papadaki Information Management & Computer Security 10 (3), 100-108, 2002 | 43 | 2002 |
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things M Ahmed, S Byreddy, A Nutakki, LF Sikos, P Haskell-Dowland Ad Hoc Networks 122, 102621, 2021 | 41 | 2021 |
Promoting security awareness and training within small organisations SM Furnell, M Gennatou, PS Dowland Proceedings of the 1st Australian Information Security Management Workshop …, 2000 | 38 | 2000 |
Unobtrusive gait recognition using smartwatches N Al-Naffakh, N Clarke, F Li, P Haskell-Dowland 2017 International Conference of the Biometrics Special Interest Group …, 2017 | 37 | 2017 |
Hybrid routing for Man-in-the-Middle (MITM) attack detection in IoT networks JJ Kang, K Fahd, S Venkatraman, R Trujillo-Rasua, P Haskell-Dowland 2019 29th International Telecommunication Networks and Applications …, 2019 | 35 | 2019 |
Misuse detection for mobile devices using behaviour profiling F Li, N Clarke, M Papadaki, P Dowland International Journal of Cyber Warfare and Terrorism (IJCWT) 1 (1), 41-53, 2011 | 31 | 2011 |
A conceptual architecture for real‐time intrusion monitoring SM Furnell, PS Dowland Information Management & Computer Security 8 (2), 65-75, 2000 | 31 | 2000 |