关注
Paul Haskell-Dowland
Paul Haskell-Dowland
在 ecu.edu.au 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Authentication and supervision: A survey of user attitudes
SM Furnell, PS Dowland, HM Illingworth, PL Reynolds
Computers & Security 19 (6), 529-539, 2000
1692000
A prototype tool for information security awareness and training
SM Furnell, M Gennatou, PS Dowland
Logistics Information Management 15 (5/6), 352-357, 2002
1592002
Active authentication for mobile devices utilising behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International journal of information security 13, 229-244, 2014
1122014
A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies
PS Dowland, SM Furnell
Security and Protection in Information Processing Systems: IFIP 18 th World …, 2004
1102004
IoT threat detection advances, challenges and future directions
NM Karie, NM Sahri, P Haskell-Dowland
2020 workshop on emerging technologies for security in IoT (ETSecIoT), 22-29, 2020
1022020
The impact of security and its antecedents in behaviour intention of using e-government services
N Alharbi, M Papadaki, P Dowland
Behaviour & Information Technology 36 (6), 620-636, 2017
882017
Keystroke analysis as a method of advanced user authentication and response
PS Dowland, SM Furnell, M Papadaki
Security in the Information Society: Visions and Perspectives, 215-226, 2002
772002
Computer crime and abuse: A survey of public attitudes and awareness
PS Dowland, SM Furnell, HM Illingworth, PL Reynolds
Computers & Security 18 (8), 715-726, 1999
711999
Behaviour profiling for transparent authentication for mobile devices
F Li, N Clarke, M Papadaki, P Dowland
Academic Publishing Ltd, UK, 2011
632011
Behaviour profiling on mobile devices
F Li, N Clarke, M Papadaki, P Dowland
2010 International conference on emerging security technologies, 77-82, 2010
592010
A preliminary investigation of user authentication using continuous keystroke analysis
P Dowland
Proc IFIP Annual Working Conf on Information Security Management and Small …, 2001
582001
A long‐term trial of alternative user authentication technologies
SM Furnell, I Papadopoulos, P Dowland
Information Management & Computer Security 12 (2), 178-190, 2004
482004
No soldiers left behind: an IoT-based low-power military mobile health system design
JJ Kang, W Yang, G Dermody, M Ghasemian, S Adibi, P Haskell-Dowland
IEEE access 8, 201498-201515, 2020
462020
An experimental comparison of secret‐based user authentication technologies
I Irakleous, SM Furnell, PS Dowland, M Papadaki
Information Management & Computer Security 10 (3), 100-108, 2002
432002
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things
M Ahmed, S Byreddy, A Nutakki, LF Sikos, P Haskell-Dowland
Ad Hoc Networks 122, 102621, 2021
412021
Promoting security awareness and training within small organisations
SM Furnell, M Gennatou, PS Dowland
Proceedings of the 1st Australian Information Security Management Workshop …, 2000
382000
Unobtrusive gait recognition using smartwatches
N Al-Naffakh, N Clarke, F Li, P Haskell-Dowland
2017 International Conference of the Biometrics Special Interest Group …, 2017
372017
Hybrid routing for Man-in-the-Middle (MITM) attack detection in IoT networks
JJ Kang, K Fahd, S Venkatraman, R Trujillo-Rasua, P Haskell-Dowland
2019 29th International Telecommunication Networks and Applications …, 2019
352019
Misuse detection for mobile devices using behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International Journal of Cyber Warfare and Terrorism (IJCWT) 1 (1), 41-53, 2011
312011
A conceptual architecture for real‐time intrusion monitoring
SM Furnell, PS Dowland
Information Management & Computer Security 8 (2), 65-75, 2000
312000
系统目前无法执行此操作,请稍后再试。
文章 1–20