Прати
Paul Haskell-Dowland
Paul Haskell-Dowland
Верификована је имејл адреса на ecu.edu.au - Почетна страница
Наслов
Навело
Навело
Година
Authentication and supervision: A survey of user attitudes
SM Furnell, PS Dowland, HM Illingworth, PL Reynolds
Computers & Security 19 (6), 529-539, 2000
1722000
A prototype tool for information security awareness and training
SM Furnell, M Gennatou, PS Dowland
Logistics Information Management 15 (5/6), 352-357, 2002
1632002
IoT threat detection advances, challenges and future directions
NM Karie, NM Sahri, P Haskell-Dowland
2020 workshop on emerging technologies for security in IoT (ETSecIoT), 22-29, 2020
1212020
Active authentication for mobile devices utilising behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International journal of information security 13, 229-244, 2014
1182014
A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies
PS Dowland, SM Furnell
IFIP International Information Security Conference, 275-289, 2004
1152004
The impact of security and its antecedents in behaviour intention of using e-government services
N Alharbi, M Papadaki, P Dowland
Behaviour & Information Technology 36 (6), 620-636, 2017
1062017
Keystroke analysis as a method of advanced user authentication and response
PS Dowland, SM Furnell, M Papadaki
Security in the Information Society: Visions and Perspectives, 215-226, 2002
782002
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things
M Ahmed, S Byreddy, A Nutakki, LF Sikos, P Haskell-Dowland
Ad Hoc Networks 122, 102621, 2021
742021
Computer crime and abuse: A survey of public attitudes and awareness
PS Dowland, SM Furnell, HM Illingworth, PL Reynolds
Computers & Security 18 (8), 715-726, 1999
731999
Behaviour profiling for transparent authentication for mobile devices
F Li, N Clarke, M Papadaki, P Dowland
Academic Publishing Ltd, UK, 2011
622011
A preliminary investigation of user authentication using continuous keystroke analysis
P Dowland
Proc IFIP Annual Working Conf on Information Security Management and Small …, 2001
592001
No soldiers left behind: an IoT-based low-power military mobile health system design
JJ Kang, W Yang, G Dermody, M Ghasemian, S Adibi, P Haskell-Dowland
IEEE access 8, 201498-201515, 2020
572020
Behaviour profiling on mobile devices
F Li, N Clarke, M Papadaki, P Dowland
2010 International conference on emerging security technologies, 77-82, 2010
522010
A long‐term trial of alternative user authentication technologies
SM Furnell, I Papadopoulos, P Dowland
Information Management & Computer Security 12 (2), 178-190, 2004
502004
An experimental comparison of secret‐based user authentication technologies
I Irakleous, SM Furnell, PS Dowland, M Papadaki
Information Management & Computer Security 10 (3), 100-108, 2002
432002
Hybrid routing for Man-in-the-Middle (MITM) attack detection in IoT networks
JJ Kang, K Fahd, S Venkatraman, R Trujillo-Rasua, P Haskell-Dowland
2019 29th International Telecommunication Networks and Applications …, 2019
422019
Unobtrusive gait recognition using smartwatches
N Al-Naffakh, N Clarke, F Li, P Haskell-Dowland
2017 International Conference of the Biometrics Special Interest Group …, 2017
412017
Promoting security awareness and training within small organisations
SM Furnell, M Gennatou, PS Dowland
Proceedings of the 1st Australian Information Security Management Workshop …, 2000
382000
Anomaly detection in cybersecurity datasets via cooperative co-evolution-based feature selection
ANMB Rashid, M Ahmed, LF Sikos, P Haskell-Dowland
ACM Transactions on Management Information Systems (TMIS) 13 (3), 1-39, 2022
362022
A conceptual architecture for real‐time intrusion monitoring
SM Furnell, PS Dowland
Information Management & Computer Security 8 (2), 65-75, 2000
322000
Систем тренутно не може да изврши ову радњу. Пробајте поново касније.
Чланци 1–20