Nathan Clarke
Nathan Clarke
Professor of Cyber Security & Digital Forensics, University of Plymouth
Verified email at - Homepage
Cited by
Cited by
Authenticating mobile phone users using keystroke analysis
NL Clarke, SM Furnell
International journal of information security 6 (1), 1-14, 2007
Authentication of users on mobile telephones–A survey of attitudes and practices
NL Clarke, SM Furnell
Computers & Security 24 (7), 519-527, 2005
Advanced user authentication for mobile devices
NL Clarke, SM Furnell
computers & security 26 (2), 109-119, 2007
Power to the people? The evolving recognition of human aspects of security
S Furnell, N Clarke
computers & security 31 (8), 983-988, 2012
From desktop to mobile: Examining the security experience
RA Botha, SM Furnell, NL Clarke
Computers & Security 28 (3-4), 130-137, 2009
An analysis of information security awareness within home and work environments
S Talib, NL Clarke, SM Furnell
2010 International Conference on Availability, Reliability and Security, 196-203, 2010
Continuous user authentication using multi-modal biometrics
H Saevanee, N Clarke, S Furnell, V Biscione
Computers & Security 53, 234-246, 2015
Beyond the pin: Enhancing user authentication for mobile devices
S Furnell, N Clarke, S Karatzouni
Computer fraud & security 2008 (8), 12-17, 2008
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
GC Tjhai, SM Furnell, M Papadaki, NL Clarke
Computers & Security 29 (6), 712-723, 2010
Active authentication for mobile devices utilising behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International journal of information security 13 (3), 229-244, 2014
Deployment of keystroke analysis on a smartphone
A Buchoux, NL Clarke
Security Research Centre, School of Computer and Security Science, Edith …, 2008
Acceptance of subscriber authentication methods for mobile telephony devices
NL Clarke, SM Furnell, PM Rodwell, PL Reynolds
Computers & Security 21 (3), 220-228, 2002
An agent based business aware incident detection system for cloud environments
F Doelitzscher, C Reich, M Knahl, A Passfall, N Clarke
Journal of Cloud Computing: Advances, Systems and Applications 1 (1), 1-19, 2012
Transparent user authentication: biometrics, RFID and behavioural profiling
N Clarke
Springer Science & Business Media, 2011
Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions
M Al Fahdi, NL Clarke, SM Furnell
2013 Information Security for South Africa, 1-8, 2013
Multi-modal behavioural biometric authentication for mobile devices
H Saevanee, NL Clarke, SM Furnell
IFIP International Information Security Conference, 465-474, 2012
Flexible and transparent user authentication for mobile devices
N Clarke, S Karatzouni, S Furnell
IFIP International Information Security Conference, 1-12, 2009
Investigating the problem of IDS false alarms: An experimental study using Snort
GC Tjhai, M Papadaki, SM Furnell, NL Clarke
IFIP International Information Security Conference, 253-267, 2008
Keystroke analysis for thumb-based keyboards on mobile devices
S Karatzouni, N Clarke
IFIP International Information Security Conference, 253-263, 2007
The system can't perform the operation now. Try again later.
Articles 1–20