Nathan Clarke
Nathan Clarke
Professor of Cyber Security & Digital Forensics, University of Plymouth
Verified email at - Homepage
Cited by
Cited by
Authenticating mobile phone users using keystroke analysis
NL Clarke, SM Furnell
International journal of information security 6 (1), 1-14, 2007
Authentication of users on mobile telephones–A survey of attitudes and practices
NL Clarke, SM Furnell
Computers & Security 24 (7), 519-527, 2005
Advanced user authentication for mobile devices
NL Clarke, SM Furnell
computers & security 26 (2), 109-119, 2007
Power to the people? The evolving recognition of human aspects of security
S Furnell, N Clarke
computers & security 31 (8), 983-988, 2012
From desktop to mobile: Examining the security experience
RA Botha, SM Furnell, NL Clarke
Computers & Security 28 (3-4), 130-137, 2009
An analysis of information security awareness within home and work environments
S Talib, NL Clarke, SM Furnell
2010 International Conference on Availability, Reliability and Security, 196-203, 2010
Continuous user authentication using multi-modal biometrics
H Saevanee, N Clarke, S Furnell, V Biscione
Computers & Security 53, 234-246, 2015
Beyond the pin: Enhancing user authentication for mobile devices
S Furnell, N Clarke, S Karatzouni
Computer fraud & security 2008 (8), 12-17, 2008
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
GC Tjhai, SM Furnell, M Papadaki, NL Clarke
Computers & Security 29 (6), 712-723, 2010
Deployment of keystroke analysis on a smartphone
A Buchoux, NL Clarke
Security Research Centre, School of Computer and Security Science, Edith …, 2008
Active authentication for mobile devices utilising behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International journal of information security 13 (3), 229-244, 2014
An agent based business aware incident detection system for cloud environments
F Doelitzscher, C Reich, M Knahl, A Passfall, N Clarke
Journal of Cloud Computing: Advances, Systems and Applications 1 (1), 1-19, 2012
Acceptance of subscriber authentication methods for mobile telephony devices
NL Clarke, SM Furnell, PM Rodwell, PL Reynolds
Computers & Security 21 (3), 220-228, 2002
Multi-modal behavioural biometric authentication for mobile devices
H Saevanee, NL Clarke, SM Furnell
IFIP International Information Security Conference, 465-474, 2012
Transparent user authentication: biometrics, RFID and behavioural profiling
N Clarke
Springer Science & Business Media, 2011
Flexible and transparent user authentication for mobile devices
N Clarke, S Karatzouni, S Furnell
IFIP International Information Security Conference, 1-12, 2009
Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions
M Al Fahdi, NL Clarke, SM Furnell
2013 Information Security for South Africa, 1-8, 2013
Investigating the problem of IDS false alarms: An experimental study using Snort
GC Tjhai, M Papadaki, SM Furnell, NL Clarke
IFIP International Information Security Conference, 253-267, 2008
Keystroke analysis for thumb-based keyboards on mobile devices
S Karatzouni, N Clarke
IFIP International Information Security Conference, 253-263, 2007
The system can't perform the operation now. Try again later.
Articles 1–20