Follow
Paul Haskell-Dowland
Paul Haskell-Dowland
Verified email at ecu.edu.au - Homepage
Title
Cited by
Cited by
Year
Authentication and supervision: A survey of user attitudes
SM Furnell, PS Dowland, HM Illingworth, PL Reynolds
Computers & Security 19 (6), 529-539, 2000
1652000
A prototype tool for information security awareness and training
SM Furnell, M Gennatou, PS Dowland
Logistics Information Management 15 (5/6), 352-357, 2002
1432002
A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies
PS Dowland, SM Furnell
IFIP International Information Security Conference, 275-289, 2004
1022004
Active authentication for mobile devices utilising behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International journal of information security 13 (3), 229-244, 2014
992014
Keystroke analysis as a method of advanced user authentication and response
PS Dowland, SM Furnell, M Papadaki
Security in the Information Society, 215-226, 2002
782002
Computer crime and abuse: A survey of public attitudes and awareness
PS Dowland, SM Furnell, HM Illingworth, PL Reynolds
Computers & Security 18 (8), 715-726, 1999
661999
Behaviour profiling for transparent authentication for mobile devices
F Li, N Clarke, M Papadaki, P Dowland
Academic Publishing Ltd, UK, 2011
602011
Behaviour profiling on mobile devices
F Li, N Clarke, M Papadaki, P Dowland
2010 International conference on emerging security technologies, 77-82, 2010
582010
A preliminary investigation of user authentication using continuous keystroke analysis
P Dowland
Proc IFIP Annual Working Conf on Information Security Management and Small …, 2001
582001
IoT threat detection advances, challenges and future directions
NM Karie, NM Sahri, P Haskell-Dowland
2020 workshop on emerging technologies for security in IoT (ETSecIoT), 22-29, 2020
512020
The impact of security and its antecedents in behaviour intention of using e-government services
N Alharbi, M Papadaki, P Dowland
Behaviour & Information Technology 36 (6), 620-636, 2017
492017
A long‐term trial of alternative user authentication technologies
SM Furnell, I Papadopoulos, P Dowland
Information Management & Computer Security, 2004
482004
An experimental comparison of secret‐based user authentication technologies
I Irakleous, SM Furnell, PS Dowland, M Papadaki
Information Management & Computer Security, 2002
422002
Promoting security awareness and training within small organisations
SM Furnell, M Gennatou, PS Dowland
Proceedings of the 1st Australian Information Security Management Workshop …, 2000
382000
Unobtrusive gait recognition using smartwatches
N Al-Naffakh, N Clarke, F Li, P Haskell-Dowland
2017 International Conference of the Biometrics Special Interest Group …, 2017
332017
A conceptual architecture for real‐time intrusion monitoring
SM Furnell, PS Dowland
Information Management & Computer Security, 2000
312000
Misuse detection for mobile devices using behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International Journal of Cyber Warfare and Terrorism (IJCWT) 1 (1), 41-53, 2011
292011
Using human computer interaction principles to promote usable security
D Katsabas, S Furnell, P Dowland
Proceedings of the Fifth International Network Conference (INC 2005), Samos …, 2005
242005
Assessing IT security culture: system administrator and end-user perspectives
J Finch, S Furnell, P Dowland
Proceedings of ISOneWorld 2003 conference and convention, Las Vegas, Nevada, USA, 2003
232003
PassImages: An alternative method of user authentication
D Charruau, PS Dowland, SM Furnell
Advances in Network and Communications Engineering 2, 3, 2005
222005
The system can't perform the operation now. Try again later.
Articles 1–20