Skip to main content

Research Repository

Advanced Search

All Outputs (19)

Pre-Signature Scheme for Trustworthy Offline V2V Communication (2023)
Conference Proceeding
Muller, T., Carpent, X., Furnell, S., Almani, D., & Yoshizawa, T. (2023). Pre-Signature Scheme for Trustworthy Offline V2V Communication.

Vehicle-to-Vehicle (V2V) communication systems hold great potential for enhancing road safety and traffic efficiency. The authenti-cation of such communication is crucial, particularly in scenarios where infrastructure is absent, while also ensuring... Read More about Pre-Signature Scheme for Trustworthy Offline V2V Communication.

Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing (2023)
Conference Proceeding
Abdi, H., Bagley, S. R., Furnell, S., & Twycross, J. (2023). Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing. In DocEng ’23 : Proceedings of the 2023 ACM Symposium on Document Engineering. https://doi.org/10.1145/3573128.3609348

Attribution provides valuable intelligence in the face of Advanced Persistent Threat (APT) attacks. By accurately identifying the culprits and actors behind the attacks, we can gain more insights into their motivations, capabilities, and potential fu... Read More about Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing.

Evaluation of Contextual and Game-Based Training for Phishing Detection (2022)
Journal Article
Kävrestad, J., Hagberg, A., Nohlberg, M., Rambusch, J., Roos, R., & Furnell, S. (2022). Evaluation of Contextual and Game-Based Training for Phishing Detection. Future Internet, 14(4), Article 104. https://doi.org/10.3390/fi14040104

Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typ... Read More about Evaluation of Contextual and Game-Based Training for Phishing Detection.

Accessible authentication: Assessing the applicability for users with disabilities (2021)
Journal Article
Furnell, S., Helkala, K., & Woods, N. (2022). Accessible authentication: Assessing the applicability for users with disabilities. Computers and Security, 113, Article 102561. https://doi.org/10.1016/j.cose.2021.102561

Access to the many benefits available from digital technology can often vary depending upon the capabilities and facilities of the individual who is attempting to engage with it. Many digital devices and services require us to be identified and so re... Read More about Accessible authentication: Assessing the applicability for users with disabilities.

Developing a cyber security culture: Current practices and future needs (2021)
Journal Article
Uchendu, B., Nurse, J. R., Bada, M., & Furnell, S. (2021). Developing a cyber security culture: Current practices and future needs. Computers and Security, 109, Article 102387. https://doi.org/10.1016/j.cose.2021.102387

While the creation of a strong security culture has been researched and discussed for decades, it continues to elude many businesses. Part of the challenge faced is distilling pertinent, recent academic findings and research into useful guidance. In... Read More about Developing a cyber security culture: Current practices and future needs.

An empirical analysis of the information security culture key factors framework (2021)
Journal Article
Tolah, A., Furnell, S. M., & Papadaki, M. (2021). An empirical analysis of the information security culture key factors framework. Computers and Security, 108, Article 102354. https://doi.org/10.1016/j.cose.2021.102354

Information security is a challenge facing organisations, as security breaches pose a serious threat to sensitive information. Organisations face security risks in relation to their information assets, which may also stem from their own employees. Or... Read More about An empirical analysis of the information security culture key factors framework.

Realising a Push Button Modality for Video-Based Forensics (2021)
Journal Article
Zawali, B., Ikuesan, R. A., Kebande, V. R., Furnell, S., & A-Dhaqm, A. (2021). Realising a Push Button Modality for Video-Based Forensics. Infrastructures, 6(4), Article 54. https://doi.org/10.3390/infrastructures6040054

Complexity and sophistication among multimedia-based tools have made it easy for perpetrators to conduct digital crimes such as counterfeiting, modification, and alteration without being detected. It may not be easy to verify the integrity of video c... Read More about Realising a Push Button Modality for Video-Based Forensics.

Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities (2021)
Journal Article
Li, W., Meng, W., & Furnell, S. (2021). Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities. Pattern Recognition Letters, 144, 35-41. https://doi.org/10.1016/j.patrec.2021.01.019

© 2021 Elsevier B.V. The Internet of Things (IoT) allows various embedded devices and smart sensors to be connected with each other, which provides a basis for building smart cities. The IoT-enabled smart city can greatly benefit people's daily lives... Read More about Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities.

Understanding cybersecurity behavioral habits: Insights from situational support (2021)
Journal Article
Hong, Y., & Furnell, S. (2021). Understanding cybersecurity behavioral habits: Insights from situational support. Journal of Information Security and Applications, 57, Article 102710. https://doi.org/10.1016/j.jisa.2020.102710

© 2020 While the Internet has become an indispensable aspect of personal and professional lives, it has also served to render many individuals vulnerable to cybersecurity threats. Thus, the promotion of cybersecurity behaviors can effectively protect... Read More about Understanding cybersecurity behavioral habits: Insights from situational support.

Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic (2020)
Journal Article
Zaki, F., Gani, A., Tahaei, H., Furnell, S., & Anuar, N. B. (2021). Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic. Computer Networks, 184, Article 107617. https://doi.org/10.1016/j.comnet.2020.107617

© 2020 Modern network traffic classification puts much attention toward producing a granular classification of the traffic, such as at the application service level. However, the classification process is often impaired by the lack of granular networ... Read More about Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic.

Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks (2018)
Journal Article
Meng, W., Choo, K. K. R., Furnell, S., Vasilakos, A. V., & Probst, C. W. (2018). Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks. IEEE Transactions on Network and Service Management, 15(2), 761-773. https://doi.org/10.1109/TNSM.2018.2815280

© 2004-2012 IEEE. The medical industry is increasingly digitalized and Internet-connected (e.g., Internet of Medical Things), and when deployed in an Internet of Medical Things environment, software-defined networks (SDNs) allow the decoupling of net... Read More about Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.

Enhancing security behaviour by supporting the user (2018)
Journal Article
Furnell, S., Khern-am-nuai, W., Esmael, R., Yang, W., & Li, N. (2018). Enhancing security behaviour by supporting the user. Computers and Security, 75, 1-9. https://doi.org/10.1016/j.cose.2018.01.016

© 2018 Elsevier Ltd Although the role of users in maintaining security is regularly emphasised, this is often not matched by an accompanying level of support. Indeed, users are frequently given insufficient guidance to enable effective security choic... Read More about Enhancing security behaviour by supporting the user.

A novel privacy preserving user identification approach for network traffic (2017)
Journal Article
Clarke, N., Li, F., & Furnell, S. (2017). A novel privacy preserving user identification approach for network traffic. Computers and Security, 70, 335-350. https://doi.org/10.1016/j.cose.2017.06.012

© 2017 The Author(s) The prevalence of the Internet and cloud-based applications, alongside the technological evolution of smartphones, tablets and smartwatches, has resulted in users relying upon network connectivity more than ever before. This resu... Read More about A novel privacy preserving user identification approach for network traffic.

AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection (2016)
Journal Article
Feizollah, A., Anuar, N. B., Salleh, R., Suarez-Tangil, G., & Furnell, S. (2017). AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection. Computers and Security, 65, 121-134. https://doi.org/10.1016/j.cose.2016.11.007

© 2016 Elsevier Ltd The wide popularity of Android systems has been accompanied by increase in the number of malware targeting these systems. This is largely due to the open nature of the Android framework that facilitates the incorporation of third-... Read More about AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection.

A suspect-oriented intelligent and automated computer forensic analysis (2016)
Journal Article
Al Fahdi, M., Clarke, N. L., Li, F., & Furnell, S. M. (2016). A suspect-oriented intelligent and automated computer forensic analysis. Digital Investigation, 18, 65-76. https://doi.org/10.1016/j.diin.2016.08.001

© 2016 Elsevier Ltd Computer forensics faces a range of challenges due to the widespread use of computing technologies. Examples include the increasing volume of data and devices that need to be analysed in any single case, differing platforms, use o... Read More about A suspect-oriented intelligent and automated computer forensic analysis.

Information security policy compliance model in organizations (2015)
Journal Article
Sohrabi Safa, N., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers and Security, 56, 70-82. https://doi.org/10.1016/j.cose.2015.10.006

© 2015 Elsevier Ltd. All rights reserved. The Internet and information technology have influenced human life significantly. However, information security is still an important concern for both users and organizations. Technology cannot solely guarant... Read More about Information security policy compliance model in organizations.

Continuous user authentication using multi-modal biometrics (2015)
Journal Article
Saevanee, H., Clarke, N., Furnell, S., & Biscione, V. (2015). Continuous user authentication using multi-modal biometrics. Computers and Security, 53, 234-246. https://doi.org/10.1016/j.cose.2015.06.001

© 2015 Elsevier Ltd. As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security - particularly authentication. With the widely documented poor use of PINs, Active Authentication is... Read More about Continuous user authentication using multi-modal biometrics.

Surveying the development of biometric user authentication on mobile phones (2014)
Journal Article
Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on mobile phones. Communications Surveys and Tutorials, IEEE Communications Society, 17(3), 1268-1293. https://doi.org/10.1109/COMST.2014.2386915

© 1998-2012 IEEE. Designing reliable user authentication on mobile phones is becoming an increasingly important task to protect users' private information and data. Since biometric approaches can provide many advantages over the traditional authentic... Read More about Surveying the development of biometric user authentication on mobile phones.

A response selection model for intrusion response systems: Response Strategy Model (RSM) (2013)
Journal Article
Anuar, N. B., Papadaki, M., Furnell, S., & Clarke, N. (2014). A response selection model for intrusion response systems: Response Strategy Model (RSM). Security and Communication Networks, 7(11), 1831-1848. https://doi.org/10.1002/sec.896

© 2013 John Wiley & Sons, Ltd. Intrusion response systems aim to provide a systematic procedure to respond to incidents. However, with different type of response options, an automatic response system is designed to select appropriate response optio... Read More about A response selection model for intrusion response systems: Response Strategy Model (RSM).