Skip to main content

Research Repository

Advanced Search

All Outputs (45)

A suspect-oriented intelligent and automated computer forensic analysis (2016)
Journal Article
Al Fahdi, M., Clarke, N. L., Li, F., & Furnell, S. M. (2016). A suspect-oriented intelligent and automated computer forensic analysis. Digital Investigation, 18, 65-76. https://doi.org/10.1016/j.diin.2016.08.001

© 2016 Elsevier Ltd Computer forensics faces a range of challenges due to the widespread use of computing technologies. Examples include the increasing volume of data and devices that need to be analysed in any single case, differing platforms, use o... Read More about A suspect-oriented intelligent and automated computer forensic analysis.

Information security policy compliance model in organizations (2015)
Journal Article
Sohrabi Safa, N., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers and Security, 56, 70-82. https://doi.org/10.1016/j.cose.2015.10.006

© 2015 Elsevier Ltd. All rights reserved. The Internet and information technology have influenced human life significantly. However, information security is still an important concern for both users and organizations. Technology cannot solely guarant... Read More about Information security policy compliance model in organizations.

Continuous user authentication using multi-modal biometrics (2015)
Journal Article
Saevanee, H., Clarke, N., Furnell, S., & Biscione, V. (2015). Continuous user authentication using multi-modal biometrics. Computers and Security, 53, 234-246. https://doi.org/10.1016/j.cose.2015.06.001

© 2015 Elsevier Ltd. As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security - particularly authentication. With the widely documented poor use of PINs, Active Authentication is... Read More about Continuous user authentication using multi-modal biometrics.

Surveying the development of biometric user authentication on mobile phones (2014)
Journal Article
Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on mobile phones. Communications Surveys and Tutorials, IEEE Communications Society, 17(3), 1268-1293. https://doi.org/10.1109/COMST.2014.2386915

© 1998-2012 IEEE. Designing reliable user authentication on mobile phones is becoming an increasingly important task to protect users' private information and data. Since biometric approaches can provide many advantages over the traditional authentic... Read More about Surveying the development of biometric user authentication on mobile phones.

A response selection model for intrusion response systems: Response Strategy Model (RSM) (2013)
Journal Article
Anuar, N. B., Papadaki, M., Furnell, S., & Clarke, N. (2014). A response selection model for intrusion response systems: Response Strategy Model (RSM). Security and Communication Networks, 7(11), 1831-1848. https://doi.org/10.1002/sec.896

© 2013 John Wiley & Sons, Ltd. Intrusion response systems aim to provide a systematic procedure to respond to incidents. However, with different type of response options, an automatic response system is designed to select appropriate response optio... Read More about A response selection model for intrusion response systems: Response Strategy Model (RSM).