Skip to main content

Research Repository

Advanced Search

All Outputs (9)

Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks (2018)
Journal Article
Meng, W., Choo, K. K. R., Furnell, S., Vasilakos, A. V., & Probst, C. W. (2018). Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks. IEEE Transactions on Network and Service Management, 15(2), 761-773. https://doi.org/10.1109/TNSM.2018.2815280

© 2004-2012 IEEE. The medical industry is increasingly digitalized and Internet-connected (e.g., Internet of Medical Things), and when deployed in an Internet of Medical Things environment, software-defined networks (SDNs) allow the decoupling of net... Read More about Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.

Enhancing security behaviour by supporting the user (2018)
Journal Article
Furnell, S., Khern-am-nuai, W., Esmael, R., Yang, W., & Li, N. (2018). Enhancing security behaviour by supporting the user. Computers and Security, 75, 1-9. https://doi.org/10.1016/j.cose.2018.01.016

© 2018 Elsevier Ltd Although the role of users in maintaining security is regularly emphasised, this is often not matched by an accompanying level of support. Indeed, users are frequently given insufficient guidance to enable effective security choic... Read More about Enhancing security behaviour by supporting the user.

A novel privacy preserving user identification approach for network traffic (2017)
Journal Article
Clarke, N., Li, F., & Furnell, S. (2017). A novel privacy preserving user identification approach for network traffic. Computers and Security, 70, 335-350. https://doi.org/10.1016/j.cose.2017.06.012

© 2017 The Author(s) The prevalence of the Internet and cloud-based applications, alongside the technological evolution of smartphones, tablets and smartwatches, has resulted in users relying upon network connectivity more than ever before. This resu... Read More about A novel privacy preserving user identification approach for network traffic.

AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection (2016)
Journal Article
Feizollah, A., Anuar, N. B., Salleh, R., Suarez-Tangil, G., & Furnell, S. (2017). AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection. Computers and Security, 65, 121-134. https://doi.org/10.1016/j.cose.2016.11.007

© 2016 Elsevier Ltd The wide popularity of Android systems has been accompanied by increase in the number of malware targeting these systems. This is largely due to the open nature of the Android framework that facilitates the incorporation of third-... Read More about AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection.

A suspect-oriented intelligent and automated computer forensic analysis (2016)
Journal Article
Al Fahdi, M., Clarke, N. L., Li, F., & Furnell, S. M. (2016). A suspect-oriented intelligent and automated computer forensic analysis. Digital Investigation, 18, 65-76. https://doi.org/10.1016/j.diin.2016.08.001

© 2016 Elsevier Ltd Computer forensics faces a range of challenges due to the widespread use of computing technologies. Examples include the increasing volume of data and devices that need to be analysed in any single case, differing platforms, use o... Read More about A suspect-oriented intelligent and automated computer forensic analysis.

Information security policy compliance model in organizations (2015)
Journal Article
Sohrabi Safa, N., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers and Security, 56, 70-82. https://doi.org/10.1016/j.cose.2015.10.006

© 2015 Elsevier Ltd. All rights reserved. The Internet and information technology have influenced human life significantly. However, information security is still an important concern for both users and organizations. Technology cannot solely guarant... Read More about Information security policy compliance model in organizations.

Continuous user authentication using multi-modal biometrics (2015)
Journal Article
Saevanee, H., Clarke, N., Furnell, S., & Biscione, V. (2015). Continuous user authentication using multi-modal biometrics. Computers and Security, 53, 234-246. https://doi.org/10.1016/j.cose.2015.06.001

© 2015 Elsevier Ltd. As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security - particularly authentication. With the widely documented poor use of PINs, Active Authentication is... Read More about Continuous user authentication using multi-modal biometrics.

Surveying the development of biometric user authentication on mobile phones (2014)
Journal Article
Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on mobile phones. Communications Surveys and Tutorials, IEEE Communications Society, 17(3), 1268-1293. https://doi.org/10.1109/COMST.2014.2386915

© 1998-2012 IEEE. Designing reliable user authentication on mobile phones is becoming an increasingly important task to protect users' private information and data. Since biometric approaches can provide many advantages over the traditional authentic... Read More about Surveying the development of biometric user authentication on mobile phones.

A response selection model for intrusion response systems: Response Strategy Model (RSM) (2013)
Journal Article
Anuar, N. B., Papadaki, M., Furnell, S., & Clarke, N. (2014). A response selection model for intrusion response systems: Response Strategy Model (RSM). Security and Communication Networks, 7(11), 1831-1848. https://doi.org/10.1002/sec.896

© 2013 John Wiley & Sons, Ltd. Intrusion response systems aim to provide a systematic procedure to respond to incidents. However, with different type of response options, an automatic response system is designed to select appropriate response optio... Read More about A response selection model for intrusion response systems: Response Strategy Model (RSM).