Skip to main content

Research Repository

Advanced Search

All Outputs (88)

AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection (2016)
Journal Article
Feizollah, A., Anuar, N. B., Salleh, R., Suarez-Tangil, G., & Furnell, S. (2017). AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection. Computers and Security, 65, 121-134. https://doi.org/10.1016/j.cose.2016.11.007

© 2016 Elsevier Ltd The wide popularity of Android systems has been accompanied by increase in the number of malware targeting these systems. This is largely due to the open nature of the Android framework that facilitates the incorporation of third-... Read More about AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection.

A suspect-oriented intelligent and automated computer forensic analysis (2016)
Journal Article
Al Fahdi, M., Clarke, N. L., Li, F., & Furnell, S. M. (2016). A suspect-oriented intelligent and automated computer forensic analysis. Digital Investigation, 18, 65-76. https://doi.org/10.1016/j.diin.2016.08.001

© 2016 Elsevier Ltd Computer forensics faces a range of challenges due to the widespread use of computing technologies. Examples include the increasing volume of data and devices that need to be analysed in any single case, differing platforms, use o... Read More about A suspect-oriented intelligent and automated computer forensic analysis.

Information security policy compliance model in organizations (2015)
Journal Article
Sohrabi Safa, N., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers and Security, 56, 70-82. https://doi.org/10.1016/j.cose.2015.10.006

© 2015 Elsevier Ltd. All rights reserved. The Internet and information technology have influenced human life significantly. However, information security is still an important concern for both users and organizations. Technology cannot solely guarant... Read More about Information security policy compliance model in organizations.

Continuous user authentication using multi-modal biometrics (2015)
Journal Article
Saevanee, H., Clarke, N., Furnell, S., & Biscione, V. (2015). Continuous user authentication using multi-modal biometrics. Computers and Security, 53, 234-246. https://doi.org/10.1016/j.cose.2015.06.001

© 2015 Elsevier Ltd. As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security - particularly authentication. With the widely documented poor use of PINs, Active Authentication is... Read More about Continuous user authentication using multi-modal biometrics.

Surveying the development of biometric user authentication on mobile phones (2014)
Journal Article
Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on mobile phones. Communications Surveys and Tutorials, IEEE Communications Society, 17(3), 1268-1293. https://doi.org/10.1109/COMST.2014.2386915

© 1998-2012 IEEE. Designing reliable user authentication on mobile phones is becoming an increasingly important task to protect users' private information and data. Since biometric approaches can provide many advantages over the traditional authentic... Read More about Surveying the development of biometric user authentication on mobile phones.

A response selection model for intrusion response systems: Response Strategy Model (RSM) (2013)
Journal Article
Anuar, N. B., Papadaki, M., Furnell, S., & Clarke, N. (2014). A response selection model for intrusion response systems: Response Strategy Model (RSM). Security and Communication Networks, 7(11), 1831-1848. https://doi.org/10.1002/sec.896

© 2013 John Wiley & Sons, Ltd. Intrusion response systems aim to provide a systematic procedure to respond to incidents. However, with different type of response options, an automatic response system is designed to select appropriate response optio... Read More about A response selection model for intrusion response systems: Response Strategy Model (RSM).

Application of a MILP-based Algorithm for Power Flow Optimisation within More-Electric Aircraft Electrical Power Systems
Conference Proceeding
Wang, X., Atkin, J., Bozhko, S., & Hill, C. (2019). Application of a MILP-based Algorithm for Power Flow Optimisation within More-Electric Aircraft Electrical Power Systems. In Proceedings of EPE'19 21st European Conference on Power Electronics and Applications. https://doi.org/10.23919/EPE.2019.8915388

This paper presents in detail how Mixed-Integer Linear Programming (MILP) can be used to solve the optimal power flow problem of Electrical Power Systems (EPSs) within More-Electric Aircraft (MEA). Continuous linear functions, integer variables and p... Read More about Application of a MILP-based Algorithm for Power Flow Optimisation within More-Electric Aircraft Electrical Power Systems.