Centre for Cyber Security, Communications and Network Research (CSCAN)
CSCAN publications
Ben Salamah F, Palomino M, Papadaki M, Craven M & Furnell S2023'Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats'IFIP International Symposium on Human Aspects of Information Security & Assurance7-/-0/20237-/-0/2023SpringerPublisher Site, DOIOpen access
Vranopoulos G, Clarke N & Atkinson S2022'Addressing big data variety using an automated approach for data characterization'Journal Of Big Data9,(1), DOIOpen access
Alobaidi H, Clarke N, Li F & AbdulrahmanAlruban2021'Real-World Smartphone-based Gait Recognition'Computers and Security113,, DOIOpen access
Craven MJ & Woodward JR2021'Evolution of group-theoretic cryptology attacks using hyper-heuristics'Journal of Mathematical Cryptology16,(1)49-63, DOIOpen access
Asad H2021'Dynamical Analysis of Diversity in Rule-Based Open Source Network Intrusion Detection Systems'Empirical Software Engineering: an international journal27,(4), DOIOpen access
Tam K, Hopcraft R, Crichton T & Jones K2021'The potential mental health effects of remote control in an autonomous maritime world'Journal of International Maritime Safety, Environmental Affairs, and Shipping5,(2)51-66, DOIOpen access
DesLauriers J, Kiss T, Ariyattu RC, Dang H, Ullah A, Bowden J, Krefting D, Pierantoni G & Terstyanszky G2020'Cloud apps to‐go: Cloud portability with TOSCA and MiCADO'WileyPublisher Site, DOI
Barakabitze AA, Mkwawa I-H, Hines A, Sun L & Ifeachor E2020'QoEMultiSDN: Management of Multimedia Services using MPTCP/SR in Softwarized and Virtualized Networks'IEEE Access1-1, DOIOpen access
Naqvi B, Clarke N & Porras J2020'Incorporating the Human Facet of Security in Developing Systems and
Services'Information and Computer Security, DOIOpen access
Alotaibi F, Clarke N & Furnell S2020'A novel approach for improving information security management and awareness for home environments'Information and Computer Security, DOIOpen access
Hock D, Kappes M & Ghita B2019'Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric'Sustainable Energy, Grids and Networks21,100290-100290, DOIOpen access
Alohali M, Clarke N & Furnell S2019'Information Security Risk Communication: A User-Centric Approach'2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)1-/-1/20191-/-1/2019IEEEPublisher Site, DOI
Tam K & Jones K2019'MaCRA: a model-based framework for maritime cyber-risk assessment'Wmu Journal of Maritime Affairs, DOIOpen access
Alqahtani N, Furnell S, Atkinson S & Stengel I2017'Internet risks for children: Parents' perceptions and attitudes: An investigative study of the Saudi Context'2017 Internet Technologies and Applications (ITA)IEEE, DOIOpen access
Marchang J, Ghita B & Lancaster D2017'Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks'Ad Hoc Networks63,62-78, DOIOpen access
Mansfield TO, Ghita BV & Ambroze MA2017'Signals of opportunity geolocation methods for urban and indoor environments'Annals of Telecommunications72,(3-4)145-155, DOIOpen access
Bakhshi T & Ghita B2016'On Internet Traffic Classification: A Two-Phased Machine Learning Approach'Journal of Computer Networks and Communications2016,0-0, DOIOpen access
Craven MJ & Robertz D2016'A parallel evolutionary approach to solving systems of equations in polycyclic groups'Groups Complexity Cryptology8,(2)Publisher Site, DOIOpen access
Ambroze MA, Martin PA, Tomlinson M & Taylor DP2015'Multi-user indoor ultra-wideband wireless communication using polyphase spreading sequences'IET COMMUNICATIONS9,(5)585-595, DOIOpen access
Fajardo JO, Liberal F, Li F, Clarke N & Mkwawa I-H2014'End-to-middle-to-end solution for IMS media plane security'Electronic Commerce Research, DOIOpen access
Rosnes E, Ambroze MA & Tomlinson M2014'On the Minimum/Stopping Distance of Array Low-Density Parity-Check Codes'IEEE Transactions on Information Theory60,(9)5204-5214, DOIOpen access
Frei S, Fuhrmann WF & Ghita BV2013'Framework for Generic Context- and Policy-Based Traffic Distribution in Heterogeneous Wireless Networks: Black Rider'Barolli L; Xhafa F; Takizawa M; Enokido T; Hsu H-HIEEE Computer Society534-541Publisher Site, DOI
Hocking CG, Furnell SM, Clarke NL & Reynolds PL2013'Co-operative user identity verification using an Authentication Aura'COMPUTERS & SECURITY39,486-502, DOI
Rosnes E, Ytrehus O, Ambroze MA & Tomlinson M2012'Addendum to "An Efficient Algorithm to Find All Small-Size Stopping Sets of Low-Density Parity-Check Matrices"'IEEE TRANSACTIONS ON INFORMATION THEORY58,(1)164-171Author Site, DOI
Doelitzscher F, Fischer C, Moskal D, Reich C, Knahl M & Clarke N2012'Validating Cloud Infrastructure Changes by Cloud Audits'377-384
Clarke N, Katos V, Menesidou SA, Ghita B & Furnell S2012'A novel security architecture for a space-data DTN'Springer Berlin/Heidelberg342-349
Doelitzscher F, Reich C, Knahl M, Passfall A & Clarke N2012'An agent based business aware incident detection system for cloud environments'Journal of Cloud Computing: Advances, Systems and Applications1,9-9
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N & Gritzalis S2012'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers'SECURITY AND COMMUNICATION NETWORKS5,(1)3-14, DOI
Furnell S & Clarke N2012'Power to the people? The evolving recognition of human aspects of security'Computers & Security
Anuar N, Papadaki M, Furnell S & Clarke N2012'A Response Strategy Model for Intrusion Response Systems'Springer Boston573-578
Frei S, Fuhrmann WF, Rinkel A & Ghita BV2012'Prospects for WLAN in the Evolved Packet Core Environment'Levi A; Badra M; Cesana M; Ghassemian M; Gürbüz Ö; Jabeur N; Klonowski M; Maña A; Sargento S; Zeadally SIEEE1-5Publisher Site
Saevanee H, Clarke N & Furnell S2012'Multi-modal Behavioural Biometric Authentication for Mobile Devices'Springer Boston465-474
Clarke N2011Transparent User Authentication.Springer Verlag
Lehmann A, Trick U, Fuhrmann W & Ghita B2011'A new service description language as basis for service composition in SIP-based peer-to-peer infrastructures'1 -8-1 -8, DOI
Arabi M & Ghita B2011'Transmission rate control through MAC layer acknowledgements feedback'1 -7-1 -7, DOI
Culverhouse ME, Ghita BV & Reynolds P2011'User-centric quality of service provisioning'35 -41-35 -41, DOI
Arabi M & Ghita BV2011'Improving Fairness in Ad Hoc Networks Based on Neighbour’s Transmission Rate'292-299-292-299
Frei S, Fuhrmann W, Rinkel A & Ghita BV2011'EPS QoS Enforcement on Layer 3 with Diffserv'199-204-199-204
Wacht P, Eichelmann T, Lehmann A, Fuhrmann W, Trick U & Ghita BV2011'A New Approach to Model a Formalised Description of a Communication Service for the Purpose of Functional Testing'262-269-262-269
Eichelmann T, Fuhrmann W, Trick U & Ghita BV2011'Discussion on a Framework and its Service Structures for generating JSLEE based Value-Added Services'169-177-169-177
Frei S, Fuhrmann W, Rinkel A & Ghita BV2011'Improvements to Inter System Handover in the EPC Environment'1 -5-1 -5, DOI
Doelitzscher F, Reich C, Knahl M & Clarke N2011'An autonomous agent based incident detection system for cloud environments'197-204
Li F, Clarke N, Papadaki M & Dowland P2011'Misuse detection for mobile devices using behaviour profiling'International Journal of Cyber Warfare and Terrorism (IJCWT)1,41-53
Talib S, Clarke NL & Furnell SM2011'Establishing A Personalized Information Security Culture'International Journal of Mobile Computing and Multimedia Communications (IJMCMC)3,63-79
CLARKE N2011Transparent user authentication: biometrics, RFID and behavioural profiling [e-book].
Lederm T & Clarke N2011'Risk assessment for mobile devices'Springer Berlin/Heidelberg210-221
Frei S, Fuhrmann W, Rinkel A & Ghita BV2011'Improvements to Inter System Handover in the EPC Environment'New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on1-5
Saevanee H, Clarke N & Furnell S2011'SMS linguistic profiling authentication on mobile device'224-228
Li F, Clarke N, Papadaki M & Dowland P2011'Behaviour Profiling for Transparent Authentication for Mobile Devices'307-314
Select a staff member to see a full list of publications