2021 IEEE European Symposium on Security and Privacy (EuroS&P)| 978-1-6654-1491-3/21/$31.00© 2021 IEEE| DOI: 10.1109/EUROSP51992. 2021.00060 F Abbasi, K Aberer, A Acar, G Ács, H Aghakhani, A Agrawal, ... | | |
A comparison of compliance with data privacy requirements in two countries A Da Veiga, R Vorster, F Li, N Clarke, S Furnell ECIS 2018: 26th European Conference on Information Systems: Beyond …, 2018 | 4 | 2018 |
A comparison of website user authentication mechanisms S Furnell Computer Fraud & Security 2007 (9), 5-9, 2007 | 18 | 2007 |
A comperhansive framework for cultivating and assessing Information Security Culture. A Tolah, S Furnell, M Papadaki HAISA, 52-64, 2017 | 30 | 2017 |
A composite user authentication architecture for mobile devices NL Clarke, SM Furnell Journal of Information Warfare 5 (2), 11-29, 2006 | 20 | 2006 |
A comprehensive authentication and supervision architecture for networked multimedia systems SM Furnell, HM Illingworth, SK Katsikas, PL Reynolds, PW Sanders Communications and Multimedia Security: Volume 3, 227-238, 1997 | | 1997 |
A comprehensive design framework for multi-disciplinary cyber security education G Langner, S Furnell, G Quirchmayr, F Skopik International Symposium on Human Aspects of Information Security and …, 2023 | 2 | 2023 |
A comprehensive framework for understanding security culture in organizations A Tolah, SM Furnell, M Papadaki Information Security Education. Education in Proactive Information Security …, 2019 | 18 | 2019 |
A conceptual architecture for real‐time intrusion monitoring SM Furnell, PS Dowland Information Management & Computer Security 8 (2), 65-75, 2000 | 32 | 2000 |
A conceptual intrusion monitoring architecture and thoughts on practical implementation PS Downland, SM Furnell IFEP'00, 2000 | 5 | 2000 |
A conceptual model for cultivating an information security culture E Sherif, S Furnell International Journal for Information Security Research 5 (2), 565-573, 2015 | 10 | 2015 |
A conceptual model for federated authentication in the cloud A Al Abdulwahid, N Clarke, S Furnell, I Stengel SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2013 | 8 | 2013 |
A correlation framework for continuous user authentication using data mining H Singh, SM Furnell, PS Dowland, B Lines, S Kaur Proceedings of the Fourth International Network Conference 2004 (INC2004), 237, 2003 | 1 | 2003 |
A detection-oriented classification of insider it misuse AH Phyo, SM Furnell Third Security Conference, 2004 | 74 | 2004 |
A distributed and cooperative user authentication framework CG Hocking, SM Furnell, NL Clarke, PL Reynolds 2010 Sixth International Conference on Information Assurance and Security …, 2010 | 16 | 2010 |
A fine-grained analysis of user activity on mobile applications: The sensitivity level perception S Alotaibi, S Furnell, N Clarke Infonomics Society, 2015 | 2 | 2015 |
A forensic acquisition and analysis system for IaaS S Alqahtany, N Clarke, S Furnell, C Reich Cluster Computing 19, 439-453, 2016 | 40 | 2016 |
A forensic acquisition and analysis system for IaaS: Architectural model and experiment S Alqahtany, N Clarke, S Furnell, C Reich 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 11 | 2016 |
A forensic acquisition based upon a cluster analysis of non-volatile memory in IaaS S Alqahtany, N Clarke, S Furnell, C Reich 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 123-128, 2017 | 9 | 2017 |
A forensically-enabled IAAS cloud computing architecture S Alqahtany, N Clarke, S Furnell, C Reich | 9 | 2014 |