关注
Steven Furnell
Steven Furnell
在 nottingham.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
年份
2021 IEEE European Symposium on Security and Privacy (EuroS&P)| 978-1-6654-1491-3/21/$31.00© 2021 IEEE| DOI: 10.1109/EUROSP51992. 2021.00060
F Abbasi, K Aberer, A Acar, G Ács, H Aghakhani, A Agrawal, ...
A comparison of compliance with data privacy requirements in two countries
A Da Veiga, R Vorster, F Li, N Clarke, S Furnell
ECIS 2018: 26th European Conference on Information Systems: Beyond …, 2018
42018
A comparison of website user authentication mechanisms
S Furnell
Computer Fraud & Security 2007 (9), 5-9, 2007
182007
A comperhansive framework for cultivating and assessing Information Security Culture.
A Tolah, S Furnell, M Papadaki
HAISA, 52-64, 2017
302017
A composite user authentication architecture for mobile devices
NL Clarke, SM Furnell
Journal of Information Warfare 5 (2), 11-29, 2006
202006
A comprehensive authentication and supervision architecture for networked multimedia systems
SM Furnell, HM Illingworth, SK Katsikas, PL Reynolds, PW Sanders
Communications and Multimedia Security: Volume 3, 227-238, 1997
1997
A comprehensive design framework for multi-disciplinary cyber security education
G Langner, S Furnell, G Quirchmayr, F Skopik
International Symposium on Human Aspects of Information Security and …, 2023
22023
A comprehensive framework for understanding security culture in organizations
A Tolah, SM Furnell, M Papadaki
Information Security Education. Education in Proactive Information Security …, 2019
182019
A conceptual architecture for real‐time intrusion monitoring
SM Furnell, PS Dowland
Information Management & Computer Security 8 (2), 65-75, 2000
322000
A conceptual intrusion monitoring architecture and thoughts on practical implementation
PS Downland, SM Furnell
IFEP'00, 2000
52000
A conceptual model for cultivating an information security culture
E Sherif, S Furnell
International Journal for Information Security Research 5 (2), 565-573, 2015
102015
A conceptual model for federated authentication in the cloud
A Al Abdulwahid, N Clarke, S Furnell, I Stengel
SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2013
82013
A correlation framework for continuous user authentication using data mining
H Singh, SM Furnell, PS Dowland, B Lines, S Kaur
Proceedings of the Fourth International Network Conference 2004 (INC2004), 237, 2003
12003
A detection-oriented classification of insider it misuse
AH Phyo, SM Furnell
Third Security Conference, 2004
742004
A distributed and cooperative user authentication framework
CG Hocking, SM Furnell, NL Clarke, PL Reynolds
2010 Sixth International Conference on Information Assurance and Security …, 2010
162010
A fine-grained analysis of user activity on mobile applications: The sensitivity level perception
S Alotaibi, S Furnell, N Clarke
Infonomics Society, 2015
22015
A forensic acquisition and analysis system for IaaS
S Alqahtany, N Clarke, S Furnell, C Reich
Cluster Computing 19, 439-453, 2016
402016
A forensic acquisition and analysis system for IaaS: Architectural model and experiment
S Alqahtany, N Clarke, S Furnell, C Reich
2016 11th International Conference on Availability, Reliability and Security …, 2016
112016
A forensic acquisition based upon a cluster analysis of non-volatile memory in IaaS
S Alqahtany, N Clarke, S Furnell, C Reich
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 123-128, 2017
92017
A forensically-enabled IAAS cloud computing architecture
S Alqahtany, N Clarke, S Furnell, C Reich
92014
系统目前无法执行此操作,请稍后再试。
文章 1–20