Active authentication for mobile devices utilising behaviour profiling F Li, N Clarke, M Papadaki, P Dowland International journal of information security 13 (3), 229-244, 2014 | 114 | 2014 |
Identifying and Predicting the Factors Affecting End-Users’ Risk-Taking Behavior M Alohali1, N Clarke, F Li, S Furnell Information & Computer Security, 00-00, 2018 | 72 | 2018 |
Behaviour profiling for transparent authentication for mobile devices F Li, N Clarke, M Papadaki, P Dowland Proceedings of the 10th European Conference on Information Warfare (ECIW …, 2011 | 63 | 2011 |
Behaviour Profiling for Mobile Devices F Li University of Plymouth, 2012 | 59 | 2012 |
Behaviour profiling on mobile devices F Li, N Clarke, M Papadaki, P Dowland Emerging Security Technologies (EST), 2010 International Conference on, 77-82, 2010 | 59 | 2010 |
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data H Mohammed, N Clarke, F Li The Journal of Digital Forensics, Security and Law: JDFSL 11 (2), 137, 2016 | 54 | 2016 |
A suspect-oriented intelligent and automated computer forensic analysis M Al Fahdi, NL Clarke, F Li, SM Furnell Digital Investigation 18, 65-76, 2016 | 40 | 2016 |
Unobtrusive Gait Recognition using Smartwatches N Al-Naffakh, N Clarke, F Li, P Haskell-Dowland | 37 | 2017 |
A novel privacy preserving user identification approach for network traffic N Clarke, F Li, S Furnell Computers & Security, 2017 | 34 | 2017 |
Misuse detection for mobile devices using behaviour profiling F Li, N Clarke, M Papadaki, P Dowland International Journal of Cyber Warfare and Terrorism (IJCWT) 1 (1), 41-53, 2011 | 31 | 2011 |
Real-world smartphone-based gait recognition H Alobaidi, N Clarke, F Li Computers & Security, 102557, 2021 | 30 | 2021 |
Continuous User Authentication Using Smartwatch Motion Sensor Data N Al-Naffakh, N Clarke, F Li IFIP International Conference on Trust Management, 15-28, 2018 | 27 | 2018 |
Smart watch based body-temperature authentication TS Enamamu, N Clarke, P Haskell-Dowland, F Li Computing Networking and Informatics (ICCNI), 2017 International Conference …, 2017 | 23 | 2017 |
Activity Recognition using wearable computing N Al-Naffakh, N Clarke, P Dowland, F Li Internet Technology and Secured Transactions (ICITST), 2016 11th …, 2016 | 23 | 2016 |
User profiling from network traffic via novel application-level interactions G Alotibi, N Clarke, F Li, S Furnell Internet Technology and Secured Transactions (ICITST), 2016 11th …, 2016 | 17 | 2016 |
Physical activity recognition by utilising smartphone sensor signals A Alruban, H Alobaidi, N Clarke, F Li 8th International Conference on Pattern Recognition Applications and Methods …, 2019 | 14 | 2019 |
Behavioral-Based Feature Abstraction from Network Traffic G Alotibi, F Li, N Clarke, S Furnell Iccws 2015-The Proceedings of the 10th International Conference on Cyber …, 2015 | 14 | 2015 |
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing M Clasen, F Li, D Williams International Symposium on Human Aspects of Information Security and …, 2021 | 11 | 2021 |
Multi-Platform Authorship Verification A Altamimi, N Clarke, S Furnell, F Li Proceedings of the Third Central European Cybersecurity Conference, 13, 2019 | 11 | 2019 |
Evidence identification in heterogeneous data using clustering H Mohammed, N Clarke, F Li Proceedings of the 13th International Conference on Availability …, 2018 | 10 | 2018 |