FAIZ ZAKI, ABDULLAH GANI, HAMID TAHAEI, STEVEN FURNELL and NOR BADRUL ANUAR, 2021. Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic Computer Networks. 184, 107617 YUXIANG HONG and STEVEN FURNELL, 2021. Understanding cybersecurity behavioral habits: Insights from situational support Journal of Information Security and Applications. 57, 102710 STEVEN FURNELL, 2021. The cybersecurity workforce and skills Computers & Security. 100, 102080 STEVEN FURNELL, JULIE HANEY and MARY THEOFANOS, 2021. Pandemic Parallels: What Can Cybersecurity Learn From COVID-19? Computer. 54(3), 68-72 ZAWALI, BAKO, IKUESAN, RICHARD A., KEBANDE, VICTOR R., FURNELL, STEVEN and A-DHAQM, ARAFAT, 2021. Realising a Push Button Modality for Video-Based Forensics Infrastructures. 6(4), MILOSLAVSKAYA, NATALIA and FURNELL, STEVEN, 2021. Network Security Intelligence Centres for Information Security Incident Management In: Brain-Inspired Cognitive Architectures for Artificial Intelligence: BICA*AI 2020. 270-282
ALOTAIBI, FAYEZ GHAZAI, CLARKE, NATHAN and FURNELL, STEVEN M., 2020. A novel approach for improving information security management and awareness for home environments INFORMATION AND COMPUTER SECURITY. DA VEIGA, ADELE, VORSTER, RUTHEA, LI, FUDONG, CLARKE, NATHAN and FURNELL, STEVEN M., 2020. Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements INFORMATION AND COMPUTER SECURITY. 28(3), 399-422 VAN DER SCHYFF, KARL, FLOWERDAY, STEPHEN and FURNELL, STEVEN, 2020. Duplicitous social media and data surveillance: An evaluation of privacy risk COMPUTERS & SECURITY. 94,
FURNELL, STEVEN and BISHOP, MATT, 2020. Addressing cyber security skills: the spectrum, not the silo COMPUTER FRAUD & SECURITY. 6-11
SOKRATIS K. KATSIKAS, FR'ED'ERIC CUPPENS, NORA CUPPENS, COSTAS LAMBRINOUDAKIS, CHRISTOS KALLONIATIS, JOHN MYLOPOULOS, ANNIE I. ANT'ON, STEFANOS GRITZALIS, FRANK PALLAS, J'ORG POHLE, M. ANGELA SASSE, WEIZHI MENG, STEVEN FURNELL and JOAQU'IN GARC'IA-ALFARO, eds., 2020. Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers Springer. STEVEN FURNELL, PAOLO MORI, EDGAR R. WEIPPL and OLIVIER CAMP, eds., 2020. Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020 SCITEPRESS.
STEVEN FURNELL, HARRY HEYBURN, ANDREW WHITEHEAD and JAYESH NAVIN SHAH, 2020. Understanding the full cost of cyber security breaches Computer Fraud & Security. 2020(12), 6-12 STEVEN FURNELL and MATT BISHOP, 2020. Education for the Multifaith Community of Cybersecurity In: Information Security Education. Information Security in Action. 32-45
STEVEN FURNELL and JAYESH NAVIN SHAH, 2020. Home working and cyber security – an outbreak of unpreparedness? Computer Fraud & Security. 2020(8), 6-12 FURNELL, STEVEN, 2020. Getting Bitten by the Love Bug ITNOW. 62(3), 38-39 ADEYEMI R. IKUESAN, MAZLEENA SALLEH, HEIN S. VENTER, SHUKOR ABD RAZAK and STEVEN M. FURNELL, 2020. A heuristics for HTTP traffic identification in measuring user dissimilarity Human-Intelligent Systems Integration. 2(1), 17-28 KARL VAN DER SCHYFF, STEPHEN FLOWERDAY and STEVEN FURNELL, 2020. Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment Computers & Security. 96, 101866 ALTAMIMI, ABDULAZIZ, CLARKE, NATHAN, FURNELL, STEVEN and LI, FUDONG, 2019. Multi-Platform Authorship Verification THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019). TRI HOANG VO, FUHRMANN, WOLDEMAR, FISCHER-HELLMANN, KLAUS-PETER and FURNELL, STEVEN, 2019. Efficient Privacy-preserving User Identity with Purpose-based Encryption 2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019).
FURNELL, STEVEN, 2019. Password meters: inaccurate advice offered inconsistently? COMPUTER FRAUD & SECURITY. 6-14
TRI HOANG VO, FUHRMANN, WOLDEMAR, FISCHER-HELLMANN, KLAUS-PETER and FURNELL, STEVEN, 2019. Automated trust negotiation for Cloud applications in Identity-as-a-Service 2019 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGIES AND NETWORKING (COMMNET). 95-102
FURNELL, STEVEN, MILLET, KIERAN and PAPADAKI, MARIA, 2019. Fifteen years of phishing: can technology save us? COMPUTER FRAUD & SECURITY. 11-16
AWAD, ALI ISMAIL, FURNELL, STEVEN, HASSAN, ABBAS M. and TRYFONAS, THEO, 2019. Special issue on security of IoT-enabled infrastructures in smart cities AD HOC NETWORKS. 92, ALOTAIBI, SAUD NEJR, FURNELL, STEVEN and CLARKE, NATHAN, 2019. A novel transparent user authentication approach for mobile applications INFORMATION SECURITY JOURNAL. 27(5-6), 292-305 SAFA, NADER SOHRABI, MAPLE, CARSTEN, FURNELL, STEVE, AZAD, MUHAMMAD AJMAL, PERERA, CHARITH, DABBAGH, MOHAMMAD and SOOKHAK, MEHDI, 2019. Deterrence and prevention-based model to mitigate information security insider threats in organisations FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE. 97, 587-597 HIEP CONG PHAM, BRENNAN, LINDA and FURNELL, STEVEN, 2019. Information security burnout: Identification of sources and mitigating factors from security demands and resources JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. 46, 96-107 FURNELL, STEVEN and DOWLING, SAMANTHA, 2019. Cyber crime: a portrait of the landscape JOURNAL OF CRIMINOLOGICAL RESEARCH POLICY AND PRACTICE. 5(1), 13-26 ALOTAIBI, MUTLAQ JALIMID, FURNELL, STEVEN and CLARKE, NATHAN, 2019. A framework for reporting and dealing with end-user security policy compliance INFORMATION AND COMPUTER SECURITY. 27(1), 2-25 PAOLO MORI, STEVEN FURNELL and OLIVIER CAMP, eds., 2019. Information Systems Security and Privacy - 4th International Conference, ICISSP 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers Springer. PAOLO MORI, STEVEN FURNELL and OLIVIER CAMP, eds., 2019. Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 SciTePress.
FURNELL, STEVEN and SPAFFORD, EUGENE H, 2019. The Morris Worm at 30 ITNOW. 61(1), 32-33 HERKANAIDU, R., FURNELL, S. M., PAPADAKI, M. and KHUCHINDA, T., 2018. Designing an Anti-Cyberbullying Programme in Thailand PROCEEDINGS OF THE TWELFTH INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY & ASSURANCE (HAISA 2018). 111-122
GASEB, ALOTIBI, NATHAN, CLARKE, FUDONG LI and FURNELL, STEVEN, 2018. The Current Situation of Insider Threats Detection: An Investigative Review 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC).
ALOHALI, MANAL, CLARKE, NATHAN and FURNELL, STEVEN, 2018. The Design and Evaluation of a User-Centric Information Security Risk Assessment and Response Framework INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS. 9(10), 148-163
ALRUBAN, ABDULRAHMAN, CLARKE, NATHAN, LI, FUDONG and FURNELL, STEVEN, 2018. Biometrically Linking Document Leakage to the Individuals Responsible TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS. 11033, 135-149 FURNELL, STEVEN and CLARKE, NATHAN, 2018. Special Issue: Human Aspects of Security INFORMATION AND COMPUTER SECURITY. 26(3), 262-263 ALOHALI, MANAL, CLARKE, NATHAN, LI, FUDONG and FURNELL, STEVEN, 2018. Identifying and predicting the factors affecting end-users' risk-taking behavior INFORMATION AND COMPUTER SECURITY. 26(3), 306-326 FURNELL, STEVEN, 2018. Assessing website password practices - over a decade of progress? COMPUTER FRAUD & SECURITY. 6-13
MENG, WEIZHI, CHOO, KIM-KWANG RAYMOND, FURNELL, STEVEN, VASILAKOS, ATHANASIOS V. and PROBST, CHRISTIAN W., 2018. Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT. 15(2), 761-773 FURNELL, STEVEN, KHERN-AM-NUAI, WARUT, ESMAEL, RAWAN, YANG, WEINING and LI, NINGHUI, 2018. Enhancing security behaviour by supporting the user COMPUTERS & SECURITY. 75, 1-9
SAFA, NADER SOHRABI, MAPLE, CARSTEN, WATSON, TIM and FURNELL, STEVE, 2018. Information security collaboration formation in organisations IET INFORMATION SECURITY. 12(3), 238-245 HIBA AL-KAWAZ, NATHAN L. CLARKE, STEVEN FURNELL and FUDONG LI, 2018. Facial-Forensic Analysis Tool Digit. Investig.. 26, S136 STEVEN FURNELL, MICHAEL K, FRED PIPER, CHRIS E, CATHERINE H and CHRIS ENSOR, 2018. A National Certification Programme for Academic Degrees in Cyber Security In: Information Security Education - Towards a Cybersecure Society - 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings. 133-145 PAOLO MORI, STEVEN FURNELL and OLIVIER CAMP, eds., 2018. Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, January 22-24, 2018 SciTePress.
STEVEN FURNELL, HARALAMBOS MOURATIDIS and G'UNTHER PERNUL, eds., 2018. Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings Springer. FURNELL, STEVEN and CLARKE, NATHAN, 2018. Inhabiting the Biometric Society ITNOW. 60(3), 42-43 FURNELL, STEVEN, 2017. The evolving landscape of technology-dependent crime ROUTLEDGE HANDBOOK OF TECHNOLOGY, CRIME AND JUSTICE. 65-77
MASHHADANI, SHAHLAA, AL-KAWAZ, HIBA, CLARKE, NATHAN, FURNELL, STEVEN and LI, FUDONG, 2017. A Novel Multimedia-Forensic Analysis Tool (M-FAT) 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST). 388-395
ALOTAIBI, F., FURNELL, S., STENGEL, I. and PAPADAKI, M., 2017. Enhancing Cyber Security Awareness with Mobile Games 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST). 129-134
ALOTAIBI, FAYEZ, CLARKE, NATHAN and FURNE, STEVEN, 2017. An Analysis of Home User Security Awareness & Education 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST). 116-122
PACELLA, DANIELA, DELL'AQUILA, ELENA, MAROCCO, DAVIDE and FURNELL, STEVEN, 2017. Toward an Automatic Classification of Negotiation Styles using Natural Language Processing INTELLIGENT VIRTUAL AGENTS, IVA 2017. 10498, 339-342
ALRUBAN, ABDULRAHMAN, CLARKE, NATHAN, LI, FUDONG and FURNELL, STEVEN, 2017. Insider Misuse Attribution using Biometrics PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017). ALOHALI, MANAL, CLARKE, NATHAN, FURNELL, STEVEN and ALBAKRI, SAAD, 2017. Information Security Behavior: Recognizing the Influencers 2017 COMPUTING CONFERENCE. 844-853
ALI FEIZOLLAH, NOR BADRUL ANUAR, ROSLI SALLEH, GUILLERMO SUAREZ-TANGIL and STEVEN FURNELL, 2017. AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection Comput. Secur.. 65, 121-134 NATHAN L. CLARKE, FUDONG LI and STEVEN FURNELL, 2017. A novel privacy preserving user identification approach for network traffic Comput. Secur.. 70, 335-350 STEVEN FURNELL and ISMINI VASILEIOU, 2017. Security education and awareness: just let them burn? Netw. Secur.. 2017(12), 5-9 STEVEN FURNELL and NATHAN L. CLARKE, eds., 2017. Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, Adelaide, Australia, November 28-30, 2017, Proceedings University of Plymouth.
PAOLO MORI, STEVEN FURNELL and OLIVIER CAMP, eds., 2017. Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, February 19-21, 2017 SciTePress.
FURNELL SM and EMM D, 2017. The ABC of ransomware protection Computer Fraud & Security. Volume 2017, Issue 10, October 2017, Pages 5-11, KOROVESSIS P, FURNELL SM, PAPADAKI M and HASKELL-DOWLAND PS (DOWLAND PS), 2017. A toolkit approach to information security awareness and education Journal of Cybersecurity Education, Research and Practice. Vol. 2017, Iss. 2, Art. 5, ISSN: 2472-2707, FURNELL SM, FISCHER P and FINCH A, 2017. Can't get the staff? The growing need for cyber-security skills Computer Fraud & Security. Volume 2017, Issue 2, February 2017, Pages 5-10, FURNELL SM and ESMAEL R, 2017. Evaluating the effect of guidance and feedback upon password compliance Computer Fraud & Security. Volume 2017, Issue 1, January, Pages 5-10, FURNELL SM, VASILEIOU I and OUTRAM N, 2017. iPads in Education: Positive Pedagogy versus Problematic Practicalities In: Proceedings of the London International Conference on Education (LICE-2017).
SAAD ALQAHTANY, NATHAN L. CLARKE, STEVEN FURNELL and CHRISTOPH REICH, 2016. A forensic acquisition and analysis system for IaaS Cluster Computing. 19(1), 439-453 ABDULWAHID AL ABDULWAHID, NATHAN L. CLARKE, INGO STENGEL, STEVEN FURNELL and CHRISTOPH REICH, 2016. Continuous and transparent multimodal authentication: reviewing the state of the art Cluster Computing. 19(1), 455-474 NADER SOHRABI SAFA, ROSSOUW VON SOLMS and STEVEN FURNELL, 2016. Information security policy compliance model in organizations Comput. Secur.. 56, 70-82 M. AL FAHDI, NATHAN L. CLARKE, FUDONG LI and STEVEN M. FURNELL, 2016. A suspect-oriented intelligent and automated computer forensic analysis Digit. Investig.. 18, 65-76 ABDULRAHMAN ALRUBAN, NATHAN L. CLARKE, FUDONG LI and STEVEN FURNELL, 2016. Leveraging Biometrics for Insider Misuse Identification Int. J. Cyber Situational Aware.. 1(1), 130-151 NATHAN LUKE CLARKE, JANE SYMES, HATAICHANOK SAEVANEE and STEVEN M. FURNELL, 2016. Awareness of Mobile Device Security: A Survey of User's Attitudes Int. J. Mob. Comput. Multim. Commun.. 7(1), 15-31 HUSSAIN ALSAIARI, MARIA PAPADAKI, PAUL DOWLAND and STEVEN FURNELL, 2016. Graphical One-Time Password (GOTPass): A usability evaluation Inf. Secur. J. A Glob. Perspect.. 25(1-3), 94-108 ABDULRAHMAN ALRUBAN, NATHAN L. CLARKE, FUDONG LI and STEVEN FURNELL, 2016. Proactive biometric-enabled forensic imprinting In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016. 1-15 STEVEN FURNELL and CHARLES A. SHONIREGUN, 2016. Welcome message In: 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016, Barcelona, Spain, December 5-7, 2016. 3 FAISAL ALOTAIBI, STEVEN FURNELL, INGO STENGEL and MARIA PAPADAKI, 2016. A survey of cyber-security awareness in Saudi Arabia In: 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016, Barcelona, Spain, December 5-7, 2016. 154-158 OLIVIER CAMP, STEVEN FURNELL and PAOLO MORI, eds., 2016. Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21, 2016 SciTePress.
SOKRATIS K. KATSIKAS, COSTAS LAMBRINOUDAKIS and STEVEN FURNELL, eds., 2016. Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings Springer. ZAABA ZF, FURNELL SM and HASKELL-DOWLAND PS (DOWLAND PS), 2016. Literature Studies on Security Warnings Development International Journal on Perceptive and Cognitive Computing. Vol 2, Iss 1, pp8-18, ALOTIBI G, CLARKE NL, LI F and FURNELL SM, 2016. Identifying Users by Network Traffic Metadata International Journal of Chaotic Computing. Volume 4, Issue 2, FURNELL SM, 2016. The usability of security - revisited Computer Fraud & Security. ISSN: 1361-3723, September 2016, pp5-11,
ALOTAIBI T and FURNELL SM, 2016. Assessing Staff Acceptance and Compliance with Information Security International Journal of Computing Academic Research (IJCAR). ISSN 2305-9184, Volume 5, Number 4 (August 2016), pp.195-201, ALOTAIBI S, FURNELL SM and CLARKE NL, 2016. A Novel Taxonomy for Mobile Applications Data International Journal of Cyber-Security and Digital Forensics (IJCSDF). ISSN: 2305-0012, Vol. 5, No. 3, pp115-121, FURNELL SM, 2016. The usability of security - revisited Computer Fraud & Security. ISSN: 1361-3723, September 2016, pp5-11,
CLARKE NL, LI F, FURNELL SM, STENGEL I and GANIS G, 2016. Information Security and Practice: The User's Perspective In: Proceedings of the 11th International Conference On Cyber Warfare and Security (ICCWS-2016).
NADER SOHRABI SAFA, MEHDI SOOKHAK, ROSSOUW VON SOLMS, STEVEN FURNELL, NORJIHAN ABDUL GHANI and TUTUT HERAWAN, 2015. Information security conscious care behaviour formation in organizations Comput. Secur.. 53, 65-78 HATAICHANOK SAEVANEE, NATHAN L. CLARKE, STEVEN FURNELL and VALERIO BISCIONE, 2015. Continuous user authentication using multi-modal biometrics Comput. Secur.. 53, 234-246 WEIZHI MENG, DUNCAN S. WONG, STEVEN FURNELL and JIANYING ZHOU, 2015. Surveying the Development of Biometric User Authentication on Mobile Phones IEEE Commun. Surv. Tutorials. 17(3), 1268-1293 HUSSAIN ALSAIARI, MARIA PAPADAKI, PAUL DOWLAND and STEVEN FURNELL, 2015. Secure Graphical One Time Password (GOTPass): An Empirical Study Inf. Secur. J. A Glob. Perspect.. 24(4-6), 207-220 MOUSSA OUEDRAOGO, SEVERINE MIGNON, HERV'E CHOLEZ, STEVEN FURNELL and ERIC DUBOIS, 2015. Security transparency: the next frontier for security research in the cloud J. Cloud Comput.. 4, 12 ADNAN AKHUNZADA, MEHDI SOOKHAK, NOR BADRUL ANUAR, ABDULLAH GANI, EJAZ AHMED, MUHAMMAD SHIRAZ, STEVEN FURNELL, AMIR HAYAT and MUHAMMAD KHURRAM KHAN, 2015. Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions J. Netw. Comput. Appl.. 48, 44-57 NOOR HAYANI ABD RAHIM, SURAYA HAMID, MISS LAIHA MAT KIAH, SHAHABODDIN SHAMSHIRBAND and STEVEN FURNELL, 2015. A systematic review of approaches to assessing cybersecurity awareness Kybernetes. 44(4), 606-622 EMAD SHERIF, STEVEN FURNELL and NATHAN L. CLARKE, 2015. An Identification of Variables Influencing the Establishment of Information Security Culture In: Human Aspects of Information Security, Privacy, and Trust - Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings. 436-448 ABDULWAHID AL ABDULWAHID, NATHAN L. CLARKE, INGO STENGEL, STEVEN FURNELL and CHRISTOPH REICH, 2015. Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes In: Trust, Privacy and Security in Digital Business - 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings. 153-168 ALOTAIBI S, FURNELL SM and CLARKE NL, 2015. A Fine-Grained Analysis of User Activity on Mobile Applications: The Sensitivity Level Perception International Journal for Information Security Research (IJISR). Volume 5, Issue 3, pp591-599, SHERIF E and FURNELL SM, 2015. A Conceptual Model for Cultivating an Information Security Culture International Journal for Information Security Research (IJISR). Volume 5, Issue 2, pp565-573, ALOTIBI G, LI F, CLARKE NL and FURNELL SM, 2015. Behavioral-Based Feature Abstraction from Network Traffic In: 10th International Conference on Cyber warfare and Security.
EUGENE KASPERSKY and STEVEN FURNELL, 2014. A security education Q&A Inf. Manag. Comput. Secur.. 22(2), 130-133 MOHD ZALISHAM JALI, STEVEN M. FURNELL and PAUL DOWLAND, 2014. Investigating the Viability of Multifactor Graphical Passwords for User Authentication Inf. Secur. J. A Glob. Perspect.. 23(1-2), 10-21 NOR BADRUL ANUAR, MARIA PAPADAKI, STEVEN FURNELL and NATHAN L. CLARKE, 2014. A response selection model for intrusion response systems: Response Strategy Model (RSM) Security and Communication Networks. 7(11), 1831-1848 HATAICHANOK SAEVANEE, NATHAN L. CLARKE, STEVEN FURNELL and VALERIO BISCIONE, 2014. Text-Based Active Authentication for Mobile Devices In: ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. 99-112 NATHAN L. CLARKE and STEVEN FURNELL, eds., 2014. Eighth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2014 ,Plymouth, UK, July 8-9, 2014. Proceedings University of Plymouth.
PAUL DOWLAND, STEVEN FURNELL and BOGDAN V. GHITA, eds., 2014. Tenth International Network Conference, INC 2014, Plymouth, UK, July 8-10, 2014. Proceedings Plymouth University.
FURNELL SM, VAN NIEKERK J and CLARKE NL, 2014. The Price of Patching Computer Fraud and Security. Issue 8, pp8-13, MATTORD HJ, LEVY Y and FURNELL SM, 2014. Factors for Measuring Password-Based Authentication Practices Journal of Information Privacy and Security. pp71-94, JOY D, LI F, CLARKE NL and FURNELL SM, 2014. A User-oriented Network Forensic Analyser: The Design of a High-Level Protocol Analyser In: Proceedings of the 12th Australian Digital Forensics Conference, 1-3 December, ECU Joondalup Campus, Perth, Western Australia.
GOEBERT S, HARRIEHAUSEN-MÜHLBAUER B and FURNELL SM, 2014. Towards A Unified OAI-PMH Registry In: Proceedings of the 11th IS&T Archiving Conference.
ALQAHTANY S, CLARKE NL and FURNELL SM, 2014. Cloud Forensics Challenges In: Proceedings of the 7th SSC Saudi Students Conference - UK. CHRIS G. HOCKING, STEVEN M. FURNELL, NATHAN L. CLARKE and PAUL L. REYNOLDS, 2013. Co-operative user identity verification using an Authentication Aura Comput. Secur.. 39, 486-502 HERBERT J. MATTORD, YAIR LEVY and STEVEN FURNELL, 2013. An Expert Panel Approach on Developing a Unified System Authentication Benchmarking Index Int. J. Interdiscip. Telecommun. Netw.. 5(2), 32-42 MUTTUKRISHNAN RAJARAJAN and STEVEN FURNELL, 2013. Editorial for Security and Privacy in Wireless Networks Special Issue MONET. 18(5), 664-665 NOR BADRUL ANUAR, MARIA PAPADAKI, STEVEN FURNELL and NATHAN L. CLARKE, 2013. Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM) Security and Communication Networks. 6(9), 1087-1116 HERBERT J. MATTORD, YAIR LEVY and STEVEN FURNELL, 2013. Factors of Password-based Authentication In: 19th Americas Conference on Information Systems, AMCIS 2013, Chicago, Illinois, USA, August 15-17, 2013. STEVEN FURNELL and NINA B'AR, 2013. Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service Providers In: Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings. 217-225 STEVEN M. FURNELL, 2013. Security Education: The Challenge beyond the Classroom In: Information Assurance and Security Education and Training - 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers. 32-38 BERNHARD HEINZLE and STEVEN FURNELL, 2013. Assessing the Feasibility of Security Metrics In: Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings. 149-160 STEVEN FURNELL, NATHAN L. CLARKE and VASILIOS KATOS, eds., 2013. European Information Security Multi-Conference (EISMC 2013), Lisbon, Portugal, May 8-10, 2013. Proceedings Plymouth University.
STEVEN FURNELL, COSTAS LAMBRINOUDAKIS and JAVIER L'OPEZ, eds., 2013. Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings Springer. AL FAHDI M, CLARKE NL and FURNELL SM, 2013. Towards an Automated Forensic Examiner (AFE) Based upon Criminal Profiling & Artificial Intelligence In: Proceedings of the 11th Australian Digital Forensics Conference, Perth, Australia, 2-4 December.
LI F, CLARKE NL, FURNELL SM, FAJARDO JO, LIBERAL F and SIDIBE M, 2013. A Technology Independent Security Gateway for Future Emergency Telecommunication Systems (ETS) In: Proceeding of the International Workshop on Emergency Telecommunications Systems (ETS 2013).
FURNELL SM and CLARKE NL, 2013. Towards Continuous and Convenient User Authentication In: The Future of Identity: A compilation of research papers from a workshop.
CLARKE NL, HASKELL-DOWLAND PS (DOWLAND PS) and FURNELL SM, 2013. E-Invigilator: A Biometric-Based Supervision System for e-Assessments In: The International Conference on Information Society (i-Society 2013).
STEVEN FURNELL and NATHAN L. CLARKE, 2012. Power to the people? The evolving recognition of human aspects of security Comput. Secur.. 31(8), 983-988 MIKE KREY, STEVEN FURNELL, BETTINA HARRIEHAUSEN and MATTHIAS KNOLL, 2012. Approach to the Evaluation of a Method for the Adoption of Information Technology Governance, Risk Management and Compliance in the Swiss Hospital Environment In: 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui, HI, USA. 2810-2819 NOR BADRUL ANUAR, MARIA PAPADAKI, STEVEN FURNELL and NATHAN L. CLARKE, 2012. A Response Strategy Model for Intrusion Response Systems In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. 573-578 NATHAN L. CLARKE, VASILIOS KATOS, SOFIA-ANNA MENESIDOU, BOGDAN V. GHITA and STEVEN FURNELL, 2012. A Novel Security Architecture for a Space-Data DTN In: Wired/Wireless Internet Communication - 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012. Proceedings. 342-349 NATHAN L. CLARKE and STEVEN FURNELL, eds., 2012. 6th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2012, Crete, Greece, June 6-8, 2012. Proceedings University of Plymouth.
ZAABA ZF, FURNELL SM, HASKELL-DOWLAND PS (DOWLAND PS) and STENGEL I, 2012. Assessing the usability of application level security warnings In: Eleventh Annual Security Conference.
STEVEN FURNELL and NATHAN L. CLARKE, eds., 2011. 5th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2011, London, UK, July 7-8, 2011. Proceedings University of Plymouth.
SHUHAILI TALIB, NATHAN L. CLARKE and STEVEN FURNELL, 2011. Establishing A Personalized Information Security Culture Int. J. Mob. Comput. Multim. Commun.. 3(1), 63-79 STEVEN FURNELL, ROSSOUW VON SOLMS and ANDREW D. PHIPPEN, 2011. Preventative Actions for Enhancing Online Protection and Privacy Int. J. Inf. Technol. Syst. Approach. 4(2), 1-11 GEORGE MAGKLARAS, STEVEN FURNELL and MARIA PAPADAKI, 2011. LUARM: An Audit Engine for Insider Misuse Detection Int. J. Digit. Crime Forensics. 3(3), 37-49 SANDERS B, HASKELL-DOWLAND PS (DOWLAND PS), ATKINSON S and FURNELL SM, 2011. Massively Multi-Player Online Role Playing Games: What’s the Risk? Journal of Virtual Worlds Research. vol. 3, no. 3, ISSN: 1941-8477, LEVY Y, RAMIM MM, FURNELL SM and CLARKE NL, 2011. Comparing Intentions to Use University-Provided vs. Vendor-Provided Multibiometric Authentication in Online Exams Campus-Wide Information Systems. Vol. 28 Iss: 2,
ANUAR NB, FURNELL SM, PAPADAKI M and CLARKE NL, 2011. A Risk Index Model for Security Incident Prioritisation In: Proceedings of the 9th Australian Information Security Management Conference (ASIM 2011).
HOCKING C, FURNELL SM, CLARKE NL and REYNOLDS PL, 2011. A preliminary investigation of distributed and cooperative user authentication In: Proceedings of the 9th Australian Information Security Management Conference (secAU 2011).
CLARKE NL, KARATZOUNI S and FURNELL SM, 2011. Towards a Flexible, Multi-Level Security Framework for Mobile Devices In: Proceedings of the 10th Security Conference.
NATHAN L. CLARKE, STEVEN FURNELL and ROSSOUW VON SOLMS, eds., 2010. South African Information Security Multi-Conference, SAISMC 2010, Port Elizabeth, South Africa, May 17-18, 2010. Proceedings University of Plymouth.
MIKE KREY, BETTINA HARRIEHAUSEN, MATTHIAS KNOLL and STEVEN FURNELL, 2010. IT Governance and Its Impact on the Swiss Healthcare In: Proceedings of the 12th UKSim, International Conference on Computer Modelling and Simulation, Cambridge, UK, 24-26 March 2010. 340-345 TARIK IBRAHIM, STEVEN FURNELL, MARIA PAPADAKI and NATHAN L. CLARKE, 2010. Assessing the Usability of End-User Security Software In: Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings. 177-189 BENJAMIN GEORGE SANDERS, VIVIAN CHEN, DANIEL ZAHRA, PAUL DOWLAND, SHIRLEY ATKINSON, MARIA PAPADAKI and STEVEN FURNELL, 2010. Online addiction: privacy risks in online gaming environments In: MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, Bangkok, Thailand, October 26-29, 2010. 114-121 MARIA PAPADAKI and STEVEN FURNELL, 2010. Vulnerability management: an attitude of mind? Netw. Secur.. 2010(10), 4-8 STEVEN FURNELL, 2010. Mac security: An Apple that can't be bitten? Netw. Secur.. 2010(1), 7-11 BENJAMIN GEORGE SANDERS, PAUL DOWLAND, SHIRLEY ATKINSON, DANIEL ZAHRA, STEVEN FURNELL and MARIA PAPADAKI, 2010. Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments J. Multim. Process. Technol.. 1(3), 181-193 STEVEN M. FURNELL, 2010. Online identity: Giving it all away? Inf. Secur. Tech. Rep.. 15(2), 42-46 MOHD ZALISHAM JALI, STEVEN FURNELL and PAUL DOWLAND, 2010. Assessing image-based authentication techniques in a web-based environment Inf. Manag. Comput. Secur.. 18(1), 43-53 ATKINSON S, FURNELL SM and PHIPPEN AD, 2010. Barriers to E-Safety Peer Education: An analysis of teacher concerns In: Proceedings of E-Youth Conference.
STEVEN FURNELL and NATHAN L. CLARKE, eds., 2009. 3rd International Conference on Human Aspects of Information Security and Assurance, HAISA 2009, Athens, Greece, June 25-26, 2009. Proceedings University of Plymouth.
AARON SMITH, MARIA PAPADAKI and STEVEN M. FURNELL, 2009. Improving Awareness of Social Engineering Attacks In: Information Assurance and Security Education and Training - 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers. 249-256 SIMONE FISCHER-H'UBNER, STEVEN FURNELL and COSTAS LAMBRINOUDAKIS, 2009. Exploring Trust, Security and Privacy in Digital Business Trans. Large Scale Data Knowl. Centered Syst.. 1, 191-210 STEVEN M. FURNELL, 2009. The irreversible march of technology Inf. Secur. Tech. Rep.. 14(4), 176-180 TAIMUR BAKHSHI, MARIA PAPADAKI and STEVEN FURNELL, 2009. Social engineering: assessing vulnerabilities in practice Inf. Manag. Comput. Secur.. 17(1), 53-63 REINHARDT A. BOTHA, STEVEN FURNELL and NATHAN L. CLARKE, 2009. From desktop to mobile: Examining the security experience Comput. Secur.. 28(3-4), 130-137 FURNELL SM and THOMSON KL, 2009. From culture to disobedience: Recognising the varying user acceptance of IT security Computer Fraud & Security. Volume 2009, Issue 2, February, pp5-10, FURNELL SM, PAPADAKI M and THOMSON KL, 2009. Scare tactics – A viable weapon in the security war? Computer Fraud & Security. Volume 2009, Issue 12, December, pp6-10, RAZAK SA, SAMIAN N, MA’AROF MA, FURNELL SM, CLARKE NL and BROOKE PJ, 2009. A Friend Mechanism for Mobile Ad Hoc Networks Journal of Information Assurance and Security. Volume 4, Issue 5, pp440-448,
ATKINSON S, FURNELL SM and PHIPPEN AD, 2009. Securing the next generation: enhancing e-safety awareness among young people Computer Fraud & Security. Volume 2009, Issue 7, pp13-19, TJHAI, GINA C., PAPADAKI, MARIA, FURNELL, STEVEN M. and CLARKE, NATHAN L., 2008. The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS. 5185, 139-+
TJHAI, G. C., PAPADAKI, M., FURNELL, S. M. and CLARKE, N. L., 2008. Investigating the problem of IDS false alarms: An experimental study using Snort PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE. 253-267
FURNELL, STEVEN, 2008. Cybercrime: The transformation of crime in the information age BRITISH JOURNAL OF SOCIOLOGY. 59(1), 177-179 STEVEN FURNELL, SOKRATIS K. KATSIKAS and ANTONIO LIOY, eds., 2008. Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings Springer. NATHAN L. CLARKE and STEVEN FURNELL, eds., 2008. 2nd International Conference on Human Aspects of Information Security and Assurance, HAISA 2008, Plymouth, UK, July 8-9, 2008. Proceedings University of Plymouth.
STEVEN FURNELL, VALLERIA TSAGANIDI and ANDREW D. PHIPPEN, 2008. Security beliefs and barriers for novice Internet users Comput. Secur.. 27(7-8), 235-240 SHUKOR ABD RAZAK, STEVEN FURNELL, NATHAN L. CLARKE and PHILLIP J. BROOKE, 2008. Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks Ad Hoc Networks. 6(7), 1151-1167 FURNELL SM, SHAMS R and PHIPPEN AD, 2008. Who guides the little guy? Exploring security advice and guidance from retailers and ISPs Computer Fraud & Security. Volume 2008, Issue 12, December, pp6-10, FURNELL SM and WARD J, 2008. Self-preservation among online prey Computer Fraud & Security. Volume 2008, Issue 11, November, pp9-12, FURNELL SM and WARD J, 2008. It's a jungle out there: Predators, prey and protection in the online wilderness Computer Fraud & Security. Volume 2008, Issue 10, October, pp3-6, FURNELL SM, CLARKE NL and KARATZOUNI S, 2008. Beyond the PIN: Enhancing user authentication for mobile devices Computer Fraud & Security. Volume 2008, Issue 8, pp12-17, FURNELL SM and PAPADAKI M, 2008. Testing our defences or defending our tests: the obstacles to performing security assessment Computer Fraud & Security. Volume 2008, Issue 5, May, pp8-12, FURNELL SM, 2008. End-user security culture: A lesson that will never be learnt? Computer Fraud & Security. Volume 2008, Issue 4, April, pp6-9, FURNELL SM, 2008. End-user security culture: A lesson that will never be learnt? Computer Fraud & Security. Volume 2008, Issue 4, April, pp6-9, HELALA M, FURNELL SM and PAPADAKI M, 2008. Evaluating the usability impacts of security interface adjustments in Word In: Proceedings of 6th Australian Information Security Management Conference.
DIMOPOULOS V, FURNELL SM and CLARKE NL, 2008. Effective Information Assurance for SMEs In: Proceedings of he 11th Annual Working Conference on Information Security Management.
RODWELL, P. M., FURNELL, S. M. and REYNOLDS, P. L., 2007. A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head COMPUTERS & SECURITY. 26(7-8), 468-478
FURNELL, STEVEN, 2007. An assessment of website password practices COMPUTERS & SECURITY. 26(7-8), 445-451
FISCHER-HUBNER, SIMONE, FURNELL, STEVEN and LAMBRINOUDAKIS, COSTAS, 2007. Special issue - TrustBus 2006 COMPUTER SYSTEMS SCIENCE AND ENGINEERING. 22(5), 241-242
CLARKE, N. L. and FURNELL, S. M., 2007. Authenticating mobile phone users using keystroke analysis INTERNATIONAL JOURNAL OF INFORMATION SECURITY. 6(1), 1-14 RAZAK, SHUKOR ABD, FURNELL, STEVEN, CLARKE, NATHAN and BROOKE, PHILLIP, 2007. Building a trusted community for mobile ad hoc networks using friend recommendation AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS. 4686, 129-+
FISCHER, KLAUS-PETER, BLEIMANN, UDO and FURNELL, STEVEN, 2007. Pre-execution security policy assessment of remotely defined BPEL-Based Grid processes TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS. 4657, 178-+
FURNELL, S. M., KATSABAS, D., DOWLAND, P. S. and REID, F., 2007. A practical usability evaluation of security features in end-user applications NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS. 232, 205-+
TUCKER, C. J., FURNELL, S. M., GHITA, B. V. and BROOKE, P. J., 2007. A new taxonomy for comparing intrusion detection systems INTERNET RESEARCH. 17(1), 88-98 FURNELL, STEUEN, 2007. Making security usable: Are things improving? COMPUTERS & SECURITY. 26(6), 434-443
FURNELL, S. M., BRYANT, P. and PHIPPEN, A. D., 2007. Assessing the security perceptions of personal Internet users COMPUTERS & SECURITY. 26(5), 410-417
CLARKE, N. L. and FURNELL, S. M., 2007. Advanced user authentication for mobile devices COMPUTERS & SECURITY. 26(2), 109-119
FURNELL, STEVEN, 2007. The Sixth International Network Conference (INC 2006) - Guest editorial INTERNET RESEARCH. 17(1), 5-6
FURNELL, STEVEN, 2007. IFIP workshop - Information security culture COMPUTERS & SECURITY. 26(1), 35-35
J'ORG PREUß, STEVEN FURNELL and MARIA PAPADAKI, 2007. Considering the potential of criminal profiling to combat hacking J. Comput. Virol.. 3(2), 135-141 KLAUS PETER FISCHER, UDO BLEIMANN, WOLDEMAR F. FUHRMANN and STEVEN FURNELL, 2007. Analysis of security-relevant semantics of BPEL in cross-domain defined business processes Inf. Manag. Comput. Secur.. 15(2), 116-127 FURNELL SM and EVANGELATOS K, 2007. Public awareness and perceptions of biometrics Computer Fraud & Security. Issue 1, January, pp8-13,
FURNELL SM, 2007. Identity impairment: The problems facing victims of identity fraud Computer Fraud & Security. Volume 2007, Issue 12, December, pp6-11, FURNELL SM, 2007. Phishing: can we spot the signs? Computer Fraud & Security. Issue 3, March, pp10-15,
FURNELL SM, 2007. Identity impairment: The problems facing victims of identity fraud Computer Fraud & Security. Volume 2007, Issue 12, December, pp6-11, KARATZOUNI S, CLARKE NL and FURNELL SM, 2007. Device- versus Network-Centric Authentication Paradigms for Mobile Devices: Operational and Perceptual Trade-Offs In: 5th Australian Information Security Management Conference.
KARATZOUNI S, FURNELL SM, CLARKE NL and BOTHA RA, 2007. Perceptions of User Authentication on Mobile Devices In: Proceedings of the ISOneWorld Conference, Las Vegas, USA.
FURNELL SM and CHATZIAPOSTOLOU D, 2007. Assessing the usability of system-initiated and user-initiated security events In: Proceedings of the ISOneWorld Conference, Las Vegas, USA.
FURNELL, STEVEN, JUSOH, ADILA, KATSABAS, DIMITRIS and DOWLAND, PAUL, 2006. Considering the usability of end-user security software SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS. 201, 307-+
RAZAK, SHUKOR ABD, FUMELL, STEVEN, CLARKE, NATHAN and BROOKE, PHILLIP, 2006. A two-tier intrusion detection system for mobile ad hoc networks - A friend approach INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS. 3975, 590-595
LACOHEE, H., PHIPPEN, A. D. and FURNELL, S. M., 2006. Risk and restitution: Assessing how users establish online trust COMPUTERS & SECURITY. 25(7), 486-493
FURNELL, SM, JUSOH, A and KATSABAS, D, 2006. The challenges of understanding and using security: A survey of end-users COMPUTERS & SECURITY. 25(1), 27-35
SIMONE FISCHER-H'UBNER, STEVEN FURNELL and COSTAS LAMBRINOUDAKIS, eds., 2006. Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings Springer. GEORGE MAGKLARAS, STEVEN FURNELL and PHILLIP J. BROOKE, 2006. Towards an insider threat prediction specification language Inf. Manag. Comput. Secur.. 14(4), 361-381 MARIA PAPADAKI and STEVEN FURNELL, 2006. Achieving automated intrusion response: a prototype implementation Inf. Manag. Comput. Secur.. 14(3), 235-251 FURNELL SM and GHITA BV, 2006. Usability pitfalls in Wireless LAN Security Network Security. March, pp4-8,
FURNELL SM and ZEKRI L, 2006. Replacing passwords: In search of the secret remedy Network Security, January. pp 4-8,
FURNELL SM, 2006. Malicious or misinformed? Exploring a contributor to the insider threat Computer Fraud & Security. September, pp8-12,
FURNELL SM, 2006. Securing the home worker Network Security. November, pp6-112,
FURNELL SM, 2006. Security mobile devices: technology and attitude Network Security. August, pp9-13,
FURNELL SM, 2006. Safety in numbers? Early experiences in the age of chip and PIN Computer Fraud & Security. April, pp4-7,
GHITA BV and FURNELL SM, 2006. Assessing the usability of WLAN security for SOHO users In: Proceedings of the Fifth Security Conference 2006, Las Vegas, USA, 19-20 April.
TUCKER C, FURNELL SM, GHITA BV and BROOKE PJ, 2006. A New Taxonomy for Intrusion Detection In: Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK, 11-14 July.
RIMBACH F, DANNENBERG M, BLEIMANN U and FURNELL SM, 2006. From Page Ranking to Topic Sensitive Page Ranking: Implementation and Impact In: Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK, 11-14 July.
SCHILKE SW, FURNELL SM, BLEIMANN U and PHIPPEN AD, 2006. Enhancing Privacy Through Anonymous Recommendation for Multi-Dimensional-Personalisation In: Proceedings of the 5th Security Conference.
PAPADAKI M, FURNELL SM, CLARKE NL, ABU-BAKAR UA and PINKNEY G, 2006. Attack Pattern Analysis: Trends in Malware Variant Development In: Proceedings of the 5th Security Conference, Las Vegas, April 19 -20.
FURNELL, SM, 2005. Considering the security challenges in consumer-oriented eCommerce 2005 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Vols 1 and 2. 534-539
DIMOPOULOS, V and FURNELL, S, 2005. A protection profiles approach to risk analysis for small and medium enterprises Security Management, Integrity, and Internal Control in Information Systems. 193, 267-283
ZINCIR, I, FURNELL, S and PHIPPEN, A, 2005. Intrusion detection via behavioural profiling on mobile and wireless networked devices EUROMEDIA '2005: 11TH ANNUAL EUROMEDIA CONFERENCE. 67-71
CLARKE, NL and FURNELL, SM, 2005. Authentication of users on mobile telephones - A survey of attitudes and practices COMPUTERS & SECURITY. 24(7), 519-527
MAGKLARAS, GB and FURNELL, SM, 2005. A preliminary model of end user sophistication for insider threat prediction in IT systems COMPUTERS & SECURITY. 24(5), 371-380
FURNELL, S, 2005. Why users cannot use security COMPUTERS & SECURITY. 24(4), 274-279
SHUKOR ABD RAZAK, STEVEN FURNELL and PHILLIP J. BROOKE, 2005. A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks In: 4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005. 271-280
MARIA PAPADAKI and STEVEN M. FURNELL, 2005. Informing the decision process in an automated intrusion response system Inf. Secur. Tech. Rep.. 10(3), 150-161 A. AL-AYED, STEVEN FURNELL, D. ZHAO and PAUL DOWLAND, 2005. An automated framework for managing security vulnerabilities Inf. Manag. Comput. Security. 13(2), 156-166 FURNELL SM, KATOS V and CLARKE NL, 2005. The role of academic qualifications in the IT security profession DATAWATCH, Information Systems Audit and Control Association (ISACA) - London Chapter. Winter, pp8-15, FURNELL SM, JUSOH A, KATSABAS D and PHIPPEN AD, 2005. Barriers to usable security in end-user applications eMinds: International Journal on Human-Computer Interaction. vol. 1, no. 1, pp51-59, FURNELL SM, KATOS V and CLARKE NL, 2005. Considering the role of academic qualifications for IT security professionals In: Proceedings of the 1st Colloquium for Information Systems Security Education, Asia Pacific.
CLARKE NL and FURNELL SM, 2005. User Authentication for Mobile Devices: A Composite Approach In: Proceedings of the 6th Australian Information Warfare and Security Conference.
SCHILKE SW, BLEIMANN U, FURNELL SM and PHIPPEN AD, 2005. A Chinese Wall Approach for Anonymous Recommendation in a Multi-Dimensional-Personalisation Scenario In: Proceedings of Sciences Electroniques, Technologies de l'Information et des Telecommunications (SETIT) 2005.
SALAMA E, GHITA BV and FURNELL SM, 2005. HTTP-Aware Anonymisation of Packet Traces In: Proceedings of the First International Conference on Internet Technologies and Applications.
LECOMTE J, CLARKE NL and FURNELL SM, 2005. Artificial Impostor Profiling for Keystroke Dynamics on a Mobile Handset In: Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece.
GHITA BV, FURNELL SM, LINES BL and IFEACHOR E, 2005. TCP Performance Estimation Using Neural Networks Modelling In: Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece.
KATSABAS D, FURNELL SM and HASKELL-DOWLAND PS (DOWLAND PS), 2005. Using Human Computer Interaction principles to promote usable security In: Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece.
FURNELL SM and CLARKE NL, 2005. Organisational Security Culture: Embedding Security Awareness, Education and Training In: Proceedings of the 4th World Conference on Information Security Education WISE 2005, 18-20 May, Moscow, Russia.
RUIZ VC, FURNELL SM, PHIPPEN AD, HASKELL-DOWLAND PS (DOWLAND PS), STENGEL I and BLEIMANN U, 2005. Identifying the security requirements for virtual university environments In: Proceedings of the Fourth Security Conference 2005.
CHARRUAU D, FURNELL SM and HASKELL-DOWLAND PS (DOWLAND PS), 2005. PassImages : an alternative method of user authentication In: Proceedings of the ISOneWorld 2005, Las Vegas, USA, 30 March - 1 April.
FURNELL, S, 2004. Qualified to help: In search of the skills to ensure security COMPUTER FRAUD & SECURITY. 10-14
KARWENI, T, FURNELL, SM and GAUNT, N, 2004. Patient consent advisory system EUROMEDIA '2004: 10th Annual Euromedia Conference. 133-137
PHYO, AH and FURNELL, S, 2004. A conceptual framework for monitoring insider misuse EUROMEDIA '2004: 10TH ANNUAL EUROMEDIA CONFERENCE. 90-95
DOWLAND, PS and FURNELL, SM, 2004. A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS. 147, 275-289
PHYO, AH, FURNELL, SM and PORTILLA, F, 2004. A framework for role-based monitoring of insider misuse INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY. 148, 51-65 SCHILKE, SW, BLEIMANN, U, FURNELL, SM and PHIPPEN, AD, 2004. Multi-dimensional-personalisation for location and interest-based recommendation INTERNET RESEARCH. 14(5), 379-385 FURNELL, S, 2004. Enemies within: the problem of insider attacks COMPUTER FRAUD & SECURITY. 6-11
FRANK LAND, HELGA DRUMMOND, PHILIP VOS FELLMAN, ROBERTO RODRIGUEZ, STEVEN FURNELL and PRODROMOS TSIAVOS, 2004. The Darker Side of Innovation In: IT Innovation for Adaptability and Competitiveness, edited proceedings of the Seventh Working Conference on IT Innovation for Adaptability and Competitiveness, IFIP WG 8.6, Intel Corporation, Leixlip, Ireland, May-June 2004. 465-466 VASSILIS DIMOPOULOS, STEVEN FURNELL, MURRAY E. JENNEX and IOANNIS KRITHARAS, 2004. Approaches to IT Security in Small and Medium Enterprises In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004. 73-82
ANDREW D. PHIPPEN, L. SHEPPARD and STEVEN FURNELL, 2004. A practical evaluation of Web analytics Internet Res.. 14(4), 284-293 STEVEN FURNELL, I. PAPADOPOULOS and PAUL DOWLAND, 2004. A long-term trial of alternative user authentication technologies Inf. Manag. Comput. Secur.. 12(2), 178-190 FURNELL SM and WARD J, 2004. Malware comes of age: The arrival of the true computer parasite Network Security. October, pp11-15,
FURNELL SM and BOLAKIS S, 2004. Helping us to help ourselves: assessing administrators? use of security analysis tools Network Security. February, pp12-15,
PHYO AH, FURNELL SM and IFEACHOR E, 2004. A Framework for Monitoring Insider Misuse of IT Applications In: Proceedings of the ISSA 2004 Enabling Tomorrow Conference, South Africa, 30 June-2 July.
PAPADAKI M and FURNELL SM, 2004. Automating the process of intrusion response In: Proceedings of the 5th Australian Information Warfare Security Conference, Perth, Australia, 25-26 November.
THAKUR A, LINES BL, REYNOLDS PL, KNAHL MH and FURNELL SM, 2004. Optimising Video Layers to the Available Bandwidth Based for Packet Networks In: Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004.
SCHILKE SW, BLEIMANN U, FURNELL SM and PHIPPEN AD, 2004. Multi-Dimensional-Personalisation for the online and offline world In: Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004.
ALAYED A, FURNELL SM, ZHAO D, BARLOW I and TOMLINSON M, 2004. Architectural specifications and design for an automated vulnerability resolver In: Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004.
SINGH H, FURNELL SM, HASKELL-DOWLAND PS (DOWLAND PS), LINES BL and KAUR S, 2004. A Correlation Framework for Continuous User Authentication Using Data Mining In: Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004.
DIMOPOULOS V, FURNELL SM, BARLOW I and LINES BL, 2004. Factors affecting the adoption of IT risk analysis In: The 3rd European Conference on Information Warfare and Security Royal Holloway, University of London, UK, 28-29 June.
PREUSS J, FURNELL SM and LEA S, 2004. The Adoption of Criminal Profiling for Computer Crime In: EICAR 2004 Conference CD-rom: Best Paper Proceedings.
DIMOPOULOS V, FURNELL SM, BARLOW I and LINES BL, 2004. Using protection profiles to simplify risk management In: The Security Conference, April 14/15, Las Vegas, USA.
CLARKE NL, FURNELL SM, LINES BL and REYNOLDS PL, 2004. Application of Keystroke Analysis to Mobile Text Messaging In: Proceedings of the 3rd Security Conference, Las Vegas, USA, 14-15 April.
DIMOPOULOS, V, FLETCHER, J and FURNELL, SM, 2003. Evaluating the reliability of commercially available biometric devices EUROMEDIA '2003: 8th Annual Euromedia Conference. 166-174
NATHAN L. CLARKE, STEVEN FURNELL, BENN LINES and PAUL L. REYNOLDS, 2003. Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets In: Security and Privacy in the Age of Uncertainty, IFIP TC11 18(^mboxth) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece. 97-108
STEVEN FURNELL, ALASTAIR G. WARREN and PAUL DOWLAND, 2003. Improving Security Awareness Through Computer-based Training In: Security Education and Critical Infrastructures, IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3), June 26-28, 2003, Monterey, California, USA. 287-301
STEVEN FURNELL and AUNG HTIKE PHYO, 2003. Considering the Problem of Insider IT Misuse Australas. J. Inf. Syst.. 10(2), NATHAN L. CLARKE, STEVEN FURNELL, BENN LINES and PAUL L. REYNOLDS, 2003. Keystroke dynamics on a mobile handset: a feasibility study Inf. Manag. Comput. Secur.. 11(4), 161-166 MARIA PAPADAKI, STEVEN FURNELL, BENN LINES and PAUL L. REYNOLDS, 2003. Operational Characteristics of an Automated Intrusion Response System In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings. 65-75 MUED L, LINES BL, FURNELL SM and REYNOLDS PL, 2003. The Effects of Audio and Video Correlation and Lip Synchronization Campus Wide Information Systems. vol. 20, no. 4, pp. 159-166,
GHITA BV, FURNELL SM, LINES BL and IFEACHOR E, 2003. Endpoint study of Internet paths and web pages transfers Campus Wide Information Systems. vol. 20, no. 3, pp90-97,
EVANS MP and FURNELL SM, 2003. A Model for Monitoring and Migrating Web Resources Campus Wide Information Systems. vol. 2, no. 2, pp67-74, DIMOPOULOS V, FURNELL SM and BARLOW I, 2003. Considering IT Risk Analysis in Small and Medium Enterprises In: Proceedings of the 1st Australian Information Security Management Conference 2003 (InfoSec03), Perth, Australia, 24 November.
MUED L, LINES BL and FURNELL SM, 2003. Interpolation of Packet Loss and Lip Sync Error on IP Media In: Proceedings Volume V, International Conference on Computer, Communication and Control Technologies (CCCT?03), Orlando, USA, 31 July - 2 August.
MUED L, LINES BL, FURNELL SM and REYNOLDS PL, 2003. The Effects of Lip Synchronization in IP Conferencing In: Proceedings of the International Conference on Visual Information Engineering ? VIE 2003, University of Surrey, UK, 7-9 July.
FURNELL SM, WARREN A and HASKELL-DOWLAND PS (DOWLAND PS), 2003. Improving Security Awareness And Training Through Computer-Based Training In: Proceedings of the WISE Conference, Monterey, USA, July.
FINCH J, FURNELL SM and HASKELL-DOWLAND PS (DOWLAND PS), 2003. Assessing IT Security Culture: System Administrator and End-User In: Proceedings of ISOneWorld Conference 2003, Las Vegas, USA, April 23-25.
PAUL DOWLAND, STEVEN FURNELL and MARIA PAPADAKI, 2002. Keystroke Analysis as a Method of Advanced User Authentication and Response In: Security in the Information Society: Visions and Perspectives, IFIP TC11 17(^mboxth) International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt. 215-226
A. ALAYED, STEVEN FURNELL and I. M. BARLOW, 2002. Addressing Internet Security Vulnerabilities: A Benchmarking Study In: Security in the Information Society: Visions and Perspectives, IFIP TC11 17(^mboxth) International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt. 121-132
CHUKWUMA U. NGINI, STEVEN FURNELL and BOGDAN V. GHITA, 2002. Assessing the global accessibility of the Internet Internet Res.. 12(4), 329-338 NATHAN L. CLARKE, STEVEN FURNELL, P. M. RODWELL and PAUL L. REYNOLDS, 2002. Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices Comput. Secur.. 21(3), 220-228 I. IRAKLEOUS, STEVEN FURNELL, PAUL DOWLAND and MARIA PAPADAKI, 2002. An experimental comparison of secret-based user authentication technologies Inf. Manag. Comput. Secur.. 10(3), 100-108 GEORGE MAGKLARAS and STEVEN FURNELL, 2002. Insider Threat Prediction Tool: Evaluating the probability of IT misuse Comput. Secur.. 21(1), 62-73 PAPADAKI M, FURNELL SM, LEE SJ, LINES BL and REYNOLDS PL, 2002. Enhancing Response in Intrusion Detection Systems Journal of Information Warfare. vol. 2, no. 1, pp90-102,
FURNELL SM, GENNATOU M and HASKELL-DOWLAND PS (DOWLAND PS), 2002. A prototype tool for information security awareness and training International Journal of Logisitics Information Management. vol. 15, no. 5, pp352-357,
CLARKE NL, FURNELL SM and REYNOLDS PL, 2002. Biometric Authentication for Mobile Devices In: Proceedings of the 3rd Australian Information Warfare and Security Conference, Perth, Western Australia, 28-29 November 2002.
FURNELL SM and PHYO AH, 2002. Watching your own: The problem of insider IT misuse In: Proceedings of AiCE 2002 ? Third Australian Institute of Computer Ethics Conference, Sydney, Australia, 30 September 2002.
MUED L, LINES BL, FURNELL SM and REYNOLDS PL, 2002. Investigating Interaction of Audio and Video Quality as Perceived in Low-Cost Multimedia Conferencing Systems In: Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July 2002.
EVANS MP and FURNELL SM, 2002. WebRUM: A Model for Measuring Web-Wide Resource Usage In: Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July 2002.
FURNELL SM, ALAYED A, BARLOW I and HASKELL-DOWLAND PS (DOWLAND PS), 2002. Critical awareness ? The problem of monitoring security vulnerabilities In: Proceedings of European Conference on Information Warfare and Security, 8-9 July 2002, Brunel, UK.
CLARKE NL, FURNELL SM, REYNOLDS PL and RODWELL PM, 2002. Advanced Subscriber Authentication Approaches For Third Generation Mobile Systems In: Proceedings of the Third International Conference on 3G Mobile Communication Technologies, London, UK, 8-10 May.
KNAHL MH, BLEIMANN U, FURNELL SM and HOFMANN HD, 2002. An Integrated Network and System Management Framework based on Adapted Software Components In: Proceedings of Euromedia 2002, Modena, Italy, 15-17 April.
HARJIT SINGH, STEVEN FURNELL, BENN LINES and PAUL DOWLAND, 2001. Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining In: Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings. 153-158 STEVEN FURNELL, MARIA PAPADAKI, GEORGE MAGKLARAS and A. ALAYED, 2001. Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks In: Advances in Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA. 87-98
BOGDAN V. GHITA, STEVEN FURNELL, BENN LINES, D. LE-FOLL and EMMANUEL C. IFEACHOR, 2001. Network quality of service monitoring for IP telephony Internet Res.. 11(1), 26-34 STEVEN FURNELL, PELAGIA CHILIARCHAKI and PAUL DOWLAND, 2001. Security analysers: administrator assistants or hacker helpers? Inf. Manag. Comput. Secur.. 9(2), 93-101 MICHAEL P. EVANS and STEVEN FURNELL, 2001. The Resource Locator Service: fixing a flaw in the web Comput. Networks. 37(3/4), 307-330 FURNELL SM, EVANS MP and BAILEY P, 2001. The promise of Online Distance Learning: Addressing academic and institutional concerns Quarterly Review of Distance Education. vol. 1, no. 4, pp281-291,
EVANS MP and FURNELL SM, 2001. The Resource Locator Service: Fixing a Flaw in the Web Computer Networks. vol. 37, no 3-4, November, HASKELL-DOWLAND PS (DOWLAND PS), SINGH H and FURNELL SM, 2001. A Preliminary Investigation of User Authentication Using Continuous Keystroke Analysis In: Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas.
MUED L, LINES BL, FURNELL SM and REYNOLDS PL, 2001. Performance Evaluation of Desktop Videoconferencing In: Proceedings of PG Net 2001 ? 2nd Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK.
GHITA BV, LINES BL, FURNELL SM and IFEACHOR E, 2001. Non-intrusive IP Network Performance Monitoring for TCP Flows In: Proceedings of IEEE ICT2001, Bucharest, Romania.
RODWELL PM, FURNELL SM and REYNOLDS PL, 2001. A Conceptual Security Framework to support Continuous Subscriber Authentication in Third Generation Mobile Networks In: Proceedings of Euromedia 2001, Valencia, Spain.
PHIPPEN AD, FURNELL SM and HOFMANN HD, 2001. Practitioner Perception of Component Based Software Development In: Proceedings of Euromedia 2001, Valencia, Spain.
JOYCE EM, FURNELL SM, REYNOLDS PL and SANDERS P, 2001. CORBA middleware services - Are they secure? In: Proceedings of Euromedia 2001, Valencia, Spain.
FURNELL SM, MAGKLARAS GB, PAPADAKI M and HASKELL-DOWLAND PS (DOWLAND PS), 2001. A Generic Taxonomy for Intrusion Specification and Response In: Proceedings of Euromedia 2001, Valencia, Spain.
FURNELL, SM, DOWLAND, PS, ILLINGWORTH, HM and REYNOLDS, PL, 2000. Authentication and supervision: A survey of user attitudes COMPUTERS & SECURITY. 19(6), 529-539
EVANS, MP and FURNELL, SM, 2000. Internet-based security incidents and the potential for false alarms INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY. 10(3), 238-245 STEVEN FURNELL and PAUL DOWLAND, 2000. A conceptual architecture for real-time intrusion monitoring Inf. Manag. Comput. Secur.. 8(2), 65-75 FURNELL SM, GENNATOU M and HASKELL-DOWLAND PS (DOWLAND PS), 2000. Promoting security awareness and training within small organisations In: Proceedings of the First Australian Information Security Management (AISM) Workshop, Geelong, Australia.
KNAHL MH, BLEIMANN U, HOFMANN HD and FURNELL SM, 2000. An Integrated Management Architecture for Heterogeneous Networks: INSMware In: Proceedings of the IEEE Workshop on IP-oriented Operations and Management (IPOM '2000), Cracow, Poland.
KNAHL MH and FURNELL SM, 2000. Management of Service Level Agreements using INSMware In: Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK.
ORD T and FURNELL SM, 2000. User authentication for keypad-based devices using keystroke analysis In: Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK.
GHITA BV, FURNELL SM, LINES BL, LE FOLL D and IFEACHOR E, 2000. IP Networks Performance Monitoring of Voice Flows for IP Telephony In: Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK.
RODWELL PM, FURNELL SM and REYNOLDS PL, 2000. Non-intrusive security requirements for third generation mobile systems In: Proceedings of PG Net 2000 ? 1st Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK.
FURNELL SM, EVANS MP and HASKELL-DOWLAND PS (DOWLAND PS), 2000. Developing tools to support online distance learning In: Proceedings of EUROMEDIA 2000, Antwerp, Belgium.
EVANS, MP, PHIPPEN, AD, MUELLER, G, FURNELL, SM, SANDERS, PW and REYNOLDS, PL, 1999. Strategies for content migration on the World Wide Web INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY. 9(1), 25-34 FURNELL S, GRITZALIS D, KATSIKAS S, MAVROUDAKIS K, SANDERS P and WARREN M, 1999. Methods of responding to healthcare security incidents. Studies in health technology and informatics. 52 Pt 2, 1138-42
STEVEN FURNELL, PAUL DOWLAND and PETER W. SANDERS, 1999. Dissecting the 'Hacker Manifesto' Inf. Manag. Comput. Secur.. 7(2), 69-75 PAUL DOWLAND, STEVEN FURNELL, H. M. ILLINGWORTH and PAUL L. REYNOLDS, 1999. Computer crime and abuse: A survey of public attitudes and awareness Comput. Secur.. 18(8), 715-726 WARREN MJ, FURNELL SM and SANDERS P, 1999. A new approach towards security training and awareness amongst the Healthcare Community Informatics in Healthcare Australia. vol. 8, no. 1, pp20-26,
FURNELL SM and WARREN MJ, 1999. Computer Hacking and Cyber Terrorism: The real threats in the new millenium? Computers & Security. vol. 18, no. 1, pp28-34,
FURNELL SM, EVANS MP, PHIPPEN AD and ABU-RGHEFF MA, 1999. Online Distance Learning: Expectations, Requirements and Barriers Virtual University Journal. vol. 2, no. 2,
WARREN MJ and FURNELL SM, 1999. Cyber Terrorism: The Political Evolution of the Computer Hacker In: Proceedings of Australian Institute of Computer Ethics Conference 1999 (AICEC99), Melbourne, Australia.
REYNOLDS PL, FURNELL SM, EVANS MP and PHIPPEN AD, 1999. A Hyper Graphics Markup Language for optimising WWW access in wireless networks In: Proceedings of Euromedia 99, Munich, Germany.
FURNELL SM, BLEIMANN U, GIRSANG J, RÖDER HF, SANDERS P and STENGEL I, 1999. Security considerations in online distance learning In: Proceedings of Euromedia 99, Munich, Germany.
STEVEN FURNELL, P. D. ONIONS, MARTIN KNAHL, PETER W. SANDERS, UDO BLEIMANN, U. GOJNY and H. F. R'ODER, 1998. A security framework for online distance learning and training Internet Res.. 8(3), 236-242 FURNELL SM, DAVEY J, GAUNT PN, LOUWERSE CP, MAVROUDAKIS K and TREACHER AH, 1998. The ISHTAR guidelines for healthcare security Health Informatics Journal. vol.4, no. 3/4, pp179-183,
KNAHL MH, BLEIMANN U, FURNELL SM and SANDERS P, 1998. Integration of ATM Management Procedures into Native Integrated Network and System Management Architectures In: Proceedings of the first International Network Conference 1998 (INC 98), Plymouth, UK.
EVANS MP, PHIPPEN AD, MÜLLER G, FURNELL SM, SANDERS P and REYNOLDS PL, 1998. Content Migration on the World Wide Web In: Proceedings of the first International Network Conference 1998 (INC 98), Plymouth, UK.
WARREN MJ and FURNELL SM, 1998. Electronic Commerce : Winners and Losers In: Proceedings of the first International Network Conference 1998 (INC 98), Plymouth, UK.
EVANS MP, FURNELL SM, PHIPPEN AD and REYNOLDS PL, 1998. Mobility Considerations for integrated Telecommunications Service Environments In: Proceedings of IEE Sixth International Conference on Telecommunications, Edinburgh, UK.
PHIPPEN AD, HINDLE C, FURNELL SM and SANDERS P, 1998. A Software Platform for the Integration of a Mobile Client to Intranet Services In: Proceedings of Euromedia 98, Leicester, UK.
MATTHEW J. WARREN, STEVEN FURNELL and PETER W. SANDERS, 1997. ODESSA - a new approach to healthcare risk analysis In: Information Security in Research and Business, Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC '97), 14-16 May 1997, Copenhagen, Denmark. 391-402
MICHAEL P. EVANS, KIMMO T. KETTUNEN, GRAHAME K. BLACKWELL, STEVEN FURNELL, ANDREW D. PHIPPEN, STEPHEN HOPE and PAUL L. REYNOLDS, 1997. Network Resource Adaptation in the DOLMEN Service Machine In: Intelligence in Services and Networks: Technology for Cooperative Competition, Fourth International Conference on Intelligence and Services in Networks, IS&N'97, Cernobbio, Italy, May 27-29, 1997, Proceedings. 25-34 STEVEN M. FURNELL and MATTHEW J. WARREN, 1997. Computer abuse: vandalizing the information society Internet Res.. 7(1), 61-66 LILJEBERG M, EVANS MP, FURNELL SM, MAUMON N, RAATIKAINEN K, VELDKAMP E, WIND BCF and TRIGILA S, 1997. Using CORBA to Support Terminal Mobility In: Proceedings of TINA 97 Conference, Santiago, Chile.
LILJEBERG M, FURNELL SM, RAATIKAINEN K, FURNELL SM, LILJEBERG M, FURNELL SM, RAATIKAINEN K and FURNELL SM, 1997. Internet information browsing using GSM data communications : A benchmarking study In: Proceedings of ACTS Mobile Communication Summit 97, Aalborg, Denmark.
FURNELL SM, ILLINGWORTH HM, KATSIKAS SK, REYNOLDS PL and SANDERS P, 1997. A comprehensive authentication and supervision architecture for networked multimedia systems In: Proceedings of IFIP CMS 97, Athens, Greece.
EVANS MP, PHIPPEN AD, FURNELL SM and REYNOLDS PL, 1997. Resource Adaptation in the TINA Service Environment In: Proceedings of Fourth Communications Networks Symposium, Manchester, UK.
FURNELL SM, GAUNT PN, HOLBEN RF, SANDERS PW, STOCKEL CT and WARREN MJ, 1996. Assessing staff attitudes towards information security in a European healthcare establishment. Medical informatics = Medecine et informatique. 21(2), 105-12 FURNELL S, SANDERS P and WARREN M, 1996. Addressing information security training and awareness within the European healthcare community. Studies in health technology and informatics. 43 Pt B, 707-11
STEVEN M. FURNELL and PETER W. SANDERS, 1996. The SEISMED Guidelines for Host Systems Security. In: BARRY BARBER, ALISON TREACHER and C. P. LOUWERSE, eds., Towards Security in Medical Telematics - Legal and Technical Aspects 27. IOS Press. 150-155 STEVEN FURNELL, JOSEPH P. MORRISSEY, PETER W. SANDERS and COLIN T. STOCKEL, 1996. Applications of keystroke analysis for improved login security and continuous user authentication In: Information Systems Security, Facing the information society of the 21st Century. 283-294
STEVEN FURNELL, NICHOLA JANE SALMONS, PETER W. SANDERS, COLIN T. STOCKEL and MATTHEW J. WARREN, 1996. Approaches to Security in Healthcare Multimedia Systems In: Communications and Multimedia Security II, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen, Germany, 23-24 September 1996. 25-36
FURNELL SM and WARREN MJ, 1996. Computer abuse : Vandalising the information society Internet Research. vol. 7, no.1, pp61-66,
FURNELL SM, HILL D, ROSEWALL I and WARREN MJ, 1996. A Telematics Security Training Application In: Proceedings of EUROMEDIA 96, London, UK.
JOYCE EM, FURNELL SM, REYNOLDS PL and SANDERS P, 1996. Addressing security in an Integrated Service Engineering environment In: Proceedings of EUROMEDIA 96, London, UK.
FURNELL SM, GREEN M, HOPE S, MORRISSEY JP and REYNOLDS PL, 1996. Non-Intrusive Security Arrangements to support Terminal and Personal Mobility In: Proceedings of EUROMEDIA 96, London, UK.
SALMONS NJ, FURNELL SM, SANDERS P, STOCKEL CT and WARREN MJ, 1996. POSEIDON - A Composite Multimedia Hospital Patient Records System In: Proceedings of Toward An Electronic Health Record Europe ?96, London, UK.
WARREN MJ, FURNELL SM and SANDERS P, 1996. ODESSA - Intelligent Healthcare Security Risk Assessment In: Proceedings of 2nd International Conference on Neural Networks and Expert Systems in Medicine and Healthcare (NNESMED 96), Plymouth, UK.
FURNELL SM and SANDERS P, 1996. The SEISMED Guidelines for Host Systems Secuirty In: Towards Security in Medical Telematics: Legal and Technical Aspects, B.Barber et al. (Eds).
FURNELL SM and SANDERS PW, 1995. The SEISMED guidelines for host systems security. Studies in health technology and informatics. 27, 150-5
FURNELL SM, SANDERS PW and WARREN MJ, 1995. Development of security guidelines for existing healthcare systems. Medical informatics = Medecine et informatique. 20(2), 139-48 FURNELL SM and SANDERS PW, 1995. Security management in the healthcare environment. Medinfo. MEDINFO. 8 Pt 1, 675-8
FURNELL SM, SANDERS P and STOCKEL CT, 1995. The use of Simulation in Computer-based Security Systems In: Proceedings of SCSC ?95 - 1995 Summer Computer Simulation Conference, Ottawa, Canada.
FURNELL SM, SANDERS P and STOCKEL CT, 1995. The use of Keystroke Analysis for Continuous User Identity Verification and Supervision In: Proceedings of MEDIACOMM 95 - International Conference on Multimedia Communications, Southampton, UK.
SALMONS NJ, FURNELL SM, SANDERS P and STOCKEL CT, 1995. Simulation of a multimedia patient records system In: Proceedings of SCSC ?95 - 1995 Summer Computer Simulation Conference, Ottawa, Canada.
FURNELL SM, GAUNT PN, PANGALOS G, SANDERS PW and WARREN MJ, 1994. A generic methodology for health care data security. Medical informatics = Medecine et informatique. 19(3), 229-45 FURNELL SM, SANDERS P and STOCKEL CT, 1994. An Expert System for Health Care Data Security : A Conceptual Outline In: Proceedings of NNESMED 94 - International Conference on Neural Networks & Expert Systems in Medicine and Healthcare, Plymouth, England.
SANDERS P and FURNELL SM, 1993. Data Security in Medical Information Systems using a Generic Model In: Proceedings of MIE ?93 - 11th International Congress of the European Federation for Medical Informatics, Jerusalem, Israel.