Follow

Submissions from 2019

Link

Securing cloud storage by transparent biometric cryptography, Leith Abed, Nathan Clarke, Bogdan Ghita, and Abdulrahman Alruban

Link

Intelligent big data summarization for rare anomaly detection, Mohiuddin Ahmed

Link

A novel behaviour profiling approach to continuous authentication for mobile applications, Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, and Nathan Clarke

Link

Physical activity recognition by utilising smartphone sensor signals, Abdulrahman Alruban, Hind Alobaidi, Nathan Clarke, and Fudong Li

Link

Secure smart contract supply chains, Richard Greene and Michael N. Johnstone

Link

Security and privacy based access control model for internet of connected vehicles, Muhammad Asif Habib, Mudassar Ahmad, Sohail Jabbar, Shehzad Khalid, Junaid Chaudhry, Kashif Saleem, Joel J.P.C. Rodrigues, and Muhammad Sayim Khalil

Link

Identification and extraction of digital forensic evidence from multimedia data sources using multi-algorithmic fusion, Shahlaa Mashhadani, Nathan Clarke, and F. Li

PDF

Integration of biometrics and steganography: A comprehensive review, Ian McAteer, Ahmed Ibrahim, Guanglou Zhang, Wencheng Yang, and Craig Valli

PDF

Forensic Analysis of the Nintendo 3DS NAND, Gus Pessolano, Huw O. L. Read, Iain Sutherland, and Konstantinos Xynos

Link

Towards a method for detecting botnet code on IoT devices, Ashley Woodiss-Field and Michael N. Johnstone

PDF

A cancelable iris- and steganography-based user authentication system for the Internet of Things, Wencheng Yang, Song Wang, Jiankun Hu, Ahmed Ibrahim, Guanglou Zhang, Marcelo Jose Macedo, Michael N. Johnstone, and Craig Valli

PDF

Security and accuracy of fingerprint-based biometrics: A review, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zhang, and Craig Valli

Link

Securing deep learning based edge finger-vein biometrics with binary decision diagram, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zhang, Jucheng Yang, and Craig Valli

Link

A privacy-preserving lightweight biometric system for internet of things security, Wencheng Yang, Song Wang, Guanglou Zheng, Jucheng Yang, and Craig Valli

Link

Fingerprint access control for wireless insulin pump systems using cancelable Delaunay triangulations, Guanglou Zhang, Wencheng Yang, Craig Valli, Rajan Shankaran, Haider Abbas, Guanghe Zhang, Gengfa Fang, Junaid Chaudhry, and Li Qiao

Submissions from 2018

Link

Risk analysis of cloud sourcing in healthcare and public health industry, Hina Abrar, Syed Jawad Hussain, Junaid Chaudhry, Kashif Saleem, Mehmet A. Orgun, Jalal Al-Muhtadi, and Craig Valli

Link

Misuse detection in a simulated IaaS environment, Burhan Al-Bayati, Nathan Clarke, Paul Dowland, and Fudong Li

PDF

A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems, Jalal Al-Muhtadi, Ma Qiang, Khan Zeb, Junaid Chaudhry, Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Rajan Shankaran, Muhammad Imran, and Maruf Pasha

PDF

The design and evaluation of a user-centric information security risk assessment and response framework, Manal Alohali, Nathan Clarke, and Steven Furnell

Link

Information security behavior: Recognizing the influencers, Manal Alohali, Nathan Clarke, Steven Furnell, and Saad Albakri

Link

Identifying and predicting the factors affecting end-users’ risk-taking behavior, Manal Alohali, Nathan Clarke, Fudong Li, and Steven M. Furnell

Link

An analysis of home user security awareness & education, Fayez Alotaibi, Nathan Clarke, and Steven Furnell

Link

Enhancing cyber security awareness with mobile games, F. Alotaibi, Steven Furnell, I Stengel, and M. Papadaki

Link

A console GRID leveraged authentication and key agreement mechanism for LTE/SAE, Rajakumar Arul, Gunasekaran Raja, Ali K. Bashir, Junaid Chaudry, and Amjad M. Ali

PDF

Muscle activity-driven green-oriented random number generation mechanism to secure WBSN wearable device communications, Yuanlong Cao, Guanghe Zhang, Fanghua Liu, Ilsun You, Guanglou Zheng, Oluwarotimi W. Samuel, and Shixiong Chen

Link

Enabling technologies for post market surveillance of medical devices, Junaid Chaudhry, Ali Kashif Bashir, Syed Hassan Ahmed, Jon Haas, and Guanglou Zheng

Link

Internet of Things (IoT): Research, simulators, and testbeds, Maxim Chernyshev, Zubair Baig, Oladayo Bello, and Sherali Zeadally

Link

A novel approach for face recognition using fused GMDH-based networks, El-Sayed El-Alfy, Zubair Baig, and Radwan Abdel-Aal

Link

Transparent authentication: Utilising heart rate for user authentication, Timibloudi S. Enamamu, Nathan Clarke, Paul Haskell-Dowland Dr, and Fudong Li

Link

Assessing website password practices – over a decade of progress?, Steven Furnell

Link

Design principles and guidelines for targeted security awareness, Najem Mahmoud, Steven Furnell, and Paul Haskell-Dowland

Link

A novel multimedia-forensic analysis tool (M-FAT), Shahlaa Mashhadani, Hiba Al-kawaz, Nathan Clarke, Steven Furnell, and Fudong Li

Link

Modelling and evaluation of malicious attacks against the IoT MQTT protocol, Naeem Firdous Syed, Zubair Baig, Craig Valli, and Ahmed Ibrahim

PDF

Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy, Van Nhan Vo, Tri Gia Nguyen, Chakchai So-In, Zubair Ahmed Baig, and Surasak Sanguanpong

PDF

Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Junaid Chaudhry, Erwin Adi, and Craig Valli

PDF

Impact of feature proportion on matching performance of multi-biometric systems, Wencheng Yang, Song Wang, Guanglou Zheng, and Craig Valli

Link

A critical analysis of ECG-based key distribution for securing wearable and implantable medical devices, Guanglou Zheng, Rajan Shankaran, Wencheng Yang, Craig Valli, Li Qiao, Mehmet A. Orgun, and Subhas Chandra Mukhopadhyay

Link

Finger-to-Heart(F2H): Authentication for wireless implantable medical devices, Guanglou Zheng, Wencheng Yang, Craig Valli, Li Qiao, Rajan Shankaran, Mehmet A. Orgun, and Subhas Chandra Mukhopadhyay

Submissions from 2017

Link

A method to enhance the accuracy of digital forensic in the absence of sufficient evidence in Saudi Arabia, Fahad Alanazi and Andy Jones

Link

Unobtrusive gait recognition using smartwatches, Neamah Al-Naffakh, Nathan Clarke, Fudong Li, and Paul Haskell-Dowland Dr

Link

A survey of cyber-security awareness in Saudi Arabia, Faisal Mohamed Alotaibi, Steven Furnell, Ingo Stengel, and Maria Papadaki

Link

Information security policies: A review of challenges and influencing factors, Mutlaq Alotaibi, Steven Furnell, and Nathan Clarke

Link

User profiling from network traffic via novel application-level interactions, Gaseb Alotibi, Nathan Clarke, Fudong Li, and Steven Furnell

Link

Internet risks for children: Parents' perceptions and attitudes an investigative study of the Saudi context, Norah Alqahtani, Steven Furnell, Shirley Atkinson, and Ingo Stengel

Link

A forensic acquisition based upon a cluster analysis of non-volatile memory in IaaS, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christoph Reich

Link

Insider misuse attribution using biometrics, Abdulrahman Alruban, Nathan Clarke, Fudong Li, and Steven M. Furnell

Link

Future challenges for smart cities: Cyber-security and digital forensics, Zubair A. Baig, Patryk Szewczyk, Craig Valli, Priya N. Rabadia, Peter Hannay, Maxim Chernyshev, Michael N. Johnstone, Paresh Kerai, Ahmad Ibrahim, Krishnun Sansurooah, Naeem Syed, and Matthew Peacock

Link

The effectiveness of classification algorithms on IPv6 IID construction, Clinton Carpene, Michael N. Johnstone, and Andrew Woodward

Enhancements in data-recovery and re-transmit mechanisms of transmission control protocol enabled medical devices, Junaid Chaudhry, Mudassar Ahmad, Muhammad Asif Habib, Rehan Ashraf, and Craig Valli

Data security among ISO/IEEE 11073 compliant personal healthcare devices through statistical fingerprinting, Junaid Chaudhry, Uvais Qidwai, Mahdi H. Miraz, Ahmed Ibrahim, and Craig Valli

Link

AZSPM: autonomic zero-knowledge security provisioning model for medical control systems in fog computing environments, Junaid Chaudhry, Kashif Saleem, Rafiqul Islam, Ali Selamat, Mudassar Ahmad, and Craig Valli

Link

Revisiting urban war nibbling: Mobile passive discovery of Classic Bluetooth devices using Ubertooth One, Maxim Chernyshev, Craig Valli, and Michael Johnstone

PDF

Insider misuse identification using transparent biometrics, Nathan Clarke, Fudong Li, Abdulrahman Alruban, and Steven Furnell

Link

Smart watch based body-temperature authentication, Timibloudi S. Enamamu, Nathan Clarke, Paul Haskell-Dowland, and Fudong Li

Link

Climate control systems for public safety in smart cars, Sajida Imran, Ali Kashif Bashir, and Junaid Chaudhry

Link

Jurisdictional issues in cloud forensics, M. James and Patryk Szewczyk

Link

Towards targeted security awareness raising, Najem Mahmoud, Steven Furnell, and Paul Haskell-Dowland

Link

A bio-inspired secure IPv6 communication protocol for Internet of Things, Kashif Saleem, Junaid Chaudhry, Mehmet A. Orgun, and Jalal Al-Muhtadi

PDF

Broadband router security: History, challenges and future implications, Patryk Szewczyk and Rose Macdonald

Link

An analysis of unauthorized wireless network usage in Western Australia, P. Szewczyk, D. Blackman, and K. Sansurooah

Link

Cybersecurity for wireless implants, Guanglou Zheng, Rajan Shankaran, and Craig Valli

Submissions from 2016

Link

Distributed denial-of-service attacks against HTTP/2 services, Erwin Adi, Zubair A. Baig, Philip Hingston, and Chiou-Peng Lam

Link

Adaptive behavioral profiling for identity verification in cloud computing: A model and preliminary analysis, Burhan Al-Bayati, Nathan Clarke, and Paul Dowland

Link

A suspect-oriented intelligent and automated computer forensic analysis, M. Al Fahdi, Nathan L. Clarke, Fudong Li, and St4even M. Furnell

Link

A framework for understanding and assessing the core capability of a digital forensics organisation, Ahmed Almarzooqi and Andrew Jones

PDF

Applying grounded theory methods to digital forensics research, Ahmed Almarzooqi and Andrew Jones

Link

Activity recognition using wearable computing, Neamah Al-Naffakh, Nathan Clarke, Paul Dowland, and Fudong Li

Link

A Novel Taxonomy for Mobile Applications Data, Saud Alotaibi, Steven Furnell, and Nathan Clarke

Link

Transparent authentication systems for mobile device security: A review, Saud Alotaibi, Steven Furnell, and Nathan Clarke

Link

A forensic acquisition and analysis system for IaaS: Architectural model and experiment, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christoph Reich

Link

A review of graphical authentication utilising a keypad input method, H. Alsaiari, M. Papadaki, P.S. Dowland, and Steven Furnell

PDF

Controlled access to cloud resources for mitigating economic denial of sustainability (EDoS) attacks, Zubair A. Baig, Sadiq M. Sait, and Farid Binbeshr

Link

On 802.11 access point locatability and named entity recognition in service set identifiers, Maxim Chernyshev, Craig Valli, and Peter Hannay

Link

Information security and practice: The user's perspective, Nathan Clarke, Fudong Li, Steven Furnell, Ingo Stengel, and Giorgio Ganis

Link

Protecting corporate intellectual property: Legal and technical approaches, Michael G. Crowley and Michael N. Johnstone

Link

Vulnerability management: Not a patch on where we should be?, Steve Furnell

Link

Timestamp analysis for quality validation of network forensic data, Nikolai Hampton and Zubair A. Baig

Link

Information security and digital forensics in the world of cyber physical systems, Andrew Jones, Stilianos Vidalis, and Nasser Abouzakhar

PDF

An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data, Hussam Mohammed, Nathan Clarke, and Fudong Li

Link

A comparison study of wireless network security in several Australasian cities and suburbs, Alastair Nisbet and Andrew Woodward

Link

Awareness, behaviour and culture: The ABC in cultivating security compliance, Emad Sherif, Steven Furnell, and Nathan Clarke

Link

Extracting intelligence from digital Forensic artefacts, Stilianos Vidalis, Olga Angelopoulou, and Andy Jones

Submissions from 2015

Link

Security, privacy and usability – a survey of users’ perceptions and attitudes, Abdulwahid Al Abdulwahid, Nathan Clarke, Ingo Stengel, Steven Furnell, and Christopher Reich

Link

A survey of continuous and transparent multibiometric authentication systems, A. Al Abdulwahid, Nathan Clarke, I. Stengel, and Steven Furnell

Link

Deception in the cyber-world, William Hutchinson

Link

An extensible platform for the forensic analysis of social media data, Huw Read, Konstantinos Xynos, Iain Sutherland, Frode Roarson, Panagiotis Andriotis, and George Oikonomou

Link

An identification of variables influencing the establishment of information security culture, Emad Sherif, Steven Furnell, and Nathan Clarke

Link

Applying the ACPO guidelines to building automation systems, Iain Sutherland, Theodoros Spyridopoulos, Huw Read, Andy Jones, Graeme Sutherland, and Mikhailia Burgess

Link

Institutionalised moral reframing: A research based model on Islamic radicalisation on social media, Robyn Torok

Link

Symbiotic radicalisation strategies: Propaganda tools and neuro linguistic programming, Robyn Torok

Link

An uncomfortable change: Shifting perceptions to establish pragmatic cyber security, Andrew Woodward and Patricia A.H. Williams

Submissions from 2014

Link

Protecting organizational competitive advantage: A knowledge leakage perspective, Atif Ahmad, Rachelle Bosua, and Rens Scheepers

Link

Teaching information security management: reflections and experiences, Atif Ahmad and Sean Maynard

Link

A conceptual model for federated authentication in the cloud, Abdulwahid Al Abdulwahid, Nathan Clarke, Steven Furnell, and Ingo Stengel

Link

A forensically-enabled IASS cloud computing architecture, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christopher Reich

Link

Authentication and authorisation in entrusted unions, Dhouha F. Ayed, Jan Camenisch, Tanya Ignatenko, Michael N. Johnstone, Paul Koster, Brigitta Lange, Milan Petković, Dieter Sommer, and John Zic

Link

Securing the Internet of Things Infrastructure - Standards and Techniques, Zubair A. Baig

Link

Security of internet protocol cameras - A case example, William Campbell

Link

A Survey Of IPv6 Address Usage In The Public Domain Name System, Clinton R. Carpene and Andrew J. Woodward

Link

Locational wireless and social media-based surveillance, Maxim Chernyshev