Follow

Submissions from 2019

PDF

Security and accuracy of fingerprint-based biometrics: A review, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zhang, and Craig Valli

Submissions from 2018

Link

Risk analysis of cloud sourcing in healthcare and public health industry, Hina Abrar, Syed Jawad Hussain, Junaid Chaudhry, Kashif Saleem, Mehmet A. Orgun, Jalal Al-Muhtadi, and Craig Valli

Link

Misuse detection in a simulated IaaS environment, Burhan Al-Bayati, Nathan Clarke, Paul Dowland, and Fudong Li

PDF

A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems, Jalal Al-Muhtadi, Ma Qiang, Khan Zeb, Junaid Chaudhry, Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Rajan Shankaran, Muhammad Imran, and Maruf Pasha

PDF

The design and evaluation of a user-centric information security risk assessment and response framework, Manal Alohali, Nathan Clarke, and Steven Furnell

Link

Information security behavior: Recognizing the influencers, Manal Alohali, Nathan Clarke, Steven Furnell, and Saad Albakri

Link

Identifying and predicting the factors affecting end-users’ risk-taking behavior, Manal Alohali, Nathan Clarke, Fudong Li, and Steven M. Furnell

Link

An analysis of home user security awareness & education, Fayez Alotaibi, Nathan Clarke, and Steven Furnell

Link

Enhancing cyber security awareness with mobile games, F. Alotaibi, Steven Furnell, I Stengel, and M. Papadaki

Link

A console GRID leveraged authentication and key agreement mechanism for LTE/SAE, Rajakumar Arul, Gunasekaran Raja, Ali K. Bashir, Junaid Chaudry, and Amjad M. Ali

PDF

Muscle activity-driven green-oriented random number generation mechanism to secure WBSN wearable device communications, Yuanlong Cao, Guanghe Zhang, Fanghua Liu, Ilsun You, Guanglou Zheng, Oluwarotimi W. Samuel, and Shixiong Chen

Link

Enabling technologies for post market surveillance of medical devices, Junaid Chaudhry, Ali Kashif Bashir, Syed Hassan Ahmed, Jon Haas, and Guanglou Zheng

Link

Internet of Things (IoT): Research, simulators, and testbeds, Maxim Chernyshev, Zubair Baig, Oladayo Bello, and Sherali Zeadally

Link

A novel approach for face recognition using fused GMDH-based networks, El-Sayed El-Alfy, Zubair Baig, and Radwan Abdel-Aal

Link

Transparent authentication: Utilising heart rate for user authentication, Timibloudi S. Enamamu, Nathan Clarke, Paul Haskell-Dowland Dr, and Fudong Li

Link

Assessing website password practices – over a decade of progress?, Steven Furnell

Link

A novel multimedia-forensic analysis tool (M-FAT), Shahlaa Mashhadani, Hiba Al-kawaz, Nathan Clarke, Steven Furnell, and Fudong Li

Link

Modelling and evaluation of malicious attacks against the IoT MQTT protocol, Naeem Firdous Syed, Zubair Baig, Craig Valli, and Ahmed Ibrahim

PDF

Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy, Van Nhan Vo, Tri Gia Nguyen, Chakchai So-In, Zubair Ahmed Baig, and Surasak Sanguanpong

PDF

Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Junaid Chaudhry, Erwin Adi, and Craig Valli

PDF

Impact of feature proportion on matching performance of multi-biometric systems, Wencheng Yang, Song Wang, Guanglou Zheng, and Craig Valli

Link

A critical analysis of ECG-based key distribution for securing wearable and implantable medical devices, Guanglou Zheng, Rajan Shankaran, Wencheng Yang, Craig Valli, Li Qiao, Mehmet A. Orgun, and Subhas Chandra Mukhopadhyay

Link

Finger-to-Heart(F2H): Authentication for wireless implantable medical devices, Guanglou Zheng, Wencheng Yang, Craig Valli, Li Qiao, Rajan Shankaran, Mehmet A. Orgun, and Subhas Chandra Mukhopadhyay

Submissions from 2017

Link

A method to enhance the accuracy of digital forensic in the absence of sufficient evidence in Saudi Arabia, Fahad Alanazi and Andy Jones

Link

Unobtrusive gait recognition using smartwatches, Neamah Al-Naffakh, Nathan Clarke, Fudong Li, and Paul Haskell-Dowland Dr

Link

A survey of cyber-security awareness in Saudi Arabia, Faisal Mohamed Alotaibi, Steven Furnell, Ingo Stengel, and Maria Papadaki

Link

Information security policies: A review of challenges and influencing factors, Mutlaq Alotaibi, Steven Furnell, and Nathan Clarke

Link

User profiling from network traffic via novel application-level interactions, Gaseb Alotibi, Nathan Clarke, Fudong Li, and Steven Furnell

Link

Internet risks for children: Parents' perceptions and attitudes an investigative study of the Saudi context, Norah Alqahtani, Steven Furnell, Shirley Atkinson, and Ingo Stengel

Link

A forensic acquisition based upon a cluster analysis of non-volatile memory in IaaS, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christoph Reich

Link

Insider misuse attribution using biometrics, Abdulrahman Alruban, Nathan Clarke, Fudong Li, and Steven M. Furnell

Link

Future challenges for smart cities: Cyber-security and digital forensics, Zubair A. Baig, Patryk Szewczyk, Craig Valli, Priya N. Rabadia, Peter Hannay, Maxim Chernyshev, Michael N. Johnstone, Paresh Kerai, Ahmad Ibrahim, Krishnun Sansurooah, Naeem Syed, and Matthew Peacock

Link

The effectiveness of classification algorithms on IPv6 IID construction, Clinton Carpene, Michael N. Johnstone, and Andrew Woodward

Enhancements in data-recovery and re-transmit mechanisms of transmission control protocol enabled medical devices, Junaid Chaudhry, Mudassar Ahmad, Muhammad Asif Habib, Rehan Ashraf, and Craig Valli

Data security among ISO/IEEE 11073 compliant personal healthcare devices through statistical fingerprinting, Junaid Chaudhry, Uvais Qidwai, Mahdi H. Miraz, Ahmed Ibrahim, and Craig Valli

Link

AZSPM: autonomic zero-knowledge security provisioning model for medical control systems in fog computing environments, Junaid Chaudhry, Kashif Saleem, Rafiqul Islam, Ali Selamat, Mudassar Ahmad, and Craig Valli

Link

Revisiting urban war nibbling: Mobile passive discovery of Classic Bluetooth devices using Ubertooth One, Maxim Chernyshev, Craig Valli, and Michael Johnstone

PDF

Insider misuse identification using transparent biometrics, Nathan Clarke, Fudong Li, Abdulrahman Alruban, and Steven Furnell

Link

Smart watch based body-temperature authentication, Timibloudi S. Enamamu, Nathan Clarke, Paul Haskell-Dowland, and Fudong Li

Link

Climate control systems for public safety in smart cars, Sajida Imran, Ali Kashif Bashir, and Junaid Chaudhry

Link

Jurisdictional issues in cloud forensics, M. James and Patryk Szewczyk

Link

Towards targeted security awareness raising, Najem Mahmoud, Steven Furnell, and Paul Haskell-Dowland

Link

Security issues with BACnet value handling, Matthew Peacock, Michael N. Johnstone, and Craig Valli

Link

A bio-inspired secure IPv6 communication protocol for Internet of Things, Kashif Saleem, Junaid Chaudhry, Mehmet A. Orgun, and Jalal Al-Muhtadi

PDF

Broadband router security: History, challenges and future implications, Patryk Szewczyk and Rose Macdonald

Link

An analysis of unauthorized wireless network usage in Western Australia, P. Szewczyk, D. Blackman, and K. Sansurooah

Link

Cybersecurity for wireless implants, Guanglou Zheng, Rajan Shankaran, and Craig Valli

Submissions from 2016

Link

Distributed denial-of-service attacks against HTTP/2 services, Erwin Adi, Zubair A. Baig, Philip Hingston, and Chiou-Peng Lam

Link

Adaptive behavioral profiling for identity verification in cloud computing: A model and preliminary analysis, Burhan Al-Bayati, Nathan Clarke, and Paul Dowland

Link

A suspect-oriented intelligent and automated computer forensic analysis, M. Al Fahdi, Nathan L. Clarke, Fudong Li, and St4even M. Furnell

Link

A framework for understanding and assessing the core capability of a digital forensics organisation, Ahmed Almarzooqi and Andrew Jones

PDF

Applying grounded theory methods to digital forensics research, Ahmed Almarzooqi and Andrew Jones

Link

Activity recognition using wearable computing, Neamah Al-Naffakh, Nathan Clarke, Paul Dowland, and Fudong Li

Link

A Novel Taxonomy for Mobile Applications Data, Saud Alotaibi, Steven Furnell, and Nathan Clarke

Link

Transparent authentication systems for mobile device security: A review, Saud Alotaibi, Steven Furnell, and Nathan Clarke

Link

A forensic acquisition and analysis system for IaaS: Architectural model and experiment, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christoph Reich

Link

A review of graphical authentication utilising a keypad input method, H. Alsaiari, M. Papadaki, P.S. Dowland, and Steven Furnell

PDF

Controlled access to cloud resources for mitigating economic denial of sustainability (EDoS) attacks, Zubair A. Baig, Sadiq M. Sait, and Farid Binbeshr

Link

On 802.11 access point locatability and named entity recognition in service set identifiers, Maxim Chernyshev, Craig Valli, and Peter Hannay

Link

Information security and practice: The user's perspective, Nathan Clarke, Fudong Li, Steven Furnell, Ingo Stengel, and Giorgio Ganis

Link

Protecting corporate intellectual property: Legal and technical approaches, Michael G. Crowley and Michael N. Johnstone

Link

Vulnerability management: Not a patch on where we should be?, Steve Furnell

Link

Timestamp analysis for quality validation of network forensic data, Nikolai Hampton and Zubair A. Baig

Link

Information security and digital forensics in the world of cyber physical systems, Andrew Jones, Stilianos Vidalis, and Nasser Abouzakhar

PDF

An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data, Hussam Mohammed, Nathan Clarke, and Fudong Li

Link

A comparison study of wireless network security in several Australasian cities and suburbs, Alastair Nisbet and Andrew Woodward

Link

Awareness, behaviour and culture: The ABC in cultivating security compliance, Emad Sherif, Steven Furnell, and Nathan Clarke

Link

Extracting intelligence from digital Forensic artefacts, Stilianos Vidalis, Olga Angelopoulou, and Andy Jones

Submissions from 2015

Link

Security, privacy and usability – a survey of users’ perceptions and attitudes, Abdulwahid Al Abdulwahid, Nathan Clarke, Ingo Stengel, Steven Furnell, and Christopher Reich

Link

A survey of continuous and transparent multibiometric authentication systems, A. Al Abdulwahid, Nathan Clarke, I. Stengel, and Steven Furnell

Link

Deception in the cyber-world, William Hutchinson

Link

An extensible platform for the forensic analysis of social media data, Huw Read, Konstantinos Xynos, Iain Sutherland, Frode Roarson, Panagiotis Andriotis, and George Oikonomou

Link

An identification of variables influencing the establishment of information security culture, Emad Sherif, Steven Furnell, and Nathan Clarke

Link

Applying the ACPO guidelines to building automation systems, Iain Sutherland, Theodoros Spyridopoulos, Huw Read, Andy Jones, Graeme Sutherland, and Mikhailia Burgess

Link

Institutionalised moral reframing: A research based model on Islamic radicalisation on social media, Robyn Torok

Link

Symbiotic radicalisation strategies: Propaganda tools and neuro linguistic programming, Robyn Torok

Link

An uncomfortable change: Shifting perceptions to establish pragmatic cyber security, Andrew Woodward and Patricia A.H. Williams

Submissions from 2014

Link

Protecting organizational competitive advantage: A knowledge leakage perspective, Atif Ahmad, Rachelle Bosua, and Rens Scheepers

Link

Teaching information security management: reflections and experiences, Atif Ahmad and Sean Maynard

Link

A conceptual model for federated authentication in the cloud, Abdulwahid Al Abdulwahid, Nathan Clarke, Steven Furnell, and Ingo Stengel

Link

A forensically-enabled IASS cloud computing architecture, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christopher Reich

Link

Authentication and authorisation in entrusted unions, Dhouha F. Ayed, Jan Camenisch, Tanya Ignatenko, Michael N. Johnstone, Paul Koster, Brigitta Lange, Milan Petković, Dieter Sommer, and John Zic

Link

Securing the Internet of Things Infrastructure - Standards and Techniques, Zubair A. Baig

Link

Security of internet protocol cameras - A case example, William Campbell

Link

A Survey Of IPv6 Address Usage In The Public Domain Name System, Clinton R. Carpene and Andrew J. Woodward

Link

Locational wireless and social media-based surveillance, Maxim Chernyshev

Link

Verification of primitive Sub-Ghz RF replay attack techniques based on visual signal analysis, Maxim Chernyshev

Link

The zombies strike back: Towards client-side beef detection, Maxim Chernyshev and Peter Hannay

PDF

Changing Places: The Need to Alter the Start Point for Information Security Design, Elizabeth Coles-Kemp and Patricia A. Williams

Link

Identity multipliers and the mistaken twittering of birds of a feather, David M. Cook

Link

Twitter Deception And Influence: Issues Of Identity, Slacktivism, And Puppetry, David M. Cook, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, and Shaquille Abdul Rahman

Link

I remember Richelieu: Is anything secure anymore?, Michael G. Crowley and Michael N. Johnstone

Link

Identifying bugs in digital forensic tools, B Cusack and A Homewood

Link

Acquisition of evidence from network intrusion detection systems, Brian Cusack and Muteb Alqahtani

Link

Steganographic checks in digital forensic investigation: A social networking case, Brian Cusack and Aimie Chee

Link

Including network routers in forensic investigation, Brian Cusack and Raymond Lutui

Link

Persistent issues in encryption software: A heuristic and cognitive walkthrough, Jad El-Abed and Patryk S. Szewczyk

Link

The impace of custom ROM backups on android external storage erasure, Haydon P. Hope and Peter Hannay

PDF

Windows surface RT tablet forensics, Asif Iqbal, Hanan Al Obaidli, Andrew Marrington, and Andy Jones

Link

A user-oriented network forensic analyser: the design of a high-level protocol analyser, D Joy, Fudong Li, Nathan Clarke, and Steven Furnell