Top of page

Student/Staff Portal
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Dr Nathan Clarke

Adjunct Professor

Staff Member Details
Email: n.clarke@ecu.edu.au

Qualifications

  • Doctor of Philosophy, United Kingdom, 2004.

Research Outputs

Journal Articles

  • Al-Naffakh, N., Clarke, N., Li, F., Haskell-Dowland, P. (2025). Real-World Continuous Smartwatch-Based User Authentication. The Computer Journal, 2025(Article in Press), pp. https://doi.org/10.1093/comjnl/bxae144.

Conference Publications

  • Alshumrani, A., Clarke, N., Ghita, B. (2023). A Unified Forensics Analysis Approach To Digital Investigation. Proceedings Of The 18Th International Conference On Cyber Warfare And Security Iccws (466-475). Acad Conferences Ltd. https://doi.org/10.34190/iccws.18.1.972.

Journal Articles

Journal Articles

  • Alotaibi, F., Clarke, N., Furnell, S. (2021). A novel approach for improving information security management and awareness for home environments. Information and Computer Security, 29(1), 25-48. https://doi.org/10.1108/ICS-05-2020-0073.

Journal Articles

  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F. (2019). Behavioral Profiling for Transparent Verification in Cloud Storage Services. Journal of Information Warfare, 17(4), 88-105. https://ro.ecu.edu.au/ecuworkspost2013/6163.

Conference Publications

  • Abed, L., Clarke, N., Ghita, B., Alruban, A. (2019). Securing cloud storage by transparent biometric cryptography. Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018 Bucharest, Romania, November 8–9, 2018 Revised Selected Papers (97-108). Springer. https://doi.org/10.1007/978-3-030-12942-2_9.
  • Alohali, M., Clarke, N., Furnell, S. (2019). Information security risk communication: A user-centric approach. 16th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2019 (article number 9035361). IEEE Computer Society. https://doi.org/10.1109/AICCSA47632.2019.9035361.
  • Mashhadani, S., Clarke, N., Li, F. (2019). Identification and extraction of digital forensic evidence from multimedia data sources using multi-algorithmic fusion. Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019 (438-448). SciTePress. https://doi.org/10.5220/0007399604380448.
  • Alotaibi, S., Alruban, A., Furnell, S., Clarke, N. (2019). A novel behaviour profiling approach to continuous authentication for mobile applications. ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy 2019 (246-251). SciTePress. https://ro.ecu.edu.au/ecuworkspost2013/6110.
  • Alruban, A., Alobaidi, H., Clarke, N., Li, F. (2019). Physical activity recognition by utilising smartphone sensor signals. Proceedings of the 8th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2019 (342-351). SciTePress. https://doi.org/10.5220/0007271903420351.

Journal Articles

  • Alohali, M., Clarke, N., Li, F., Furnell, S. (2018). Identifying and predicting the factors affecting end-users’ risk-taking behavior. Information and Computer Security, 26(3), 306-326. https://doi.org/10.1108/ICS-03-2018-0037.
  • Alohali, M., Clarke, N., Furnell, S. (2018). The design and evaluation of a user-centric information security risk assessment and response framework. International Journal of Advanced Computer Science and Applications, 9(10), 148-163. https://doi.org/10.14569/IJACSA.2018.091018.
  • Alotaibi, S., Furnell, S., Clarke, N. (2018). A novel transparent user authentication approach for mobile applications. Information Security Journal: a Global Perspective, 27(5-6), 292-305. https://doi.org/10.1080/19393555.2019.1609628.

Conference Publications

  • Al-Kawaz, H., Clarke, N., Furnell, S., Li, F., Alruban, A. (2018). Advanced facial recognition for digital forensics. European Conference on Information Warfare and Security, ECCWS (11-19). Curran Associates Inc.. https://ro.ecu.edu.au/ecuworkspost2013/4528.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F. (2018). Misuse Detection in a Simulated IaaS Environment. Emerging Technologies for Authorization and Authentication. ETAA 2018. Lecture Notes in Computer Science (103-115). Springer. https://doi.org/10.1007/978-3-030-04372-8_9.
  • Mohammed, H., Clarke, N., Li, F. (2018). Evidence identification in heterogeneous data using clustering. Proceedings of the 13th International Conference on Availability, Reliability and Security (Article No. 35). Association for Computing Machinery. https://doi.org/10.1145/3230833.3233271.
  • Alotibi, G., Clarke, N., Li, F., Furnell, S. (2018). The Current Situation of Insider Threats Detection: An Investigative Review. 21st Saudi Computer Society National Computer Conference, NCC 2018 (7 p.). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/NCG.2018.8592986.
  • Alshehri, A., Clarke, N., Li, F. (2018). A Holistic Framework for Enhancing Privacy Awareness. 21st Saudi Computer Society National Computer Conference, NCC 2018 (6 pages). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/NCG.2018.8592972.
  • Mohammed, H., Clarke, N., Li, F. (2018). Automating the harmonisation of heterogeneous data in digital forensics. Proceedings of the 17th European Conference on Cyber Warfare and Security ECCWS 2018 (299-306). Curran Associates Inc.. https://ro.ecu.edu.au/ecuworkspost2013/4521.
  • Al-Obaidi, H., Li, F., Clarke, N., Ghita, B., Ketab, S. (2018). A multi-algorithmic approach for gait recognition. European Conference on Information Warfare and Security, ECCWS (20-28). Curran Associates Inc.. https://ro.ecu.edu.au/ecuworkspost2013/4529.
  • Alruban, A., Clarke, N., Li, F., Furnell, S. (2018). Biometrically linking document leakage to the individuals responsible. Trust, Privacy and Security in Digital Business 15th International Conference Proceedings (135-149). Springer Verlag. https://doi.org/10.1007/978-3-319-98385-1_10.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F. (2018). Continuous identity verification in cloud storage services using behavioural profiling. ECCWS 2018 17th European Conference on Cyber Warfare and Security (10p.). https://ro.ecu.edu.au/ecuworkspost2013/4524.

Journal Articles

Conference Publications

  • Alotaibi, F., Clarke, N., Furnell, S. (2017). An analysis of home user security awareness & education. 2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017 (116-122). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.23919/ICITST.2017.8356359.
  • Enamamu, T., Clarke, N., Haskell-Dowland, P., Li, F. (2017). Smart Watch based Body-Temperature Authentication. Proceedings of the IEEE International Conference on Computing, Networking and Informatics (ICCNI 2017) (7p.). IEEE. https://doi.org/10.1109/ICCNI.2017.8123790.
  • Mashhadani, S., Al-Kawaz, H., Clarke, N., Furnell, S., Li, F. (2017). A novel multimedia-forensic analysis tool (M-FAT). 2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017 (388-395). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.23919/ICITST.2017.8356429.
  • Enamamu, T., Clarke, N., Haskell-Dowland, P., Li, F. (2017). Transparent Authentication: Utilising Heart Rate for User Authentication. International Conference for Internet Technology and Secured Transactions (ICITST-2017) Proceedings (283-289).
  • Clarke, N., Li, F., Alruban, A., Furnell, S. (2017). Insider Misuse Identification using Transparent Biometrics. Proceedings of the 50th Hawaii International Conference on System Sciences (4031-4040). University of Hawaii. https://doi.org/10.24251/HICSS.2017.487.
  • Alruban, A., Clarke, N., Li, F., Furnell, S. (2017). Insider misuse attribution using biometrics. ACM International Conference Proceeding Series (7p.). https://doi.org/10.1145/3098954.3103160.
  • Al-Naffakh, NH., Clarke, N., Li, F., Haskell-Dowland, P. (2017). Unobtrusive Gait Recognition using Smartwatches. Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI) (211-218). IEEE. https://doi.org/10.23919/BIOSIG.2017.8053523.
  • Alqahtany, S., Clarke, N., Furnell, S., Reich, C. (2017). A forensic acquisition based upon a cluster analysis of non-volatile memory in IaaS. 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (123-128). IEEE. https://doi.org/10.1109/Anti-Cybercrime.2017.7905276.

Journal Articles

  • Fahdi, A., Clarke, N., Li, F., Furnell, S. (2016). A suspect-oriented intelligent and automated computer forensic analysis. Digital Investigation, 18(1 Sep, 2016), 65-76. https://doi.org/10.1016/j.diin.2016.08.001.
  • Alotaibi, S., Furnell, S., Clarke, N. (2016). A Novel Taxonomy for Mobile Applications Data. International Journal of Cyber-Security and Digital Forensics, 5(3), 115-121. https://doi.org/10.17781/P002070.
  • Alruban, A., Clarke, N., Li, F., Furnell, S. (2016). Leveraging Biometrics for Insider Misuse Identification. International Journal on Cyber Situational Awareness, 1(1), 130-151. https://doi.org/10.22619/IJCSA.2016.100107.
  • Gaseb, A., Clarke, N., Li, F., Furnell, S. (2016). Identifying Users by Network Traffic Metadata. International Journal of Chaotic Computing, 4(2), 109-118.
  • Al-Naffakh, N., Clarke, N., Haskell-Dowland, P., Li, F. (2016). A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches. International Journal for Information Security Research, 6(3), 691-700. https://doi.org/10.20533/ijisr.2042.4639.2016.0080.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P. (2016). Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis. The GSTF Journal on Computing, 5(1), 21-28. https://doi.org/10.5176/2251-3043_4.4.348.
  • Mohammed, H., Clarke, N., Li, F. (2016). An automated approach for digital forensic analysis of heterogenous big data. Journal of Digital Forensics, Security and Law, 11(2), 137-152.

Conference Publications

  • Clarke, N., Li, F., Furnell, S., Stengel, I., Ganis, G. (2016). Information security and practice: The user's perspective. Proceedings of the 11th International Conference on Cyber Warfare and Security, ICCWS 2016 (81-89). Academic Conferences Limited.
  • Alotaibi, S., Furnell, S., Clarke, N. (2016). Transparent authentication systems for mobile device security: A review. 10th International Conference for Internet Technology and Secured Transactions (406-413). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICITST.2015.7412131.
  • Ai-Naffakh, N., Clarke, N., Haskell-Dowland, P., Li, F. (2016). Activity Recognition using wearable computing. International Conference for Internet Technology and Secured Transactions, ICITST 2016 (189-195). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICITST.2016.7856695.
  • Alruban, A., Clarke, N., Li, F., Furnell, S. (2016). Proactive Biometric-Enabled Forensic Imprinting. 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) Proceedings (1-15). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CyberSecPODS.2016.7502342.
  • Triantafyllidis, A., Clarke, N., Haskell-Dowland, P., Vranopoulos, G. (2016). Increasing eLearning Engagement Using Mobile Technologies. ICERI2016 Conference Proceedings (8644-8653). IATED Academy.
  • Alotibi, G., Clarke, N., Li, F., Furnell, S. (2016). User profiling from network traffic via novel application-level interactions. 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016 (279-285). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICITST.2016.7856712.
  • Ketab, S., Clarke, N., Haskell-Dowland, P. (2016). The Value of the Biometrics in Invigilated E-Assessments. EDULEARN16 Conference Proceedings (7648-7659). IATED Academy. https://doi.org/10.21125/edulearn.2016.0687.
  • Alotaibi, M., Furnell, S., Clarke, N. (2016). Information Security Policies: A Review of Challenges and Influencing Factors. 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016 (352-358). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICITST.2016.7856729.
  • Alqahtany, S., Clarke, N., Furnell, S., Reich, C. (2016). A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment. Proceedings 2016 11th International Conference on Availability, Reliability and Security ARES 2016 (345-354). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ARES.2016.58.

Journal Articles

  • Alotaibi, S., Furnell, S., Clarke, N. (2015). A fine-grained analysis of user activity on mobile applications: The sensitivity level perception. International Journal for Information Security Research, 5(3), 591-599.
  • Saevanee, H., Clarke, N., Furnell, S., Biscione, V. (2015). Continuous user authentication using multi-modal biometrics. Computers and Security, 53(2015), 234-246. https://doi.org/10.1016/j.cose.2015.06.001.

Conference Publications

  • Al Abdulwahid, A., Clarke, N., Stengel, I., Furnell, S., Reich, C. (2015). A survey of continuous and transparent multibiometric authentication systems. Proceedings of the 14th European Conference on Cyber Warfare and Security, ECCWS 2015 (1-10). Curran Associates Inc..
  • Al Abdulwahid, A., Clarke, N., Stengel, I., Furnell, S., Reich, C. (2015). Security, privacy and usability – a survey of users’ perceptions and attitudes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (153-168). Springer. https://doi.org/10.1007/978-3-319-22906-5_12.
  • Sherif, E., Furnell, S., Clarke, N. (2015). An identification of variables influencing the establishment of information security culture. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (436-448). Springer Verlag. https://doi.org/10.1007/978-3-319-20376-8_39.
  • Alotibi, G., Li, F., Clarke, N., Furnell, S. (2015). Behavioral-based feature abstraction from network traffic. Proceedings of the 10th International Conference on Cyber Warfare and Security (1-9). Academic Conferences and Publishing International Ltd.
  • Ketab, SS., Clarke, N., Haskell-Dowland, P. (2015). E-Invigilation of E-Assessments. Proceedings of the 9th International Technology, Education and Development Conference (1582-1591). IATED Academy.
  • Al Abdulwahid, A., Clarke, N., Stengel, I., Furnell, S., Reich, C. (2015). The Current Use of Authentication Technologies: An Investigative Review. 2015 International Conference on Cloud Computing (ICCC) (239-246). IEEE. https://doi.org/10.1109/CLOUDCOMP.2015.7149658.
  • Sherif, E., Furnell, S., Clarke, N. (2015). Awareness, behaviour and culture: The ABC in cultivating security compliance. 10th International Conference for Internet Technology and Secured Transactions ICITST (90-94). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICITST.2015.7412064.

Journal Articles

  • Li, F., Clarke, N., Papadaki, M., Haskell-Dowland, P. (2014). Active Authentication for Mobile Devices Utilising Behaviour Profiling. International Journal of Information Security, 13(3), 229-244. https://doi.org/10.1007/s10207-013-0209-6.
  • Furnell, S., Van Niekerk, J., Clarke, N. (2014). The price of patching. Computer Fraud & Security, 2014(8), 8-13.
  • Anuar, NB., Papadaki, M., Furnell, S., Clarke, N. (2014). A Response Selection Model for Intrusion Response Systems: Response Strategy Model (RSM). Security and Communication Networks, 7(11), 1831-1848. https://doi.org/10.1002/sec.896.

Conference Publications

  • Alqahtany, S., Clarke, N., Furnell, S., Reich, C. (2014). A forensically-enabled IASS cloud computing architecture. Proceedings of the 12th Australian Digital Forensics Conference (75-83). Security Research Institute, Edith Cowan University. https://doi.org/10.4225/75/57b3e3a5fb87e.
  • Li, F., Wheeler, R., Clarke, N. (2014). An evaluation of behavioural profiling on mobile devices. Lecture Notes in Computer Science (330-339). Springer. https://doi.org/10.1007/978-3-319-07620-1_29.
  • Joy, D., Li, F., Clarke, N., Furnell, S. (2014). A user-oriented network forensic analyser: the design of a high-level protocol analyser. Proceedings of the 12th Australian Digital Forensics Conference (84-93). Security Research Institute, ECU. https://doi.org/10.4225/75/57b3e511fb87f.
  • Al Abdulwahid, A., Clarke, N., Furnell, S., Stengel, I. (2014). A conceptual model for federated authentication in the cloud. Proceedings of the 11th Australian Information Security Management Conference, ISM 2013 (1-11). Edith Cowan University.
  • Li, F., Clarke, N., Furnell, S., Mkwawa, I. (2014). Performance evaluation of a technology independent security gateway for next generation networks. Wireless and Mobile Computing, Networking and Communications (WiMob), 2014 IEEE 10th International Conference on (281-286). IEEE. https://doi.org/10.1109/WiMOB.2014.6962183.

Journal Articles

  • Hocking, C., Furnell, S., Clarke, N., Reynolds, P. (2013). Co-operative user identity verification using an Authentication Aura. Computers and Security, 39(Part b), 486-502. https://doi.org/10.1016/j.cose.2013.09.011.

Conference Publications

  • Li, F., Clarke, N., Furnell, S., Fajardo, JO., Liberal, F., Sidibe, M. (2013). A Technology Independent Security Gateway for Future Emergency Telecommunication Systems (ETS). Proceedings of the fifth international conference on internet technologies and applications (ITA 13)Proceeding of the International Workshop on Emergency Telecommunications Systems (ETS 2013) (299-308). Glyndwr University.
  • Triantafyllidis, A., Clarke, N., Haskell-Dowland, P. (2013). Learning management systems in higher education: a faculty perspective. Proceedings of the 6th International Conference of Education, Research and Innovation (5120-5130). IATED.
  • Clarke, N., Haskell-Dowland, P., Furnell, S. (2013). E-Invigilator: A biometric-based Supervision System for e-Assessments. 2013 International Conference on Information Society (i-Society) (238-242). IEEE.
  • Li, F., Clarke, N., Furnell, S. (2013). A Technology Independent Security Gateway for Real-Time Multimedia Communication. Network and System Security. Lecture Notes in Computer Science (14-25). Springer. https://doi.org/10.1007/978-3-642-38631-2_2.

Conference Publications

  • Anuar, NB., Papadaki, M., Furnell, S., Clarke, N. (2012). A Response Strategy Model for Intrusion Response Systems. Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012 Proceedings (573-578). Springer. https://doi.org/10.1007/978-3-642-30436-1_51.
  • Triantafyllidis, A., Clarke, N., Haskell-Dowland, P. (2012). Learning management systems in higher education: A student perspective. Proceedings of the 5th International Conference of Education, Research and Innovation (4046-4055). IATED.
  • Saevanee, H., Clarke, N., Furnell, S. (2012). Multi-modal behavioural biometric authentication for mobile devices. Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012 Proceedings (465-474). Springer. https://doi.org/10.1007/978-3-642-30436-1_38.
  • Clarke, N., Katos, V., Menesidou, S., Ghita, B., Furnell, S. (2012). A novel security architecture for a space-data DTN. Wired/Wireless Internet Communication '12 Proceedings of the 10th International Conference on Wired/Wireless Internet Communication (342-349). Springer. https://doi.org/10.1007/978-3-642-30630-3_31.

Books

  • Clarke, N. (2011). Transparent User Authentication Biometrics, RFID and Behavioural Profiling. Springer.

Journal Articles

  • Ledermuller, T., Clarke, N. (2011). Risk assessment for mobile devices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6863 LNCS(2011), 210-221. https://doi.org/10.1007/978-3-642-22890-2_18.
  • Talib, S., Clarke, N., Furnell, S. (2011). Establishing a personalized information security culture. International Journal of Mobile Computing and Multimedia Communications, 3(1), 63-79. https://doi.org/10.4018/jmcmc.2011010105.
  • Li, F., Clarke, N., Papadaki, M., Haskell-Dowland, P. (2011). Misuse Detection for Mobile Devices Using Behaviour Profiling. International Journal of Cyber Warfare and Terrorism, 1(1), 43-55. https://doi.org/10.4018/ijcwt.2011010105.
  • Hocking, C., Furnell, S., Clarke, N., Reynolds, P. (2011). Authentication Aura - A distributed approach to user authentication. Journal of Information Assurance and Security, 6(2), 149-156.

Conference Publications

  • Li, F., Clarke, N., Papadaki, M., Haskell-Dowland, P. (2011). Behaviour Profiling for Transparent Authentication for Mobile Devices. Proceedings of the 10th European Conference on Information Warfare and Security (307-314). Academic Publishing Limited.
  • Widya, C., Clarke, N., Bolan, C. (2011). Information Leakage Through Second Hand USB Flash Drives Within the United Kingdom. Proceedings of The 9th Australian Digital Forensics Conference (33-38). Security Research Centre, Edith Cowan University.
  • Saevanee, H., Clarke, N., Furnell, S. (2011). SMS Linguistic Profiling Authentication on Mobile Device. 2011 5th International Conference on Network and System Security (NSS) (224-228). IEEE. https://doi.org/10.1109/ICNSS.2011.6060004.
  • Anuar, NB., Furnell, S., Papadakil, M., Clarke, N. (2011). A risk index model for security incident prioritisation. The Proceedings of the 9th Australian Information Security Management Conference (25-39). Security Research Centre, Edith Cowan University.
  • Hocking, C., Furnell, S., Clarke, N., Reynolds, P. (2011). A preliminary investigation of distributed and cooperative user authentication. The Proceedings of the 9th Australian Information Security Management Conference (101-110). Security Research Centre, Edith Cowan University.

Journal Articles

  • Tjhai, GC., Furnell, S., Papadaki, M., Clarke, N. (2010). A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. Computers & Security, 29(6), 712-723.

Conference Publications

  • Anuar, NB., Papadaki, M., Furnell, S., Clarke, N. (2010). An investigation and survey of response options for Intrusion Response Systems (IRSs). Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010 (Article no. 5588654). IEEE. https://doi.org/10.1109/ISSA.2010.5588654.
  • Ibrahim, T., Furnell, S., Papadaki, M., Clarke, N. (2010). Assessing the Usability of End-User Security Software. Trust, Privacy and Security in Digital Business 7th International Conference, TrustBus 2010, Bilbao,2010. Proceedings (177-189). Springer. https://doi.org/10.1007/978-3-642-15152-1_16.
  • Hocking, C., Furnell, S., Clarke, N., Reynolds, PL. (2010). A distributed and cooperative user authentication framework. Information Assurance and Security (IAS), 2010 Sixth International Conference on (304-310). IEEE. https://doi.org/10.1109/ISIAS.2010.5604058.
  • Li, F., Clarke, N., Papadaki, M., Haskell-Dowland, P. (2010). Behaviour profiling on mobile devices.. Emerging Security Technologies (EST), 2010 International Conference on (77-82). IEEE. https://doi.org/10.1109/EST.2010.26.
  • Talib, S., Clarke, N., Furnell, S. (2010). An Analysis of Information Security Awareness within Home and Work Environments. Availability, Reliability and Security, 2010. ARES '10. International Conference on (196-203). IEEE. https://doi.org/10.1109/ARES.2010.27.

Journal Articles

  • Botha, RA., Furnell, S., Clarke, N. (2009). From desktop to mobile: Examining the security experience. Computers & Security, 28(3-4), 130-137.

Conference Publications

  • Ibrahim, T., Furnell, S., Papadaki, M., Clarke, N. (2009). Assessing the Usability of Personal Internet Security Tools. Proceedings of the 8th European Conference on Information Warfare and Security (102-111). Academic Publishing Limited.
  • Clarke, N., Karatzouni, S., Furnell, S. (2009). Flexible and Transparent User Authentication for Mobile Devices. 24th IFIP TC11 International Information Security Conference, SEC 2009; Pafos; Cyprus; 18 May 2009 through 20 May 2009, Proceedings (1-12). Springer. https://doi.org/10.1007/978-3-642-01244-0_1.

Journal Articles

  • Furnell, S., Clarke, N., Karatzouni, S. (2008). Beyond the Pin: Enhancing User Authentication for Mobile Devices. Computer Fraud & Security, 2008(8), 12-17.

Conference Publications

  • Buchoux, A., Clarke, N. (2008). Deployment of Keystroke Analysis on a Smartphone. Proceedings of 6th Australian Information Security Management Conference (40-47). Centre for Security Research, Edith Cowan University.
Skip to top of page