Biometric Security: A Novel Ear Recognition Approach Using a 3D Morphable Ear Model
Mursalin, Md, Ahmed, Mohiuddin, Haskell-Dowland, Paul
Published in Sensors (Basel, Switzerland) (20.11.2022)
Published in Sensors (Basel, Switzerland) (20.11.2022)
Get full text
Journal Article
Examination of Traditional Botnet Detection on IoT-Based Bots
Woodiss-Field, Ashley, Johnstone, Michael N, Haskell-Dowland, Paul
Published in Sensors (Basel, Switzerland) (01.02.2024)
Published in Sensors (Basel, Switzerland) (01.02.2024)
Get full text
Journal Article
Cooperative co-evolution for feature selection in Big Data with random feature grouping
Rashid, A. N. M. Bazlur, Ahmed, Mohiuddin, Sikos, Leslie F., Haskell-Dowland, Paul
Published in Journal of big data (04.12.2020)
Published in Journal of big data (04.12.2020)
Get full text
Journal Article
Investigating the Viability of Multifactor Graphical Passwords for User Authentication
Jali, Mohd Zalisham, Furnell, Steven M., Dowland, Paul S.
Published in Information security journal. (01.01.2014)
Published in Information security journal. (01.01.2014)
Get full text
Journal Article
The impact of security and its antecedents in behaviour intention of using e-government services
Alharbi, Nawaf, Papadaki, Maria, Dowland, Paul
Published in Behaviour & information technology (03.06.2017)
Published in Behaviour & information technology (03.06.2017)
Get full text
Journal Article
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things
Ahmed, Mohiuddin, Byreddy, Surender, Nutakki, Anush, Sikos, Leslie F., Haskell-Dowland, Paul
Published in Ad hoc networks (01.11.2021)
Published in Ad hoc networks (01.11.2021)
Get full text
Journal Article
Energy-Efficient Covert Wireless Communication Through Probabilistic Jamming
Lu, Xingbo, Huang, Yuzhen, Yan, Shihao, Yang, Weiwei, Haskell-Dowland, Paul
Published in IEEE wireless communications letters (01.05.2023)
Published in IEEE wireless communications letters (01.05.2023)
Get full text
Journal Article
Active authentication for mobile devices utilising behaviour profiling
Li, Fudong, Clarke, Nathan, Papadaki, Maria, Dowland, Paul
Published in International journal of information security (01.06.2014)
Published in International journal of information security (01.06.2014)
Get full text
Journal Article
On Relaying Strategies in Multi-Hop Covert Wireless Communications
Yu, Xian, Yan, Shihao, Hu, Jinsong, Haskell-Dowland, Paul, Han, Yubing, Ng, Derrick Wing Kwan
Published in ICC 2022 - IEEE International Conference on Communications (16.05.2022)
Published in ICC 2022 - IEEE International Conference on Communications (16.05.2022)
Get full text
Conference Proceeding
Graphical One-Time Password (GOTPass): A usability evaluation
Alsaiari, Hussain, Papadaki, Maria, Dowland, Paul, Furnell, Steven
Published in Information security journal. (04.04.2016)
Published in Information security journal. (04.04.2016)
Get full text
Journal Article
Security Factors Influencing End Users’ Adoption of E-Government
Alharbi, Nawaf, Papadaki, Maria, Dowland, Paul
Published in Journal of Internet Technology and Secured Transactions (01.12.2014)
Published in Journal of Internet Technology and Secured Transactions (01.12.2014)
Get full text
Journal Article