ÌÇÐÄÔ­´´

AI at Nottingham

People 

Image of Steven Furnell

Steven Furnell

Professor of Cyber Security, Faculty of Science

Contact

Biography

I am Professor of Cyber Security in the at the , as well as an Adjunct Professor with Edith Cowan University in Western Australia and an Honorary Professor with Nelson Mandela University in South Africa. I am also the UK Representative to (Security and Privacy Protection) within the International Federation for Information Processing, as well as a board member of the and chair the academic partnership committee.

Research Summary

My main research interests are broadly linked to the intersection of human, technological and organisational aspects of cyber security. Within this, specific themes of interest include the usability… read more

Selected Publications

  • FAIZ ZAKI, ABDULLAH GANI, HAMID TAHAEI, STEVEN FURNELL and NOR BADRUL ANUAR, 2021. Computer Networks. 184, 107617
  • WENJUAN LI, WEIZHI MENG and STEVEN FURNELL, 2021. Pattern Recognition Letters. 144, 35-41
  • YUXIANG HONG and STEVEN FURNELL, 2021. Journal of Information Security and Applications. 57, 102710
  • STEVEN FURNELL, 2021. Computers & Security. 100, 102080

Current Research

My main research interests are broadly linked to the intersection of human, technological and organisational aspects of cyber security. Within this, specific themes of interest include the usability of security technology, security management and culture, cybercrime and abuse, and technologies for user authentication and intrusion detection. Related to this, I have authored over 330 papers in refereed international journals and conference proceedings, as well as various books, chapters, and professional articles. See for further details of past outputs.

  • FAIZ ZAKI, ABDULLAH GANI, HAMID TAHAEI, STEVEN FURNELL and NOR BADRUL ANUAR, 2021. Computer Networks. 184, 107617
  • WENJUAN LI, WEIZHI MENG and STEVEN FURNELL, 2021. Pattern Recognition Letters. 144, 35-41
  • YUXIANG HONG and STEVEN FURNELL, 2021. Journal of Information Security and Applications. 57, 102710
  • STEVEN FURNELL, 2021. Computers & Security. 100, 102080
  • STEVEN FURNELL, JULIE HANEY and MARY THEOFANOS, 2021. Computer. 54(3), 68-72
  • ZAWALI, BAKO, IKUESAN, RICHARD A., KEBANDE, VICTOR R., FURNELL, STEVEN and A-DHAQM, ARAFAT, 2021. Infrastructures. 6(4),
  • MILOSLAVSKAYA, NATALIA and FURNELL, STEVEN, 2021. Network Security Intelligence Centres for Information Security Incident Management In: Brain-Inspired Cognitive Architectures for Artificial Intelligence: BICA*AI 2020. 270-282
  • ALOTAIBI, FAYEZ GHAZAI, CLARKE, NATHAN and FURNELL, STEVEN M., 2020. INFORMATION AND COMPUTER SECURITY.
  • DA VEIGA, ADELE, VORSTER, RUTHEA, LI, FUDONG, CLARKE, NATHAN and FURNELL, STEVEN M., 2020. INFORMATION AND COMPUTER SECURITY. 28(3), 399-422
  • VAN DER SCHYFF, KARL, FLOWERDAY, STEPHEN and FURNELL, STEVEN, 2020. Duplicitous social media and data surveillance: An evaluation of privacy risk COMPUTERS & SECURITY. 94,
  • FURNELL, STEVEN and BISHOP, MATT, 2020. Addressing cyber security skills: the spectrum, not the silo COMPUTER FRAUD & SECURITY. 6-11
  • RAM HERKANAIDU, STEVEN M. FURNELL and MARIA PAPADAKI, 2020. In: Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings. 47-57
  • SOKRATIS K. KATSIKAS, FR'ED'ERIC CUPPENS, NORA CUPPENS, COSTAS LAMBRINOUDAKIS, CHRISTOS KALLONIATIS, JOHN MYLOPOULOS, ANNIE I. ANT'ON, STEFANOS GRITZALIS, FRANK PALLAS, J'ORG POHLE, M. ANGELA SASSE, WEIZHI MENG, STEVEN FURNELL and JOAQU'IN GARC'IA-ALFARO, eds., 2020. Springer.
  • NATHAN L. CLARKE and STEVEN FURNELL, eds., 2020. Springer.
  • PAOLO MORI, STEVEN FURNELL and OLIVIER CAMP, eds., 2020. Springer.
  • STEVEN FURNELL, PAOLO MORI, EDGAR R. WEIPPL and OLIVIER CAMP, eds., 2020. Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020 SCITEPRESS.
  • FURNELL SM and HASKELL-DOWLAND PS (DOWLAND PS), 2020. In: Proceedings of the Annual Information Institute Conference.
  • STEVEN FURNELL, HARRY HEYBURN, ANDREW WHITEHEAD and JAYESH NAVIN SHAH, 2020. Computer Fraud & Security. 2020(12), 6-12
  • STEVEN FURNELL and MATT BISHOP, 2020. Education for the Multifaith Community of Cybersecurity In: Information Security Education. Information Security in Action. 32-45
  • N. HOLTON and S. FURNELL, 2020. In: 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC). 161-168
  • STEVEN FURNELL and JAYESH NAVIN SHAH, 2020. Computer Fraud & Security. 2020(8), 6-12
  • FURNELL, STEVEN, 2020. ITNOW. 62(1), 26-27
  • FURNELL, STEVEN, 2020. ITNOW. 62(3), 38-39
  • ADEYEMI R. IKUESAN, MAZLEENA SALLEH, HEIN S. VENTER, SHUKOR ABD RAZAK and STEVEN M. FURNELL, 2020. Human-Intelligent Systems Integration. 2(1), 17-28
  • KARL VAN DER SCHYFF, STEPHEN FLOWERDAY and STEVEN FURNELL, 2020. Computers & Security. 96, 101866
  • ALTAMIMI, ABDULAZIZ, CLARKE, NATHAN, FURNELL, STEVEN and LI, FUDONG, 2019. THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019).
  • TRI HOANG VO, FUHRMANN, WOLDEMAR, FISCHER-HELLMANN, KLAUS-PETER and FURNELL, STEVEN, 2019. Efficient Privacy-preserving User Identity with Purpose-based Encryption 2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019).
  • FURNELL, STEVEN, 2019. Password meters: inaccurate advice offered inconsistently? COMPUTER FRAUD & SECURITY. 6-14
  • HONG, YUXIANG and FURNELL, STEVEN, 2019. JOURNAL OF COMPUTER INFORMATION SYSTEMS.
  • TRI HOANG VO, FUHRMANN, WOLDEMAR, FISCHER-HELLMANN, KLAUS-PETER and FURNELL, STEVEN, 2019. Automated trust negotiation for Cloud applications in Identity-as-a-Service 2019 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGIES AND NETWORKING (COMMNET). 95-102
  • FURNELL, STEVEN, MILLET, KIERAN and PAPADAKI, MARIA, 2019. Fifteen years of phishing: can technology save us? COMPUTER FRAUD & SECURITY. 11-16
  • AWAD, ALI ISMAIL, FURNELL, STEVEN, HASSAN, ABBAS M. and TRYFONAS, THEO, 2019. AD HOC NETWORKS. 92,
  • ALOTAIBI, SAUD NEJR, FURNELL, STEVEN and CLARKE, NATHAN, 2019. INFORMATION SECURITY JOURNAL. 27(5-6), 292-305
  • TRI HOANG VO, FUHRMANN, WOLDEMAR, FISCHER-HELLMANN, KLAUS-PETER and FURNELL, STEVEN, 2019. FUTURE INTERNET. 11(5),
  • SAFA, NADER SOHRABI, MAPLE, CARSTEN, FURNELL, STEVE, AZAD, MUHAMMAD AJMAL, PERERA, CHARITH, DABBAGH, MOHAMMAD and SOOKHAK, MEHDI, 2019. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE. 97, 587-597
  • HIEP CONG PHAM, BRENNAN, LINDA and FURNELL, STEVEN, 2019. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. 46, 96-107
  • FURNELL, STEVEN and DOWLING, SAMANTHA, 2019. JOURNAL OF CRIMINOLOGICAL RESEARCH POLICY AND PRACTICE. 5(1), 13-26
  • ALOTAIBI, MUTLAQ JALIMID, FURNELL, STEVEN and CLARKE, NATHAN, 2019. INFORMATION AND COMPUTER SECURITY. 27(1), 2-25
  • MANAL ALOHALI, NATHAN L. CLARKE and STEVEN FURNELL, 2019. In: 16th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2019, Abu Dhabi, UAE, November 3-7, 2019. 1-10
  • YUXIANG HONG and STEVEN FURNELL, 2019. In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019. 1-4
  • FAYEZ ALOTAIBI, NATHAN LUKE CLARKE and STEVEN FURNELL, 2019. In: Thirteenth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2019, Nicosia, Cyprus, July 15-16, 2019, Proceedings. 20-33
  • STEVEN FURNELL, FAISAL ALOTAIBI and RAWAN ESMAEL, 2019. In: 52nd Hawaii International Conference on System Sciences, HICSS 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019. 1-10
  • SAUD ALOTAIBI, ABDULRAHMAN ALRUBAN, STEVEN FURNELL and NATHAN L. CLARKE, 2019. In: Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019. 246-251
  • ALAA TOLAH, STEVEN M. FURNELL and MARIA PAPADAKI, 2019. In: Information Security Education. Education in Proactive Information Security - 12th IFIP WG 11.8 World Conference WISE 12, Lisbon, Portugal, June 25-27, 2019, Proceedings. 143-156
  • STEVEN FURNELL and NATHAN L. CLARKE, eds., 2019. University of Plymouth.
  • PAOLO MORI, STEVEN FURNELL and OLIVIER CAMP, eds., 2019. Springer.
  • PAOLO MORI, STEVEN FURNELL and OLIVIER CAMP, eds., 2019. Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 SciTePress.
  • WEIZHI MENG and STEVEN FURNELL, eds., 2019. Springer.
  • FURNELL, STEVEN and SPAFFORD, EUGENE H, 2019. ITNOW. 61(1), 32-33
  • HERKANAIDU, R., FURNELL, S. M., PAPADAKI, M. and KHUCHINDA, T., 2018. Designing an Anti-Cyberbullying Programme in Thailand PROCEEDINGS OF THE TWELFTH INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY & ASSURANCE (HAISA 2018). 111-122
  • GASEB, ALOTIBI, NATHAN, CLARKE, FUDONG LI and FURNELL, STEVEN, 2018. The Current Situation of Insider Threats Detection: An Investigative Review 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC).
  • ALOHALI, MANAL, CLARKE, NATHAN and FURNELL, STEVEN, 2018. The Design and Evaluation of a User-Centric Information Security Risk Assessment and Response Framework INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS. 9(10), 148-163
  • ALRUBAN, ABDULRAHMAN, CLARKE, NATHAN, LI, FUDONG and FURNELL, STEVEN, 2018. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS. 11033, 135-149
  • FURNELL, STEVEN and CLARKE, NATHAN, 2018. INFORMATION AND COMPUTER SECURITY. 26(3), 262-263
  • ALOHALI, MANAL, CLARKE, NATHAN, LI, FUDONG and FURNELL, STEVEN, 2018. INFORMATION AND COMPUTER SECURITY. 26(3), 306-326
  • FURNELL, STEVEN, 2018. Assessing website password practices - over a decade of progress? COMPUTER FRAUD & SECURITY. 6-13
  • MENG, WEIZHI, CHOO, KIM-KWANG RAYMOND, FURNELL, STEVEN, VASILAKOS, ATHANASIOS V. and PROBST, CHRISTIAN W., 2018. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT. 15(2), 761-773
  • FURNELL, STEVEN, KHERN-AM-NUAI, WARUT, ESMAEL, RAWAN, YANG, WEINING and LI, NINGHUI, 2018. Enhancing security behaviour by supporting the user COMPUTERS & SECURITY. 75, 1-9
  • SAFA, NADER SOHRABI, MAPLE, CARSTEN, WATSON, TIM and FURNELL, STEVE, 2018. IET INFORMATION SECURITY. 12(3), 238-245
  • HIBA AL-KAWAZ, NATHAN L. CLARKE, STEVEN FURNELL and FUDONG LI, 2018. Digit. Investig.. 26, S136
  • ISMINI VASILEIOU and STEVEN FURNELL, 2018. In: Information Systems Security and Privacy - 4th International Conference, ICISSP 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers. 189-200
  • ISMINI VASILEIOU and STEVEN FURNELL, 2018. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, January 22-24, 2018. 398-403
  • STEVEN FURNELL, MICHAEL K, FRED PIPER, CHRIS E, CATHERINE H and CHRIS ENSOR, 2018. In: Information Security Education - Towards a Cybersecure Society - 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings. 133-145
  • NATHAN L. CLARKE and STEVEN FURNELL, eds., 2018. University of Plymouth.
  • PAOLO MORI, STEVEN FURNELL and OLIVIER CAMP, eds., 2018. Springer.
  • PAOLO MORI, STEVEN FURNELL and OLIVIER CAMP, eds., 2018. Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, January 22-24, 2018 SciTePress.
  • STEVEN FURNELL, HARALAMBOS MOURATIDIS and G'UNTHER PERNUL, eds., 2018. Springer.
  • MAHMOUD N, FURNELL SM and HASKELL-DOWLAND PS (DOWLAND PS), 2018. In: Proceedings of the Annual Information Institute Conference.
  • FURNELL, STEVEN and CLARKE, NATHAN, 2018. ITNOW. 60(3), 42-43
  • FURNELL, STEVEN, 2017. The evolving landscape of technology-dependent crime ROUTLEDGE HANDBOOK OF TECHNOLOGY, CRIME AND JUSTICE. 65-77
  • MASHHADANI, SHAHLAA, AL-KAWAZ, HIBA, CLARKE, NATHAN, FURNELL, STEVEN and LI, FUDONG, 2017. A Novel Multimedia-Forensic Analysis Tool (M-FAT) 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST). 388-395
  • ALOTAIBI, F., FURNELL, S., STENGEL, I. and PAPADAKI, M., 2017. Enhancing Cyber Security Awareness with Mobile Games 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST). 129-134
  • ALOTAIBI, FAYEZ, CLARKE, NATHAN and FURNE, STEVEN, 2017. An Analysis of Home User Security Awareness & Education 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST). 116-122
  • PACELLA, DANIELA, DELL'AQUILA, ELENA, MAROCCO, DAVIDE and FURNELL, STEVEN, 2017. Toward an Automatic Classification of Negotiation Styles using Natural Language Processing INTELLIGENT VIRTUAL AGENTS, IVA 2017. 10498, 339-342
  • ALRUBAN, ABDULRAHMAN, CLARKE, NATHAN, LI, FUDONG and FURNELL, STEVEN, 2017. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017).
  • ALOHALI, MANAL, CLARKE, NATHAN, FURNELL, STEVEN and ALBAKRI, SAAD, 2017. Information Security Behavior: Recognizing the Influencers 2017 COMPUTING CONFERENCE. 844-853
  • ALI FEIZOLLAH, NOR BADRUL ANUAR, ROSLI SALLEH, GUILLERMO SUAREZ-TANGIL and STEVEN FURNELL, 2017. Comput. Secur.. 65, 121-134
  • NATHAN L. CLARKE, FUDONG LI and STEVEN FURNELL, 2017. Comput. Secur.. 70, 335-350
  • STEVEN FURNELL and ISMINI VASILEIOU, 2017. Netw. Secur.. 2017(12), 5-9
  • ALAA TOLAH, STEVEN FURNELL and MARIA PAPADAKI, 2017. In: Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, Adelaide, Australia, November 28-30, 2017, Proceedings. 52-64
  • MANAL ALOHALI, NATHAN L. CLARKE, FUDONG LI and STEVEN FURNELL, 2017. In: Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, Adelaide, Australia, November 28-30, 2017, Proceedings. 126-144
  • NATHAN L. CLARKE, FUDONG LI, ABDULRAHMAN ALRUBAN and STEVEN FURNELL, 2017. In: 50th Hawaii International Conference on System Sciences, HICSS 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017. 1-10
  • STEVEN FURNELL, 2017. In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017. 19
  • STEVEN FURNELL and NATHAN L. CLARKE, eds., 2017. Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, Adelaide, Australia, November 28-30, 2017, Proceedings University of Plymouth.
  • OLIVIER CAMP, STEVEN FURNELL and PAOLO MORI, eds., 2017. Springer.
  • PAOLO MORI, STEVEN FURNELL and OLIVIER CAMP, eds., 2017. Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, February 19-21, 2017 SciTePress.
  • FURNELL SM and EMM D, 2017. Computer Fraud & Security. Volume 2017, Issue 10, October 2017, Pages 5-11,
  • KOROVESSIS P, FURNELL SM, PAPADAKI M and HASKELL-DOWLAND PS (DOWLAND PS), 2017. Journal of Cybersecurity Education, Research and Practice. Vol. 2017, Iss. 2, Art. 5, ISSN: 2472-2707,
  • FURNELL SM, FISCHER P and FINCH A, 2017. Computer Fraud & Security. Volume 2017, Issue 2, February 2017, Pages 5-10,
  • FURNELL SM and ESMAEL R, 2017. Computer Fraud & Security. Volume 2017, Issue 1, January, Pages 5-10,
  • FURNELL SM, VASILEIOU I and OUTRAM N, 2017. iPads in Education: Positive Pedagogy versus Problematic Practicalities In: Proceedings of the London International Conference on Education (LICE-2017).
  • MAHMOUD N, FURNELL SM and HASKELL-DOWLAND PS (DOWLAND PS), 2017. In: Proceedings of the Annual Information Institute Conference.
  • ALQAHTANY S, CLARKE NL, FURNELL SM and REICH C, 2017. In: Anti-Cyber Crimes (ICACC), 2nd International Conference on, pp 123-128.
  • SAAD ALQAHTANY, NATHAN L. CLARKE, STEVEN FURNELL and CHRISTOPH REICH, 2016. Cluster Computing. 19(1), 439-453
  • ABDULWAHID AL ABDULWAHID, NATHAN L. CLARKE, INGO STENGEL, STEVEN FURNELL and CHRISTOPH REICH, 2016. Cluster Computing. 19(1), 455-474
  • NADER SOHRABI SAFA, ROSSOUW VON SOLMS and STEVEN FURNELL, 2016. Comput. Secur.. 56, 70-82
  • M. AL FAHDI, NATHAN L. CLARKE, FUDONG LI and STEVEN M. FURNELL, 2016. Digit. Investig.. 18, 65-76
  • ABDULRAHMAN ALRUBAN, NATHAN L. CLARKE, FUDONG LI and STEVEN FURNELL, 2016. Int. J. Cyber Situational Aware.. 1(1), 130-151
  • NATHAN LUKE CLARKE, JANE SYMES, HATAICHANOK SAEVANEE and STEVEN M. FURNELL, 2016. Int. J. Mob. Comput. Multim. Commun.. 7(1), 15-31
  • HUSSAIN ALSAIARI, MARIA PAPADAKI, PAUL DOWLAND and STEVEN FURNELL, 2016. Inf. Secur. J. A Glob. Perspect.. 25(1-3), 94-108
  • STEVEN FURNELL, 2016. Netw. Secur.. 2016(4), 5-9
  • SAAD ALQAHTANY, NATHAN L. CLARKE, STEVEN FURNELL and CHRISTOPH REICH, 2016. In: 11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, August 31 - September 2, 2016. 345-354
  • ABDULRAHMAN ALRUBAN, NATHAN L. CLARKE, FUDONG LI and STEVEN FURNELL, 2016. In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016. 1-15
  • STEVEN FURNELL and CHARLES A. SHONIREGUN, 2016. In: 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016, Barcelona, Spain, December 5-7, 2016. 3
  • FAISAL ALOTAIBI, STEVEN FURNELL, INGO STENGEL and MARIA PAPADAKI, 2016. In: 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016, Barcelona, Spain, December 5-7, 2016. 154-158
  • GASEB ALOTIBI, NATHAN L. CLARKE, FUDONG LI and STEVEN FURNELL, 2016. In: 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016, Barcelona, Spain, December 5-7, 2016. 279-285
  • MUTLAQ JALIMID ALOTAIBI, STEVEN FURNELL and NATHAN L. CLARKE, 2016. In: 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016, Barcelona, Spain, December 5-7, 2016. 352-358
  • NATHAN L. CLARKE and STEVEN FURNELL, eds., 2016. University of Plymouth.
  • OLIVIER CAMP, STEVEN FURNELL and PAOLO MORI, eds., 2016. Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21, 2016 SciTePress.
  • SOKRATIS K. KATSIKAS, COSTAS LAMBRINOUDAKIS and STEVEN FURNELL, eds., 2016. Springer.
  • ZAABA ZF, FURNELL SM and HASKELL-DOWLAND PS (DOWLAND PS), 2016. International Journal on Perceptive and Cognitive Computing. Vol 2, Iss 1, pp8-18,
  • ALOTIBI G, CLARKE NL, LI F and FURNELL SM, 2016. International Journal of Chaotic Computing. Volume 4, Issue 2,
  • FURNELL SM, 2016. The usability of security - revisited Computer Fraud & Security. ISSN: 1361-3723, September 2016, pp5-11,
  • ALOTAIBI T and FURNELL SM, 2016. International Journal of Computing Academic Research (IJCAR). ISSN 2305-9184, Volume 5, Number 4 (August 2016), pp.195-201,
  • ALOTAIBI S, FURNELL SM and CLARKE NL, 2016. International Journal of Cyber-Security and Digital Forensics (IJCSDF). ISSN: 2305-0012, Vol. 5, No. 3, pp115-121,
  • FURNELL SM, 2016. The usability of security - revisited Computer Fraud & Security. ISSN: 1361-3723, September 2016, pp5-11,
  • CLARKE NL, LI F, FURNELL SM, STENGEL I and GANIS G, 2016. Information Security and Practice: The User's Perspective In: Proceedings of the 11th International Conference On Cyber Warfare and Security (ICCWS-2016).
  • NADER SOHRABI SAFA, MEHDI SOOKHAK, ROSSOUW VON SOLMS, STEVEN FURNELL, NORJIHAN ABDUL GHANI and TUTUT HERAWAN, 2015. Comput. Secur.. 53, 65-78
  • HATAICHANOK SAEVANEE, NATHAN L. CLARKE, STEVEN FURNELL and VALERIO BISCIONE, 2015. Comput. Secur.. 53, 234-246
  • WEIZHI MENG, DUNCAN S. WONG, STEVEN FURNELL and JIANYING ZHOU, 2015. IEEE Commun. Surv. Tutorials. 17(3), 1268-1293
  • HUSSAIN ALSAIARI, MARIA PAPADAKI, PAUL DOWLAND and STEVEN FURNELL, 2015. Inf. Secur. J. A Glob. Perspect.. 24(4-6), 207-220
  • MOUSSA OUEDRAOGO, SEVERINE MIGNON, HERV'E CHOLEZ, STEVEN FURNELL and ERIC DUBOIS, 2015. J. Cloud Comput.. 4, 12
  • ADNAN AKHUNZADA, MEHDI SOOKHAK, NOR BADRUL ANUAR, ABDULLAH GANI, EJAZ AHMED, MUHAMMAD SHIRAZ, STEVEN FURNELL, AMIR HAYAT and MUHAMMAD KHURRAM KHAN, 2015. J. Netw. Comput. Appl.. 48, 44-57
  • NOOR HAYANI ABD RAHIM, SURAYA HAMID, MISS LAIHA MAT KIAH, SHAHABODDIN SHAMSHIRBAND and STEVEN FURNELL, 2015. Kybernetes. 44(4), 606-622
  • EMAD SHERIF, STEVEN FURNELL and NATHAN L. CLARKE, 2015. In: Human Aspects of Information Security, Privacy, and Trust - Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings. 436-448
  • STEVEN M. FURNELL, 2015. In: Information Systems Security and Privacy - First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers. 3-15
  • EMAD SHERIF, STEVEN FURNELL and NATHAN L. CLARKE, 2015. In: 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, London, United Kingdom, December 14-16, 2015. 90-94
  • SAUD ALOTAIBI, STEVEN FURNELL and NATHAN L. CLARKE, 2015. In: 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, London, United Kingdom, December 14-16, 2015. 406-413
  • ABDULWAHID AL ABDULWAHID, NATHAN L. CLARKE, INGO STENGEL, STEVEN FURNELL and CHRISTOPH REICH, 2015. In: Trust, Privacy and Security in Digital Business - 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings. 153-168
  • STEVEN FURNELL and NATHAN L. CLARKE, eds., 2015. University of Plymouth.
  • ALOTAIBI S, FURNELL SM and CLARKE NL, 2015. International Journal for Information Security Research (IJISR). Volume 5, Issue 3, pp591-599,
  • SHERIF E and FURNELL SM, 2015. International Journal for Information Security Research (IJISR). Volume 5, Issue 2, pp565-573,
  • ALSAIARI H, PAPADAKI M, HASKELL-DOWLAND PS (DOWLAND PS) and FURNELL SM, 2015. In: Proceedings of The 8th Saudi Students Conference.
  • AL ABDULWAHID A, CLARKE NL, STENGEL I, FURNELL SM and REICH C, 2015. In: Proceedings of the IEEE 2015 International Conference on Cloud Computing (ICCC15).
  • ALOTIBI G, LI F, CLARKE NL and FURNELL SM, 2015. Behavioral-Based Feature Abstraction from Network Traffic In: 10th International Conference on Cyber warfare and Security.
  • EUGENE KASPERSKY and STEVEN FURNELL, 2014. Inf. Manag. Comput. Secur.. 22(2), 130-133
  • MOHD ZALISHAM JALI, STEVEN M. FURNELL and PAUL DOWLAND, 2014. Inf. Secur. J. A Glob. Perspect.. 23(1-2), 10-21
  • NOR BADRUL ANUAR, MARIA PAPADAKI, STEVEN FURNELL and NATHAN L. CLARKE, 2014. Security and Communication Networks. 7(11), 1831-1848
  • HUSSAIN ALSAIARI, MARIA PAPADAKI, PAUL DOWLAND and STEVEN FURNELL, 2014. In: Eighth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2014 ,Plymouth, UK, July 8-9, 2014. Proceedings. 122-136
  • HATAICHANOK SAEVANEE, NATHAN L. CLARKE, STEVEN FURNELL and VALERIO BISCIONE, 2014. In: ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. 99-112
  • FUDONG LI, NATHAN L. CLARKE, STEVEN FURNELL and IS-HAKA MKWAWA, 2014. In: IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2014, Larnaca, Cyprus, October 8-10, 2014. 281-286
  • NATHAN L. CLARKE and STEVEN FURNELL, eds., 2014. Eighth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2014 ,Plymouth, UK, July 8-9, 2014. Proceedings University of Plymouth.
  • PAUL DOWLAND, STEVEN FURNELL and BOGDAN V. GHITA, eds., 2014. Tenth International Network Conference, INC 2014, Plymouth, UK, July 8-10, 2014. Proceedings Plymouth University.
  • FURNELL SM, VAN NIEKERK J and CLARKE NL, 2014. Computer Fraud and Security. Issue 8, pp8-13,
  • MATTORD HJ, LEVY Y and FURNELL SM, 2014. Journal of Information Privacy and Security. pp71-94,
  • SHAMSHIRBAND S, AMINI A, ANUAR NB, KIAH LM, WAH TY and FURNELL SM, 2014. Measurement. Volume 55, September, pp212–226,
  • JOY D, LI F, CLARKE NL and FURNELL SM, 2014. A User-oriented Network Forensic Analyser: The Design of a High-Level Protocol Analyser In: Proceedings of the 12th Australian Digital Forensics Conference, 1-3 December, ECU Joondalup Campus, Perth, Western Australia.
  • GOEBERT S, HARRIEHAUSEN-MÜHLBAUER B and FURNELL SM, 2014. Towards A Unified OAI-PMH Registry In: Proceedings of the 11th IS&T Archiving Conference.
  • ALQAHTANY S, CLARKE NL and FURNELL SM, 2014. In: Proceedings of the 7th SSC Saudi Students Conference - UK.
  • CHRIS G. HOCKING, STEVEN M. FURNELL, NATHAN L. CLARKE and PAUL L. REYNOLDS, 2013. Comput. Secur.. 39, 486-502
  • HERBERT J. MATTORD, YAIR LEVY and STEVEN FURNELL, 2013. Int. J. Interdiscip. Telecommun. Netw.. 5(2), 32-42
  • MUTTUKRISHNAN RAJARAJAN and STEVEN FURNELL, 2013. MONET. 18(5), 664-665
  • NOR BADRUL ANUAR, MARIA PAPADAKI, STEVEN FURNELL and NATHAN L. CLARKE, 2013. Security and Communication Networks. 6(9), 1087-1116
  • HERBERT J. MATTORD, YAIR LEVY and STEVEN FURNELL, 2013. In: 19th Americas Conference on Information Systems, AMCIS 2013, Chicago, Illinois, USA, August 15-17, 2013.
  • STEVEN FURNELL and NINA B'AR, 2013. In: Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings. 217-225
  • STEVEN M. FURNELL, 2013. In: Information Assurance and Security Education and Training - 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers. 32-38
  • M. AL FAHDI, NATHAN L. CLARKE and STEVEN M. FURNELL, 2013. In: 2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013. 1-8
  • FUDONG LI, NATHAN L. CLARKE and STEVEN FURNELL, 2013. In: Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. 14-25
  • BERNHARD HEINZLE and STEVEN FURNELL, 2013. In: Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings. 149-160
  • STEVEN FURNELL, NATHAN L. CLARKE and VASILIOS KATOS, eds., 2013. European Information Security Multi-Conference (EISMC 2013), Lisbon, Portugal, May 8-10, 2013. Proceedings Plymouth University.
  • STEVEN FURNELL, COSTAS LAMBRINOUDAKIS and JAVIER L'OPEZ, eds., 2013. Springer.
  • AL FAHDI M, CLARKE NL and FURNELL SM, 2013. Towards an Automated Forensic Examiner (AFE) Based upon Criminal Profiling & Artificial Intelligence In: Proceedings of the 11th Australian Digital Forensics Conference, Perth, Australia, 2-4 December.
  • AL ABDULWAHID A, CLARKE NL, FURNELL SM and STENGEL I, 2013. In: Proceedings of the 11th Australian Information Security Management Conference (AISM2013), Perth, Australia, 2-4 December.
  • LI F, CLARKE NL, FURNELL SM, FAJARDO JO, LIBERAL F and SIDIBE M, 2013. A Technology Independent Security Gateway for Future Emergency Telecommunication Systems (ETS) In: Proceeding of the International Workshop on Emergency Telecommunications Systems (ETS 2013).
  • FURNELL SM and CLARKE NL, 2013. Towards Continuous and Convenient User Authentication In: The Future of Identity: A compilation of research papers from a workshop.
  • CLARKE NL, HASKELL-DOWLAND PS (DOWLAND PS) and FURNELL SM, 2013. E-Invigilator: A Biometric-Based Supervision System for e-Assessments In: The International Conference on Information Society (i-Society 2013).
  • STEVEN FURNELL and NATHAN L. CLARKE, 2012. Comput. Secur.. 31(8), 983-988
  • MIKE KREY, STEVEN FURNELL, BETTINA HARRIEHAUSEN and MATTHIAS KNOLL, 2012. In: 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui, HI, USA. 2810-2819
  • GEORGE MAGKLARAS and STEVEN FURNELL, 2012. In: Ninth International Network Conference (INC 2012), Port Elizabeth, South Africa, July 11-12, 2012. Proceedings. 51-61
  • HATAICHANOK SAEVANEE, NATHAN L. CLARKE and STEVEN M. FURNELL, 2012. In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. 465-474
  • NOR BADRUL ANUAR, MARIA PAPADAKI, STEVEN FURNELL and NATHAN L. CLARKE, 2012. In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. 573-578
  • NATHAN L. CLARKE, VASILIOS KATOS, SOFIA-ANNA MENESIDOU, BOGDAN V. GHITA and STEVEN FURNELL, 2012. In: Wired/Wireless Internet Communication - 10th International Conference, WWIC 2012, Santorini, Greece, June 6-8, 2012. Proceedings. 342-349
  • NATHAN L. CLARKE and STEVEN FURNELL, eds., 2012. 6th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2012, Crete, Greece, June 6-8, 2012. Proceedings University of Plymouth.
  • DIMITRIS GRITZALIS, STEVEN FURNELL and MARIANTHI THEOHARIDOU, eds., 2012. Springer.
  • REINHARDT A. BOTHA, PAUL DOWLAND and STEVEN FURNELL, eds., 2012. University of Plymouth.
  • ZAABA ZF, FURNELL SM, HASKELL-DOWLAND PS (DOWLAND PS) and STENGEL I, 2012. Assessing the usability of application level security warnings In: Eleventh Annual Security Conference.
  • STEVEN FURNELL, COSTAS LAMBRINOUDAKIS and G'UNTHER PERNUL, eds., 2011. Springer.
  • STEVEN FURNELL and NATHAN L. CLARKE, eds., 2011. 5th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2011, London, UK, July 7-8, 2011. Proceedings University of Plymouth.
  • GEORGE MAGKLARAS, STEVEN FURNELL and MARIA PAPADAKI, 2011. In: 6th International Workshop on Digital Forensics and Incident Analysis, WDFIA 2011, London, UK, July 7-8, 2011. Proceedings. 133-148
  • MOHD ZALISHAM JALI, STEVEN FURNELL and PAUL DOWLAND, 2011. In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings. 80-91
  • HATAICHANOK SAEVANEE, NATHAN L. CLARKE and STEVEN FURNELL, 2011. In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011. 224-228
  • ZARUL FITRI ZAABA, STEVEN FURNELL and PAUL DOWLAND, 2011. In: 5th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2011, London, UK, July 7-8, 2011. Proceedings. 97-107
  • MOHD ZALISHAM JALI, STEVEN FURNELL and PAUL DOWLAND, 2011. In: 7th International Conference on Information Assurance and Security, IAS 2011, Melacca, Malaysia, December 5-8, 2011. 7-12
  • SHUHAILI TALIB, NATHAN L. CLARKE and STEVEN FURNELL, 2011. Int. J. Mob. Comput. Multim. Commun.. 3(1), 63-79
  • STEVEN FURNELL, ROSSOUW VON SOLMS and ANDREW D. PHIPPEN, 2011. Int. J. Inf. Technol. Syst. Approach. 4(2), 1-11
  • GEORGE MAGKLARAS, STEVEN FURNELL and MARIA PAPADAKI, 2011. Int. J. Digit. Crime Forensics. 3(3), 37-49
  • SANDERS B, HASKELL-DOWLAND PS (DOWLAND PS), ATKINSON S and FURNELL SM, 2011. Journal of Virtual Worlds Research. vol. 3, no. 3, ISSN: 1941-8477,
  • LEVY Y, RAMIM MM, FURNELL SM and CLARKE NL, 2011. Comparing Intentions to Use University-Provided vs. Vendor-Provided Multibiometric Authentication in Online Exams Campus-Wide Information Systems. Vol. 28 Iss: 2,
  • ANUAR NB, FURNELL SM, PAPADAKI M and CLARKE NL, 2011. A Risk Index Model for Security Incident Prioritisation In: Proceedings of the 9th Australian Information Security Management Conference (ASIM 2011).
  • HOCKING C, FURNELL SM, CLARKE NL and REYNOLDS PL, 2011. A preliminary investigation of distributed and cooperative user authentication In: Proceedings of the 9th Australian Information Security Management Conference (secAU 2011).
  • SANDERS B, ATKINSON S, HASKELL-DOWLAND PS (DOWLAND PS), FURNELL SM and PAPADAKI M, 2011. In: EU Kids Online Conference.
  • CLARKE NL, KARATZOUNI S and FURNELL SM, 2011. Towards a Flexible, Multi-Level Security Framework for Mobile Devices In: Proceedings of the 10th Security Conference.
  • UDO BLEIMANN, PAUL DOWLAND, STEVEN FURNELL and OLIVER SCHNEIDER, eds., 2010. University of Plymouth.
  • NATHAN L. CLARKE, STEVEN FURNELL and ROSSOUW VON SOLMS, eds., 2010. South African Information Security Multi-Conference, SAISMC 2010, Port Elizabeth, South Africa, May 17-18, 2010. Proceedings University of Plymouth.
  • GEORGE MAGKLARAS and STEVEN FURNELL, 2010. . In: CHRISTIAN W. PROBST, JEFFREY HUNKER, DIETER GOLLMANN and MATT BISHOP, eds., Insider Threats in Cyber Security 49. Springer. 219-244
  • MIKE KREY, BETTINA HARRIEHAUSEN, MATTHIAS KNOLL and STEVEN FURNELL, 2010. In: Proceedings of the 12th UKSim, International Conference on Computer Modelling and Simulation, Cambridge, UK, 24-26 March 2010. 340-345
  • TARIK IBRAHIM, STEVEN FURNELL, MARIA PAPADAKI and NATHAN L. CLARKE, 2010. In: Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings. 177-189
  • BENJAMIN GEORGE SANDERS, VIVIAN CHEN, DANIEL ZAHRA, PAUL DOWLAND, SHIRLEY ATKINSON, MARIA PAPADAKI and STEVEN FURNELL, 2010. In: MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, Bangkok, Thailand, October 26-29, 2010. 114-121
  • NOR BADRUL ANUAR, MARIA PAPADAKI, STEVEN FURNELL and NATHAN L. CLARKE, 2010. In: Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings ISSA 2010.
  • FELIX RIMBACH, UDO BLEIMANN and STEVEN FURNELL, 2010. In: Eighth International Network Conference (INC 2010), Heidelberg, Germany, July 6-8, 2010. Proceedings. 345-354
  • BENJAMIN GEORGE SANDERS, PAUL DOWLAND and STEVEN FURNELL, 2010. In: South African Information Security Multi-Conference, SAISMC 2010, Port Elizabeth, South Africa, May 17-18, 2010. Proceedings. 61-73
  • CHRIS G. HOCKING, STEVEN M. FURNELL, NATHAN L. CLARKE and PAUL L. REYNOLDS, 2010. In: Sixth International Conference on Information Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23-25, 2010. 304-310
  • SHUHAILI TALIB, NATHAN L. CLARKE and STEVEN FURNELL, 2010. In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland. 196-203
  • STEVEN FURNELL, 2010. Netw. Secur.. 2010(12), 13-17
  • MARIA PAPADAKI and STEVEN FURNELL, 2010. Netw. Secur.. 2010(10), 4-8
  • STEVEN FURNELL, 2010. Netw. Secur.. 2010(1), 7-11
  • BENJAMIN GEORGE SANDERS, PAUL DOWLAND, SHIRLEY ATKINSON, DANIEL ZAHRA, STEVEN FURNELL and MARIA PAPADAKI, 2010. J. Multim. Process. Technol.. 1(3), 181-193
  • STEVEN M. FURNELL, 2010. Inf. Secur. Tech. Rep.. 15(2), 42-46
  • MOHD ZALISHAM JALI, STEVEN FURNELL and PAUL DOWLAND, 2010. Inf. Manag. Comput. Secur.. 18(1), 43-53
  • GINA C. TJHAI, STEVEN FURNELL, MARIA PAPADAKI and NATHAN L. CLARKE, 2010. Comput. Secur.. 29(6), 712-723
  • ATKINSON S, FURNELL SM and PHIPPEN AD, 2010. Barriers to E-Safety Peer Education: An analysis of teacher concerns In: Proceedings of E-Youth Conference.
  • STEVEN FURNELL and NATHAN L. CLARKE, eds., 2009. 3rd International Conference on Human Aspects of Information Security and Assurance, HAISA 2009, Athens, Greece, June 25-26, 2009. Proceedings University of Plymouth.
  • NATHAN L. CLARKE, SEVASTI KARATZOUNI and STEVEN FURNELL, 2009. In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings. 1-12
  • AARON SMITH, MARIA PAPADAKI and STEVEN M. FURNELL, 2009. In: Information Assurance and Security Education and Training - 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers. 249-256
  • MOHD ZALISHAM JALI, STEVEN FURNELL and PAUL DOWLAND, 2009. In: 3rd International Conference on Human Aspects of Information Security and Assurance, HAISA 2009, Athens, Greece, June 25-26, 2009. Proceedings. 108-118
  • SHIRLEY ATKINSON, STEVEN FURNELL and ANDREW D. PHIPPEN, 2009. In: 3rd International Conference on Human Aspects of Information Security and Assurance, HAISA 2009, Athens, Greece, June 25-26, 2009. Proceedings. 61-70
  • BENJAMIN GEORGE SANDERS, PAUL DOWLAND and STEVEN FURNELL, 2009. In: 3rd International Conference on Human Aspects of Information Security and Assurance, HAISA 2009, Athens, Greece, June 25-26, 2009. Proceedings. 50-60
  • SIMONE FISCHER-H'UBNER, STEVEN FURNELL and COSTAS LAMBRINOUDAKIS, 2009. Trans. Large Scale Data Knowl. Centered Syst.. 1, 191-210
  • STEVEN M. FURNELL, 2009. Inf. Secur. Tech. Rep.. 14(4), 176-180
  • TAIMUR BAKHSHI, MARIA PAPADAKI and STEVEN FURNELL, 2009. Inf. Manag. Comput. Secur.. 17(1), 53-63
  • REINHARDT A. BOTHA, STEVEN FURNELL and NATHAN L. CLARKE, 2009. Comput. Secur.. 28(3-4), 130-137
  • FURNELL SM and THOMSON KL, 2009. Computer Fraud & Security. Volume 2009, Issue 2, February, pp5-10,
  • FURNELL SM, PAPADAKI M and THOMSON KL, 2009. Computer Fraud & Security. Volume 2009, Issue 12, December, pp6-10,
  • RAZAK SA, SAMIAN N, MA’AROF MA, FURNELL SM, CLARKE NL and BROOKE PJ, 2009. A Friend Mechanism for Mobile Ad Hoc Networks Journal of Information Assurance and Security. Volume 4, Issue 5, pp440-448,
  • ATKINSON S, FURNELL SM and PHIPPEN AD, 2009. Computer Fraud & Security. Volume 2009, Issue 7, pp13-19,
  • NEWBOULD M and FURNELL SM, 2009. In: Proceedings of the 7th Australian Information Security Management Conference (SECAU 2009).
  • ZHAO D, FURNELL SM and ALAYED A, 2009. In: International Conference on E-Business and Information System Security, EBISS 2009.
  • ZHAO D, FURNELL SM and ALAYED A, 2009. In: International Conference on Information Engineering, ICIE 2009.
  • TJHAI, GINA C., PAPADAKI, MARIA, FURNELL, STEVEN M. and CLARKE, NATHAN L., 2008. The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS. 5185, 139-+
  • TJHAI, G. C., PAPADAKI, M., FURNELL, S. M. and CLARKE, N. L., 2008. Investigating the problem of IDS false alarms: An experimental study using Snort PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE. 253-267
  • FURNELL, STEVEN, 2008. BRITISH JOURNAL OF SOCIOLOGY. 59(1), 177-179
  • STEVEN FURNELL, SOKRATIS K. KATSIKAS and ANTONIO LIOY, eds., 2008. Springer.
  • PAUL DOWLAND and STEVEN FURNELL, eds., 2008. University of Plymouth.
  • NATHAN L. CLARKE and STEVEN FURNELL, eds., 2008. 2nd International Conference on Human Aspects of Information Security and Assurance, HAISA 2008, Plymouth, UK, July 8-9, 2008. Proceedings University of Plymouth.
  • TAIMUR BAKHSHI, MARIA PAPADAKI and STEVEN FURNELL, 2008. In: 2nd International Conference on Human Aspects of Information Security and Assurance, HAISA 2008, Plymouth, UK, July 8-9, 2008. Proceedings. 12-23
  • STEVEN FURNELL, VALLERIA TSAGANIDI and ANDREW D. PHIPPEN, 2008. Comput. Secur.. 27(7-8), 235-240
  • SHUKOR ABD RAZAK, STEVEN FURNELL, NATHAN L. CLARKE and PHILLIP J. BROOKE, 2008. Ad Hoc Networks. 6(7), 1151-1167
  • FURNELL SM, SHAMS R and PHIPPEN AD, 2008. Computer Fraud & Security. Volume 2008, Issue 12, December, pp6-10,
  • FURNELL SM and WARD J, 2008. Computer Fraud & Security. Volume 2008, Issue 11, November, pp9-12,
  • FURNELL SM and WARD J, 2008. Computer Fraud & Security. Volume 2008, Issue 10, October, pp3-6,
  • FURNELL SM, CLARKE NL and KARATZOUNI S, 2008. Computer Fraud & Security. Volume 2008, Issue 8, pp12-17,
  • FURNELL SM and PAPADAKI M, 2008. Computer Fraud & Security. Volume 2008, Issue 5, May, pp8-12,
  • FURNELL SM, 2008. Computer Fraud & Security. Volume 2008, Issue 4, April, pp6-9,
  • FURNELL SM, 2008. Computer Fraud & Security. Volume 2008, Issue 4, April, pp6-9,
  • HELALA M, FURNELL SM and PAPADAKI M, 2008. Evaluating the usability impacts of security interface adjustments in Word In: Proceedings of 6th Australian Information Security Management Conference.
  • DIMOPOULOS V, FURNELL SM and CLARKE NL, 2008. Effective Information Assurance for SMEs In: Proceedings of he 11th Annual Working Conference on Information Security Management.
  • GHITA BV and FURNELL SM, 2008. In: Proceedings of the 2008 International Conference on Communication Theory, Reliability, and Quality of Service (CTRQ 2008).
  • RODWELL, P. M., FURNELL, S. M. and REYNOLDS, P. L., 2007. A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head COMPUTERS & SECURITY. 26(7-8), 468-478
  • FURNELL, STEVEN, 2007. An assessment of website password practices COMPUTERS & SECURITY. 26(7-8), 445-451
  • FISCHER-HUBNER, SIMONE, FURNELL, STEVEN and LAMBRINOUDAKIS, COSTAS, 2007. Special issue - TrustBus 2006 COMPUTER SYSTEMS SCIENCE AND ENGINEERING. 22(5), 241-242
  • CLARKE, N. L. and FURNELL, S. M., 2007. INTERNATIONAL JOURNAL OF INFORMATION SECURITY. 6(1), 1-14
  • RAZAK, SHUKOR ABD, FURNELL, STEVEN, CLARKE, NATHAN and BROOKE, PHILLIP, 2007. Building a trusted community for mobile ad hoc networks using friend recommendation AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS. 4686, 129-+
  • FISCHER, KLAUS-PETER, BLEIMANN, UDO and FURNELL, STEVEN, 2007. Pre-execution security policy assessment of remotely defined BPEL-Based Grid processes TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS. 4657, 178-+
  • FURNELL, S. M., KATSABAS, D., DOWLAND, P. S. and REID, F., 2007. A practical usability evaluation of security features in end-user applications NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS. 232, 205-+
  • TUCKER, C. J., FURNELL, S. M., GHITA, B. V. and BROOKE, P. J., 2007. INTERNET RESEARCH. 17(1), 88-98
  • FURNELL, STEUEN, 2007. Making security usable: Are things improving? COMPUTERS & SECURITY. 26(6), 434-443
  • FURNELL, S. M., BRYANT, P. and PHIPPEN, A. D., 2007. Assessing the security perceptions of personal Internet users COMPUTERS & SECURITY. 26(5), 410-417
  • CLARKE, N. L. and FURNELL, S. M., 2007. Advanced user authentication for mobile devices COMPUTERS & SECURITY. 26(2), 109-119
  • FURNELL, STEVEN, 2007. The Sixth International Network Conference (INC 2006) - Guest editorial INTERNET RESEARCH. 17(1), 5-6
  • FURNELL, STEVEN, 2007. IFIP workshop - Information security culture COMPUTERS & SECURITY. 26(1), 35-35
  • KLAUS PETER FISCHER, UDO BLEIMANN, WOLDEMAR F. FUHRMANN and STEVEN FURNELL, 2007. In: Proceedings of the 23rd International Conference on Data Engineering Workshops, ICDE 2007, 15-20 April 2007, Istanbul, Turkey. 685-694
  • J'ORG PREUß, STEVEN FURNELL and MARIA PAPADAKI, 2007. J. Comput. Virol.. 3(2), 135-141
  • KLAUS PETER FISCHER, UDO BLEIMANN, WOLDEMAR F. FUHRMANN and STEVEN FURNELL, 2007. Inf. Manag. Comput. Secur.. 15(2), 116-127
  • FURNELL SM and EVANGELATOS K, 2007. Public awareness and perceptions of biometrics Computer Fraud & Security. Issue 1, January, pp8-13,
  • FURNELL SM, 2007. Computer Fraud & Security. Volume 2007, Issue 12, December, pp6-11,
  • FURNELL SM, 2007. Phishing: can we spot the signs? Computer Fraud & Security. Issue 3, March, pp10-15,
  • FURNELL SM, 2007. Computer Fraud & Security. Volume 2007, Issue 12, December, pp6-11,
  • KARATZOUNI S, CLARKE NL and FURNELL SM, 2007. Device- versus Network-Centric Authentication Paradigms for Mobile Devices: Operational and Perceptual Trade-Offs In: 5th Australian Information Security Management Conference.
  • KARATZOUNI S, FURNELL SM, CLARKE NL and BOTHA RA, 2007. Perceptions of User Authentication on Mobile Devices In: Proceedings of the ISOneWorld Conference, Las Vegas, USA.
  • FURNELL SM and CHATZIAPOSTOLOU D, 2007. Assessing the usability of system-initiated and user-initiated security events In: Proceedings of the ISOneWorld Conference, Las Vegas, USA.
  • FURNELL, STEVEN, JUSOH, ADILA, KATSABAS, DIMITRIS and DOWLAND, PAUL, 2006. Considering the usability of end-user security software SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS. 201, 307-+
  • RAZAK, SHUKOR ABD, FUMELL, STEVEN, CLARKE, NATHAN and BROOKE, PHILLIP, 2006. A two-tier intrusion detection system for mobile ad hoc networks - A friend approach INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS. 3975, 590-595
  • LACOHEE, H., PHIPPEN, A. D. and FURNELL, S. M., 2006. Risk and restitution: Assessing how users establish online trust COMPUTERS & SECURITY. 25(7), 486-493
  • FURNELL, SM, JUSOH, A and KATSABAS, D, 2006. The challenges of understanding and using security: A survey of end-users COMPUTERS & SECURITY. 25(1), 27-35
  • SIMONE FISCHER-H'UBNER, STEVEN FURNELL and COSTAS LAMBRINOUDAKIS, eds., 2006. Springer.
  • PAUL DOWLAND, STEVEN FURNELL, BHAVANI M. THURAISINGHAM and XIAOYANG SEAN WANG, eds., 2006. Springer.
  • GEORGE MAGKLARAS, STEVEN FURNELL and PHILLIP J. BROOKE, 2006. Inf. Manag. Comput. Secur.. 14(4), 361-381
  • MARIA PAPADAKI and STEVEN FURNELL, 2006. Inf. Manag. Comput. Secur.. 14(3), 235-251
  • FURNELL SM and GHITA BV, 2006. Usability pitfalls in Wireless LAN Security Network Security. March, pp4-8,
  • FURNELL SM and ZEKRI L, 2006. Replacing passwords: In search of the secret remedy Network Security, January. pp 4-8,
  • FURNELL SM, 2006. Malicious or misinformed? Exploring a contributor to the insider threat Computer Fraud & Security. September, pp8-12,
  • FURNELL SM, 2006. Securing the home worker Network Security. November, pp6-112,
  • FURNELL SM, 2006. Security mobile devices: technology and attitude Network Security. August, pp9-13,
  • FURNELL SM, 2006. Safety in numbers? Early experiences in the age of chip and PIN Computer Fraud & Security. April, pp4-7,
  • GHITA BV and FURNELL SM, 2006. Assessing the usability of WLAN security for SOHO users In: Proceedings of the Fifth Security Conference 2006, Las Vegas, USA, 19-20 April.
  • TUCKER C, FURNELL SM, GHITA BV and BROOKE PJ, 2006. A New Taxonomy for Intrusion Detection In: Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK, 11-14 July.
  • RIMBACH F, DANNENBERG M, BLEIMANN U and FURNELL SM, 2006. From Page Ranking to Topic Sensitive Page Ranking: Implementation and Impact In: Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK, 11-14 July.
  • SCHILKE SW, FURNELL SM, BLEIMANN U and PHIPPEN AD, 2006. Enhancing Privacy Through Anonymous Recommendation for Multi-Dimensional-Personalisation In: Proceedings of the 5th Security Conference.
  • PAPADAKI M, FURNELL SM, CLARKE NL, ABU-BAKAR UA and PINKNEY G, 2006. Attack Pattern Analysis: Trends in Malware Variant Development In: Proceedings of the 5th Security Conference, Las Vegas, April 19 -20.
  • FURNELL, SM, 2005. Considering the security challenges in consumer-oriented eCommerce 2005 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Vols 1 and 2. 534-539
  • DIMOPOULOS, V and FURNELL, S, 2005. A protection profiles approach to risk analysis for small and medium enterprises Security Management, Integrity, and Internal Control in Information Systems. 193, 267-283
  • ZINCIR, I, FURNELL, S and PHIPPEN, A, 2005. Intrusion detection via behavioural profiling on mobile and wireless networked devices EUROMEDIA '2005: 11TH ANNUAL EUROMEDIA CONFERENCE. 67-71
  • CLARKE, NL and FURNELL, SM, 2005. Authentication of users on mobile telephones - A survey of attitudes and practices COMPUTERS & SECURITY. 24(7), 519-527
  • MAGKLARAS, GB and FURNELL, SM, 2005. A preliminary model of end user sophistication for insider threat prediction in IT systems COMPUTERS & SECURITY. 24(5), 371-380
  • FURNELL, S, 2005. Why users cannot use security COMPUTERS & SECURITY. 24(4), 274-279
  • SHUKOR ABD RAZAK, STEVEN FURNELL and PHILLIP J. BROOKE, 2005. A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks In: 4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005. 271-280
  • MARIA PAPADAKI and STEVEN M. FURNELL, 2005. Inf. Secur. Tech. Rep.. 10(3), 150-161
  • A. AL-AYED, STEVEN FURNELL, D. ZHAO and PAUL DOWLAND, 2005. Inf. Manag. Comput. Security. 13(2), 156-166
  • STEVEN FURNELL, 2005. Springer.
  • FURNELL SM, KATOS V and CLARKE NL, 2005. DATAWATCH, Information Systems Audit and Control Association (ISACA) - London Chapter. Winter, pp8-15,
  • FURNELL SM, JUSOH A, KATSABAS D and PHIPPEN AD, 2005. eMinds: International Journal on Human-Computer Interaction. vol. 1, no. 1, pp51-59,
  • FURNELL SM, KATOS V and CLARKE NL, 2005. Considering the role of academic qualifications for IT security professionals In: Proceedings of the 1st Colloquium for Information Systems Security Education, Asia Pacific.
  • CLARKE NL and FURNELL SM, 2005. User Authentication for Mobile Devices: A Composite Approach In: Proceedings of the 6th Australian Information Warfare and Security Conference.
  • SCHILKE SW, BLEIMANN U, FURNELL SM and PHIPPEN AD, 2005. A Chinese Wall Approach for Anonymous Recommendation in a Multi-Dimensional-Personalisation Scenario In: Proceedings of Sciences Electroniques, Technologies de l'Information et des Telecommunications (SETIT) 2005.
  • SALAMA E, GHITA BV and FURNELL SM, 2005. HTTP-Aware Anonymisation of Packet Traces In: Proceedings of the First International Conference on Internet Technologies and Applications.
  • LECOMTE J, CLARKE NL and FURNELL SM, 2005. Artificial Impostor Profiling for Keystroke Dynamics on a Mobile Handset In: Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece.
  • GHITA BV, FURNELL SM, LINES BL and IFEACHOR E, 2005. TCP Performance Estimation Using Neural Networks Modelling In: Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece.
  • KATSABAS D, FURNELL SM and HASKELL-DOWLAND PS (DOWLAND PS), 2005. Using Human Computer Interaction principles to promote usable security In: Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece.
  • FURNELL SM and CLARKE NL, 2005. Organisational Security Culture: Embedding Security Awareness, Education and Training In: Proceedings of the 4th World Conference on Information Security Education WISE 2005, 18-20 May, Moscow, Russia.
  • RUIZ VC, FURNELL SM, PHIPPEN AD, HASKELL-DOWLAND PS (DOWLAND PS), STENGEL I and BLEIMANN U, 2005. Identifying the security requirements for virtual university environments In: Proceedings of the Fourth Security Conference 2005.
  • CHARRUAU D, FURNELL SM and HASKELL-DOWLAND PS (DOWLAND PS), 2005. PassImages : an alternative method of user authentication In: Proceedings of the ISOneWorld 2005, Las Vegas, USA, 30 March - 1 April.
  • FURNELL, S, 2004. Qualified to help: In search of the skills to ensure security COMPUTER FRAUD & SECURITY. 10-14
  • KARWENI, T, FURNELL, SM and GAUNT, N, 2004. Patient consent advisory system EUROMEDIA '2004: 10th Annual Euromedia Conference. 133-137
  • PHYO, AH and FURNELL, S, 2004. A conceptual framework for monitoring insider misuse EUROMEDIA '2004: 10TH ANNUAL EUROMEDIA CONFERENCE. 90-95
  • DOWLAND, PS and FURNELL, SM, 2004. A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS. 147, 275-289
  • PHYO, AH, FURNELL, SM and PORTILLA, F, 2004. INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY. 148, 51-65
  • SCHILKE, SW, BLEIMANN, U, FURNELL, SM and PHIPPEN, AD, 2004. INTERNET RESEARCH. 14(5), 379-385
  • FURNELL, S, 2004. Enemies within: the problem of insider attacks COMPUTER FRAUD & SECURITY. 6-11
  • FRANK LAND, HELGA DRUMMOND, PHILIP VOS FELLMAN, ROBERTO RODRIGUEZ, STEVEN FURNELL and PRODROMOS TSIAVOS, 2004. In: IT Innovation for Adaptability and Competitiveness, edited proceedings of the Seventh Working Conference on IT Innovation for Adaptability and Competitiveness, IFIP WG 8.6, Intel Corporation, Leixlip, Ireland, May-June 2004. 465-466
  • VASSILIS DIMOPOULOS, STEVEN FURNELL, MURRAY E. JENNEX and IOANNIS KRITHARAS, 2004. Approaches to IT Security in Small and Medium Enterprises In: Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004. 73-82
  • ANDREW D. PHIPPEN, L. SHEPPARD and STEVEN FURNELL, 2004. Internet Res.. 14(4), 284-293
  • STEVEN FURNELL, I. PAPADOPOULOS and PAUL DOWLAND, 2004. Inf. Manag. Comput. Secur.. 12(2), 178-190
  • FURNELL SM and WARD J, 2004. Malware comes of age: The arrival of the true computer parasite Network Security. October, pp11-15,
  • FURNELL SM and BOLAKIS S, 2004. Helping us to help ourselves: assessing administrators? use of security analysis tools Network Security. February, pp12-15,
  • PHYO AH, FURNELL SM and IFEACHOR E, 2004. A Framework for Monitoring Insider Misuse of IT Applications In: Proceedings of the ISSA 2004 Enabling Tomorrow Conference, South Africa, 30 June-2 July.
  • PAPADAKI M and FURNELL SM, 2004. Automating the process of intrusion response In: Proceedings of the 5th Australian Information Warfare Security Conference, Perth, Australia, 25-26 November.
  • THAKUR A, LINES BL, REYNOLDS PL, KNAHL MH and FURNELL SM, 2004. Optimising Video Layers to the Available Bandwidth Based for Packet Networks In: Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004.
  • SCHILKE SW, BLEIMANN U, FURNELL SM and PHIPPEN AD, 2004. Multi-Dimensional-Personalisation for the online and offline world In: Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004.
  • ALAYED A, FURNELL SM, ZHAO D, BARLOW I and TOMLINSON M, 2004. Architectural specifications and design for an automated vulnerability resolver In: Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004.
  • SINGH H, FURNELL SM, HASKELL-DOWLAND PS (DOWLAND PS), LINES BL and KAUR S, 2004. A Correlation Framework for Continuous User Authentication Using Data Mining In: Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004.
  • DIMOPOULOS V, FURNELL SM, BARLOW I and LINES BL, 2004. Factors affecting the adoption of IT risk analysis In: The 3rd European Conference on Information Warfare and Security Royal Holloway, University of London, UK, 28-29 June.
  • PREUSS J, FURNELL SM and LEA S, 2004. The Adoption of Criminal Profiling for Computer Crime In: EICAR 2004 Conference CD-rom: Best Paper Proceedings.
  • DIMOPOULOS V, FURNELL SM, BARLOW I and LINES BL, 2004. Using protection profiles to simplify risk management In: The Security Conference, April 14/15, Las Vegas, USA.
  • CLARKE NL, FURNELL SM, LINES BL and REYNOLDS PL, 2004. Application of Keystroke Analysis to Mobile Text Messaging In: Proceedings of the 3rd Security Conference, Las Vegas, USA, 14-15 April.
  • DIMOPOULOS, V, FLETCHER, J and FURNELL, SM, 2003. Evaluating the reliability of commercially available biometric devices EUROMEDIA '2003: 8th Annual Euromedia Conference. 166-174
  • NATHAN L. CLARKE, STEVEN FURNELL, BENN LINES and PAUL L. REYNOLDS, 2003. Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets In: Security and Privacy in the Age of Uncertainty, IFIP TC11 18(^mboxth) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece. 97-108
  • STEVEN FURNELL, ALASTAIR G. WARREN and PAUL DOWLAND, 2003. Improving Security Awareness Through Computer-based Training In: Security Education and Critical Infrastructures, IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3), June 26-28, 2003, Monterey, California, USA. 287-301
  • STEVEN FURNELL, 2003. In: Web Engineering, International Conference, ICWE 2003, Oviedo, Spain, July 14-18, 2003, Proceedings. 8-16
  • STEVEN FURNELL and AUNG HTIKE PHYO, 2003. Australas. J. Inf. Syst.. 10(2),
  • NATHAN L. CLARKE, STEVEN FURNELL, BENN LINES and PAUL L. REYNOLDS, 2003. Inf. Manag. Comput. Secur.. 11(4), 161-166
  • MARIA PAPADAKI, STEVEN FURNELL, BENN LINES and PAUL L. REYNOLDS, 2003. In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings. 65-75
  • MUED L, LINES BL, FURNELL SM and REYNOLDS PL, 2003. The Effects of Audio and Video Correlation and Lip Synchronization Campus Wide Information Systems. vol. 20, no. 4, pp. 159-166,
  • GHITA BV, FURNELL SM, LINES BL and IFEACHOR E, 2003. Endpoint study of Internet paths and web pages transfers Campus Wide Information Systems. vol. 20, no. 3, pp90-97,
  • EVANS MP and FURNELL SM, 2003. Campus Wide Information Systems. vol. 2, no. 2, pp67-74,
  • DIMOPOULOS V, FURNELL SM and BARLOW I, 2003. Considering IT Risk Analysis in Small and Medium Enterprises In: Proceedings of the 1st Australian Information Security Management Conference 2003 (InfoSec03), Perth, Australia, 24 November.
  • MUED L, LINES BL and FURNELL SM, 2003. Interpolation of Packet Loss and Lip Sync Error on IP Media In: Proceedings Volume V, International Conference on Computer, Communication and Control Technologies (CCCT?03), Orlando, USA, 31 July - 2 August.
  • MUED L, LINES BL, FURNELL SM and REYNOLDS PL, 2003. The Effects of Lip Synchronization in IP Conferencing In: Proceedings of the International Conference on Visual Information Engineering ? VIE 2003, University of Surrey, UK, 7-9 July.
  • FURNELL SM, WARREN A and HASKELL-DOWLAND PS (DOWLAND PS), 2003. Improving Security Awareness And Training Through Computer-Based Training In: Proceedings of the WISE Conference, Monterey, USA, July.
  • FINCH J, FURNELL SM and HASKELL-DOWLAND PS (DOWLAND PS), 2003. Assessing IT Security Culture: System Administrator and End-User In: Proceedings of ISOneWorld Conference 2003, Las Vegas, USA, April 23-25.
  • MICHAEL P. EVANS and STEVEN FURNELL, 2002. In: Proceedings of the Eleventh International World Wide Web Conference, WWW 2002, May 7-11, 2002, Honolulu, Hawaii, USA. 263-271
  • PAUL DOWLAND, STEVEN FURNELL and MARIA PAPADAKI, 2002. Keystroke Analysis as a Method of Advanced User Authentication and Response In: Security in the Information Society: Visions and Perspectives, IFIP TC11 17(^mboxth) International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt. 215-226
  • A. ALAYED, STEVEN FURNELL and I. M. BARLOW, 2002. Addressing Internet Security Vulnerabilities: A Benchmarking ÌÇÐÄÔ­´´ In: Security in the Information Society: Visions and Perspectives, IFIP TC11 17(^mboxth) International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt. 121-132
  • CHUKWUMA U. NGINI, STEVEN FURNELL and BOGDAN V. GHITA, 2002. Internet Res.. 12(4), 329-338
  • NATHAN L. CLARKE, STEVEN FURNELL, P. M. RODWELL and PAUL L. REYNOLDS, 2002. Comput. Secur.. 21(3), 220-228
  • I. IRAKLEOUS, STEVEN FURNELL, PAUL DOWLAND and MARIA PAPADAKI, 2002. Inf. Manag. Comput. Secur.. 10(3), 100-108
  • GEORGE MAGKLARAS and STEVEN FURNELL, 2002. Comput. Secur.. 21(1), 62-73
  • PAPADAKI M, FURNELL SM, LEE SJ, LINES BL and REYNOLDS PL, 2002. Enhancing Response in Intrusion Detection Systems Journal of Information Warfare. vol. 2, no. 1, pp90-102,
  • FURNELL SM, GENNATOU M and HASKELL-DOWLAND PS (DOWLAND PS), 2002. A prototype tool for information security awareness and training International Journal of Logisitics Information Management. vol. 15, no. 5, pp352-357,
  • CLARKE NL, FURNELL SM and REYNOLDS PL, 2002. Biometric Authentication for Mobile Devices In: Proceedings of the 3rd Australian Information Warfare and Security Conference, Perth, Western Australia, 28-29 November 2002.
  • FURNELL SM and PHYO AH, 2002. Watching your own: The problem of insider IT misuse In: Proceedings of AiCE 2002 ? Third Australian Institute of Computer Ethics Conference, Sydney, Australia, 30 September 2002.
  • MUED L, LINES BL, FURNELL SM and REYNOLDS PL, 2002. Investigating Interaction of Audio and Video Quality as Perceived in Low-Cost Multimedia Conferencing Systems In: Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July 2002.
  • EVANS MP and FURNELL SM, 2002. WebRUM: A Model for Measuring Web-Wide Resource Usage In: Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July 2002.
  • FURNELL SM, ALAYED A, BARLOW I and HASKELL-DOWLAND PS (DOWLAND PS), 2002. Critical awareness ? The problem of monitoring security vulnerabilities In: Proceedings of European Conference on Information Warfare and Security, 8-9 July 2002, Brunel, UK.
  • CLARKE NL, FURNELL SM, REYNOLDS PL and RODWELL PM, 2002. Advanced Subscriber Authentication Approaches For Third Generation Mobile Systems In: Proceedings of the Third International Conference on 3G Mobile Communication Technologies, London, UK, 8-10 May.
  • KNAHL MH, BLEIMANN U, FURNELL SM and HOFMANN HD, 2002. An Integrated Network and System Management Framework based on Adapted Software Components In: Proceedings of Euromedia 2002, Modena, Italy, 15-17 April.
  • HARJIT SINGH, STEVEN FURNELL, BENN LINES and PAUL DOWLAND, 2001. In: Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings. 153-158
  • STEVEN FURNELL, MARIA PAPADAKI, GEORGE MAGKLARAS and A. ALAYED, 2001. Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks In: Advances in Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA. 87-98
  • BOGDAN V. GHITA, STEVEN FURNELL, BENN LINES, D. LE-FOLL and EMMANUEL C. IFEACHOR, 2001. Internet Res.. 11(1), 26-34
  • STEVEN FURNELL, PELAGIA CHILIARCHAKI and PAUL DOWLAND, 2001. Inf. Manag. Comput. Secur.. 9(2), 93-101
  • MICHAEL P. EVANS and STEVEN FURNELL, 2001. Comput. Networks. 37(3/4), 307-330
  • FURNELL SM, EVANS MP and BAILEY P, 2001. The promise of Online Distance Learning: Addressing academic and institutional concerns Quarterly Review of Distance Education. vol. 1, no. 4, pp281-291,
  • EVANS MP and FURNELL SM, 2001. Computer Networks. vol. 37, no 3-4, November,
  • HASKELL-DOWLAND PS (DOWLAND PS), SINGH H and FURNELL SM, 2001. A Preliminary Investigation of User Authentication Using Continuous Keystroke Analysis In: Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas.
  • MUED L, LINES BL, FURNELL SM and REYNOLDS PL, 2001. Performance Evaluation of Desktop Videoconferencing In: Proceedings of PG Net 2001 ? 2nd Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK.
  • GHITA BV, LINES BL, FURNELL SM and IFEACHOR E, 2001. Non-intrusive IP Network Performance Monitoring for TCP Flows In: Proceedings of IEEE ICT2001, Bucharest, Romania.
  • RODWELL PM, FURNELL SM and REYNOLDS PL, 2001. A Conceptual Security Framework to support Continuous Subscriber Authentication in Third Generation Mobile Networks In: Proceedings of Euromedia 2001, Valencia, Spain.
  • PHIPPEN AD, FURNELL SM and HOFMANN HD, 2001. Practitioner Perception of Component Based Software Development In: Proceedings of Euromedia 2001, Valencia, Spain.
  • JOYCE EM, FURNELL SM, REYNOLDS PL and SANDERS P, 2001. CORBA middleware services - Are they secure? In: Proceedings of Euromedia 2001, Valencia, Spain.
  • FURNELL SM, MAGKLARAS GB, PAPADAKI M and HASKELL-DOWLAND PS (DOWLAND PS), 2001. A Generic Taxonomy for Intrusion Specification and Response In: Proceedings of Euromedia 2001, Valencia, Spain.
  • FURNELL, SM, DOWLAND, PS, ILLINGWORTH, HM and REYNOLDS, PL, 2000. Authentication and supervision: A survey of user attitudes COMPUTERS & SECURITY. 19(6), 529-539
  • EVANS, MP and FURNELL, SM, 2000. INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY. 10(3), 238-245
  • STEVEN FURNELL and PAUL DOWLAND, 2000. Inf. Manag. Comput. Secur.. 8(2), 65-75
  • FURNELL SM, GENNATOU M and HASKELL-DOWLAND PS (DOWLAND PS), 2000. Promoting security awareness and training within small organisations In: Proceedings of the First Australian Information Security Management (AISM) Workshop, Geelong, Australia.
  • KNAHL MH, BLEIMANN U, HOFMANN HD and FURNELL SM, 2000. An Integrated Management Architecture for Heterogeneous Networks: INSMware In: Proceedings of the IEEE Workshop on IP-oriented Operations and Management (IPOM '2000), Cracow, Poland.
  • KNAHL MH and FURNELL SM, 2000. Management of Service Level Agreements using INSMware In: Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK.
  • ORD T and FURNELL SM, 2000. User authentication for keypad-based devices using keystroke analysis In: Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK.
  • GHITA BV, FURNELL SM, LINES BL, LE FOLL D and IFEACHOR E, 2000. IP Networks Performance Monitoring of Voice Flows for IP Telephony In: Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK.
  • RODWELL PM, FURNELL SM and REYNOLDS PL, 2000. Non-intrusive security requirements for third generation mobile systems In: Proceedings of PG Net 2000 ? 1st Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK.
  • FURNELL SM, EVANS MP and HASKELL-DOWLAND PS (DOWLAND PS), 2000. Developing tools to support online distance learning In: Proceedings of EUROMEDIA 2000, Antwerp, Belgium.
  • EVANS, MP, PHIPPEN, AD, MUELLER, G, FURNELL, SM, SANDERS, PW and REYNOLDS, PL, 1999. INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY. 9(1), 25-34
  • FURNELL S, GRITZALIS D, KATSIKAS S, MAVROUDAKIS K, SANDERS P and WARREN M, 1999. Methods of responding to healthcare security incidents. Studies in health technology and informatics. 52 Pt 2, 1138-42
  • STEVEN M. FURNELL and T. KARWENI, 1999. Internet Res.. 9(5), 372-382
  • STEVEN FURNELL, PAUL DOWLAND and PETER W. SANDERS, 1999. Inf. Manag. Comput. Secur.. 7(2), 69-75
  • PAUL DOWLAND, STEVEN FURNELL, H. M. ILLINGWORTH and PAUL L. REYNOLDS, 1999. Comput. Secur.. 18(8), 715-726
  • STEVEN FURNELL and MATTHEW J. WARREN, 1999. Comput. Secur.. 18(1), 28-34
  • WARREN MJ, FURNELL SM and SANDERS P, 1999. A new approach towards security training and awareness amongst the Healthcare Community Informatics in Healthcare Australia. vol. 8, no. 1, pp20-26,
  • FURNELL SM and WARREN MJ, 1999. Computer Hacking and Cyber Terrorism: The real threats in the new millenium? Computers & Security. vol. 18, no. 1, pp28-34,
  • FURNELL SM, EVANS MP, PHIPPEN AD and ABU-RGHEFF MA, 1999. Online Distance Learning: Expectations, Requirements and Barriers Virtual University Journal. vol. 2, no. 2,
  • WARREN MJ and FURNELL SM, 1999. Cyber Terrorism: The Political Evolution of the Computer Hacker In: Proceedings of Australian Institute of Computer Ethics Conference 1999 (AICEC99), Melbourne, Australia.
  • REYNOLDS PL, FURNELL SM, EVANS MP and PHIPPEN AD, 1999. A Hyper Graphics Markup Language for optimising WWW access in wireless networks In: Proceedings of Euromedia 99, Munich, Germany.
  • FURNELL SM, BLEIMANN U, GIRSANG J, RÖDER HF, SANDERS P and STENGEL I, 1999. Security considerations in online distance learning In: Proceedings of Euromedia 99, Munich, Germany.
  • STEVEN FURNELL, P. D. ONIONS, MARTIN KNAHL, PETER W. SANDERS, UDO BLEIMANN, U. GOJNY and H. F. R'ODER, 1998. Internet Res.. 8(3), 236-242
  • FURNELL SM, DAVEY J, GAUNT PN, LOUWERSE CP, MAVROUDAKIS K and TREACHER AH, 1998. The ISHTAR guidelines for healthcare security Health Informatics Journal. vol.4, no. 3/4, pp179-183,
  • KNAHL MH, BLEIMANN U, FURNELL SM and SANDERS P, 1998. Integration of ATM Management Procedures into Native Integrated Network and System Management Architectures In: Proceedings of the first International Network Conference 1998 (INC 98), Plymouth, UK.
  • EVANS MP, PHIPPEN AD, MÜLLER G, FURNELL SM, SANDERS P and REYNOLDS PL, 1998. Content Migration on the World Wide Web In: Proceedings of the first International Network Conference 1998 (INC 98), Plymouth, UK.
  • WARREN MJ and FURNELL SM, 1998. Electronic Commerce : Winners and Losers In: Proceedings of the first International Network Conference 1998 (INC 98), Plymouth, UK.
  • EVANS MP, FURNELL SM, PHIPPEN AD and REYNOLDS PL, 1998. Mobility Considerations for integrated Telecommunications Service Environments In: Proceedings of IEE Sixth International Conference on Telecommunications, Edinburgh, UK.
  • PHIPPEN AD, HINDLE C, FURNELL SM and SANDERS P, 1998. A Software Platform for the Integration of a Mobile Client to Intranet Services In: Proceedings of Euromedia 98, Leicester, UK.
  • MATTHEW J. WARREN, STEVEN FURNELL and PETER W. SANDERS, 1997. ODESSA - a new approach to healthcare risk analysis In: Information Security in Research and Business, Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC '97), 14-16 May 1997, Copenhagen, Denmark. 391-402
  • MICHAEL P. EVANS, KIMMO T. KETTUNEN, GRAHAME K. BLACKWELL, STEVEN FURNELL, ANDREW D. PHIPPEN, STEPHEN HOPE and PAUL L. REYNOLDS, 1997. In: Intelligence in Services and Networks: Technology for Cooperative Competition, Fourth International Conference on Intelligence and Services in Networks, IS&N'97, Cernobbio, Italy, May 27-29, 1997, Proceedings. 25-34
  • STEVEN M. FURNELL and MATTHEW J. WARREN, 1997. Internet Res.. 7(1), 61-66
  • LILJEBERG M, EVANS MP, FURNELL SM, MAUMON N, RAATIKAINEN K, VELDKAMP E, WIND BCF and TRIGILA S, 1997. Using CORBA to Support Terminal Mobility In: Proceedings of TINA 97 Conference, Santiago, Chile.
  • LILJEBERG M, FURNELL SM, RAATIKAINEN K, FURNELL SM, LILJEBERG M, FURNELL SM, RAATIKAINEN K and FURNELL SM, 1997. Internet information browsing using GSM data communications : A benchmarking study In: Proceedings of ACTS Mobile Communication Summit 97, Aalborg, Denmark.
  • FURNELL SM, ILLINGWORTH HM, KATSIKAS SK, REYNOLDS PL and SANDERS P, 1997. A comprehensive authentication and supervision architecture for networked multimedia systems In: Proceedings of IFIP CMS 97, Athens, Greece.
  • EVANS MP, PHIPPEN AD, FURNELL SM and REYNOLDS PL, 1997. Resource Adaptation in the TINA Service Environment In: Proceedings of Fourth Communications Networks Symposium, Manchester, UK.
  • FURNELL SM, GAUNT PN, HOLBEN RF, SANDERS PW, STOCKEL CT and WARREN MJ, 1996. Medical informatics = Medecine et informatique. 21(2), 105-12
  • FURNELL S, SANDERS P and WARREN M, 1996. Addressing information security training and awareness within the European healthcare community. Studies in health technology and informatics. 43 Pt B, 707-11
  • STEVEN M. FURNELL and PETER W. SANDERS, 1996. . In: BARRY BARBER, ALISON TREACHER and C. P. LOUWERSE, eds., Towards Security in Medical Telematics - Legal and Technical Aspects 27. IOS Press. 150-155
  • PETER W. SANDERS, STEVEN FURNELL and MATTHEW J. WARREN, 1996. . In: Data Security for Health Care - Volume I: Management Guidelines 31. IOS Press. 82-107
  • STEVEN FURNELL, JOSEPH P. MORRISSEY, PETER W. SANDERS and COLIN T. STOCKEL, 1996. Applications of keystroke analysis for improved login security and continuous user authentication In: Information Systems Security, Facing the information society of the 21st Century. 283-294
  • STEVEN FURNELL, NICHOLA JANE SALMONS, PETER W. SANDERS, COLIN T. STOCKEL and MATTHEW J. WARREN, 1996. Approaches to Security in Healthcare Multimedia Systems In: Communications and Multimedia Security II, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen, Germany, 23-24 September 1996. 25-36
  • FURNELL SM and WARREN MJ, 1996. Computer abuse : Vandalising the information society Internet Research. vol. 7, no.1, pp61-66,
  • FURNELL SM, HILL D, ROSEWALL I and WARREN MJ, 1996. A Telematics Security Training Application In: Proceedings of EUROMEDIA 96, London, UK.
  • JOYCE EM, FURNELL SM, REYNOLDS PL and SANDERS P, 1996. Addressing security in an Integrated Service Engineering environment In: Proceedings of EUROMEDIA 96, London, UK.
  • FURNELL SM, GREEN M, HOPE S, MORRISSEY JP and REYNOLDS PL, 1996. Non-Intrusive Security Arrangements to support Terminal and Personal Mobility In: Proceedings of EUROMEDIA 96, London, UK.
  • SALMONS NJ, FURNELL SM, SANDERS P, STOCKEL CT and WARREN MJ, 1996. POSEIDON - A Composite Multimedia Hospital Patient Records System In: Proceedings of Toward An Electronic Health Record Europe ?96, London, UK.
  • WARREN MJ, FURNELL SM and SANDERS P, 1996. ODESSA - Intelligent Healthcare Security Risk Assessment In: Proceedings of 2nd International Conference on Neural Networks and Expert Systems in Medicine and Healthcare (NNESMED 96), Plymouth, UK.
  • FURNELL SM and SANDERS P, 1996. The SEISMED Guidelines for Host Systems Secuirty In: Towards Security in Medical Telematics: Legal and Technical Aspects, B.Barber et al. (Eds).
  • FURNELL SM and SANDERS PW, 1995. The SEISMED guidelines for host systems security. Studies in health technology and informatics. 27, 150-5
  • FURNELL SM, SANDERS PW and WARREN MJ, 1995. Medical informatics = Medecine et informatique. 20(2), 139-48
  • FURNELL SM and SANDERS PW, 1995. Security management in the healthcare environment. Medinfo. MEDINFO. 8 Pt 1, 675-8
  • STEVEN MARCUS FURNELL, 1995.
  • FURNELL SM, SANDERS P and STOCKEL CT, 1995. The use of Simulation in Computer-based Security Systems In: Proceedings of SCSC ?95 - 1995 Summer Computer Simulation Conference, Ottawa, Canada.
  • FURNELL SM, SANDERS P and STOCKEL CT, 1995. The use of Keystroke Analysis for Continuous User Identity Verification and Supervision In: Proceedings of MEDIACOMM 95 - International Conference on Multimedia Communications, Southampton, UK.
  • SALMONS NJ, FURNELL SM, SANDERS P and STOCKEL CT, 1995. Simulation of a multimedia patient records system In: Proceedings of SCSC ?95 - 1995 Summer Computer Simulation Conference, Ottawa, Canada.
  • FURNELL SM, GAUNT PN, PANGALOS G, SANDERS PW and WARREN MJ, 1994. Medical informatics = Medecine et informatique. 19(3), 229-45
  • FURNELL SM, SANDERS P and STOCKEL CT, 1994. An Expert System for Health Care Data Security : A Conceptual Outline In: Proceedings of NNESMED 94 - International Conference on Neural Networks & Expert Systems in Medicine and Healthcare, Plymouth, England.
  • SANDERS P and FURNELL SM, 1993. Data Security in Medical Information Systems using a Generic Model In: Proceedings of MIE ?93 - 11th International Congress of the European Federation for Medical Informatics, Jerusalem, Israel.

ÌÇÐÄÔ­´´
University Park
Nottingham, NG7 2RD

telephone: +44 (0) 115 951 5151
fax: +44 (0) 115 951 3666
email: Contact us