What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Steven Furnell
Google Scholar
ORCID:
0000-0003-0984-7542
55
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Investigating the experiences of providing cyber security support to small- and medium-sized enterprises.
Neeshe Khan
Steven Furnell
Maria Bada
Matthew Rand
Jason R. C. Nurse
2025
journals/compsec
Cybersecurity behavior change: A conceptualization of ethical principles for behavioral interventions.
Konstantinos Mersinas
Maria Bada
Steven Furnell
2024
conf/sec
Towards a Mobility-Aware Trust Model for the Internet of Underwater Things.
Abeer Almutairi
Xavier Carpent
Steven Furnell
2023
journals/istr
Introduction to the special issue on insider threats in cybersecurity.
Adéle da Veiga
Steven Furnell
Yuxiang Hong
Merrill Warkentin
2022
journals/compsec
Assessing website password practices - Unchanged after fifteen years?
Steven Furnell
2022
journals/compsec
Accessible authentication: Assessing the applicability for users with disabilities.
Steven Furnell
Kirsi Helkala
Naomi Woods
2022
conf/eurosp
The Importance of the Job Role in Social Media Cybersecurity Training.
Fai Ben Salamah
Marco A. Palomino
Maria Papadaki
Steven Furnell
2022
conf/csr2
A Multi-Level Trust Framework for the Internet of Underwater Things.
Abeer Almutairi
Ying He
Steven Furnell
2021
journals/compsec
Developing a cyber security culture: Current practices and future needs.
Betsy Uchendu
Jason R. C. Nurse
Maria Bada
Steven Furnell
2021
journals/compsec
The cybersecurity workforce and skills.
Steven Furnell
2021
journals/istr
Understanding cybersecurity behavioral habits: Insights from situational support.
Yuxiang Hong
Steven Furnell
2021
conf/eurosp
Poster: The Need for a Collaborative Approach to Cyber Security Education.
Gregor Langner
Jerry Andriessen
Gerald Quirchmayr
Steven Furnell
Vittorio Scarano
Teemu Tokola
2020
journals/compsec
Duplicitous social media and data surveillance: An evaluation of privacy risk.
Karl van der Schyff
Stephen Flowerday
Steven Furnell
2020
journals/compsec
Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment.
Karl van der Schyff
Stephen Flowerday
Steven Furnell
2019
journals/istr
Information security burnout: Identification of sources and mitigating factors from security demands and resources.
Hiep Cong Pham
Linda Brennan
Steven Furnell
2018
journals/compsec
Enhancing security behaviour by supporting the user.
Steven Furnell
Warut Khern-am-nuai
Rawan Esmael
Weining Yang
Ninghui Li
2017
journals/compsec
A novel privacy preserving user identification approach for network traffic.
Nathan L. Clarke
Fudong Li
Steven Furnell
2017
journals/compsec
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection.
Ali Feizollah
Nor Badrul Anuar
Rosli Salleh
Guillermo Suarez-Tangil
Steven Furnell
2016
journals/compsec
Information security policy compliance model in organizations.
Nader Sohrabi Safa
Rossouw von Solms
Steven Furnell
2015
journals/compsec
Information security conscious care behaviour formation in organizations.
Nader Sohrabi Safa
Mehdi Sookhak
Rossouw von Solms
Steven Furnell
Norjihan Binti Abdul Ghani
Tutut Herawan
2015
journals/compsec
Continuous user authentication using multi-modal biometrics.
Hataichanok Saevanee
Nathan L. Clarke
Steven Furnell
Valerio Biscione
2014
conf/sec
Text-Based Active Authentication for Mobile Devices.
Hataichanok Saevanee
Nathan L. Clarke
Steven Furnell
Valerio Biscione
2012
journals/compsec
Power to the people? The evolving recognition of human aspects of security.
Steven Furnell
Nathan L. Clarke
2012
conf/sec
A Response Strategy Model for Intrusion Response Systems.
Nor Badrul Anuar
Maria Papadaki
Steven Furnell
Nathan L. Clarke
2011
conf/sec
Quantifying the Effect of Graphical Password Guidelines for Better Security.
Mohd Zalisham Jali
Steven Furnell
Paul Dowland
2010
journals/compsec
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm.
Gina C. Tjhai
Steven Furnell
Maria Papadaki
Nathan L. Clarke
2009
journals/compsec
From desktop to mobile: Examining the security experience.
Reinhardt A. Botha
Steven Furnell
Nathan L. Clarke
2009
journals/compsec
Editorial.
Dimitris Gritzalis
Steven Furnell
2009
conf/sec
Flexible and Transparent User Authentication for Mobile Devices.
Nathan L. Clarke
Sevasti Karatzouni
Steven Furnell
2008
journals/compsec
Security beliefs and barriers for novice Internet users.
Steven Furnell
Valleria Tsaganidi
Andrew D. Phippen
2008
conf/sec
Investigating the problem of IDS false alarms: An experimental study using Snort.
Gina C. Tjhai
Maria Papadaki
Steven Furnell
Nathan L. Clarke
2007
journals/compsec
Assessing the security perceptions of personal Internet users.
Steven Furnell
P. Bryant
Andrew D. Phippen
2007
journals/compsec
Advanced user authentication for mobile devices.
Nathan L. Clarke
Steven Furnell
2007
journals/compsec
Making security usable: Are things improving?
Steven Furnell
2007
journals/compsec
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head.
Philip M. Rodwell
Steven Furnell
Paul L. Reynolds
2007
journals/compsec
IFIP workshop - Information security culture.
Steven Furnell
2007
journals/compsec
An assessment of website password practices.
Steven Furnell
2007
conf/sec
A Practical Usability Evaluation of Security Features in End-User Applications.
Steven Furnell
Dimitris Katsabas
Paul Dowland
Fraser Reid
2006
journals/compsec
Risk and restitution: Assessing how users establish online trust.
Hazel Lacohée
Andrew D. Phippen
Steven Furnell
2006
journals/compsec
The challenges of understanding and using security: A survey of end-users.
Steven Furnell
Adila Jusoh
Dimitris Katsabas
2006
conf/sec
Considering the Usability of End-User Security Software.
Steven Furnell
Adila Jusoh
Dimitris Katsabas
Paul Dowland
2005
journals/compsec
Why users cannot use security.
Steven Furnell
2005
journals/compsec
Authentication of users on mobile telephones - A survey of attitudes and practices.
Nathan L. Clarke
Steven Furnell
2005
journals/compsec
A preliminary model of end user sophistication for insider threat prediction in IT systems.
George Magklaras
Steven Furnell
2004
conf/sec
A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies.
Paul Dowland
Steven Furnell
2003
conf/sec
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets.
Nathan L. Clarke
Steven Furnell
Benn Lines
Paul L. Reynolds
2002
journals/compsec
Insider Threat Prediction Tool: Evaluating the probability of IT misuse.
George Magklaras
Steven Furnell
2002
journals/compsec
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices.
Nathan L. Clarke
Steven Furnell
Philip M. Rodwell
Paul L. Reynolds
2002
conf/sec
Keystroke Analysis as a Method of Advanced User Authentication and Response.
Paul Dowland
Steven Furnell
Maria Papadaki
2002
conf/sec
Addressing Internet Security Vulnerabilities: A Benchmarking Study.
A. Alayed
Steven Furnell
I. M. Barlow
2000
journals/compsec
Authentication and Supervision: A Survey of User Attitudes.
Steven Furnell
Paul Dowland
H. M. Illingworth
Paul L. Reynolds
1999
journals/compsec
Computer hacking and cyber terrorism: the real threats in the new millennium?
Steven Furnell
Matthew J. Warren
1999
journals/compsec
Computer crime and abuse: A survey of public attitudes and awareness.
Paul Dowland
Steven Furnell
H. M. Illingworth
Paul L. Reynolds
1997
conf/sec
ODESSA - a new approach to healthcare risk analysis.
Matthew J. Warren
Steven Furnell
Peter W. Sanders
1996
conf/sec
Applications of keystroke analysis for improved login security and continuous user authentication.
Steven Furnell
Joseph P. Morrissey
Peter W. Sanders
Colin T. Stockel
Coauthors
A. Alayed
(1)
Abeer Almutairi
(2)
Adéle da Veiga
(1)
Adila Jusoh
(2)
Ali Feizollah
(1)
Andrew D. Phippen
(3)
Benn Lines
(1)
Betsy Uchendu
(1)
Colin T. Stockel
(1)
Dimitris Gritzalis
(1)
Dimitris Katsabas
(3)
Fai Ben Salamah
(1)
Fraser Reid
(1)
Fudong Li
(1)
George Magklaras
(2)
Gerald Quirchmayr
(1)
Gina C. Tjhai
(2)
Gregor Langner
(1)
Guillermo Suarez-Tangil
(1)
H. M. Illingworth
(2)
Hataichanok Saevanee
(2)
Hazel Lacohée
(1)
Hiep Cong Pham
(1)
I. M. Barlow
(1)
Jason R. C. Nurse
(2)
Jerry Andriessen
(1)
Joseph P. Morrissey
(1)
Karl van der Schyff
(2)
Kirsi Helkala
(1)
Konstantinos Mersinas
(1)
Linda Brennan
(1)
Marco A. Palomino
(1)
Maria Bada
(3)
Maria Papadaki
(5)
Matthew J. Warren
(2)
Matthew Rand
(1)
Mehdi Sookhak
(1)
Merrill Warkentin
(1)
Mohd Zalisham Jali
(1)
Nader Sohrabi Safa
(2)
Naomi Woods
(1)
Nathan L. Clarke
(13)
Neeshe Khan
(1)
Ninghui Li
(1)
Nor Badrul Anuar
(2)
Norjihan Binti Abdul Ghani
(1)
P. Bryant
(1)
Paul Dowland
(7)
Paul L. Reynolds
(5)
Peter W. Sanders
(2)
Philip M. Rodwell
(2)
Rawan Esmael
(1)
Reinhardt A. Botha
(1)
Rosli Salleh
(1)
Rossouw von Solms
(2)
Sevasti Karatzouni
(1)
Stephen Flowerday
(2)
Steven Furnell
(55)
Teemu Tokola
(1)
Tutut Herawan
(1)
Valerio Biscione
(2)
Valleria Tsaganidi
(1)
Vittorio Scarano
(1)
Warut Khern-am-nuai
(1)
Weining Yang
(1)
Xavier Carpent
(1)
Ying He
(1)
Yuxiang Hong
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to