Research Staff Profile

Home People Profile...

Prof. Nathan L Clarke BEng(Hons) PhD CEng FBCS SMIEEE CBP ACE FHEA

Professor of Cyber Security & Digital Forensics

Brief biographical information

nathan.clarke@plymouth.ac.uk

View profile on LinkedIn  View ResearchGate profile

Prof Clarke is a Professor of Cyber Security and Digital Forensics at Plymouth University. Prof Clarke is also an adjunct Associate Professor at Edith Cowan University, Western Australia. His research interests reside in the area of information security, biometrics, forensics and intrusion detection and has over 130 outputs consisting of journal papers, conference papers, books, edited books, book chapters and patents. He is the Chair of the IFIP TC11.12 Working Group on the Human Aspects of Information Security & Assurance. Prof Clarke is a chartered engineer, a fellow of the British Computing Society (BCS) and a senior member of the IEEE andis the author of Transparent Authentication: Biometrics, RFID and Behavioural Profiling published by Springer and Computer Forensics: A Pocket Guide published by IT Governance.

Research interests

Information Systems Security
Intrusion Detection Systems
Biometric Authentication
Digital Forensics
Security Management and Risk Assessment
Security Education and Awareness

Education/qualifications

2004-2005 PGCert Learning & Teaching in Higher Education
2001-2004 PhD, "Advanced User Authentication for Mobile Devices"
1996-2001 BEng (Hons) Electronic Engineering (1st Class)

2010 IEEE Certified Biometrics Professional
2010 AccessData Certified Examiner (ACE)
2013 Fellow of the Higher Education Academy (FHEA)

Professional memberships

BCS South West: Branch Committee Member: Membership Secretary, 2005
BCS South West: Branch Committee Member: Young Professional Representative, 2001-2004

Fellow of the British Computing Society (FBCS), 2010
Senior Member of the Institute for Electrical and Electronic Engineers (IEEE), 2011
Chartered Engineer (CEng), July 2006

Chair, IFIP TC11 Working Group 11.12 Human Aspects of Information Security & Assurance
Member, IFIP TC11 Working Group 11.1 on Information Security Management
Member, IFIP TC11 Working Group 11.6 on Identity Management

External appointments

Consultant to UK Foreign Commonwealth Office - Cyber Security Initiative - Gap Analysis of the Government of Trinidad & Tobago (2013)
External Examiner for MSc in Cybersecurity and Management, University of Warwick (2012 - Present)
Programme Approval of Mcomp/BSc (Hons) Computer Security with Forensics, Sheffield Hallam University (April 2011)
Programme Approval of BSc (Hons) Computer Forensics, Liverpool John Moores University (Beckett College) (March 2011)
Programme Approval of BSc (Hons) Computer Forensics, Liverpool John Moores University (Beckett College) (March 2011)
Adjunct Associate Professor, Edith Cowan University, Western Australia (2010)
Programme Approval of MSc Computer Systems and MSc Computer Applications, University of Bedfordshire (June 2010)
Programme Approval of MSc Web Technologies, MSc Media Technology Management and MSc Sound Engineering, Birmingham City University (May 2010)
External Examiner for MSc Computer Applications in Accounting and MSc Computer Systems Auditing, London Metropolitan University (2009 - Present)
Adjunct Lecturer, Edith Cowan University, Western Australia (2008)
Programme Approval of BSc (Hons) Mobile Communications Technology, University of Central England (March 2007)
External Examiner for MSc Computer Forensics & Security, University of Bedfordshire, UK (2007-Present)
Programme Approval of BSc (Hons) Computing & Information Security, Sheffield Halam University (March 2008)

Journal papers

End-to-middle-to-end solution for IMS media plane security
Fajardo JO, Liberal F, Li F, Clarke NL, Mkwawa IH
Electronic Commerce Research, Springer US, 2014
More details | External link available

Active authentication for mobile devices utilising behaviour profiling
Li F, Clarke NL, Papadaki M, Dowland PS
International Journal of Information Security, Volume 13, Issue 3, pp229-244, ISSN:1615-5262, 2014
More details | External link available

Co-operative user identity verification using an Authentication Aura
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Computers & Security, Volume 39, Part B, November, pp486–502, 2013
More details | External link available

A response selection model for intrusion response systems: Response Strategy Model (RSM)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Security and Communication Networks, 2013
More details | External link available

Sun Behind Clouds - On Automatic Cloud Security Audits and a Cloud Audit Policy Language
Doelitzscher F, Rübsamen T, Karbe T, Reich C, Knahl MH, Clarke NL
International Journal on Advances in Networks and Services, vol 6 no 1 & 2, ISSN: 1942-2644, pp1-16, 2013
More details | External link available

Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Security and Communication Networks, 2012
More details | External link available

Power to the people? The evolving recognition of human aspects of security
Furnell SM, Clarke NL
Computers & Security, Volume 31, Issue 8, pp983–988, 2012
More details | External link available

An agent based business aware incident detection system for cloud environments
Doelitzscher F, Reich C, Knahl MH, Passfall A, Clarke NL
Journal of Cloud Computing: Advances, Systems and Applications, 1:9, ISSN: 2192-113X, 2012
More details | External link available

Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke NL, Gritzalis S
Security and Communication Networks, vol. 5, issue 1, 2012
More details | External link available

Misuse Detection for Mobile Devices Using Behaviour Profiling
Li F, Clarke NL, Papadaki M, Dowland PS
International Journal of Cyber Warfare & Terrorism, Volume 1, Issue 1, pp43-55, ISSN: 1947-3435, 2011
More details | External link available

Authentication Aura - A distributed approach to user authentication
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Journal of Information Assurance and Security, vol. 6 (2011), issue 2, pp149-156, ISSN 1554-1010, 2011
More details | External link available

Establishing A Personalized Information Security Culture
Talib S, Clarke NL, Furnell SM
International Journal of Mobile Computing and Multimedia Communications (IJMCMC), Vol 3, Iss 1, pp63-79, 2011
More details | External link available

Comparing Intentions to Use University-Provided vs. Vendor-Provided Multibiometric Authentication in Online Exams
Levy Y, Ramim MM, Furnell SM, Clarke NL
Campus-Wide Information Systems, Vol. 28 Iss: 2, 2011
More details

A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
Tjhai GC, Furnell SM, Papadaki M, Clarke NL
Computers & Security, Volume 29, Issue 6, pp712-723 , 2010
More details | External link available

A Friend Mechanism for Mobile Ad Hoc Networks
Razak SA, Samian N, Ma’arof MA, Furnell SM, Clarke NL, Brooke PJ
Journal of Information Assurance and Security, Volume 4, Issue 5, pp440-448, 2009
More details

From desktop to mobile: Examining the security experience
Botha RA, Furnell SM, Clarke NL
Computers & Security, Volume 28, Issues 3-4, pp130-137, 2009
More details | External link available

Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
Razak SA, Furnell SM, Clarke NL, Brooke PJ
Ad Hoc Networks, Volume 6, Issue 7, September, pp1151-1167, 2008
More details | External link available

Beyond the PIN: Enhancing user authentication for mobile devices
Furnell SM, Clarke NL, Karatzouni S
Computer Fraud & Security, Volume 2008, Issue 8, pp12-17, 2008
More details | External link available

The application of signature recognition to transparent handwriting verification for mobile devices
Clarke NL, Mekala AR
Information Management & Computer Security, volume 15, issue 3, pp214-225, 2007
More details

Advanced user authentication for mobile devices
Clarke NL, Furnell SM
Computers & Security, vol. 26, no. 2, pp109-119, 2007
More details

A Composite User Authentication Architecture for Mobile Devices
Clarke NL, Furnell SM
Journal of Information Warfare, vol. 5, no. 2, pp11-29, 2006
More details

Authenticating Mobile Phone Users Using Keystroke Analysis
Clarke NL, Furnell SM
International Journal of Information Security, vol. 6, no. 1, pp1-14, 2006
More details

The role of academic qualifications in the IT security profession
Furnell SM, Katos V, Clarke NL
DATAWATCH, Information Systems Audit and Control Association (ISACA) - London Chapter, Winter, pp8-15, 2005
More details | External link available

Authentication of users on mobile telephones - A survey of attitudes and practices
Clarke NL, Furnell SM
Computers & Security, vol. 24, no. 7, pp519-527, 2005
More details

Biometrics - The promise versus the practice
Clarke NL, Furnell SM
Computer Fraud and Security, September, pp12-16, 2005
More details

Biometrics: No silver bullets
Furnell SM, Clarke NL
Computer Fraud & Security, August, pp9-14, 2005
More details

Keystroke Dynamics on a Mobile Handset: A Feasibility Study
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Information Management and Computer Secuirty, vol. 11, no. 4, pp161-166, 2003
More details | Download PDF

Acceptance of subscriber authentication methods for mobile telephony devices
Clarke NL, Furnell SM, Rodwell PM, Reynolds PL
Computers & Security, vol. 21, no.3, pp220-228, 2002
More details | Download PDF

28 Journal papers

Conference papers

Performance-driven evaluation for deploying IMS-based interoperability scenarios
Fajardo JO, Liberal F, Li F, Clarke NL, Mkwawa IH, Sun L
IEEE International Conference on Communications (IEEE ICC 2014), 10-14 June 2014, Sydney, Australia, pp.3019-3024, 2014
More details | External link available

An Evaluation of Behavioural Profiling on Mobile Devices
Li F, Wheeler R, Clarke NL
Proceedings of the Second International Conference HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, pp330-339 in Human Aspects of Information Security, Privacy, and Trust, Lecture Notes in Computer Science, Volume 8533, 2014
More details | External link available

Data Carving using Artificial Headers
Daniel R, Clarke NL, Li F
Proceedings of the 13th Annual Security Conference, Las Vegas, USA, 2014
More details

Cloud Forensics Challenges
Alqahtany S, Clarke NL, Furnell SM
Proceedings of the 7th SSC Saudi Students Conference - UK, pp86-93, ISBN: 9780956904522, 2014
More details | External link available

Anomaly Detection In IaaS Clouds
Doelitzscher F, Knahl MH, Reich C, Clarke NL
5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom2013), Bristol, UK, Dec 2-5, ISBN: 978-0-7695-5095-4, pp387-394, 2013
More details | External link available

Towards an Automated Forensic Examiner (AFE) Based upon Criminal Profiling & Artificial Intelligence
Al Fahdi M, Clarke NL, Furnell SM
Proceedings of the 11th Australian Digital Forensics Conference, Perth, Australia, 2-4 December, pp 1-9, ISBN 978-0-7298-0711-1, 2013
More details

A Conceptual Model for Federated Authentication in the Cloud
Al Abdulwahid A, Clarke NL, Furnell SM, Stengel I
Proceedings of the 11th Australian Information Security Management Conference (AISM2013), Perth, Australia, 2-4 December, pp 1-11, ISBN 978-0-7298-0710-4, 2013
More details | External link available

Learning management systems in higher education: a faculty perspective
Triantafyllidis A, Clarke NL, Dowland PS
6th International Conference of Education, Research and Innovation (ICERI2013), Madrid, Spain, ISBN: 978-84-616-3847-5, pp5120-5130, 2013
More details

User Requirements for Future Wideband Critical Communications
Liberal F, Ramos M, Fajardo JO, Goi N, Bizkarguenaga A, Mesogiti I, Theodoropoulou E, Lyberopoulos G, Koumaras H, Sun L, Clarke NL, Li F
Proceeding of the International Workshop on Emergency Telecommunications Systems (ETS 2013), Wrexham, UK, 12 September, pp341-348, 2013
More details

A Technology Independent Security Gateway for Future Emergency Telecommunication Systems (ETS)
Li F, Clarke NL, Furnell SM, Fajardo JO, Liberal F, Sidibe M
Proceeding of the International Workshop on Emergency Telecommunications Systems (ETS 2013), Wrexham, UK, 12 September, pp299-308, 2013
More details

Challenges to Digital Forensics: A Survey of Researchers & Practitioners Attitudes and Opinions
Al Fahdi M, Clarke NL, Furnell SM
Proceedings of ISSA (Information Security South Africa), Johannesburg, 14-16 August, ISBN:978-1-4799-0809-7, 2013
More details

Towards Continuous and Convenient User Authentication
Furnell SM, Clarke NL
The Future of Identity: A compilation of research papers from a workshop, City University London / EPSRC, April, 2013
More details

E-Invigilator: A Biometric-Based Supervision System for e-Assessments
Clarke NL, Dowland PS, Furnell SM
The International Conference on Information Society (i-Society 2013), Toronto, Canada, 24-26 June, 2013
More details

A Technology Independent Security Gateway for Real-Time Multimedia Communication
Li F, Clarke NL, Furnell SM
Proceedings of the 7th International Conference on Network and System Security (NSS2013), 3-4 June 2013, Madrid, Spain, pp14-25, 2013
More details

Multimodal Biometric Surveillance using a Kinect Sensor
Savage R, Clarke NL, Li F
Proceedings of the 12th Annual Security Conference, April, Las Vegas, USA, 2013
More details | Download PDF

Learning management systems in higher education: a student perspective
Triantafyllidis A, Clarke NL, Dowland PS
5th International Conference of Education, Research and Innovation (ICERI2012), Madrid, Spain, ISBN: 978-84-616-0763-1, pp4046-4055, 2012
More details

Web-Based Risk Analysis for Home Users
Magaya RT, Clarke NL
10th Information Security Management Conference, Perth, Australia, Dec 3-5, 2012
More details

Validating Cloud Infrastructure Changes by Cloud Audits
Doelitzscher F, Fischer C, Moskal D, Reich C, Knahl MH, Clarke NL
Proceedings of the 8th IEEE World Congress on Services (SERVICES2012), ISBN: 978-0-7695-4756-5/12, pp377-384, 2012
More details | External link available

A Response Strategy Model for Intrusion Response Systems
Anuar NB, Papadaki M, Furnell SM, Clarke NL
27th IFIP International Information Security and Privacy Conference - SEC2012, Heraklion, Crete, Greece, 4-6 June, pp573-578, 2012
More details

A Feasibility Study into Tracking Wi-Fi Enabled Mobile Devices
Dagnall M, Clarke NL
Proceedings of the Ninth International Network Conference (INC2012), Port Elizabeth, South Africa, July, ISBN: 978-1-84102-315-1, pp85-92, 2012
Can be ordered on-line.
More details | Download PDF

A Novel Security Architecture for a Space-Data DTN
Clarke NL, Katos V, Menesidou SA, Ghita BV, Furnell SM
10th International Conference on Wired/Wireless Internet Communications – WWIC 2012, Santorini, Greece, June 6-8, pp342-349, 2012
More details | External link available

Multi-Modal Behavioural Biometric Authentication for Mobile Devices
Saevanee H, Clarke NL, Furnell SM
27th IFIP International Information Security and Privacy Conference - SEC2012, Heraklion, Crete, Greece, 4-6 June, pp465-474, 2012
More details

Information Leakage Through Second Hand Usb Flash Drives within the United Kingdom
Chaerani W, Clarke NL, Bolan C
Australian Digital Forensics Conference, Perth, Australia, 5-7 December, 2011
More details

Incident detection for cloud environments
Doelitzscher F, Reich C, Knahl MH, Clarke NL
Proceedings of the Third International Conference on Emerging Network Intelligence (EMERGING 2011), ISBN: 978-1-61208-174-8, pp100-105, 2011
More details | External link available

An autonomous agent based incident detection system for cloud environments
Doelitzscher F, Reich C, Knahl MH, Clarke NL
Proceedings of the 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom2011), ISBN: 978-0-7695-4622-3/11, pp197-204, 2011
More details | External link available

A Risk Index Model for Security Incident Prioritisation
Anuar NB, Furnell SM, Papadaki M, Clarke NL
Proceedings of the 9th Australian Information Security Management Conference (ASIM 2011), Perth, Australia, 5-7 December, 2011
More details

A preliminary investigation of distributed and cooperative user authentication
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Proceedings of the 9th Australian Information Security Management Conference (secAU 2011), Perth, Australia, 5-7 December, 2011
More details

SMS Linguistic Profiling Authentication on Mobile Devices
Saevanee H, Clarke NL, Furnell SM
5th International Conference on Network and System Security (NSS 2011), p224-229, 2011
More details

Personal Knowledge Management - Beyond Versioning
Thaul W, Bleimann U, Clarke NL
LWA 2011, FG-WM, Magdeburg, Germany, 28-30 Sept , pp24-31, 2011
More details

Risk Assessment for Mobile Devices
Ledermuller T, Clarke NL
Proceedings of Privacy and Security in Digital Business – 8th International Conference, TrustBus 2011, Toulouse, France, 30 August - 2 September, pp210-221, LNCS (LNCS6863), ISBN: 978-3-642-22889-6, 2011
More details

Behaviour Profiling for Transparent Authentication for Mobile Devices
Li F, Clarke NL, Papadaki M, Dowland PS
Proceedings of the 10th European Conference on Information Warfare and Security (ECIW), Tallinn, Estonia 7-8 July, pp307-314, 2011
Awarded best PhD paper.
More details

Towards a Flexible, Multi-Level Security Framework for Mobile Devices
Clarke NL, Karatzouni S, Furnell SM
Proceedings of the 10th Security Conference, Las Vegas, USA, 4-6 May, 2011
More details | Download PDF

Culture of Integration: Literacy Tools for the Masses
Darracott A, Clarke NL
International Technology, Education and Development Conference (INTED 2011), 7-9 March, Valencia, Spain, ISBN:978-84-614-7423-3, pp4278-4285, 2011
More details | Download PDF

Behavioural Biometric Authentication For Mobile Devices
Saevanee H, Clarke NL, Furnell SM
Proceedings of the Collaborative European Research Conference (CERC2011), 14-15 January, Cork, Ireland, ISSN: 2220-4164, pp175-184, 2011
More details

Behaviour Profiling on Mobile Devices
Li F, Clarke NL, Papadaki M, Dowland PS
International Conference on Emerging Security Technologies, 6-8 September, Canterbury, UK, pp77-82, 2010
More details | External link available

Assessing the Usability of End-User Security Software
Ibrahim T, Furnell SM, Papadaki M, Clarke NL
Lecture Notes in Computer Science, Volume 6264/2010, pp177-189, 2010
More details | External link available

A distributed and cooperative user authentication framework
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Proceedings of the 6th International Confernece on Information Assurance and Security (IAS 2010), Atlanta, USA, 23-25 August, pp304-310, 2010
More details

An investigation and survey of response options for Intrusion Response Systems (IRSs)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Proceedings of the 9th Annual Information Security South Africa Conference, Sandton, South Africa, 2 - 4 August, pp1-8, ISBN: 978-1-4244-5493-8, 2010
More details | External link available

Service Quality Assessment in Distance Learning
Shauchenka H, Bleimann U, Knoll M, Clarke NL
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp269-277, 2010
Can be ordered on-line.
More details | Download PDF

E-Book readers in academic personal knowledge management
Thaul W, Bleimann U, Wentzel C, Clarke NL
Plymouth e-Learning Conference 2010, Plymouth, UK, 08-09 April, 2010
Abstract only publication.
More details

An Analysis of Information Security Awareness within Home and Work Environments
Talib S, Clarke NL, Furnell SM
Fifth International Conference on Availability, Reliability and Security (“ARES 2010 – The International Dependability Conference”), Krakow, Poland, 15-18th Feb, , 2010
More details | Download PDF

Strong Authentication for Web Services using Smartcards
Stienne DS, Clarke NL, Reynolds PL
Proceedings of the 7th Australian Information Security Management Conference (SECAU 2009), 1-3 December, Perth, Australia, On-line proceedings only, 2009
More details | Download PDF | External link available

A Critical Evaluation of an Online Peer Assessment System (OPAS)
Clarke NL, Dowland PS
Proceedings of the International Conference of Education, Research and Innovation (ICERI 2009), 16-18th November, Madrid, Spain, 2009
More details | Download PDF

Assessing the Usability of Personal Internet Security Tools
Ibrahim T, Furnell SM, Papadaki M, Clarke NL
8th European Conference on Information Warfare and Security (ECIW), Military Academy, Lisbon & the University of Minho, Braga, Portugal, 6-7 July, 2009
More details | Download PDF

Flexible and Transparent User Authentication for Mobile Devices
Clarke NL, Karatzouni S, Furnell SM
Proceedings of the 24th IFIP TC 11 International Information Security Conference, Pafos, Cyprus, May 18-20, ISBN: 978-3-642-01243-3, pp1-12, 2009
More details

Creation of logic-linguistic structure defining the educational services of Atlantis University
Shauchenka H, Bleimann U, Knoll M, Clarke NL
Plymouth e-Learning Conference 2009, Plymouth, UK, 23-24 April, 2009
Abstract only publication.
More details

How recommender systems applied in personal knowledge management environments can improve learning processes
Thaul W, Bleimann U, Wentzel C, Clarke NL
Plymouth e-Learning Conference 2009, Plymouth, UK, 23-24 April, 2009
More details | Download PDF

Intrusion Detection System for Mobile Devices: Investigation on Calling Activity
Li F, Clarke NL, Papadaki M
Proceedings of the 8th Security Conference, April, Las Vegas, USA, 2009
More details | Download PDF

Deployment of Keystroke Analysis on a Smartphone
Buchoux A, Clarke NL
Proceedings of the 6th Australian Information Security & Management Conference, 1-3 December, Perth, Australia, 2008
More details | Download PDF

Effective Information Assurance for SMEs
Dimopoulos V, Furnell SM, Clarke NL
Proceedings of he 11th Annual Working Conference on Information Security Management, 16-17 October, Richmond, USA, pp27-45, ISBN: 978-3-901882-31-9, 2008
Can be ordered on-line.
More details | Download PDF

The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset
Tjhai GC, Papadaki M, Furnell SM, Clarke NL
Lecture Notes in Computer Science, Volume 5185/2008, ISBN: 978-3-540-85734-1, pp139-150, 2008
More details | External link available

Investigating the problem of IDS false alarms: An experimental study using Snort
Tjhai GC, Papadaki M, Furnell SM, Clarke NL
Proceeding of the 23rd International Information Security Conference (SEC 2008), Milan, Italy, 8-10 September, pp253-267, 2008
More details

Assessing the challenges of Intrusion Detection Systems
Ibrahim T, Furnell SM, Papadaki M, Clarke NL
Proceedings of the 7th Security Conference, Las Vegas, USA, 2nd-3rd June, 2008
More details | Download PDF

Transparent Facial Recognition for Mobile Devices
Clarke NL, Karatzouni S, Furnell SM
Proceedings of the 7th Security Conference, Las Vegas, USA, 2nd-3rd June, 2008
More details | Download PDF

Device- versus Network-Centric Authentication Paradigms for Mobile Devices: Operational and Perceptual Trade-Offs
Karatzouni S, Clarke NL, Furnell SM
5th Australian Information Security Management Conference, Mount Lawley, Australia, 5th December, 2007
More details | Download PDF

Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation
Razak SA, Furnell SM, Clarke NL, Brooke PJ
Ad-Hoc, Mobile, and Wireless Networks, LNCS, vol: 4686/2007, pp129-141, 2007
More details | External link available

Utilising Biometrics for Transparent Authentication on Mobile Devices
Karatzouni S, Clarke NL, Furnell SM
Proceedings of the 2nd International Conference on Internet Technologies and Applications, 4-7 September, Wrexham, UK, ISBN: 978-0-946881-54-3, pp549–557, 2007
More details | Download PDF | External link available

User Perception of the Security & Privacy Concerns of RFID Technology
Li F, Clarke NL, Bolan C
Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2007), Plymouth, UK, ISBN: 978-1-84102-174-4, pp156-169, 2007
Can be ordered on-line.
More details | Download PDF

Keystroke Analysis for Thumb-based Keyboards on Mobile Devices
Karatzouni S, Clarke NL
Proceedings of the 22nd IFIP International Information Security Conference (IFIP SEC 2007), Sandton, South Africa, 14-16 May, pp. 253-263, 2007
More details

Perceptions of User Authentication on Mobile Devices
Karatzouni S, Furnell SM, Clarke NL, Botha RA
Proceedings of the ISOneWorld Conference, Las Vegas, USA, April 11-13, CD Proceedings (0-9772107-6-6), 2007
More details | Download PDF

Web-Based Risk Analysis and Education for Home Users
Marston J, Clarke NL
Proceedings of the 6th Annual Security Conference, Las Vegas, USA, April 11-12, CD Proceedings (ISBN: 0-9772107-5-8), 2007
More details | Download PDF

The Awarenesss and Perception of Spyware Amongst Home PC Computer Users
Jaeger M, Clarke NL
Proceedings of the 7th Information Warfare & Security Conference, Perth, Australia, 4-5th December, 2006
More details | Download PDF

Transparent Handwriting Verification for Mobile Devices
Clarke NL, Mekala AR
Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK, 11-14 July, pp277-288, 2006
More details | Download PDF

A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks – A Friend Approach
Razak SA, Furnell SM, Clarke NL, Brooke PJ
Proceedings of the IEEE International Conference on Intelligence and Security Informatics Conference (ISI 2006), San Diego, CA, USA, pp590-595, May 23-24, 2006
More details | External link available

Attack Pattern Analysis: Trends in Malware Variant Development
Papadaki M, Furnell SM, Clarke NL, Abu-Bakar UA, Pinkney G
Proceedings of the 5th Security Conference, Las Vegas, April 19 -20, 2006
More details

Considering the role of academic qualifications for IT security professionals
Furnell SM, Katos V, Clarke NL
Proceedings of the 1st Colloquium for Information Systems Security Education, Asia Pacific, Adelaide, Australia, 21-22 November, pp1-11, 2005
More details

User Authentication for Mobile Devices: A Composite Approach
Clarke NL, Furnell SM
Proceedings of the 6th Australian Information Warfare and Security Conference, Geelong, Australia, 25-26 November, pp48-56, 2005
More details | Download PDF

Artificial Impostor Profiling for Keystroke Dynamics on a Mobile Handset
Lecomte J, Clarke NL, Furnell SM
Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp199-206, 2005
More details | Download PDF

Organisational Security Culture: Embedding Security Awareness, Education and Training
Furnell SM, Clarke NL
Proceedings of the 4th World Conference on Information Security Education WISE 2005, 18-20 May, Moscow, Russia, pp67-74, 2005
More details | Download PDF

User Authentication by Service Utilisation Profiling
Aupy A, Clarke NL
Proceedings of the ISOneWorld 2005, Las Vegas, USA, 30 March - 1 April, 2005
More details | Download PDF

Application of Keystroke Analysis to Mobile Text Messaging
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the 3rd Security Conference, Las Vegas, USA, 14-15 April, 2004
More details | Download PDF

Using Keystroke Analysis as a mechanism for Subscriber Authentication on Mobile Handsets
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the IFIP SEC 2003 Conference, Athens, Greece, May, pp97-108, 2003
More details | Download PDF

Biometric Authentication for Mobile Devices
Clarke NL, Furnell SM, Reynolds PL
Proceedings of the 3rd Australian Information Warfare and Security Conference, Perth, Western Australia, 28-29 November 2002, pp61-69, 2002
More details | Download PDF

Subscriber Authentication for Mobile Phones through the Implementation of Keystroke Dynamics
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July, pp347-355, 2002
More details | Download PDF

Advanced Subscriber Authentication Approaches For Third Generation Mobile Systems
Clarke NL, Furnell SM, Reynolds PL, Rodwell PM
Proceedings of the Third International Conference on 3G Mobile Communication Technologies, London, UK, 8-10 May, 2002
More details | Download PDF

75 Conference papers

Books

Transparent User Authentication
Clarke NL
Springer, ISBN 978-0-85729-804-1, pp229, 2011
Use Amazon Look Inside! facility.
More details | External link available

Computer Forensics: A Pocket Guide
Clarke NL
IT Governance Publishing, ISBN: 978-1849280396, 80pp, 2010
More details | External link available

2 Books

Edited books

Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014)
Clarke NL, Furnell SM
Plymouth, 8-10 July, ISBN: 978-1-84102-375-5, pp239, 2014
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the European Information Security Multi-Conference (EISMC 2013)
Furnell SM, Clarke NL, Katos V
Lisbon, Portugal, 8-10 May, ISBN: 978-1-84102-345-8, pp153, 2013
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012)
Clarke NL, Furnell SM
Plymouth University, ISBN: 978-1-84102-317-5, 222pp, 2012
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012)
Clarke NL, Tryfonas T, Dodge RC
Plymouth University, ISBN: 978-1-84102-316-8, 156pp, 2012
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011)
Furnell SM, Clarke NL
University of Plymouth, ISBN: 978-1-84102-284-0, 148pp, 2011
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Sixth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2011)
Clarke NL, Tryfonas T
University of Plymouth, ISBN: 978-1-84102-285-7, 177pp, 2011
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the South African Information Security Multi-Conference (SAISMC 2010)
Clarke NL, Furnell SM, von Solms R
University of Plymouth, ISBN: 978-1-84102-256-7, pp291, 2010
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Fourth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2009)
Clarke NL, Tryfonas T
University of Plymouth, ISBN: 978-1-84102-230-7, 126pp, 2009
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009)
Furnell SM, Clarke NL
University of Plymouth, ISBN: 978-1-84102-231-4, 147pp, 2009
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the Second International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008)
Clarke NL, Furnell SM
University of Plymouth, ISBN: 978-1-84102-189-8, 151pp, 2008
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2007)
Furnell SM, Clarke NL
University of Plymouth, ISBN: 978-1-84102-174-4, 178pp, 2007
Support independent publishing: Buy this book on Lulu.
More details

11 Edited books

Contributions to edited books

Understanding Cloud Audits
Doelitzscher F, Reich C, Knahl MH, Clarke NL
in "Privacy and Security for Cloud Computing", Pearson, S. and Yee, G. (Eds.), ISBN 978-1-4471-4188-4, 2012
More details | External link available

User Authentication Technologies
Clarke NL, Dowland PS, Furnell SM
in Securing Information and Communications Systems: Principles, Technologies, and Applications. S.M.Furnell, S.K.Katsikas, J.Lopez and A.Patel (Eds), Artech House, ISBN 978-1-59693-228-9, pp35-59, 2008
Available on-line.
More details

2 Contributions to edited books

Patents filed

Adjusting an operating mode of a security container in response to an unexpected received radio signal
Kosmas C, Tripp N, Westington A, Clarke NL, Tjhai CJ
UK Intellectual Property Office, UK Patent number: GB2472632 (A), 2011
Filed: 13/08/2009; Published: 16/02/2011
More details | Download PDF | External link available

A container and security systems
Kosmas C, Tripp N, Westington A, Clarke NL, Tjhai CJ
EU Patent Office, EU Patent WO2011018652, 2010
Filed: 31/08/2010
More details | External link available

2 Patents filed

Posters

E-invigilation of E-Assessments
Ketab S, Clarke NL, Dowland PS
The Postgraduate Society Conference, 19th March, Plymouth University, 2014
More details | Download PDF

Non-Intrusive Biometric Authentication for Mobile Devices
Clarke NL, Furnell SM, Reynolds PL, Rodwell PM
Poster presentation at Biometrics 2002, Excel Center, London, UK, 6-8 November, 2002
Recipient of Best Student Prize
More details | Download PDF

Non-Intrusive Subscriber Authentication for 3G Mopbile System
Clarke NL, Dowland PS, Furnell SM, Reynolds PL, Rodwell PM
Poster presentation at Britain's Younger Engineers in 2001, House of Commons, London, 3 December, 2001
More details | Download PDF

3 Posters

Internal publications

Web-Based Risk Analysis for Home Users
Magaya RT, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp136-145, 2013
Can be ordered on-line.
More details | Download PDF

Web-based Risk Analysis for SMEs
Kunder R, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp120-127, 2013
Can be ordered on-line.
More details | Download PDF

A Crime Depended Automated Search and Engine for Digital Forensics
Fizaine JP, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp73-87, 2013
Can be ordered on-line.
More details | Download PDF

Developing a Mobile WiFi Tracking Unit
Dagnall M, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp65-72, 2013
Can be ordered on-line.
More details | Download PDF

Improving Online Collaboration within the IFIP Working Group on Human Aspects of Information Security and Assurance
Burton O, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp58-64, 2013
Can be ordered on-line.
More details | Download PDF

Study of RSA Performance in Java Cards
Bernabé G, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp45-57, 2013
Can be ordered on-line.
More details | Download PDF

Security on Mobile Devices: A Survey of Users’ Attitudes and Opinions
Symes JE, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 9, ISBN: 978-1-84102-320-5, pp59-68, 2012
Can be ordered on-line.
More details | Download PDF

Culture of Integration: Literacy Tools for the Masses
Darracott A, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 8, ISBN: 978-1-84102-293-2, pp127-136, 2011
Can be ordered on-line.
More details | Download PDF

Web-based Risk Analysis Tool for Home Users
Jain M, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp151-158, 2010
Can be ordered on-line.
More details | Download PDF

Information Leakage through Second Hand USB Flash Drives
Chaerani W, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp143-150, 2010
Can be ordered on-line.
More details | Download PDF

Usability of Security Mechanism
Ofomata J, Clarke NL
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp59-68, 2010
Can be ordered on-line.
More details | Download PDF

Design and Development of Hard Disk Images for use in Computer Forensics
Siddiqui S, Clarke NL
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp234-242, 2009
Can be ordered on-line.
More details | Download PDF

Comparative Study and Evaluation of Six Face Recognition Algorithms with a View of their Application on Mobile Phones
Mahmoud N, Clarke NL
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp212-225, 2009
Can be ordered on-line.
More details | Download PDF

School Children! A Security Aware Generation?
Littlejohns JWG, Clarke NL
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp206-211, 2009
Can be ordered on-line.
More details | Download PDF

Smartphone Deployment of Keystroke Analysis
Buchoux A, Clarke NL
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp190-197, 2009
Can be ordered on-line.
More details | Download PDF

Information Security Leakage: A Forensic Analysis of USB Storage Disks
Adam A, Clarke NL
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp171-178, 2009
Can be ordered on-line.
More details | Download PDF

Implementing Biometrics to Curb Examination Malpractices In Nigeria
Odejobi OA, Clarke NL
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp115-123, 2009
Can be ordered on-line.
More details | Download PDF

Information Security Awareness and Culture
Al-Shehri Y, Clarke NL
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp12-22, 2009
Can be ordered on-line.
More details | Download PDF

Customer Satisfaction Monitoring System in Higher Education
Shauchenka H, Bleimann U, Knoll M, Clarke NL
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp45-55, 2009
Can be ordered on-line.
More details | Download PDF

Response Mechanisms for Intrusion Response Systems (IRSs)
Anuar NB, Furnell SM, Papadaki M, Clarke NL
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp3-14, 2009
Can be ordered on-line.
More details | Download PDF

Novel Single Sign On Architecture Based on the Subscriber Identity Module for Web Services
Stienne DS, Clarke NL, Reynolds PL
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp152-161, 2008
Can be ordered on-line.
More details | Download PDF

A Generic Information Security Framework for Mobile Systems
Sharma A, Clarke NL
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp78-88, 2008
Can be ordered on-line.
More details | Download PDF

Analysis and Evaluation of IDS Alerts on a Corporate Network
Rousseau C, Clarke NL, Ghita BV
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp68-77, 2008
Can be ordered on-line.
More details | Download PDF

Public Opinion Towards RFID Technology
Li F, Clarke NL
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp29-38, 2008
Can be ordered on-line.
More details | Download PDF

Mobile Devices- Personal or Corporate: Providing a Mechanism for Security
Eyetan GG, Clarke NL
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp20-28, 2008
Can be ordered on-line.
More details | Download PDF

Mobile Devices Personal or Corporate providing a Mechanism for Security
Chaudhury D, Clarke NL
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp3-10, 2008
Can be ordered on-line.
More details | Download PDF

Quantitative Analysis of Educational Services for Innovative Marketing in Higher Education
Shauchenka H, Bleimann U, Knoll M, Clarke NL
Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008), Wrexham, UK, ISBN: 978-1-84102-196-6, pp35-45, 2008
Can be ordered on-line.
More details | Download PDF

Intrusion Detection System for Mobile Devices: Preliminary Investigation
Li F, Clarke NL, Papadaki M
Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008), Wrexham, UK, ISBN: 978-1-84102-196-6, pp21-31, 2008
Can be ordered on-line.
More details | Download PDF

Keystroke analysis as an authentication method for thumb-based keyboards on mobile handsets
Karatzouni S, Clarke NL
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp213-221, 2007
Can be ordered on-line.
More details | Download PDF

Intrusion Detection System for mobile devices
Michalopoulos DS, Clarke NL
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp205-212, 2007
Can be ordered on-line.
More details | Download PDF

Web-Based Risk Analysis and Education for Home Users
Marston J, Clarke NL
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp89-99, 2007
Can be ordered on-line.
More details | Download PDF

The Awareness and Perception of Spyware amongst Home PC Computer Users
Jaeger M, Clarke NL
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp60-71, 2007
Can be ordered on-line.
More details | Download PDF

Device versus network-centric authentication models for mobile devices – operational and perceptual trade-offs
Karatzouni S, Clarke NL, Furnell SM
Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007), Plymouth, UK, ISBN: 978-1-8410-2173-7, pp23-39, 2007
Can be ordered on-line.
More details | Download PDF

Mobile Devices - Future Security Threats & Vulnerabilities
Sklikas V, Clarke NL
Advances in Network & Communication Engineering 3, pp100-108, 2006
Can be ordered on-line.
More details | Download PDF

Biometrics for Mobile Devices: A Comparison of Performance and Pattern Classification Approaches
Krishnasamy M, Clarke NL
Advances in Network & Communication Engineering 3, pp57-66, 2006
Can be ordered on-line.
More details | Download PDF

Security policies for small and medium enterprises
Kanellos A, Dimopoulos V, Clarke NL
Advances in Network & Communication Engineering 3, pp20-29, 2006
Can be ordered on-line.
More details | Download PDF

User Authentication by Service Utilisation Profiling
Aupy A, Clarke NL
Advances in Network & Communication Engineering 2, pp18-26, 2005
More details

Reliability of Commercial Biometric Authentication Solutions
Mustiere C, Clarke NL
Advances in Network & Communication Engineering 2, pp11-17, 2005
More details

Artificial Impostor Profiling for Keystroke Analysis on a Mobile Handset
Lecomte J, Clarke NL, Furnell SM
Advances in Network & Communication Engineering, pp55-62, 2004
More details | Download PDF

39 Internal publications

162 publication(s) - all categories.

Editorships / Refereeing for journals

Editorial Board Member, Computers & Security, Elsevier
Editorial Board Member, The Scientific World Journal (Communications & Networking), Hindawi Publishing
Editorial Board Member, Mobile Computing, World Academic Publishing
Associate Editor, Security & Communication Networks, John Wiley
Associate Editor, Communications and Computer Security, ACTA Press
Guest Editor, International Journal of Digital Crime and Forensics, Vol. 4, No. 4, 2012
Guest Editor, International Journal of Digital Crime and Forensics, Vol. 3, No. 3, 2011
Guest Editor, Information Management & Computer Security, Vol. 20, No. 1, 2012
Guest Editor, Information Management & Computer Security, Vol. 18, No. 1, 2010
Guest Editor, Information Management & Computer Security, Vol. 18, No. 5, 2010
Guest Editor, Information Management & Computer Security, Vol. 17, No. 1, 2009
Guest Editor, Information Management & Computer Security, Vol. 15, No. 5, 2007

Referee, International Journal of Interdisciplinary Telecommunications & Networking, IGI Global
Referee, Information Security Technical Report, Elsevier
Referee, EURASIP Journal on Advances in Signal Processing, Springer
Referee, Journal on Personal and Ubiquitous Computing: Special Issue: Security and Trust in Context-Aware Systems, Springer
Referee, International Journal of Electronic Governance (IJEG), Inderscience
Referee, IEEE Communications Surveys and Tutorials
Referee, IET Information Security, IET
Referee, KSII Transactions on Internet and Information Systems
Referee, Computer Standards and Interfaces, Elsevier
Referee, Journal of Mobile Networks & Applications, Springer
Referee, IEEE Journal on Selected Areas in Communications Special Issue on Advances in Digital Forensics for Communications and Networking
Referee, International Journal of Information Technologies and Systems Approach, IGI Global
Referee, International Journal of Computer Science and Security, Computer Science Journals
Referee, Journal of Systems and Software, Elsevier
Referee, IEEE Transactions on Information Forensics & Security, IEEE
Referee, The Computer Journal, Oxford Journals
Referee, Computers & Security, Elsevier
Referee, Recent Patents in Computer Science, Bentham Science
Referee, IET Signal Processing, IET
Referee, Security & Communication Networks, John Wiley & Sons
Referee, Journal of Network and Computer Applications, Elsevier
Referee, Journal for Information Warfare
Referee, Information Sciences, Elsevier

Conferences organised

In Progress:

Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2014), Plymouth, UK
Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2014), Plymouth, UK


Completed:

Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2013), Lisbon, Portugal
Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2013), Lisbon, Portugal
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2012), Crete, Greece
Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2012), Crete, Greece
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2011), Kingston University, United Kingdom
Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2011), Kingston University, United Kingdom
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2010), Nelson Mandela Metropolitan University, South Africa
Programme Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2010), Nelson Mandela Metropolitan University, South Africa
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2009), Univerity of Piraeus, Athens, Greece
Programme Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2009), Univerity of Piraeus, Athens, Greece
Track Chair: Mobility & Security, 8th Security Conference, April 2009, Las Vegas, USA
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2008), University of Plymouth, UK
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2007), University of Plymouth, UK
Track Chair: Mobility & Security, 6th Security Conference, April 2007, Las Vegas, USA

Other international conference activities

International Programme Committee, ISSA, South Africa, 13-15 August 2014
International Programme Committee, 29th IFIP TC-11 SEC 2014 International Information Security & Privacy Conference, Marrakech, Morocco, 2-4 June 2014
International Programme Committee Member, 9th International Conference on Availability, Reliability and Security (AReS), Switzerland, 8-11 September 2014
International Programme Committee, The 9th International Conference on Systems and Network Communications (ICSNC 2012), Nice, France, 12-16 October 2014

International Programme Committee Member, 11th International Conference on Trust, Privacy and Security in Digital Business (TrustBus '14), Munich, Germany, 1-5 September 2014
International Programme Committee, Advanced Cyberthreat Workshop, Oxford, UK, July 2014
International Programme Committee, 1st Symposium on Interdisciplinary Aspects of Security (IAS 14), Warsaw, Poland, 7-10 September 2014
Associate Editor, 22nd European Conference on Information Systems: Information Security Track, Tel Aviv, Israel, 9-11 June 2014
International Conference Committee Member, 6th International Conference on Cyber Warfare and Security (ICCWS), Indiana, US, 24-25 March 2014
International Programme Committee, The Second International Workshop on Cyber Patterns: Unifying Design Patterns with Security, Attack and Forensic Patterns, Oxfordshire, UK, 9-10 July 2013
International Programme Committee, World Conference on Information Security Education and Management (WISE8), Auckland, New Zealand, 8-10 July 2013
International Programme Committee, International Conference of the Biometrics Specialist Interest Group (BIOSIG), Darmstadt, Germany, 5-6 October 2013
International Programme Committee, ISSA, Johannesburg, South Africa, 14-16 August 2013
International Programme Committee, 28th IFIP TC-11 SEC 2013 International Information Security & Privacy Conference, Auckland, New Zealand, 8-10 July 2013
Programme Committee, The 11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Zhangjiajie, China, 13-15 November 2013
International Programme Committee Member, 10th International Conference on Trust, Privacy and Security in Digital Business (TrustBus '11), Prague, Czech Republic, 26-30 August 2013
International Programme Committee Member, 8th International Conference on Availability, Reliability and Security (AReS), Prague, 2-6 September 2013
International Conference Committee Member, International Conference on Cloud Security Management (ICCSM-2013), Seattle, US, 17-18 October 2013
International Conference Committee Member, Workshop on Information Security and Privacy (WISP 2012), Florida, US, 15 December 2012
International Conference Committee Member, 8th International Conference on i-Warfare and Security (ICIW), Colorado, USA, 25-26 March 2013
International Programme Committee, The First International Workshop on Cyber Patterns: Unifying Design Patterns with Security, Attack and Forensic Patterns
Technical Programme Committee, The 7th International Conference on Frontier Of Computer Science and Technology - Trust, Security and Privacy, China, 21-23 November 2012
International Programme Committee Member, 7th International Conference on Availability, Reliability and Security (AReS), Prague, 20-24 August 2012
International Programme Committee, Information Security South Africa (ISSA), Johannesburg, South Africa, 15-17 August 2012
International Programme Committee, The 7th International Conference on Systems and Network Communications (ICSNC 2012), Lisbon, Portugal, 18-23 November 2012
International Conference Committee Member, IFIP Security Conference 2012, Heraklion, Greece, 4-6 June 2012
International Conference Committee Member, 7th International Conference on i-Warfare and Security (ICIW), Seattle, USA, 22-23 March 2012
International Programme Committee Member, 8th International Conference on Trust, Privacy and Security in Digital Business (TrustBus '11), Toulouse, France, August 29 - September 2 2011
International Programme Committee, ISSA, South Africa, 15-17 August 2011
International Conference Committee Member, IFIP Security Conference 2011, Lucerne, Switzerland, 7-9 June 2011
International Conference Committee Member, The Sixth International Conference on Systems and Network Communications (ICSNC 2011), Barcelona, Spain, 23-28 October 2011
First Workshop on Information Security and Digital Investigations (ISAD 2010), Manchester, UK, 25-26 November 2010
International Conference Committee Member, 6th International Conference on i-Warfare and Security (ICIW), Washington, US, 17-18 March 2011
International Programme Committee Member, 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus '10), Bilboa, Spain, August 30 - September 3 2010
International Programme Committee, The Security Conference - Europe, Orebro, Sweden, 15-17 August 2010
International Programme Committee, ISSA, Johannesburg, South Africa, 2-4 August 2010
International Programme Committee Member, Fifth International Conference on Systems and Network Communications, Nice, France, 22-27 August 2010
International Programme Committee Member, 5th International Conference on Availability, Reliability and Security (AReS), Krakow, Poland, 15-18 February 2010.
International Programme Committee Member, International Symposium on Architecting Critical Systems (ISARCS 2010), Praque, Czech Republic, 23-25 June 2010.
International Conference Committee Member, 5th International Conference on i-Warfare and Security (ICIW), Nebraska, US, 8-10 April 2010
International Programme Committee, First International Workshop on Software Security Process, Vancouver, Canada, 29 August 2009.
International Programme Committee, South African Institute for Computer Scientists and Information Technologists, South Africa, 13-14 October 2009.
International Programme Committee Member, EUROMEDIA, Bruges, Netherlands, 15-17 April 2009
International Programme Committee Member, International Conference on Networks and System Communications (ICSNC 2009), Porto, Portugal, 20-25 September 2009
International Programme Committee Member, 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus '09), Linz, Austria, August 31 - September 4, 2009
International Programme Committee, 3rd Views on Designing Complex Architectures (VODCA), Bertinoro, Italy, 30-31 August 2008
International Programme Committee, South African Institute for Computer Scientists and Information Technologists, South Africa, 6-8 October 2008.
International Programme Committee, ISSA, Johannesburg, South Africa, 7-9 July 2008
Reviewer, IFIP Security Conference (IFIP SEC), Milan, Italy, 8-10 September 2008
Programme Committee, Workshop on Digital Forensics and Incident Analysis (WDFIA 2008), Malaga, Spain,  October 2008
International Programme Committee Member, 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus '08), Turin, Italy, September 1-5, 2008
International Programme Committee Member, International Conference on Networks and System Communications (ICSNC 2008), Sliema, Malta, 26-31 October 2008
International Programme Committee Member, 3rd International Conference on Availability, Reliability and Security (AReS), 2008.
International Conference Committee Member, 3rd International Conference on i-Warfare and Security (ICIW), Nebraska, US, 24-25 April 2008.
International Programme Committee Member, International Conference on Networks and System Communications (ICSNC 2007), French Riviera, France, 25-31 August 2007
International Programme Committee, 8th Australian Information and Security Conference; 5th Australian Information Security Management Conference; 5th Australian Digtial Forensics Conference, Perth, Western Australia, Australia, 3-4 December 2007.
International Programme Committee, South African Institute for Computer Scientists and Information Technologists, South Africa, 9-11 October 2007.
International Programme Committee, International Conference on Communication, Network and Information Security (CNIS 2007), Berkeley, USA, August 24-26 2007
International Programme Committee, International Symposium on Information Security (IS '07), Iberian Peninsula, October 28 - November 2, 2007
Reviewer, 6th International Conference on Signal Processing, Robotics and Automation (ISPRA '07), Corfu, Greece, February 16-19, 2007
Internatinal Programme Committee, 4th International Conference on Trust and Privacy in Digital Business (TrustBus'07), Regensburg, Germany, September 3-7, 2007
International Programme Committee, EUROMEDIA 2007, Delft, Netherlands, April 2007
Reviewer, 7th Australian Information Warfare and Security Conference, Australia, December 2006
International Programme Committee Member, IFIP TC-11 WG11.1 & WG11.8 Joint Workshop on Information Security, IFIP Security Conference, South Africa, May 2007
Reviewer, Workshop on Spoofing, Digital Forensics and Open Source Tools, 2nd International Conference on Availability, Reliability and Security (AReS), Vienna, Austria, 10-13 April 2007
International Programme Committee Member, 2nd International Conference on Availability, Reliability and Security (AReS), Vienna, Austria, 10-13 April 2007
Programme Committee, 1st Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2006), Glamorgan, UK,  13 December 2006
International Programme Committee Member, International Conference on Networks and System Communications (ICSNC 2006), Tahiti, French Polynesia, 2-4 November 2006
Technical Programme Committee, First International Workshop on Information Security (IS'06), France, October, 2006
International Programme Committee, International Conference on Communication, Network and Information Security, Cambridge, USA, 9-11 October, 2006
Reviewer, Information Security South Africa (ISSA), Gauteng, South Africa, 5-7 July 2006
Programme Committee, 3rd International Conference on Trust and Privacy in Digital Business (TrustBus'06), Krakov, Poland, September 4-8, 2006
Programme Committee, EUROMEDIA 2006, Athens, Greece, April 2006
Programme Committee, International Network Conference 2006, INC 2006, Plymouth, UK, July 2006
Programme Committee, International Conference on Enterprise Information Systems, Miami, 2005.
Programme Committee , International Network Conference 2005, INC 2005, Samos, Greece, July 2005

Local Organising Committee, International Network Conference 2004, INC 2006, Plymouth, July 2004
Local Organising Committee, International Network Conference 2004, INC 2004, Plymouth, July 2004
Local Organising Committee, International Network Conference 2002, INC 2002, Plymouth, 16-18 July 2002

International Programme Committee Member, International Symposium on Architecting Critical Systems (ISARCS 2010), Praque, Czech Republic, 23-25 June 2010.

Current MPhil/PhD Supervisions

Completed MPhil/PhD Supervisions

Examination of research degrees

2014, DPhil Thesis, A Public Safety, Participatory Crowdsourcing Smart City Model for a Developing Country, University of Fort Hare, South Africa
2014, PhD Thesis, The Practical Implementation of Optimal and Pseudo-Optimal Routing Algorithms, Glyndwr University, United Kingdom
2014, PhD Thesis, Anonymous Authenticated Announcement Schemes in Vehicular Ad Hoc Networks, Royal Holloway, University of London
2014, PhD Thesis, Method for the Adoption of Information Technology Governance, Risk Management and Compliance in Swiss Hospitals, Plymouth University (Internal)
2013, MSc Thesis, Forensic Evidence Isolation in Clouds, University of Pretoria, South Africa
2013, PhD Thesis, Digital Forensics: An Integrated Approach for the Investigation of Cyber/Computer Related Crimes, University of Bedfordshire
2013 Service Quality and Profit Control in Utility Computing Service Life Cycles, PhD Thesis, Plymouth University (Internal Examiner)
2012 The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice, PhD Thesis, Murdoch University, Australia
2012 Security Usability in IT Systems, MPhil Thesis, Plymouth University (Internal Examiner)
2011 Pre-emptive Mobile Code Protection using Spy Agents, PhD Thesis, Royal Holloway, University of London
2011 Enhancing User Authentication Using Graphical Techniques, PhD Thesis, University of Plymouth (Internal Examiner), UK
2011 An Inside Misuse Threat Specification Language, PhD Thesis, University of Plymouth (Internal Examiner), UK
2011 Behavioural Profiling in Mobile Neworks, PhD Thesis, University of Plymouth (Internal Examiner), UK
2010 An Investigation into Remote Transactions, PhD Thesis, Edith Cowan University, Australia
2010 Intrusion Detection Method using a Combination of Neural Network Algorithms, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
2010 Parameter Based Identification, Authentication and Authorisation Method for Mobile Devices, PhD Thesis, City University, London, UK
2010 An Automatic Bank System for Client Credit Rating, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
2009 Smartcard Architecture for Dynamic and Secure Authentication, MSc, University of Pretoria, South Africa
2008 Models and Methods of Information Security Risks Assessment in the Cirumstances of Input Information Ambiguity, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
2008 Adoption of Criminal Profiling to Combat Hacking, MPhil Thesis, University of Plymouth, UK - Internal Examiner
2007 Establishing Information Security Culture in Australian Small and Medium Enterprises, PhD Thesis, Deakin University, Australia
2007 A Key Management Framework for Secure Group Communication in Wireless Mobile Environments, PhD Thesis, Royal Holloway, University of London, UK
2006 The Effectiveness of Graphical Authentication: An Exploratory Study, PhD Thesis, Deakin University, Australia
2006 Ontology Modeling for the Information Sharing Process within the Labour Market, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
2006 Corporate Information Risk: An Information Security Governance Framework, MTech Dissertation, Nelson Mandela Metropolitan University, South Africa

Invited Presentations, Lectures, etc.

Invited Scholar, IPICS Summer School, Lesvos, Greece, Juiy 2014
Invited Scholar, University of Fort Hare, South Africa, April 2014
Invited Presentation, "The Role of Digital Forensics within Organisations", Secure South West, Plymouth, December 2013
Invited Presentation, "Information Security: Impacts and Consequences", Brunel University, London, November 2010
Invited Presentation, "Security and Privacy", Brunel University, London, November 2009
Invited Presentation, "The Future of Biometrics in E-Learning Systems ", Biometric Consortium Conference, Florida, USA, September 2009
Invited Presentation, "Effective User Authentication for Mobile Devices", University of Nevada, London, July 2009
Invited Presentation, "Applications Security", University of Tunis-Carthage, Tunis, Tunisia, March, 2009
Invited Presentation, "Biometrics - No Silver Bullet", University of Portsmouth, Portsmouth, UK, January 2009
Invited Lecturer, IPICS Summer School, Regensburg, Germany, July 2008
Invited Presentation, "Flexible and Transparent User Authentication for Mobile Devices", Oviedo, Spain, May 2008
Invited Presentation, "User Authentication for Mobile Devices", University of Portsmouth, Portsmouth, UK, March 2007
Invited Presentation, "Biometric Authentication for Mobile Devices", Aston University, Birmingham, UK, Feburary 2007
Keynote Speech, The Art of Computing Technology 2006, "Biometrics: The Future of Personal Authentication", University of Technology Malaysia, March 2006
Invited Lecturer/Scholar, University of Technology Malaysia, March/April 2006
Keynote Speech, 11th Conference on Human Computer Interaction, "Biometrics: The Promise Versus the Practice", Oviedo, Spain, 22-24 March 2006
Invited Lecturer/Scholar, Nelson Mandela Metropolitan University, August/September 2005
Invited Lecturer, IPICS Summer School, Chios, Greece, July 2005
Invited Lecturer, IPICS Winter School, Oulu, Finland, April 2005

Best Paper Award, 3rd International Conference on Emerging Network Intelligence (EMERGING 2011), Lisbon, Portugal, 2011
Best Paper Award, 9th Information Security Management Conference, Perth, Australia, 2011
Best Student Paper, 10th European Conference on Information Warfare and Security (ECIW), Tallin, Estonia, 2011
Outstanding Paper Award, Information Management & Computer Security, Emerald, Paper: "The Application of Signature Recognition to Transparent Handwriting Verification for Mobile Devices", 2008
Best Paper Prize, 3rd Australian Information Warfare and Security Conference, Perth, Australia, 2002.
Best Poster Prize, 5th World Conference & Exhibition on the Practical Application of Biometrics, London, UK, 2002