default search action
Paul Dowland 0001
Person information
- affiliation: Edith Cowan University, Perth, Australia
- affiliation (former): Plymouth University, School of Computing and Mathematics
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Ashley Woodiss-Field, Michael N. Johnstone, Paul Dowland:
Examination of Traditional Botnet Detection on IoT-Based Bots. Sensors 24(3): 1027 (2024) - 2023
- [j26]Xingbo Lu, Yuzhen Huang, Shihao Yan, Weiwei Yang, Paul S. Haskell-Dowland:
Energy-Efficient Covert Wireless Communication Through Probabilistic Jamming. IEEE Wirel. Commun. Lett. 12(5): 932-936 (2023) - 2022
- [j25]Liam Riddell, Mohiuddin Ahmed, Paul S. Haskell-Dowland:
Establishment and mapping of heterogeneous anomalies in network intrusion datasets. Connect. Sci. 34(1): 2755-2783 (2022) - [j24]Md Mursalin, Mohiuddin Ahmed, Paul S. Haskell-Dowland:
Biometric Security: A Novel Ear Recognition Approach Using a 3D Morphable Ear Model. Sensors 22(22): 8988 (2022) - [j23]A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul S. Haskell-Dowland:
Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection. ACM Trans. Manag. Inf. Syst. 13(3): 29:1-29:39 (2022) - [c29]Xian Yu, Shihao Yan, Jinsong Hu, Paul S. Haskell-Dowland, Yubing Han, Derrick Wing Kwan Ng:
On Relaying Strategies in Multi-Hop Covert Wireless Communications. ICC 2022: 666-672 - 2021
- [j22]Mohiuddin Ahmed, Surender Byreddy, Anush Nutakki, Leslie F. Sikos, Paul S. Haskell-Dowland:
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things. Ad Hoc Networks 122: 102621 (2021) - [j21]James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, Paul S. Haskell-Dowland, Xi Zheng:
An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study. Sensors 21(1): 312 (2021) - [c28]Ashley Woodiss-Field, Michael N. Johnstone, Paul S. Haskell-Dowland:
Towards Evaluating the Effectiveness of Botnet Detection Techniques. UbiSec 2021: 292-308 - [p1]Steven Furnell, Paul S. Haskell-Dowland, Manish Agrawal, Richard L. Baskerville, Anirban Basu, Matt Bishop, Jorge Cuéllar, Sara Foresti, Lynn Futcher, Nurit Gal-Oz, Tejaswini (Teju) Herath, Christian Damsgaard Jensen, Allen C. Johnston, Wouter Joosen, Giovanni Livraga, Javier López, Stephen Marsh, Fabio Martinelli, Fabio Massacci, Aljosa Pasic, Stef Schinagl, Abbas Shahim, Kerry-Lynn Thomson, Jaideep Vaidya, Tony Vance, Merrill Warkentin:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - 2020
- [j20]A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul S. Haskell-Dowland:
A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data Using Cooperative Co-Evolution. IEEE Access 8: 150113-150129 (2020) - [j19]James Jin Kang, Wencheng Yang, Gordana Dermody, Mohammadreza Ghasemian, Sasan Adibi, Paul S. Haskell-Dowland:
No Soldiers Left Behind: An IoT-Based Low-Power Military Mobile Health System Design. IEEE Access 8: 201498-201515 (2020) - [j18]A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul S. Haskell-Dowland:
Cooperative co-evolution for feature selection in Big Data with random feature grouping. J. Big Data 7(1): 107 (2020) - [j17]A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul S. Haskell-Dowland:
Correction to: Cooperative co‑evolution for feature selection in Big Data with random feature grouping. J. Big Data 7(1): 111 (2020)
2010 – 2019
- 2019
- [c27]James Jin Kang, Kiran Fahd, Sitalakshmi Venkatraman, Rolando Trujillo-Rasua, Paul S. Haskell-Dowland:
Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks. ITNAC 2019: 1-6 - 2018
- [c26]Burhan Al-Bayati, Nathan L. Clarke, Paul Dowland, Fudong Li:
Misuse Detection in a Simulated IaaS Environment. ETAA@ESORICS 2018: 103-115 - [i1]Junaid Ahsenali Chaudhry, Kashif Saleem, Paul S. Haskell-Dowland, Mahdi H. Miraz:
A Survey of Distributed Certificate Authorities in MANETs. CoRR abs/1807.03246 (2018) - 2017
- [j16]Nawaf Sulaiman Alharbi, Maria Papadaki, Paul Dowland:
The impact of security and its antecedents in behaviour intention of using e-government services. Behav. Inf. Technol. 36(6): 620-636 (2017) - [c25]Neamah Al-Naffakh, Nathan L. Clarke, Fudong Li, Paul S. Haskell-Dowland:
Unobtrusive Gait Recognition Using Smartwatches. BIOSIG 2017: 211-218 - [c24]Timibloudi S. Enamamu, Nathan L. Clarke, Paul S. Haskell-Dowland, Fudong Li:
Transparent authentication: Utilising heart rate for user authentication. ICITST 2017: 283-289 - 2016
- [j15]Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell:
Graphical One-Time Password (GOTPass): A usability evaluation. Inf. Secur. J. A Glob. Perspect. 25(1-3): 94-108 (2016) - [c23]Neamah Al-Naffakh, Nathan L. Clarke, Paul Dowland, Fudong Li:
Activity Recognition using wearable computing. ICITST 2016: 189-195 - [e6]Sergej Alekseev, Paul Dowland, Bogdan V. Ghita, Oliver Schneider:
Eleventh International Network Conference, INC 2016, Frankfurt, Germany, July 19-21, 2016. Proceedings. Plymouth University 2016, ISBN 978-1-84102-410-3 [contents] - 2015
- [j14]Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell:
Secure Graphical One Time Password (GOTPass): An Empirical Study. Inf. Secur. J. A Glob. Perspect. 24(4-6): 207-220 (2015) - 2014
- [j13]Fudong Li, Nathan L. Clarke, Maria Papadaki, Paul Dowland:
Active authentication for mobile devices utilising behaviour profiling. Int. J. Inf. Sec. 13(3): 229-244 (2014) - [j12]Mohd Zalisham Jali, Steven M. Furnell, Paul Dowland:
Investigating the Viability of Multifactor Graphical Passwords for User Authentication. Inf. Secur. J. A Glob. Perspect. 23(1-2): 10-21 (2014) - [c22]Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell:
Alternative Graphical Authentication for Online Banking Environments. HAISA 2014: 122-136 - [c21]Martin Lukas Dorigo, Bettina Harriehausen-Mühlbauer, Ingo Stengel, Paul S. Haskell-Dowland:
Nonvisual Presentation, Navigation and Manipulation of Structured Documents on Mobile and Wearable Devices. ICCHP (1) 2014: 383-390 - [c20]Nawaf Sulaiman Alharbi, Maria Papadaki, Paul Dowland:
Security challenges of E-government adoption based on end users' perspective. ICITST 2014: 78-82 - [c19]Andreas Knirsch, Joachim Wietzke, Ronald Moore, Paul Dowland:
Connected In-Car Multimedia: Qualities Affecting Composability of Dynamic Functionality. INC 2014: 81-93 - [e5]Paul Dowland, Steven Furnell, Bogdan V. Ghita:
Tenth International Network Conference, INC 2014, Plymouth, UK, July 8-10, 2014. Proceedings. Plymouth University 2014, ISBN 978-1-84102-373-1 [contents] - 2013
- [c18]Martin Lukas Dorigo, Bettina Harriehausen-Mühlbauer, Ingo Stengel, Paul S. Haskell-Dowland:
Nonvisual Presentation and Navigation within the Structure of Digital Text-Documents on Mobile Devices. HCI (8) 2013: 311-320 - 2012
- [e4]Reinhardt A. Botha, Paul Dowland, Steven Furnell:
Ninth International Network Conference (INC 2012), Port Elizabeth, South Africa, July 11-12, 2012. Proceedings. University of Plymouth 2012, ISBN 978-1-84102-315-1 [contents] - 2011
- [j11]Fudong Li, Nathan L. Clarke, Maria Papadaki, Paul Dowland:
Misuse Detection for Mobile Devices Using Behaviour Profiling. Int. J. Cyber Warf. Terror. 1(1): 41-53 (2011) - [c17]Mohd Zalisham Jali, Steven Furnell, Paul Dowland:
Multifactor graphical passwords: An assessment of end-user performance. IAS 2011: 7-12 - [c16]Andreas Knirsch, Joachim Wietzke, Ronald Moore, Paul Dowland:
Resource management for multicore aware software architectures of in- car multimedia systems. GI-Jahrestagung 2011: 216 - [c15]Zarul Fitri Zaaba, Steven Furnell, Paul Dowland:
End-User Perception and Usability of Information Security. HAISA 2011: 97-107 - [c14]Martin Lukas Dorigo, Bettina Harriehausen-Mühlbauer, Ingo Stengel, Paul S. Haskell-Dowland:
Survey: Improving Document Accessibility from the Blind and Visually Impaired User's Point of View. HCI (8) 2011: 129-135 - [c13]Mohd Zalisham Jali, Steven Furnell, Paul Dowland:
Quantifying the Effect of Graphical Password Guidelines for Better Security. SEC 2011: 80-91 - 2010
- [j10]Mohd Zalisham Jali, Steven Furnell, Paul Dowland:
Assessing image-based authentication techniques in a web-based environment. Inf. Manag. Comput. Secur. 18(1): 43-53 (2010) - [j9]Benjamin George Sanders, Paul Dowland, Shirley Atkinson, Daniel Zahra, Steven Furnell, Maria Papadaki:
Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments. J. Multim. Process. Technol. 1(3): 181-193 (2010) - [c12]Fudong Li, Nathan L. Clarke, Maria Papadaki, Paul Dowland:
Behaviour Profiling on Mobile Devices. EST 2010: 77-82 - [c11]Benjamin George Sanders, Paul Dowland, Steven Furnell:
Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy. SAISMC 2010: 61-73 - [c10]Benjamin George Sanders, Vivian Chen, Daniel Zahra, Paul Dowland, Shirley Atkinson, Maria Papadaki, Steven Furnell:
Online addiction: privacy risks in online gaming environments. MEDES 2010: 114-121 - [e3]Udo Bleimann, Paul Dowland, Steven Furnell, Oliver Schneider:
Eighth International Network Conference (INC 2010), Heidelberg, Germany, July 6-8, 2010. Proceedings. University of Plymouth 2010, ISBN 978-1-84102-259-8 [contents]
2000 – 2009
- 2009
- [c9]Benjamin George Sanders, Paul Dowland, Steven Furnell:
An Assessment of People's Vulnerabilities in Relation to Personal & Sensitive Data. HAISA 2009: 50-60 - [c8]Mohd Zalisham Jali, Steven Furnell, Paul Dowland:
Evaluating Web-Based User Authentication using Graphical Techniques. HAISA 2009: 108-118 - 2008
- [c7]Martin Swientek, Udo Bleimann, Paul Dowland:
Service-Oriented Architecture: Performance Issues and Approaches. INC 2008: 261-269 - [e2]Paul Dowland, Steven Furnell:
Seventh International Network Conference (INC 2008), Plymouth, UK, July 8-10, 2008. Proceedings. University of Plymouth 2008, ISBN 978-1-84102-188-1 [contents] - 2007
- [c6]Steven Furnell, Dimitris Katsabas, Paul Dowland, Fraser Reid:
A Practical Usability Evaluation of Security Features in End-User Applications. SEC 2007: 205-216 - 2006
- [c5]Steven Furnell, Adila Jusoh, Dimitris Katsabas, Paul Dowland:
Considering the Usability of End-User Security Software. SEC 2006: 307-316 - [e1]Paul Dowland, Steven Furnell, Bhavani Thuraisingham, Xiaoyang Sean Wang:
Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference [18-19 November 2004, Fairfax, Virginia; USA]. IFIP 193, Springer 2006, ISBN 978-0-387-29826-9 [contents] - 2005
- [j8]A. Al-Ayed, Steven Furnell, D. Zhao, Paul Dowland:
An automated framework for managing security vulnerabilities. Inf. Manag. Comput. Security 13(2): 156-166 (2005) - 2004
- [b1]Paul Dowland:
User authentication and supervision in networked systems. University of Plymouth, UK, 2004 - [j7]Steven Furnell, I. Papadopoulos, Paul Dowland:
A long-term trial of alternative user authentication technologies. Inf. Manag. Comput. Secur. 12(2): 178-190 (2004) - [c4]Paul Dowland, Steven Furnell:
A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. SEC 2004: 275-290 - 2003
- [c3]Steven Furnell, Alastair G. Warren, Paul Dowland:
Improving Security Awareness Through Computer-based Training. World Conference on Information Security Education 2003: 287-301 - 2002
- [j6]I. Irakleous, Steven Furnell, Paul Dowland, Maria Papadaki:
An experimental comparison of secret-based user authentication technologies. Inf. Manag. Comput. Secur. 10(3): 100-108 (2002) - [c2]Paul Dowland, Steven Furnell, Maria Papadaki:
Keystroke Analysis as a Method of Advanced User Authentication and Response. SEC 2002: 215-226 - 2001
- [j5]Steven Furnell, Pelagia Chiliarchaki, Paul Dowland:
Security analysers: administrator assistants or hacker helpers? Inf. Manag. Comput. Secur. 9(2): 93-101 (2001) - [c1]Harjit Singh, Steven Furnell, Benn Lines, Paul Dowland:
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. MMM-ACNS 2001: 153-158 - 2000
- [j4]Steven Furnell, Paul Dowland, H. M. Illingworth, Paul L. Reynolds:
Authentication and Supervision: A Survey of User Attitudes. Comput. Secur. 19(6): 529-539 (2000) - [j3]Steven Furnell, Paul Dowland:
A conceptual architecture for real-time intrusion monitoring. Inf. Manag. Comput. Secur. 8(2): 65-75 (2000)
1990 – 1999
- 1999
- [j2]Paul Dowland, Steven Furnell, H. M. Illingworth, Paul L. Reynolds:
Computer crime and abuse: A survey of public attitudes and awareness. Comput. Secur. 18(8): 715-726 (1999) - [j1]Steven Furnell, Paul Dowland, Peter W. Sanders:
Dissecting the "Hacker Manifesto". Inf. Manag. Comput. Secur. 7(2): 69-75 (1999)
Coauthor Index
aka: Steven M. Furnell
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint