Nathan L. Clarke
Orcid: 0000-0002-3595-3800Affiliations:
- Plymouth University, Centre for Security, Communications and Network Research
According to our database1,
Nathan L. Clarke
authored at least 124 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Fundamentals of Digital Forensics - A Guide to Theory, Research and Applications, Third Edition
Texts in Computer Science, Springer, ISBN: 978-3-031-53648-9, 2024
A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence.
CoRR, 2024
Proceedings of the Information Security Education - Challenges in the Digital Age, 2024
2023
A Unified Knowledge Graph to Permit Interoperability of Heterogenous Digital Evidence.
Proceedings of the Ubiquitous Security, 2023
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023
Proceedings of the Intelligent Systems and Applications, 2023
Pix2Pix Hyperparameter Optimisation Towards Ideal Universal Image Quality Index Score.
Proceedings of the Intelligent Systems and Applications, 2023
A Novel Metric for XAI Evaluation Incorporating Pixel Analysis and Distance Measurement.
Proceedings of the 35th IEEE International Conference on Tools with Artificial Intelligence, 2023
2022
J. Big Data, 2022
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Proceedings of the Computational Science - ICCS 2022, 2022
2021
Inf. Comput. Secur., 2021
A novel approach for improving information security management and awareness for home environments.
Inf. Comput. Secur., 2021
2020
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements.
Inf. Comput. Secur., 2020
2019
A proactive malicious software identification approach for digital forensic examiners.
J. Inf. Secur. Appl., 2019
Inf. Comput. Secur., 2019
Electron. Commer. Res., 2019
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019
Proceedings of the 8th International Conference on Pattern Recognition Applications and Methods, 2019
Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019
Proceedings of the 9th International Conference on Cloud Computing and Services Science, 2019
Proceedings of the Cloud Computing and Services Science - 9th International Conference, 2019
Proceedings of the 9th International Conference on Cloud Computing and Services Science, 2019
Fast Predictive Maintenance in Industrial Internet of Things (IIoT) with Deep Learning (DL): A Review.
Proceedings of the 5th Collaborative European Research Conference (CERC 2019), 2019
Proceedings of the Third Central European Cybersecurity Conference, 2019
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019
2018
Inf. Secur. J. A Glob. Perspect., 2018
Inf. Comput. Secur., 2018
Sharing with Live Migration Energy Optimization Scheduler for Cloud Computing Data Centers.
Future Internet, 2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018
Proceedings of the Trust Management XII - 12th IFIP WG 11.11 International Conference, 2018
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Comput. Secur., 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
J. Digit. Forensics Secur. Law, 2016
Int. J. Mob. Comput. Multim. Commun., 2016
Int. J. Cyber Situational Aware., 2016
Digit. Investig., 2016
Continuous and transparent multimodal authentication: reviewing the state of the art.
Clust. Comput., 2016
Proceedings of the High Performance Computing, 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016
Proceedings of the CLOSER 2016, 2016
A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Inf. Comput. Secur., 2015
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
An Identification of Variables Influencing the Establishment of Information Security Culture.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
2014
A response selection model for intrusion response systems: Response Strategy Model (RSM).
Secur. Commun. Networks, 2014
Int. J. Inf. Sec., 2014
Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
2013
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM).
Secur. Commun. Networks, 2013
Comput. Secur., 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions.
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
2012
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Secur. Commun. Networks, 2012
J. Cloud Comput., 2012
Comput. Secur., 2012
Proceedings of the Wired/Wireless Internet Communication - 10th International Conference, 2012
Proceedings of the Eighth IEEE World Congress on Services, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Ninth International Network Conference (INC 2012), 2012
2011
Int. J. Mob. Comput. Multim. Commun., 2011
Int. J. Cyber Warf. Terror., 2011
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Personal Knowledge Management - Beyond Versioning.
Proceedings of the Report of the symposium "Lernen, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Springer, ISBN: 978-0-85729-804-1, 2011
2010
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm.
Comput. Secur., 2010
Proceedings of the Trust, 2010
An investigation and survey of response options for Intrusion Response Systems (IRSs).
Proceedings of the Information Security South Africa Conference 2010, 2010
Proceedings of the Eighth International Network Conference (INC 2010), 2010
Proceedings of the 2010 International Conference on Emerging Security Technologies, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
Proceedings of the ARES 2010, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
2008
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks.
Ad Hoc Networks, 2008
Proceedings of the Trust, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
2007
The application of signature recognition to transparent handwriting verification for mobile devices.
Inf. Manag. Comput. Secur., 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference, 2007
2006
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.
Proceedings of the Intelligence and Security Informatics, 2006
2005
Comput. Secur., 2005
2004
Optimising the Use of Available Technology in Educational Research.
Proceedings of the 7th IASTED International Conference on Computers and Advanced Technology in Education, 2004
2003
Inf. Manag. Comput. Secur., 2003
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
2002
Comput. Secur., 2002
1994
Proceedings of the Proceedings 19th Conference on Local Computer Networks, 1994