Nathan L. Clarke

Orcid: 0000-0002-3595-3800

Affiliations:
  • Plymouth University, Centre for Security, Communications and Network Research


According to our database1, Nathan L. Clarke authored at least 124 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fundamentals of Digital Forensics - A Guide to Theory, Research and Applications, Third Edition
Texts in Computer Science, Springer, ISBN: 978-3-031-53648-9, 2024

A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence.
CoRR, 2024

GPT-Enabled Cybersecurity Training: A Tailored Approach for Effective Awareness.
Proceedings of the Information Security Education - Challenges in the Digital Age, 2024

2023
Editorial: Human aspects of cyber security.
Inf. Comput. Secur., 2023

A Unified Knowledge Graph to Permit Interoperability of Heterogenous Digital Evidence.
Proceedings of the Ubiquitous Security, 2023

Pix2Pix Hyperparameter Optimisation Prediction.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Unified Intersection Over Union for Explainable Artificial Intelligence.
Proceedings of the Intelligent Systems and Applications, 2023

Pix2Pix Hyperparameter Optimisation Towards Ideal Universal Image Quality Index Score.
Proceedings of the Intelligent Systems and Applications, 2023

A Novel Metric for XAI Evaluation Incorporating Pixel Analysis and Distance Measurement.
Proceedings of the 35th IEEE International Conference on Tools with Artificial Intelligence, 2023

2022
Addressing big data variety using an automated approach for data characterization.
J. Big Data, 2022

Real-world smartphone-based gait recognition.
Comput. Secur., 2022

The Need for Emergency-Based Access Control in AAL Systems.
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022

Surface Quality Augmentation for Metalworking Industry with Pix2Pix.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

Explainable AI with Domain Adapted FastCAM for Endoscopy Images.
Proceedings of the Computational Science - ICCS 2022, 2022

2021
Incorporating the human facet of security in developing systems and services.
Inf. Comput. Secur., 2021

A novel approach for improving information security management and awareness for home environments.
Inf. Comput. Secur., 2021

2020
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements.
Inf. Comput. Secur., 2020

2019
A proactive malicious software identification approach for digital forensic examiners.
J. Inf. Secur. Appl., 2019

A framework for reporting and dealing with end-user security policy compliance.
Inf. Comput. Secur., 2019

End-to-middle-to-end solution for IMS media plane security.
Electron. Commer. Res., 2019

User Profiling Based on Application-Level Using Network Metadata.
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019

Physical Activity Recognition by Utilising Smartphone Sensor Signals.
Proceedings of the 8th International Conference on Pattern Recognition Applications and Methods, 2019

Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Privacy Enhancing Technology Awareness for Mobile Devices .
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

Holistic Information Security Management for Home Environments.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

Privacy Enhancing Data Access Control for Ambient Assisted Living.
Proceedings of the 9th International Conference on Cloud Computing and Services Science, 2019

Rule-Based Security Monitoring of Containerized Environments.
Proceedings of the Cloud Computing and Services Science - 9th International Conference, 2019

Rule-based Security Monitoring of Containerized Workloads.
Proceedings of the 9th International Conference on Cloud Computing and Services Science, 2019

Fast Predictive Maintenance in Industrial Internet of Things (IIoT) with Deep Learning (DL): A Review.
Proceedings of the 5th Collaborative European Research Conference (CERC 2019), 2019

Multi-Platform Authorship Verification.
Proceedings of the Third Central European Cybersecurity Conference, 2019

Information Security Risk Communication: A User-Centric Approach.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
A novel transparent user authentication approach for mobile applications.
Inf. Secur. J. A Glob. Perspect., 2018

Identifying and predicting the factors affecting end-users' risk-taking behavior.
Inf. Comput. Secur., 2018

Sharing with Live Migration Energy Optimization Scheduler for Cloud Computing Data Centers.
Future Internet, 2018

Facial-Forensic Analysis Tool.
Digit. Investig., 2018

Biometrically Linking Document Leakage to the Individuals Responsible.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Securing Cloud Storage by Transparent Biometric Cryptography.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Continuous User Authentication Using Smartwatch Motion Sensor Data.
Proceedings of the Trust Management XII - 12th IFIP WG 11.11 International Conference, 2018

Misuse Detection in a Simulated IaaS Environment.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

A Comparison of compliance with data privacy requirements in two countries.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018

Evidence Identification in Heterogeneous Data Using Clustering.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A novel privacy preserving user identification approach for network traffic.
Comput. Secur., 2017

A novel multimedia-forensic analysis tool (M-FAT).
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Transparent authentication: Utilising heart rate for user authentication.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

An analysis of home user security awareness & education.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Insider Misuse Identification using Transparent Biometrics.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Identifying the Factors Affecting End-Users’ Risk-Taking Behavior.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

Unobtrusive Gait Recognition Using Smartwatches.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017

Insider Misuse Attribution using Biometrics.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data.
J. Digit. Forensics Secur. Law, 2016

Guest editorial.
Inf. Comput. Secur., 2016

Awareness of Mobile Device Security: A Survey of User's Attitudes.
Int. J. Mob. Comput. Multim. Commun., 2016

Leveraging Biometrics for Insider Misuse Identification.
Int. J. Cyber Situational Aware., 2016

A suspect-oriented intelligent and automated computer forensic analysis.
Digit. Investig., 2016

A forensic acquisition and analysis system for IaaS.
Clust. Comput., 2016

Continuous and transparent multimodal authentication: reviewing the state of the art.
Clust. Comput., 2016

Providing Security in Container-Based HPC Runtime Environments.
Proceedings of the High Performance Computing, 2016

User profiling from network traffic via novel application-level interactions.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Information security policies: A review of challenges and influencing factors.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Activity Recognition using wearable computing.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Software Defined Privacy.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

Proactive biometric-enabled forensic imprinting.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

Evidence Collection in Cloud Provider Chains.
Proceedings of the CLOSER 2016, 2016

A Scalable Architecture for Distributed OSGi in the Cloud.
Proceedings of the CLOSER 2016, 2016

A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Language-independent gender identification through keystroke analysis.
Inf. Comput. Secur., 2015

Continuous user authentication using multi-modal biometrics.
Comput. Secur., 2015

Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Awareness, behaviour and culture: The ABC in cultivating security compliance.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Transparent authentication systems for mobile device security: A review.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

An Identification of Variables Influencing the Establishment of Information Security Culture.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
A response selection model for intrusion response systems: Response Strategy Model (RSM).
Secur. Commun. Networks, 2014

Active authentication for mobile devices utilising behaviour profiling.
Int. J. Inf. Sec., 2014

Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

Text-Based Active Authentication for Mobile Devices.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Android forensics: Correlation analysis.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Performance-driven evaluation for deploying IMS-based interoperability scenarios.
Proceedings of the IEEE International Conference on Communications, 2014

Cloud QoS Scaling by Fuzzy Logic.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

An Evaluation of Behavioural Profiling on Mobile Devices.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM).
Secur. Commun. Networks, 2013

Co-operative user identity verification using an Authentication Aura.
Comput. Secur., 2013

A Technology Independent Security Gateway for Real-Time Multimedia Communication.
Proceedings of the Network and System Security - 7th International Conference, 2013

Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions.
Proceedings of the 2013 Information Security for South Africa, 2013

Anomaly Detection in IaaS Clouds.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Secur. Commun. Networks, 2012

An agent based business aware incident detection system for cloud environments.
J. Cloud Comput., 2012

Power to the people? The evolving recognition of human aspects of security.
Comput. Secur., 2012

A Novel Security Architecture for a Space-Data DTN.
Proceedings of the Wired/Wireless Internet Communication - 10th International Conference, 2012

Validating Cloud Infrastructure Changes by Cloud Audits.
Proceedings of the Eighth IEEE World Congress on Services, 2012

Multi-modal Behavioural Biometric Authentication for Mobile Devices.
Proceedings of the Information Security and Privacy Research, 2012

A Response Strategy Model for Intrusion Response Systems.
Proceedings of the Information Security and Privacy Research, 2012

A Feasibility Study into Tracking Wi-Fi Enabled Mobile Devices .
Proceedings of the Ninth International Network Conference (INC 2012), 2012

2011
Establishing A Personalized Information Security Culture.
Int. J. Mob. Comput. Multim. Commun., 2011

Misuse Detection for Mobile Devices Using Behaviour Profiling.
Int. J. Cyber Warf. Terror., 2011

Risk Assessment for Mobile Devices.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

SMS linguistic profiling authentication on mobile device.
Proceedings of the 5th International Conference on Network and System Security, 2011

Personal Knowledge Management - Beyond Versioning.
Proceedings of the Report of the symposium "Lernen, 2011

An Autonomous Agent Based Incident Detection System for Cloud Environments.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Transparent User Authentication - Biometrics, RFID and Behavioural Profiling.
Springer, ISBN: 978-0-85729-804-1, 2011

2010
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm.
Comput. Secur., 2010

Assessing the Usability of End-User Security Software.
Proceedings of the Trust, 2010

An investigation and survey of response options for Intrusion Response Systems (IRSs).
Proceedings of the Information Security South Africa Conference 2010, 2010

Service Quality Assessment in Distance Learning.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Behaviour Profiling on Mobile Devices.
Proceedings of the 2010 International Conference on Emerging Security Technologies, 2010

A distributed and cooperative user authentication framework.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

An Analysis of Information Security Awareness within Home and Work Environments.
Proceedings of the ARES 2010, 2010

2009
From desktop to mobile: Examining the security experience.
Comput. Secur., 2009

Flexible and Transparent User Authentication for Mobile Devices.
Proceedings of the Emerging Challenges for Security, 2009

2008
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks.
Ad Hoc Networks, 2008

The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset.
Proceedings of the Trust, 2008

Investigating the problem of IDS false alarms: An experimental study using Snort.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

2007
The application of signature recognition to transparent handwriting verification for mobile devices.
Inf. Manag. Comput. Secur., 2007

Authenticating mobile phone users using keystroke analysis.
Int. J. Inf. Sec., 2007

Advanced user authentication for mobile devices.
Comput. Secur., 2007

Keystroke Analysis for Thumb-based Keyboards on Mobile Devices.
Proceedings of the New Approaches for Security, 2007

Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference, 2007

2006
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.
Proceedings of the Intelligence and Security Informatics, 2006

2005
Authentication of users on mobile telephones - A survey of attitudes and practices.
Comput. Secur., 2005

2004
Optimising the Use of Available Technology in Educational Research.
Proceedings of the 7th IASTED International Conference on Computers and Advanced Technology in Education, 2004

2003
Keystroke dynamics on a mobile handset: a feasibility study.
Inf. Manag. Comput. Secur., 2003

Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices.
Comput. Secur., 2002

1994
Implementing Traffic Shaping.
Proceedings of the Proceedings 19th Conference on Local Computer Networks, 1994


  Loading...