Paul Dowland
Orcid: 0000-0003-1365-0929Affiliations:
- Edith Cowan University, Perth, Australia
- Plymouth University, School of Computing and Mathematics (former)
According to our database1,
Paul Dowland
authored at least 59 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on ecu.edu.au
-
on twitter.com
-
on orcid.org
-
on cscan.org
On csauthors.net:
Bibliography
2024
Sensors, February, 2024
2023
IEEE Wirel. Commun. Lett., May, 2023
2022
Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection.
ACM Trans. Manag. Inf. Syst., 2022
Sensors, 2022
Connect. Sci., 2022
Proceedings of the IEEE International Conference on Communications, 2022
2021
Proceedings of the Advancing Research in Information and Communication Technology, 2021
An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study.
Sensors, 2021
Ad Hoc Networks, 2021
Proceedings of the Ubiquitous Security - First International Conference, 2021
2020
Correction to: Cooperative co‑evolution for feature selection in Big Data with random feature grouping.
J. Big Data, 2020
Cooperative co-evolution for feature selection in Big Data with random feature grouping.
J. Big Data, 2020
A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data Using Cooperative Co-Evolution.
IEEE Access, 2020
No Soldiers Left Behind: An IoT-Based Low-Power Military Mobile Health System Design.
IEEE Access, 2020
2019
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019
2018
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018
2017
The impact of security and its antecedents in behaviour intention of using e-government services.
Behav. Inf. Technol., 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017
2016
Inf. Secur. J. A Glob. Perspect., 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
2015
Inf. Secur. J. A Glob. Perspect., 2015
2014
Investigating the Viability of Multifactor Graphical Passwords for User Authentication.
Inf. Secur. J. A Glob. Perspect., 2014
Int. J. Inf. Sec., 2014
Connected In-Car Multimedia: Qualities Affecting Composability of Dynamic Functionality.
Proceedings of the Tenth International Network Conference, 2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
Nonvisual Presentation, Navigation and Manipulation of Structured Documents on Mobile and Wearable Devices.
Proceedings of the Computers Helping People with Special Needs, 2014
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
2013
Nonvisual Presentation and Navigation within the Structure of Digital Text-Documents on Mobile Devices.
Proceedings of the Universal Access in Human-Computer Interaction. Applications and Services for Quality of Life, 2013
2011
Int. J. Cyber Warf. Terror., 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Survey: Improving Document Accessibility from the Blind and Visually Impaired User's Point of View.
Proceedings of the Universal Access in Human-Computer Interaction. Applications and Services, 2011
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011
Resource management for multicore aware software architectures of in- car multimedia systems.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments.
J. Multim. Process. Technol., 2010
Inf. Manag. Comput. Secur., 2010
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010
Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy.
Proceedings of the South African Information Security Multi-Conference, 2010
Proceedings of the 2010 International Conference on Emerging Security Technologies, 2010
2009
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009
2008
Proceedings of the Seventh International Network Conference (INC 2008), 2008
2007
Proceedings of the New Approaches for Security, 2007
2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
2005
Inf. Manag. Comput. Security, 2005
2004
Inf. Manag. Comput. Secur., 2004
A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies.
Proceedings of the Security and Protection in Information Processing Systems, 2004
2003
Improving Security Awareness Through Computer-based Training.
Proceedings of the Security Education and Critical Infrastructures, 2003
2002
Inf. Manag. Comput. Secur., 2002
Keystroke Analysis as a Method of Advanced User Authentication and Response.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
2001
Inf. Manag. Comput. Secur., 2001
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
2000
Inf. Manag. Comput. Secur., 2000
1999
Comput. Secur., 1999