Volgen
Fudong Li
Fudong Li
Senior Lecturer in Cyber Security, Bournemouth University, UK
Geverifieerd e-mailadres voor bournemouth.ac.uk
Titel
Geciteerd door
Geciteerd door
Jaar
Active authentication for mobile devices utilising behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International journal of information security 13 (3), 229-244, 2014
1142014
Identifying and Predicting the Factors Affecting End-Users’ Risk-Taking Behavior
M Alohali1, N Clarke, F Li, S Furnell
Information & Computer Security, 00-00, 2018
782018
Behaviour profiling for transparent authentication for mobile devices
F Li, N Clarke, M Papadaki, P Dowland
Proceedings of the 10th European Conference on Information Warfare (ECIW …, 2011
632011
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data
H Mohammed, N Clarke, F Li
The Journal of Digital Forensics, Security and Law: JDFSL 11 (2), 137, 2016
602016
Behaviour Profiling for Mobile Devices
F Li
University of Plymouth, 2012
602012
Behaviour profiling on mobile devices
F Li, N Clarke, M Papadaki, P Dowland
Emerging Security Technologies (EST), 2010 International Conference on, 77-82, 2010
602010
A suspect-oriented intelligent and automated computer forensic analysis
M Al Fahdi, NL Clarke, F Li, SM Furnell
Digital Investigation 18, 65-76, 2016
422016
Unobtrusive Gait Recognition using Smartwatches
N Al-Naffakh, N Clarke, F Li, P Haskell-Dowland
382017
Real-world smartphone-based gait recognition
H Alobaidi, N Clarke, F Li
Computers & Security, 102557, 2021
362021
A novel privacy preserving user identification approach for network traffic
N Clarke, F Li, S Furnell
Computers & Security, 2017
352017
Misuse detection for mobile devices using behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International Journal of Cyber Warfare and Terrorism (IJCWT) 1 (1), 41-53, 2011
312011
Continuous User Authentication Using Smartwatch Motion Sensor Data
N Al-Naffakh, N Clarke, F Li
IFIP International Conference on Trust Management, 15-28, 2018
282018
Activity Recognition using wearable computing
N Al-Naffakh, N Clarke, P Dowland, F Li
Internet Technology and Secured Transactions (ICITST), 2016 11th …, 2016
242016
Smart watch based body-temperature authentication
TS Enamamu, N Clarke, P Haskell-Dowland, F Li
Computing Networking and Informatics (ICCNI), 2017 International Conference …, 2017
232017
User profiling from network traffic via novel application-level interactions
G Alotibi, N Clarke, F Li, S Furnell
Internet Technology and Secured Transactions (ICITST), 2016 11th …, 2016
172016
Physical activity recognition by utilising smartphone sensor signals
A Alruban, H Alobaidi, N Clarke, F Li
8th International Conference on Pattern Recognition Applications and Methods …, 2019
162019
Behavioral-Based Feature Abstraction from Network Traffic
G Alotibi, F Li, N Clarke, S Furnell
Iccws 2015-The Proceedings of the 10th International Conference on Cyber …, 2015
152015
Multi-Platform Authorship Verification
A Altamimi, N Clarke, S Furnell, F Li
Proceedings of the Third Central European Cybersecurity Conference, 13, 2019
132019
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements
A Da Veiga, R Vorster, F Li, N Clarke, SM Furnell
Information and Computer Security, 2019
132019
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing
M Clasen, F Li, D Williams
International Symposium on Human Aspects of Information Security and …, 2021
112021
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20