Obserwuj
Fudong Li
Fudong Li
Senior Lecturer in Cyber Security, Bournemouth University, UK
Zweryfikowany adres z bournemouth.ac.uk
Tytuł
Cytowane przez
Cytowane przez
Rok
Active authentication for mobile devices utilising behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International journal of information security 13 (3), 229-244, 2014
1172014
Identifying and Predicting the Factors Affecting End-Users’ Risk-Taking Behavior
M Alohali1, N Clarke, F Li, S Furnell
Information & Computer Security, 00-00, 2018
832018
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data
H Mohammed, N Clarke, F Li
The Journal of Digital Forensics, Security and Law: JDFSL 11 (2), 137, 2016
642016
Behaviour profiling for transparent authentication for mobile devices
F Li, N Clarke, M Papadaki, P Dowland
Proceedings of the 10th European Conference on Information Warfare (ECIW …, 2011
632011
Behaviour Profiling for Mobile Devices
F Li
University of Plymouth, 2012
602012
Behaviour profiling on mobile devices
F Li, N Clarke, M Papadaki, P Dowland
Emerging Security Technologies (EST), 2010 International Conference on, 77-82, 2010
522010
A suspect-oriented intelligent and automated computer forensic analysis
M Al Fahdi, NL Clarke, F Li, SM Furnell
Digital Investigation 18, 65-76, 2016
432016
Unobtrusive Gait Recognition using Smartwatches
N Al-Naffakh, N Clarke, F Li, P Haskell-Dowland
412017
Real-world smartphone-based gait recognition
H Alobaidi, N Clarke, F Li
Computers & Security, 102557, 2021
382021
A novel privacy preserving user identification approach for network traffic
N Clarke, F Li, S Furnell
Computers & Security, 2017
342017
Continuous User Authentication Using Smartwatch Motion Sensor Data
N Al-Naffakh, N Clarke, F Li
IFIP International Conference on Trust Management, 15-28, 2018
312018
Misuse detection for mobile devices using behaviour profiling
F Li, N Clarke, M Papadaki, P Dowland
International Journal of Cyber Warfare and Terrorism (IJCWT) 1 (1), 41-53, 2011
312011
Activity Recognition using wearable computing
N Al-Naffakh, N Clarke, P Dowland, F Li
Internet Technology and Secured Transactions (ICITST), 2016 11th …, 2016
262016
Smart watch based body-temperature authentication
TS Enamamu, N Clarke, P Haskell-Dowland, F Li
Computing Networking and Informatics (ICCNI), 2017 International Conference …, 2017
242017
User profiling from network traffic via novel application-level interactions
G Alotibi, N Clarke, F Li, S Furnell
Internet Technology and Secured Transactions (ICITST), 2016 11th …, 2016
192016
Physical activity recognition by utilising smartphone sensor signals
A Alruban, H Alobaidi, N Clarke, F Li
8th International Conference on Pattern Recognition Applications and Methods …, 2019
172019
Behavioral-Based Feature Abstraction from Network Traffic
G Alotibi, F Li, N Clarke, S Furnell
Iccws 2015-The Proceedings of the 10th International Conference on Cyber …, 2015
162015
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements
A Da Veiga, R Vorster, F Li, N Clarke, SM Furnell
Information and Computer Security, 2019
152019
Multi-Platform Authorship Verification
A Altamimi, N Clarke, S Furnell, F Li
Proceedings of the Third Central European Cybersecurity Conference, 13, 2019
142019
Biometrically Linking Document Leakage to the Individuals Responsible
A Alruban, N Clarke, F Li, S Furnell
International Conference on Trust and Privacy in Digital Business, 135-149, 2018
122018
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20