Fudong Li

Affiliations:
  • University of Portsmouth, Portsmouth, UK


According to our database1, Fudong Li authored at least 38 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Cost-Efficient Threat Intelligence Platform Powered by Crowdsourced OSINT.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Real-world smartphone-based gait recognition.
Comput. Secur., 2022

2021
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

Open Source and Commercial Capture The Flag Cyber Security Learning Platforms - A Case Study.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements.
Inf. Comput. Secur., 2020

2019
End-to-middle-to-end solution for IMS media plane security.
Electron. Commer. Res., 2019

Physical Activity Recognition by Utilising Smartphone Sensor Signals.
Proceedings of the 8th International Conference on Pattern Recognition Applications and Methods, 2019

Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Privacy Enhancing Technology Awareness for Mobile Devices .
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

Multi-Platform Authorship Verification.
Proceedings of the Third Central European Cybersecurity Conference, 2019

2018
Identifying and predicting the factors affecting end-users' risk-taking behavior.
Inf. Comput. Secur., 2018

Facial-Forensic Analysis Tool.
Digit. Investig., 2018

Biometrically Linking Document Leakage to the Individuals Responsible.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Continuous User Authentication Using Smartwatch Motion Sensor Data.
Proceedings of the Trust Management XII - 12th IFIP WG 11.11 International Conference, 2018

Misuse Detection in a Simulated IaaS Environment.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

A Comparison of compliance with data privacy requirements in two countries.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018

Evidence Identification in Heterogeneous Data Using Clustering.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A novel privacy preserving user identification approach for network traffic.
Comput. Secur., 2017

A novel multimedia-forensic analysis tool (M-FAT).
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Transparent authentication: Utilising heart rate for user authentication.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Insider Misuse Identification using Transparent Biometrics.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Identifying the Factors Affecting End-Users’ Risk-Taking Behavior.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

Unobtrusive Gait Recognition Using Smartwatches.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017

Insider Misuse Attribution using Biometrics.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data.
J. Digit. Forensics Secur. Law, 2016

Leveraging Biometrics for Insider Misuse Identification.
Int. J. Cyber Situational Aware., 2016

A suspect-oriented intelligent and automated computer forensic analysis.
Digit. Investig., 2016

User profiling from network traffic via novel application-level interactions.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Activity Recognition using wearable computing.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Proactive biometric-enabled forensic imprinting.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

2014
Active authentication for mobile devices utilising behaviour profiling.
Int. J. Inf. Sec., 2014

Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

Performance-driven evaluation for deploying IMS-based interoperability scenarios.
Proceedings of the IEEE International Conference on Communications, 2014

An Evaluation of Behavioural Profiling on Mobile Devices.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
A Technology Independent Security Gateway for Real-Time Multimedia Communication.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
Behaviour profiling for mobile devices.
PhD thesis, 2012

2011
Misuse Detection for Mobile Devices Using Behaviour Profiling.
Int. J. Cyber Warf. Terror., 2011

2010
Behaviour Profiling on Mobile Devices.
Proceedings of the 2010 International Conference on Emerging Security Technologies, 2010


  Loading...