Paul Dowland

Orcid: 0000-0003-1365-0929

Affiliations:
  • Edith Cowan University, Perth, Australia
  • Plymouth University, School of Computing and Mathematics (former)


According to our database1, Paul Dowland authored at least 59 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Examination of Traditional Botnet Detection on IoT-Based Bots.
Sensors, February, 2024

2023
Energy-Efficient Covert Wireless Communication Through Probabilistic Jamming.
IEEE Wirel. Commun. Lett., May, 2023

2022
Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection.
ACM Trans. Manag. Inf. Syst., 2022

Biometric Security: A Novel Ear Recognition Approach Using a 3D Morphable Ear Model.
Sensors, 2022

Establishment and mapping of heterogeneous anomalies in network intrusion datasets.
Connect. Sci., 2022

On Relaying Strategies in Multi-Hop Covert Wireless Communications.
Proceedings of the IEEE International Conference on Communications, 2022

2021

An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study.
Sensors, 2021

ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things.
Ad Hoc Networks, 2021

Towards Evaluating the Effectiveness of Botnet Detection Techniques.
Proceedings of the Ubiquitous Security - First International Conference, 2021

2020
Correction to: Cooperative co‑evolution for feature selection in Big Data with random feature grouping.
J. Big Data, 2020

Cooperative co-evolution for feature selection in Big Data with random feature grouping.
J. Big Data, 2020

A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data Using Cooperative Co-Evolution.
IEEE Access, 2020

No Soldiers Left Behind: An IoT-Based Low-Power Military Mobile Health System Design.
IEEE Access, 2020

2019
Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks.
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019

2018
A Survey of Distributed Certificate Authorities in MANETs.
CoRR, 2018

Misuse Detection in a Simulated IaaS Environment.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

2017
The impact of security and its antecedents in behaviour intention of using e-government services.
Behav. Inf. Technol., 2017

Transparent authentication: Utilising heart rate for user authentication.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Unobtrusive Gait Recognition Using Smartwatches.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017

2016
Graphical One-Time Password (GOTPass): A usability evaluation.
Inf. Secur. J. A Glob. Perspect., 2016

Activity Recognition using wearable computing.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

2015
Secure Graphical One Time Password (GOTPass): An Empirical Study.
Inf. Secur. J. A Glob. Perspect., 2015

2014
Investigating the Viability of Multifactor Graphical Passwords for User Authentication.
Inf. Secur. J. A Glob. Perspect., 2014

Active authentication for mobile devices utilising behaviour profiling.
Int. J. Inf. Sec., 2014

Connected In-Car Multimedia: Qualities Affecting Composability of Dynamic Functionality.
Proceedings of the Tenth International Network Conference, 2014

Security challenges of E-government adoption based on end users' perspective.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Nonvisual Presentation, Navigation and Manipulation of Structured Documents on Mobile and Wearable Devices.
Proceedings of the Computers Helping People with Special Needs, 2014

Alternative Graphical Authentication for Online Banking Environments.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

2013
Nonvisual Presentation and Navigation within the Structure of Digital Text-Documents on Mobile Devices.
Proceedings of the Universal Access in Human-Computer Interaction. Applications and Services for Quality of Life, 2013

2011
Misuse Detection for Mobile Devices Using Behaviour Profiling.
Int. J. Cyber Warf. Terror., 2011

Quantifying the Effect of Graphical Password Guidelines for Better Security.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Survey: Improving Document Accessibility from the Blind and Visually Impaired User's Point of View.
Proceedings of the Universal Access in Human-Computer Interaction. Applications and Services, 2011

End-User Perception and Usability of Information Security.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011

Resource management for multicore aware software architectures of in- car multimedia systems.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Multifactor graphical passwords: An assessment of end-user performance.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments.
J. Multim. Process. Technol., 2010

Assessing image-based authentication techniques in a web-based environment.
Inf. Manag. Comput. Secur., 2010

Online addiction: privacy risks in online gaming environments.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy.
Proceedings of the South African Information Security Multi-Conference, 2010

Behaviour Profiling on Mobile Devices.
Proceedings of the 2010 International Conference on Emerging Security Technologies, 2010

2009
An Assessment of People's Vulnerabilities in Relation to Personal & Sensitive Data.
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009

Evaluating Web-Based User Authentication using Graphical Techniques.
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009

2008
Service-Oriented Architecture: Performance Issues and Approaches.
Proceedings of the Seventh International Network Conference (INC 2008), 2008

2007
A Practical Usability Evaluation of Security Features in End-User Applications.
Proceedings of the New Approaches for Security, 2007

2006
Considering the Usability of End-User Security Software.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

2005
An automated framework for managing security vulnerabilities.
Inf. Manag. Comput. Security, 2005

2004
User authentication and supervision in networked systems.
PhD thesis, 2004

A long-term trial of alternative user authentication technologies.
Inf. Manag. Comput. Secur., 2004

A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies.
Proceedings of the Security and Protection in Information Processing Systems, 2004

2003
Improving Security Awareness Through Computer-based Training.
Proceedings of the Security Education and Critical Infrastructures, 2003

2002
An experimental comparison of secret-based user authentication technologies.
Inf. Manag. Comput. Secur., 2002

Keystroke Analysis as a Method of Advanced User Authentication and Response.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2001
Security analysers: administrator assistants or hacker helpers?
Inf. Manag. Comput. Secur., 2001

Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

2000
A conceptual architecture for real-time intrusion monitoring.
Inf. Manag. Comput. Secur., 2000

Authentication and Supervision: A Survey of User Attitudes.
Comput. Secur., 2000

1999
Dissecting the "Hacker Manifesto".
Inf. Manag. Comput. Secur., 1999

Computer crime and abuse: A survey of public attitudes and awareness.
Comput. Secur., 1999


  Loading...