Name
Papers
Collaborators
NATHAN L. CLARKE
72
91
Citations 
PageRank 
Referers 
421
41.93
994
Referees 
References 
1367
669
Search Limit
1001000
Title
Citations
PageRank
Year
A novel approach for improving information security management and awareness for home environments00.342021
Incorporating the human facet of security in developing systems and services00.342021
Comparing The Protection And Use Of Online Personal Information In South Africa And The United Kingdom In Line With Data Protection Requirements00.342020
Information Security Risk Communication: A User-Centric Approach00.342019
End-to-middle-to-end solution for IMS media plane security00.342019
Fast Predictive Maintenance in Industrial Internet of Things (IIoT) with Deep Learning (DL) - A Review.00.342019
Multi-Platform Authorship Verification00.342019
A Framework For Reporting And Dealing With End-User Security Policy Compliance00.342019
User Profiling Based on Application-Level Using Network Metadata00.342019
A proactive malicious software identification approach for digital forensic examiners00.342019
Rule-Based Security Monitoring of Containerized Environments00.342019
Physical Activity Recognition By Utilising Smartphone Sensor Signals00.342019
Misuse Detection in a Simulated IaaS Environment.00.342018
Continuous User Authentication Using Smartwatch Motion Sensor Data.00.342018
Identifying And Predicting The Factors Affecting End-Users' Risk-Taking Behavior10.362018
Facial-Forensic Analysis Tool.00.342018
Biometrically Linking Document Leakage to the Individuals Responsible.00.342018
Securing Cloud Storage by Transparent Biometric Cryptography.00.342018
A Novel Transparent User Authentication Approach For Mobile Applications00.342018
A Novel Transparent User Authentication Approach For Mobile Applications00.342018
Sharing with Live Migration Energy Optimization Scheduler for Cloud Computing Data Centers.10.362018
Insider Misuse Attribution using Biometrics20.372017
Identifying the Factors Affecting End-Users’ Risk-Taking Behavior.00.342017
A novel privacy preserving user identification approach for network traffic.30.412017
Unobtrusive Gait Recognition Using Smartwatches40.392017
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data.10.362016
Leveraging Biometrics for Insider Misuse Identification.00.342016
A suspect-oriented intelligent and automated computer forensic analysis.40.472016
Awareness of Mobile Device Security: A Survey of User's Attitudes00.342016
A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment00.342016
Information security policies: A review of challenges and influencing factors00.342016
Evidence Collection in Cloud Provider Chains.10.372016
User profiling from network traffic via novel application-level interactions20.432016
A forensic acquisition and analysis system for IaaS.40.532016
Continuous and transparent multimodal authentication: reviewing the state of the art.40.382016
Activity Recognition using wearable computing00.342016
A Scalable Architecture for Distributed OSGi in the Cloud.00.342016
Security, Privacy and Usability – A Survey of Users’ Perceptions and Attitudes00.342015
An Identification of Variables Influencing the Establishment of Information Security Culture.30.402015
Continuous user authentication using multi-modal biometrics220.802015
Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks00.342014
Android forensics: Correlation analysis20.392014
Active authentication for mobile devices utilising behaviour profiling220.752014
Cloud QoS Scaling by Fuzzy Logic80.572014
An Evaluation of Behavioural Profiling on Mobile Devices10.342014
A response selection model for intrusion response systems: Response Strategy Model RSM10.352014
Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions.90.542013
Anomaly Detection in IaaS Clouds110.592013
A Technology Independent Security Gateway for Real-Time Multimedia Communication.10.392013
Co-operative user identity verification using an Authentication Aura40.402013
  • 1
  • 2