Dr Nathan Clarke
Profiles

Dr Nathan Clarke

Associate Professor (Senior Lecturer) in Information Security & Digital Forensic

Qualifications

2004-2005 PGCert Learning & Teaching in Higher Education
2001-2004 PhD, "Advanced User Authentication for Mobile Devices"
1996-2001 BEng (Hons) Electronic Engineering (1st Class)

2010 IEEE Certified Biometrics Professional
2010 AccessData Certified Examiner (ACE)
2013 Fellow of the Higher Education Academy

Professional membership

Chartered Engineer (CEng), July 2006
Fellow of the British Computing Society (FBCS), April 2010
Senior Member of the Institute for Electrical and Electronic Engineering (IEEE)

Journal Editorships:


Editorial Board Member, Computers & Security, Elsevier
Associate Editor, Security & Communication Networks, John Wiley
Associate Editor, Communications and Computer Security, ACTA Press
Editorial Board Member, The Scientific World Journal (Communications & Networking), Hindawi Publishing
Editorial Board Member, Mobile Computing, World Academic Publishing


Referring for Journals:

Referee, International Journal of Pattern Recognition and Artificial Intelligence, World Scientific.
Referee, International Journal of Interdisciplinary Telecommunications & Networking, IGI Global
Referee, Information Security Technical Report, Elsevier
Referee, EURASIP Journal on Advances in Signal Processing, Springer
Referee, Journal on Personal and Ubiquitous Computing: Special Issue: Security and Trust in Context-Aware Systems, Springer
Referee, International Journal of Electronic Governance (IJEG), Inderscience
Referee, IET Information Security, IET
Referee, KSII Transactions on Internet and Information Systems
Guest Editor, Information Management & Computer Security, Vol. 18, No. 5, 2010
Associate Editor, Communications and Computer Security, ACTA Press
Referee, Computer Standards and Interfaces, Elsevier
Referee, Journal of Mobile Networks & Applications, Springer
Guest Editor, Information Management & Computer Security, Vol. 18, No. 1, 2010
Referee, IEEE Journal on Selected Areas in Communications Special Issue on Advances in Digital Forensics for Communications and Networking
Referee, International Journal of Information Technologies and Systems Approach, IGI Global
Referee, International Journal of Computer Science and Security, Computer Science Journals
Referee, Journal of Systems and Software, ElsevierReferee, IEEE Transactions on Information Forensics & Security, IEEE
Referee, The Computer Journal, Oxford Journals
Guest Editor, Information Management & Computer Security, Vol. 17, No. 1, 2009
Referee, Computers & Security, Elsevier
Referee, Recent Patents in Computer Science, Bentham Science
Referee, IET Signal Processing, IET
Referee, Security & Communication Networks, John Wiley & Sons
Referee, Journal of Network and Computer Applications, Elsevier
Guest Editor, Information Management & Computer Security, Vol. 15, No. 5, 2007
Referee, Information Sciences, Elsevier
Referee, Journal for Information Warfare

Roles on external bodies

Adjunct Associate Professor, Edith Cowan University, Western Australia

Chair, IFIP TC11 Working Group 11.12 Human Aspects of Information Security & Assurance
Member, IFIP TC11 Working Group 11.1 on Information Security Management
Member, IFIP TC11 Working Group 11.6 on Identity Management

Teaching interests

Module Delivery

CNET115 Computer & Information Security* 
CNET117 Digital Forensics*
CNET335/522 Cybercrime & Forensic Investigation* 

Previous Module Delivery:

SOFT230 Remote Data Access Technology
CNET221 Network Security
CNET232/525 Systems Security* 
COMP212 Software Engineering and High Level Programming
COMP223 High Level Programming
CNET338/538 Security for Mobile Systems*
CNET336/532 Cryptography & Applications*  
CNET520 Applications of Security 
CNET531 Intrusion Prevention, Detection & Response* 

*Developed module

Research interests

Biometric Authentication
Digital Forensics

Information Systems Security
Intrusion Detection Systems
Security Management and Risk Assessment
Security Education and Awareness

Research degrees awarded to supervised students

1. Dr Vassilis Dimopoulos, Effective Information Assurance with Risk Management (2007)
2. Dr Tarik Ibrahim, Improving Intrusion Prevention, Detection and Response (2011)
3. Dr Nor Badrul Anuar Jumaat, Incident Prioritisation for Intrusion Response Systems (2012)
4. Dr Shukor Razak, A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks (2007)
5. Dr Gina C Tjhai, Anomaly-Based Correlation of IDS Alarms (2011)
6. Dr Fudong Li, Intrusion Prevention and Detection for Mobile Systems (2012)
7. Dr Shuhaili Talib, Personalising Information Security Education

Grants & contracts

EPSRC. Identifying and Responding to Human and Software Behaviours in a Changing Cyber Threat Landscape. 2013: £173,383 (Total Award: £1.0M)
Teaching Fellowship Award – e-Invigilator. Plymouth University. 2012: £8100
EU Framework 7 Grant. Centre of Excellence in Cybercrime and Forensics: 2012: £7800 (Total Award: £800k)
EU Framework 7 Grant. Geryon. 2011: €478K (Total Award: €2.5M)
EU Framework 7 Grant. Space Data Routers. 2010: £220,000 (Total Award: £1.6)
Knowledge Transfer Partnership. Absolute Software Limited. 2010: £183,094
Knowledge Transfer Partnership. K2 Medical Systems. 2008: £115,804.
Teaching Fellowship Award – Peer Assessment. University of Plymouth. 2008: £4900
Knowledge Transfer Partnership. Spinnaker International. 2008: £141,599
Knowledge Transfer Partnership. Westland Geoprojects Limited. 2008: £109,633
DTI Funded project into Behavioural Monitoring of Network Communications. 2007: £40,000
End Point Compliance. Symantec.2007: £7,000
Flexible and non-intrusive user authentication for mobile devices. EduServ Foundation. 2006: £80,390
Knowledge Transfer Partnership. Parker Hannifin 2005: £174,000
Subscriber Authentication via Keystroke Analysis on a mobile handset. Orange Personal Communication Services Limited. 2004. £19,814
Biometric Terminal, Phase 1. Orange Personal Communication Services Limited. 2003: £55,000
PC Integrity Testing. Plymouth Trading Standards. 2003-2004: £1,250
WinCPR Software Development. SAHFOS. 2002: £4,000

Journals
Articles
Doelitzscher F, Reich C, Knahl M & Clarke N 2013 'Understanding Cloud Audits' Privacy and Security for Cloud Computing 125-163
Doelitzscher F, Reich C, Knahl M, Passfall A & Clarke N 2012 'An agent based business aware incident detection system for cloud environments' Journal of Cloud Computing: Advances, Systems and Applications 1, 9-9
Li F 2012 'Behaviour Profiling for Mobile Devices'
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N & Gritzalis S 2012 'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers' SECURITY AND COMMUNICATION NETWORKS 5, (1) 3-14 Author Site , DOI
Furnell S & Clarke N 2012 'Power to the people? The evolving recognition of human aspects of security' Computers & Security
Hocking CG, Furnell SM, Clarke NL & Reynolds PL 2011 'A preliminary investigation of distributed and cooperative user authentication'
Anuar NB, Furnell S, Papadaki M & Clarke N 2011 'A risk index model for security incident prioritisation'
Hocking CG, Furnell SM, Clarke NL & Reynolds PL 2011 'Authentication Aura - A distributed approach to user authentication' Journal of Information Assurance and Security 6, (2) 149-156 Publisher Site
Hocking CG, Furnell SM, Clarke NL & Reynolds PL 2011 'Authentication Aura - A distributed approach to user authentication' Journal of Information Assurance and Security 6, (2) 149-156 Publisher Site
Talib S, Clarke NL & Furnell SM 2011 'Establishing A Personalized Information Security Culture' International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 3, 63-79
Chaerani W, Clarke N & Bolan C 2011 'Information leakage through second hand USB flash drives within the United Kingdom'
Li F, Clarke N, Papadaki M & Dowland P 2011 'Misuse detection for mobile devices using behaviour profiling' International Journal of Cyber Warfare and Terrorism (IJCWT) 1, 41-53
Hocking CG, Furnell S, Clarke N & Reynolds PL 2010 'A distributed and cooperative user authentication framework'
Tjhai GC, Furnell SM, Papadaki M & Clarke NL 2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm' COMPUTERS & SECURITY 29, (6) 712-723 Author Site , DOI
Tjhai GC, Furnell SM, Papadaki M & Clarke NL 2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and< i> K</i>-means algorithm' Computers & Security 29, 712-723
Anuar NB, Papadaki M, Furnell S & Clarke N 2010 'An investigation and survey of response options for Intrusion Response Systems (IRSs)' Information Security for South Africa (ISSA) 2010, 1-8
Clarke N & Dowland PS 2009 'A CRITICAL EVALUATION OF OPAS (ONLINE PEER ASSESSMENT SYSTEM)' ICERI2009 Proceedings 5124-5135
Botha RA, Furnell SM & Clarke NL 2009 'From desktop to mobile: Examining the security experience' COMPUTERS & SECURITY 28, (3-4) 130-137 Author Site , DOI
Anuar NB, Furnell SM, Papadaki M & Clarke NL 2009 'Response Mechanisms for Intrusion Response Systems (IRSs)'
Razak SA, Furnell SM, Clarke NL & Brooke PJ 2008 'Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks' AD HOC NETWORKS 6, (7) 1151-1167 Author Site , DOI
Clarke NL & Furnell SM 2007 'Advanced user authentication for mobile devices' Computers & Security 26, (2) 109-119
Clarke NL & Furnell SM 2007 'Advanced user authentication for mobile devices' COMPUTERS & SECURITY 26, (2) 109-119 Author Site , DOI
Clarke NL & Furnell SM 2007 'Authenticating mobile phone users using keystroke analysis' INTERNATIONAL JOURNAL OF INFORMATION SECURITY 6, (1) 1-14 Author Site , DOI
Clarke NL & Furnell SM 2007 'Authenticating mobile phone users using keystroke analysis' International Journal of Information Security 6, (1) 1-14
Clarke NL 2007 'The Application of Signature Recognition to Transparent Handwriting Verification for Mobile Devices' Information Management & Computer Security 15 (3), 214-225 , DOI
Li F, Clarke N, Bolan C & Australia W 2007 'User Perception of the Security & Privacy Concerns of RFID Technology' Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2007) 156-156
Clarke NL & Furnell SM 2006 'A Composite User Authentication Architecture for Mobile Devices' Journal of Information Warfare 5, (2) 11-29
Razak SA, Fumell S, Clarke N & Brooke P 2006 'A two-tier intrusion detection system for mobile ad hoc networks - A friend approach' Intelligence and Security Informatics, Proceedings 3975, 590-595
Clarke NL & Furnell SM 2005 'Authentication of users on mobile telephones - A survey of attitudes and practices' Computers & Security 24, (7) 519-527
Clarke NL & Furnell SM 2005 'Authentication of users on mobile telephones - A survey of attitudes and practices' COMPUTERS & SECURITY 24, (7) 519-527 Author Site , DOI
Clarke NL & Furnell SM 2005 'Biometrics - The promise versus the practice' Computer Fraud and Security September, 12-16
Clarke NL & Furnell SM 2005 'Biometrics: No silver bullets' Computer Fraud and Security August, 9-14
Furnell S, Katos V & Clarke N 2005 'Considering the role of academic qualifications for IT security professionals'
Furnell SM, Katos V & Clarke NL 2005 'The role of academic qualifications in the IT security profession' DATAWATCH, Information Systems Audit and Control Association (ISACA) winter, 8-15
Clarke N & Furnell S 2005 'User authentication for mobile devices: a composite approach'
Clarke NL 2003 'Keystroke Dynamics on a Mobile Handset: A Feasibility Study' Information Management & Computer Security 11 (4), 161-166 , DOI
Clarke NL, Furnell SM, Rodwell PM & Reynolds PL 2002 'Acceptance of subscriber authentication methods for mobile telephony devices' COMPUTERS & SECURITY 21, (3) 220-228 Author Site , DOI
Clarke NL, Furnell SM, Rodwell PM & Reynolds PL 2002 'Acceptance of subscriber authentication methods for mobile telephony devices' Computers & Security 21, (3) 220-228
Razak SA, Samian N, Ma'arof MA, Furnell SM, Clarke NL & Brooke PJ 'A Friend Mechanism for Mobile Ad Hoc Networks' Journal of Information Assurance and Security 4, (4) 440-448
Furnell SM, Clarke NL & Karatzouni S 'Beyond the PIN: Enhancing user authentication for mobile devices' Computer Fraud & Security 2008, (8) 12-17
Levy Y, Ramim MM, Furnell SM & Clarke NL 'Comparing intentions to use university-provided vs vendor-provided multibiometric authentication in online exams' Campus-Wide Information Systems 28, (2) 102-113
Michalopoulos DS & Clarke NL 'Intrusion Detection System for mobile devices' Advances in Networks, Computing and Communications 4 205-205
Kanellos A, Dimopoulos V & Clarke N 'Security policies for small and medium enterprises' Advances in Networks, Computing and Communications 3 20-20
Marston J & Clarke NL 'Web-based risk analysis and education for home users' Advances in Networks, Computing and Communications 4 89-89
Books
Clarke N & Tryfonas T 2011 Proceedings of the Sixth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2011). University of Plymouth
Clarke N 2011 Transparent User Authentication. Springer Verlag
CLARKE N 2011 Transparent user authentication: biometrics, RFID and behavioural profiling [e-book].
Clarke N 2010 Computer Forensics. It Governance Pub
Clarke N & Tryfonas T 2009 Proceedings of the Fourth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2009): Athens, Greece, 25-26 June 2009. Centre for Information Security & Network Research, University of Plymouth
Furnell S & Clarke N 2009 Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009). Lulu. com
FURNELL S & CLARKE N 2007 International Symposium on Human Aspects of Information Security (HAISA). Emerald 15
Chapters
Clarke NL, Dowland P & Furnell SM 2008 'User Authentication Technologies' in Furnell S; Katsikas SK; Lopez J; Patel A Securing information and communications systems Artech House Publishers 35-59
Conference Papers
Clarke N, Katos V, Menesidou SA, Ghita B & Furnell S 2012 'A novel security architecture for a space-data DTN' Springer Berlin/Heidelberg 342-349
Anuar N, Papadaki M, Furnell S & Clarke N 2012 'A Response Strategy Model for Intrusion Response Systems' Springer Boston 573-578
Saevanee H, Clarke N & Furnell S 2012 'Multi-modal Behavioural Biometric Authentication for Mobile Devices' Springer Boston 465-474
Thaul W, Bleimann U & Clarke N 2012 'Personal knowledge management beyond versioning' 28-28
Doelitzscher F, Fischer C, Moskal D, Reich C, Knahl M & Clarke N 2012 'Validating Cloud Infrastructure Changes by Cloud Audits' 377-384
Doelitzscher F, Reich C, Knahl M & Clarke N 2011 'An autonomous agent based incident detection system for cloud environments' 197-204
Li F, Clarke N, Papadaki M & Dowland P 2011 'Behaviour Profiling for Transparent Authentication for Mobile Devices' 307-314
Doelitzscher F, Reich C, Knahl M & Clarke N 2011 'Incident detection for cloud environments' 100-105
Lederm T & Clarke N 2011 'Risk assessment for mobile devices' Springer Berlin/Heidelberg 210-221
Saevanee H, Clarke N & Furnell S 2011 'SMS linguistic profiling authentication on mobile device' 224-228
Talib S, Clarke NL, Furnell SM & IEEE 2010 'An Analysis of Information Security Awareness within Home and Work Environments' 196-203 , DOI
Ibrahim T, Furnell SM, Papadaki M & Clarke NL 2010 'Assessing the Usability of End-User Security Software' 177-189
Ibrahim T, Furnell S, Papadaki M & Clarke N 2009 'Assessing the Usability of Personal Internet Security Tools' 102-111
Clarke N, Karatzouni S & Furnell S 2009 'Flexible and Transparent User Authentication for Mobile Devices' 1-12
Li F, Clarke NL & Papadaki M 2009 'Intrusion Detection System for Mobile Devices: Investigation on Calling Activity'
Stienne DS, Clarke N & Reynolds P 2009 'Strong Authentication for Web Services using Smartcards' 8-8
Ibrahim T, Furnell SM, Papadaki M & Clarke NL 2008 'Assessing the Challenges of Intrusion Detection Systems'
Buchoux A & Clarke NL 2008 'Deployment of keystroke analysis on a smartphone' 48-48
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2008 'Investigating the problem of IDS false alarms: An experimental study using Snort' 253-267
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2008 'Investigating the problem of IDS false alarms: An experimental study using Snort' Springer 253-267
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2008 'The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset' 139-150
Razak SA, Furnell S, Clarke N & Brooke P 2007 'Building a trusted community for mobile ad hoc networks using friend recommendation' 129-141
Karatzouni S & Clarke N 2007 'Keystroke analysis for thumb-based keyboards on mobile devices' 253-263
Karatzouni S & Clarke N 2007 'Keystroke analysis for thumb-based keyboards on mobile devices' Springer Boston 253-263
Karatzouni S, Furnell SM, Clarke NL & Botha RA 2007 'Perceptions of user authentication on mobile devices' 11-13
Furnell S & Clarke N 2007 'Proceedings of the International Symposium on Human Aspects of Information Security and Assurance (HAISA 2007)' University of Plymouth, School Of Computing, Communications And Electronics
Razak SA, Furnell S, Clarke N & Brooke P 2006 'Part II-Short Papers-Infrastructure Protection and Cyber Security-A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks–A Friend Approach' Berlin: Springer-Verlag, 1973- 590-595
Furnell S & Clarke N 2005 'Organisational security culture: embedding security awareness, education and training' 67-74
Clarke N, Furnell S, Lines B & Reynolds P 2004 'Application of keystroke analysis to mobile text messaging' 14-15
Clarke NL, Furnell SM, Lines BM & Reynolds PL 2003 'Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets' 97-108
Clarke NL, Furnell SM, Lines BM & Reynolds PL 2003 'Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets' 97-108
Clarke NL, Furnell SM, Reynolds PL, Rodwell PM, IEE & IEE 2002 'Advanced subscriber authentication approaches for third generation mobile systems' 319-323
Clarke NL, Furnell SM, Reynolds PL & Rodwell PM 2002 'Advanced subscriber authentication approaches for third generation mobile systems' Third International Conference on 3G Mobile Communication Technologies 319-323
Clarke NL, Furnell SM & Reynolds PL 2002 'Biometric authentication for mobile devices' 61-69
Clarke NL, Furnell S, Lines BM & Reynolds PL 2002 'Subscriber Authentication for Mobile Phones through the Implementation of Keystroke Dynamics' Furnell S; Dowland PS University of Plymouth 347-355
Clarke N, Furnell S, Lines B & Reynolds P 2002 'Subscriber authentication for mobile phones using keystroke dynamics' 16-18
Reports
Karatzouni S, Clarke NL & Furnell SM 2007 Device-versus Network-Centric Authentication Paradigms for Mobile Devices. School of Computer and Information Science, Edith Cowan University, Perth, Western Australia
Clarke NL, Furnell SM & Karatzouni S Applicable Authentication Methods for Mobile Devices and Services.
Clarke NL, Furnell SM & Karatzouni S Design Specification (Architectural & Operational Design).
Software
Vezzulli L, Dowland PS, Reid PC, Clarke N & Papadaki M 2005 Gridded database browser of North Sea plankton: fifty years (1948–1997) of monthly plankton abundance from the continuous plankton recorder (CPR) survey [CD-ROM].
Patents
Clarke N, Kosmas C, Tripp N, Westington A & Tjhai C Adjusting an operating mode of a security container in response to an unexpected received radio signal. GB2472632 (A)
Other Publications
Jaeger M & Clarke NL 2006 The Awareness and Perception of Spyware amongst Home PC Computer Users. Lulu. com 60-60
Lecomte J, Clarke N & Furnell S 2005 Artifical Impostor Profiling for Keystroke Analysis on a Mobile Handset.
KOSMAS C, TRIPP N, WESTINGTON A, CLARKE N & TJHAI C A CONTAINER AND SECURITY SYSTEMS.
Krishnasamy M & Clarke NL Biometrics for Mobile Devices: A Comparison of Performance and Pattern Classification Approaches. Lulu. com 57-57
Karatzouni S, Clarke NL & Furnell SM Device versus network-centric authentication models for mobile devices–operational and perceptual trade-offs. Lulu. com 23-23
Karatzouni S & Clarke NL Keystroke analysis as an authentication method for thumb-based keyboards on mobile handsets. Lulu. com 213-213
Sklikas V & Clarke NL Mobile Devices-Future Security Threats & Vulnerabilities. Lulu. com 100-100

Links

The Centre's research website can be located at: www.cscan.org