Towards a metric for recognition-based graphical password security R English, R Poet 2011 5th International Conference on Network and System Security, 239-243, 2011 | 27 | 2011 |
Comparison of high capacity steganography techniques R English 2010 International Conference of Soft Computing and Pattern Recognition, 448-453, 2010 | 22 | 2010 |
The effectiveness of intersection attack countermeasures for graphical passwords R English, R Poet 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 13 | 2012 |
Measuring the revised guessability of graphical passwords R English, R Poet 2011 5th International Conference on Network and System Security, 364-368, 2011 | 12 | 2011 |
Exploring student perceptions and expectations of cyber security R English, J Maguire Proceedings of the 7th Conference on Computing Education Practice, 25-28, 2023 | 9 | 2023 |
Why don’t UK citizens protest against privacy-invading dragnet surveillance? K Renaud, S Flowerday, R English, M Volkamer Information & Computer Security 24 (4), 400-415, 2016 | 9 | 2016 |
Data protection and privacy regulations as an inter-active-constructive practice J Maguire, R English, S Draper Proceedings of the 3rd Conference on Computing Education Practice, 1-4, 2019 | 6 | 2019 |
Page retrievability calculator L Azzopardi, R English, C Wilkie, D Maxwell Advances in Information Retrieval: 36th European Conference on IR Research …, 2014 | 6 | 2014 |
Towards integrated graduate skills for UK computing science students R English, A Hayes Proceedings of the 2022 Conference on United Kingdom & Ireland Computing …, 2022 | 5 | 2022 |
Challenges and opportunities of teaching cybersecurity in UK university computing programmes T Prickett, L Yang, A Irons, K Miller, P Brooke, T Crick, A Hayes, ... Cybersecurity teaching in higher education, 1-35, 2012 | 4 | 2012 |
You have three tries to lockout. Why three? K Renaud, R English, T Wynne, F Weber | 3* | 2014 |
Enhancing UK computing education research infrastructure with doctoral consortia J Maguire, S Fincher, Q Cutts, R English Proceedings of the 2022 Conference on United Kingdom & Ireland Computing …, 2022 | 2 | 2022 |
Opportunities to fail: Using peer-review to support assessment literacy in cyber security J Maguire, R English Proceedings of the 21st Koli Calling International Conference on Computing …, 2021 | 2 | 2021 |
Improving Computer Science Student Graduate Skills Through Assessment R English, J Maguire, A Hayes Proceedings of the 5th Conference on Computing Education Practice, 38-38, 2021 | 2 | 2021 |
Designing computer security assessments to reduce plagiarism R English Proceedings of the 3rd Conference on Computing Education Practice, 1-4, 2019 | 2 | 2019 |
Simulating and modelling the effectiveness of graphical password intersection attacks R English Concurrency and Computation: Practice and Experience 27 (12), 3089-3107, 2015 | 2 | 2015 |
Modelling the Security of Recognition-Based Graphical Passwords. R English HAISA, 112-121, 2014 | 2 | 2014 |
Engaging students in threat thinking with the cyber security cinema J Maguire, R English, S Draper Proceedings of the 7th Conference on Computing Education Practice, 13-16, 2023 | 1 | 2023 |
Building in resilience through graduate skills computer science assessment R English, J Maguire | 1 | 2020 |
Supporting students with dyslexia in learning to program–where to start?: A systematic literature review C Weir, R English 17th annual International Conference of Education, Research and Innovation, 2024 | | 2024 |