Dr Fudong Li
- u_fli at bournemouth dot ac dot uk
- Principal Academic in Cyber Security
- Keywords:
- PhD Supervisor
Back to top
Biography
Fudong is a senior lecturer in cyber security and programme leader for BSc Forensic Computing and Security. Fudong's research interests are digital forensics and biometric authentication. He has 12 PhD completions and published over 60 conference papers and journal articles.
Journal Articles
- Al-Naffakh, N., Clarke, N., Li, F. and Haskell-Dowland, P., 2025. Real-world continuous smartwatch-based user authentication. Computer Journal, 68 (7), 717-733.
- Hall, O.J., Shiaeles, S. and Li, F., 2024. A Study of Ethereum’s Transition from Proof-of-Work to Proof-of-Stake in Preventing Smart Contracts Criminal Activities. Network, 4 (1), 33-47.
- Alobaidi, H., Clarke, N., Li, F. and Alruban, A., 2022. Real-world smartphone-based gait recognition. COMPUTERS & SECURITY, 113.
- Da Veiga, A., Vorster, R., Li, F., Clarke, N. and Furnell, S.M., 2020. Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements. INFORMATION AND COMPUTER SECURITY, 28 (3), 399-422.
- Da Veiga, A., Vorster, R., Li, F., Clarke, N. and Furnell, S.M., 2020. Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements. INFORMATION AND COMPUTER SECURITY, 28 (3), 399-422.
- Al-Bayati, B., Clarke, N., Haskell-Dowland, P. and Li, F., 2019. Behavioural Profiling for Transparent Verification in Cloud Storage Services. Journal of Information Warfare.
- Mashhadani, S., Al-kawaz, H., Clarke, N., Furnell, S. and Li, F., 2018. The Design of a multimedia-forensic analysis tool (M-FAT). International Journal Multimedia and Image Processing, 8 (1).
- Alohali, M., Clarke, N., Li, F. and Furnell, S., 2018. Identifying and predicting the factors affecting end-users' risk-taking behavior. INFORMATION AND COMPUTER SECURITY, 26 (3), 306-326.
- Clarke, N., Li, F. and Furnell, S., 2017. A Novel Privacy Preserving User Identification Approach for Network Traffic. Computers and Security.
- Hohammed, H., Clarke, N. and Li, F., 2016. An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data. Journal of Digital Forensics, Security and Law, 11 (2), 137-152.
- Al Fahdi, M., Clarke, N., Li, F. and Furnell, S., 2016. A Suspect-Oriented Intelligent & Automated Computer Forensic Analysis Digital Investigation. Digital Investigation, 18, 65-76.
- Alruban, A., Clarke, N., Li, F. and Furnell, S., 2016. Leveraging Biometrics for Insider Misuse Identification. International Journal on Cyber Situational Awareness, 1 (1).
- Li, F., Clarke, N., Papadaki, M. and Haskell-Dowland, P., 2014. Active authentication for mobile devices utilising behaviour profiling. International Journal of Information Security, 13 (3), 229-244.
- Fajardo, O., Liberal, F., Li, F., Clarke, N. and Mkwawa, I., 2014. End-to-middle-to-end solution for IMS media plane security. Electronic Commerce Research.
- Li, F., Clarke, N., Papadaki, M. and Haskell-Dowland, P., 2011. Misuse Detection for Mobile Devices Using Behaviour Profiling. International Journal of Cyber Warfare & Terrorism, 1 (1), 43-55.
Conferences
- Coca, A., Li, F., Shiaeles, S., Wu, D. and Liu, F., 2024. The Effect of Privacy Concerns, Interaction, Trust, Age, and Gender on Self-Disclosure Behaviours on Social Networking Sites. Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience Csr 2024, 551-556.
- Daou, A.K., Li, F. and Shiaeles, S., 2023. A Cost-Efficient Threat Intelligence Platform Powered by Crowdsourced OSINT. Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience Csr 2023, 48-53.
- Clasen, M., Li, F. and Williams, D., 2021. Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing. HUMAN ASPECTS OF INFORMATION SECURITY AND ASSURANCE, HAISA 2021, 613, 148-163.
- Altamimi, A., Clarke, N., Furnell, S. and Li, F., 2019. Multi-Platform Authorship Verification. THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019).
- Alruban, A., Alobaidi, H., Clarke, N. and Li, F., 2019. Physical Activity Recognition by Utilising Smartphone Sensor Signals. ICPRAM: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION APPLICATIONS AND METHODS, 342-351.
- Mohammed, H., Clarke, N. and Li, F., 2019. Evidence Identification in Heterogeneous Data Using Clustering. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018).
- Alruban, A., Clarke, N., Li, F. and Furnell, S., 2018. Biometrically Linking Document Leakage to the Individuals Responsible. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 11033, 135-149.
- Al-Bayati, B., Clarke, N., Dowland, P. and Li, F., 2018. Misuse Detection in a Simulated IaaS Environment. EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2018, 11263, 103-115.
- Li, F., Clarke, N., Papadaki, M. and Haskell-Dowland, P., 2010. Behaviour Profiling on Mobile Devices. In: International Conference on Emerging Security Technologies 6-8 September 2010 Canterbury UK.
- Li, F., Clarke, N. and Bolan, C., 2007. User Perception of the Security & Privacy Concerns of RFID Technology. In: the International Symposium on Human Aspects of Information Security & Assurance 3-4 July 2007 Plymouth UK.
PhD Students
- Dr Gaseb Alotibi, 2017. Behavioural Monitoring for Network Communications, (Completed)
- Dr Burhan Al-Bayati, 2018. Continuous Identity Verification in Cloud Computing Services, (Completed)
- Dr Hussam Mohammed, 2018. Digital Forensic Analysis of Big Data, (Completed)
- Dr Hiba Al-Kawaz, 2019. Forensic Facial Recognition of Multimedia Files, (Completed)
- Dr Hind Al-Obaidi, 2019. Transparent Authentication Utilising Gait Recognition, (Completed)
- Dr Timibloudi Stephen Enamamu, 2019. Bioelectrical User Authentication, (Completed)
- Dr Shahlaa Mashhadani, 2019. Image Forensics, (Completed)
- Dr Abdulrahman Alruban, 2020. Applying biometrics to digital forensics, (Completed)
- Dr Dany Joy, 2020. An Intelligent Network Forensic Analyzer, (Completed)
- Dr Aziz Alshehri, 2020. A Privacy Enhancing Framework for Mobile Devices, (Completed)
- Dr Abdulaziz Altamimi, 2020. Author Identification of Text Limited Messages, (Completed)
- Dr Neamah Al-Naffakh, 2020. Wearable Computing and Transparent Authentication, (Completed)
Profile of Teaching PG
- MSc Individual Project
Profile of Teaching UG
- Digital Forensics Fundamentals (2022-2024)
- Advanced Digital Forensics
- Final Year Project
Grants
- FORESIGHT - Advanced cyber-security simulation platform for preparedness training in aviation, power-grid and naval environments (European Commission, 01 Oct 2019). Completed
External Responsibilities
- London Metropolitan University, External Examiner (2023-)
- Edith Cowan University, Australia, PhD Examiner (2023)
- University of West London, External Examiner (2022-)
- University of Plymouth, UK, Visiting Lecturer (2017-2022)
Internal Responsibilities
- Pathway Leader - Cyber Security programmes (UG) (2023-now), Department of Computing and Informatics
- Programme Leader of BSc Forensic Computing and Security (2022 - now), Department of Computing and Informatics
Qualifications
- CCNA ITN in Networking (Cisco Systems, 2024)
- CHFI in Digital Forensics (EC-Council, 2024)