Search for a surname in the box below and then click "Search" to search for Staff.
Romdhani, I., Djedjig, N., Medjek, F. & Tandjaoui, D. (in press). New Trust Metric for the RPL Routing Protocol. In Proceedings of ICICS 2017
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. ...
Salayma, M., Al-Dubai, A. & Romdhani, I. (in press). Reliability and Energy Efficiency Enhancement in Wireless Body Area Networks for E-Health
Wireless Body Area Network (WBAN) is a technology that revolutionises our understanding of the future digitised healthcare systems. WBAN has unique challenges and features com...
McLaren, P., Russell, G. & Buchanan, B. (in press). Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017
Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, w...
To create the ability in Payfont to research and deliver, using Universal Design principles and processes based on BS8878, the optimal secure user experience (UX) in secure transactions
To develop the prototype for a next-generation security platform with advanced detection capabilities.
01 February 2017
02 February 2017
A great partnership between Hutchinson Networks and The Cyber Academy at Edinburgh Napier University has been showcased within a collaboration project which has build advanced...
11 May 2016
11 May 2016
This years post-graduate research conference will be held Wednesday (11th of May) on H-floor.
Presentations and the keynote will be in H5, the poster session, breaks an...
Lecturer in Cybersecurity, Encryption and Networks
+44 (131) 455 2219
Professional Development Leader
Research Project Administrator
Project Finance Officer
Lecturer in Cybersecurity and Networks
Romdhani, I., Eshaftri, M., Al-Dubai, A. & Essa, A. (in press). Weight Driven Cluster Head Rotation for Wireless Sensor Networks
Energy efficiency is one of the major issues in Wireless Sensor
Networks (WSNs), due to the limited power and processing
capabilities of the Sensor Nodes (SNs). The clustering...
Uwagbole, S., Buchanan, W. & Fan, L. (2016). Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web...
Essa, A., Al-Dubai, A., Romdhani, I. & Eshaftri, M. (2016). A new dynamic weight clustering algorithm for wireless sensor networks. In Proceedings of the 1st EAI International Conference on Smart Grid Inspired Future Technologies
Uwagbole, S., Buchanan, W. J. & Fan, L. (2016). Numerical encoding to tame SQL injection attacks.
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases....
Abdmeziem, M. R., Tandjaoui, D. & Romdhani, I. (2016). A new distributed MIKEY mode to secure e-health applications. In Proceedings of the International Conference on Internet of Things and Big Data, 88-95. doi:10.5220/0005945300880095. ISBN 978-989-758-183-0
Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing...
Romdhani, I., Al-Dubai, A. Y. & Guibene, W. (2015). Mobility And Energy Extensions For The IEEE 802.15.4 Standard. In Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 318-321. doi:10.1145/2837126.2837167. ISBN 9781450334938
The IEEE 802.15.4 standard is designed for low-power and low-rate wireless Personal Area Networks. Although energy is a key parameter in shaping the communication and interact...
Romdhani, I., Thomson, C., Wadhaj, I. & Al-Dubai, A. (2015). Performance evaluation of RPL metrics in environments with strained transmission ranges.
Molla, R., Romdhani, I. & Buchanan, B. (2015). 3LS-authenticate: an e-commerce challenge-response mobile application.
Salayma, M., Al-Dubai, A., Romdhani, I. & Yassein, M. B. (2015). Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. In 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), 1267-1272. doi:10.15439/2015F118
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the de...
Wadhaj, I., Kristof, I., Romdhani, I. & Al-Dubai, A. (2015). Performance evaluation of the RPL Protocol in fixed and mobile sinks low-power and lossy networks. In Proceedings of the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), 1600-1605. doi:10.1109/CIT/IUCC/DASC/PICOM.2015.241. ISBN 978-1-5090-0153-8
Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how ...
Qasem, M., Al-Dubai, A., Romdhani, I. & Yassien, M. B. (2015). A dynamic power tuning for the constrained application protocol of Internet of Things. In Society, I. C. & Society, I. C. (Eds.). In proceedings of 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2015)
Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However...
Buchanan, W. J., Ukwandu, E., Russell, G., Fan, L., Lo, O., van Deursen Hazelhoff Roelfze, N. & Thuemmler, C. (2015). Secret share architecture to protect health records. In IEEE e-Health 2015
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...
The Scottish Informatics & Computer Science Alliance
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas...
Scottish Funding Council
When purchasing business insurance, a customer often completes forms each year to fulfil legal disclosure requirements and receive a ‘quote’. Internet services, such as comparison sites, h...
Higher Education Academy
The proposal aims to build a Virtualised Security Operation Center [vSoC] and integrates into a currently operating virtualized cyber security Cloud infras...
Digital Health Institute
Scottish Frailty Framework with Mobile Device Capture and Big Data Integration. The proposed innovation will develop and extend the current work into Fr...
The university will undertake a comprehensive review of the core biometric security software for the desktop enterprise environment including Bio Logon, Bio ID Secure Communications and...
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatic...
Comcarde is developing a mobile payments system called Bridge that uses a patent pending algorithm which is extremely resilient to man-in-the-middle attacks. Combin...
The project undertaken by Onyu and ENU will concentrate around the mobile application that is under development by the team at Onyu.
Working with ENU our key objectives are:
1. Validation ...
This project will develop a design and “architecture” for a system to deliver the objectives for 1-3 countries. A prototype wireframe will be built to d...
Kulio Ltd and Edinburgh Napier University are planning to collaborate to create a new innovative application consisting of Kulio education characters. Child...
The overall vision of the Spellakit project is to significantly enhance learner experience and outcomes in English language spelling through an innovative ICT based approach...
The aim of this project led by Alistair Lawson of IIDI is to develop a design for the underlying architecture of a novel virtual learning platform
Carnegie Trust for the Universities of Scotland
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. ...
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for law enforcement agencies, impeding t...
Triage of large capacity digital devices
"The development of science and technology are increasingly affecting and changing the nature of processes in ind...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
05 February 2016
IntroductionOn the back of four nomination at the Scottish Knowledge Exchange awards [here], Gordon Stuart, director of operations at Informatics Ventures, has also predicted ...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
Prime numbers are used extensively in public key encryption key, typically where we take two prime numbers and multiply them together to give a modulus (N). This modulus is ...
03 December 2016
Edinburgh is becoming the best city in the World to be into tech.
This week five Edinburgh based companies head to a two-day TechCrunch Disrupt event. Other comp...
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
17 February 2016
17 February 2016
Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s Euro...
04 April 2016
04 April 2016
This showcase event aims to demonstrate the career roles that there are within Cyber Security, and includes companies who are activitely seeking Cyber Security graduates.
11 April 2016
11 April 2016
The Cyber Academy and ENUSEC> are hosting a the second Cyber Security Master Class on the latest vulnerabilities and methods on Monday 11 April 2016 in the Glass Roo...
18 January 2016
18 January 2016
The School of Computing recently held a Research day where staff and PhD students shared their expertise in the form of a "One-Minute-Madness". Each of the 68 researchers who ...