Research Project Administrator
Lecturer in Cybersecurity, Encryption and Networks
Uwagbole, S. O., Buchanan, W. J. & Fan, L. (in press). Numerical Encoding to Tame SQL Injection Attacks
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases....
McLaren, P., Russell, G. & Buchanan, B. (in press). Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017
Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, w...
Uwagbole, S., Buchanan, W. & Fan, L. (2016). Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web...
To develop the prototype for a next-generation security platform with advanced detection capabilities.
To create the ability in Payfont to research and deliver, using Universal Design principles and processes based on BS8878, the optimal secure user experience (UX) in secure transactions
02 February 2017
A great partnership between Hutchinson Networks and The Cyber Academy at Edinburgh Napier University has been showcased within a collaboration project which has build advanced...
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
03 December 2016
Edinburgh is becoming the best city in the World to be into tech.
This week five Edinburgh based companies head to a two-day TechCrunch Disrupt event. Other comp...
Professional Development Leader
Lecturer in Cybersecurity and Networks
Senior Research Fellow
Uwagbole, S., Buchanan, W. J. & Fan, L. (2016). Numerical encoding to tame SQL injection attacks.
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases....
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2015). Sticky policy enabled authenticated OOXML for health care. In Proceedings of BCS Health Informatics Scotland 2015 Conference. doi:10.14236/ewic/HIS2015.3
This paper proposes a secure medical document sharing construction, which addresses confidentiality and authenticity concerns related to cloud-based data protection issues. Th...
Buchanan, W. J., Ukwandu, E., Hazelhoff Roelfzema, N., Russell, G., Fan, L. & Lo, O. (2015). Secret shares to protect health records in cloud-based Infrastructures.
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...
Ukwandu, E., Buchanan, W. J., Fan, L., Lo, O. & Russell, G. (2015). RESCUE: Resilient Secret Sharing Cloud-based Architecture. In 2015 IEEE International Conference on Recent Advances of Trust, Security and Privacy
This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without use...
Prajapati, B., Buchanan, W. J., Smales, A., Macfarlane, R. & Spyra, G. (2014). Review of e-Health Frameworks. In Health Informatics Conference 2015
In order to improve the quality of health care and widen the accessibility, health care providers are consistently looking to inject information and communication technology t...
Chomsiri, T., He, X., Nanda, P. & Tan, Z. (2014). A Stateful Mechanism for the Tree-Rule Firewall. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 122-129. doi:10.1109/trustcom.2014.20. ISBN 978-1-4799-6513-7
In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewal...
Li, W., Meng, W., Tan, Z. & Xiang, Y. (2014). Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications,, 174-181. doi:10.1109/trustcom.2014.26. ISBN 978-1-4799-6513-7
The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish ...
Jan, M. A., Nanda, P., He, X., Tan, Z. & Liu, R. P. (2014). A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 205-211. doi:10.1109/trustcom.2014.31. ISBN 978-1-4799-6513-7
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovat...
Ambusaidi, M. A., He, X., Tan, Z., Nanda, P., Lu, L. F. & Nagar, U. T. (2014). A Novel Feature Selection Approach for Intrusion Detection Data Classification. doi:10.1109/trustcom.2014.15. ISBN 978-1-4799-6513-7
Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats...
Flandrin, F., Buchanan, W. J., Macfarlane, R., Ramsay, B. & Smales, A. (2013). Evaluating Digital Forensic Tools (DFTs). In 7th International Conference : Cybercrime Forensics Education & Training
This paper outlines the key methods used in the evaluation of digital forensics tools.
Buchanan, W. J., Macfarlane, R. & Clayton, J. (2012). Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. In CyberForensics 2013
There is a problem in the world of digital forensics. The demands on digital forensic investigators and resources will continue to increase as the use of computers and other e...
Uthmani, O., Buchanan, W. J., Fan, L. & Lawson, A. (2012). A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation.
This paper outlines a novel information sharing method using Binary Decision Diagrams (BBDs). It is inspired by the work of Al-Shaer and Hamed, who applied BDDs into the model...
Scottish Funding Council
The collaboration between Edinburgh Napier University and Silver IMP aims to apply existing patent pending technology for targeted marketing, into secure working, where documents can only be access...
SMART Grant proposal.
The integration and analytics of data feeds from social care visiting, in order to improve health and social care.
Prototype software and business case.
The project has resulted in a software prototype which demonstrates miiCard tags.
The development of an integrated product which scans data on remote sites, and then integrates into a central data site.
To develop a commercially viable tool to enable organisations to monitor and understand their organisation’s life on social media beyond those accounts they have created. This project is focused on ...
Royal Society of Edinburgh
This SE/RSE Enterprise Fellowship aimed to commercialise intellectual property owned by Edinburgh Napier University related to e-Health data management into an end-user product. The project paved the ...
This project has resulted in a spin-out company which was incorporated on 17 January 2014. It has also generated a patent related to BDDs (Binary decision Diagrams).
IIDI is working with Level10 Ltd on a new project awarded under the SFC Innovation Voucher scheme
IIDI is working with Allatus ltd supported the SFC Innovation Voucher scheme.
This project aims to integrate the automated data gather of information for audit/compliance requriments.
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...
Triage of large capacity digital devices
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. ...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
05 February 2016
IntroductionOn the back of four nomination at the Scottish Knowledge Exchange awards [here], Gordon Stuart, director of operations at Informatics Ventures, has also predicted ...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
17 February 2016
17 February 2016
Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s Euro...
11 April 2016
11 April 2016
The Cyber Academy and ENUSEC> are hosting a the second Cyber Security Master Class on the latest vulnerabilities and methods on Monday 11 April 2016 in the Glass Roo...