Lecturer of Cybersecurity, Encryption and Networks
Moradpoor, N., Brown, M. & Russell, G. (in press). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In N/Adoi:10.1145/3136825.3136859. ISBN 978-1-4503-5303-8/17/10
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Ghaleb, B., Al-Dubai, A. & Romdhani, I. (2017). Drizzle: Adaptive and Fair Route Maintenance Algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC), 1-6. doi:10.1109/ICC.2017.7996819. ISBN 978-1-4673-8999-0
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...
To create the ability in Payfont to research and deliver, using Universal Design principles and processes based on BS8878, the optimal secure user experience (UX) in secure transactions
Fragment Finder (FF) enables a new, high-speed approach to digital forensics. It is unique in that it will build a more efficient technical architecture for the creation, storage and use of hash signa...
To develop the prototype for a next-generation security platform with advanced detection capabilities.
23 August 2017
In an interview with Inspired Edinburgh in The Victorian Townhouse, Professor Bill Buchanan outlined his career and his university, along with his love of his home city, crypt...
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
31 May 2017
Prof Bill Buchanan, who leads The Cyber Academy at Edinburgh Napier University, has been invited as a witness at the Health and Sport Committee within the Scottish Parliament ...
Zero Hour Lecturer
Research Project Administrator
Lecturer in Cybersecurity and Digital Forensics
Lecturer in Cybersecurity and Networks
Yassin, A., Nasser, Y., Awad, M. & Al-Dubai, A. (2017). Simultaneous Context Inference and Mapping using mm-Wave for Indoor Scenarios. In IEEE ICC 2017, 1-6. doi:10.1109/ICC.2017.7996976
We introduce in this paper two main approaches, Triangulateration (TL) and Angle-Difference-of-Arrival (ADoA) for indoor localization and mapping using single-anchor and milli...
Ghaleb, B., Al-Dubai, A., Ekonomou, E. & Wadhaj, I. (2017). A New Enhanced RPL Based Routing for Internet of Things”, 2ndConvergent Internet of Things. In 2017 IEEE International Conference on Communications, 1-6. doi:10.1109/ICCW.2017.7962723. ISBN 978-1-5090-1525-2
The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the ...
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Thuemmler, C. (2017). Accroitre-lefficacite-de-la-prestation-des-soins. http://paperjam.lu/news/accroitre-lefficacite-de-la-prestation-des-soins
Interview on socio-economic background of digital agenda in health.
Thomson, C., Wadhaj, I., Romdhani, I. & Al-Dubai, A. (2017). Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)doi:10.1109/aiccsa.2016.7945687. ISBN 9781509043200
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X. & Han, W. (in press). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference ProceedingsISBN NA
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Romdhani, I., Faiza, M., Tandjaoui, D. & Djedjig, N. (in press). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2017ISBN n/a
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
Salayma, M., Al-Dubai, A. & Romdhani, I. (2017). Reliability and Energy Efficiency Enhancement in Wireless Body Area Networks for E-Health. In 2016 19th Conference of Open Innovations Association (FRUCT)doi:10.23919/FRUCT.2016.7892202. ISBN 978-952-68397-4-5, 978-1-5090-6188-4
Wireless Body Area Network (WBAN) is a technology that revolutionises our understanding of the future digitised healthcare systems. WBAN has unique challenges and features com...
Ukwandu, E., Buchanan, W. & Russell, G. (in press). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)ISBN Not Known
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
Alsnousi, E., Al-Dubai, A., Romdhani, I. & Eshaftri, M. (in press). A New Weight based Rotating Clustering Scheme for WSNs. In Proceedings of ISNCC-2017 WMCN
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Digital Health Institute
This project aims to extend the existing work with the e-Frail project, and integrate a range of NHS-sourced assessors with care giver and open source gathered assessors, in order to define a weighted...
This is a Data Labs project which will investigate Blockchain technology - with Spiritus, the project will be ground-breaking in the implementation of a private blockchain within a large-scale healthc...
The Scottish Informatics & Computer Science Alliance
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas. It is a forum for early researchers to pres...
Scottish Funding Council
When purchasing business insurance, a customer often completes forms each year to fulfil legal disclosure requirements and receive a ‘quote’. Internet services, such as comparison sites, have enabled ...
Higher Education Academy
The proposal aims to build a Virtualised Security Operation Center [vSoC] and integrates into a currently operating virtualized cyber security Cloud infrastructure (DFET), and use state-of-theart
Scottish Frailty Framework with Mobile Device Capture and Big Data Integration. The proposed innovation will develop and extend the current work into Frailty, with the long term focus on encompassing ...
The university will undertake a comprehensive review of the core biometric security software for the desktop enterprise environment including Bio Logon, Bio ID Secure Communications and Bio ID Secure ...
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatically alter the world and the way we live and work. Indeed, in recent decades, the need ...
Comcarde is developing a mobile payments system called Bridge that uses a patent pending algorithm which is extremely resilient to man-in-the-middle attacks. Combined with strong authentication, we b...
The project undertaken by Onyu and ENU will concentrate around the mobile application that is under development by the team at Onyu.
Working with ENU our key objectives are:
1. Validation of our zero...
This project will develop a design and “architecture” for a system to deliver the objectives for 1-3 countries. A prototype wireframe will be built to demonstrate the system.
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. ...
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for law enforcement agencies, impeding...
Triage of large capacity digital devices
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data into public cloud e...
"The development of science and technology are increasingly affecting and changing the nature of processes in...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
05 February 2016
IntroductionOn the back of four nomination at the Scottish Knowledge Exchange awards [here], Gordon Stuart, director of operations at Informatics Ventures, has also predicted ...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
Prime numbers are used extensively in public key encryption key, typically where we take two prime numbers and multiply them together to give a modulus (N). This modulus is ...
03 December 2016
Edinburgh is becoming the best city in the World to be into tech.
This week five Edinburgh based companies head to a two-day TechCrunch Disrupt event. Other comp...
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
01 February 2017
02 February 2017
A great partnership between Hutchinson Networks and The Cyber Academy at Edinburgh Napier University has been showcased within a collaboration project which has build advanced...
20 May 2017
Professor Bill Buchanan, an international expert in Cyber Security, appeared on a wide range of media events related to the ransomware attack (WannaCry). This included a numbe...
17 May 2017
The Cyber Academy and MBM Commercial hosted a highly successful conference event with over 120 delegates which outlined some of the current issues of law and cyber security.
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...