13 results

Applications of Blockchain Within Healthcare.

Journal Article
Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2018)
Applications of Blockchain Within Healthcare. Blockchain in Healthcare Today,
There are several areas of healthcare and well-being that could be enhanced using blockchain technologies. These include device tracking, clinical trials, pharmaceutical traci...

Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain

Journal Article
Buchanan, B., & Naqvi, N. (2018)
Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain. The Journal of the British Blockchain Association, 1(1), 1-4
A blockchain enabled 'Digital Single Economy " can act as a catalyst for growth and could provide a platform where borderless innovative practices will thrive and create a tru...

Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study

Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...

Distance Measurement Methods for Improved Insider Threat Detection

Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...

Cryptography across industry sectors

Journal Article
Buchanan, W. J., Woodward, A., & Helme, S. (2017)
Cryptography across industry sectors. Journal of Cyber Security Technology, 1(3-4), 145-162. https://doi.org/10.1080/23742917.2017.1327221
Security adoption varies across industry sectors, where some companies such as Google, Apple and Microsoft are strong advocates of the adoption of HTTPS, while other companies...

Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem.

Conference Proceeding
Akram, R. N., Markantonakis, K., & Mayes, K. (2012)
Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem. In S. Xie (Ed.), 8th International Conference on Computational Intelligence and Security (CIS 2012), 646-652. https://doi.org/10.1109/CIS.2012.149
In late 1990s. the multi-application initiative was put forward to have multiple applications on a single smart card. This would have enabled a cardholder to accumulate all of...

Creation of an online virtual Cisco router learning environment.

Conference Proceeding
Rietsche, R., Russell, G., & Karduck, A. P. (2011)
Creation of an online virtual Cisco router learning environment. In Proceedings of the 14th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2011)https://doi.org/10.2316/P.2011.734-045
Online learning environments are an important aspect to many University courses. They allow flexibility in student approaches, and permit students from a range of backgrounds ...

Making assessment and feedback fun: feedback before and after assessments.

Presentation / Conference
Buchanan, W. J. (2011, January)
Making assessment and feedback fun: feedback before and after assessments. Paper presented at Edinburgh Napier University Staff Conference, Edinburgh Napier University
Multiple Choice Questions (MCQs) are often seen as being weak in terms of their coverage, and are criticised for often only assessing knowledge and not encouraging deep learni...

An agent based Bayesian forecasting model for enhanced network security.

Conference Proceeding
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001. , (247-254). https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...

Distributed systems and networks.

Book
Buchanan, W. J. (1999)
Distributed systems and networks. McGraw-Hill
This book provides the student with comprehensive coverage of both networks and system architecture. It aims to introduce the most widely used networking protocols and distrib...
5 results