29 results

Decrypting Live SSH Traffic in Virtual Environments

Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019)
Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts re...

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Conference Proceeding
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2019)
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In 2018 IEEE International Conference on Big Data (Big Data)https://doi.org/10.1109/BigData.2018.8621922
Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exis...

Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network

Conference Proceeding
Asif, R., Haithem, M., & Buchanan, W. J. (2018)
Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network. In Advanced Photonics Networkshttps://doi.org/10.1364/networks.2018.neth2f.3
We report a high capacity Quantum-to-the-Home (QTTH) network in a spatialdivision-multiplexing (SDM) network utilizing 7-core multicore fiber (MCF). Aggregate secure key rates...

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

Journal Article
Barrowclough, J. P., & Asif, R. (2018)
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, 1-20. https://doi.org/10.1155/2018/1681908
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hyper...

Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain

Journal Article
Buchanan, B., & Naqvi, N. (2018)
Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain. The Journal of the British Blockchain Association, 1(1), 1-4
A blockchain enabled 'Digital Single Economy " can act as a catalyst for growth and could provide a platform where borderless innovative practices will thrive and create a tru...

A Trust-based Intrusion Detection System for Mobile RPL Based Networks

Conference Proceeding
Faiza, M., Tandjaoui, D., Romdhani, I., & Nabil, D. (2018)
A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.113
Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be ...

Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study

Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...

Distance Measurement Methods for Improved Insider Threat Detection

Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...

Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment

Journal Article
Asif, R., & Buchanan, W. J. (2017)
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017, 1-10. https://doi.org/10.1155/2017/7616847
There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile...

Security for Cyber-Physical Systems in Healthcare

Book Chapter
Saleem, K., Tan, Z., & Buchanan, W. (2017)
Security for Cyber-Physical Systems in Healthcare. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (233-251). Springer. https://doi.org/10.1007/978-3-319-47617-9_12
The great leap forward of cyber-physical systems has made provision for future personalized medicine. However, these systems are prone to cyber attacks. To provide patients wi...