Thuemmler, C., Alois, P., Jell, T. & Keow Lim, A. (2017). Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services. In Latifi, S. (Ed.). Information Technology-Next Generation, 811-817. doi:10.1007/978-3-319-54978-1_100. ISBN 978-3-319-54977-4
As more and more details of 5G technology specifications unveil and standards emerge it becomes clear that 5G will have an enabling effect on many different verticals includin...
Flandrin, F., Buchanan, W. J., Macfarlane, R., Ramsay, B. & Smales, A. (2013). Evaluating Digital Forensic Tools (DFTs). In 7th International Conference : Cybercrime Forensics Education & TrainingISBN 9781909067158
This paper outlines the key methods used in the evaluation of digital forensics tools.
McKeown, S., Russell, G. & Leimich, P. (in press). Fingerprinting JPEGs with Optimised Huffman Tables. Journal of Digital Forensics, Security and Law. ISSN 1558-7215
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...
Buchanan, W. J., Chiale, S. & Macfarlane, R. (in press). A methodology for the security evaluation within the third-party Android marketplaces. Digital Investigation. doi:10.1016/j.diin.2017.10.002. ISSN 1742-2876
This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo localize the malware distribution over three main regions: China, Europe; and Russia...
Buchanan, B. (in press). Evaluation of Security within Third-party Android Marketplaces. Digital Investigation. ISSN 1742-2876
No abstract currently available.
Buchanan, B. (in press). Analysis of the Adoption of Security Headers in HTTP. IET Information Security. ISSN 1751-8709
No abstract available.
Thuemmler, C. (2017). Health and Sport Committee: Technology and Innovation in Health and Social Care. Edinburgh: Scottish Government
No abstract available
"The development of science and technology are increasingly affecting and changing the nature of processes in...
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data into public cloud environments persists, along with an incr...