Senior Research Fellow
Romdhani, I., Faiza, M., Tandjaoui, D. & Djedjig, N. (in press). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2017ISBN n/a
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
Ukwandu, E., Buchanan, W. & Russell, G. (in press). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)ISBN Not Known
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
To create the ability in Payfont to research and deliver, using Universal Design principles and processes based on BS8878, the optimal secure user experience (UX) in secure transactions
To develop the prototype for a next-generation security platform with advanced detection capabilities.
17 May 2017
The Cyber Academy and MBM Commercial hosted a highly successful conference event with over 120 delegates which outlined some of the current issues of law and cyber security.
20 May 2017
Professor Bill Buchanan, an international expert in Cyber Security, appeared on a wide range of media events related to the ransomware attack (WannaCry). This included a numbe...
01 February 2017
Lecturer in Cybersecurity, Encryption and Networks
Professional Development Leader
Alsnousi, E., Al-Dubai, A., Romdhani, I. & Eshaftri, M. (in press). A New Weight based Rotating Clustering Scheme for WSNs. In Proceedings of ISNCC-2017 WMCN
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Ben Ali, B., Dugas, É., Naceur, A. & Romdhani, I. (in press). A New Zigbee-based Device for Measuring Visual Reaction Time in Sport Activities. In IEEE ICEMIS 2017
There is a growing demand for smart tools and devices that measure visual reaction time during sports and physical activities in outdoor environments. However, one of the majo...
McKeown, S., Russell, G. & Leimich, P. (in press). Fast Filtering of Known PNG Files Using Early File Features. In Proceedings of the Conference on Digital Forensics, Security and LawISBN not yet known
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...
Romdhani, I., Djedjig, N., Medjek, F. & Tandjaoui, D. (in press). New Trust Metric for the RPL Routing Protocol. In Proceedings of ICICS 2017
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. ...
Uwagbole, S. O., Buchanan, W. J. & Fan, L. (in press). Numerical Encoding to Tame SQL Injection Attacks
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases....
Essa, A., Al-Dubai, A., Romdhani, I. & Eshaftri, M. (2016). A new dynamic weight clustering algorithm for wireless sensor networks. In Yang, S., Gao, J., Zhang, Y., Yang, K., Leung, V. C. M. & Hu, J. (Eds.). Smart Grid Inspired Future Technologies: First International Conference, Liverpool, UK, May 19-20, 2016 SmartGIFT 2016, 195-203. ISBN 978-3-319-47729-9, 978-3-319-47728-2
Since sensor nodes have limited energy resources, prolonging network lifetime and improving scalability are essential elements in energy-efficient Wireless Sensor Networks (WS...
Grigoriadis, N., Bakirtzis, C., Politis, C., Danas, K. & Thuemmler, C. (2016). Health 4.0: The Case of Multiple Sclerosis. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), 100-104. doi:10.1109/HealthCom.2016.7749437. ISBN 978-1-5090-3370-6
Multiple sclerosis is a chronic and variable disease in matters of symptoms, clinical course and outcome. The ultimate goal of currently used drugs and therapeutic strategies ...
Zeb, K., Saleem, K., Al Muhtadi, J. & Thuemmler, C. (2016). U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), 562-567. doi:10.1109/HealthCom.2016.7749518. ISBN 978-1-5090-3370-6
Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records...
Thuemmler, C., Paulin, A. & Lim, A. K. (2016). Determinants of Next Generation e-Health Network and Architecture Specifications. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), 233-238. doi:10.1109/HealthCom.2016.7749460. ISBN 978-1-5090-3370-6
This paper summarizes the determinants for future e-Health network and IT infrastructures in the health care environment. The paper bases on observations conducted as part of ...
Paulin, A. & Thuemmler, C. (2016). Dynamic Fine-Grained Access Control in e-Health Using the Secure SQL Server System as an Enabler of the Future Internet. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom),, 245-248. doi:10.1109/HealthCom.2016.7749462. ISBN 978-1-5090-3370-6
— This paper describes the use of the Secure SQL Server system (SecSQL) – a system for dynamic fine-grained access control, in the context of e-Health. The system was used in ...
(2016). Outlook 17 A New Generation of e-Health Systems Powered by 5G
Standardized 5G systems will be market ready around 2020. What is clear is that 5G will be more than a simple evolution of the current network. Indeed, it will be a catalyst f...
Buchanan, W. J. & Van Deursen, N. (2016). HI-risk: A Method to Analyse Health Information Risk Intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)doi:10.1109/HealthCom.2016.7749536. ISBN 978-1-5090-3370-6
— Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to secu...
The Scottish Informatics & Computer Science Alliance
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas. It is a forum for early researchers to pres...
Scottish Funding Council
When purchasing business insurance, a customer often completes forms each year to fulfil legal disclosure requirements and receive a ‘quote’. Internet services, such as comparison sites, have enabled ...
Higher Education Academy
The proposal aims to build a Virtualised Security Operation Center [vSoC] and integrates into a currently operating virtualized cyber security Cloud infrastructure (DFET), and use state-of-theart
Digital Health Institute
Scottish Frailty Framework with Mobile Device Capture and Big Data Integration. The proposed innovation will develop and extend the current work into Frailty, with the long term focus on encompassing ...
The university will undertake a comprehensive review of the core biometric security software for the desktop enterprise environment including Bio Logon, Bio ID Secure Communications and Bio ID Secure ...
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatically alter the world and the way we live and work. Indeed, in recent decades, the need ...
Comcarde is developing a mobile payments system called Bridge that uses a patent pending algorithm which is extremely resilient to man-in-the-middle attacks. Combined with strong authentication, we b...
The project undertaken by Onyu and ENU will concentrate around the mobile application that is under development by the team at Onyu.
Working with ENU our key objectives are:
1. Validation of our zero...
This project will develop a design and “architecture” for a system to deliver the objectives for 1-3 countries. A prototype wireframe will be built to demonstrate the system.
Kulio Ltd and Edinburgh Napier University are planning to collaborate to create a new innovative application consisting of Kulio education characters. Children throughout local authorities are already...
The overall vision of the Spellakit project is to significantly enhance learner experience and outcomes in English language spelling through an innovative ICT based approach focused on a kinesthetic m...
The aim of this project led by Alistair Lawson of IIDI is to develop a design for the underlying architecture of a novel virtual learning platform
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for law enforcement agencies, impeding t...
Triage of large capacity digital devices
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data into public cloud e...
"The development of science and technology are increasingly affecting and changing the nature of processes in...
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. ...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
01 April 2016
Prime numbers are used extensively in public key encryption key, typically where we take two prime numbers and multiply them together to give a modulus (N). This modulus is ...
03 December 2016
Edinburgh is becoming the best city in the World to be into tech.
This week five Edinburgh based companies head to a two-day TechCrunch Disrupt event. Other comp...
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
02 February 2017
A great partnership between Hutchinson Networks and The Cyber Academy at Edinburgh Napier University has been showcased within a collaboration project which has build advanced...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
05 February 2016
IntroductionOn the back of four nomination at the Scottish Knowledge Exchange awards [here], Gordon Stuart, director of operations at Informatics Ventures, has also predicted ...
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
17 February 2016
17 February 2016
Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s Euro...
11 May 2016
11 May 2016
This years post-graduate research conference will be held Wednesday (11th of May) on H-floor.
Presentations and the keynote will be in H5, the poster session, breaks an...
11 April 2016
11 April 2016
The Cyber Academy and ENUSEC> are hosting a the second Cyber Security Master Class on the latest vulnerabilities and methods on Monday 11 April 2016 in the Glass Roo...
04 April 2016
04 April 2016
This showcase event aims to demonstrate the career roles that there are within Cyber Security, and includes companies who are activitely seeking Cyber Security graduates.