Associate Professor of Immunology & Infection / Director of Research, School of Applied Sciences
Business Development Executive
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Heenan, R. & Moradpoor, N. (2016). A survey of Intrusion Detection System technologies
– This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the perfor...
Heenan, R. & Moradpoor, N. (2016). Introduction to Security Onion
– Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many t...
A pump-priming proposal designed to investigate the potential for LL-37, a human cationic host defence peptide, to inhibit Rhinovirus infection and/or target cells infected with Rhinovirus for inducti...
Chief Scientists Office
We have identified the human cathelicidn LL-37 as having potent direct antiviral activity against human rhinovirus (HRV), together with the capacity to alter death pathways in HRV-infected cells, as a...
The ITC worked with Young Scot on their Ur'Say channel, when they were just beginning to use their website to gather young people's opinions and host discussions on relevant issues.
ITC developed n...
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
On 30th November 2016 Edinburgh Napier University hosted the 2016 Annual Lecture of the Association for Information Science and Technology (ASIST). The speaker was Professor S...
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
Director of Sustainable Construction
Whitlock, D., Rickson, J., Humphries, N., Thompson, R. & Tibbett, M. (2015). The influence of coal mine spoil physical properties on the spatial distribution of lichen-rich communities. In Mine Closure 2015: Proceedings of the tenth internation conference on mine closure, 1047. ISBN 9780991790593
Coal mine spoil tips have been recognised as a UK Biodiversity Action Plan habitat owing to the presence of a host of unique flora and fauna assemblages and, in particular, " ...
Buchanan, W. J. (2015). Edinburgh leading world in beating online crime. The Scotsman
Cyber security surges ahead in the capital, says Bill Buchanan As we become more dependent on the internet by the day, the risks around it also increase, especially from cyber...
Glover, P., Winterton, M., Martindale, R., Patel, S. & McNamara, H. (2015). TIN 2.025(C) - Extension: Supporting Serving Personnel and Families Living on Isolated Bases: Final Report. London: Ministry of Defence
No abstract available.
Glover, P., Winterton, M., Martindale, R., Newell, K. & MaNamara, H. (2015). TIN 2.025(C) Supporting Geographically Dispersed Service Families (GDSF): Final Report. London: Ministry of Defence
Macdonald, I., Firth, R., Foster, M. & Zhou, V. (2014). Interdisciplinary methodologies in different cultures of learning: Apples and Pears?
This paper explores the reception and analysis of different methodologies in an inter-disciplinary pedagogical collaboration involving Design and Business academics and their ...
Fisher, N., Newell, K., Winterton, M. & Martindale, R. (2014). TIN 2.018 Ethnic Minority Representation in UK Military Cadet Organisations: Final report. London: Ministry of Defence
Jan, M. A., Nanda, P., He, X., Tan, Z. & Liu, R. P. (2014). A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 205-211. doi:10.1109/trustcom.2014.31. ISBN 978-1-4799-6513-7
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovat...
Glover, P., Winterton, M., Martindale, R., Warnke, S., Huddy, G., McGuffog, A., …McNamara, H. (2013). TIN 2.025(C) Supporting Geographically Dispersed Service Families: Interim Report. London: Ministry of Defence
Theodoraki, E., Haija, S. A., Ali-Knight, J., Musinguzi, D., Omar, M., Canduela, J. & Bourne, S. (2013). The Events' Industry In Qatar And Social Behaviour Change Promotion Efforts: Green And Active Living Messaging And Anticipations In Light Of The 2022 Fifa World Cup. In Qatar Foundation Annual Research Conference Proceedings:
Qatar's growth, in terms of economic and political influence, is documented extensively in the literature and part of the country's long-term strategy for future development i...
Molla, R., Romdhani, I., Buchanan, W. J. & Fadel, E. Y. (2013). Mobile User Authentication System for E-commerce Applications. In International Conference on Advanced Networking, Distributed Systems and Applications 2014
E-commerce applications provide on-line clients
and merchants with a quick and convenient way to exchange
goods and services. However, the deployment of these
applications is ...
Fisher, N., Newell, K., Winterton, M. & Martindale, R. (2013). TIN 2.018 Ethnic Minority Representation in UK Military Cadet Organisations: Interim Report. London: Ministry of Defence
Buchanan, W. J. (2010). Security and forensic computing: introduction to computer security
1 INTRODUCTION 14
1.1 The Industrial and the Information Age 14
1.2 CIA and AAA 15
1.3 Protecting against intruders 16
1.4 Users, systems and data 17
1.5 Security and Forensic...
Construction Scotland Innovation Centre
Given the knowledge, infrastructure and resource that resides within Scotland, there is a real opportunity here to be a key player in the global offsite construction market. The emphasis now is to sca...
Crohn's in Childhood Research Association
Recent genetic discoveries, principally identification of NOD2 and ATG16L1 as susceptibility loci, strongly implicate a dysregulated host response to enteric bacteria and the autophagy pathway in the ...
Taxonomic Databases Working Group ( Biodiversity Information Standards )
This project aims to progress the development of Taxonomic Concept schema (TCS) in line with Taxonomic Database Working gorup (TDWG) architecture and documentation.
This work is to ensure that:
The PhD project which I am undertaking is focused on understanding the role of cathelicidins during respiratory viral infection...
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data into public cloud environments persists, along with an incr...
In most countries, population, poor management of water policies, infrastructure ...
Alpha-1-acid glycoprotein (AGP) is a 43kDa glycoprotein, so called due to the post-translation...
The growing fatality of road traffic accidents in most cities constitutes a p...
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
17 June 2016
17 June 2016
Professor Chandra Bhat Director of the Centre for Transportation Research, The University of Texas at Austin visited TRI at Edinburgh Napier University to discuss joint collab...