Head of Applications
Uwagbole, S. O., Buchanan, W. J. & Fan, L. (in press). An Applied Pattern-Driven Corpus to Predictive Analytics in Mitigating SQL Injection Attack. In Proceedings of the Seventh IEEE International Conference on Emerging Security TechnologiesISBN n/a
Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted w...
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Romdhani, I., Faiza, M., Tandjaoui, D. & Djedjig, N. (in press). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2017ISBN n/a
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Biotechnology and Biological Sciences Research Council
Biology is a visually grounded scientific discipline-from the way data is collected and analysed to the manner in which the results are communicated to others. Traditionally pictures in scientific pub...
Scottish Funding Council
Comcarde is developing a mobile payments system called Bridge that uses a patent pending algorithm which is extremely resilient to man-in-the-middle attacks. Combined with strong authentication, we b...
Royal Academy of Engineering
Structures such as bridges or wind turbines develop loads that have to be transmitted to the ground.
The loads can be static (self-weight) or dynamic (wind, wave or traffic loads) and may be significa...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
31 May 2017
Prof Bill Buchanan, who leads The Cyber Academy at Edinburgh Napier University, has been invited as a witness at the Health and Sport Committee within the Scottish Parliament ...
11 April 2016
11 April 2016
The Cyber Academy and ENUSEC> are hosting a the second Cyber Security Master Class on the latest vulnerabilities and methods on Monday 11 April 2016 in the Glass Roo...
Lecturer in Cybersecurity and Networks
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
Segura, C., Segredo, E. & Miranda, G. (in press). The Importance of the Individual Encoding in Memetic Algorithms with Diversity Control Applied to Large Sudoku Puzzles. In Proceedings of the CEC 2017
In recent years, several memetic algorithms with explicit mechanisms to delay convergence have shown great promise when solving 9x9 Sudoku puzzles. This paper analyzes and ext...
Uwagbole, S. O., Buchanan, W. J. & Fan, L. (in press). Applied Machine Learning Predictive Analytics to SQL Injection Attack Detection and Prevention. In Proceedings
The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smar...
Uwagbole, S. O., Buchanan, W. J. & Fan, L. (in press). Numerical Encoding to Tame SQL Injection Attacks
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases....
Xie, Y. H., Yang, Z. X. & Barreto, D. (2016). The Influence of Particles’ Aspect Ratio on the Shear Behaviour of Granular Materials. In Springer Proceedings in Physics; Proceedings of the 7th International Conference on Discrete Element Methods, 253-264. doi:10.1007/978-981-10-1926-5_29. ISBN 978-981-10-1925-8; 978-981-10-1926-5
The mechanical response of granular material depends both on the material properties (e.g. stiffness, anisotropy, permeability, etc.) and particle geometry (shape, roughness, ...
Paulin, A. & Thuemmler, C. (2016). Dynamic Fine-Grained Access Control in e-Health Using the Secure SQL Server System as an Enabler of the Future Internet. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom),, 245-248. doi:10.1109/HealthCom.2016.7749462. ISBN 978-1-5090-3370-6
— This paper describes the use of the Secure SQL Server system (SecSQL) – a system for dynamic fine-grained access control, in the context of e-Health. The system was used in ...
Moradpoor, N., Clavie, B. & Buchanan, B. (-0001). Employing Machine Learning Techniques for Detection and Classification of Phishing Emails. In Proceedings of the IEEE Technically Sponsored Computing Conference 2017
A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or d...
Marinelli, A. (2016). A combined experimental and numerical study of the pull-out mechanism of threaded titanium bars embedded in marble blocks. In The ECCOMAS Congress 2016 Proceedings, 5207-5218. ISBN 978-618-82844-0-1
The present study describes the first stage of an ongoing research project aiming to investigate the failure mechanisms activated when reinforcing bars are pulled-out from the...
Liuti, A., D'Amico, B. & Pugnale, A. (2016). Building timber gridshells with air: Numerical simulations and technique challenges. In Cruz, P. J. S. (Ed.). Structures and Architecture: Beyond their LimitsISBN 9781138026513
Construction has always been a fascinating and challenging aspect of timber gridshells. So far, only three techniques have successfully been used for the erection of such stru...
Uwagbole, S., Buchanan, W. & Fan, L. (2016). Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016ISBN 9781910810934
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web...
Uwagbole, S., Buchanan, W. J. & Fan, L. (2016). Numerical encoding to tame SQL injection attacks. In 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS),doi:10.1109/NOMS.2016.7502997. ISBN 978-1-5090-0223-8
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases....
Pomponi, F., Piroozfar, P. & Moncaster, A. (2016). Shortcomings of LCA current practice: the risk of mean values
Industrial ecology can potentially become the science of the circular economy as a recent call for papers of the Journal of Industrial Ecology demonstrates. Well known tools i...
This project, in collaboration with key industry expert partners, would investigate using experimental full scale structures and numerical modeling the range of options available for this industry sec...
The development and fabrication injection of moulding tools is complex and
demands highly skilled personal. The research...
Fossil fuels are a finite resource, which are subject to erratic price fluctuations and are c...