Gordon Russell

Gordon Russell

Dr Gordon Russell

Associate Professor

Biography

Gordon is Head of Subject of the Cyber Security and Networks group, which has a successful portfolio of undergraduate and postgraduate programmes and around 15 staff. His current research interests focus on Cryptography, Digital Forensics and Cyber Security.
He has led the development of the GCHQ certified MSc Advanced Security and Digital Forensics, including introducing new modes of study including distance learning.  Along with this Gordon led the development of the MSc Advanced Security and Cybercrime, which provides distance learning opportunities for postgraduate studies. He project manages the BSc Cyber Higher Apprenticeship degree in the School.
Gordon has also helped develop The Cyber Academy, which aims to disseminate cyber intelligence at both a national and international level, with current links in Europe to law enforcement. He is currently an external examiner at the University of Bedfordshire.
Gordon has a strong international reputation, which has been built on innovative teaching and virtualization environments, such as LinuxZoo. His current research work investigates decrypting messages using keys extracted from active virtual machines, forensic triage techniques to improve the speed of forensics analysis, and detecting cyber attacks on industrial systems including public water supplies.

News

Events

Esteem

Advisory panels and expert committees or witness

  • Member of the Technical Expert Group for Cyber Security apprenticeships

 

External Examining/Validations

  • External Examiner at Bedfordshire University
  • External Examiner at Northumbria University

 

Date


53 results

Secret shares to protect health records in Cloud-based infrastructures

Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...

Risk assessment for mobile systems through a multilayered hierarchical Bayesian network.

Journal Article
Li, S., Tryfonas, T., Russell, G., & Andriotis, P. (2016)
Risk assessment for mobile systems through a multilayered hierarchical Bayesian network. IEEE Transactions on Cybernetics, 46(8), 1749-1759. https://doi.org/10.1109/TCYB.2016.2537649
Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the o...

RESCUE: Resilient Secret Sharing Cloud-based Architecture.

Conference Proceeding
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015)
RESCUE: Resilient Secret Sharing Cloud-based Architecture. In 2015 IEEE Trustcom/BigDataSE/ISPA Vol. 1, (872-879). https://doi.org/10.1109/Trustcom.2015.459
This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without use...

The future internet: a world of secret shares

Journal Article
Buchanan, W. J., Lanc, D., Ukwandu, E., Fan, L., Russell, G., & Lo, O. (2015)
The future internet: a world of secret shares. Future Internet, 7(4), 445-464. https://doi.org/10.3390/fi7040445
The PKI infrastructure is crumbling, especially due to the lack of a strong understanding of how encryption actually works, and in threats around its implementation. This pape...

Real-time monitoring of privacy abuses and intrusion detection in android system.

Conference Proceeding
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015)
Real-time monitoring of privacy abuses and intrusion detection in android system. In Human Aspects of Information Security, Privacy, and Trust, (379-390). https://doi.org/10.1007/978-3-319-20376-8_34
In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the mali...

Teaching penetration and malware analysis in a cloud-based environment.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June)
Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...

Security issues of a publicly accessible cloud computing infrastructure.

Conference Proceeding
Russell, G., & Macfarlane, R. (2012)
Security issues of a publicly accessible cloud computing infrastructure. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 1210-1216. https://doi.org/10.1109/TrustCom.2012.259
Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accident...

SQL Hacks. Tips and tools for digging into your data.

Book
Cumming, A., & Russell, G. (2007)
SQL Hacks. Tips and tools for digging into your data. O'Reilly
...SQL Hacks reveals the secrets that database experts use to dig through their data and get the answers they need. It includes 100 hacks for sorting, sifting, shuffling, and ...

Online assessment and checking of SQL: detecting and preventing plagiarism.

Conference Proceeding
Russell, G. & Cumming, A. (2005)
Online assessment and checking of SQL: detecting and preventing plagiarism. ISBN 0-9541927-8-8
The automatic checking of online assessments and tutorials offers a significant advantage to students. Such students can work out-of-hours, from home or work, managing their o...

Automatic checking of SQL: Computerised grading.

Journal Article
Cumming, A. & Russell, G. (2005)
Automatic checking of SQL: Computerised grading. IntInternational Journal of Learning: Annual Review. 12, 127-134. ISSN 1447-9494
Undergraduates are taught the database language SQL using internet based tools. The managed learning environment includes assessment.

Current Post Grad projects

Previous Post Grad projects