Gordon Russell

Gordon Russell

Dr Gordon Russell

Associate Professor

Biography

Gordon is currently the academic theme lead of the Cyber Security and Networks group, which has a successful portfolio of undergraduate and postgraduate programmes and around 15 staff. His current research interests focus on Cryptography, Digital Forensics and Cyber Security.
He has led the development of the GCHQ certified MSc Advanced Security and Digital Forensics, including introducing new modes of study including distance learning.  Along with this Gordon led the development of the MSc Advanced Security and Cybercrime, which provides distance learning opportunities for postgraduate studies.
Gordon has also helped develop The Cyber Academy, which aims to disseminate cyber intelligence at both a national and international level, with current links in Europe to law enforcement, and is currently an external examiner at the University of Northumbria.
Gordon has a strong international reputation, which has been built on innovative teaching and virtualization environments, such as LinuxZoo. His current research work investigates decrypting messages using keys extracted from active virtual machines, forensic triage techniques to improve the speed of forensics analysis, and detecting cyber attacks on industrial systems including public water supplies.

News

Events

Esteem

Advisory panels and expert committees or witness

  • Member of the Technical Expert Group for Cyber Security apprenticeships

 

External Examining/Validations

  • External Examiner at Bedfordshire University
  • External Examiner at Northumbria University

 

Date


49 results

The rapid simulation of urban traffic using field programmable gate arrays.

Conference Proceeding
Russell, G., Shaw, P., McInnes, J. & Ferguson, N. (1993)
The rapid simulation of urban traffic using field programmable gate arrays. In International Conference on Application of New Technology to Transport Systems, 107-122. ISBN 0-86910-663-5
Conventional traffic simulation techniques, employing continuous movement of vehicles, do not have a sufficiently fast responce time for the real-time operational control of a...

The Prometheus II Description Model: an objective approach to representing taxonomic descriptions

Working Paper
MacDonald, S. M., Raguenaud, C., Pullan, M. R., Kennedy, J., Russell, G., & Watson, M. F. The Prometheus II Description Model: an objective approach to representing taxonomic descriptions

)
MacDonald, S. M., Raguenaud, C., Pullan, M. R., Kennedy, J., Russell, G., & Watson, M. F. The Prometheus II Description Model: an objective approach to representing taxonomic descriptions
A model for improving the storage and communication of plant descriptions is presented. The model is flexible and yet reduces the ambiguity often present in text descriptions....

Simulating vehicular traffic flows using the Circal System.

Report
Russell, G., Cowie, A., McInnes, J., Bate, M. & Milne, G. (1993)
Simulating vehicular traffic flows using the Circal System
Modern civil engineers have big problems on their hands; more cars use our road networks every year, leading to ever increasing congestion. Knowing how to change a road networ...

Architectures for persistence

Journal Article
Russell, G., & Cockshott, W. P. (1993)
Architectures for persistence. Microprocessors and Microsystems, 17(3), 117-130. https://doi.org/10.1016/0141-9331%2893%2990042-6
Persistent object oriented architectures have been researched for many years, deriving initially from the Manchester University Atlas machine. In reality, however, few actual ...

DAIS: An Object-Addressed Processor Cache

Conference Proceeding
Russell, G., Shaw, P., & Cockshott, W. P. (1994)
DAIS: An Object-Addressed Processor Cache. In Persistent Object Systems: Proceedings of the 6th International Workshop on Persistent Object Systems, 374-386. https://doi.org/10.1007/978-1-4471-2122-0_29
DAIS is a proposed processor incorporating hardware-based object addressing. By providing only the very minimum of support for objects, it allows efficient access via a novel ...

Shifting register windows.

Journal Article
Russell, G., & Shaw, P. (1993)
Shifting register windows. IEEE Micro, 13, 28-35. https://doi.org/10.1109/40.229712
Shifting register windows is a new register windowing method that attempts to overcome some of the difficulties of traditional fixed- and variable-sized schemes. Using fewer r...

Multiple traffic signal control using a genetic algorithm

Conference Proceeding
Kalganova, T., Russell, G., & Cumming, A. (1999)
Multiple traffic signal control using a genetic algorithm. In A. Dobnikar, N. C. Steele, D. W. Pearson, & R. F. Albrecht (Eds.), Artificial Neural Nets and Genetic Algorithms, 220-228. https://doi.org/10.1007/978-3-7091-6384-9_38
Optimising traffic signal timings for a multiple-junction road network is a difficult but important problem. The essential difficulty of this problem is that the traffic signa...

Security issues of a publicly accessible cloud computing infrastructure.

Conference Proceeding
Russell, G., & Macfarlane, R. (2012)
Security issues of a publicly accessible cloud computing infrastructure. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 1210-1216. https://doi.org/10.1109/TrustCom.2012.259
Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accident...

Real-time monitoring of privacy abuses and intrusion detection in android system.

Conference Proceeding
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015)
Real-time monitoring of privacy abuses and intrusion detection in android system. In Human Aspects of Information Security, Privacy, and Trust, (379-390). https://doi.org/10.1007/978-3-319-20376-8_34
In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the mali...

RESCUE: Resilient Secret Sharing Cloud-based Architecture.

Conference Proceeding
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015)
RESCUE: Resilient Secret Sharing Cloud-based Architecture. In 2015 IEEE Trustcom/BigDataSE/ISPA Vol. 1, (872-879). https://doi.org/10.1109/Trustcom.2015.459
This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without use...

Current Post Grad projects

Previous Post Grad projects