Search for a surname in the box below and then click "Search" to search for Staff.
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November). Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based
Information Rights Management (IRM) model extension with
enhanced accountability for both a sticky policy and an attached
data. This wor...
Buchanan, W. J. (2014, April). Discrete Logarithms within Computer and Network Security. Presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium, International Centre for Mathematical Sciences, University of Edinburgh
As we move into an Information Age, the requirement for computer security increases by the day, only in terms of privacy, but also in terms of proving identity and in verifyin...
Buchanan, W. J. (2013, January). Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.
Kintis, P., Kountouras, A., Pitropakis, N., Dagon, D., Antonakakis, M., Markou, C., & Buchner, P. (2017, May). Secure and Scalable Identity Management for the Aviation Industry
No abstract available.
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September). Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...
Buchanan, W. J. (2015, June). Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh
Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June). Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...
Buchanan, W. J. (2015, May). Vulnerability analysis. Presented at Advanced Threat Protection, Glazier's Hall, London
The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the bigge...
Buchanan, W. J., & Smales, A. (2015, April). New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). Paper presented at Cybercrime and Cyberterrorism - the EU Research roadmap, Montpellier, France
DFET creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the ...
Buchanan, W. J. (2015, February). It's all hackable. Paper presented at SBRC Insider Threat Conference 2015, RBS, Gogarburn
Buchanan, W. J., & Smales, A. (2015, February). Cyber security in practice: identifying areas of vulnerability. Paper presented at Scot-Secure 2015, Holyrood, Edinburgh
Areas covered include: - Using penetration testing to highlight areas of weakness - Practical steps for improving the security of your organisation.
Buchanan, W. J. (2015, January). Advanced persistent threat and Insiders. Paper presented at Advanced Persistent Threat, London
With an increase in the range and mobility of devices which connect to the network, there are now so many opportunities for intruders to compromise systems. Leading with the r...
Buchanan, W. J. (2014, September). Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities. Paper presented at 7th International Conference on Security of Information and Networks (SIN 2014), Glasgow
This presentation will outline some new research related to the Heartbleed vulnerability, and cover the full technical details of the threat, with a live demo. Along with it w...
Lawson, A., & Macfarlane, R. (2014, April). Embedding programming skills to support the student journey in networking, security and digital forensics. Paper presented at HEA STEM Annual Learning and Teaching Conference 2014: Enhancing the STEM Student Journey, University of Edinburgh, Edinburgh
The development of programming skills by Networking graduates, and Security and Digital Forensics graduates is highly sought after by employers, both in industry, and in acade...
Buchanan, W. J., & Smales, A. (2014, February). The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working, Edinburgh
This presentation outlines the changing architecture of business systems, and with the increasing use of Cloud-based systems. It outlines some of the key risks around using mo...