Staff directory

Search for a surname in the box below and then click "Search" to search for Staff. 

If you want to get in touch but you don’t know who to contact, fill in our enquiry form and one of our advisers will get back to you as soon as possible.

Date


People

Download Available

370 results

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

Journal Article
Davies, S., Macfarlane, R., & Buchanan, W. (2022)
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. Entropy, 24(10), Article 1503. https://doi.org/10.3390/e24101503
Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by ...

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022)
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively...

Ensemble learning-based IDS for sensors telemetry data in IoT networks

Journal Article
Naz, N., Khan, M. A., Alsuhibany, S. A., Diyan, M., Tan, Z., Khan, M. A., & Ahmad, J. (2022)
Ensemble learning-based IDS for sensors telemetry data in IoT networks. Mathematical Biosciences and Engineering, 19(10), 10550-10580. https://doi.org/10.3934/mbe.2022493
The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT de...

A novel flow-vector generation approach for malicious traffic detection

Journal Article
Hou, J., Liu, F., Lu, H., Tan, Z., Zhuang, X., & Tian, Z. (2022)
A novel flow-vector generation approach for malicious traffic detection. Journal of Parallel and Distributed Computing, 169, 72-86. https://doi.org/10.1016/j.jpdc.2022.06.004
Malicious traffic detection is one of the most important parts of cyber security. The approaches of using the flow as the detection object are recognized as effective. Benefit...

Sensing and Artificial Intelligent Maternal-Infant Health Care Systems: A Review

Journal Article
Gulzar Ahmad, S., Iqbal, T., Javaid, A., Ullah Munir, E., Kirn, N., Jan, S. U., & Ramzan, N. (2022)
Sensing and Artificial Intelligent Maternal-Infant Health Care Systems: A Review. Sensors, 22(12), Article 4362. https://doi.org/10.3390/s22124362
Currently, information and communication technology (ICT) allows health institutions to reach disadvantaged groups in rural areas using sensing and artificial intelligence (AI...

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

Journal Article
Kumar, A., Saha, R., Conti, M., Kumar, G., Buchanan, W. J., & Kim, T. H. (2022)
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. Journal of Network and Computer Applications, 204, Article 103414. https://doi.org/10.1016/j.jnca.2022.103414
Internet of Thing (IoT) is one of the most influential technologies in the present time. People, processes, and things are connected with the Internet through IoT. With the in...

A Study of Online Safety and Digital Literacy of Academic Researchers Working from Home during the COVID-19 Pandemic

Presentation / Conference
Haynes, D., & Salzano, R. (2022, April)
A Study of Online Safety and Digital Literacy of Academic Researchers Working from Home during the COVID-19 Pandemic. Paper presented at ASIS&T Global 24-hour Conference, 2022, Online
Universities in the UK responded to the COVID-19 pandemic by moving teaching to an online environment and requiring staff to work from home, as far as possible. Researchers fa...

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map

Journal Article
Alharbi, A. R., Ahmad, J., Arshad, Shaukat, S., Masood, F., Ghadi, Y. Y., …Buchanan, W. J. (2022)
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complexity, 2022, Article 7047282. https://doi.org/10.1155/2022/7047282
With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain...

Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT

Journal Article
Wang, F., Yang, S., Wang, C., Li, Q., Babaagba, K., & Tan, Z. (2022)
Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT. International Journal of Intelligent Systems, 37(10), 7058-7078. https://doi.org/10.1002/int.22871
Internet of Things (IoT) is fast growing. Non-PC devices under the umbrella of IoT have been increasingly applied in various fields and will soon account for a significant sha...

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022)
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), https://doi.org/10.3390/s22062291
E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evo...
76 results

Smart Contract based Reward Scheme

2022 - 2023
Egg Lighting would like to explore the possibility of linking their company value to Smart Contracts via Blockchain. They would eventually like to give away 1/3 of their business (shares) to the gene...
Funder: Scottish Funding Council | Value: £5,000

Evolutionary based Generative Adversarial Learning Approach to Metamorphic Malware Detection

2022 - 2022
Malicious attacks account for a significant portion of attacks to information assets and computer networks in organisations today. More specifically, dangerous groups of malware that transform their c...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £1,200

Behaviour profiling using Touch-based Behavioural Biometrics for Continuous Authentication Systems

2022 - 2022
Authenticating smartphone users from distinct behavioural biometric patterns provided through human interactions on touch screens would allow users to be continuously authenticated on their devices wh...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £923

TrueDeploy - CyberASAP Phase 1

2022 - 2022
The way in which we develop and supply secure, trusted software is broken. The dominance of open-source software and the interconnectedness of software between organisations has raised cybersecurity r...
Funder: Innovate UK | Value: £31,969

Divulging the Secrets of Artificial Intelligence

2022 - 2022
Digital Infrastructures are complex systems that are built upon computing and communication hardware, and whose resilience is undermined by the security of its hardware building blocks, which has not ...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £2,500

Security and Privacy in Vehicular Ad-hoc Networks

2022 - 2024
The great leap forward in wireless communications technology drives the recent advancements of Vehicular Ad hoc NETworks (VANETs). As a key part of the Intelligent Transportation Systems (ITS) framewo...
Funder: Royal Society | Value: £12,000

Innovative Distributed Platform for Educational Content

2022 - 2022
This project aims to setup a dynamic sharing content platform for tutor led plans using Hyperledger Fabric and IPFS.
Funder: Scottish Funding Council | Value: £5,000

AI-based privacy-preserving biometric authentication with mass-market smart devices

2021 - 2024
Increasingly our identity is key to our online security, and where online services must integrate with these, in order to provide increased levels of trust. But there are now many constraints in how b...
Funder: Data Lab | Value: £65,756

Mapping Capacities for a Community Policing of Cybercrime and Digital Harm

2021 - 2022
Research exploring cybercrime policing has tended to focus on specialist policing units on the one hand (Harkin, Whelan and Change, 2018), and on the inherent limits of public policing organisations o...
Funder: Scottish Institute for Policing Research | Value: £19,709

SICSA Research Theme Event for IEEE DSC 2022

2021 - 2022
The IEEE Conference on Dependable and Secure Computing seeks papers, posters, and experiences for presenting innovative research results, solutions, and new challenges in the field of dependable and s...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £2,000

Date


School

Qualification level

17 results

Enhancement of identified effective ransomware detection techniques

2020 - date
Simon Davies | Director of Studies: Rich Macfarlane | Second Supervisor: Prof Bill Buchanan

Privacy-preserving systems around security, trust and identity

2019 - 2022
Dr Pavlos Papadopoulos | Director of Studies: Dr Nick Pitropakis | Second Supervisor: Prof Bill Buchanan

Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives

2019 - 2021
This work is concerned with the information practices associated with hyperlocal representation. The fin...
Dr Peter Cruickshank | Director of Studies: Prof Hazel Hall | Second Supervisor: Dr Kendall Richards

Identity and identification in an information society: Augmenting formal systems of identification with technological artefacts

2018 - date
Mr Will Abramson | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Owen Lo

Electromagnetic side-channel resilience against lightweight cryptography

2018 - date
Nilupulee Gunathilake | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Prof Bill Buchanan

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - 2021
Dr Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Industrial control systems cybersecurity analysis and countermeasures

2017 - 2021
Andres Santiago Robles Durazno | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: James McWhinnie

Efficient algorithms for MAC layer duty cycling and frame delivery in wireless sensor network

2016 - 2021
Dr Craig Thomson | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Thomas Tan

Behaviour profiling using Touch-based Behavioural Biometrics for Continuous Authentication Systems

2016 - date
Peter Aaby | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Ben Paechter

Semantic model-driven framework for validating quality requirements of internet of things streaming data

2016 - 2021
Dr Oluwaseun Bamgboye | Director of Studies: Prof Xiaodong Liu | Second Supervisor: Dr Peter Cruickshank
28 results

Promising cyber security project supported by new Scottish Enterprise funding

21 September 2022
TrueDeploy, an exciting project from the School of Computing, Engineering & the Built Environment (SCEBE) at Edinburgh Napier University (ENU), has secured £199,952 in additional support from Scottish...

Double funding success for School of Computing

21 March 2022
Two projects from Edinburgh Napier’s acclaimed School of Computing have won funding from a programme which develops innovative cyber security ideas for the commercial market. TrueDeploy and Trustd ar...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

15 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

18 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Basil Manoussos (Manager @ The Cyber Academy) delivers keynote at the 2019 Annual Conference of the Scottish Paralegal Association

18 April 2019
Basil Manoussos, Manager of The Cyber Academy delivers keynote presentation at the Annual Conference of the Scottish Paralegal Association in Glasgow, titled "Cyber threats to law firms: Do you want ...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

11 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

31 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

SOCLAB Launch

11 April 2018
Official launch of SOCLAB, the new SOC facility in Merchiston Campus