Search for a surname in the box below and then click "Search" to search for Staff.
Lecturer in the School of Computing
+44 131 455 2789
+44 131 455 2789
Buchanan, W. J., & Smales, A. (2014, February). The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working, Edinburgh
This presentation outlines the changing architecture of business systems, and with the increasing use of Cloud-based systems. It outlines some of the key risks around using mo...
Buchanan, W. J. (2014, January). The New Enlightenment in Scotland. Paper presented at Secure Scotland, Royal Exchange Square, Glasgow
Scotland, as a nation, has been built on enterprise and innovation, and, at one time, led the world in terms of enlightenment for its scientific and cultural approach. This pr...
Buchanan, W. J. (2014, January). The future of computer science education and observations from on-line learning. Paper presented at Higher Computing Science National Qualifications Support, Edinburgh
This session will look at the opportunities at the present time and in the future for Computing, and provide key pointer to the skills that are required to undertake a career ...
The Scottish Informatics & Computer Science Alliance
The usage of encryption keys is an important aspect in preserving privacy in communications. Increasingly these communications are protected using SSL/TLS methods. Along with this, there is a general ...
ENU Development Trust
This project is intended to seek in-depth understanding of the new promising decentralised machine learning scheme, namely federated learning, and develop a proof-of-concept algorithm-independent unle...
Scottish Funding Council
This project aims to investigate the integration of a cipher policy for the protection of data, and how these can be applied into a cloud-based infrastructure. A key focus for the implementation will ...
Lecturer in Cybersecurity and Digital Forensics
Manager, The Cyber Academy
Buchanan, W. J., & Smales, A. (2013, September). Cyber risk and opportunities in the Cloud. Paper presented at Cloud Security Congress 2013, Edinburgh
This presentation outlines some of the key risks and opportunities in the Cloud.
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April). A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013, European Commission, Brussels
At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main component...
Tan, Z. (2013, March). Generation of Network Behaviour Descriptions Using MCA Based on TAM. Paper presented at Kaspersky Lab's 2013 Annual Student Cyber Security Conference, Singapore
In this paper, a multivariate correlation analysis technique based on triangle area map is introduced. The technique is applied for network traffic characterization and provid...
Buchanan, W. J. (2013, March). The challenges of Big Data: future risks, governance and trust. Paper presented at The Future of Cyber Security 2013, London, UK
The emphasis in computer security is moving from end point security towards data controls, and this is becoming an increasing threat as we move into an era build around Big Da...
Buchanan, W. J., & Smales, A. (2013, January). Public perceptions in health care security. Paper presented at Health Informatics 2013, Heriot-Watt University, Edinburgh
Over the past few years many industries have been revolutionized by the application of Information Technology, in fact, we are now moving from an Industrial Age into an Inform...
Ambusaidi, M., Lu, L. F., He, X., Tan, Z., Jamdagni, A., & Nanda, P. (2012, November). A nonlinear correlation measure for Intrusion Detection. Paper presented at The 7th International Conference on Frontier of Computer Science and Technology (FCST-12)
The popularity of using internet contains some risks of network attacks. It has attracted the attention of many researchers to overcome this problem. One of the effective ways...
Bagley, R., Ferguson, R. I. & Leimich, P. (2012, September). On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space. Paper presented at CFET (Cyberforensics in Education and Training ), Canterbury Christ Church University, Canterbury
A technique and supporting tool for the recovery of browsing activity (both currently stored and deleted) from the Firefox web-browser is presented. The approach is based upon...
Lo, O., Fan, L., Buchanan, W. J., Thuemmler, C., & Lawson, A. (2012, June). Towards simulation of patient data for evaluation of E-health platform and services. Paper presented at 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool
This paper presents the design and implementation of the Patient Simulator, a software application used for the simulation of patient data. The simulator aims to evaluate e- H...
Buchanan, W. J. (2012, June). Training the next generation
This presentation outlines how cloud infrastructures could be used to deliver the in-depth skills required for a cyber professional.
Buchanan, W. J. (2012, June). Innovation in cloud environments. Paper presented at Future of Technology, Royal Society of Edinburgh
This presentation outlines the future of technology.
Buchanan, W. J., Uthmani, O., Lewis, R., Steyven, A., Fan, L., Thuemmler, C., …Lawson, A. (2012, June). Information sharing around child protection. Paper presented at Information Sharing in the Public Sector, Edinburgh
Background This presentation focuses on creating a scaleable, robust and secure information architecture for social and health care. At its core is the sa.FIRE (Secure Analysi...
Buchanan, W. J. (2012, May). Education & training for future threats. Paper presented at ITEC 2012, London
This presentation gives an outline of the aspects for virtualised training for security and cybercrime.
A project to provide decentralised identity for meeting KYC & AML requirements in the property industry.
This project will use steganography technology and shared secrets to improve the usability of the process of recovering cryptocurrency/distributed ledger wallet. It will do so by encoding parts of the...
This will investigate the feasibility of incentivising environmentally friendly behaviours through rewards given in tokens as well as IoT wearables to discover this behaviour and reward automatically.
Digital Health Institute
This project will investigate existing consumer tech, IOT and connectivity capabilities for simulation activities.
Napier and DHI will explore a range of technologies that can connect to DHI’s simul...
This project will focus on the building of a food provenance platform based on distributed ledger technologies
This focuses on the use of distributed ledger technologies to manage both compliance events such as signing off on work and also document management
In a recent report by International Information System Security Certification Consortium (ISC)2, it is estimated there will be a global shortfall of 1.5 million cybersecurity professionals by 2019, so...
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project.
Trisent’s core technology is called the Personal Context Management System (PCM...
Centre for Sensor and Imaging Systems
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
This is a Data Labs project which will investigate Blockchain technology - with Spiritus, the project will be ground-breaking in the implementation of a private blockchain within a large-scale healthc...
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...
Triage of large capacity digital devices
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
The concept of context-awareness is widely used in mobile and pervasive computing t...
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...
17 June 2019
Basil Manoussos, Manager of The Cyber Academy delivers keynote presentation at the Annual Conference of the Scottish Paralegal Association in Glasgow, titled "Cyber threats to law firms: Do you want ...
17 April 2019
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.
10 October 2018
Big Data in Cyber Security Conference held at Craiglockhart
30 May 2018
Official launch of SOCLAB, the new SOC facility in Merchiston Campus
10 April 2018
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...
12 December 2017
Dr. Zhiyuan Tan's research work entitled "Building an intrusion detection system using a filter-based feature selection algorithm" has been awarded by the The Research Council of the Sultanate of Oman...
12 November 2017
In an interview with Inspired Edinburgh in The Victorian Townhouse, Professor Bill Buchanan outlined his career and his university, along with his love of his home city, cryptography and innovation. T...
22 August 2017
Zonefox, a spin-out of The Cyber Academy within the School of Computing at Edinburgh Napier University, officially launched their move into new offices in Edinburgh. They have moved from CodeBase into...
21 August 2017
The International Journal of Computer Sciences and its Applications (IJCSA) is an international online open access journal which is dedicated to quarterly publishing high-quality papers that describe ...
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee at the Scottish Parliament on Cyber Security risks within Health Care in Scotland.
19 June 2017
ICSA DVF Professor Nasser Kehtarnavaz will be speaking about “Real-Time Human Action Recognition via Simultaneous Utilization of Depth Images and Inertial Signals” on Monday 19 June at 10am at Edinbur...
31 May 2017
Prof Bill Buchanan, who leads The Cyber Academy at Edinburgh Napier University, has been invited as a witness at the Health and Sport Committee within the Scottish Parliament on Tuesday 20 June 2017. ...
30 May 2017
Professor Bill Buchanan, an international expert in Cyber Security, appeared on a wide range of media events related to the ransomware attack (WannaCry).
19 May 2017
The Cyber Academy and MBM Commercial hosted a highly successful conference event with over 120 delegates which outlined some of the current issues of law and cyber security.
16 May 2017
Edinburgh Napier University - Craiglockhart Campus
3 June 2019 - 4 June 2019
University of Surrey, Guilford
14 May 2019
14:00 in CoRe44, room C44, Merchiston Campus
5 June 2018
Edinburgh Napier University, Craiglockhart Campus
29 May 2018 - 30 May 2018
Core44, room C44, Merchiston campus
23 November 2016
Monday 11 April 12.00 - 15.00pm
10 April 2016
17 February 2016