Search for a surname in the box below and then click "Search" to search for Staff.
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November). Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based
Information Rights Management (IRM) model extension with
enhanced accountability for both a sticky policy and an attached
data. This wor...
Buchanan, W. J. (2014, April). Discrete Logarithms within Computer and Network Security. Presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium, International Centre for Mathematical Sciences, University of Edinburgh
As we move into an Information Age, the requirement for computer security increases by the day, only in terms of privacy, but also in terms of proving identity and in verifyin...
Buchanan, W. J. (2013, January). Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.
The Scottish Informatics & Computer Science Alliance
The usage of encryption keys is an important aspect in preserving privacy in communications. Increasingly these communications are protected using SSL/TLS methods. Along with this, there is a general ...
ENU Development Trust
This project is intended to seek in-depth understanding of the new promising decentralised machine learning scheme, namely federated learning, and develop a proof-of-concept algorithm-independent unle...
Scottish Funding Council
This project aims to investigate the integration of a cipher policy for the protection of data, and how these can be applied into a cloud-based infrastructure. A key focus for the implementation will ...
Lecturer in the School of Computing
Lecturer in Cybersecurity and Digital Forensics
Manager, The Cyber Academy
Buchanan, W. J. (2011). Advanced security and network forensics: Introduction. Edinburgh Napier University
1.3 Security Taxonomy
Spyra, G. K. Embedded document security using sticky policies and identity based encryption. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2090564
Data sharing domains have expanded over several, both trusted and insecure environments. At the same time, the data security boundaries have shrunk from internal network perim...
Arbelet, A. (2013). Garmin satnav forensic methods and artefacts: an exploratory study. (Thesis)
Over ten years ago, major changes in the Global Positioning System (GPS) technology led to its explosion in popularity. GPS devices are now ubiquitous, escorting their users e...
van Deursen Hazelhoff Roelfze, N. (2013). HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis)
This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations...
Kwecka, Z. (2011). Cryptographic privacy-preserving enhancement method for investigative data acquisition. (Thesis)
The current processes involved in the acquisition of investigative data from third parties, such as banks, Internet Service Providers (ISPs) and employers, by the public autho...
Buchanan, W. J. (2009). AES Encryption and Decryption in Microsoft .NET
This paper outlines the usage of AES in Microsoft .NET. It provides a basic overview of the AES method, along with a review of other popular encryption methods and some sample...
Buchanan, W. J. (2009). 3DES Encryption and Decryption in Microsoft .NET
This paper outlines the usage of 3DES in Microsoft .NET. It provides a basic overview of the 3-DES method, along with a review of other popular encryption methods and some sam...
Lo, O. (2009). Framework for network IDS evaluation. (Thesis)
There are a multitude of threats now faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data stealing and denial of service. As a first...
Saliou, L. Network Firewall Dynamic Performance Evaluation and Formalisation. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/2599
Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to...
Symes, M. (2008). Distributed healthcare framework using patient-centric role-based security modelling and workflow. (Dissertation)
Healthcare professionals are spending less time with patients and more time on administrative duties (Royal College of Nursing, 2008). This is due to a high bureaucratic deman...
Migas, N. (2007). MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks. (Thesis)
Recent advances in technology provided the ground for highly dynamic, mobile, infrastructure-less networks, namely, ad-hoc networks. Despite their enormous benefits, the full ...
Wang, H. (2000). Speed improvements for the RSA encryption method. (Thesis)
This thesis presents methods that can be used to improve the operation of the RSA encryption method. It shows the principles of encryption, and then expands this to give the o...
A project to provide decentralised identity for meeting KYC & AML requirements in the property industry.
This project will use steganography technology and shared secrets to improve the usability of the process of recovering cryptocurrency/distributed ledger wallet. It will do so by encoding parts of the...
This will investigate the feasibility of incentivising environmentally friendly behaviours through rewards given in tokens as well as IoT wearables to discover this behaviour and reward automatically.
Digital Health Institute
This project will investigate existing consumer tech, IOT and connectivity capabilities for simulation activities.
Napier and DHI will explore a range of technologies that can connect to DHI’s simul...
This project will focus on the building of a food provenance platform based on distributed ledger technologies
This focuses on the use of distributed ledger technologies to manage both compliance events such as signing off on work and also document management
In a recent report by International Information System Security Certification Consortium (ISC)2, it is estimated there will be a global shortfall of 1.5 million cybersecurity professionals by 2019, so...
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project.
Trisent’s core technology is called the Personal Context Management System (PCM...
Centre for Sensor and Imaging Systems
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
This is a Data Labs project which will investigate Blockchain technology - with Spiritus, the project will be ground-breaking in the implementation of a private blockchain within a large-scale healthc...
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
The concept of context-awareness is widely used in mobile and pervasive computing t...
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...
Triage of large capacity digital devices
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
A partnership between Hutchinson Networks and The Cyber Academy at Edinburgh has been showcased in the application of SDN (Software Defined Networks) into health and social care, and in innovative Cyb...
2 February 2017
The Cyber Academy are to host the 2nd International Conference on Big Data in Cyber Security on 10 May 2017 and this time the event will scale around the World, with an international collaboration acr...
19 December 2016
Edinburgh is becoming one of the best cities in the World to be into tech, and this week one of Edinburgh Napier University's spin-outs - Cyan Forensics - represents the booming tech industry in the c...
3 December 2016
Researchers, including Dr Petra Leimich, Prof Bill Buchanan and Josh Harrison, in The Cyber Academy at Edinburgh Napier, have created a new way of analysing the traces of evidence left in the memory o...
4 August 2016
Exciting New Collaboration with Hutchinson Networks Aims To Build A Virtual Bank For Advanced Security Operations Training
29 June 2016
FBI to present on Big Data in Cyber Security at International Conference
31 March 2016
Two out of Four Predictions for the Next Skyscanner Are Spin-outs from Edinburgh Napier
5 February 2016
Edinburgh Napier University - Craiglockhart Campus
3 June 2019 - 4 June 2019
University of Surrey, Guilford
14 May 2019
14:00 in CoRe44, room C44, Merchiston Campus
5 June 2018
Edinburgh Napier University, Craiglockhart Campus
29 May 2018 - 30 May 2018
Core44, room C44, Merchiston campus
23 November 2016
Monday 11 April 12.00 - 15.00pm
10 April 2016
17 February 2016