Search for a surname in the box below and then click "Search" to search for Staff.
Buchanan, W. J. (2011). Advanced security and network forensics: Introduction. Edinburgh Napier University
1.3 Security Taxonomy
Buchanan, W. J. (2009). AES Encryption and Decryption in Microsoft .NET
This paper outlines the usage of AES in Microsoft .NET. It provides a basic overview of the AES method, along with a review of other popular encryption methods and some sample...
Buchanan, W. J. (2009). 3DES Encryption and Decryption in Microsoft .NET
This paper outlines the usage of 3DES in Microsoft .NET. It provides a basic overview of the 3-DES method, along with a review of other popular encryption methods and some sam...
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September). Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...
Buchanan, W. J. (2015, June). Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh
Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June). Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...
Buchanan, W. J., & Smales, A. (2015, April). New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). Paper presented at Cybercrime and Cyberterrorism - the EU Research roadmap, Montpellier, France
DFET creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the ...
Buchanan, W. J. (2015, February). It's all hackable. Paper presented at SBRC Insider Threat Conference 2015, RBS, Gogarburn
Buchanan, W. J. (2014, September). Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities. Paper presented at 7th International Conference on Security of Information and Networks (SIN 2014), Glasgow
This presentation will outline some new research related to the Heartbleed vulnerability, and cover the full technical details of the threat, with a live demo. Along with it w...
Buchanan, W. J., & Smales, A. (2013, September). Cyber risk and opportunities in the Cloud. Paper presented at Cloud Security Congress 2013, Edinburgh
This presentation outlines some of the key risks and opportunities in the Cloud.
Buchanan, W. J., & Smales, A. (2013, January). Public perceptions in health care security. Paper presented at Health Informatics 2013, Heriot-Watt University, Edinburgh
Over the past few years many industries have been revolutionized by the application of Information Technology, in fact, we are now moving from an Industrial Age into an Inform...
Buchanan, W. J. (2012, June). Training the next generation
This presentation outlines how cloud infrastructures could be used to deliver the in-depth skills required for a cyber professional.
Buchanan, W. J. (2012, May). Education & training for future threats. Paper presented at ITEC 2012, London
This presentation gives an outline of the aspects for virtualised training for security and cybercrime.
Buchanan, W. J., Fan, L., Ekonomou, E., & Lo, O. (2012, May). Cloud4Health. Paper presented at Symposium on the Future of e-Health, Edinburgh Napier University, Edinburgh
The cloud4health platform focuses on creating a next generation infrastructure which aims to integrate assisted living with primary and secondary health care, in order to redu...
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., & Thuemmler, C. (2012, May). Integrating assisted living with primary and secondary health care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing, Edinburgh
This presentation outlines the Cloud4Health platform.