Staff directory

Search for a surname in the box below and then click "Search" to search for Staff. 

If you want to get in touch but you don’t know who to contact, fill in our enquiry form and one of our advisers will get back to you as soon as possible.

Date


People

Download Available

305 results

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure

Presentation / Conference
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October)
Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21), Online
Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine ...

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT

Journal Article
Almas Khan, M., Khan, M. A., Ullah Jan, S., Ahmad, J., Jamal, S. S., Shah, A. A., …Markakis, E. K. (2021)
A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors, 21(21), https://doi.org/10.3390/s21217016
A large number of smart devices in Internet of Things (IoT) environments communicate via different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely ...

GLASS: Towards Secure and Decentralized eGovernance Services using IPFS

Conference Proceeding
Chrysoulas, C., Thomson, A., Pitropakis, N., Papadopoulos, P., Lo, O., Buchanan, W. J., …Tsolis, D. (2021)
GLASS: Towards Secure and Decentralized eGovernance Services using IPFS
The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation, broa...

A Blockchain Framework in Post-Quantum Decentralization

Journal Article
Saha, R., Kumar, G., Devgun, T., Buchanan, W., Thomas, R., Alazab, M., …Rodrigues, J. (in press)
A Blockchain Framework in Post-Quantum Decentralization. IEEE Transactions on Services Computing, https://doi.org/10.1109/tsc.2021.3116896
The decentralization and transparency have provided wide acceptance of blockchain technology in various sectors through numerous applications. The claimed security services by...

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021)
A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. In 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS)https://doi.org/10.1109/coins51742.2021.9524172
Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical techno...

A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions

Journal Article
Saha, R., Geetha, G., Kumar, G., Buchanan, W. J., & Kim, T. (2021)
A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions. Applied Sciences, 11(17), https://doi.org/10.3390/app11178073
Cryptographic algorithms and functions should possess some of the important functional requirements such as: non-linearity, resiliency, propagation and immunity. Several previ...

LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments

Journal Article
Kim, T., Kumar, G., Saha, R., Buchanan, W. J., Devgun, T., & Thomas, R. (2021)
LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments. IEEE Access, 9, 100972-100980. https://doi.org/10.1109/access.2021.3097267
There is an increasing drive to provide improved levels of trust within an Internet-of-Things (IoTs) environments, but the devices and sensors used tend to be limited in their...

PyDentity: A playground for education and experimentation with the hyperledger verifiable information exchange platform

Journal Article
Abramson, W., Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (2021)
PyDentity: A playground for education and experimentation with the hyperledger verifiable information exchange platform. Software Impacts, 9, https://doi.org/10.1016/j.simpa.2021.100101
PyDentity lowers the entry barrier for parties interested in experimenting with the Hyperledger’s verifiable information exchange platform. It enables educators, developers an...

Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT

Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2021)
Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT. In 10th International Conference on Cryptography and Information Security (CRYPIS 2021) (185-205
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associ...

Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets

Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2021)
Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets. Computers and Security, 108, https://doi.org/10.1016/j.cose.2021.102377
The threat from ransomware continues to grow both in the number of affected victims as well as the cost incurred by the people and organisations impacted in a successful attac...
72 results

AI-based privacy-preserving biometric authentication with mass-market smart devices

2021 - 2024
Increasingly our identity is key to our online security, and where online services must integrate with these, in order to provide increased levels of trust. But there are now many constraints in how b...
Funder: Data Lab | Value: £65,756

Consensus-based Blockchain File Versioning

2021 - 2021
This project aim to version files and support roll-back on a ransomware infection.
Funder: Scottish Funding Council | Value: £5,000

COG-MHEAR: Towards cognitively-inspired, 5G-IoT enabled multi-modal hearing aids

2021 - 2025
Embracing the multimodal nature of speech presents both opportunities and challenges for hearing assistive technology: on the one hand there are opportunities for the design of new multimodal audio-vi...
Funder: Engineering and Physical Sciences Research Council | Value: £3,259,000

Cyber Hunt

2021 - 2024
Automated Cyberthreat Hunting and Cyber-relevant Incident Response for Critical Infrastructures. CyberHunt will develop highly innovative cybersecurity technologies that can sense, detect, analyse, d...
Funder: The Research Funding Council of Norway | Value: £37,500

Distributed single "sign-on-stack-on" e-Governance Paradigm based on a distributed peer-to-peer (P2P) file exchange network for security, transparency, cost effectiveness and trust - GLASS

2021 - 2023
The VISION of the GLASS is to develop a single-on distributed solution that is open source, efficient and inclusive, transparent, cross-border functional, user- friendly, end-to-end encrypted combinin...
Funder: European Commission | Value: £190,889

MEMCRYPT CyberASAP Phase 2

2020 - 2021
Ransomware is a form of malicious software that blocks user access to data by encrypting files. A user is then required to pay the attacker a sum of money to receive the encryption artefacts and start...
Funder: Innovate UK | Value: £52,310

Memcrypt (HGSP)

2020 - 2021
Memcrypt focuses on new ways of detecting the usage encryption keys, and has a focus on addressing ransomware.
Funder: Scottish Enterprise | Value: £109,883

OPTIMSING U>P Security and Anonymised Data Cloud Analysis for Duty of Care and Business Continuity

2020 - 2021
This project will build on the work that has already been done by U>P to develop the MVP (Minimum Viable Product), which delivers people analytics data through active data gathering, and the work d...
Funder: Scottish Funding Council | Value: £15,000

MemCrypt

2020 - 2020
At the core of the work is to addresses risks related to the leakage of encryption keys, and which can lead to data loss issues and trust breaches. Along with detecting keys in memory, the team has de...
Funder: Innovate UK | Value: £31,930

MemoryCrypt

2019 - 2020
The usage of encryption keys is an important aspect in preserving privacy in communications. Increasingly these communications are protected using SSL/TLS methods. Along with this, there is a general ...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £10,759

Date


School

People

Qualification level

41 results

A Systems Dynamic Exploration of The Influence of Multi-level End-Users' Emergent Actions and Managerial Intentionality on Information Systems Strategy Alignment in a Service Organisation using a Coevolutionary Perspective– A Critical Realist Case Study

2020 - date
Thoko Kachale | Director of Studies: Dr Wegene Demeke | Second Supervisor: Dr Christos Chrysoulas

Enhancement of identified effective ransomware detection techniques

2020 - date
Simon Davies | Director of Studies: Rich Macfarlane | Second Supervisor: Prof Bill Buchanan

Privacy-preserving systems around trust and identity

2019 - date
Mr. Pavlos Papadopoulos | Director of Studies: Dr Nick Pitropakis | Second Supervisor: Prof Bill Buchanan

Privacy-preserving architecture for self-sovereign identity

2018 - date
Mr Will Abramson | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Owen Lo

Lightweight Cryptography for IoT networks - electromagnetic side channel analysis

2018 - date
Eng. Nilupulee Gunathilake | Director of Studies: Dr Rameez Asif | Second Supervisor: Prof Ahmed Al-Dubai

Towards a Robust, Privacy-preserving preserving machine-learning framework

2018 - date
Adam Hall | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Nick Pitropakis

Behaviour profiling using Touch-based Behavioural Biometrics for Continuous Authentication Systems

2016 - date
Peter Aaby | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Ben Paechter

Investigations into decrypting live secure traffic in virtual environments

2016 - 2019
Dr Peter McLaren | Director of Studies: Dr Gordon Russell | Second Supervisor: Prof Bill Buchanan

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell
15 results

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Professor Opens Up on His Love of Edinburgh, Cryptography and Innovation

22 August 2017
In an interview with Inspired Edinburgh in The Victorian Townhouse, Professor Bill Buchanan outlined his career and his university, along with his love of his home city, cryptography and innovation. T...

Professor Gives Evidence on Cyber Security and Health Care at Scottish Parliament

19 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee at the Scottish Parliament on Cyber Security risks within Health Care in Scotland.

Distinguished Fellow To Talk on Real-Time Human Action Recognition

31 May 2017
ICSA DVF Professor Nasser Kehtarnavaz will be speaking about “Real-Time Human Action Recognition via Simultaneous Utilization of Depth Images and Inertial Signals” on Monday 19 June at 10am at Edinbur...

Professor Invited To Give Evidence at Scottish Parliament Committee on Cyber Attacks within Health Care

30 May 2017
Prof Bill Buchanan, who leads The Cyber Academy at Edinburgh Napier University, has been invited as a witness at the Health and Sport Committee within the Scottish Parliament on Tuesday 20 June 2017. ...

Hutchinson Networks Partnership Changing The World Through Innovation

2 February 2017
A partnership between Hutchinson Networks and The Cyber Academy at Edinburgh has been showcased in the application of SDN (Software Defined Networks) into health and social care, and in innovative Cyb...

Edinburgh Napier spin-out heads for London showcase

3 December 2016
Edinburgh is becoming one of the best cities in the World to be into tech, and this week one of Edinburgh Napier University's spin-outs - Cyan Forensics - represents the booming tech industry in the c...