Search for a surname in the box below and then click "Search" to search for Staff.
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November). Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based
Information Rights Management (IRM) model extension with
enhanced accountability for both a sticky policy and an attached
data. This wor...
Buchanan, W. J. (2015, April). Identifying areas of vulnerability. Presented at Scot-secure 2015, Dynamic Earth, Edinburgh
Using penetration testing to highlight areas of weakness with practical steps for improving the security of your organisation.
Buchanan, W. J. (2015, April). Promoting passion in an innovation and enterprise culture. Presented at Exploring 21st Century Organisational Culture: inclusivity, agility and innovation, Edinburgh
This presentation will show how organisations can encourage a culture of innovation and enterprise, including showcasing examples of good practice and how management styles ca...
The Scottish Informatics & Computer Science Alliance
The usage of encryption keys is an important aspect in preserving privacy in communications. Increasingly these communications are protected using SSL/TLS methods. Along with this, there is a general ...
Scottish Funding Council
This project aims to investigate the integration of a cipher policy for the protection of data, and how these can be applied into a cloud-based infrastructure. A key focus for the implementation will ...
A project to provide decentralised identity for meeting KYC & AML requirements in the property industry.
Buchanan, W. J. (2014, April). Discrete Logarithms within Computer and Network Security. Presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium, International Centre for Mathematical Sciences, University of Edinburgh
As we move into an Information Age, the requirement for computer security increases by the day, only in terms of privacy, but also in terms of proving identity and in verifyin...
Buchanan, W. J. (2014, January). Creating engaging and stimulating Web based material. Presented at LTT 2014, Holyrood, Edinburgh
This presentation outlines the collaboration between Edinburgh Napier University and Bright Red Publishing
Buchanan, W. J., & Smales, A. (2013, January). e-Health in the Cloud. Presented at Future of e-Health, Hollyrood, Edinburgh
This presentation outlines how risk assessors can be used to create holistic care. A key focus is on the security infrastructure and in new risk assessors such as the frailty ...
Buchanan, W. J. (2013, January). Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.
Buchanan, W. J. (2011). Advanced security and network forensics: Introduction. Edinburgh Napier University
1.3 Security Taxonomy
Buchanan, W. J. (2011). Advanced security and network forensics: obfuscation and data hiding. Edinburgh Napier University
4 DATA HIDING AND OBFUSCATION
4.3 Obfuscation using Encryption
Private-key data hiding
Public-key data hiding
Buchanan, W. J. (2011). Advanced security and network forensics: network forensics. Edinburgh Napier University
3 NETWORK FORENSICS
3.3 The key protocols
3.4 Ethernet, IP and TCP headers
3.5 TCP connection
3.8 Application Layer Ana...
Buchanan, W. J. (2011). Advanced security and network forensics: web Infrastructures. Edinburgh Napier University
5 WEB INFRASTRUCTURES
5.3 Identity 2.0
5.4 SOAP over HTTP
5.6 Authentication Infrastructures
5.7 802.1x Authentication ...
Uwagbole, S. A pattern-driven corpus to predictive analytics in mitigating SQL injection attack. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/1538260
The back-end database provides accessible and structured storage for each web application’s big data internet web traffic exchanges stemming from cloud-hosted web applications...
Thuemmler, C. & Buchanan, B. (2010). Review of Coding for Success implementation. London: UK Department of Health
Coding for Success was published in 2007 and described how bar coding and similar technologies can be used to improve patient safety, reduce costs and improve efficiency. This...
Thuemmler, C. & Buchanan, W. J. (2010). Review of "Coding for Success" implementation
Buchanan, W. J. (2009). AES Encryption and Decryption in Microsoft .NET
This paper outlines the usage of AES in Microsoft .NET. It provides a basic overview of the AES method, along with a review of other popular encryption methods and some sample...
This project will use steganography technology and shared secrets to improve the usability of the process of recovering cryptocurrency/distributed ledger wallet. It will do so by encoding parts of the...
This will investigate the feasibility of incentivising environmentally friendly behaviours through rewards given in tokens as well as IoT wearables to discover this behaviour and reward automatically.
Digital Health Institute
This project will investigate existing consumer tech, IOT and connectivity capabilities for simulation activities.
Napier and DHI will explore a range of technologies that can connect to DHI’s simul...
This project will focus on the building of a food provenance platform based on distributed ledger technologies
This focuses on the use of distributed ledger technologies to manage both compliance events such as signing off on work and also document management
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project.
Trisent’s core technology is called the Personal Context Management System (PCM...
Centre for Sensor and Imaging Systems
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
This project aims to extend the existing work with the e-Frail project, and integrate a range of NHS-sourced assessors with care giver and open source gathered assessors, in order to define a weighted...
This is a Data Labs project which will investigate Blockchain technology - with Spiritus, the project will be ground-breaking in the implementation of a private blockchain within a large-scale healthc...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Peter Aaby - PhD sponsorship
Mobile ad-hoc networking (MANET) technology has been a major avenue for many wireless and mobile networke...
This thesis describes the development of the HI-risk method to assess socio-tec...
The field of coordinated and multiple views (CMVs) has been for over a decade, a promising technique for enhancing data ...
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
The specification of Internet protocol stack was developed to be as universal as possible, providing various optio...
The exchange of information between the police and community partner organisations forms a core aspect of...
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.
10 October 2018
In an interview with Inspired Edinburgh in The Victorian Townhouse, Professor Bill Buchanan outlined his career and his university, along with his love of his home city, cryptography and innovation. T...
22 August 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee at the Scottish Parliament on Cyber Security risks within Health Care in Scotland.
19 June 2017
ICSA DVF Professor Nasser Kehtarnavaz will be speaking about “Real-Time Human Action Recognition via Simultaneous Utilization of Depth Images and Inertial Signals” on Monday 19 June at 10am at Edinbur...
31 May 2017
Prof Bill Buchanan, who leads The Cyber Academy at Edinburgh Napier University, has been invited as a witness at the Health and Sport Committee within the Scottish Parliament on Tuesday 20 June 2017. ...
30 May 2017
A partnership between Hutchinson Networks and The Cyber Academy at Edinburgh has been showcased in the application of SDN (Software Defined Networks) into health and social care, and in innovative Cyb...
2 February 2017
Edinburgh is becoming one of the best cities in the World to be into tech, and this week one of Edinburgh Napier University's spin-outs - Cyan Forensics - represents the booming tech industry in the c...
3 December 2016
Researchers, including Dr Petra Leimich, Prof Bill Buchanan and Josh Harrison, in The Cyber Academy at Edinburgh Napier, have created a new way of analysing the traces of evidence left in the memory o...
4 August 2016
Exciting New Collaboration with Hutchinson Networks Aims To Build A Virtual Bank For Advanced Security Operations Training
29 June 2016
FBI to present on Big Data in Cyber Security at International Conference
31 March 2016
Massive Crypto Flaw Discovered
Two out of Four Predictions for the Next Skyscanner Are Spin-outs from Edinburgh Napier
5 February 2016
Monday 11 April 12.00 - 15.00pm
10 April 2016
4 April 2016 13.00 - 16.00 pm
3 April 2016
17 February 2016