Search for a surname in the box below and then click "Search" to search for Staff.
Lecturer in Cybersecurity and Digital Forensics
Leimich, P., Ferguson, I., & Coull, N. (2014, November). From crime to court - an experience report of a digital forensics group project module. Paper presented at HEA Teaching Computer Forensics Workshop, Sunderland, UK
This paper discusses the large-scale group project undertaken by BSc Hons Digital Forensics
students at Abertay University in their penultimate year. The philosophy of the pro...
Findlay, C., & Leimich, P. (2014, July). An assessment of data leakage in Firefox under different conditions. Paper presented at CFET 2014: 7th International Conference on Cybercrime Forensics Education & Training, Christ Church,
Data leakage is a serious issue and can result in the loss of sensitive data,
compromising user accounts and details, potentially affecting millions of internet
users. This pa...
Comer, S., & Leimich, P. (2014, July). A Comparison of Geo-tagging in Mobile Internet Browsing Applications on iOS and Android. Paper presented at CFET 2014: 7th International Conference on Cybercrime Forensics Education & Training, Christ Church,
Nowadays there is almost no crime committed without a trace of digital evidence,
and since the advanced functionality of mobile devices today can be exploited to
assist in cri...
Bagley, R., Ferguson, R. I. & Leimich, P. (2012, September). On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space. Paper presented at CFET (Cyberforensics in Education and Training ), Canterbury Christ Church University, Canterbury
A technique and supporting tool for the recovery of browsing activity (both currently stored and deleted) from the Firefox web-browser is presented. The approach is based upon...
Muir, M., Leimich, P., & Buchanan, W. J. (2019). A Forensic Audit of the Tor Browser Bundle. Digital Investigation, 29, 118-128. https://doi.org/10.1016/j.diin.2019.03.009
The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protoc...
McKeown, S., Russell, G., & Leimich, P. (2018). Fingerprinting JPEGs With Optimised Huffman Tables. Journal of Digital Forensics, Security and Law, 13(2), https://doi.org/10.15394/jdfsl.2018.1451
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...
Leimich, P., Harrison, J., & Buchanan, W. J. (2016). A RAM triage methodology for Hadoop HDFS forensics. Digital Investigation, 18, 96-109. https://doi.org/10.1016/j.diin.2016.07.003
This paper discusses the challenges of performing a forensic investigation against a multi-node Hadoop cluster and proposes a methodology for examiners to use in such situatio...
McKeown, S., Russell, G., & Leimich, P. (2018). Sub-file Hashing Strategies for Fast Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)https://doi.org/10.1109/CyberSecPODS.2018.8560680
Traditional digital forensics processes do not scale well with the huge quantities of data present in a modern investigation, resulting in large investigative backlogs for man...
McKeown, S., Russell, G., & Leimich, P. (2018). Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)https://doi.org/10.1109/CyberSecPODS.2018.8560671
Cloud based storage is increasing in popularity, with
large volumes of data being stored remotely. Digital forensics
investigators examining such systems remotely are limited ...
McKeown, S., Russell, G., & Leimich, P. (2017). Fast Filtering of Known PNG Files Using Early File Features. In Proceedings of the Conference on Digital Forensics, Security and Law
Leimich, P. & Bhogal, J. (2015). Editorial: TLAD 2015. In Proceedings TLAD 2015. 13th International Workshop on the Teaching, Learning and Assessment of DatabasesISBN 978 - 1 - 904839 - 79 - 8
No abstract available.
Leimich, P. & Monger, A. (2014). Editorial: TLAD 2014. In Proceedings TLAD 2014. 12th International Workshop on the Teaching, Learning and Assessment of DatabasesISBN 978-1-907207-51-8
No abstract avialable.
Leimich, P. & Nelson, D. (2013). Editorial: TLAD 2013. In Proceedings TLAD 2013. 11th International Workshop on Teaching, Learning and Assessment of DatabasesISBN 978-1-907207-87-7
Paterson, J., Wilson, J. N., & Leimich, P. (2012). Uses of Peer Assessment in Database Teaching and Learning. In Data Security and Security Data, 135-146. BMC. https://doi.org/10.1007/978-3-642-25704-9_17
This discussion paper introduces three very different methods and contexts for the use of peer assessment in introductory database classes, each of which is supported by diffe...
Leimich, P. & Byrne, B. (2012). Editorial: TLAD 2012. In Proceedings TLAD 2012. 10th International Workshop on Teaching, Learning and Assessment of DatabasesISBN 978-1-907207-57-0
Researchers, including Dr Petra Leimich, Prof Bill Buchanan and Josh Harrison, in The Cyber Academy at Edinburgh Napier, have created a new way of analysing the traces of evidence left in the memory o...
4 August 2016
FBI to present on Big Data in Cyber Security at International Conference
31 March 2016
14:00 in CoRe44, room C44, Merchiston Campus
5 June 2018