Staff directory

Search for a surname in the box below and then click "Search" to search for Staff. 

If you want to get in touch but you don’t know who to contact, fill in our enquiry form and one of our advisers will get back to you as soon as possible.

Date


People

Download Available

Dewey Decimal

666 results

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.)
(2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for sing...

A forensic analysis of streaming platforms on Android OS

Journal Article
García Murias, J., Levick, D., & Mckeown, S. (in press)
A forensic analysis of streaming platforms on Android OS. Forensic Science International: Digital Investigation,
This work builds on existing research in streamed video reconstruction on the Android OS, which previously demonstrated that caching occurs in most cases for the Chrome and Fi...

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

Journal Article
Davies, S., Macfarlane, R., & Buchanan, W. (2022)
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. Entropy, 24(10), Article 1503. https://doi.org/10.3390/e24101503
Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by ...

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022)
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively...

Ontology-Based Linked Data to Support Decision Making within Universities

Journal Article
Ashour, G., Al-Dubai, A., Romdhani, I., & Alghazzawi, D. (2022)
Ontology-Based Linked Data to Support Decision Making within Universities. Mathematics, 10(17), Article 3148. https://doi.org/10.3390/math10173148
In recent years, educational institutions worked hard to automate their work using more trending technologies that prove the success in supporting decision-making processes. M...

Ensemble learning-based IDS for sensors telemetry data in IoT networks

Journal Article
Naz, N., Khan, M. A., Alsuhibany, S. A., Diyan, M., Tan, Z., Khan, M. A., & Ahmad, J. (2022)
Ensemble learning-based IDS for sensors telemetry data in IoT networks. Mathematical Biosciences and Engineering, 19(10), 10550-10580. https://doi.org/10.3934/mbe.2022493
The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT de...

A novel flow-vector generation approach for malicious traffic detection

Journal Article
Hou, J., Liu, F., Lu, H., Tan, Z., Zhuang, X., & Tian, Z. (2022)
A novel flow-vector generation approach for malicious traffic detection. Journal of Parallel and Distributed Computing, 169, 72-86. https://doi.org/10.1016/j.jpdc.2022.06.004
Malicious traffic detection is one of the most important parts of cyber security. The approaches of using the flow as the detection object are recognized as effective. Benefit...

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

Journal Article
Kumar, A., Saha, R., Conti, M., Kumar, G., Buchanan, W. J., & Kim, T. H. (2022)
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. Journal of Network and Computer Applications, 204, Article 103414. https://doi.org/10.1016/j.jnca.2022.103414
Internet of Thing (IoT) is one of the most influential technologies in the present time. People, processes, and things are connected with the Internet through IoT. With the in...

A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks

Journal Article
Alahmadi, H., Bouabdallah, F., & Al-Dubai, A. (2022)
A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks. Future Generation Computer Systems, 134, 287-302. https://doi.org/10.1016/j.future.2022.04.003
Long Range (LoRa) networks provide long range, cost-effective and energy-efficient communications by utilising the free unlicensed ISM band, which makes them appealing for Int...

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map

Journal Article
Alharbi, A. R., Ahmad, J., Arshad, Shaukat, S., Masood, F., Ghadi, Y. Y., …Buchanan, W. J. (2022)
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complexity, 2022, Article 7047282. https://doi.org/10.1155/2022/7047282
With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain...

Date


School

130 results

Smart Contract based Reward Scheme

2022 - 2023
Egg Lighting would like to explore the possibility of linking their company value to Smart Contracts via Blockchain. They would eventually like to give away 1/3 of their business (shares) to the gene...
Funder: Scottish Funding Council | Value: £5,000

LastingAsset: Crypto assets custodial solution

2022 - 2023
As the crypto asset market continues to grow, the role of custodians to maintain the safekeeping of crypto assets is becoming ever more important. So far, many institutional investors who manage large...
Funder: Innovate UK | Value: £59,958

TRUST AND PRIVACY PRESERVING COMPUTING PLATFORM FOR CROSSBORDER FEDERATION OF PERSONAL DATA

2022 - 2025
As we live in a data-driven era, the emergence of interdisciplinary, geographically dispersed, data repositories, is inevitable. The fact that these repositories do not necessarily abide with existing...
Funder: UK Research and Innovation | Value: £310,843

Behaviour profiling using Touch-based Behavioural Biometrics for Continuous Authentication Systems

2022 - 2022
Authenticating smartphone users from distinct behavioural biometric patterns provided through human interactions on touch screens would allow users to be continuously authenticated on their devices wh...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £923

TrueDeploy - CyberASAP Phase 1

2022 - 2022
The way in which we develop and supply secure, trusted software is broken. The dominance of open-source software and the interconnectedness of software between organisations has raised cybersecurity r...
Funder: Innovate UK | Value: £31,969

Divulging the Secrets of Artificial Intelligence

2022 - 2022
Digital Infrastructures are complex systems that are built upon computing and communication hardware, and whose resilience is undermined by the security of its hardware building blocks, which has not ...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £2,500

Security and Privacy in Vehicular Ad-hoc Networks

2022 - 2024
The great leap forward in wireless communications technology drives the recent advancements of Vehicular Ad hoc NETworks (VANETs). As a key part of the Intelligent Transportation Systems (ITS) framewo...
Funder: Royal Society | Value: £12,000

Scottish Gaelic Generation for Exhibitions

2022 - 2023
Developing resources and prototype systems for Natural Language Generation in Scottish Gaelic for cultural and artistic exhibits.
Funder: Arts & Humanities Research Council | Value: £5,000

Innovative Distributed Platform for Educational Content

2022 - 2022
This project aims to setup a dynamic sharing content platform for tutor led plans using Hyperledger Fabric and IPFS.
Funder: Scottish Funding Council | Value: £5,000

PlatfoRm OF policy Evaluation community for improvED EU policies and Better ACKnowledgement

2021 - 2025
The Action PROFEEDBACK aims to foster the networking of the policy evaluation community at EU-level, raise awareness on the importance of evaluation policy research and improve its impact on policy-ma...
Funder: European Commission

Date


School

Qualification level

17 results

Privacy-preserving systems around security, trust and identity

2019 - 2022
Dr Pavlos Papadopoulos | Director of Studies: Dr Nick Pitropakis | Second Supervisor: Prof Bill Buchanan

Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives

2019 - 2021
This work is concerned with the information practices associated with hyperlocal representation. The fin...
Dr Peter Cruickshank | Director of Studies: Prof Hazel Hall | Second Supervisor: Dr Kendall Richards

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - 2021
Dr Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Behaviour profiling using Touch-based Behavioural Biometrics for Continuous Authentication Systems

2016 - date
Peter Aaby | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Ben Paechter

Efficient algorithms for MAC layer duty cycling and frame delivery in wireless sensor network

2016 - 2021
Dr Craig Thomson | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Thomas Tan

Efficient routing primitives for low-power and lossy networks in internet of things

2015 - 2019
Dr Baraq Ghaleb | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Elias Ekonomou

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Reliable and energy efficient scheduling protocols for Wireless Body Area Networks (WBAN)

2014 - 2018
Miss Marwa Salayma | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

Load balancing and context aware enhancements for RPL routed Internet of Things

2013 - 2018
Mamoun Qasem | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani
28 results

Promising cyber security project supported by new Scottish Enterprise funding

20 September 2022
TrueDeploy, an exciting project from the School of Computing, Engineering & the Built Environment (SCEBE) at Edinburgh Napier University (ENU), has secured £199,952 in additional support from Scottish...

Double funding success for School of Computing

21 March 2022
Two projects from Edinburgh Napier’s acclaimed School of Computing have won funding from a programme which develops innovative cyber security ideas for the commercial market. TrueDeploy and Trustd ar...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

Dr. Zhiyuan Tan Invited to Deliver a Seminar on Internet of Things and Its Security at the Dongguan University of Technology, China, December 2017

12 December 2017
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...

Dr. Zhiyuan Tan Won The National Research Award 2017 from The Research Council of the Sultanate of Oman

12 November 2017
Dr. Zhiyuan Tan's research work entitled "Building an intrusion detection system using a filter-based feature selection algorithm" has been awarded by the The Research Council of the Sultanate of Oman...