Search for a surname in the box below and then click "Search" to search for Staff.
Zero Hour Lecturer
Senior Research Fellow
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November). Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based
Information Rights Management (IRM) model extension with
enhanced accountability for both a sticky policy and an attached
data. This wor...
Thuemmler, C. (2017, May). 5G - What architecture to serve vertical industry. Presented at IEEE ICC 2017, Paris
5G offers the promise to dynamically satisfy a multiplicity of concurrent requirements originating from various business models of vertical industries. The 5G PPP has publishe...
Thuemmler, C. & Jefefries, N. (2016, December). 5G as an enabler for Medical IOT - 5GMIOT. Presented at IEEE Globecom 2016, Washington DC
Short Power Point presentation on 5G as enabler for Medical IoT – 5GMIOT Standards, policies and strategies for social technological alignment of 5G technology
The Scottish Informatics & Computer Science Alliance
1st event: a speaker for the Cyber Security Conference (Critical Infrastructure Protection) (200 words):
Industrial Control Systems(ICS) are widely used in critical infrastructure such as nuclear pow...
Digital Health Institute
This project will investigate existing consumer tech, IOT and connectivity capabilities for simulation activities.
Napier and DHI will explore a range of technologies that can connect to DHI’s simul...
Scottish Funding Council
This project will focus on the building of a food provenance platform based on distributed ledger technologies
Lecturer of Cybersecurity, Encryption and Networks
Zero Hour Lecturer
Lecturer in Cybersecurity and Digital Forensics
Buchanan, W. J. (2015, April). Identifying areas of vulnerability. Presented at Scot-secure 2015, Dynamic Earth, Edinburgh
Using penetration testing to highlight areas of weakness with practical steps for improving the security of your organisation.
Buchanan, W. J. (2015, April). Promoting passion in an innovation and enterprise culture. Presented at Exploring 21st Century Organisational Culture: inclusivity, agility and innovation, Edinburgh
This presentation will show how organisations can encourage a culture of innovation and enterprise, including showcasing examples of good practice and how management styles ca...
Buchanan, W. J. Creating engaging and stimulating Web based material. Presented at LTT 2014, Holyrood, Edinburgh
This presentation outlines the collaboration between Edinburgh Napier University and Bright Red Publishing
Buchanan, W. J. Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.
Buchanan, W. J. Discrete Logarithms within Computer and Network Security. Presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium, International Centre for Mathematical Sciences, University of Edinburgh
As we move into an Information Age, the requirement for computer security increases by the day, only in terms of privacy, but also in terms of proving identity and in verifyin...
Buchanan, W. J. & Smales, A. e-Health in the Cloud. Presented at Future of e-Health, Hollyrood, Edinburgh. (Unpublished)
This presentation outlines how risk assessors can be used to create holistic care. A key focus is on the security infrastructure and in new risk assessors such as the frailty ...
Thuemmler, C. (2014). Shock Index demonstrator
This is an outcome from the FI-STAR project and a contribution to the FIWARE catalogue.
Buchanan, W. J. (2011). Advanced security and network forensics: Introduction. Edinburgh Napier University
1.3 Security Taxonomy
Buchanan, W. J. (2011). Advanced security and network forensics: obfuscation and data hiding. Edinburgh Napier University
4 DATA HIDING AND OBFUSCATION
4.3 Obfuscation using Encryption
Private-key data hiding
Public-key data hiding
Buchanan, W. J. (2011). Advanced security and network forensics: network forensics. Edinburgh Napier University
3 NETWORK FORENSICS
3.3 The key protocols
3.4 Ethernet, IP and TCP headers
3.5 TCP connection
3.8 Application Layer Ana...
Buchanan, W. J. (2011). Advanced security and network forensics: web Infrastructures. Edinburgh Napier University
5 WEB INFRASTRUCTURES
5.3 Identity 2.0
5.4 SOAP over HTTP
5.6 Authentication Infrastructures
5.7 802.1x Authentication ...
Ghaleb, B., Al-Dubai, A., Romdhani, I., & Qasem, M. (2018). Drizzle Algorithm. USA: IETF
Trickle algorithm used in RPL routing protocol suffers from some issues related to power, network convergence time and overhead and
load-distribution. To optimize this al...
This focuses on the use of distributed ledger technologies to manage both compliance events such as signing off on work and also document management
In a recent report by International Information System Security Certification Consortium (ISC)2, it is estimated there will be a global shortfall of 1.5 million cybersecurity professionals by 2019, so...
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project.
Trisent’s core technology is called the Personal Context Management System (PCM...
Centre for Sensor and Imaging Systems
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
This project aims to extend the existing work with the e-Frail project, and integrate a range of NHS-sourced assessors with care giver and open source gathered assessors, in order to define a weighted...
This is a Data Labs project which will investigate Blockchain technology - with Spiritus, the project will be ground-breaking in the implementation of a private blockchain within a large-scale healthc...
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Peter Aaby - PhD sponsorship
The focus of the project is to use the new breed of motion sensors which can fully capture the movement of hands and fingers, and use this to create an early stage product to demonstrate how precise h...
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas. It is a forum for early researchers to pres...
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for law enforcement agencies, impeding...
Triage of large capacity digital devices
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
"The development of science and technology are increasingly affecting and changing the nature of processes in...
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.
10 October 2018
Big Data in Cyber Security Conference held at Craiglockhart
30 May 2018
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...
12 December 2017
Dr. Zhiyuan Tan's research work entitled "Building an intrusion detection system using a filter-based feature selection algorithm" has been awarded by the The Research Council of the Sultanate of Oman...
12 November 2017
In an interview with Inspired Edinburgh in The Victorian Townhouse, Professor Bill Buchanan outlined his career and his university, along with his love of his home city, cryptography and innovation. T...
22 August 2017
Zonefox, a spin-out of The Cyber Academy within the School of Computing at Edinburgh Napier University, officially launched their move into new offices in Edinburgh. They have moved from CodeBase into...
21 August 2017
The International Journal of Computer Sciences and its Applications (IJCSA) is an international online open access journal which is dedicated to quarterly publishing high-quality papers that describe ...
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee at the Scottish Parliament on Cyber Security risks within Health Care in Scotland.
19 June 2017
ICSA DVF Professor Nasser Kehtarnavaz will be speaking about “Real-Time Human Action Recognition via Simultaneous Utilization of Depth Images and Inertial Signals” on Monday 19 June at 10am at Edinbur...
31 May 2017
Prof Bill Buchanan, who leads The Cyber Academy at Edinburgh Napier University, has been invited as a witness at the Health and Sport Committee within the Scottish Parliament on Tuesday 20 June 2017. ...
30 May 2017
Professor Bill Buchanan, an international expert in Cyber Security, appeared on a wide range of media events related to the ransomware attack (WannaCry).
19 May 2017
The Cyber Academy and MBM Commercial hosted a highly successful conference event with over 120 delegates which outlined some of the current issues of law and cyber security.
16 May 2017
A partnership between Hutchinson Networks and The Cyber Academy at Edinburgh has been showcased in the application of SDN (Software Defined Networks) into health and social care, and in innovative Cyb...
2 February 2017
A new collaboration between Edinburgh Napier and global telecommunications company Huawei Technologies is set to aid the University in developing talent for future careers in Information and Communica...
1 February 2017
The Cyber Academy are to host the 2nd International Conference on Big Data in Cyber Security on 10 May 2017 and this time the event will scale around the World, with an international collaboration acr...
19 December 2016
14:00 in CoRe44, room C44, Merchiston Campus
5 June 2018
Edinburgh Napier University, Craiglockhart Campus
29 May 2018 - 30 May 2018
Core 44, Room C44, Merchiston Campus
26 September 2017
Core44, room C44, Merchiston campus
23 November 2016
H5 & H9 Merchiston Campus
10 May 2016
Monday 11 April 12.00 - 15.00pm
10 April 2016
4 April 2016 13.00 - 16.00 pm
3 April 2016
17 February 2016
18 January 2016