Search for a surname in the box below and then click "Search" to search for Staff.
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November). Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based
Information Rights Management (IRM) model extension with
enhanced accountability for both a sticky policy and an attached
data. This wor...
Buchanan, W. J. (2013, January). Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.
Buchanan, W. J. (2011). Advanced security and network forensics: Introduction. Edinburgh Napier University
1.3 Security Taxonomy
Buchanan, W. J. (2011). Advanced security and network forensics: obfuscation and data hiding. Edinburgh Napier University
4 DATA HIDING AND OBFUSCATION
4.3 Obfuscation using Encryption
Private-key data hiding
Public-key data hiding
Buchanan, W. J. (2011). Advanced security and network forensics: network forensics. Edinburgh Napier University
3 NETWORK FORENSICS
3.3 The key protocols
3.4 Ethernet, IP and TCP headers
3.5 TCP connection
3.8 Application Layer Ana...
Buchanan, W. J. (2011). Advanced security and network forensics: web Infrastructures. Edinburgh Napier University
5 WEB INFRASTRUCTURES
5.3 Identity 2.0
5.4 SOAP over HTTP
5.6 Authentication Infrastructures
5.7 802.1x Authentication ...
Buchanan, W. J. (2009). AES Encryption and Decryption in Microsoft .NET
This paper outlines the usage of AES in Microsoft .NET. It provides a basic overview of the AES method, along with a review of other popular encryption methods and some sample...
Buchanan, W. J. (2009). 3DES Encryption and Decryption in Microsoft .NET
This paper outlines the usage of 3DES in Microsoft .NET. It provides a basic overview of the 3-DES method, along with a review of other popular encryption methods and some sam...
Buchanan, W. J. Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing. (Thesis)
The 3D Finite-Difference Time-Domain (FDTD) method simulates structures in the time-domain using a direct form of Maxwell’s curl equations. This method has the advantage over ...
Buchanan, W. J., Smales, A., Lawson, A., & Chute, C. (2019, November). Machine Learning for Health and Social Care Demographics in Scotland. Paper presented at HEALTHINFO 2019, Valencia, Spain
This paper outlines an extensive study of applying machine learning to the analysis of publicly available health and social care data within Scotland, with a focus on learning...
Molla, R., Romdhani, I., & Buchanan, B. (2016, November). 3LS-authenticate: an e-commerce challenge-response mobile application. Paper presented at 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2016, Agadir, Morocco
The rapid growth of e-commerce has been associated with a number of security concerns, which challenge its continual success. In view of this, an investigative study determini...
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September). Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...
Buchanan, W. J. (2015, June). Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh
Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June). Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...
Buchanan, W. J., & Smales, A. (2015, April). New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). Paper presented at Cybercrime and Cyberterrorism - the EU Research roadmap, Montpellier, France
DFET creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the ...