Date


People

Download Available

336 results

A framework for live host-based Bitcoin wallet forensics and triage

Journal Article
Holmes, A., & Buchanan, W. J. (2023)
A framework for live host-based Bitcoin wallet forensics and triage. Forensic Science International: Digital Investigation, 44, Article 301486. https://doi.org/10.1016/j.fsidi.2022.301486
Organised crime and cybercriminals use Bitcoin, a popular cryptocurrency, to launder money and move it across borders with impunity. The UK and other countries have legislatio...

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

Journal Article
Davies, S., Macfarlane, R., & Buchanan, W. (2022)
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. Entropy, 24(10), Article 1503. https://doi.org/10.3390/e24101503
Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by ...

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022)
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively...

Ensemble learning-based IDS for sensors telemetry data in IoT networks

Journal Article
Naz, N., Khan, M. A., Alsuhibany, S. A., Diyan, M., Tan, Z., Khan, M. A., & Ahmad, J. (2022)
Ensemble learning-based IDS for sensors telemetry data in IoT networks. Mathematical Biosciences and Engineering, 19(10), 10550-10580. https://doi.org/10.3934/mbe.2022493
The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT de...

A novel flow-vector generation approach for malicious traffic detection

Journal Article
Hou, J., Liu, F., Lu, H., Tan, Z., Zhuang, X., & Tian, Z. (2022)
A novel flow-vector generation approach for malicious traffic detection. Journal of Parallel and Distributed Computing, 169, 72-86. https://doi.org/10.1016/j.jpdc.2022.06.004
Malicious traffic detection is one of the most important parts of cyber security. The approaches of using the flow as the detection object are recognized as effective. Benefit...

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

Journal Article
Kumar, A., Saha, R., Conti, M., Kumar, G., Buchanan, W. J., & Kim, T. H. (2022)
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. Journal of Network and Computer Applications, 204, Article 103414. https://doi.org/10.1016/j.jnca.2022.103414
Internet of Thing (IoT) is one of the most influential technologies in the present time. People, processes, and things are connected with the Internet through IoT. With the in...

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map

Journal Article
Alharbi, A. R., Ahmad, J., Arshad, Shaukat, S., Masood, F., Ghadi, Y. Y., …Buchanan, W. J. (2022)
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complexity, 2022, Article 7047282. https://doi.org/10.1155/2022/7047282
With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain...

Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT

Journal Article
Wang, F., Yang, S., Wang, C., Li, Q., Babaagba, K., & Tan, Z. (2022)
Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT. International Journal of Intelligent Systems, 37(10), 7058-7078. https://doi.org/10.1002/int.22871
Internet of Things (IoT) is fast growing. Non-PC devices under the umbrella of IoT have been increasingly applied in various fields and will soon account for a significant sha...

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022)
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291
E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evo...

PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching

Conference Proceeding
Abramson, W., Buchanan, W. J., Sayeed, S., Pitropakis, N., & Lo, O. (2022)
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. In 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699138
The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up wi...
68 results

The Online Pension Company Ltd

2011 - 2012
IIDI has been successful in obtaining funding for a new collaborative project with The Online Pension Company Ltd supported by the SFC Innovation Voucher Scheme.
Funder: Scottish Funding Council | Value: £5,000

Flexiant Ltd, Innovation voucher

2011 - 2012
This research project studies the feasibility of a Cloud-based platform which is used to evaluate the performance of digital forensics tools. Along with measuring key quality metrics, such as true-pos...
Funder: Scottish Funding Council | Value: £5,000

Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures

2011 - 2013
This project extends the e-Health Cloud-based Platform, and integrates with assisted living. The project integrates Edinburgh Napier University, Microsoft and HoIP, and has created a novel governance ...
Funder: Engineering and Physical Sciences Research Council | Value: £243,325

Data Capture and Auto Identification Reference

2009 - 2011
This project relates to the research collaboration between Edinburgh Napier University, CipherLab, Chelsea and Westminster Hospital, GS1 UK, Imperial College, and Kodit, and is funded through a resear...
Funder: Innovate UK | Value: £227,172

Information Sharing between the Police and their Community Partners

2008 - 2011
This is a three year PhD award from the SIPR (Scottish Institute for Policing Research) and focuses on creating new models for information sharing between the police and their community partners.
Funder: Scottish Institute for Policing Research | Value: £30,000

DigitalDNA

2008 - 2010
Funder: Scottish Enterprise | Value: £215,000

Digital forensic Toolkit

2007 - 2008
This project aims to produce next generation digital forensics tools, using novel methods based on DNA matching.
Funder: Scottish Enterprise | Value: £14,703

Seven Layer Communications Ltd

2000 - 2002
To develop and implement real time software and programmable logic elements to provide a powerful and flexible high performance test tool platform for telecommunications software and system test.
Funder: Innovate UK | Value: £71,140
25 results

Promising cyber security project supported by new Scottish Enterprise funding

20 September 2022
TrueDeploy, an exciting project from the School of Computing, Engineering & the Built Environment (SCEBE) at Edinburgh Napier University (ENU), has secured £199,952 in additional support from Scottish...

Double funding success for School of Computing

21 March 2022
Two projects from Edinburgh Napier’s acclaimed School of Computing have won funding from a programme which develops innovative cyber security ideas for the commercial market. TrueDeploy and Trustd ar...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

Dr. Zhiyuan Tan Invited to Deliver a Seminar on Internet of Things and Its Security at the Dongguan University of Technology, China, December 2017

12 December 2017
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...

Dr. Zhiyuan Tan Won The National Research Award 2017 from The Research Council of the Sultanate of Oman

12 November 2017
Dr. Zhiyuan Tan's research work entitled "Building an intrusion detection system using a filter-based feature selection algorithm" has been awarded by the The Research Council of the Sultanate of Oman...