10 results

Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain

Journal Article
Buchanan, B., & Naqvi, N. (2018)
Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain. The Journal of the British Blockchain Association, 1(1), 1-4
A blockchain enabled 'Digital Single Economy " can act as a catalyst for growth and could provide a platform where borderless innovative practices will thrive and create a tru...

Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study

Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...

Distance Measurement Methods for Improved Insider Threat Detection

Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...

Undermining our data: implications for trust in the population census

Presentation / Conference
Killick, L., Duff, A. S., Deakin, M. & Hall, H. (2017, June)
Undermining our data: implications for trust in the population census. Paper presented at Information: interactions and impact (i3), Robert Gordon University, Aberdeen, Scotland, UK
This paper draws on empirical work conducted as part of a multi-method research study funded by the Arts and Humanities Research Council (AHRC). It is concerned with public p...

Cryptography across industry sectors

Journal Article
Buchanan, W. J., Woodward, A., & Helme, S. (2017)
Cryptography across industry sectors. Journal of Cyber Security Technology, 1(3-4), 145-162. https://doi.org/10.1080/23742917.2017.1327221
Security adoption varies across industry sectors, where some companies such as Google, Apple and Microsoft are strong advocates of the adoption of HTTPS, while other companies...

A survey of Intrusion Detection System technologies

Conference Proceeding
Heenan, R., & Moradpoor, N. (2016)
A survey of Intrusion Detection System technologies. In PGCS 2016: The First Post Graduate Cyber Security Symposium – The Cyber Academy
This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performa...

Introduction to Security Onion

Presentation / Conference
Heenan, R., & Moradpoor, N. (2016, May)
Introduction to Security Onion. Paper presented at Post Graduate Cyber Security (PGCS) symposium, Edinburgh
Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many typ...

Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs)

Presentation / Conference
Moradpoor, N., Parr, G., Mcclean, S., Scotney, B., Sivalingam, K., & Madras, I. (2010, December)
Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs). Paper presented at OPNETWORK 2010
Ethernet Passive Optical Network (EPON) has been considered for access networks for quite some time to provide high-speed and high-capacity services. As a novel type of networ...

Culture & biometrics: regional differences in the perception of biometric authentication technologies

Journal Article
Riley, C. W., Buckner, K., Johnson, G., & Benyon, D. (2009)
Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & society, 24, 295-306. https://doi.org/10.1007/s00146-009-0218-1
Previous research has identified user concerns about biometric authentication technology, but most of this research has been conducted in European contexts. There is a lack of...

An agent based Bayesian forecasting model for enhanced network security.

Conference Proceeding
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001. , (247-254). https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...