Research explorer tool

Date


People

Download Available

311 results

Privacy-preserving Surveillance Methods using Homomorphic Encryption

Conference Proceeding
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020)
Privacy-preserving Surveillance Methods using Homomorphic Encryption. https://doi.org/10.5220/0008864902400248
Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encrypt...

Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach

Conference Proceeding
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020)
Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. https://doi.org/10.5220/0008902202890298
Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high ...

Chaos-based Confusion and Diffusion of Image Pixels using Dynamic Substitution

Journal Article
Abdullah, Q., Ahmad, J., Boulila, W., Rubaiee, S., Masood, F., Khan, F., & Buchanan, W. J. (in press)
Chaos-based Confusion and Diffusion of Image Pixels using Dynamic Substitution. IEEE Access, 1-20. https://doi.org/10.1109/ACCESS.2020.3012912
The evolution of wireless and mobile communication from 0G to the upcoming 5G gives riseto data sharing through the Internet. This data transfer via open public networks are s...

Using Amazon Alexa APIs as a Source of Digital Evidence

Conference Proceeding
Krueger, C., & Mckeown, S. (2020)
Using Amazon Alexa APIs as a Source of Digital Evidence. https://doi.org/10.1109/CyberSecurity49315.2020.9138849
With the release of Amazon Alexa and the first Amazon Echo device, the company revolutionised the smart home. It allowed their users to communicate with, and control, their sm...

Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment

Conference Proceeding
Chacon, J., Mckeown, S., & Macfarlane, R. (2020)
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. https://doi.org/10.1109/CyberSecurity49315.2020.9138859
Attacks by Advanced Persistent Threats (APTs) have been shown to be difficult to detect using traditional signature-and anomaly-based intrusion detection approaches. Deception...

Decentralized Accessibility of e-commerce Products through Blockchain Technology

Journal Article
Kumar, G., Saha, R., Buchanan, W. J., Geetha, G., Thomas, R., Rai, M. K., …Alazab, M. (2020)
Decentralized Accessibility of e-commerce Products through Blockchain Technology. Sustainable Cities and Society, https://doi.org/10.1016/j.scs.2020.102361
A distributed and transparent ledger system is considered for various \textit{e}-commerce products including health medicines, electronics, security appliances, food products ...

Towards Continuous User Authentication Using Personalised Touch-Based Behaviour

Conference Proceeding
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (in press)
Towards Continuous User Authentication Using Personalised Touch-Based Behaviour
In this paper, we present an empirical evaluation of 30 features used in touch-based continuous authentication. It is essential to identify the most significant features for e...

Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting

Journal Article
Abramson, W., van Deursen, N. E., & Buchanan, W. J. (2020)
Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting. Blockchain in Healthcare Today, 3, https://doi.org/10.30953/bhty.v3.140
A substantial administrative burden is placed on healthcare professionals as they manage and progress through their careers. Identity verification, pre-employment screening an...

Testing And Hardening IoT Devices Against the Mirai Botnet

Conference Proceeding
Kelly, C., Pitropakis, N., McKeown, S., & Lambrinoudakis, C. (2020)
Testing And Hardening IoT Devices Against the Mirai Botnet. https://doi.org/10.1109/CyberSecurity49315.2020.9138887
A large majority of cheap Internet of Things (IoT) devices that arrive brand new, and are configured with out-of-the-box settings, are not being properly secured by the manufa...

A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos

Journal Article
Masood, F., Boulila, W., Ahmad, J., Arshad, A., Sankar, S., Rubaiee, S., & Buchanan, W. J. (2020)
A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos. Remote Sensing, 12(11), https://doi.org/10.3390/rs12111893
Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can co...
58 results

The truth about cybersecurity in 7 words – 2018 (poster competition in cybersecurity)

2018 - 2018
In a recent report by International Information System Security Certification Consortium (ISC)2, it is estimated there will be a global shortfall of 1.5 million cybersecurity professionals by 2019, so...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

Next Generation Trust Architecture

2018 - 2020
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Funder: Digital Health Institute | Value: £149,959

Trisent: Innovation Voucher for Personal Context Data Project

2018 - 2018
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project. Trisent’s core technology is called the Personal Context Management System (PCM...
Funder: Scottish Funding Council | Value: £5,000

IoT Hardware Security Test Framework

2017 - 2018
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
Funder: Centre for Sensor and Imaging Systems | Value: £58,807

Virtualised Security Operations Centre (vSoC) KTP

2017 - 2019
The aim of this KTP project is to create a completely scripted environment for the creation of advanced cyber security training, using scripted scenarios for the creation of training elements, and pro...
Funder: Innovate UK | Value: £136,306

Health Blockchain

2017 - 2019
This is a Data Labs project which will investigate Blockchain technology - with Spiritus, the project will be ground-breaking in the implementation of a private blockchain within a large-scale healthc...
Funder: Data Lab | Value: £95,848

The truth about cybersecurity in 7 words (poster competition for women in cybersecurity)

2017 - 2017
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

Morgan Stanley: Security Analytics for Insider Threat Monitoring

2017 - 2017
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Funder: Data Lab | Value: £19,974

Payfont - PhD sponsorship -

2016 - 2018
Peter Aaby - PhD sponsorship
Value: £40,425

Post Graduate Cyber Security (PGCS) symposium

2016 - 2016
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas. It is a forum for early researchers to pres...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £800
14 results

Enhancement of identified effective ransomware detection techniques

2020 - date
Simon Davies | Director of Studies: Rich Macfarlane | Second Supervisor: Prof Bill Buchanan

Evaluating individual engagement with e-Participation systems

2019 - date
Peter Cruickshank | Director of Studies: Prof Hazel Hall

Privacy-Preserving Passive DNS (PRESERVE DNS) Using Hyperledger Fabric

2019 - date
Mr. Pavlos Papadopoulos | Director of Studies: Dr Nick Pitropakis | Second Supervisor: Prof Bill Buchanan

Privacy-preserving architecture for self-sovereign identity

2018 - date
Mr Will Abramson | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Owen Lo

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - date
Ms Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Industrial control systems security analysis and countermeasures

2017 - date
Andres Santiago Robles Durazno | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: James McWhinnie

Behaviour profiling using Touch-based Behavioural Biometrics for Continuous Authentication Systems

2016 - date
Peter Aaby | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Ben Paechter

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Test-bed and evaluation of a home-based adverse event prediction infrastructure

2013 - date
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Adrian Smales | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson
25 results

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Basil Manoussos (Manager @ The Cyber Academy) delivers keynote at the 2019 Annual Conference of the Scottish Paralegal Association

17 April 2019
Basil Manoussos, Manager of The Cyber Academy delivers keynote presentation at the Annual Conference of the Scottish Paralegal Association in Glasgow, titled "Cyber threats to law firms: Do you want ...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

SOCLAB Launch

10 April 2018
Official launch of SOCLAB, the new SOC facility in Merchiston Campus

Dr. Zhiyuan Tan Invited to Deliver a Seminar on Internet of Things and Its Security at the Dongguan University of Technology, China, December 2017

12 December 2017
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...

Dr. Zhiyuan Tan Won The National Research Award 2017 from The Research Council of the Sultanate of Oman

12 November 2017
Dr. Zhiyuan Tan's research work entitled "Building an intrusion detection system using a filter-based feature selection algorithm" has been awarded by the The Research Council of the Sultanate of Oman...