Lecturer in Cybersecurity
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016). Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE transactions on cloud computing, (1-1). doi:10.1109/tcc.2016.2554548. ISSN 2168-7161
Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create ru...
Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F., & Jamdagni, A. (2013). Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8(2/3), 77. doi:10.1504/ijipt.2014.066377
Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services,...
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015). Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. doi:10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...
Digital Health Institute
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Scottish Funding Council
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project.
Trisent’s core technology is called the Personal Context Management System (PCM...
Lecturer in Cybersecurity and Networks; Program Leader for MSc Advanced Security & Cybercrime; Winner of Outstanding Woman in Cyber (Scottish Cyber Awards 2017)
Senior Research Fellow
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014). Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE cloud computing, 1(3), 27-33. doi:10.1109/mcc.2014.53
Big data, often stored in cloud networks, is changing our business models and applications. Rich information residing in big data is driving business decision making to be a d...
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Ping Liu, R. (2014). A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. IEEE Transactions on Parallel and Distributed Systems, 25(2), 447-456. doi:10.1109/tpds.2013.146
Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, are now under threads from network attackers. As one of most common and aggre...
He, X., Chomsiri, T., Nanda, P. & Tan, Z. (2013). Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems. 30, 116-126. doi:10.1016/j.future.2013.06.024. ISSN 0167-739X
This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The r...
Jamdagni, A., Tan, Z., He, X., Nanda, P. & Liu, R. P. (2013). RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. Computer Networks. 57(3), 811-824. doi:10.1016/j.comnet.2012.10.002. ISSN 1389-1286
Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of ex...
Mason, A. M., Dingle, N. J., Knottenbelt, W. J., Bell, D., Buchanan, W. J. & Thuemmler, C. (2009). Modelling infection spread using location tracking. International Journal of Healthcare Technology and Management. 11, 442-461. doi:10.1504/IJHTM.2010.036925. ISSN 1368-2156
The precision of location tracking technology has improved greatly over the last few decades. We aim to show that by tracking the locations of individuals in a closed environm...
Buchanan, W. J., Raja, A. & Munoz, J. (2005). Critical analysis and error determination of locating-finding techniques in GSM. International Journal of Mobile Communications. 3, 165-182. doi:10.1504/IJMC.2005.005905. ISSN 1470-949X
GPS is a well-established technique for location-finding, but mobile phone-based methods are generally less expensive to implement, and can give reasonable accuracies. These t...
Buchanan, W. J. (2004). Uzytkowanie Komputerow. Wkt (Poland)
Przyst?pny i praktyczny poradnik dotycz?cy u?ytkowania komputerów, obejmuj?cy szeroki zakres zagadnie? zwi?zanych z przetwarzaniem informacji i transmisj? danych oraz ich komp...
Raja, K., Buchanan, W., & Munoz, J. (2004). We know where you are [cellular location tracking]. Communications engineer, 2(3), 34-39. doi:10.1049/ce:20040307
Buchanan, W. J. (2003). Handbook of data communications and networks. Springer
The second edition of the Handbook of Data Communications and Networks covers many of the key areas in modern communication systems. It is split into several sections, includi...
Buchanan, W. J. (2001). The complete handbook of the Internet. KLUWER ACADEMIC PUBLISHERS BOSTON
Buchanan, W. J. (1997). Advanced PC interfacing, communications and Windows programming. Addison-Wesley
Buchanan, W. J. (1996). Wiedziec wiecej Internet. Wkt (Poland)
Ksi??ka ta m. In. Uczy jak korzysta? z internetu i sieci www.Opisuje bowiem techniczne aspekty tej ?wiatowej sieci informacyjnej. Dlatego te? mo?e by? wykorzystywana przez wsz...