Lecturer in Cybersecurity and Digital Forensics
Manager, The Cyber Academy
McKeown, S., Russell, G., & Leimich, P. (2018). Fingerprinting JPEGs with Optimised Huffman Tables. Journal of Digital Forensics, Security and Law, 13(2), doi:10.15394/jdfsl.2018.1451
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...
Paulin, A., & Thuemmler, C. (2016). Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom),, 245-248. doi:10.1109/HealthCom.2016.7749462
— This paper describes the use of the Secure SQL Server system (SecSQL) – a system for dynamic fine-grained access control, in the context of e-Health. The system was used in ...
The Scottish Informatics & Computer Science Alliance
In a recent report by International Information System Security Certification Consortium (ISC)2, it is estimated there will be a global shortfall of 1.5 million cybersecurity professionals by 2019, so...
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...