RePIDS: A multi tier Real-time Payload-based Intrusion Detection System
Jamdagni, A., Tan, Z., He, X., Nanda, P., & Liu, R. P. (2013)
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. Computer Networks, 57(3), 811-824. https://doi.org/10.1016/j.comnet.2012.10.002
Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of ex...
Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs.
Buchanan, W. J., Graves, J., Bose, N., Macfarlane, R., Davison, B., & Ludwiniak, R. (2011)
Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. HEA ICS Conference,
This paper focuses on the integration of virtualised environments within the teaching of computer security and digital forensics, and includes three case studies. The first ca...
Crime risk evaluation within information sharing between the Police and community partners.
Uthmani, O., Buchanan, W. J., Lawson, A., Scott, R., Schafer, B., & Fan, L. (2011)
Crime risk evaluation within information sharing between the Police and community partners. Information and Communications Technology Law, 20, 57-81. https://doi.org/10.1080/13600834.2011.578922
The aim of this paper is to provide profiles for crimes which can be used to model the context for information sharing between the police and community partner organisations. ...
Minimising collateral damage: privacy-preserving Investigative data acquisition platform.
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2011)
Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach, 4, 12-31. https://doi.org/10.4018/jitsa.2011070102
Investigators define invasion of privacy during their operations as collateral damage. Inquiries that require gathering data about potential suspects from third parties, such ...
A novel privacy preserving method for the location tracking of mobile devices
Buchanan, W. J., & Kwecka, Z. (2011)
A novel privacy preserving method for the location tracking of mobile devices. Wireless Networks,
Two of the major changes within computing, at the present time, are the move towards serviceoriented architectures and the increasing usage of mobile devices to access these s...
Formal security policy implementations in network firewalls.
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012)
Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003
Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific ...
A smarter way to practise
Thuemmler, C. (2011)
A smarter way to practise. BMJ, 342(feb22 2), d1124-d1124. https://doi.org/10.1136/bmj.d1124
Rapid response to the following article - Nolan, Tom -A smarter way to practise, (2011), BMJ vol. 342, doi:10.1136/bmj.d1124 issn-0959-8138, http://www.bmj.com/content/342/bmj...
GLBM: A new QoS aware multicast scheme for wireless Mesh network
Zhao, L., Al-Dubai, A., & Min, G. (2010)
GLBM: A new QoS aware multicast scheme for wireless Mesh network. Journal of Systems and Software, 83, 1318-1326. https://doi.org/10.1016/j.jss.2010.01.044
Wireless mesh networks (WMNs) have been attracting significant attention due to their promising technology. The WMN technology is becoming a major avenue for the fourth genera...
An Information Economy Built on Sand?
Dougan, S., & Saliou, L. (2008)
An Information Economy Built on Sand?. Expert Witness Institute NewsLetter, 12, 14-15