35 results

Privacy-preserving Surveillance Methods using Homomorphic Encryption

Conference Proceeding
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020)
Privacy-preserving Surveillance Methods using Homomorphic Encryption. In ICISSP: Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (240-248). https://doi.org/10.5220/0008864902400248
Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encrypt...

Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach

Conference Proceeding
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020)
Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. In Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (289-298). https://doi.org/10.5220/0008902202890298
Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high ...

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Conference Proceeding
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2019)
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In 2018 IEEE International Conference on Big Data (Big Data)https://doi.org/10.1109/BigData.2018.8621922
Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exis...

Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates

Conference Proceeding
Rooney, L., Chute, C., Buchanan, W. J., Smales, A., & Hepburn, L. (2018)
Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates. In Proceedings of ThinkMind - GLOBAL HEALTH 2018, The Seventh International Conference on Global Health Challenges
Long-term conditions in Scotland account for 80% of all GP consultations; they also account for 60% of all deaths in Scotland. Asthma and Chronic Obstructive Pulmonary Disease...

Requirements for 5G based telemetric cardiac monitoring

Conference Proceeding
Thuemmler, C., Hindricks, G., Rolffs, C., Buchanan, W., & Bollmann, A. (2018)
Requirements for 5G based telemetric cardiac monitoring. In 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)https://doi.org/10.1109/WiMOB.2018.8589139
Several white papers have been published on general requirements for 5G in the health vertical. As 5G research and implementation continue more detailed real world information...

Privacy Parameter Variation using RAPPOR on a Malware Dataset

Conference Proceeding
Aaby, P., Mata De Acuña, J. J., Macfarlane, R., & Buchanan, W. J. (2018)
Privacy Parameter Variation using RAPPOR on a Malware Dataset. In Proceedings of 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), (8). https://doi.org/10.1109/TrustCom/BigDataSE.2018.00133
Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of...

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device

Conference Proceeding
Lo, O., Buchanan, W. J., & Carson, D. (2018)
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. In ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Securityhttps://doi.org/10.1145/3230833.3232801
Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consu...

Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network

Conference Proceeding
Asif, R., Haithem, M., & Buchanan, W. J. (2018)
Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network. In Advanced Photonics Networkshttps://doi.org/10.1364/networks.2018.neth2f.3
We report a high capacity Quantum-to-the-Home (QTTH) network in a spatialdivision-multiplexing (SDM) network utilizing 7-core multicore fiber (MCF). Aggregate secure key rates...

Detection of Algorithmically Generated Malicious Domain

Conference Proceeding
Agyepong, E., Buchanan, W., & Jones, K. (2018)
Detection of Algorithmically Generated Malicious Domain. In CS & IT-CSCP 2018, (13-32). https://doi.org/10.5121/csit.2018.80802
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persist...

Mining malware command and control traces

Conference Proceeding
McLaren, P., Russell, G., & Buchanan, B. (2018)
Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017https://doi.org/10.1109/SAI.2017.8252185
Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, w...