7 results

Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks

Presentation / Conference
Ali, A. E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2018, June)
Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks. Paper presented at The 16th IEEE International Conference on Smart City (IEEE SmartCity-2018), Exeter, UK
In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional uneq...

Teaching penetration and malware analysis in a cloud-based environment.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June)
Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...

Mobile User Authentication System for E-commerce Applications.

Presentation / Conference
Molla, R., Romdhani, I., Buchanan, W. J., & Fadel, E. Y. (2014, June)
Mobile User Authentication System for E-commerce Applications. Paper presented at International Conference on Advanced Networking, Distributed Systems and Applications 2014, Bejaia, Algeria
E-commerce applications provide on-line clients and merchants with a quick and convenient way to exchange goods and services. However, the deployment of these applications is ...

The Risks and Opportunities of Mobile Working within Cloud Environments.

Presentation / Conference
Buchanan, W. J., & Smales, A. (2014, February)
The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working, Edinburgh
This presentation outlines the changing architecture of business systems, and with the increasing use of Cloud-based systems. It outlines some of the key risks around using mo...

Building a new nation: risk, goverance and trust.

Presentation / Conference
Buchanan, W. J. (2013, January)
Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.

Towards a new health and social care information sharing architecture.

Presentation / Conference
Buchanan, W. J. (2012, May)
Towards a new health and social care information sharing architecture
This presentation outlines the integration of the safi.re information sharing architecture.

Intelligence information sharing between the police and their community partners.

Presentation / Conference
Scott, R., Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, June)
Intelligence information sharing between the police and their community partners. Paper presented at Symposium on Security and Cybercrime, Edinburgh Napier University
This presentation will show a newly developed system for information, and will outline the three "R"s involved in information sharing: RISK. Identify and managing risks to ens...