Date


People

Download Available

Dewey Decimal

668 results

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map

Journal Article
Alharbi, A. R., Ahmad, J., Arshad, Shaukat, S., Masood, F., Ghadi, Y. Y., …Buchanan, W. J. (2022)
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complexity, 2022, Article 7047282. https://doi.org/10.1155/2022/7047282
With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain...

Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT

Journal Article
Wang, F., Yang, S., Wang, C., Li, Q., Babaagba, K., & Tan, Z. (2022)
Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT. International Journal of Intelligent Systems, 37(10), 7058-7078. https://doi.org/10.1002/int.22871
Internet of Things (IoT) is fast growing. Non-PC devices under the umbrella of IoT have been increasingly applied in various fields and will soon account for a significant sha...

A Novel Nomad Migration-Inspired Algorithm for Global Optimization

Journal Article
Lin, N., Fu, L., Zhao, L., Hawbani, A., Tan, Z., Al-Dubai, A., & Min, G. (2022)
A Novel Nomad Migration-Inspired Algorithm for Global Optimization. Computers and Electrical Engineering, 100, Article 107862. https://doi.org/10.1016/j.compeleceng.2022.107862
Nature-inspired computing (NIC) has been widely studied for many optimization scenarios. However, miscellaneous solution space of real-world problem causes it is challenging t...

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022)
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291
E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evo...

SDORP: SDN based Opportunistic Routing for Asynchronous Wireless Sensor Networks

Journal Article
Farooq, M., Wang, X., Hawbani, A., Zhao, L., Al-Dubai, A., & Busaileh, O. (in press)
SDORP: SDN based Opportunistic Routing for Asynchronous Wireless Sensor Networks. IEEE Transactions on Mobile Computing, https://doi.org/10.1109/TMC.2022.3158695
In wireless sensor networks (WSNs), it is inappropriate to use conventional unicast routing due to the broadcast storm problem and spatial diversity of communication links. Op...

Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems

Conference Proceeding
Grierson, S., Thomson, C., Papadopoulos, P., & Buchanan, B. (2022)
Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/sin54109.2021.9699157
Intrusion detection systems are integral to the security of networked systems for detecting malicious or anomalous network traffic. As traditional approaches are becoming less...

PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching

Conference Proceeding
Abramson, W., Buchanan, W. J., Sayeed, S., Pitropakis, N., & Lo, O. (2022)
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. In 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699138
The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up wi...

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022)
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can...

GLASS: Towards Secure and Decentralized eGovernance Services using IPFS

Conference Proceeding
Chrysoulas, C., Thomson, A., Pitropakis, N., Papadopoulos, P., Lo, O., Buchanan, W. J., …Tsolis, D. (2022)
GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. In Computer Security. ESORICS 2021 International Workshops. https://doi.org/10.1007/978-3-030-95484-0_3
The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation, broa...

A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports

Conference Proceeding
Barati, M., Buchanan, W. J., Lo, O., & Rana, O. (2022)
A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports. In UCC '21: Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion. https://doi.org/10.1145/3492323.3495626
Digital vaccination passports are being proposed by various governments internationally. Trust, scalability and security are all key challenges in implementing an online vacci...

Date


128 results

Towards multilingual audio-visual speech enhancement in real noisy environments

2023 - 2025
Speech enhancement aims to improve the overall quality and intelligibility of speech degraded by noise sources in real-world noisy environments. In recent years, researchers have proposed audio-visual...
Funder: Royal Society | Value: £12,000

LastingAsset: Scottish Enterprise Opportunity Creation HGSP

2022 - 2023
Web3 is described as the evolution of the world wide web from the internet of information to the internet of value. The underlying goal of Web3 is a decentralised system where users control their own ...
Funder: Scottish Enterprise | Value: £74,936

Software-Hardware Ecosystems for AI Edge Devices (SHE)

2022 - 2023
AI hardware solutions are only useful if they’re compatible with all other layers of the technology stack, including the solutions and use cases in the services layer. Researchers in AI hardware can t...
Funder: Royal Academy of Engineering | Value: £32,700

Smart Contract based Reward Scheme

2022 - 2023
Egg Lighting would like to explore the possibility of linking their company value to Smart Contracts via Blockchain. They would eventually like to give away 1/3 of their business (shares) to the gene...
Funder: Scottish Funding Council | Value: £5,000

TrueDeploy - Scottish Enterprise HGSP Company Creation

2022 - 2024
The way in which we develop, supply, and secure software is often weak and lacks digital trust. The dominance of open-source software and the interconnectedness of software between organisations has r...
Funder: Scottish Enterprise | Value: £198,161

TRUST AND PRIVACY PRESERVING COMPUTING PLATFORM FOR CROSSBORDER FEDERATION OF PERSONAL DATA

2022 - 2025
As we live in a data-driven era, the emergence of interdisciplinary, geographically dispersed, data repositories, is inevitable. The fact that these repositories do not necessarily abide with existing...
Funder: UK Research and Innovation | Value: £310,843

Behaviour profiling using Touch-based Behavioural Biometrics for Continuous Authentication Systems

2022 - 2022
Authenticating smartphone users from distinct behavioural biometric patterns provided through human interactions on touch screens would allow users to be continuously authenticated on their devices wh...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £923

Cyber Hunt

2022 - 2025
Automated Cyberthreat Hunting and Cyber-relevant Incident Response for Critical Infrastructures. CyberHunt will develop highly innovative cybersecurity technologies that can sense, detect, analyse, d...
Funder: The Research Funding Council of Norway | Value: £37,500

TrueDeploy - CyberASAP Phase 1

2022 - 2022
The way in which we develop and supply secure, trusted software is broken. The dominance of open-source software and the interconnectedness of software between organisations has raised cybersecurity r...
Funder: Innovate UK | Value: £31,969

Security and Privacy in Vehicular Ad-hoc Networks

2022 - 2024
The great leap forward in wireless communications technology drives the recent advancements of Vehicular Ad hoc NETworks (VANETs). As a key part of the Intelligent Transportation Systems (ITS) framewo...
Funder: Royal Society | Value: £12,000
7 results

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Reliable and energy efficient scheduling protocols for Wireless Body Area Networks (WBAN)

2014 - 2018
Miss Marwa Salayma | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

Load balancing and context aware enhancements for RPL routed Internet of Things

2013 - 2018
Mamoun Qasem | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

Adaptive energy management mechanisms for clustering based routing wireless sensor networks

2013 - 2017
"The development of science and technology are increasingly affecting and changing the nature of processes in...
Mr Mohamed Eshaftri | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

Forensic analysis of large capacity digital storage devices

2013 - 2017
Triage of large capacity digital devices
Philip Penrose | Director of Studies: Prof Bill Buchanan | Second Supervisor: Rich Macfarlane

Mobile User Authentication System (MUAS) for e-commerce applications

2009 - 2017
Rania Molla | Director of Studies: Dr Imed Romdhani | Second Supervisor: Prof Bill Buchanan

NetHost-Sensor: Enhancing Intrusion Detection via an Active Target Host

2003 - 2007
Dr Abiola Abimbola | Director of Studies: Jose Munoz | Second Supervisor: Prof Bill Buchanan
27 results

Promising cyber security project supported by new Scottish Enterprise funding

20 September 2022
TrueDeploy, an exciting project from the School of Computing, Engineering & the Built Environment (SCEBE) at Edinburgh Napier University (ENU), has secured £199,952 in additional support from Scottish...

Double funding success for School of Computing

21 March 2022
Two projects from Edinburgh Napier’s acclaimed School of Computing have won funding from a programme which develops innovative cyber security ideas for the commercial market. TrueDeploy and Trustd ar...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

Dr. Zhiyuan Tan Invited to Deliver a Seminar on Internet of Things and Its Security at the Dongguan University of Technology, China, December 2017

12 December 2017
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...

Dr. Zhiyuan Tan Won The National Research Award 2017 from The Research Council of the Sultanate of Oman

12 November 2017
Dr. Zhiyuan Tan's research work entitled "Building an intrusion detection system using a filter-based feature selection algorithm" has been awarded by the The Research Council of the Sultanate of Oman...