HI-risk: A method to analyse health information risk intelligence
Conference Proceeding
Buchanan, W. J., & van Deursen, N. (2016)
HI-risk: A method to analyse health information risk intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)https://doi.org/10.1109/healthcom.2016.7749536
Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to securi...
Applied web traffic analysis for numerical encoding of SQL Injection attack features
Conference Proceeding
Uwagbole, S., Buchanan, W., & Fan, L. (2016)
Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web...
A survey of Intrusion Detection System technologies
Conference Proceeding
Heenan, R., & Moradpoor, N. (2016)
A survey of Intrusion Detection System technologies. In PGCS 2016: The First Post Graduate Cyber Security Symposium – The Cyber Academy
This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performa...
Secret shares to protect health records in Cloud-based infrastructures
Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...
Review of e-Health Frameworks.
Conference Proceeding
Prajapati, B., Buchanan, W. J., Smales, A., Macfarlane, R., & Spyra, G. (2015)
Review of e-Health Frameworks. In Health Informatics Conference 2015
In order to improve the quality of health care and widen the accessibility, health care providers are consistently looking to inject information and communication technology t...
RESCUE: Resilient Secret Sharing Cloud-based Architecture.
Conference Proceeding
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015)
RESCUE: Resilient Secret Sharing Cloud-based Architecture. In 2015 IEEE Trustcom/BigDataSE/ISPA Vol. 1, (872-879). https://doi.org/10.1109/Trustcom.2015.459
This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without use...
Sticky-Policy enabled authenticated OOXML for Health Care
Conference Proceeding
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2015)
Sticky-Policy enabled authenticated OOXML for Health Care. In Proceedings of BCS Health Informatics Scotland 2015 Conferencehttps://doi.org/10.14236/ewic/HIS2015.3
This paper proposes a secure medical document sharing construction, which addresses confidentiality and authenticity concerns related to cloud-based data protection issues. Th...
An architecture for designing Future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology
Conference Proceeding
Sotiriadis, S., Petrakis,, E. G. M., Covaci, . S., Zampognaro, P., Georga, E., & Thuemmler, C. (2014)
An architecture for designing Future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology. In 13th IEEE International Conference on BioInformatics and BioEngineering, 1-6. doi:10.1109/bibe.2013.6701578
The emergency of cloud computing and Generic Enablers (GEs) as the building blocks of Future Internet (FI) applications highlights new requirements in the area of cloud servic...
Evaluating Digital Forensic Tools (DFTs).
Conference Proceeding
Flandrin, F., Buchanan, W. J., Macfarlane, R., Ramsay, B. & Smales, A. (2013)
Evaluating Digital Forensic Tools (DFTs). In 7th International Conference : Cybercrime Forensics Education & TrainingISBN 9781909067158
This paper outlines the key methods used in the evaluation of digital forensics tools.
Pianola - visualization of multivariate time-series security event data.
Conference Proceeding
Thomson, A., Graham, M., & Kennedy, J. (2013)
Pianola - visualization of multivariate time-series security event data. In Proceedings of IV2013, 123-131. https://doi.org/10.1109/IV.2013.15
Monitoring log files for network intrusions is unwieldy. To build a mental model of the log, an analyst is required to recognise continuous timelines and attack patterns from ...