3 results

Teaching penetration and malware analysis in a cloud-based environment.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June)
Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems

Conference Proceeding
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010)
Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In J. Demergis (Ed.), Proceedings of 9th European Conference on Information Warfare and Security. , (190-200
There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat...

Culture & biometrics: regional differences in the perception of biometric authentication technologies

Journal Article
Riley, C. W., Buckner, K., Johnson, G., & Benyon, D. (2009)
Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & society, 24, 295-306. https://doi.org/10.1007/s00146-009-0218-1
Previous research has identified user concerns about biometric authentication technology, but most of this research has been conducted in European contexts. There is a lack of...