Undermining our data: implications for trust in the population census
Presentation / Conference
Killick, L., Duff, A. S., Deakin, M. & Hall, H. (2017, June)
Undermining our data: implications for trust in the population census. Paper presented at Information: interactions and impact (i3), Robert Gordon University, Aberdeen, Scotland, UK
This paper draws on empirical work conducted as part of a multi-method research study funded by the Arts and Humanities Research Council (AHRC). It is concerned with public p...
Secure and Scalable Identity Management for the Aviation Industry
Presentation / Conference
Kintis, P., Kountouras, A., Pitropakis, N., Dagon, D., Antonakakis, M., Markou, C., & Buchner, P. (2017, May)
Secure and Scalable Identity Management for the Aviation Industry
No abstract available.
Introduction to Security Onion
Presentation / Conference
Heenan, R., & Moradpoor, N. (2016, May)
Introduction to Security Onion. Paper presented at Post Graduate Cyber Security (PGCS) symposium, Edinburgh
Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many typ...
Evaluation of the DFET Cloud.
Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September)
Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...
Cyber security challenges for cloud based services.
Presentation / Conference
Buchanan, W. J. (2015, June)
Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh
Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud
Teaching penetration and malware analysis in a cloud-based environment.
Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June)
Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...
New forensic investigation and training methods in a virtual environment (cloud) (D-FET project).
Presentation / Conference
Buchanan, W. J., & Smales, A. (2015, April)
New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). Paper presented at Cybercrime and Cyberterrorism - the EU Research roadmap, Montpellier, France
DFET creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the ...
It's all hackable.
Presentation / Conference
Buchanan, W. J. (2015, February)
It's all hackable. Paper presented at SBRC Insider Threat Conference 2015, RBS, Gogarburn
From crime to court - an experience report of a digital forensics group project module.
Presentation / Conference
Leimich, P., Ferguson, I., & Coull, N. (2014, November)
From crime to court - an experience report of a digital forensics group project module. Paper presented at HEA Teaching Computer Forensics Workshop, Sunderland, UK
This paper discusses the large-scale group project undertaken by BSc Hons Digital Forensics
students at Abertay University in their penultimate year. The philosophy of the pro...
Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities.
Presentation / Conference
Buchanan, W. J. (2014, September)
Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities. Paper presented at 7th International Conference on Security of Information and Networks (SIN 2014), Glasgow
This presentation will outline some new research related to the Heartbleed vulnerability, and cover the full technical details of the threat, with a live demo. Along with it w...