BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond
Journal Article
Xu, H., Zhang, L., Onireti, O., Fang, Y., Buchanan, W. J., & Imran, M. A. (2021)
BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond. IEEE Internet of Things, 8(5), 3915-3929. https://doi.org/10.1109/jiot.2020.3025953
The outbreak of COVID-19 pandemic has exposed an urgent need for effective contact tracing solutions through mobile phone applications to prevent the infection from spreading ...
Analysis of malicious affiliate network activity as a test case for an investigatory framework.
Conference Proceeding
Miehling, M. J., Buchanan, W. J., Old, L. J., Batey, A. & Rahman, A. (2009)
Analysis of malicious affiliate network activity as a test case for an investigatory framework. In Proceedings of 9th European Conference on Information Warfare and Security, 209
Currently there is a great deal of literature surrounding methods that can be used to de-tect click-fraud, but there is very little published work on actual cases of click-thr...
Computational data protection law: trusting each other offline and online.
Conference Proceeding
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C. & Uthmani, O. (2011)
Computational data protection law: trusting each other offline and online. In Legal Knowledge and Information Systems; JURIX 2012, 31-40. doi:10.3233/978-1-61499-167-0-31. ISBN 978-1-61499-166-3
The paper reports of a collaborative project between computer scientists, lawyers, police officers, medical professionals and social workers to develop a communication in infr...
Affliate advertising fraud and an investigatory fraud framework.
Conference Proceeding
Miehling, M. J., Buchanan, W. J. & Lawson, A. (2010)
Affliate advertising fraud and an investigatory fraud framework. In CyberForensics 2011
This paper outlines the details of a real-life scam, which involves creating fraudulent Web sites which pretend to sell goods, but are actually used to perform click-through c...
Blockchain and Git repositories for sticky policies protected OOXML.
Presentation / Conference
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November)
Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based
Information Rights Management (IRM) model extension with
enhanced accountability for both a sticky policy and an attached
data. This wor...
Analysis and detection of cruising computer viruses.
Conference Proceeding
Abimbola, A., Munoz, J. & Buchanan, W. J. (2003)
Analysis and detection of cruising computer viruses
Viral propagation is an important phenomenon of computer viruses. This paper focuses on viral movement and proposes the feasibility of a computer virus which is able to target...
Advanced cloud and virtualisation.
Book
Buchanan, W. J. (2012)
Advanced cloud and virtualisation. CRC Press
Mass customisation through personalised brochures: the role of digital printing.
Journal Article
Migas, N., Anastasiadou, C. & Buchanan, W. J. (2006)
Mass customisation through personalised brochures: the role of digital printing. Information Systems. ISSN 0306-4379
This paper argues that despite the wide adoption of Internet technologies in destination marketing, information is still disseminated through printed brochures that have large...
Network Intrusion Detection based on LDA for payload feature selection
Conference Proceeding
Tan, Z., Jamdagni, A., He, X., & Nanda, P. (2010)
Network Intrusion Detection based on LDA for payload feature selection. In 2010 IEEE Globecom Workshopshttps://doi.org/10.1109/glocomw.2010.5700198
The Risks and Opportunities of Mobile Working within Cloud Environments.
Presentation / Conference
Buchanan, W. J., & Smales, A. (2014, February)
The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working, Edinburgh
This presentation outlines the changing architecture of business systems, and with the increasing use of Cloud-based systems. It outlines some of the key risks around using mo...