Research explorer tool

Date


People

Download Available

336 results

Lenovo’s security debacle reveals blurred boundary between adware and malware

Other
Buchanan, W. J. (2015)
Lenovo’s security debacle reveals blurred boundary between adware and malware
A widely disliked habit of PC vendors is their bundling of all manner of unwanted software into brand new computers – demo software, games, or part-functional trials. Faced wi...

Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks.

Conference Proceeding
Migas, N., Buchanan, W. J., & McArtney, K. (2003)
Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks. In Proceedings. 10th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2003, 200 - 206. https://doi.org/10.1109/ECBS.2003.1194800
Wireless networks and the usage of mobile devices are becoming popular in recent days, especially in creating ad-hoc networks. There is thus scope for developing mobile system...

Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing

Conference Proceeding
Migas, N., & Buchanan, W. J. (2005)
Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing. In The 2005 IEEE Congress on Evolutionary Computation, 147 - 154. https://doi.org/10.1109/ecbs.2005.51
Ad-hoc wireless networks, which use ad-hoc routing methods may prove a good solution in certain applications, especially where networks have to be constructed where there is n...

Minimising collateral damage: privacy-preserving Investigative data acquisition platform.

Journal Article
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2011)
Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach, 4, 12-31. https://doi.org/10.4018/jitsa.2011070102
Investigators define invasion of privacy during their operations as collateral damage. Inquiries that require gathering data about potential suspects from third parties, such ...

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture.

Conference Proceeding
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013)
Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy, (91-101). https://doi.org/10.1007/978-3-642-41205-9_8
We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, org...

MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks

Thesis
Migas, N. (2008)
MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4000
Recent advances in technology provided the ground for highly dynamic, mobile, infrastructure-less networks, namely, ad-hoc networks. Despite their enormous benefits, the full ...

Real-time monitoring of privacy abuses and intrusion detection in android system.

Conference Proceeding
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015)
Real-time monitoring of privacy abuses and intrusion detection in android system. In Human Aspects of Information Security, Privacy, and Trust, (379-390). https://doi.org/10.1007/978-3-319-20376-8_34
In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the mali...

Fast contraband detection in large capacity disk drives.

Journal Article
Penrose, P., Buchanan, W. J., & Macfarlane, R. (2015)
Fast contraband detection in large capacity disk drives. Digital Investigation, 12(S1), S22-S29. https://doi.org/10.1016/j.diin.2015.01.007
In recent years the capacity of digital storage devices has been increasing at a rate that has left digital forensic services struggling to cope. There is an acknowledgement t...

Evaluation of the DFET Cloud.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September)
Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...

Garmin satnav forensic methods and artefacts: an exploratory study.

Thesis
Arbelet, A. (2014)
Garmin satnav forensic methods and artefacts: an exploratory study. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/7334
Over ten years ago, major changes in the Global Positioning System (GPS) technology led to its explosion in popularity. GPS devices are now ubiquitous, escorting their users e...
58 results

Social Media Analysis Reporting Tool (SMART)

2012 - 2013
To develop a commercially viable tool to enable organisations to monitor and understand their organisation’s life on social media beyond those accounts they have created. This project is focused on ...
Funder: Scottish Funding Council | Value: £4,937

Seven Layer Communications Ltd

2000 - 2002
To develop and implement real time software and programmable logic elements to provide a powerful and flexible high performance test tool platform for telecommunications software and system test.
Funder: Innovate UK | Value: £71,140

MiiCard

2013 - 2013
The project has resulted in a software prototype which demonstrates miiCard tags.
Funder: Scottish Funding Council | Value: £5,000

Personal health data manager

2012 - 2013
This SE/RSE Enterprise Fellowship aimed to commercialise intellectual property owned by Edinburgh Napier University related to e-Health data management into an end-user product. The project paved the ...
Funder: Royal Society of Edinburgh | Value: £32,926

Project Quaisten

2014 - 2015
To develop a question generator API to pull information from the web, based on defined questions types, confirming correct answers and implementing a process of question difficulty based on metrics ab...
Funder: Scottish Funding Council | Value: £4,945

Post Graduate Cyber Security (PGCS) symposium

2016 - 2016
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas. It is a forum for early researchers to pres...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £800

Payment Cards and Mobile Technology

2015 - 2015
Comcarde is developing a mobile payments system called Bridge that uses a patent pending algorithm which is extremely resilient to man-in-the-middle attacks. Combined with strong authentication, we b...
Funder: Scottish Funding Council | Value: £5,000

Payfont, innovation voucher

2013 - 2015
SMART Grant proposal.
Funder: Scottish Funding Council | Value: £4,930

Payfont - PhD sponsorship -

2016 - 2018
Peter Aaby - PhD sponsorship
Value: £40,425

Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures

2011 - 2013
This project extends the e-Health Cloud-based Platform, and integrates with assisted living. The project integrates Edinburgh Napier University, Microsoft and HoIP, and has created a novel governance ...
Funder: Engineering and Physical Sciences Research Council | Value: £243,325
14 results

An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments

2008 - 2012
The concept of context-awareness is widely used in mobile and pervasive computing t...
Dr Zakwan Jaroucheh | Director of Studies: Prof Xiaodong Liu | Second Supervisor: Prof Sally Smith

Test-bed and evaluation of a home-based adverse event prediction infrastructure

2013 - date
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Adrian Smales | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

Forensic analysis of large capacity digital storage devices

2013 - 2017
Triage of large capacity digital devices
Philip Penrose | Director of Studies: Prof Bill Buchanan | Second Supervisor: Rich Macfarlane

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Behaviour profiling using Touch-based Behavioural Biometrics for Continuous Authentication Systems

2016 - date
Peter Aaby | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Ben Paechter

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - date
Ms Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Industrial control systems security analysis and countermeasures

2017 - date
Andres Santiago Robles Durazno | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: James McWhinnie

Privacy-Preserving Passive DNS (PRESERVE DNS) Using Hyperledger Fabric

2019 - date
Mr. Pavlos Papadopoulos | Director of Studies: Dr Nick Pitropakis | Second Supervisor: Prof Bill Buchanan

Enhancement of identified effective ransomware detection techniques

2020 - date
Simon Davies | Director of Studies: Rich Macfarlane | Second Supervisor: Prof Bill Buchanan
25 results

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Basil Manoussos (Manager @ The Cyber Academy) delivers keynote at the 2019 Annual Conference of the Scottish Paralegal Association

17 April 2019
Basil Manoussos, Manager of The Cyber Academy delivers keynote presentation at the Annual Conference of the Scottish Paralegal Association in Glasgow, titled "Cyber threats to law firms: Do you want ...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

SOCLAB Launch

10 April 2018
Official launch of SOCLAB, the new SOC facility in Merchiston Campus

Dr. Zhiyuan Tan Invited to Deliver a Seminar on Internet of Things and Its Security at the Dongguan University of Technology, China, December 2017

12 December 2017
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...

Dr. Zhiyuan Tan Won The National Research Award 2017 from The Research Council of the Sultanate of Oman

12 November 2017
Dr. Zhiyuan Tan's research work entitled "Building an intrusion detection system using a filter-based feature selection algorithm" has been awarded by the The Research Council of the Sultanate of Oman...