Research explorer tool

Date


People

Download Available

340 results

Insider threat detection using principal component analysis and self-organising map

Conference Proceeding
Moradpoor, N., Brown, M., & Russell, G. (2017)
Insider threat detection using principal component analysis and self-organising map. In 10th International Conference on Security of Information and Networks (SIN 2017)https://doi.org/10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...

Resilient secret sharing cloud based architecture for data vault

Patent
Lanc, D., Fan, L., MacKinnon, L., & Buchanan, B. (2016)
Resilient secret sharing cloud based architecture for data vault
A method of securely storing data including: providing, within a secure data storage system, a plurality of secret sharing methods for selection and identifying a striping pol...

Analysis of the adoption of security headers in HTTP.

Journal Article
Buchanan, W. J., Helme, S., Woodward, A., & Buchanan, B. (2018)
Analysis of the adoption of security headers in HTTP. IET Information Security, 12(2), 118-126. https://doi.org/10.1049/iet-ifs.2016.0621
With the increase in the number of threats within Web-based systems, a more integrated approach is required to ensure the enforcement of security policies from the server to t...

Security, privacy and safety evaluation of dynamic and static fleets of drones

Conference Proceeding
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017)
Security, privacy and safety evaluation of dynamic and static fleets of drones. In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC),https://doi.org/10.1109/dasc.2017.8101984
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or C...

Fingerprinting JPEGs With Optimised Huffman Tables

Journal Article
McKeown, S., Russell, G., & Leimich, P. (2018)
Fingerprinting JPEGs With Optimised Huffman Tables. Journal of Digital Forensics, Security and Law, 13(2), https://doi.org/10.15394/jdfsl.2018.1451
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...

A methodology for the security evaluation within third-party Android Marketplaces

Journal Article
Buchanan, W. J., Chiale, S., & Macfarlane, R. (2017)
A methodology for the security evaluation within third-party Android Marketplaces. Digital Investigation, 23, 88-98. https://doi.org/10.1016/j.diin.2017.10.002
This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo localize the malware distribution over three main regions: China, Europe; and Russia...

A framework for data security in cloud using collaborative intrusion detection scheme

Conference Proceeding
Nagar, U., Nanda, P., He, X., & Tan, Z. (. (2017)
A framework for data security in cloud using collaborative intrusion detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 188-193. https://doi.org/10.1145/3136825.3136905
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...

Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies

Conference Proceeding
Asif, R. (2017)
Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. In NoF 2017 Conference Proceedingshttps://doi.org/10.1109/NOF.2017.8251243
Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home...

Distance Measurement Methods for Improved Insider Threat Detection

Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...

Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study

Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...
59 results

The truth about cybersecurity in 7 words (poster competition for women in cybersecurity)

2017 - 2017
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

Morgan Stanley: Security Analytics for Insider Threat Monitoring

2017 - 2017
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Funder: Data Lab | Value: £19,974

IoT Hardware Security Test Framework

2017 - 2018
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
Funder: Centre for Sensor and Imaging Systems | Value: £58,807

The truth about cybersecurity in 7 words – 2018 (poster competition in cybersecurity)

2018 - 2018
In a recent report by International Information System Security Certification Consortium (ISC)2, it is estimated there will be a global shortfall of 1.5 million cybersecurity professionals by 2019, so...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

Trisent: Innovation Voucher for Personal Context Data Project

2018 - 2018
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project. Trisent’s core technology is called the Personal Context Management System (PCM...
Funder: Scottish Funding Council | Value: £5,000

Eyecademy: Innovation Voucher for Food Provenance

2018 - 2018
This project will focus on the building of a food provenance platform based on distributed ledger technologies
Funder: Scottish Funding Council | Value: £5,000

Hypervine: Innovation Voucher Construction Site Safety Enhancement

2018 - 2018
This focuses on the use of distributed ledger technologies to manage both compliance events such as signing off on work and also document management
Funder: Scottish Funding Council | Value: £5,000

Next Generation Connectivity with Health and Well-being

2018 - 2021
This project will investigate existing consumer tech, IOT and connectivity capabilities for simulation activities. Napier and DHI will explore a range of technologies that can connect to DHI’s simul...
Funder: Digital Health Institute | Value: £69,355

Kippitech: Innovation Voucher for Incentivising Green Behaviour with Tokens

2018 - 2019
This will investigate the feasibility of incentivising environmentally friendly behaviours through rewards given in tokens as well as IoT wearables to discover this behaviour and reward automatically.
Funder: Scottish Funding Council | Value: £5,000

Health Blockchain

2017 - 2019
This is a Data Labs project which will investigate Blockchain technology - with Spiritus, the project will be ground-breaking in the implementation of a private blockchain within a large-scale healthc...
Funder: Data Lab | Value: £95,848
9 results

An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments

2008 - 2012
The concept of context-awareness is widely used in mobile and pervasive computing t...
Dr Zakwan Jaroucheh | Director of Studies: Prof Xiaodong Liu | Second Supervisor: Prof Sally Smith

Test-bed and evaluation of a home-based adverse event prediction infrastructure

2013 - date
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Adrian Smales | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

Forensic analysis of large capacity digital storage devices

2013 - 2017
Triage of large capacity digital devices
Philip Penrose | Director of Studies: Prof Bill Buchanan | Second Supervisor: Rich Macfarlane

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - date
Ms Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Forensic verification of operating system activity via novel data, acquisition and analysis techniques

2005 - 2009
Dr Jamie Graves | Director of Studies: Prof Bill Buchanan | Second Supervisor: L. John Old

Framework for evaluation of e-health platform and services

2010 - 2015
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...
Dr Owen Lo | Director of Studies: Prof Bill Buchanan | Second Supervisor: Prof Christoph Thuemmler

Evaluating individual engagement with e-Participation systems

2019 - date
Peter Cruickshank | Director of Studies: Prof Hazel Hall
24 results

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

SOCLAB Launch

10 April 2018
Official launch of SOCLAB, the new SOC facility in Merchiston Campus

Dr. Zhiyuan Tan Invited to Deliver a Seminar on Internet of Things and Its Security at the Dongguan University of Technology, China, December 2017

12 December 2017
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...

Dr. Zhiyuan Tan Won The National Research Award 2017 from The Research Council of the Sultanate of Oman

12 November 2017
Dr. Zhiyuan Tan's research work entitled "Building an intrusion detection system using a filter-based feature selection algorithm" has been awarded by the The Research Council of the Sultanate of Oman...

Professor Opens Up on His Love of Edinburgh, Cryptography and Innovation

22 August 2017
In an interview with Inspired Edinburgh in The Victorian Townhouse, Professor Bill Buchanan outlined his career and his university, along with his love of his home city, cryptography and innovation. T...