Research explorer tool

19 results

Date


School

People

Download Available

338 results

Intelligence information sharing between the police and their community partners.

Presentation / Conference
Scott, R., Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, June)
Intelligence information sharing between the police and their community partners. Paper presented at Symposium on Security and Cybercrime, Edinburgh Napier University
This presentation will show a newly developed system for information, and will outline the three "R"s involved in information sharing: RISK. Identify and managing risks to ens...

Interagency data exchange, privacy protection and governance architecture for Information sharing across domains.

Journal Article
Buchanan, W. J., Fan, L., Uthmani, O., & Schafer, B. (in press)
Interagency data exchange, privacy protection and governance architecture for Information sharing across domains. Artificial Intelligence and Law,
This paper discusses privacy enhancing technologies in the field of inter-agency data sharing, a key government objective for efficient public service delivery. We analyse the...

If Obama is talking about securing the net, it should be on everyone else’s lips too.

Other
Buchanan, W. J. (2015)
If Obama is talking about securing the net, it should be on everyone else’s lips too
We have spent years promoting the need for change in our approach to internet infrastructure, forcing politicians to recognise it as a serious issue. So it’s great to see Bara...

"I am Spartacus" – privacy enhancing technologies and privacy as a public good

Journal Article
Kwecka, Z., Buchanan, W. J., Schafer, B., & Rauhofer, J. (2014)
"I am Spartacus" – privacy enhancing technologies and privacy as a public good. Artificial Intelligence and Law, 22(2), 113-139. https://doi.org/10.1007/s10506-014-9155-5
The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This understanding of privacy has...

Implementation and evaluation of a botnet analysis and detection method in a virtual environment

Thesis
Waheed, S. (2012)
Implementation and evaluation of a botnet analysis and detection method in a virtual environment. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5667
Botnets are one of the biggest cyber threats. Botnets based on concepts that used for the development of malware or viruses before origin of the Internet in 1990s. Botnet is a...

If you seek to ‘switch off’ encryption, you may as well switch off the whole internet.

Other
Buchanan, W. J. (2015)
If you seek to ‘switch off’ encryption, you may as well switch off the whole internet
Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This m...

HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society

Thesis
van Deursen Hazelhoff Roelfze, N. (2014)
HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6921
This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations...

An evaluation of the power consumption and carbon footprint of a cloud infrastructure

Thesis
Yampolsky, V. (2010)
An evaluation of the power consumption and carbon footprint of a cloud infrastructure. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3973
The Information and Communication Technology (ICT) sector represent two to three percents of the world energy consumption and about the same percentage of GreenHouse Gas(GHG) ...

Applied web traffic analysis for numerical encoding of SQL Injection attack features

Conference Proceeding
Uwagbole, S., Buchanan, W., & Fan, L. (2016)
Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web...

Analysis and migration of location-finding methods for GSM and 3G networks.

Conference Proceeding
Buchanan, W. J., Munoz, J., Manson, R., & Raja, K. A. (2004)
Analysis and migration of location-finding methods for GSM and 3G networks. https://doi.org/10.1049/cp%3A20040695
This paper initially reviews the current range of location techniques on GSM networks, such as Cell-ID, GPS, AGPS, time difference of arrival (TDOA) and E-OTD (enhanced observ...
58 results

Social Media Analysis Reporting Tool (SMART)

2012 - 2013
To develop a commercially viable tool to enable organisations to monitor and understand their organisation’s life on social media beyond those accounts they have created. This project is focused on ...
Funder: Scottish Funding Council | Value: £4,937

Seven Layer Communications Ltd

2000 - 2002
To develop and implement real time software and programmable logic elements to provide a powerful and flexible high performance test tool platform for telecommunications software and system test.
Funder: Innovate UK | Value: £71,140

MiiCard

2013 - 2013
The project has resulted in a software prototype which demonstrates miiCard tags.
Funder: Scottish Funding Council | Value: £5,000

Personal health data manager

2012 - 2013
This SE/RSE Enterprise Fellowship aimed to commercialise intellectual property owned by Edinburgh Napier University related to e-Health data management into an end-user product. The project paved the ...
Funder: Royal Society of Edinburgh | Value: £32,926

Project Quaisten

2014 - 2015
To develop a question generator API to pull information from the web, based on defined questions types, confirming correct answers and implementing a process of question difficulty based on metrics ab...
Funder: Scottish Funding Council | Value: £4,945

Post Graduate Cyber Security (PGCS) symposium

2016 - 2016
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas. It is a forum for early researchers to pres...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £800

Payment Cards and Mobile Technology

2015 - 2015
Comcarde is developing a mobile payments system called Bridge that uses a patent pending algorithm which is extremely resilient to man-in-the-middle attacks. Combined with strong authentication, we b...
Funder: Scottish Funding Council | Value: £5,000

Payfont, innovation voucher

2013 - 2015
SMART Grant proposal.
Funder: Scottish Funding Council | Value: £4,930

Payfont - PhD sponsorship -

2016 - 2018
Peter Aaby - PhD sponsorship
Value: £40,425

Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures

2011 - 2013
This project extends the e-Health Cloud-based Platform, and integrates with assisted living. The project integrates Edinburgh Napier University, Microsoft and HoIP, and has created a novel governance ...
Funder: Engineering and Physical Sciences Research Council | Value: £243,325
8 results

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments

2008 - 2012
The concept of context-awareness is widely used in mobile and pervasive computing t...
Dr Zakwan Jaroucheh | Director of Studies: Prof Xiaodong Liu | Second Supervisor: Prof Sally Smith

Test-bed and evaluation of a home-based adverse event prediction infrastructure

2013 - date
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Adrian Smales | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - date
Ms Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Forensic analysis of large capacity digital storage devices

2013 - 2017
Triage of large capacity digital devices
Philip Penrose | Director of Studies: Prof Bill Buchanan | Second Supervisor: Rich Macfarlane

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Evaluating individual engagement with e-Participation systems

2019 - date
Peter Cruickshank | Director of Studies: Prof Hazel Hall

Framework for evaluation of e-health platform and services

2010 - 2015
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...
Dr Owen Lo | Director of Studies: Prof Bill Buchanan | Second Supervisor: Prof Christoph Thuemmler
23 results

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

SOCLAB Launch

10 April 2018
Official launch of SOCLAB, the new SOC facility in Merchiston Campus

Dr. Zhiyuan Tan Invited to Deliver a Seminar on Internet of Things and Its Security at the Dongguan University of Technology, China, December 2017

12 December 2017
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...

Dr. Zhiyuan Tan Won The National Research Award 2017 from The Research Council of the Sultanate of Oman

12 November 2017
Dr. Zhiyuan Tan's research work entitled "Building an intrusion detection system using a filter-based feature selection algorithm" has been awarded by the The Research Council of the Sultanate of Oman...

Professor Opens Up on His Love of Edinburgh, Cryptography and Innovation

22 August 2017
In an interview with Inspired Edinburgh in The Victorian Townhouse, Professor Bill Buchanan outlined his career and his university, along with his love of his home city, cryptography and innovation. T...