Research explorer tool

24 results

System and method for management of confidential data

Patent
Buchanan, B., Lo, O., Macfarlane, R., Penrose, P., & Ramsay, B. (in press)
System and method for management of confidential data. GB2561176A
This application is for a method of data management to identify confidential digital content on a database by first receiving a management request 302 from a system 304 to car...

Method for identification of digital content

Patent
Buchanan, B., Lo, O., Penrose, P., Ramsay, B., & Macfarlane, R. (2018)
Method for identification of digital content. World Intellectual Property Organization
Many areas oi investigation require searching through data that may be oi interest. One example oi data that may be involved in an investigation is copyrighted material that m...

Fast contraband detection in large capacity disk drives.

Journal Article
Penrose, P., Buchanan, W. J., & Macfarlane, R. (2015)
Fast contraband detection in large capacity disk drives. Digital Investigation, 12(S1), S22-S29. https://doi.org/10.1016/j.diin.2015.01.007
In recent years the capacity of digital storage devices has been increasing at a rate that has left digital forensic services struggling to cope. There is an acknowledgement t...

Evaluation of the DFET Cloud.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September)
Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...

Formal security policy implementations in network firewalls.

Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012)
Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003
Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific ...

Evaluating Digital Forensic Tools (DFTs).

Conference Proceeding
Flandrin, F., Buchanan, W. J., Macfarlane, R., Ramsay, B. & Smales, A. (2013)
Evaluating Digital Forensic Tools (DFTs). In 7th International Conference : Cybercrime Forensics Education & TrainingISBN 9781909067158
This paper outlines the key methods used in the evaluation of digital forensics tools.

Security issues of a publicly accessible cloud computing infrastructure.

Conference Proceeding
Russell, G., & Macfarlane, R. (2012)
Security issues of a publicly accessible cloud computing infrastructure. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 1210-1216. https://doi.org/10.1109/TrustCom.2012.259
Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accident...

Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter.

Conference Proceeding
Buchanan, W. J., Macfarlane, R., & Clayton, J. (2013)
Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. In G. Weir, & M. Daley (Eds.), Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013)
There is a problem in the world of digital forensics. The demands on digital forensic investigators and resources will continue to increase as the use of computers and other e...

D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures.

Presentation / Conference
Buchanan, W. J., & Macfarlane, R. (2011, June)
D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures. Paper presented at Scottish Higher Education Employability Conference: Strengthening Partnerships with Employers, Heriot-Watt, Edinburgh
The use of virtualised and cloud-based environments provide an excellent opportunity to enhance learning and to provide students with skills which match exactly to the require...

Embedding programming skills to support the student journey in networking, security and digital forensics.

Presentation / Conference
Lawson, A., & Macfarlane, R. (2014, April)
Embedding programming skills to support the student journey in networking, security and digital forensics. Paper presented at HEA STEM Annual Learning and Teaching Conference 2014: Enhancing the STEM Student Journey, University of Edinburgh, Edinburgh
The development of programming skills by Networking graduates, and Security and Digital Forensics graduates is highly sought after by employers, both in industry, and in acade...
6 results

vSOC - Virtualised Security Operations Centre

2015 - 2017
The proposal aims to build a Virtualised Security Operation Center [vSoC] and integrates into a currently operating virtualized cyber security Cloud infrastructure (DFET), and use state-of-theart syst...
Funder: Higher Education Academy | Value: £39,268

KTP Payfont Ltd

2015 - 2017
To create the ability in Payfont to research and deliver, using Universal Design principles and processes based on BS8878, the optimal secure user experience (UX) in secure transactions
Funder: Innovate UK | Value: £135,030

KTP Farrpoint

2014 - 2016
To develop the prototype for a next-generation security platform with advanced detection capabilities.
Funder: Innovate UK | Value: £119,363

Fragment Finder

2015 - 2016
Fragment Finder (FF) enables a new, high-speed approach to digital forensics. It is unique in that it will build a more efficient technical architecture for the creation, storage and use of hash signa...
Funder: Scottish Enterprise | Value: £228,757

Morgan Stanley: Security Analytics for Insider Threat Monitoring

2017 - 2017
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Funder: Data Lab | Value: £19,974

Virtualised Security Operations Centre (vSoC) KTP

2017 - 2019
The aim of this KTP project is to create a completely scripted environment for the creation of advanced cyber security training, using scripted scenarios for the creation of training elements, and pro...
Funder: Innovate UK | Value: £136,306