Research explorer tool

20 results

Date


School

People

Download Available

Dewey Decimal

545 results

Insider threat detection using principal component analysis and self-organising map

Conference Proceeding
Moradpoor, N., Brown, M., & Russell, G. (2017)
Insider threat detection using principal component analysis and self-organising map. In 10th International Conference on Security of Information and Networks (SIN 2017)https://doi.org/10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...

Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things

Conference Proceeding
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Paechter, B., & Qasem, M. (2016)
Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things. In Wireless Communications and Networking Conference (WCNC), 2016 IEEE, 1-6
Constrained Low-power and Lossy networks (LLNs) represent the building block for the ever-growing Internet of Things (IoT) that deploy the Routing Protocol for Low Power and L...

Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT

Conference Proceeding
Ghaleb, B., Al-Dubai, A., Romdhani, I., Nasser, Y., & Boukerche, A. (2017)
Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC), (1-6). https://doi.org/10.1109/icc.2017.7996819
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...

E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks

Conference Proceeding
Ghaleb, B., Al-Dubai, A., & Ekonomou, E. (2015)
E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)doi:10.1109/cit/iucc/dasc/picom.2015.168
Routing Protocol for Low Power and Lossy networks (RPL) is the de-facto standard for routing in resource-constrained low-power and lossy networks (LLNs) which represent the bu...

A new enhanced RPL based routing for Internet of Things

Conference Proceeding
Ghaleb, B., Al-Dubai, A., Ekonomou, E., & Wadhaj, I. (2017)
A new enhanced RPL based routing for Internet of Things. In 2017 IEEE International Conference on Communications, 1-6. https://doi.org/10.1109/ICCW.2017.7962723
The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the ...

Simultaneous context inference and mapping using mm-Wave for indoor scenarios

Conference Proceeding
Yassin, A., Nasser, Y., Awad, M., & Al-Dubai, A. (2017)
Simultaneous context inference and mapping using mm-Wave for indoor scenarios. In IEEE ICC 2017, (1-6). https://doi.org/10.1109/icc.2017.7996976
We introduce in this paper two main approaches, Triangulateration (TL) and Angle-Difference-of-Arrival (ADoA) for indoor localization and mapping using single-anchor and milli...

Resilient secret sharing cloud based architecture for data vault

Patent
Lanc, D., Fan, L., MacKinnon, L., & Buchanan, B. (2016)
Resilient secret sharing cloud based architecture for data vault
A method of securely storing data including: providing, within a secure data storage system, a plurality of secret sharing methods for selection and identifying a striping pol...

Performance evaluation of RPL metrics in environments with strained transmission ranges.

Conference Proceeding
Thomson, C., Wadhaj, I., Romdhani, I., & Al-Dubai, A. (2017)
Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)https://doi.org/10.1109/aiccsa.2016.7945687
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...

Analysis of the adoption of security headers in HTTP.

Journal Article
Buchanan, W. J., Helme, S., Woodward, A., & Buchanan, B. (2018)
Analysis of the adoption of security headers in HTTP. IET Information Security, 12(2), 118-126. https://doi.org/10.1049/iet-ifs.2016.0621
With the increase in the number of threats within Web-based systems, a more integrated approach is required to ensure the enforcement of security policies from the server to t...

Fingerprinting JPEGs With Optimised Huffman Tables

Journal Article
McKeown, S., Russell, G., & Leimich, P. (2018)
Fingerprinting JPEGs With Optimised Huffman Tables. Journal of Digital Forensics, Security and Law, 13(2), https://doi.org/10.15394/jdfsl.2018.1451
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...
102 results

Reliable Internet of Things based monitoring & Surveillance in Oil & Gas Fields (RsIoT)

2015 - 2017
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatically alter the world and the way we live and work. Indeed, in recent decades, the need ...
Value: £66,635

The truth about cybersecurity in 7 words (poster competition for women in cybersecurity)

2017 - 2017
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

Morgan Stanley: Security Analytics for Insider Threat Monitoring

2017 - 2017
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Funder: Data Lab | Value: £19,974

IoT Hardware Security Test Framework

2017 - 2018
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
Funder: Centre for Sensor and Imaging Systems | Value: £58,807

The truth about cybersecurity in 7 words – 2018 (poster competition in cybersecurity)

2018 - 2018
In a recent report by International Information System Security Certification Consortium (ISC)2, it is estimated there will be a global shortfall of 1.5 million cybersecurity professionals by 2019, so...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

Trisent: Innovation Voucher for Personal Context Data Project

2018 - 2018
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project. Trisent’s core technology is called the Personal Context Management System (PCM...
Funder: Scottish Funding Council | Value: £5,000

Eyecademy: Innovation Voucher for Food Provenance

2018 - 2018
This project will focus on the building of a food provenance platform based on distributed ledger technologies
Funder: Scottish Funding Council | Value: £5,000

Hypervine: Innovation Voucher Construction Site Safety Enhancement

2018 - 2018
This focuses on the use of distributed ledger technologies to manage both compliance events such as signing off on work and also document management
Funder: Scottish Funding Council | Value: £5,000

Next Generation Connectivity with Health and Well-being

2018 - 2021
This project will investigate existing consumer tech, IOT and connectivity capabilities for simulation activities. Napier and DHI will explore a range of technologies that can connect to DHI’s simul...
Funder: Digital Health Institute | Value: £69,355

Critical Infrastructure Protection & ICT Gender Equality (Women in IT) Guest Speaker's Travel Grant

2018 - 2018
1st event: a speaker for the Cyber Security Conference (Critical Infrastructure Protection) (200 words): Industrial Control Systems(ICS) are widely used in critical infrastructure such as nuclear pow...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £600
8 results

Test-bed and evaluation of a home-based adverse event prediction infrastructure

2013 - date
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Adrian Smales | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

Adaptive energy management mechanisms for clustering based routing wireless sensor networks

2013 - 2017
"The development of science and technology are increasingly affecting and changing the nature of processes in...
Mr Mohamed Eshaftri | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

Forensic analysis of large capacity digital storage devices

2013 - 2017
Triage of large capacity digital devices
Philip Penrose | Director of Studies: Prof Bill Buchanan | Second Supervisor: Rich Macfarlane

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Mobile User Authentication System (MUAS) for e-commerce applications

2009 - 2017
Rania Molla | Director of Studies: Dr Imed Romdhani | Second Supervisor: Prof Bill Buchanan

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - date
Ms Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Framework for evaluation of e-health platform and services

2010 - 2015
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...
Dr Owen Lo | Director of Studies: Prof Bill Buchanan | Second Supervisor: Prof Christoph Thuemmler
22 results

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

Dr. Zhiyuan Tan Invited to Deliver a Seminar on Internet of Things and Its Security at the Dongguan University of Technology, China, December 2017

12 December 2017
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...

Dr. Zhiyuan Tan Won The National Research Award 2017 from The Research Council of the Sultanate of Oman

12 November 2017
Dr. Zhiyuan Tan's research work entitled "Building an intrusion detection system using a filter-based feature selection algorithm" has been awarded by the The Research Council of the Sultanate of Oman...

Professor Opens Up on His Love of Edinburgh, Cryptography and Innovation

22 August 2017
In an interview with Inspired Edinburgh in The Victorian Townhouse, Professor Bill Buchanan outlined his career and his university, along with his love of his home city, cryptography and innovation. T...

University Spin-out - Zonefox - Launches Ambitious Expansion Plans

21 August 2017
Zonefox, a spin-out of The Cyber Academy within the School of Computing at Edinburgh Napier University, officially launched their move into new offices in Edinburgh. They have moved from CodeBase into...