Research explorer tool

Date


School

People

Download Available

215 results

An Integrated Cloud-based Healthcare Infrastructure.

Conference Proceeding
Ekonomou, E., Fan, L., Buchanan, W. J., & Thuemmler, C. (2011)
An Integrated Cloud-based Healthcare Infrastructure. In 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), (532-536). https://doi.org/10.1109/CloudCom.2011.80
We present a cloud-based healthcare system that integrates a formal care system (DACAR) with an informal care system (Microsoft HealthVault). The system provides high levels o...

An intelligent agent security intrusion system

Conference Proceeding
Pikoulas, J., Buchanan, W., Mannion, M., & Triantafyllopoulos, K. (2001)
An intelligent agent security intrusion system. In Proceedings Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 94 - 99. doi:10.1109/ecbs.2002.999827
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly secu...

An agent-based Bayesian method for network intrusion detection.

Thesis
Pikoulas, J. (2003)
An agent-based Bayesian method for network intrusion detection. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4057
Security is one of the major issues in any network and on the Internet. It encapsulates many different areas, such as protecting individual users against intruders, protecting...

An agent based Bayesian forecasting model for enhanced network security.

Conference Proceeding
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001, 247 - 254. https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...

Ashley Madison breach reveals the rise of the moralist hacker

Other
Buchanan, W. J. (2015)
Ashley Madison breach reveals the rise of the moralist hacker
There’s value in more than just credit card data, as Avid Life Media (ALM), parent company of the extramarital affair website Ashley Madison, has found out after being raided ...

Approaches to the classification of high entropy file fragments.

Journal Article
Penrose, P., Macfarlane, R., & Buchanan, W. J. (2013)
Approaches to the classification of high entropy file fragments. Digital Investigation, 10(4), 372-384. https://doi.org/10.1016/j.diin.2013.08.004
In this paper we propose novel approaches to the problem of classifying high entropy file fragments. We achieve 97% correct classification for encrypted fragments and 78% for ...

A next generation Cloud-based health care platform.

Presentation / Conference
Buchanan, W. J. (2011, May)
A next generation Cloud-based health care platform. Paper presented at Innovation in Healthcare, London
This presentation outlines a novel Cloud-based e-Health Platform which integrates security within every single transaction. It involves a TSB/EPSRC funded project with Edinbur...

A framework to detect novel computer viruses via system calls.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2005)
A framework to detect novel computer viruses via system calls. In M. Merabti, R. Pereira, & O. Abuelma'atti (Eds.), 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting, 308-313
This paper describes a framework for detecting self-propagating email viruses based on deterministic system calls derived from associated email client’s dynamic link libraries...

Advanced persistent threat and Insiders.

Presentation / Conference
Buchanan, W. J. (2015, January)
Advanced persistent threat and Insiders. Paper presented at Advanced Persistent Threat, London
With an increase in the range and mobility of devices which connect to the network, there are now so many opportunities for intruders to compromise systems. Leading with the r...

Advanced security and network forensics: Introduction.

Other
Buchanan, W. J. (2011)
Advanced security and network forensics: Introduction. Edinburgh Napier University
1.1 Objectives 1.2 Introduction 1.3 Security Taxonomy 1.4 Threats Hardware misuse Environmental risks External misuse Pests Active misuse Passive misuse Masquerading...