9 results

Security issues of a publicly accessible cloud computing infrastructure.

Conference Proceeding
Russell, G., & Macfarlane, R. (2012)
Security issues of a publicly accessible cloud computing infrastructure. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 1210-1216. https://doi.org/10.1109/TrustCom.2012.259
Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accident...

Privacy Parameter Variation using RAPPOR on a Malware Dataset

Conference Proceeding
Aaby, P., Mata De Acuña, J. J., Macfarlane, R., & Buchanan, W. J. (2018)
Privacy Parameter Variation using RAPPOR on a Malware Dataset. In Proceedings of 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), (8). https://doi.org/10.1109/TrustCom/BigDataSE.2018.00133
Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of...

Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment

Conference Proceeding
Chacon, J., Mckeown, S., & Macfarlane, R. (2020)
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. https://doi.org/10.1109/CyberSecurity49315.2020.9138859
Attacks by Advanced Persistent Threats (APTs) have been shown to be difficult to detect using traditional signature-and anomaly-based intrusion detection approaches. Deception...

Review of e-Health Frameworks.

Conference Proceeding
Prajapati, B., Buchanan, W. J., Smales, A., Macfarlane, R., & Spyra, G. (2015)
Review of e-Health Frameworks. In Health Informatics Conference 2015
In order to improve the quality of health care and widen the accessibility, health care providers are consistently looking to inject information and communication technology t...

Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter.

Conference Proceeding
Buchanan, W. J., Macfarlane, R., & Clayton, J. (2013)
Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. In G. Weir, & M. Daley (Eds.), Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013)
There is a problem in the world of digital forensics. The demands on digital forensic investigators and resources will continue to increase as the use of computers and other e...

Evaluating Digital Forensic Tools (DFTs).

Conference Proceeding
Flandrin, F., Buchanan, W. J., Macfarlane, R., Ramsay, B. & Smales, A. (2013)
Evaluating Digital Forensic Tools (DFTs). In 7th International Conference : Cybercrime Forensics Education & TrainingISBN 9781909067158
This paper outlines the key methods used in the evaluation of digital forensics tools.

Student perception of on-line lectures with a blended learning environment.

Conference Proceeding
Buchanan, W. J., Macfarlane, R. & Ludwiniak, R. (2010)
Student perception of on-line lectures with a blended learning environment
Educational institutions are increasingly moving towards enhancing learning through the use of integrated information technology. Blended, or augmented, learning, aims to supp...

A forensic image description language for generating test images.

Conference Proceeding
Russell, G., Macfarlane, R. & Ludwiniak, R. (2011)
A forensic image description language for generating test images. In Proceedings of the 6th International Conference on Cybercrime Forensics Education & TrainingISBN 978-1-899253-94-4
Digital Forensics is a fast developing job market, as well as being topical and interesting, and as such is an area in which University students are keen to develop and study....

A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS).

Conference Proceeding
Buchanan, W. J., Flandrin, F., Macfarlane, R. & Graves, J. (2010)
A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). In Cyberforensics 2011
This paper defines a methodology for the evaluation of a Rate-based Intrusion Prevention System (IPS) for a Distributed Denial of Service (DDoS) threat. This evaluation system...