Date


School

Download Available

37 results

Analysis and migration of location-finding methods for GSM and 3G networks.

Conference Proceeding
Buchanan, W. J., Munoz, J., Manson, R., & Raja, K. A. (2004)
Analysis and migration of location-finding methods for GSM and 3G networks. https://doi.org/10.1049/cp%3A20040695
This paper initially reviews the current range of location techniques on GSM networks, such as Cell-ID, GPS, AGPS, time difference of arrival (TDOA) and E-OTD (enhanced observ...

PyDentity: A playground for education and experimentation with the hyperledger verifiable information exchange platform

Journal Article
Abramson, W., Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (2021)
PyDentity: A playground for education and experimentation with the hyperledger verifiable information exchange platform. Software Impacts, 9, https://doi.org/10.1016/j.simpa.2021.100101
PyDentity lowers the entry barrier for parties interested in experimenting with the Hyperledger’s verifiable information exchange platform. It enables educators, developers an...

Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain

Journal Article
Buchanan, B., & Naqvi, N. (2018)
Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain. The Journal of the British Blockchain Association, 1(1), 1-4
A blockchain enabled 'Digital Single Economy " can act as a catalyst for growth and could provide a platform where borderless innovative practices will thrive and create a tru...

Enhanced Methods of Coursework Provision in Computer Networks.

Conference Proceeding
Buchanan, W. J., & Saliou, L. (2005)
Enhanced Methods of Coursework Provision in Computer Networks. In ITRE 2004. 2nd International Conference Information Technology: Research and Education, 111-115. https://doi.org/10.1109/ITRE.2004.1393657
Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from ...

An agent based Bayesian forecasting model for enhanced network security.

Conference Proceeding
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001. , (247-254). https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Conference Proceeding
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2019)
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In 2018 IEEE International Conference on Big Data (Big Data)https://doi.org/10.1109/BigData.2018.8621922
Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exis...

Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study

Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...

Distance Measurement Methods for Improved Insider Threat Detection

Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...

Applied PC interfacing, graphics and interrupts.

Book
Buchanan, W. J. (1995)
Applied PC interfacing, graphics and interrupts. Addison Wesley
Using good practical examples, this new book introduces the reader to the component parts of a PC, showing how high and low level languages communicate with them, and how comp...

Technical evaluation of an e-health platform.

Conference Proceeding
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012)
Technical evaluation of an e-health platform. In M. Macedo (Ed.), Proceedings of the IADIS International Conference e-Health 2012
Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation...