Two evolutionary approaches to cross-clustering problems.
Luchian, H., Paechter, B., Radulescu, V., & Luchian, S. (1999)
Two evolutionary approaches to cross-clustering problems. In Proceedings of the 1999 Congress on Evolutionary Computation, (860-870). https://doi.org/10.1109/CEC.1999.782514
Cross-clustering asks for a Boolean matrix to
be brought to a quasi-canonical form. The problem has
many applications in image processing, circuit design,
Investigating communicating sequential processes for Java to support ubiquitous computing
Chalmers, K. (2009)
Investigating communicating sequential processes for Java to support ubiquitous computing. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3507
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via computational elements. These elements are designed to augment and su...
Approaches to the classification of high entropy file fragments.
Penrose, P., Macfarlane, R., & Buchanan, W. J. (2013)
Approaches to the classification of high entropy file fragments. Digital Investigation, 10(4), 372-384. https://doi.org/10.1016/j.diin.2013.08.004
In this paper we propose novel approaches to the problem of classifying high entropy file fragments. We achieve 97% correct classification for encrypted fragments and 78% for ...
Is stereotyping inevitable when designing with personas?
Turner, P., & Turner, S. (2011)
Is stereotyping inevitable when designing with personas?. Design Studies, 32, 30-44. https://doi.org/10.1016/j.destud.2010.06.002
User representations are central to user-centred design, personas being one of the more recent developments. However, such descriptions of people risk stereotyping. We review ...
In cybersecurity, the weakest link is … you
Buchanan, W. J. (2014)
In cybersecurity, the weakest link is … you
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat ...
Will quantum computers be the end of public key encryption?
Buchanan, W., & Woodward, A. (2016)
Will quantum computers be the end of public key encryption?. Journal of Cyber Security Technology, 1(1), 1-22. https://doi.org/10.1080/23742917.2016.1226650
The emergence of practical quantum computers poses a significant threat to the most popular public key cryptographic schemes in current use. While we know that the well-unders...
From crime to court - an experience report of a digital forensics group project module.
Presentation / Conference
Leimich, P., Ferguson, I., & Coull, N. (2014, November)
From crime to court - an experience report of a digital forensics group project module. Paper presented at HEA Teaching Computer Forensics Workshop, Sunderland, UK
This paper discusses the large-scale group project undertaken by BSc Hons Digital Forensics
students at Abertay University in their penultimate year. The philosophy of the pro...
Distributed healthcare framework using patient-centric role-based security modelling and workflow
Symes, M. (2008)
Distributed healthcare framework using patient-centric role-based security modelling and workflow. (Dissertation). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4008
Healthcare professionals are spending less time with patients and more time on administrative duties (Royal College of Nursing, 2008). This is due to a high bureaucratic deman...
Trust-aware and Cooperative Routing Protocol for IoT Security
Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2020)
Trust-aware and Cooperative Routing Protocol for IoT Security. Journal of Information Security and Applications, 52, https://doi.org/10.1016/j.jisa.2020.102467
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification prov...
Identifying Vulnerabilities Using Internet-wide Scanning Data
O'Hare, J., Macfarlane, R., & Lo, O. (2019)
Identifying Vulnerabilities Using Internet-wide Scanning Data. In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), (1-10). https://doi.org/10.1109/ICGS3.2019.8688018
Internet-wide scanning projects such as Shodan and Censys, scan the Internet and collect active reconnaissance results for online devices. Access to this information is provid...