Explore our research

Date


School

Output Type

Download Available

26 results

Reverse engineering through formal abstraction.

Presentation / Conference
Liu, X. (1998, January)
Reverse engineering through formal abstraction. Paper presented at Post-graduate Conference, De Montfort University, Leicester, UK
No abstract available.

Refactoring data transforms in MaTSE for flexibility.

Presentation / Conference
Craig, P., & Kennedy, J. (2009, October)
Refactoring data transforms in MaTSE for flexibility
In early prototypes of the Microarray Time-series Explorer (MaTSE) data transforms were tightly coupled with visualisation components. While this allowed us to achieve our ini...

Innovation in cloud environments.

Presentation / Conference
Buchanan, W. J. (2012, June)
Innovation in cloud environments. Paper presented at Future of Technology, Royal Society of Edinburgh
This presentation outlines the future of technology.

Advanced persistent threat and Insiders.

Presentation / Conference
Buchanan, W. J. (2015, January)
Advanced persistent threat and Insiders. Paper presented at Advanced Persistent Threat, London
With an increase in the range and mobility of devices which connect to the network, there are now so many opportunities for intruders to compromise systems. Leading with the r...

A scaleable and trusted e-Health eco-system: safi.re

Presentation / Conference
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April)
A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013, European Commission, Brussels
At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main component...

Cyber security in practice: identifying areas of vulnerability.

Presentation / Conference
Buchanan, W. J., & Smales, A. (2015, February)
Cyber security in practice: identifying areas of vulnerability. Paper presented at Scot-Secure 2015, Holyrood, Edinburgh
Areas covered include: - Using penetration testing to highlight areas of weakness - Practical steps for improving the security of your organisation.

Creating engaging and stimulating Web based material

Presentation / Conference
Buchanan, W. J. (2014, January)
Creating engaging and stimulating Web based material. Presented at LTT 2014, Holyrood, Edinburgh
This presentation outlines the collaboration between Edinburgh Napier University and Bright Red Publishing

The challenges of Big Data: future risks, governance and trust.

Presentation / Conference
Buchanan, W. J. (2013, March)
The challenges of Big Data: future risks, governance and trust. Paper presented at The Future of Cyber Security 2013, London, UK
The emphasis in computer security is moving from end point security towards data controls, and this is becoming an increasing threat as we move into an era build around Big Da...

Vulnerability analysis.

Presentation / Conference
Buchanan, W. J. (2015, May)
Vulnerability analysis. Presented at Advanced Threat Protection, Glazier's Hall, London
The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the bigge...

D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures.

Presentation / Conference
Buchanan, W. J., & Macfarlane, R. (2011, June)
D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures. Paper presented at Scottish Higher Education Employability Conference: Strengthening Partnerships with Employers, Heriot-Watt, Edinburgh
The use of virtualised and cloud-based environments provide an excellent opportunity to enhance learning and to provide students with skills which match exactly to the require...