Research explorer tool

Date


School

Download Available

34 results

The Prometheus II Description Model: an objective approach to representing taxonomic descriptions

Working Paper
MacDonald, S. M., Raguenaud, C., Pullan, M. R., Kennedy, J., Russell, G., & Watson, M. F. The Prometheus II Description Model: an objective approach to representing taxonomic descriptions

)
MacDonald, S. M., Raguenaud, C., Pullan, M. R., Kennedy, J., Russell, G., & Watson, M. F. The Prometheus II Description Model: an objective approach to representing taxonomic descriptions
A model for improving the storage and communication of plant descriptions is presented. The model is flexible and yet reduces the ambiguity often present in text descriptions....

Machine learning and semantic analysis of in-game chat for cyber bullying

Journal Article
Murnion, S., Buchanan, W. J., Smales, A., & Russell, G. (2018)
Machine learning and semantic analysis of in-game chat for cyber bullying. Computers and Security, 76, 197-213. https://doi.org/10.1016/j.cose.2018.02.016
One major problem with cyberbullying research is the lack of data, since researchers are traditionally forced to rely on survey data where victims and perpetrators self-report...

Sub-file Hashing Strategies for Fast Contraband Detection

Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2018)
Sub-file Hashing Strategies for Fast Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)https://doi.org/10.1109/CyberSecPODS.2018.8560680
Traditional digital forensics processes do not scale well with the huge quantities of data present in a modern investigation, resulting in large investigative backlogs for man...

Reducing the Impact of Network Bottlenecks on Remote Contraband Detection

Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2018)
Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)https://doi.org/10.1109/CyberSecPODS.2018.8560671
Cloud based storage is increasing in popularity, with large volumes of data being stored remotely. Digital forensics investigators examining such systems remotely are limited ...

SQL Hacks. Tips and tools for digging into your data.

Book
Cumming, A., & Russell, G. (2007)
SQL Hacks. Tips and tools for digging into your data. O'Reilly
...SQL Hacks reveals the secrets that database experts use to dig through their data and get the answers they need. It includes 100 hacks for sorting, sifting, shuffling, and ...

Teaching penetration and malware analysis in a cloud-based environment.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June)
Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...

Performance Evaluation of a Fragmented Secret Share System

Conference Proceeding
Ukwandu, E., Buchanan, W. J., & Russell, G. (2017)
Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)https://doi.org/10.1109/cybersa.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...

Fast Filtering of Known PNG Files Using Early File Features

Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2017)
Fast Filtering of Known PNG Files Using Early File Features. In Proceedings of the Conference on Digital Forensics, Security and Law
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...

Real-time monitoring of privacy abuses and intrusion detection in android system.

Conference Proceeding
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015)
Real-time monitoring of privacy abuses and intrusion detection in android system. In Human Aspects of Information Security, Privacy, and Trust, (379-390). https://doi.org/10.1007/978-3-319-20376-8_34
In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the mali...

Architectures for persistence

Journal Article
Russell, G., & Cockshott, W. P. (1993)
Architectures for persistence. Microprocessors and Microsystems, 17(3), 117-130. https://doi.org/10.1016/0141-9331%2893%2990042-6
Persistent object oriented architectures have been researched for many years, deriving initially from the Manchester University Atlas machine. In reality, however, few actual ...
6 results

Prometheus II: Capturing and Relating Character Concept Definitions in Plant Taxonomy

2001 - 2004
Taxonomy has been described as “the science of documenting biodiversity”, which involves collecting, naming, describing, identifying and classifying specimens of organisms. Descriptions are the fundam...
Funder: Biotechnology and Biological Sciences Research Council | Value: £128,444

vSOC - Virtualised Security Operations Centre

2015 - 2017
The proposal aims to build a Virtualised Security Operation Center [vSoC] and integrates into a currently operating virtualized cyber security Cloud infrastructure (DFET), and use state-of-theart syst...
Funder: Higher Education Academy | Value: £39,268

MEMCRYPT CyberASAP Phase 2

2020 - 2021
Ransomware is a form of malicious software that blocks user access to data by encrypting files. A user is then required to pay the attacker a sum of money to receive the encryption artefacts and start...
Funder: Innovate UK | Value: £52,310

MemoryCrypt

2019 - 2020
The usage of encryption keys is an important aspect in preserving privacy in communications. Increasingly these communications are protected using SSL/TLS methods. Along with this, there is a general ...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £10,759

Memcrypt (HGSP)

2020 - 2021
Memcrypt focuses on new ways of detecting the usage encryption keys, and has a focus on addressing ransomware.
Funder: Scottish Enterprise | Value: £109,883

MemCrypt

2020 - 2020
At the core of the work is to addresses risks related to the leakage of encryption keys, and which can lead to data loss issues and trust breaches. Along with detecting keys in memory, the team has de...
Funder: Innovate UK | Value: £31,930