Date


Output Type

Download Available

81 results

DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption

Journal Article
Khan, J. S., Boulila, W., Ahmad, J., Rubaiee, S., Rehman, A. U., Alroobaea, R., & Buchanan, W. J. (2020)
DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption. IEEE Access, 8, 159732-159744. https://doi.org/10.1109/access.2020.3020917
Visual selective image encryption can both improve the efficiency of the image encryption algorithm and reduce the frequency and severity of attacks against data. In this artic...

A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect

Journal Article
Kim, T., Kumar, G., Saha, R., Rai, M. K., Buchanan, W. J., Thomas, R., & Alazab, M. (2020)
A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect. IEEE Access, 8, 96455-96467. https://doi.org/10.1109/access.2020.2995481
Blockchain is a technology used with the series of users in peer-to-peer transactions to utilize the usability properties of the immutable data records. The distributed nature...

An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

Journal Article
Churcher, A., Ullah, R., Ahmad, J., Ur Rehman, S., Masood, F., Gogate, M., …Buchanan, W. J. (2021)
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks. Sensors, 21(2), Article 446. https://doi.org/10.3390/s21020446
In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices i...

Top 10 Blockchain Predictions for the (Near) Future of Healthcare

Journal Article
Halamka, J. D., Alterovitz, G., Buchanan, W. J., Cenaj, T., Clauson, K. A., Dhillon, V., …Ngo, A. L. (2019)
Top 10 Blockchain Predictions for the (Near) Future of Healthcare. Blockchain in Healthcare Today, 2, doi:10.30953/bhty.v2.106
To review blockchain lessons learned in 2018 and near-future predictions for blockchain in healthcare, Blockchain in Healthcare Today (BHTY) asked the world's blockchain in he...

Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication

Journal Article
Aziz Shah, S., Ahmad, J., Tahir, A., Ahmed, F., Russell, G., Shah, S. Y., …Abbasi, Q. H. (2020)
Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication. Micromachines, 11(4), https://doi.org/10.3390/mi11040379
Nano-scaled structures, wireless sensing, wearable devices, and wireless communications systems are anticipated to support the development of new next-generation technologies ...

CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure

Journal Article
Kim, T., Kumar, G., Saha, R., Alazab, M., Buchanan, W. J., Rai, M. K., …Thomas, R. (2020)
CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure. IEEE Access, 8, 94748-94756. https://doi.org/10.1109/access.2020.2995443
The increasing number of devices in the age of Internet-of-Thing (IoT) has arisen a number of problems related to security. Cryptographic processes, more precisely the signatu...

A Comparative Analysis of Honeypots on Different Cloud Platforms

Journal Article
Kelly, C., Pitropakis, N., Mylonas, A., McKeown, S., & Buchanan, W. J. (2021)
A Comparative Analysis of Honeypots on Different Cloud Platforms. Sensors, 21(7), https://doi.org/10.3390/s21072433
In 2019, the majority of companies used at least one cloud computing service and it is expected that by the end of 2021, cloud data centres will process 94% of workloads. The ...

E-Health: chances and challenges of distributed, service oriented architectures

Journal Article
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012)
E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,
Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remai...

A Blockchain Framework in Post-Quantum Decentralization

Journal Article
Saha, R., Kumar, G., Devgun, T., Buchanan, W., Thomas, R., Alazab, M., …Rodrigues, J. (in press)
A Blockchain Framework in Post-Quantum Decentralization. IEEE Transactions on Services Computing, https://doi.org/10.1109/tsc.2021.3116896
The decentralization and transparency have provided wide acceptance of blockchain technology in various sectors through numerous applications. The claimed security services by...

Formal security policy implementations in network firewalls.

Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012)
Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003
Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific ...