18 results

Date


People

Download Available

Dewey Decimal

614 results

Building a new nation: risk, goverance and trust.

Presentation / Conference
Buchanan, W. J. (2013, January)
Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.

Advanced persistent threat and Insiders.

Presentation / Conference
Buchanan, W. J. (2015, January)
Advanced persistent threat and Insiders. Paper presented at Advanced Persistent Threat, London
With an increase in the range and mobility of devices which connect to the network, there are now so many opportunities for intruders to compromise systems. Leading with the r...

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022)
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291
E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evo...

Security and Routing Scoped IP Multicast Addresses

Conference Proceeding
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009)
Security and Routing Scoped IP Multicast Addresses. In International Conference on Parallel Processing Workshops, 2009. ICPPW '09. , (228-235). https://doi.org/10.1109/icppw.2009.81
IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandw...

HI-risk: A method to analyse health information risk intelligence

Conference Proceeding
Buchanan, W. J., & van Deursen, N. (2016)
HI-risk: A method to analyse health information risk intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)https://doi.org/10.1109/healthcom.2016.7749536
Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to securi...

A new adaptive probabilistic broadcast protocol for vehicular networks

Conference Proceeding
Al-Dubai, A. Y., Khalaf, M. B., Gharibi, W., & Ouenniche, J. (2015)
A new adaptive probabilistic broadcast protocol for vehicular networks. In 2015 IEEE 81st Vehicular Technology Conference (VTC Spring 2015) (4 Vols), (2875-2879). https://doi.org/10.1109/VTCSpring.2015.7145627
In VANETs, there are many applications that use broadcast communication as a fundamental operational tool, in disseminating information of interest to other road users under t...

Embedded document security using sticky policies and identity based encryption

Thesis
Spyra, G. K. Embedded document security using sticky policies and identity based encryption. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2090564
Data sharing domains have expanded over several, both trusted and insecure environments. At the same time, the data security boundaries have shrunk from internal network perim...

Cyber security challenges for cloud based services.

Presentation / Conference
Buchanan, W. J. (2015, June)
Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh
Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud

Who would you trust to identify you in accessing your health record?

Conference Proceeding
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. (2013)
Who would you trust to identify you in accessing your health record?
Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper ou...

Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications

Journal Article
Yassin, A., Nasser, Y., Awad, M., Al-Dubai, A., Liu, R., Yuen, C., …Aboutanios, E. (2017)
Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications. Communications Surveys and Tutorials, IEEE Communications Society, 19(2), 1327-1346. https://doi.org/10.1109/comst.2016.2632427
Nowadays, the availability of the location information becomes a key factor in today’s communications systems for allowing location based services. In outdoor scenarios, the M...

Date


131 results

Software-Hardware Ecosystems for AI Edge Devices (SHE)

2022 - 2023
AI hardware solutions are only useful if they’re compatible with all other layers of the technology stack, including the solutions and use cases in the services layer. Researchers in AI hardware can t...
Funder: Royal Academy of Engineering | Value: £32,700

TrustShare: Privacy-Preserving And Trusted Threat Intelligence Sharing Using Distributed Ledgers

2023 - 2024
Organisations are facing an increasing number of cyber threats, which is making it evident that relying solely on security tools and technologies may fail to identify emerging threats, malware, and ot...
Funder: Innovate UK | Value: £31,386

TRUST AND PRIVACY PRESERVING COMPUTING PLATFORM FOR CROSSBORDER FEDERATION OF PERSONAL DATA

2022 - 2025
As we live in a data-driven era, the emergence of interdisciplinary, geographically dispersed, data repositories, is inevitable. The fact that these repositories do not necessarily abide with existing...
Funder: UK Research and Innovation | Value: £310,843

Cloud-based Cash-flow Project

2012 - 2012
IIDI is working with Level10 Ltd on a new project awarded under the SFC Innovation Voucher scheme
Funder: Scottish Funding Council | Value: £5,000

Infrastructure and Software Prototypes for Collabrorative Arts Projects

2009 - 2009
The Air Iomlaid (On Exchange) project was conceived by artist Julie Brook and Johnny Gailey, Programme Manager for Children and Young People for The Fruitmarket Gallery.   Alistair Lawson  from Centr...
Value: £1,275

International Conference Grant

2009 - 2009
International Travel
Funder: Royal Society of Edinburgh | Value: £1,000

Pro-talk

2013 - 2014
This IIDI project led by Alistair Lawson,  Pro-talk, is investigating the development of an online analysis software API to enable feedback to be given aimed at helping learners of English for Speaker...
Funder: Innovate UK | Value: £40,967

Information Sharing between the Police and their Community Partners

2008 - 2011
This is a three year PhD award from the SIPR (Scottish Institute for Policing Research) and focuses on creating new models for information sharing between the police and their community partners.
Funder: Scottish Institute for Policing Research | Value: £30,000

e-Health Security Infrastructure Evaluation

2012 - 2012
IIDI is working with Patient Reminders Limited supported the SFC Innovation Voucher scheme.  Patient Reminders Limited provides patient reminder products and solutions for use in clinical studies, ph...
Funder: Scottish Funding Council | Value: £4,979

FI STAR

2013 - 2015
New ideas are on the way to make healthcare more accurate, more affordable and matching the needs of our changing societies. Demographic changes, progress in technology and in medicine offer options t...
Funder: European Commission | Value: £532,920

Date


Qualification level

11 results

Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives

2019 - 2021
This work is concerned with the information practices associated with hyperlocal representation. The fin...
Dr Peter Cruickshank | Director of Studies: Prof Hazel Hall | Second Supervisor: Dr Kendall Richards

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

A closer look at adaptation mechanisms in simulated environment-driven evolutionary swarm robotics

2013 - 2018
Swarm robotics is a special case within the general field of robotics. The distributed nature makes it...
Dr Andreas Steyven | Director of Studies: Prof Emma Hart | Second Supervisor: Prof Ben Paechter

Test-bed and evaluation of a home-based adverse event prediction infrastructure

2013 - 2021
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Adrian Smales | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

Adaptive energy management mechanisms for clustering based routing wireless sensor networks

2013 - 2017
"The development of science and technology are increasingly affecting and changing the nature of processes in...
Mr Mohamed Eshaftri | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - 2021
Dr Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Mobile User Authentication System (MUAS) for e-commerce applications

2009 - 2017
Rania Molla | Director of Studies: Dr Imed Romdhani | Second Supervisor: Prof Bill Buchanan

Forensic analysis of large capacity digital storage devices

2013 - 2017
Triage of large capacity digital devices
Philip Penrose | Director of Studies: Prof Bill Buchanan | Second Supervisor: Rich Macfarlane

Forensic verification of operating system activity via novel data, acquisition and analysis techniques

2005 - 2009
Dr Jamie Graves | Director of Studies: Prof Bill Buchanan | Second Supervisor: L. John Old
26 results

Promising cyber security project supported by new Scottish Enterprise funding

20 September 2022
TrueDeploy, an exciting project from the School of Computing, Engineering & the Built Environment (SCEBE) at Edinburgh Napier University (ENU), has secured £199,952 in additional support from Scottish...

Double funding success for School of Computing

21 March 2022
Two projects from Edinburgh Napier’s acclaimed School of Computing have won funding from a programme which develops innovative cyber security ideas for the commercial market. TrueDeploy and Trustd ar...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

Dr. Zhiyuan Tan Invited to Deliver a Seminar on Internet of Things and Its Security at the Dongguan University of Technology, China, December 2017

12 December 2017
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...

Dr. Zhiyuan Tan Won The National Research Award 2017 from The Research Council of the Sultanate of Oman

12 November 2017
Dr. Zhiyuan Tan's research work entitled "Building an intrusion detection system using a filter-based feature selection algorithm" has been awarded by the The Research Council of the Sultanate of Oman...