Cryptography across industry sectors
Buchanan, W. J., Woodward, A., & Helme, S. (2017)
Cryptography across industry sectors. Journal of Cyber Security Technology, 1(3-4), 145-162. https://doi.org/10.1080/23742917.2017.1327221
Security adoption varies across industry sectors, where some companies such as Google, Apple and Microsoft are strong advocates of the adoption of HTTPS, while other companies...
Mitigating Disaster using Secure Threshold-Cloud Architecture
Ukwandu, E., Buchanan, W. J., & Russell, G. (2018)
Mitigating Disaster using Secure Threshold-Cloud Architecture. Current Trends in Computer Sciences & Applications, 1(2),
There are many risks in moving data into public cloud environments, along with an increasing threat around large-scale data leakage during cloud outages. This work aims to app...
Impact of cyberattacks on stock performance: a comparative study
Tweneboah-Kodua, S., Atsu, F., & Buchanan, W. (2018)
Impact of cyberattacks on stock performance: a comparative study. Information and Computer Security, 26(5), 637-652. doi:10.1108/ics-05-2018-0060
The study uses cyberattacks announcements on 96 firms that are listed on S&P 500 over the period January 03, 2013 and December 29, 2017.
The empirical analysis was performed i...
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment
Asif, R., & Buchanan, W. J. (2017)
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017, 1-10. https://doi.org/10.1155/2017/7616847
There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile...
Analysis of the adoption of security headers in HTTP.
Buchanan, W. J., Helme, S., Woodward, A., & Buchanan, B. (2018)
Analysis of the adoption of security headers in HTTP. IET Information Security, 12(2), 118-126. https://doi.org/10.1049/iet-ifs.2016.0621
With the increase in the number of threats within Web-based systems, a more integrated approach is required to ensure the enforcement of security policies from the server to t...
A methodology for the security evaluation within third-party Android Marketplaces
Buchanan, W. J., Chiale, S., & Macfarlane, R. (2017)
A methodology for the security evaluation within third-party Android Marketplaces. Digital Investigation, 23, 88-98. https://doi.org/10.1016/j.diin.2017.10.002
This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo localize the malware distribution over three main regions: China, Europe; and Russia...
Novel tracking of rogue network packets using danger theory approach
Uwagbole, S., Buchanan, W. J., & Fan, L. (2012)
Novel tracking of rogue network packets using danger theory approach. Proceedings of the ... international conference on information warfare and security, 277-286
Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hacking groups, such as Anonymous and Lulzsec. These groups often aim to disru...
Privacy and Trust Redefined in Federated Machine Learning
Papadopoulos, P., Abramson, W., Hall, A. J., Pitropakis, N., & Buchanan, W. J. (2021)
Privacy and Trust Redefined in Federated Machine Learning. Machine Learning and Knowledge Extraction, 3(2), 333-356. https://doi.org/10.3390/make3020017
A common privacy issue in traditional machine learning is that data needs to be disclosed for the training procedures. In situations with highly sensitive data such as healthc...
A Comparative Analysis of Honeypots on Different Cloud Platforms
Kelly, C., Pitropakis, N., Mylonas, A., McKeown, S., & Buchanan, W. J. (2021)
A Comparative Analysis of Honeypots on Different Cloud Platforms. Sensors, 21(7), https://doi.org/10.3390/s21072433
In 2019, the majority of companies used at least one cloud computing service and it is expected that by the end of 2021, cloud data centres will process 94% of workloads. The ...
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, C., Mylonas, A., & Buchanan, W. J. (2021)
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. Journal of Cybersecurity and Privacy, 1(2), 252-273. https://doi.org/10.3390/jcp1020014
As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven In...