Password Pattern and Vulnerability Analysis for Web and Mobile Applications
Li, S., Romdhani, I., & Buchanan, W. (2016)
Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile ...
LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments
Kim, T., Kumar, G., Saha, R., Buchanan, W. J., Devgun, T., & Thomas, R. (2021)
LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments. IEEE Access, 9, 100972-100980. https://doi.org/10.1109/access.2021.3097267
There is an increasing drive to provide improved levels of trust within an Internet-of-Things (IoTs) environments, but the devices and sensors used tend to be limited in their...
Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs.
Buchanan, W. J., Graves, J., Bose, N., Macfarlane, R., Davison, B., & Ludwiniak, R. (2011)
Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. HEA ICS Conference,
This paper focuses on the integration of virtualised environments within the teaching of computer security and digital forensics, and includes three case studies. The first ca...
Blockchain for edge-enabled smart cities applications
Jan, M. A., Yeh, K., Tan, Z., & Wu, Y. (2021)
Blockchain for edge-enabled smart cities applications. Journal of Information Security and Applications, 61, 102937. https://doi.org/10.1016/j.jisa.2021.102937
The Internet of Things (IoT)-enabled devices are increasing at an exponential rate and share massive data generated in smart cities around the globe. The time-critical and del...
Minimising collateral damage: privacy-preserving Investigative data acquisition platform.
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2011)
Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach, 4, 12-31. https://doi.org/10.4018/jitsa.2011070102
Investigators define invasion of privacy during their operations as collateral damage. Inquiries that require gathering data about potential suspects from third parties, such ...
A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions
Saha, R., Geetha, G., Kumar, G., Buchanan, W. J., & Kim, T. (2021)
A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions. Applied Sciences, 11(17), https://doi.org/10.3390/app11178073
Cryptographic algorithms and functions should possess some of the important functional requirements such as: non-linearity, resiliency, propagation and immunity. Several previ...
Evaluation of Ensemble Learning for Android Malware Family Identification
Wylie, J., Tan, Z., Al-Dubai, A., & Wang, J. (2020)
Evaluation of Ensemble Learning for Android Malware Family Identification. Journal of Guangzhou University (Natural Science Edition), 19(4), 28-41
Every Android malware sample generally belongs to a specific family that performs a similar set of actions and characteristics. Having the ability to effectively identify Andr...
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, C., Mylonas, A., & Buchanan, W. J. (2021)
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. Journal of Cybersecurity and Privacy, 1(2), 252-273. https://doi.org/10.3390/jcp1020014
As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven In...
Enhancing Big Data Security with Collaborative Intrusion Detection
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014)
Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE cloud computing, 1(3), 27-33. https://doi.org/10.1109/mcc.2014.53
Big data, often stored in cloud networks, is changing our business models and applications. Rich information residing in big data is driving business decision making to be a d...
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...