Research explorer tool

Date


People

Download Available

Dewey Decimal

672 results

Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem.

Conference Proceeding
Akram, R. N., Markantonakis, K., & Mayes, K. (2012)
Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem. In S. Xie (Ed.), 8th International Conference on Computational Intelligence and Security (CIS 2012), 646-652. https://doi.org/10.1109/CIS.2012.149
In late 1990s. the multi-application initiative was put forward to have multiple applications on a single smart card. This would have enabled a cardholder to accumulate all of...

BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC.

Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017)
BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems Architectures, Security, and Applications, (317-335). CHAM: Springer
The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the...

Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach

Conference Proceeding
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015)
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. In M. Ganzha, L. Maciaszek, & M. Paprzycki (Eds.), Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, (1267-1272). https://doi.org/10.15439/2015F118
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the de...

Better locks to secure our data are the inevitable result of too many prying eyes

Other
Buchanan, W. J. (2014)
Better locks to secure our data are the inevitable result of too many prying eyes
Robert Hannigan, the new head of British signals intelligence agency GCHQ, has accused technology companies of aiding terrorists and criminals by providing them secure communi...

Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report

Conference Proceeding
Al-Dubai, A., & Ould-Khaoua, M. (2002)
Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report. In Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210), 155-162. https://doi.org/10.1109/IPCCC.2001.918648
Broadcast is an important collective communication operation required by many real-world parallel applications. This paper proposes the Coded Path Routing (or CPR for short) a...

Cloud-based identity and identity meta-data: secure and control own data in globalization era.

Journal Article
Spyra, G., Buchanan, W. J., Cruickshank, P., & Ekonomou, E. (2014)
Cloud-based identity and identity meta-data: secure and control own data in globalization era. International Journal of Reliable and Quality E-Healthcare, 3, https://doi.org/10.4018/ijrqeh.2014010105
This paper proposes a new identity, and its underlying meta-data, model. The approach enables secure spanning of identity meta-data across many boundaries such as health-care,...

Case Study: moving towards an e-health platform to store NHS patient Information in the cloud.

Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., & Thuemmler, C. (2012, February)
Case Study: moving towards an e-health platform to store NHS patient Information in the cloud. Paper presented at Cloud Computing in the Public Sector: The Way Forward, London
Case Study: Moving Towards an e-health Platform to Store NHS Patient Information in the Cloud The NHS pilot scheme to store patient information in the Cloud How can the health...

Evaluation of Ensemble Learning for Android Malware Family Identification

Journal Article
Wylie, J., Tan, Z., Al-Dubai, A., & Wang, J. (2020)
Evaluation of Ensemble Learning for Android Malware Family Identification. Journal of Guangzhou University (Natural Science Edition), 19(4), 28-41
Every Android malware sample generally belongs to a specific family that performs a similar set of actions and characteristics. Having the ability to effectively identify Andr...

The future of computer science education and observations from on-line learning.

Presentation / Conference
Buchanan, W. J. (2014, January)
The future of computer science education and observations from on-line learning. Paper presented at Higher Computing Science National Qualifications Support, Edinburgh
This session will look at the opportunities at the present time and in the future for Computing, and provide key pointer to the skills that are required to undertake a career ...

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

Journal Article
Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, C., Mylonas, A., & Buchanan, W. J. (2021)
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. Journal of Cybersecurity and Privacy, 1(2), 252-273. https://doi.org/10.3390/jcp1020014
As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven In...
119 results

KTP Payfont Ltd

2015 - 2017
To create the ability in Payfont to research and deliver, using Universal Design principles and processes based on BS8878, the optimal secure user experience (UX) in secure transactions
Funder: Innovate UK | Value: £135,030

KTP Farrpoint

2014 - 2016
To develop the prototype for a next-generation security platform with advanced detection capabilities.
Funder: Innovate UK | Value: £119,363

Kulio Education Characters - online platform

2015 - 2015
Kulio Ltd and Edinburgh Napier University are planning to collaborate to create a new innovative application consisting of Kulio education characters. Children throughout local authorities are already...
Funder: Scottish Funding Council | Value: £5,000

Eyegroup Digital Platform

2012 - 2012
IIDI and TFI Enterprises Ltd are proud and excited to be working on a project funded by the SFC Innovation Voucher scheme.  The aim of this project is to develop a global video- interpreting...
Funder: Scottish Funding Council | Value: £5,000

Glimpse Interactive Wellness Gestures (Factory in the lab)

2016 - 2016
The focus of the project is to use the new breed of motion sensors which can fully capture the movement of hands and fingers, and use this to create an early stage product to demonstrate how precise h...
Funder: Digital Health Institute | Value: £9,572

Glimpse Interactive Wellness Gestures - Prototype Software

2015 - 2015
This project lead by Alistair Lawson aims to create a proof-of-concept demonstrator to show how very specific hand and finger movements can improve a person’s health and address certain problems assoc...
Funder: Scottish Funding Council | Value: £5,000

HighlandBirchwoods

2013 - 2013
The main outcome is a novel bird observation and tracking system with integrated maps, and which runs on mobile devices.
Funder: Scottish Funding Council | Value: £4,934

sa.Fire

2012 - 2013
This project has resulted in a spin-out company which was incorporated on 17 January 2014. It has also generated a patent related to BDDs (Binary decision Diagrams).
Funder: Scottish Enterprise | Value: £320,000

RATTRAP (Guardian Toolkit)

2011 - 2013
The Office of Cyber Security & Information Assurance (OCSIA) estimates that the cost of cybercrime to businesses, in the UK alone, is over £21 billion per annum. This project focuses on the real-time ...
Funder: Scottish Enterprise | Value: £291,336

QikServe smart phone application

2011 - 2012
IIDI collaborative project with QikServe Ltd supported by the SFC Innovation Voucher Scheme.  This project led by Alistair Lawson will investigate smart phone application development
Funder: Scottish Funding Council | Value: £5,000

Date


School

Qualification level

16 results

Test-bed and evaluation of a home-based adverse event prediction infrastructure

2013 - 2021
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Adrian Smales | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

Adaptive energy management mechanisms for clustering based routing wireless sensor networks

2013 - 2017
"The development of science and technology are increasingly affecting and changing the nature of processes in...
Mr Mohamed Eshaftri | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives

2019 - 2021
This work is concerned with the information practices associated with hyperlocal representation. The fin...
Dr Peter Cruickshank | Director of Studies: Prof Hazel Hall | Second Supervisor: Dr Kendall Richards

Reliable and energy efficient scheduling protocols for Wireless Body Area Networks (WBAN)

2014 - 2018
Miss Marwa Salayma | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

NetHost-Sensor: Enhancing Intrusion Detection via an Active Target Host

2003 - 2007
Dr Abiola Abimbola | Director of Studies: Jose Munoz | Second Supervisor: Prof Bill Buchanan

Forensic analysis of large capacity digital storage devices

2013 - 2017
Triage of large capacity digital devices
Philip Penrose | Director of Studies: Prof Bill Buchanan | Second Supervisor: Rich Macfarlane

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Mobile User Authentication System (MUAS) for e-commerce applications

2009 - 2017
Rania Molla | Director of Studies: Dr Imed Romdhani | Second Supervisor: Prof Bill Buchanan

Load balancing and context aware enhancements for RPL routed Internet of Things

2013 - 2018
Mamoun Qasem | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani
24 results

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

Dr. Zhiyuan Tan Invited to Deliver a Seminar on Internet of Things and Its Security at the Dongguan University of Technology, China, December 2017

12 December 2017
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...

Dr. Zhiyuan Tan Won The National Research Award 2017 from The Research Council of the Sultanate of Oman

12 November 2017
Dr. Zhiyuan Tan's research work entitled "Building an intrusion detection system using a filter-based feature selection algorithm" has been awarded by the The Research Council of the Sultanate of Oman...

Professor Opens Up on His Love of Edinburgh, Cryptography and Innovation

22 August 2017
In an interview with Inspired Edinburgh in The Victorian Townhouse, Professor Bill Buchanan outlined his career and his university, along with his love of his home city, cryptography and innovation. T...

University Spin-out - Zonefox - Launches Ambitious Expansion Plans

21 August 2017
Zonefox, a spin-out of The Cyber Academy within the School of Computing at Edinburgh Napier University, officially launched their move into new offices in Edinburgh. They have moved from CodeBase into...