Date


People

Download Available

355 results

MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features

Journal Article
Saha, R., Geetha, G., Kumar, G., Kim, T., & Buchanan, W. J. (2019)
MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access, 7, 172045-172054. https://doi.org/10.1109/access.2019.2956160
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weigh...

Privacy-Preserving Passive DNS

Journal Article
Papadopoulos, P., Pitropakis, N., Buchanan, W. J., Lo, O., & Katsikas, S. (2020)
Privacy-Preserving Passive DNS. Computers, 9(3), https://doi.org/10.3390/computers9030064
The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern...

Lightweight cryptography methods

Journal Article
Buchanan, W. J., Li, S., & Asif, R. (2018)
Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processi...

Protecting mobile agents from external replay attacks

Journal Article
Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009)
Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018
This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching ...

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Conference Proceeding
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2019)
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In 2018 IEEE International Conference on Big Data (Big Data)https://doi.org/10.1109/BigData.2018.8621922
Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exis...

Case Study: moving towards an e-health platform to store NHS patient Information in the cloud.

Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., & Thuemmler, C. (2012, February)
Case Study: moving towards an e-health platform to store NHS patient Information in the cloud. Paper presented at Cloud Computing in the Public Sector: The Way Forward, London
Case Study: Moving Towards an e-health Platform to Store NHS Patient Information in the Cloud The NHS pilot scheme to store patient information in the Cloud How can the health...

An agent based Bayesian forecasting model for enhanced network security.

Conference Proceeding
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001. , (247-254). https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...

When the ATM runs Windows, how safe is your money?

Other
Buchanan, W. J. (2014)
When the ATM runs Windows, how safe is your money?
How safe is Microsoft Windows? After all, the list of malware that has caused major headaches worldwide over the last 15 years is long – viruses, worms and Trojans have forced...

Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation

Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2020)
Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation. Forensic Science International: Digital Investigation, 33, https://doi.org/10.1016/j.fsidi.2020.300979
Ransomware continues to grow in both scale, cost, complexity and impact since its initial discovery nearly 30 years ago. Security practitioners are engaged in a continual "arm...

Review of e-Health Frameworks.

Conference Proceeding
Prajapati, B., Buchanan, W. J., Smales, A., Macfarlane, R., & Spyra, G. (2015)
Review of e-Health Frameworks. In Health Informatics Conference 2015
In order to improve the quality of health care and widen the accessibility, health care providers are consistently looking to inject information and communication technology t...
76 results

Next Generation Trust Architecture

2018 - 2020
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Funder: Digital Health Institute | Value: £149,959

Integration of Stimulating and Engaging Education Assessments

2012 - 2012
IIDI has been successful in obtaining funding for a new collaborative project with Bright Red Publishing supported by the SFC Innovation Voucher Scheme.
Funder: Scottish Funding Council | Value: £5,000

Bare Metal Forensics - Pattern Analysis Heuristics - Data Analysis

2016 - 2017
Exploiting industry interconnect standards to gain visibility into devices.
Funder: Data Lab | Value: £49,468

Social Media Analysis Reporting Tool (SMART)

2012 - 2013
To develop a commercially viable tool to enable organisations to monitor and understand their organisation’s life on social media beyond those accounts they have created. This project is focused on ...
Funder: Scottish Funding Council | Value: £4,937

The Online Pension Company Ltd

2011 - 2012
IIDI has been successful in obtaining funding for a new collaborative project with The Online Pension Company Ltd supported by the SFC Innovation Voucher Scheme.
Funder: Scottish Funding Council | Value: £5,000

Audit/Compliance Integration

2012 - 2012
IIDI is working with Allatus ltd supported the SFC Innovation Voucher scheme.  This project aims to integrate the automated data gather of information for audit/compliance requriments.
Funder: Scottish Funding Council | Value: £5,000

TrueDeploy - CyberASAP Phase 1

2022 - 2022
The way in which we develop and supply secure, trusted software is broken. The dominance of open-source software and the interconnectedness of software between organisations has raised cybersecurity r...
Funder: Innovate UK | Value: £31,969

MEMCRYPT CyberASAP Phase 2

2020 - 2021
Ransomware is a form of malicious software that blocks user access to data by encrypting files. A user is then required to pay the attacker a sum of money to receive the encryption artefacts and start...
Funder: Innovate UK | Value: £52,310

Shared Secret Steganography for Usable Mnemonic Based Security

2019 - 2020
This project will use steganography technology and shared secrets to improve the usability of the process of recovering cryptocurrency/distributed ledger wallet. It will do so by encoding parts of the...
Funder: Scottish Funding Council | Value: £5,000

Behaviour profiling using Touch-based Behavioural Biometrics for Continuous Authentication Systems

2022 - 2022
Authenticating smartphone users from distinct behavioural biometric patterns provided through human interactions on touch screens would allow users to be continuously authenticated on their devices wh...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £923
10 results

Embedded document security using sticky policies and identity based encryption

2013 - 2019
As we move into storing data within a public cloud infrastructure we reduce the defences and must embed security into the ...
Grzegorz Spyra | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Elias Ekonomou

Visualising Multiple Overlapping Classification Hierarchies

1998 - 2002
The revision or reorganisation of hierarchical data sets can result in many possible hierarchical classifications composed of the same or ove...
Dr Martin Graham | Director of Studies: Prof Jessie Kennedy | Second Supervisor: Prof David Benyon

Towards a Robust, Privacy-preserving preserving machine-learning framework

2018 - date
Adam Hall | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Nick Pitropakis

Mobile User Authentication System (MUAS) for e-commerce applications

2009 - 2017
Rania Molla | Director of Studies: Dr Imed Romdhani | Second Supervisor: Prof Bill Buchanan

Forensic analysis of large capacity digital storage devices

2013 - 2017
Triage of large capacity digital devices
Philip Penrose | Director of Studies: Prof Bill Buchanan | Second Supervisor: Rich Macfarlane

Investigations into decrypting live secure traffic in virtual environments

2016 - 2019
Dr Peter McLaren | Director of Studies: Dr Gordon Russell | Second Supervisor: Prof Bill Buchanan

NetHost-Sensor: Enhancing Intrusion Detection via an Active Target Host

2003 - 2007
Dr Abiola Abimbola | Director of Studies: Jose Munoz | Second Supervisor: Prof Bill Buchanan

A pattern-driven corpus to predictive analytics in mitigating SQL injection attack

2011 - 2018
Solomon Uwagbole | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Lu Fan

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Identity and identification in an information society: Augmenting formal systems of identification with technological artefacts

2018 - date
Mr Will Abramson | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Owen Lo
18 results

Promising cyber security project supported by new Scottish Enterprise funding

21 September 2022
TrueDeploy, an exciting project from the School of Computing, Engineering & the Built Environment (SCEBE) at Edinburgh Napier University (ENU), has secured £199,952 in additional support from Scottish...

Double funding success for School of Computing

21 March 2022
Two projects from Edinburgh Napier’s acclaimed School of Computing have won funding from a programme which develops innovative cyber security ideas for the commercial market. TrueDeploy and Trustd ar...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

15 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

11 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Professor Opens Up on His Love of Edinburgh, Cryptography and Innovation

23 August 2017
In an interview with Inspired Edinburgh in The Victorian Townhouse, Professor Bill Buchanan outlined his career and his university, along with his love of his home city, cryptography and innovation. T...

Professor Gives Evidence on Cyber Security and Health Care at Scottish Parliament

20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee at the Scottish Parliament on Cyber Security risks within Health Care in Scotland.

Judy Murray among Scots on honours list

16 June 2017
Prof Bill Buchanan, head of Edinburgh Napier University's Cyber Academy, is made an OBE. He was recognised for his services to cyber security and innovation.

Distinguished Fellow To Talk on Real-Time Human Action Recognition

1 June 2017
ICSA DVF Professor Nasser Kehtarnavaz will be speaking about “Real-Time Human Action Recognition via Simultaneous Utilization of Depth Images and Inertial Signals” on Monday 19 June at 10am at Edinbur...