Research explorer tool

Date


School

Download Available

34 results

Fast Filtering of Known PNG Files Using Early File Features

Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2017)
Fast Filtering of Known PNG Files Using Early File Features. In Proceedings of the Conference on Digital Forensics, Security and Law
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...

Performance Evaluation of a Fragmented Secret Share System

Conference Proceeding
Ukwandu, E., Buchanan, W. J., & Russell, G. (2017)
Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)https://doi.org/10.1109/cybersa.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...

Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems

Journal Article
Mckeown, S., Russell, G., & Leimich, P. (2020)
Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems. Journal of Digital Forensics, Security and Law, 14(3),
A common investigative task is to identify known contraband images on a device, which typically involves calculating cryptographic hashes for all the files on a disk and check...

The Prometheus II Description Model: an objective approach to representing taxonomic descriptions

Working Paper
MacDonald, S. M., Raguenaud, C., Pullan, M. R., Kennedy, J., Russell, G., & Watson, M. F. The Prometheus II Description Model: an objective approach to representing taxonomic descriptions

)
MacDonald, S. M., Raguenaud, C., Pullan, M. R., Kennedy, J., Russell, G., & Watson, M. F. The Prometheus II Description Model: an objective approach to representing taxonomic descriptions
A model for improving the storage and communication of plant descriptions is presented. The model is flexible and yet reduces the ambiguity often present in text descriptions....

A universal character model and ontology of defined terms for taxonomic description.

Conference Proceeding
Paterson, T., Kennedy, J., Pullan, M. R., Cannon, A., Armstrong, K. E., Watson, M. F., …Russell, G. (2004)
A universal character model and ontology of defined terms for taxonomic description. In E. Rahm (Ed.), Proceedings of Data Integration in the Life Sciences (DILS), 63-78
Taxonomists classify biological specimens into groups (taxa) on the basis of similarities between their observed features (characters). The description of these characters is ...

PLC Memory Attack Detection and Response in a Clean Water Supply System

Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
PLC Memory Attack Detection and Response in a Clean Water Supply System. International Journal of Critical Infrastructure Protection, 26, https://doi.org/10.1016/j.ijcip.2019.05.003
Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens ...

Decrypting Live SSH Traffic in Virtual Environments

Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019)
Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts re...

Multiple traffic signal control using a genetic algorithm

Conference Proceeding
Kalganova, T., Russell, G., & Cumming, A. (1999)
Multiple traffic signal control using a genetic algorithm. In A. Dobnikar, N. C. Steele, D. W. Pearson, & R. F. Albrecht (Eds.), Artificial Neural Nets and Genetic Algorithms, 220-228. https://doi.org/10.1007/978-3-7091-6384-9_38
Optimising traffic signal timings for a multiple-junction road network is a difficult but important problem. The essential difficulty of this problem is that the traffic signa...

RESCUE: Resilient Secret Sharing Cloud-based Architecture.

Conference Proceeding
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015)
RESCUE: Resilient Secret Sharing Cloud-based Architecture. In 2015 IEEE Trustcom/BigDataSE/ISPA Vol. 1, (872-879). https://doi.org/10.1109/Trustcom.2015.459
This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without use...

Secret shares to protect health records in Cloud-based infrastructures

Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...
6 results

MEMCRYPT CyberASAP Phase 2

2020 - 2021
Ransomware is a form of malicious software that blocks user access to data by encrypting files. A user is then required to pay the attacker a sum of money to receive the encryption artefacts and start...
Funder: Innovate UK | Value: £52,310

Prometheus II: Capturing and Relating Character Concept Definitions in Plant Taxonomy

2001 - 2004
Taxonomy has been described as “the science of documenting biodiversity”, which involves collecting, naming, describing, identifying and classifying specimens of organisms. Descriptions are the fundam...
Funder: Biotechnology and Biological Sciences Research Council | Value: £128,444

vSOC - Virtualised Security Operations Centre

2015 - 2017
The proposal aims to build a Virtualised Security Operation Center [vSoC] and integrates into a currently operating virtualized cyber security Cloud infrastructure (DFET), and use state-of-theart syst...
Funder: Higher Education Academy | Value: £39,268

MemoryCrypt

2019 - 2020
The usage of encryption keys is an important aspect in preserving privacy in communications. Increasingly these communications are protected using SSL/TLS methods. Along with this, there is a general ...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £10,759

Memcrypt (HGSP)

2020 - 2021
Memcrypt focuses on new ways of detecting the usage encryption keys, and has a focus on addressing ransomware.
Funder: Scottish Enterprise | Value: £109,883

MemCrypt

2020 - 2020
At the core of the work is to addresses risks related to the leakage of encryption keys, and which can lead to data loss issues and trust breaches. Along with detecting keys in memory, the team has de...
Funder: Innovate UK | Value: £31,930