Research explorer tool

16 results

Date


School

People

Download Available

301 results

A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments

Thesis
Pallis, G. (2010)
A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4005
For more than a century the classic circuit-switched telephony in the form of PSTN (Public Service Telephone Network) has dominated the world of phone communications (Varshney...

A comparative review of information security risk assessment methodologies for health care.

Presentation / Conference
Hazelhoff Roelfzema, N. (2011, March)
A comparative review of information security risk assessment methodologies for health care. Paper presented at IADIS e-Society, Avilla, Spain
Health care organizations face major compliance challenges as they need to secure patient information. An important compliance requirement is the performance of regular risk a...

Towards a new health and social care information sharing architecture.

Presentation / Conference
Buchanan, W. J. (2012, May)
Towards a new health and social care information sharing architecture
This presentation outlines the integration of the safi.re information sharing architecture.

US hack shows data is the new frontier in cyber security conflict.

Other
Buchanan, W. J. (2015)
US hack shows data is the new frontier in cyber security conflict
More than four million personal records of US government workers are thought to have been hacked and stolen, it has been. With US investigators blaming the Chinese government ...

Training the next generation.

Presentation / Conference
Buchanan, W. J. (2012, June)
Training the next generation
This presentation outlines how cloud infrastructures could be used to deliver the in-depth skills required for a cyber professional.

Numerical encoding to tame SQL injection attacks

Conference Proceeding
Uwagbole, S., Buchanan, W. J., & Fan, L. (2016)
Numerical encoding to tame SQL injection attacks. In 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS),https://doi.org/10.1109/NOMS.2016.7502997
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases....

Novel tracking of rogue network packets using danger theory approach

Journal Article
Uwagbole, S., Buchanan, W. J., & Fan, L. (2012)
Novel tracking of rogue network packets using danger theory approach. Proceedings of the ... international conference on information warfare and security, 277-286
Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hacking groups, such as Anonymous and Lulzsec. These groups often aim to disru...

Migration of mobile agents in ad-hoc wireless networks.

Conference Proceeding
Migas, N., Buchanan, W. J., & McArtney, K. (2004)
Migration of mobile agents in ad-hoc wireless networks. In Proceeding of the 11th IEEE International Conference and Workshop on the Engineering of Computer-based systems, 530-535. https://doi.org/10.1109/ECBS.2004.1316743
This paper focuses on the design and development of a novel architecture called MARIAN, which utilises static agents, mobile agents, and also a hybrid approach, in order to pe...

Mastering Global Information Systems.

Book
Buchanan, W. J. (1996)
Mastering Global Information Systems. Macmillan Press
This book provides an excellent foundation in modern information systems and data communications. It has five basic themes: * Digital Information Sources and Multimedia * The...

Network Firewall Dynamic Performance Evaluation and Formalisation

Thesis
Saliou, L. Network Firewall Dynamic Performance Evaluation and Formalisation. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/2599
Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to...
54 results

Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures

2011 - 2013
This project extends the e-Health Cloud-based Platform, and integrates with assisted living. The project integrates Edinburgh Napier University, Microsoft and HoIP, and has created a novel governance ...
Funder: Engineering and Physical Sciences Research Council | Value: £243,325

The Online Pension Company Ltd

2011 - 2012
IIDI has been successful in obtaining funding for a new collaborative project with The Online Pension Company Ltd supported by the SFC Innovation Voucher Scheme.
Funder: Scottish Funding Council | Value: £5,000

vSOC - Virtualised Security Operations Centre

2015 - 2017
The proposal aims to build a Virtualised Security Operation Center [vSoC] and integrates into a currently operating virtualized cyber security Cloud infrastructure (DFET), and use state-of-theart syst...
Funder: Higher Education Academy | Value: £39,268

Data Capture and Auto Identification Reference

2009 - 2011
This project relates to the research collaboration between Edinburgh Napier University, CipherLab, Chelsea and Westminster Hospital, GS1 UK, Imperial College, and Kodit, and is funded through a resear...
Funder: Innovate UK | Value: £227,172

Cloud-based Cash-flow Project

2012 - 2012
IIDI is working with Level10 Ltd on a new project awarded under the SFC Innovation Voucher scheme
Funder: Scottish Funding Council | Value: £5,000

e-FRAIL - Early detection of FRAilty and Illness

2015 - 2016
Scottish Frailty Framework with Mobile Device Capture and Big Data Integration. The proposed innovation will develop and extend the current work into Frailty, with the long term focus on encompassing ...
Funder: Digital Health Institute | Value: £89,428

e-Health Security Infrastructure Evaluation

2012 - 2012
IIDI is working with Patient Reminders Limited supported the SFC Innovation Voucher scheme.  Patient Reminders Limited provides patient reminder products and solutions for use in clinical studies, ph...
Funder: Scottish Funding Council | Value: £4,979

Digital forensic Toolkit

2007 - 2008
This project aims to produce next generation digital forensics tools, using novel methods based on DNA matching.
Funder: Scottish Enterprise | Value: £14,703

Audit/Compliance Integration

2012 - 2012
IIDI is working with Allatus ltd supported the SFC Innovation Voucher scheme.  This project aims to integrate the automated data gather of information for audit/compliance requriments.
Funder: Scottish Funding Council | Value: £5,000

Bare Metal Forensics - Pattern Analysis Heuristics - Data Analysis

2016 - 2017
Exploiting industry interconnect standards to gain visibility into devices.
Funder: Data Lab | Value: £49,468
7 results

Test-bed and evaluation of a home-based adverse event prediction infrastructure

2013 - date
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Adrian Smales | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

Forensic analysis of large capacity digital storage devices

2013 - 2017
Triage of large capacity digital devices
Philip Penrose | Director of Studies: Prof Bill Buchanan | Second Supervisor: Rich Macfarlane

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - date
Ms Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Forensic verification of operating system activity via novel data, acquisition and analysis techniques

2005 - 2009
Dr Jamie Graves | Director of Studies: Prof Bill Buchanan | Second Supervisor: L. John Old

Framework for evaluation of e-health platform and services

2010 - 2015
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...
Dr Owen Lo | Director of Studies: Prof Bill Buchanan | Second Supervisor: Prof Christoph Thuemmler
23 results

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

Dr. Zhiyuan Tan Invited to Deliver a Seminar on Internet of Things and Its Security at the Dongguan University of Technology, China, December 2017

12 December 2017
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...

Dr. Zhiyuan Tan Won The National Research Award 2017 from The Research Council of the Sultanate of Oman

12 November 2017
Dr. Zhiyuan Tan's research work entitled "Building an intrusion detection system using a filter-based feature selection algorithm" has been awarded by the The Research Council of the Sultanate of Oman...

Professor Opens Up on His Love of Edinburgh, Cryptography and Innovation

22 August 2017
In an interview with Inspired Edinburgh in The Victorian Townhouse, Professor Bill Buchanan outlined his career and his university, along with his love of his home city, cryptography and innovation. T...

University Spin-out - Zonefox - Launches Ambitious Expansion Plans

21 August 2017
Zonefox, a spin-out of The Cyber Academy within the School of Computing at Edinburgh Napier University, officially launched their move into new offices in Edinburgh. They have moved from CodeBase into...