Introducing Cloud-based virtualised environments and their use in supporting learning and teaching.
Presentation / Conference
Buchanan, W. J. (2012, June)
Introducing Cloud-based virtualised environments and their use in supporting learning and teaching. Paper presented at Enhancing, extending and empowering student learning within online environments, Edinburgh
There is a major challenge faced in running distance and blended learning modules, especially in giving students an equivalent learning environment than to face-to-face studen...
Interagency data exchange, privacy protection and governance architecture for Information sharing across domains
Journal Article
Buchanan, W. J., Fan, L., Uthmani, O., & Schafer, B. (in press)
Interagency data exchange, privacy protection and governance architecture for Information sharing across domains. Artificial Intelligence and Law,
This paper discusses privacy enhancing technologies in the field of inter-agency data sharing, a key government objective for efficient public service delivery. We analyse the...
If Obama is talking about securing the net, it should be on everyone else’s lips too.
Other
Buchanan, W. J. (2015)
If Obama is talking about securing the net, it should be on everyone else’s lips too
We have spent years promoting the need for change in our approach to internet infrastructure, forcing politicians to recognise it as a serious issue. So it’s great to see Bara...
"I am Spartacus" – privacy enhancing technologies and privacy as a public good
Journal Article
Kwecka, Z., Buchanan, W. J., Schafer, B., & Rauhofer, J. (2014)
"I am Spartacus" – privacy enhancing technologies and privacy as a public good. Artificial Intelligence and Law, 22(2), 113-139. https://doi.org/10.1007/s10506-014-9155-5
The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This understanding of privacy has...
If you seek to ‘switch off’ encryption, you may as well switch off the whole internet.
Other
Buchanan, W. J. (2015)
If you seek to ‘switch off’ encryption, you may as well switch off the whole internet
Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This m...
An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing
Conference Proceeding
Migas, N., & Buchanan, W. (2006)
An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing. In Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International Symposium and Workshop on, 8-22. doi:10.1109/ecbs.2006.23
Multi-hop ad-hoc routing is a challenging issue, because of the dynamic network topology, and limited capabilities of resource-constrained mobile devices. This paper proposes ...
Applied web traffic analysis for numerical encoding of SQL Injection attack features
Conference Proceeding
Uwagbole, S., Buchanan, W., & Fan, L. (2016)
Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web...
Analysis and migration of location-finding methods for GSM and 3G networks.
Conference Proceeding
Buchanan, W. J., Munoz, J., Manson, R., & Raja, K. A. (2004)
Analysis and migration of location-finding methods for GSM and 3G networks. https://doi.org/10.1049/cp%3A20040695
This paper initially reviews the current range of location techniques on GSM networks, such as Cell-ID, GPS, AGPS, time difference of arrival (TDOA) and E-OTD (enhanced observ...
Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing.
Thesis
Buchanan, W. J. Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4022
The 3D Finite-Difference Time-Domain (FDTD) method simulates structures in the time-domain using a direct form of Maxwell’s curl equations. This method has the advantage over ...
Apple and Starbucks could have avoided being hacked if they'd taken this simple step
Other
Buchanan, W. J. (2015)
Apple and Starbucks could have avoided being hacked if they'd taken this simple step
Apple and Starbucks are two of the world’s most trusted companies, but their reputations were recently tarnished thanks to some novice cybersecurity mistakes. Both setup syste...