Explore our research

Date


People

Download Available

312 results

Introducing Cloud-based virtualised environments and their use in supporting learning and teaching.

Presentation / Conference
Buchanan, W. J. (2012, June)
Introducing Cloud-based virtualised environments and their use in supporting learning and teaching. Paper presented at Enhancing, extending and empowering student learning within online environments, Edinburgh
There is a major challenge faced in running distance and blended learning modules, especially in giving students an equivalent learning environment than to face-to-face studen...

Interagency data exchange, privacy protection and governance architecture for Information sharing across domains

Journal Article
Buchanan, W. J., Fan, L., Uthmani, O., & Schafer, B. (in press)
Interagency data exchange, privacy protection and governance architecture for Information sharing across domains. Artificial Intelligence and Law,
This paper discusses privacy enhancing technologies in the field of inter-agency data sharing, a key government objective for efficient public service delivery. We analyse the...

If Obama is talking about securing the net, it should be on everyone else’s lips too.

Other
Buchanan, W. J. (2015)
If Obama is talking about securing the net, it should be on everyone else’s lips too
We have spent years promoting the need for change in our approach to internet infrastructure, forcing politicians to recognise it as a serious issue. So it’s great to see Bara...

"I am Spartacus" – privacy enhancing technologies and privacy as a public good

Journal Article
Kwecka, Z., Buchanan, W. J., Schafer, B., & Rauhofer, J. (2014)
"I am Spartacus" – privacy enhancing technologies and privacy as a public good. Artificial Intelligence and Law, 22(2), 113-139. https://doi.org/10.1007/s10506-014-9155-5
The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This understanding of privacy has...

If you seek to ‘switch off’ encryption, you may as well switch off the whole internet.

Other
Buchanan, W. J. (2015)
If you seek to ‘switch off’ encryption, you may as well switch off the whole internet
Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This m...

An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing

Conference Proceeding
Migas, N., & Buchanan, W. (2006)
An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing. In Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International Symposium and Workshop on, 8-22. doi:10.1109/ecbs.2006.23
Multi-hop ad-hoc routing is a challenging issue, because of the dynamic network topology, and limited capabilities of resource-constrained mobile devices. This paper proposes ...

Applied web traffic analysis for numerical encoding of SQL Injection attack features

Conference Proceeding
Uwagbole, S., Buchanan, W., & Fan, L. (2016)
Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web...

Analysis and migration of location-finding methods for GSM and 3G networks.

Conference Proceeding
Buchanan, W. J., Munoz, J., Manson, R., & Raja, K. A. (2004)
Analysis and migration of location-finding methods for GSM and 3G networks. https://doi.org/10.1049/cp%3A20040695
This paper initially reviews the current range of location techniques on GSM networks, such as Cell-ID, GPS, AGPS, time difference of arrival (TDOA) and E-OTD (enhanced observ...

Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing.

Thesis
Buchanan, W. J. Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4022
The 3D Finite-Difference Time-Domain (FDTD) method simulates structures in the time-domain using a direct form of Maxwell’s curl equations. This method has the advantage over ...

Apple and Starbucks could have avoided being hacked if they'd taken this simple step

Other
Buchanan, W. J. (2015)
Apple and Starbucks could have avoided being hacked if they'd taken this simple step
Apple and Starbucks are two of the world’s most trusted companies, but their reputations were recently tarnished thanks to some novice cybersecurity mistakes. Both setup syste...
68 results

Data Capture and Auto Identification Reference

2009 - 2011
This project relates to the research collaboration between Edinburgh Napier University, CipherLab, Chelsea and Westminster Hospital, GS1 UK, Imperial College, and Kodit, and is funded through a resear...
Funder: Innovate UK | Value: £227,172

Cloud-based Cash-flow Project

2012 - 2012
IIDI is working with Level10 Ltd on a new project awarded under the SFC Innovation Voucher scheme
Funder: Scottish Funding Council | Value: £5,000

e-FRAIL - Early detection of FRAilty and Illness

2015 - 2016
Scottish Frailty Framework with Mobile Device Capture and Big Data Integration. The proposed innovation will develop and extend the current work into Frailty, with the long term focus on encompassing ...
Funder: Digital Health Institute | Value: £89,428

e-Health Security Infrastructure Evaluation

2012 - 2012
IIDI is working with Patient Reminders Limited supported the SFC Innovation Voucher scheme.  Patient Reminders Limited provides patient reminder products and solutions for use in clinical studies, ph...
Funder: Scottish Funding Council | Value: £4,979

Development of e-commerce capability of Solution Management

2008 - 2009
The Aim of this IIDI project led by Alistair Lawson is to develop a prototype software for data gathering at geographical locations that feeds into an online directory of shops and services for towns ...
Value: £24,324

Digital forensic Toolkit

2007 - 2008
This project aims to produce next generation digital forensics tools, using novel methods based on DNA matching.
Funder: Scottish Enterprise | Value: £14,703

Audit/Compliance Integration

2012 - 2012
IIDI is working with Allatus ltd supported the SFC Innovation Voucher scheme.  This project aims to integrate the automated data gather of information for audit/compliance requriments.
Funder: Scottish Funding Council | Value: £5,000

Callendar Estate

2010 - 2010
The focus of this project is to integrate novel interaction methods for forestry.
Funder: Scottish Funding Council | Value: £5,000

Canan

2005 - 2005
This Knowledge Transfer Partnership (KTP) between Cànan Ltd and Napier University aimed to establish a multimedia department and to develop an online platform for the delivery of British minority lang...
Funder: Innovate UK | Value: £93,861

Automated Data Extraction from Invoices

2012 - 2012
To extract data automatically from purchase invoices and receipts using artificial intelligence, import the data automatically to an accounting system linking this entry to the associated invoice.
Funder: Scottish Funding Council | Value: £4,979

Date


School

People

Qualification level

41 results

Dynamic probabilistic routing discovery and broadcast schemes for high mobility ad-hoc networks

2010 - 2013
Mobile ad-hoc networking (MANET) technology has been a major avenue for many wireless and mobile networke...
Mustafa Bani Khalaf | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Prof Bill Buchanan

HI-Risk: a socio-technical method to identify and monitor heathcare information security risks in the information society

2009 - 2014
This thesis describes the development of the HI-risk method to assess socio-tec...
Nicole van Deursen (Hazelhoff Roelfze) | Director of Studies: Prof Alistair Duff | Second Supervisor: Prof Bill Buchanan

Data navigation and visualisation: navigating coordinated multiple views of data

2010 - 2015
The field of coordinated and multiple views (CMVs) has been for over a decade, a promising technique for enhancing data ...
Nseabasi Igoniderigha | Director of Studies: Prof David Benyon | Second Supervisor: Thomas Mcewan

Test-bed and evaluation of a home-based adverse event prediction infrastructure

2013 - date
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Adrian Smales | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

Cryptographic privacy-preserving enhancement method for investigative data acquisition

2006 - 2011
The specification of Internet protocol stack was developed to be as universal as possible, providing various optio...
Zbigniew Kwecka | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Duncan Spiers

Context-aware definition, modelling and implementation for policy-compliant information sharing

2008 - 2013
The exchange of information between the police and community partner organisations forms a core aspect of...
Omair Uthmani | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

Correlation of affiliate performance against web evaluation metrics

2008 - 2014
Affiliate advertising is changing the way that people do business online. Retailers are now offering incentives to third-party publis...
Mathew Miehling | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

Enhancing bio-inspired intrusion response in ad-hoc networks

2010 - 2013
The topic Addresses the development of novel secrity echanisms for mobile ad hoc networks, inspired by mechanisms apparent in the biological...
Maryamosadat Kazemitabar | Director of Studies: Prof Emma Hart | Second Supervisor: Prof Bill Buchanan

Visualising Multiple Overlapping Classification Hierarchies

1998 - 2002
The revision or reorganisation of hierarchical data sets can result in many possible hierarchical classifications composed of the same or ove...
Dr Martin Graham | Director of Studies: Prof Jessie Kennedy | Second Supervisor: Prof David Benyon

Risk-Modelling at the Pre-Proposal Stages of eGovernment Services

2002 - 2007
eGovernment is a relatively new, but rapidly expanding, domain; mainly due to the perceived outcomes that it may bring to the public ad...
Adrianos Evangelidis | Director of Studies: Ann Macintosh | Second Supervisor: Prof Lissie Davenport
15 results

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Professor Opens Up on His Love of Edinburgh, Cryptography and Innovation

22 August 2017
In an interview with Inspired Edinburgh in The Victorian Townhouse, Professor Bill Buchanan outlined his career and his university, along with his love of his home city, cryptography and innovation. T...

Professor Gives Evidence on Cyber Security and Health Care at Scottish Parliament

19 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee at the Scottish Parliament on Cyber Security risks within Health Care in Scotland.

Distinguished Fellow To Talk on Real-Time Human Action Recognition

31 May 2017
ICSA DVF Professor Nasser Kehtarnavaz will be speaking about “Real-Time Human Action Recognition via Simultaneous Utilization of Depth Images and Inertial Signals” on Monday 19 June at 10am at Edinbur...

Professor Invited To Give Evidence at Scottish Parliament Committee on Cyber Attacks within Health Care

30 May 2017
Prof Bill Buchanan, who leads The Cyber Academy at Edinburgh Napier University, has been invited as a witness at the Health and Sport Committee within the Scottish Parliament on Tuesday 20 June 2017. ...

Hutchinson Networks Partnership Changing The World Through Innovation

2 February 2017
A partnership between Hutchinson Networks and The Cyber Academy at Edinburgh has been showcased in the application of SDN (Software Defined Networks) into health and social care, and in innovative Cyb...

Edinburgh Napier spin-out heads for London showcase

3 December 2016
Edinburgh is becoming one of the best cities in the World to be into tech, and this week one of Edinburgh Napier University's spin-outs - Cyan Forensics - represents the booming tech industry in the c...