Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs.
Buchanan, W. J., Graves, J., Bose, N., Macfarlane, R., Davison, B., & Ludwiniak, R. (2011)
Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. HEA ICS Conference,
This paper focuses on the integration of virtualised environments within the teaching of computer security and digital forensics, and includes three case studies. The first ca...
Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter.
Buchanan, W. J., Macfarlane, R., & Clayton, J. (2013)
Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. In G. Weir, & M. Daley (Eds.), Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013)
There is a problem in the world of digital forensics. The demands on digital forensic investigators and resources will continue to increase as the use of computers and other e...
D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures.
Presentation / Conference
Buchanan, W. J., & Macfarlane, R. (2011, June)
D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures. Paper presented at Scottish Higher Education Employability Conference: Strengthening Partnerships with Employers, Heriot-Watt, Edinburgh
The use of virtualised and cloud-based environments provide an excellent opportunity to enhance learning and to provide students with skills which match exactly to the require...
A methodology for the security evaluation within third-party Android Marketplaces
Buchanan, W. J., Chiale, S., & Macfarlane, R. (2017)
A methodology for the security evaluation within third-party Android Marketplaces. Digital Investigation, 23, 88-98. https://doi.org/10.1016/j.diin.2017.10.002
This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo localize the malware distribution over three main regions: China, Europe; and Russia...
Distance Measurement Methods for Improved Insider Threat Detection
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...
Privacy Parameter Variation using RAPPOR on a Malware Dataset
Aaby, P., Mata De Acuña, J. J., Macfarlane, R., & Buchanan, W. J. (2018)
Privacy Parameter Variation using RAPPOR on a Malware Dataset. In Proceedings of 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), 8. doi:10.1109/TrustCom/BigDataSE.2018.00133
Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of...
System and method for management of confidential data
Buchanan, B., Lo, O., Macfarlane, R., Penrose, P., & Ramsay, B. (in press)
System and method for management of confidential data. GB2561176A
This application is for a method of data management to identify confidential digital content on a database by first receiving a management request 302 from a system 304 to car...
Method for identification of digital content
Buchanan, B., Lo, O., Penrose, P., Ramsay, B., & Macfarlane, R. (2018)
Method for identification of digital content. World Intellectual Property Organization
Many areas oi investigation require searching through data that may be oi interest. One example oi data that may be involved in an investigation is copyrighted material that m...
Fast contraband detection in large capacity disk drives.
Penrose, P., Buchanan, W. J., & Macfarlane, R. (2015)
Fast contraband detection in large capacity disk drives. Digital Investigation, 12(S1), S22-S29. https://doi.org/10.1016/j.diin.2015.01.007
In recent years the capacity of digital storage devices has been increasing at a rate that has left digital forensic services struggling to cope. There is an acknowledgement t...
Evaluation of the DFET Cloud.
Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September)
Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...