Date


People

Download Available

211 results

Can Federated Models Be Rectified Through Learning Negative Gradients?

Conference Proceeding
Tahir, A., Tan, Z., & Babaagba, K. O. (2024)
Can Federated Models Be Rectified Through Learning Negative Gradients?. In Big Data Technologies and Applications (18-32). https://doi.org/10.1007/978-3-031-52265-9_2
Federated Learning (FL) is a method to train machine learning (ML) models in a decentralised manner, while preserving the privacy of data from multiple clients. However, FL is...

Privacy-preserving data acquisition protocol.

Conference Proceeding
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010)
Privacy-preserving data acquisition protocol. In IEEE International Conference of Computational Methods in Electrical and Electronics Engineering. , (131-136). https://doi.org/10.1109/SIBIRCON.2010.5555325
Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need t...

Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme

Conference Proceeding
Babaagba, K. O., Tan, Z., & Hart, E. (2019)
Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme. In Dependability in Sensor, Cloud, and Big Data Systems and Applications. , (369-382). https://doi.org/10.1007/978-981-15-1304-6_29
The ability to detect metamorphic malware has generated significant research interest over recent years, particularly given its proliferation on mobile devices. Such malware i...

Application and analysis of private matching schemes based on commutative cryptosystems.

Conference Proceeding
Kwecka, Z., Buchanan, W. J. & Spiers, D. A. (2008)
Application and analysis of private matching schemes based on commutative cryptosystems
Privacy issues are becoming a key focus with software systems. Surveys show that the invasion of privacy is among the things peo-ple fear the most from the coming years. These...

Password Pattern and Vulnerability Analysis for Web and Mobile Applications

Journal Article
Li, S., Romdhani, I., & Buchanan, W. (2016)
Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile ...

The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud

Conference Proceeding
Pitropakis, N., Lyvas, C., & Lambrinoudakis, C. (2017)
The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud. In C. Becker Westphall, Y. Woo Lee, B. Duncan, R. Ege, A. Olmsted, M. Vassilakopoulos, …S. Katsikas (Eds.), CLOUD COMPUTING 2017 - The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization
The financial crisis made companies around the world search for cheaper and more efficient solutions to cover their needs in terms of computational power and storage. Their qu...

Evaluation of the DFET Cloud.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September)
Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...

Framework for network IDS evaluation

Thesis
Lo, O. (2009)
Framework for network IDS evaluation. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3981
There are a multitude of threats now faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data stealing and denial of service. A...

The Internet of Things: a security point of view.

Journal Article
Li, S., Tryfonas, T., & Li, H. (2016)
The Internet of Things: a security point of view. Internet Research, 26(2), 337-359. https://doi.org/10.1108/IntR-07-2014-0173
Purpose -- To provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technol...

Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security.

Presentation / Conference
Buchanan, W. J. (2011, September)
Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security. Paper presented at CFET: Cybercrime Forensics Education & Training., Canterbury Christ Church University, Canterbury
The use of virtualised and cloud-based environments provides an excellent opportunity to enhance learning and to provide students with skills which match exactly to the requir...
23 results

TrustShare: Privacy-Preserving And Trusted Threat Intelligence Sharing Using Distributed Ledgers

2023 - 2024
Organisations are facing an increasing number of cyber threats, which is making it evident that relying solely on security tools and technologies may fail to identify emerging threats, malware, and ot...
Funder: Innovate UK | Value: £31,386

IoT Hardware Security Test Framework

2017 - 2018
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
Funder: Centre for Sensor and Imaging Systems | Value: £58,807

Next Generation Trust Architecture

2018 - 2020
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Funder: Digital Health Institute | Value: £149,959

AI-based privacy-preserving biometric authentication with mass-market smart devices

2021 - 2024
Increasingly our identity is key to our online security, and where online services must integrate with these, in order to provide increased levels of trust. But there are now many constraints in how b...
Funder: Data Lab | Value: £65,756

False webs: Network to address the misinformation pandemic

2023 - 2025
Fake news (inaccurate information) peaked during the pandemic with around 46 000 daily Twitter posts containing false information (Lupi, 2020). In Europe over 70% people regularly encounter fake news ...
Funder: Royal Society of Edinburgh | Value: £19,931

MEMCRYPT CyberASAP Phase 2

2020 - 2021
Ransomware is a form of malicious software that blocks user access to data by encrypting files. A user is then required to pay the attacker a sum of money to receive the encryption artefacts and start...
Funder: Innovate UK | Value: £52,310

Cyber Hunt

2022 - 2025
Automated Cyberthreat Hunting and Cyber-relevant Incident Response for Critical Infrastructures. CyberHunt will develop highly innovative cybersecurity technologies that can sense, detect, analyse, d...
Funder: The Research Funding Council of Norway | Value: £37,500

Shared Secret Steganography for Usable Mnemonic Based Security

2019 - 2020
This project will use steganography technology and shared secrets to improve the usability of the process of recovering cryptocurrency/distributed ledger wallet. It will do so by encoding parts of the...
Funder: Scottish Funding Council | Value: £5,000

MemCrypt

2020 - 2020
At the core of the work is to addresses risks related to the leakage of encryption keys, and which can lead to data loss issues and trust breaches. Along with detecting keys in memory, the team has de...
Funder: Innovate UK | Value: £31,930

Cryptodoc

2019 - 2019
This project aims to investigate the integration of a cipher policy for the protection of data, and how these can be applied into a cloud-based infrastructure. A key focus for the implementation will ...
Funder: Scottish Funding Council | Value: £5,000
11 results

Basil Manoussos (Manager @ The Cyber Academy) delivers keynote at the 2019 Annual Conference of the Scottish Paralegal Association

17 April 2019
Basil Manoussos, Manager of The Cyber Academy delivers keynote presentation at the Annual Conference of the Scottish Paralegal Association in Glasgow, titled "Cyber threats to law firms: Do you want ...

SOCLAB Launch

10 April 2018
Official launch of SOCLAB, the new SOC facility in Merchiston Campus

Dr. Zhiyuan Tan Invited to Deliver a Seminar on Internet of Things and Its Security at the Dongguan University of Technology, China, December 2017

12 December 2017
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...

Dr. Zhiyuan Tan has been appointed as an Editorial Board Member for International Journal of Computer Sciences and its Applications

21 August 2017
The International Journal of Computer Sciences and its Applications (IJCSA) is an international online open access journal which is dedicated to quarterly publishing high-quality papers that describe ...

Professor Gives Evidence on Cyber Security and Health Care at Scottish Parliament

19 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee at the Scottish Parliament on Cyber Security risks within Health Care in Scotland.

International Conference on Big Data in Cyber Security

19 December 2016
The Cyber Academy are to host the 2nd International Conference on Big Data in Cyber Security on 10 May 2017 and this time the event will scale around the World, with an international collaboration acr...

Edinburgh Napier spin-out heads for London showcase

3 December 2016
Edinburgh is becoming one of the best cities in the World to be into tech, and this week one of Edinburgh Napier University's spin-outs - Cyan Forensics - represents the booming tech industry in the c...

Researchers Find New Ways To Investigate Big Data Infrastructures With Minimal Disruption

4 August 2016
Researchers, including Dr Petra Leimich, Prof Bill Buchanan and Josh Harrison, in The Cyber Academy at Edinburgh Napier, have created a new way of analysing the traces of evidence left in the memory o...

Exciting New Collaboration with Hutchinson Networks

29 June 2016
Exciting New Collaboration with Hutchinson Networks Aims To Build A Virtual Bank For Advanced Security Operations Training

FBI to present on Big Data in Cyber Security at International Conference

31 March 2016
FBI to present on Big Data in Cyber Security at International Conference