Mishra, A., Tripathy, A., Obaidat, M., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (in press). A Chain Topology for Efficient Monitoring of Food Grain Storage Using Smart Sensors. In Conference Proceedings
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...
(2016). Outlook 17 A New Generation of e-Health Systems Powered by 5G
Standardized 5G systems will be market ready around 2020. What is clear is that 5G will be more than a simple evolution of the current network. Indeed, it will be a catalyst f...
Uwagbole, S., Buchanan, W. & Fan, L. (2016). Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016ISBN 9781910810934
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web...
Scottish Funding Council
To develop a commercially viable tool to enable organisations to monitor and understand their organisation’s life on social media beyond those accounts they have created. This project is focused on ...
This IIDI project, led by Alistair Lawson, relates to Flummix's use of magic as the vehicle to pioneer new learning experiences that are in line with the curriculum for excellence, relevant, have real...
IIDI is working with Level10 Ltd on a new project awarded under the SFC Innovation Voucher scheme
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
31 May 2017
Prof Bill Buchanan, who leads The Cyber Academy at Edinburgh Napier University, has been invited as a witness at the Health and Sport Committee within the Scottish Parliament ...
03 December 2016
Edinburgh is becoming the best city in the World to be into tech.
This week five Edinburgh based companies head to a two-day TechCrunch Disrupt event. Other comp...
Manager, The Cyber Academy
Senior Research Fellow
Zero Hour Lecturer
Lecturer of Cybersecurity, Encryption and Networks
(CAICT), C. A. O. I. A. C. T. & DG Connect, E. C. (2016). EU-China joint white paper on the Internet of Things
This paper reflects the outcome of several years of the IoT international cooperation between the EU and China and documents the state-of-the-art on IoT development in both re...
Buchanan, W. J. (2015). Edinburgh leading world in beating online crime. The Scotsman
Cyber security surges ahead in the capital, says Bill Buchanan As we become more dependent on the internet by the day, the risks around it also increase, especially from cyber...
Li, W., Meng, W., Tan, Z. & Xiang, Y. (2014). Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications,, 174-181. doi:10.1109/trustcom.2014.26. ISBN 978-1-4799-6513-7
The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish ...
Thuemmler, C., Mival, O., Benyon, D., Buchanan, W., Paulin, A., Fricker, S., …Petrakis, E. (2014). Norms and standards in modular medical architectures. In 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013), 382-387. doi:10.1109/HealthCom.2013.6720705. ISBN 9781467358019
Recent Internet of Things (IoT) research has been aiming at interoperability of devices and the integration of sensor networks. The Future Internet – Private Public Partnershi...
Buchanan, W. J., Fan, L., Uthmani, O. & Lawson, A. (2013). Information sharing.
http://www.google.com/patents/US20140201804 The present disclosure relates to improved information sharing and in particular to formal representations of information sharing p...
Uthmani, O., Buchanan, W. J., Fan, L. & Lawson, A. (2012). A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation
This paper outlines a novel information sharing method using Binary Decision Diagrams (BBDs). It is inspired by the work of Al-Shaer and Hamed, who applied BDDs into the model...
Uthmani, O., Buchanan, W. J., Fan, L. & Lawson, A. (2012). Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model
This paper defines a structured methodology which is based on the foundational work of Al-Shaer et al. in  and that of Hamed and Al-Shaer in . It defines a methodology f...
Ambusaidi, M., Lu, L. F., He, X., Tan, Z., Jamdagni, A. & Nanda, P. (2011). A nonlinear correlation measure for Intrusion Detection
The popularity of using internet contains some risks of network attacks. It has attracted the attention of many researchers to overcome this problem. One of the effective ways...
Buchanan, W. J. (2009). RC2 Encryption and Decryption in Microsoft .NET
This paper outlines the usage of RC2 in Microsoft .NET. It provides a basic overview of the RC2 method, along with a review of other popular encryption methods and some sample...
Buchanan, W. J., Graves, J. & Bose, N. (2009). Patent: Improvements in or relating to digital forensics.
WO 2010029346 20100318
IMPROVEMENTS IN OR RELATING TO DIGITAL FORENSICS
The present disclosure relates to improvements in or relating to digital forensics, and in particular...
Al-Dubai, A., & Romdhani, I. (2006). A performance study of path based multicast communication algorithms. In International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2006), 245-250. doi:10.1109/PARELEC.2006.7
Multicast communication?s history has been driven by many schemes; however, a few have shown their efficiency on interconnection networks. Among these schemes, path based mult...
Al-Dubai, A., Ould-Khaoua, M., El-Zayyat, K., & Mackenzie, L. (2002). On balancing traffic load in path-based multicast communication. In SPECTS '03, 533-540
Multicast is the most primitive collective capability of any
message-passing network. It is itself central to many
important parallel applications in Science and
The Scottish Informatics & Computer Science Alliance
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas. It is a forum for early researchers to pres...
Comcarde is developing a mobile payments system called Bridge that uses a patent pending algorithm which is extremely resilient to man-in-the-middle attacks. Combined with strong authentication, we b...
The project undertaken by Onyu and ENU will concentrate around the mobile application that is under development by the team at Onyu.
Working with ENU our key objectives are:
1. Validation of our zero...
Edinburgh Napier University is working with the JAC Vapour, the leading, Edinburgh-based, online electronic cigarette retailer on a customer support platform featuring media-rich and mobile features n...
The collaboration between Edinburgh Napier University and Silver IMP aims to apply existing patent pending technology for targeted marketing, into secure working, where documents can only be access...
New ideas are on the way to make healthcare more accurate, more affordable and matching the needs of our changing societies. Demographic changes, progress in technology and in medicine offer options t...
IIDI and K2L are working together on a project supported under the SFC innovation Voucher scheme. This project is led by Alistair Lawson of CDCS, and builds on his language learning related research ...
IIDI and TFI Enterprises Ltd are proud and excited to be working on a project funded by the SFC Innovation Voucher scheme.
The aim of this project is to develop a global video- interpreting...
Royal Society of Edinburgh
This SE/RSE Enterprise Fellowship aimed to commercialise intellectual property owned by Edinburgh Napier University related to e-Health data management into an end-user product. The project paved the ...
IIDI is working with Allatus ltd supported the SFC Innovation Voucher scheme.
This project aims to integrate the automated data gather of information for audit/compliance requriments.
IIDI is working with Patient Reminders Limited supported the SFC Innovation Voucher scheme.
Patient Reminders Limited provides patient reminder products and solutions for use in clinical studies, ph...
Scottish Institute for Policing Research
The exchange of information between the police and community partner organisations forms a core aspect of effective policing and community service provision. However, this must be governed by sets of ...
23 August 2017
In an interview with Inspired Edinburgh in The Victorian Townhouse, Professor Bill Buchanan outlined his career and his university, along with his love of his home city, crypt...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
01 February 2017
04 April 2016
04 April 2016
This showcase event aims to demonstrate the career roles that there are within Cyber Security, and includes companies who are activitely seeking Cyber Security graduates.
18 January 2016
18 January 2016
The School of Computing recently held a Research day where staff and PhD students shared their expertise in the form of a "One-Minute-Madness". Each of the 68 researchers who ...