Explore our research

Date


School

Output Type

Download Available

48 results

Blockchain and Git repositories for sticky policies protected OOXML.

Presentation / Conference
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November)
Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based Information Rights Management (IRM) model extension with enhanced accountability for both a sticky policy and an attached data. This wor...

Evaluation of the DFET Cloud.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September)
Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...

Cyber security challenges for cloud based services.

Presentation / Conference
Buchanan, W. J. (2015, June)
Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh
Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud

Teaching penetration and malware analysis in a cloud-based environment.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June)
Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...

Vulnerability analysis.

Presentation / Conference
Buchanan, W. J. (2015, May)
Vulnerability analysis. Presented at Advanced Threat Protection, Glazier's Hall, London
The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the bigge...

Promoting passion in an innovation and enterprise culture.

Presentation / Conference
Buchanan, W. J. (2015, April)
Promoting passion in an innovation and enterprise culture. Presented at Exploring 21st Century Organisational Culture: inclusivity, agility and innovation, Edinburgh
This presentation will show how organisations can encourage a culture of innovation and enterprise, including showcasing examples of good practice and how management styles ca...

New forensic investigation and training methods in a virtual environment (cloud) (D-FET project).

Presentation / Conference
Buchanan, W. J., & Smales, A. (2015, April)
New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). Paper presented at Cybercrime and Cyberterrorism - the EU Research roadmap, Montpellier, France
DFET creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the ...

It's all hackable.

Presentation / Conference
Buchanan, W. J. (2015, February)
It's all hackable. Paper presented at SBRC Insider Threat Conference 2015, RBS, Gogarburn

Cyber security in practice: identifying areas of vulnerability.

Presentation / Conference
Buchanan, W. J., & Smales, A. (2015, February)
Cyber security in practice: identifying areas of vulnerability. Paper presented at Scot-Secure 2015, Holyrood, Edinburgh
Areas covered include: - Using penetration testing to highlight areas of weakness - Practical steps for improving the security of your organisation.

Review of e-Frailty evaluation frameworks.

Presentation / Conference
Smales, A., Buchanan, W. J., & Thuemmler, C. (2015, January)
Review of e-Frailty evaluation frameworks. Paper presented at HIS 2015, Edinburgh
This paper outlines some of the key methods used to evaluate frailty and provide important metrics for the implementation of an e-Frailty framework. Frailty is an emergent pro...