Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure
Presentation / Conference
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October)
Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21), Online
Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine ...
Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks
Presentation / Conference
Ali, A. E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2018, June)
Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks. Paper presented at The 16th IEEE International Conference on Smart City (IEEE SmartCity-2018), Exeter, UK
In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional uneq...
Cloud Computing & Cyber Security
Presentation / Conference
Manoussos, B. (2018, April)
Cloud Computing & Cyber Security. Presented at The Law Society of Scotland - Law & Technology Roadshow, Glasgow
Presentation on Cloud Computing and Cyber Security in relation to Law Firms in Scotland.
Blockchain and Git repositories for sticky policies protected OOXML.
Presentation / Conference
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November)
Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based
Information Rights Management (IRM) model extension with
enhanced accountability for both a sticky policy and an attached
data. This wor...
Large Scale Application Model potential of eHealth technology under 5G AP
Presentation / Conference
Thuemmler, C. (2017, September)
Large Scale Application Model potential of eHealth technology under 5G AP. Paper presented at IEEE 5G-IoT
No abstract available.
5G - What architecture to serve vertical industry
Presentation / Conference
Thuemmler, C. (2017, May)
5G - What architecture to serve vertical industry. Presented at IEEE ICC 2017, Paris
5G offers the promise to dynamically satisfy a multiplicity of concurrent requirements originating from various business models of vertical industries. The 5G PPP has publishe...
5G as an enabler for Medical IOT - 5GMIOT
Presentation / Conference
Thuemmler, C., & Jefefries, N. (2016, December)
5G as an enabler for Medical IOT - 5GMIOT. Presented at IEEE Globecom 2016
Short Power Point presentation on 5G as enabler for Medical IoT – 5GMIOT Standards, policies and strategies for social technological alignment of 5G technology
Evaluation of the DFET Cloud.
Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September)
Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...
A decentralized group key management protocol for mobile Internet of things (DBGK)
Presentation / Conference
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015, August)
A decentralized group key management protocol for mobile Internet of things (DBGK). Paper presented at The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15
Cyber security challenges for cloud based services.
Presentation / Conference
Buchanan, W. J. (2015, June)
Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh
Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud