A framework for live host-based Bitcoin wallet forensics and triage
Journal Article
Holmes, A., & Buchanan, W. J. (2023)
A framework for live host-based Bitcoin wallet forensics and triage. Forensic Science International: Digital Investigation, 44, Article 301486. https://doi.org/10.1016/j.fsidi.2022.301486
Organised crime and cybercriminals use Bitcoin, a popular cryptocurrency, to launder money and move it across borders with impunity. The UK and other countries have legislatio...
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification
Journal Article
Davies, S., Macfarlane, R., & Buchanan, W. (2022)
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. Entropy, 24(10), Article 1503. https://doi.org/10.3390/e24101503
Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by ...
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform
Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022)
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively...
Ensemble learning-based IDS for sensors telemetry data in IoT networks
Journal Article
Naz, N., Khan, M. A., Alsuhibany, S. A., Diyan, M., Tan, Z., Khan, M. A., & Ahmad, J. (2022)
Ensemble learning-based IDS for sensors telemetry data in IoT networks. Mathematical Biosciences and Engineering, 19(10), 10550-10580. https://doi.org/10.3934/mbe.2022493
The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT de...
A novel flow-vector generation approach for malicious traffic detection
Journal Article
Hou, J., Liu, F., Lu, H., Tan, Z., Zhuang, X., & Tian, Z. (2022)
A novel flow-vector generation approach for malicious traffic detection. Journal of Parallel and Distributed Computing, 169, 72-86. https://doi.org/10.1016/j.jpdc.2022.06.004
Malicious traffic detection is one of the most important parts of cyber security. The approaches of using the flow as the detection object are recognized as effective. Benefit...
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
Journal Article
Kumar, A., Saha, R., Conti, M., Kumar, G., Buchanan, W. J., & Kim, T. H. (2022)
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. Journal of Network and Computer Applications, 204, Article 103414. https://doi.org/10.1016/j.jnca.2022.103414
Internet of Thing (IoT) is one of the most influential technologies in the present time. People, processes, and things are connected with the Internet through IoT. With the in...
A Study of Online Safety and Digital Literacy of Academic Researchers Working from Home during the COVID-19 Pandemic
Presentation / Conference
Haynes, D., & Salzano, R. (2022, April)
A Study of Online Safety and Digital Literacy of Academic Researchers Working from Home during the COVID-19 Pandemic. Paper presented at ASIS&T Global 24-hour Conference, 2022, Online
Universities in the UK responded to the COVID-19 pandemic by moving teaching to an online environment and requiring staff to work from home, as far as possible. Researchers fa...
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map
Journal Article
Alharbi, A. R., Ahmad, J., Arshad, Shaukat, S., Masood, F., Ghadi, Y. Y., …Buchanan, W. J. (2022)
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complexity, 2022, Article 7047282. https://doi.org/10.1155/2022/7047282
With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain...
Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT
Journal Article
Wang, F., Yang, S., Wang, C., Li, Q., Babaagba, K., & Tan, Z. (2022)
Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT. International Journal of Intelligent Systems, 37(10), 7058-7078. https://doi.org/10.1002/int.22871
Internet of Things (IoT) is fast growing. Non-PC devices under the umbrella of IoT have been increasingly applied in various fields and will soon account for a significant sha...
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture
Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022)
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291
E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evo...