Date


Output Type

Download Available

84 results

A framework for live host-based Bitcoin wallet forensics and triage

Journal Article
Holmes, A., & Buchanan, W. J. (2023)
A framework for live host-based Bitcoin wallet forensics and triage. Forensic Science International: Digital Investigation, 44, Article 301486. https://doi.org/10.1016/j.fsidi.2022.301486
Organised crime and cybercriminals use Bitcoin, a popular cryptocurrency, to launder money and move it across borders with impunity. The UK and other countries have legislatio...

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

Journal Article
Davies, S., Macfarlane, R., & Buchanan, W. (2022)
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. Entropy, 24(10), Article 1503. https://doi.org/10.3390/e24101503
Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by ...

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

Journal Article
Kumar, A., Saha, R., Conti, M., Kumar, G., Buchanan, W. J., & Kim, T. H. (2022)
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. Journal of Network and Computer Applications, 204, Article 103414. https://doi.org/10.1016/j.jnca.2022.103414
Internet of Thing (IoT) is one of the most influential technologies in the present time. People, processes, and things are connected with the Internet through IoT. With the in...

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map

Journal Article
Alharbi, A. R., Ahmad, J., Arshad, Shaukat, S., Masood, F., Ghadi, Y. Y., …Buchanan, W. J. (2022)
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complexity, 2022, Article 7047282. https://doi.org/10.1155/2022/7047282
With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain...

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022)
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291
E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evo...

Ransomware: Analysing the Impact on Windows Active Directory Domain Services

Journal Article
McDonald, G., Papadopoulos, P., Pitropakis, N., Ahmad, J., & Buchanan, W. J. (2022)
Ransomware: Analysing the Impact on Windows Active Directory Domain Services. Sensors, 22(3), Article 953. https://doi.org/10.3390/s22030953
Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enter...

NapierOne: A modern mixed file data set alternative to Govdocs1

Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2022)
NapierOne: A modern mixed file data set alternative to Govdocs1. Forensic Science International: Digital Investigation, 40, Article 301330. https://doi.org/10.1016/j.fsidi.2021.301330
It was found when reviewing the ransomware detection research literature that almost no proposal provided enough detail on how the test data set was created, or sufficient des...

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT

Journal Article
Almas Khan, M., Khan, M. A., Ullah Jan, S., Ahmad, J., Jamal, S. S., Shah, A. A., …Markakis, E. K. (2021)
A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors, 21(21), Article 7016. https://doi.org/10.3390/s21217016
A large number of smart devices in Internet of Things (IoT) environments communicate via different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely ...

A Blockchain Framework in Post-Quantum Decentralization

Journal Article
Saha, R., Kumar, G., Devgun, T., Buchanan, W., Thomas, R., Alazab, M., …Rodrigues, J. (in press)
A Blockchain Framework in Post-Quantum Decentralization. IEEE Transactions on Services Computing, https://doi.org/10.1109/tsc.2021.3116896
The decentralization and transparency have provided wide acceptance of blockchain technology in various sectors through numerous applications. The claimed security services by...

A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions

Journal Article
Saha, R., Geetha, G., Kumar, G., Buchanan, W. J., & Kim, T. (2021)
A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions. Applied Sciences, 11(17), Article 8073. https://doi.org/10.3390/app11178073
Cryptographic algorithms and functions should possess some of the important functional requirements such as: non-linearity, resiliency, propagation and immunity. Several previ...