Decrypting Live SSH Traffic in Virtual Environments
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019)
Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts re...
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
Barrowclough, J. P., & Asif, R. (2018)
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, 1-20. https://doi.org/10.1155/2018/1681908
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hyper...
Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain
Buchanan, B., & Naqvi, N. (2018)
Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain. The Journal of the British Blockchain Association, 1(1), 1-4
A blockchain enabled 'Digital Single Economy " can act as a catalyst for growth and could provide a platform where borderless innovative practices will thrive and create a tru...
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...
Distance Measurement Methods for Improved Insider Threat Detection
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment
Asif, R., & Buchanan, W. J. (2017)
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017, 1-10. https://doi.org/10.1155/2017/7616847
There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile...
Password Pattern and Vulnerability Analysis for Web and Mobile Applications
Li, S., Romdhani, I., & Buchanan, W. (2016)
Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile ...
The Internet of Things: a security point of view.
Li, S., Tryfonas, T., & Li, H. (2016)
The Internet of Things: a security point of view. Internet Research, 26(2), 337-359. https://doi.org/10.1108/IntR-07-2014-0173
-- To provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technol...
Intrusion detection method based on nonlinear correlation measure
Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F., & Jamdagni, A. (2014)
Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8(2/3), 77. https://doi.org/10.1504/ijipt.2014.066377
Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services,...
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...