Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2019)
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In 2018 IEEE International Conference on Big Data (Big Data)https://doi.org/10.1109/BigData.2018.8621922
Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exis...
Mitigating Disaster using Secure Threshold-Cloud Architecture
Ukwandu, E., Buchanan, W. J., & Russell, G. (2018)
Mitigating Disaster using Secure Threshold-Cloud Architecture. Current Trends in Computer Sciences & Applications, 1(2),
There are many risks in moving data into public cloud environments, along with an increasing threat around large-scale data leakage during cloud outages. This work aims to app...
The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime
Dyson, S., Buchanan, W., & Bell, L. (2018)
The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime. The Journal of the British Blockchain Association, 1(2), 1-6. https://doi.org/10.31585/jbba-1-2-%288%292018
We increasingly live in a world where there is a balance between the rights to privacy and the requirements for consent, and the rights of society to protect itself. Within th...
System and method for management of confidential data
Buchanan, B., Lo, O., Macfarlane, R., Penrose, P., & Ramsay, B. (in press)
System and method for management of confidential data. GB2561176A
This application is for a method of data management to identify confidential digital content on a database by first receiving a management request 302 from a system 304 to car...
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device
Lo, O., Buchanan, W. J., & Carson, D. (2017)
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. In ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security
Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consu...
GDPR and Cyber Security for Business Information Systems
Gobeo, A., Fowler, C., & Buchanan, B. (2018)
GDPR and Cyber Security for Business Information Systems. River Publishers
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundame...
Buchanan, B. (2017)
Cryptography. River Publishers
Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it ...
The next cyberattack could come from sound waves
Buchanan, B. (2017)
The next cyberattack could come from sound waves. https://theconversation.com/the-next-cyberattack-could-come-from-sound-waves-74716
You might think your smartphone or laptop is relatively safe from cyber attacks thanks to anti-virus and encryption software. But your devices are increasingly at risk from “s...
Secret shares to protect health records in Cloud-based infrastructures
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...
When amateurs do the job of a professional, the result is smart grids secured by dumb crypto.
Buchanan, W. J. (2015)
When amateurs do the job of a professional, the result is smart grids secured by dumb crypto
Security relies upon good programming and correct adherence to well-designed standards. If the standards are sloppy, then security has been compromised from the outset. Smart ...