INSPIRING FUTURES

Browse by Dewey Subject

Up a level
Export as [feed] RSS
Group by: Creators | Item Type | No Grouping
Number of items at this level: 110.

Wang, Zhe, Chalmers, Kevin and Liu, Xiaodong (2014) Evolution pattern verification for services evolution in clouds with model driven architecture. the International Journal for e-Learning Security (IJeLS), Infonomics Society, UK, 3 (3/4). ISSN 2046-4568

van Deursen, Nicole, Buchanan, William J and Duff, Alistair (2013) Monitoring information security risks within health care. Computers and Security, 37. pp. 31-45. ISSN 0167-4048

Penrose, Philip, Macfarlane, Richard and Buchanan, William J (2013) Approaches to the classification of high entropy file fragments. Digital Investigation. ISSN 1742-2876 (In Press)

Buchanan, William J and Smales, Adrian (2013) Cyber risk and opportunities in the Cloud. In: Cloud Security Congress 2013, Sept 2013 , Edinburgh. (Unpublished)

Capodieci, Nicola, Hart, Emma and Cabri, Giacomo (2013) Designing self-aware adaptive systems: from autonomic computing to cognitive immune networks. In: IEEE Conference on Self-Organising and Self-Adaptative Systems (SASO), 9-13 September 2013, Philadelphia, USA. (In Press)

Buchanan, William J, Macfarlane, Richard and Clayton, John (2013) Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. In: CyberForensics 2013. Springer. (In Press)

Kwecka, Zbigniew, Buchanan, William J and Schafer, Burkhard (2013) "I am Spartacus" – privacy enhancing technologies and privacy as a public good. Artificial Intelligence and Law. ISSN 0924-8463 (In Press)

Thomson, Alistair, Graham, Martin and Kennedy, Jessie (2013) Pianola - visualization of multivariate time-series security event data. In: Proceedings of IV2013. IEEE, London, UK, pp. 123-131. ISBN 978-0-7695-5049-7 (In Press)

Buchanan, William J and Smales, Adrian (2013) Public perceptions in health care security. In: Health Informatics 2013, 2013 , Heriot-Watt University, Edinburgh. (Unpublished)

Buchanan, William J (2013) The challenges of Big Data: future risks, governance and trust. In: The Future of Cyber Security 2013, March 2013 , London, UK. (Unpublished)

Buchanan, William J and Smales, Adrian (2013) e-Health in the Cloud. In: Future of e-Health, 2013 , Hollyrood, Edinburgh. (Unpublished)

Buchanan, William J (2012) Advanced cloud and virtualisation. CRC Press. ISBN 1439880379

Fang, Daren, Liu, Xiaodong, Romdhani, Imed and Zhao, Huiqun (2012) Towards OWL 2 natively supported fuzzy cloud ontology. In: 6th IEEE International Workshop Quality-Oriented Reuse of Software (IEEE QUORS’12). IEEE Computer Society, pp. 328-333. ISBN 978-1-4673-2714-5

Buchanan, William J (2012) Training the next generation. In: Digital Security and Cybercrime Staff Skills Shortage: Addressing the Issues, 2012 June 28, Edinburgh. (Unpublished)

Buchanan, William J, Fan, Lu, Ekonomou, Elias and Lo, Owen (2012) Cloud4Health. In: Symposium on the Future of e-Health, 17-18 May 2012 , Edinburgh Napier University, Edinburgh. (Unpublished)

Thuemmler, Christoph, Fan, Lu, Buchanan, William J, Lo, Owen, Ekonomou, Elias and Khedim, Abou Sofyane (2012) E-Health: chances and challenges of distributed, service oriented architectures. Journal of Cyber Security and Mobility, 37 (52). ISSN 2245-1439

Buchanan, William J (2012) Education & training for future threats. In: ITEC 2012, 23 May 2012 , London. (Unpublished)

Wang, Zhe, Liu, Xiaodong and Chalmers, Kevin (2012) Evolution pattern for service evolution in clouds. In: The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012). Infonomics Society, UK , London . ISBN 978-1-908320-08-7

Waheed, Shahzad (2012) Implementation and evaluation of a botnet analysis and detection method in a virtual environment. Other thesis, Edinburgh Napier University.

Buchanan, William J, Fan, Lu, Ekonomou, Elias, Lo, Owen, Uthmani, Omair and Thuemmler, Christoph (2012) Integrating assisted living with primary and secondary health care. In: Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing, 2012 May, Edinburgh. (Unpublished)

Clayton, John (2012) Investigation into a digital forensics triage tool using sampling, hashes and bloom filters - SHAFT. Other thesis, Edinburgh Napier University.

Buchanan, William J (2012) New Threats. In: Transatlantic Conference 2012, 2012 , Edinburgh. (Unpublished)

Uwagbole, Solomon, Buchanan, William J and Fan, Lu (2012) Novel tracking of rogue network packets using danger theory approach. 11th European Conference on Information Warfare and Security (ECIW-2012). pp. 277-286.

Buchanan, William J, Fan, Lu, Ekonomou, Elias, Lo, Owen and Thuemmler, Christoph (2012) Patient centric health care: an integrated and secure, cloud-based, e-Health platform. In: BCS Branch Meeting, 1st February 2012 , University of Edinburgh Informatics Forum. (Unpublished)

Buchanan, William J (2012) Plugging the Gaps. ITNOW, 54 (4). 36-37. ISSN 1746-5702

Buchanan, William J, Kwecka, Zbigniew and Ekonomou, Elias (2012) A Privacy preserving method using privacy enhancing techniques for location based services. Mobile Networks and Applications. ISSN 1383-469X

Buchanan, William J (2012) Skills for cyber security. In: Cybercrime and Data Protection, February 2012 , Dynamic Earth, Edinburgh. (Unpublished)

Buchanan, William J, Fan, Lu, Ekonomou, Elias, Lo, Owen, Thuemmler, Christoph and Lawson, Alistair (2012) The UK’s eHealth cloud project: EHR and the cloud: assessing the benefits and mitigating the risks. In: Arab Health 2012 (Electronic Healthcare Records), 23-24 January 2012 , Dubai, United Arab Emirates. (Unpublished)

Russell, Gordon, Macfarlane, Richard and Ludwiniak, Robert (2012) A forensic image description language for generating test images. In: Proceedings of the 6th International Conference on Cybercrime Forensics Education & Training. British Computer Society. ISBN 978-1-899253-94-4

Akram, Raja Naeem, Markantonakis, Konstantinos and Mayes, Keith (2012) A privacy preserving application acquisition protocol. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). IEEE Computer Society, pp. 383-392. ISBN 978-0-7695-4745-9

Miehling, Mathew, Buchanan, William J and Lawson, Alistair (2011) Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. In: SCONE-the Scottish Networking Event, August 2011 , School of Computing, University of Glasgow. (Unpublished)

Buchanan, William J (2011) Introduction to security and network forensics. Auerbach Publications. ISBN 978-0849335686

Kwecka, Zbigniew (2011) Cryptographic privacy-preserving enhancement method for investigative data acquisition. PhD thesis, Edinburgh Napier University.

Macfarlane, Richard, Buchanan, William J, Ekonomou, Elias, Uthmani, Omair, Fan, Lu and Lo, Owen (2011) Formal security policy implementations in network firewalls. Computers & Security, 31 (2). pp. 253-270. ISSN 01674048

Buchanan, William J (2011) Advanced security and network forensics: cloud computing. [Video]

Buchanan, William J, Macfarlane, Richard, Flandrin, Flavien, Graves, Jamie, Fan, Lu, Ekonomou, Elias, Bose, Niladri and Ludwiniak, Robert (2011) Cloud-based digital forensics evaluation test (D-FET) platform. In: Cyberforensics 2011, 27th-28th June 2011, University of Strathclyde, Glasgow.

Buchanan, William J, Fan, Lu, Thuemmler, Christoph, Lo, Owen and Ekonomou, Elias (2011) Cloud-based e-Health System. In: BCS Health Informatics, September 2011 , Edinburgh. (Unpublished)

Buchanan, William J (2011) Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security. In: CFET: Cybercrime Forensics Education & Training., September 2011 , Canterbury Christ Church University, Canterbury. (Unpublished)

Uthmani, Omair, Buchanan, William J, Lawson, Alistair, Scott, Russell, Schafer, Burkhard and Fan, Lu (2011) Crime risk evaluation within information sharing between the Police and community partners. Information & Communications Technology Law, 20 (2). pp. 57-81. ISSN 1360-0834

Ekonomou, Elias, Fan, Lu, Buchanan, William J and Thuemmler, Christoph (2011) An Integrated Cloud-based Healthcare Infrastructure. In: 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom). IEEE , pp. 532-536. ISBN 978-1-4673-0090-2

Jaroucheh, Zakwan, Liu, Xiaodong, Smith, Sally and Zhao, Huiqun (2011) Lightweight software product line based privacy protection scheme for pervasive applications. In: 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW),. IEEE Computer Society, Munich, Germany, pp. 351-355. ISBN 978-1-4577-0980-7

Kwecka, Zbigniew, Buchanan, William J and Spiers, Duncan A (2011) Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach (IJITSA) : Special issue on Privacy and Security Issues in IT, 4 (2). pp. 12-31. ISSN 1935-570X

Buchanan, William J, Graves, Jamie, Bose, Niladri, Macfarlane, Richard, Davison, Brian and Ludwiniak, Robert (2011) Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. HEA ICS Conference.

Wigan, Marcus (2011) Protecting our digital identities. Voice, 7 (9). p. 4.

Uthmani, Omair, Buchanan, William J and Lawson, Alistair (2011) Risk analysis for criminal context in information sharing policies. In: SCONE - the Scottish Networking event , August 2011, School of Computing, University of Glasgow. (Unpublished)

Buchanan, William J (2011) Security and forensic computing: authentication. [Video]

Buchanan, William J (2011) Security and forensic computing: encryption. [Video]

Buchanan, William J (2011) Security and forensic computing: forensic computing. [Video]

Buchanan, William J (2011) Security and forensic computing: introduction to computer security. [Video]

Buchanan, William J (2011) Security and forensic computing: network security. [Video]

Buchanan, William J (2011) Security and forensic computing: software security. [Video]

Hazelhoff Roelfzema, Nicole (2011) A comparative review of information security risk assessment methodologies for health care. In: IADIS e-Society, 2011 March, Avilla, Spain. (Unpublished)

Buchanan, William J (2011) A next generation Cloud-based health care platform. In: Innovation in Healthcare, May 2011 , London. (Unpublished)

Buchanan, William J and Kwecka, Zbigniew (2011) A novel privacy preserving method for the location tracking of mobile devices. The Journal of Mobile Communication, Computation and Information: Special Issue on Security. ISSN 1022-0038

Buchanan, William J, Thuemmler, Christoph, Fan, Lu, Lo, Owen and Khedim, Abou Sofyane (2010) An e-Health cloud. In: Cloud Computing for the Public Sector, 2010 September, Edinburgh.

Zhao, Liang, Al-Dubai, Ahmed and Min, Geyong (2010) GLBM: A new QoS aware multicast scheme for wireless Mesh network. Journal of Systems and Software , 83 (8). pp. 1318-1326. ISSN 0164-1212

Jacob, Benoit (2010) Experimental host-and network-based analyser and detector for Botnets. Other thesis, Edinburgh Napier University.

Vergin, Adrian (2010) Windows encyption threat analysis. Other thesis, Edinburgh Napier University.

Uthmani, Omair, Buchanan, William J and Lawson, Alistair (2010) Novel information sharing architecture between the Police and their community partners. In: Scottish Networking Event 2010, 2010 February, Napier University, Edinburgh.

Buchanan, William J (2010) 3DES Encryption and Decryption in Microsoft .NET. Technical Report. Edinburgh Napier University.

Buchanan, William J (2010) AES Encryption and Decryption in Microsoft .NET. Technical Report. CDCS.

Buchanan, William J (2010) Advanced security and network forensics: Introduction. [Video]

Buchanan, William J (2010) Advanced security and network forensics: network forensics. [Video]

Buchanan, William J (2010) Advanced security and network forensics: obfuscation and data hiding. [Video]

Buchanan, William J (2010) Advanced security and network forensics: web Infrastructures. [Video]

Shaikh, Alan (2010) Botnet analysis and detection. Other thesis, Edinburgh Napier University.

Howie, John (2010) Key note: Information Lifecycle and Data Governance. In: Goverance, Risk and Compliance, 2010 August, Lisbon, Portugal . (Unpublished)

Uthmani, Omair, Buchanan, William J, Lawson, Alistair, Thuemmler, Christoph, Scott, Russell, Lavery, Anne and Mooney, Chris (2010) Novel information sharing syntax for data sharing between police and community partners, using role-based security. In: 9th European Conference on Information Warfare and Security. ACI, Greece, p. 394.

Hazelhoff Roelfzema, Nicole (2010) Novel security assessment for personal health data. In: Perada workshop on Privacy, Security & Trust, 2010 November, Rome, Italy. (Unpublished)

Buchanan, William J (2010) Patent: Improvements in or relating to digital forensics. WO/2010/029346.

Kwecka, Zbigniew, Buchanan, William J and Spiers, Duncan A (2010) Privacy-preserving data acquisition protocol. In: IEEE International Conference of Computational Methods in Electrical and Electronics Engineering. IEEE, Listvyanka, 131 - 136. ISBN 978-1-4244-7625-1

Buchanan, William J (2010) RC2 Encryption and Decryption in Microsoft .NET. Technical Report. CDCS.

Flandrin, Flavien (2010) Rate based IPS for DDoS. Other thesis, Edinburgh Napier University.

Buchanan, William J (2010) Security and forensic computing: intrusion detection systems. [Video]

Lo, Owen, Graves, Jamie and Buchanan, William J (2010) Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In: Proceedings of 9th European Conference on Information Warfare and Security. ACI, Greece, pp. 190-200.

Symon, Colin (2009) Enhanced event time-lining for digital forensic systems. Other thesis, Edinburgh Napier University.

Lo, Owen (2009) Framework for network IDS evaluation. Other thesis, Edinburgh Napier University.

Romdhani, Imed and Al-Dubai, Ahmed (2009) Integrated many-to-many multicast addressing and access control methods. In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC'09). IEEE Computer Society Press, Sousse, Tunisia, pp. 649-654. ISBN 978-1-4244-4671-1

Saliou, Lionel (2009) Network Firewall Dynamic Performance Evaluation and Formalisation. PhD thesis, Edinburgh Napier University.

Gilbertson , Stuart (2009) Analysis and development of a prototype for the detection and mitigation of HTTP based distributed denial of service attacks. Other thesis, Edinburgh Napier University.

Corsini, Julien (2009) Analysis and evaluation of network intrusion detection methods to uncover data theft. MEng thesis, Edinburgh Napier University.

Kwecka, Zbigniew, Buchanan, William J and Spiers, Duncan A (2009) Application and analysis of private matching schemes based on commutative cryptosystems. In: 9th European Conference on Information Warfare and Security, 6th-7th July 2009, Military Academy, Lisbon, Portugal.

Riley, Chris W, Buckner, Kathy, Johnson, Graham and Benyon, David (2009) Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & Society, 24 (3). pp. 295-306. ISSN 0951-5666

Macfarlane, Richard (2009) An integrated firewall policy validation tool. Other thesis, Edinburgh Napier University.

Fernandez Sepulveda, Antonio (2008) Evaluation of digital identity using Windows CardSpace. MEng thesis, Edinburgh Napier University.

Romdhani, Imed and Al-Dubai, Ahmed (2008) A multi-channel hybrid MAC protocol for wireless Mesh networks. In: Proceedings of the IEEE 8th International Symposium on Computer Networks (ISCN?08), Istanbul, Turkey. IEEE.

Dougan, Sarah and Saliou, Lionel (2008) An Information Economy Built on Sand? Expert Witness Institute NewsLetter, 12 (2). 14 -15.

Kwecka, Zbigniew, Buchanan, William J and Saliou, Lionel (2008) Validation of 1-N OT algorithms in privacy-preserving investigations. In: 7th European Conference on Information Warfare and Security, 30th June-1st July 2008, University of Plymouth, UK.

Clarke, R A and Wigan, Marcus (2008) You are where you have been. In: Australia and the new technologies: Evidence based policy on public administration. [Proceedings of the] Third RSNA Workshop on the Social Implications of National Security: Evidence based policy on public administration, 23-24 July 2008. Australian Homeland Security Research Centre, Australia, NSW, Unversity of Wollongong: , pp. 100-113. ISBN 9781741281507

Saliou, Lionel, Buchanan, William J, Graves, Jamie and Munoz, Jose (2007) Scenario Analysis using Out-of-line Firewall Evaluation Framework. In: 6th European Conference on Information Warfare, and Security, July 2-3, Shrivenham, UK.

Geeringh, Christopher (2007) Generic firewall rule compiler and modeller. Other thesis, Edinburgh Napier University.

Gunn, Ewan (2007) Authorisation and authentication of processes in distributed systems. Other thesis, Edinburgh Napier University.

Saliou, Lionel, Buchanan, William J, Graves, Jamie and Munoz, Jose (2006) Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In: 5th European Conference on Information Warfare and Security, 1 - 2 June 2006, Helsinki, Finland.

Graves, Jamie, Buchanan, William J, Saliou, Lionel and Old, L John (2006) Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. In: 5th European Conference on Information Warfare and Security (ECIW), 1st-2nd June 2006, National Defense College, Helsinki, Finland.

Kwecka, Zbigniew (2006) Application layer covert channel analysis and detection. Other thesis, Edinburgh Napier University.

Abimbola, Abiola, Munoz, Jose and Buchanan, William J (2006) A framework to detect novel computer viruses via system calls. In: 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting. PGNet, John Moores University, Liverpool, UK, pp. 308-313. ISBN 1-9025-6013-9

Jackson, Peter (2005) Detection of network threats using honeypots. Other thesis, Edinburgh Napier University.

Saliou, Lionel, Buchanan, William J, Graves, Jamie and Munoz, Jose (2005) Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. In: 4th European Conference on Information Warfare and Security, 11 - 12 July 2005, Glamorgan, United Kingdom.

AL Sebea, Hussain (2005) Dynamic detection and immunisation of malware using mobile agents. MEng thesis, Edinburgh Napier University.

Buchanan, William J, Graves, Jamie, Saliou, Lionel, Sebea, A L and Migas, Nikos (2005) Agent-based forensic investigations with an integrated framework. In: 4th European Conference of Information Warfare and Security, 11th-12th July 2005, University of Glamorgan, UK.

Llamas, David (2004) Covert channel analysis and data hiding in tcp/ip. Other thesis, Edinburgh Napier University.

Abimbola, Abiola, Munoz, Jose and Buchanan, William J (2004) Analysis and detection of cruising computer viruses. In: 3rd International Conference on Electronic Warfare and Security (EIWC), 2004.

Buchanan, William J and Llamas, David (2004) Covert channel analysis and detection using reverse proxy servers. In: 3rd International Conference on Electronic Warfare and Security (EIWC), 2004.

Pikoulas, John (2003) An agent-based Bayesian method for network intrusion detection. PhD thesis, Edinburgh Napier University.

Pikoulas, John, Buchanan, William J, Mannion, Mike and Triantafyllopoulos, K (2002) An Intelligent agent security intrusion system. Engineering of Computer-Based Systems, 2002. Proceedings. Ninth Annual IEEE International Conference and Workshop on the . 94 - 99 .

Wigan, Marcus (2002) Personal data space in organisations: managing personal knowledge and identity. In: Organising in the Information Age: Distributed Technology, Distributed Leadership, Distributed Identity, Distributed Discourse. Voices in Development Management . Ashgate, pp. 45-56. ISBN 978-0754630678

Pikoulas, John, Buchanan, William J, Mannion, Mike and Triantafyllopoulos, K (2001) An agent based Bayesian forecasting model for enhanced network security. In: Engineering of Computer Based Systems, 2001. ECBS 2001. Proceedings. Eighth Annual IEEE International Conference and Workshop on the. IEEE, Washington, 247 - 254. ISBN 0-7695-1086-8

Wang, Hsiu-Chiung (2000) Speed improvements for the RSA encryption method. MPhil thesis, Edinburgh Napier University.

Wigan, Marcus (2000) Personal data space in organisations: managing personal knowledge and identity. In: 8th International Asia Pacific Organisational Studies Colloquium, 14th-17th December 2000 , Sydney, Australia.

Liu, Xiaodong (1995) Design and implementation of digital signature systems. Academic Journal of North China Electric Power University, 11. ISSN 1008 2603

This list was generated on Wed Apr 23 16:27:57 2014 IST.

Edinburgh Napier University is a registered Scottish charity. Registration number SC018373