INSPIRING FUTURES

Browse by Dewey Subject

Up a level
Export as [feed] RSS
Group by: Creators | Item Type | No Grouping
Jump to: A | B | C | D | E | F | G | H | J | K | L | M | P | R | S | T | U | V | W | Z
Number of items at this level: 113.

A

Akram, Raja Naeem, Markantonakis, Konstantinos and Mayes, Keith (2012) A privacy preserving application acquisition protocol. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). IEEE Computer Society, pp. 383-392. ISBN 978-0-7695-4745-9

Abimbola, Abiola, Munoz, Jose and Buchanan, William J (2006) A framework to detect novel computer viruses via system calls. In: 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting. PGNet, John Moores University, Liverpool, UK, pp. 308-313. ISBN 1-9025-6013-9

AL Sebea, Hussain (2005) Dynamic detection and immunisation of malware using mobile agents. MEng thesis, Edinburgh Napier University.

Abimbola, Abiola, Munoz, Jose and Buchanan, William J (2004) Analysis and detection of cruising computer viruses. In: 3rd International Conference on Electronic Warfare and Security (EIWC), 2004.

B

Buchanan, William J (2014) Discrete Logarithms within Computer and Network Security. In: Napier 400 - Numerical Algorithms and Intelligent Software Symposium, April 2014, International Centre for Mathematical Sciences, University of Edinburgh. (Unpublished)

Buchanan, William J and Smales, Adrian (2013) Cyber risk and opportunities in the Cloud. In: Cloud Security Congress 2013, Sept 2013 , Edinburgh. (Unpublished)

Buchanan, William J, Macfarlane, Richard and Clayton, John (2013) Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. In: CyberForensics 2013. Springer. (In Press)

Buchanan, William J and Smales, Adrian (2013) Public perceptions in health care security. In: Health Informatics 2013, 2013 , Heriot-Watt University, Edinburgh. (Unpublished)

Buchanan, William J (2013) The challenges of Big Data: future risks, governance and trust. In: The Future of Cyber Security 2013, March 2013 , London, UK. (Unpublished)

Buchanan, William J and Smales, Adrian (2013) e-Health in the Cloud. In: Future of e-Health, 2013 , Hollyrood, Edinburgh. (Unpublished)

Buchanan, William J (2012) Advanced cloud and virtualisation. CRC Press. ISBN 1439880379

Buchanan, William J (2012) Training the next generation. In: Digital Security and Cybercrime Staff Skills Shortage: Addressing the Issues, 2012 June 28, Edinburgh. (Unpublished)

Buchanan, William J, Fan, Lu, Ekonomou, Elias and Lo, Owen (2012) Cloud4Health. In: Symposium on the Future of e-Health, 17-18 May 2012 , Edinburgh Napier University, Edinburgh. (Unpublished)

Buchanan, William J (2012) Education & training for future threats. In: ITEC 2012, 23 May 2012 , London. (Unpublished)

Buchanan, William J, Fan, Lu, Ekonomou, Elias, Lo, Owen, Uthmani, Omair and Thuemmler, Christoph (2012) Integrating assisted living with primary and secondary health care. In: Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing, 2012 May, Edinburgh. (Unpublished)

Buchanan, William J (2012) New Threats. In: Transatlantic Conference 2012, 2012 , Edinburgh. (Unpublished)

Buchanan, William J, Fan, Lu, Ekonomou, Elias, Lo, Owen and Thuemmler, Christoph (2012) Patient centric health care: an integrated and secure, cloud-based, e-Health platform. In: BCS Branch Meeting, 1st February 2012 , University of Edinburgh Informatics Forum. (Unpublished)

Buchanan, William J (2012) Plugging the Gaps. ITNOW, 54 (4). 36-37. ISSN 1746-5702

Buchanan, William J, Kwecka, Zbigniew and Ekonomou, Elias (2012) A Privacy preserving method using privacy enhancing techniques for location based services. Mobile Networks and Applications. ISSN 1383-469X

Buchanan, William J (2012) Skills for cyber security. In: Cybercrime and Data Protection, February 2012 , Dynamic Earth, Edinburgh. (Unpublished)

Buchanan, William J, Fan, Lu, Ekonomou, Elias, Lo, Owen, Thuemmler, Christoph and Lawson, Alistair (2012) The UK’s eHealth cloud project: EHR and the cloud: assessing the benefits and mitigating the risks. In: Arab Health 2012 (Electronic Healthcare Records), 23-24 January 2012 , Dubai, United Arab Emirates. (Unpublished)

Buchanan, William J (2011) Introduction to security and network forensics. Auerbach Publications. ISBN 978-0849335686

Buchanan, William J (2011) Advanced security and network forensics: cloud computing. [Video]

Buchanan, William J, Macfarlane, Richard, Flandrin, Flavien, Graves, Jamie, Fan, Lu, Ekonomou, Elias, Bose, Niladri and Ludwiniak, Robert (2011) Cloud-based digital forensics evaluation test (D-FET) platform. In: Cyberforensics 2011, 27th-28th June 2011, University of Strathclyde, Glasgow.

Buchanan, William J, Fan, Lu, Thuemmler, Christoph, Lo, Owen and Ekonomou, Elias (2011) Cloud-based e-Health System. In: BCS Health Informatics, September 2011 , Edinburgh. (Unpublished)

Buchanan, William J (2011) Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security. In: CFET: Cybercrime Forensics Education & Training., September 2011 , Canterbury Christ Church University, Canterbury. (Unpublished)

Buchanan, William J, Graves, Jamie, Bose, Niladri, Macfarlane, Richard, Davison, Brian and Ludwiniak, Robert (2011) Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. HEA ICS Conference.

Buchanan, William J (2011) Security and forensic computing: authentication. [Video]

Buchanan, William J (2011) Security and forensic computing: encryption. [Video]

Buchanan, William J (2011) Security and forensic computing: forensic computing. [Video]

Buchanan, William J (2011) Security and forensic computing: introduction to computer security. [Video]

Buchanan, William J (2011) Security and forensic computing: network security. [Video]

Buchanan, William J (2011) Security and forensic computing: software security. [Video]

Buchanan, William J (2011) A next generation Cloud-based health care platform. In: Innovation in Healthcare, May 2011 , London. (Unpublished)

Buchanan, William J and Kwecka, Zbigniew (2011) A novel privacy preserving method for the location tracking of mobile devices. The Journal of Mobile Communication, Computation and Information: Special Issue on Security. ISSN 1022-0038

Buchanan, William J, Thuemmler, Christoph, Fan, Lu, Lo, Owen and Khedim, Abou Sofyane (2010) An e-Health cloud. In: Cloud Computing for the Public Sector, 2010 September, Edinburgh.

Buchanan, William J (2010) 3DES Encryption and Decryption in Microsoft .NET. Technical Report. Edinburgh Napier University.

Buchanan, William J (2010) AES Encryption and Decryption in Microsoft .NET. Technical Report. CDCS.

Buchanan, William J (2010) Advanced security and network forensics: Introduction. [Video]

Buchanan, William J (2010) Advanced security and network forensics: network forensics. [Video]

Buchanan, William J (2010) Advanced security and network forensics: obfuscation and data hiding. [Video]

Buchanan, William J (2010) Advanced security and network forensics: web Infrastructures. [Video]

Buchanan, William J (2010) Patent: Improvements in or relating to digital forensics. WO/2010/029346.

Buchanan, William J (2010) RC2 Encryption and Decryption in Microsoft .NET. Technical Report. CDCS.

Buchanan, William J (2010) Security and forensic computing: intrusion detection systems. [Video]

Buchanan, William J, Graves, Jamie, Saliou, Lionel, Sebea, A L and Migas, Nikos (2005) Agent-based forensic investigations with an integrated framework. In: 4th European Conference of Information Warfare and Security, 11th-12th July 2005, University of Glamorgan, UK.

Buchanan, William J and Llamas, David (2004) Covert channel analysis and detection using reverse proxy servers. In: 3rd International Conference on Electronic Warfare and Security (EIWC), 2004.

C

Capodieci, Nicola, Hart, Emma and Cabri, Giacomo (2013) Designing self-aware adaptive systems: from autonomic computing to cognitive immune networks. In: IEEE Conference on Self-Organising and Self-Adaptative Systems (SASO), 9-13 September 2013, Philadelphia, USA. (In Press)

Clayton, John (2012) Investigation into a digital forensics triage tool using sampling, hashes and bloom filters - SHAFT. Other thesis, Edinburgh Napier University.

Corsini, Julien (2009) Analysis and evaluation of network intrusion detection methods to uncover data theft. MEng thesis, Edinburgh Napier University.

Clarke, R A and Wigan, Marcus (2008) You are where you have been. In: Australia and the new technologies: Evidence based policy on public administration. [Proceedings of the] Third RSNA Workshop on the Social Implications of National Security: Evidence based policy on public administration, 23-24 July 2008. Australian Homeland Security Research Centre, Australia, NSW, Unversity of Wollongong: , pp. 100-113. ISBN 9781741281507

D

Dougan, Sarah and Saliou, Lionel (2008) An Information Economy Built on Sand? Expert Witness Institute NewsLetter, 12 (2). 14 -15.

E

Ekonomou, Elias, Fan, Lu, Buchanan, William J and Thuemmler, Christoph (2011) An Integrated Cloud-based Healthcare Infrastructure. In: 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom). IEEE , pp. 532-536. ISBN 978-1-4673-0090-2

F

Flandrin, Flavien, Buchanan, William J, Macfarlane, Richard, Ramsay, Bruce and Smales, Adrian (2014) Evaluating Digital Forensic Tools (DFTs). In: 7th International Conference : Cybercrime Forensics Education & Training, 10th-11th July 2014, Canterbury Christ Church University, Canterbury, England. (In Press)

Fang, Daren, Liu, Xiaodong, Romdhani, Imed and Zhao, Huiqun (2012) Towards OWL 2 natively supported fuzzy cloud ontology. In: 6th IEEE International Workshop Quality-Oriented Reuse of Software (IEEE QUORS’12). IEEE Computer Society, pp. 328-333. ISBN 978-1-4673-2714-5

Flandrin, Flavien (2010) Rate based IPS for DDoS. Other thesis, Edinburgh Napier University.

Fernandez Sepulveda, Antonio (2008) Evaluation of digital identity using Windows CardSpace. MEng thesis, Edinburgh Napier University.

G

Gilbertson , Stuart (2009) Analysis and development of a prototype for the detection and mitigation of HTTP based distributed denial of service attacks. Other thesis, Edinburgh Napier University.

Geeringh, Christopher (2007) Generic firewall rule compiler and modeller. Other thesis, Edinburgh Napier University.

Gunn, Ewan (2007) Authorisation and authentication of processes in distributed systems. Other thesis, Edinburgh Napier University.

Graves, Jamie, Buchanan, William J, Saliou, Lionel and Old, L John (2006) Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. In: 5th European Conference on Information Warfare and Security (ECIW), 1st-2nd June 2006, National Defense College, Helsinki, Finland.

H

Hazelhoff Roelfzema, Nicole (2011) A comparative review of information security risk assessment methodologies for health care. In: IADIS e-Society, 2011 March, Avilla, Spain. (Unpublished)

Howie, John (2010) Key note: Information Lifecycle and Data Governance. In: Goverance, Risk and Compliance, 2010 August, Lisbon, Portugal . (Unpublished)

Hazelhoff Roelfzema, Nicole (2010) Novel security assessment for personal health data. In: Perada workshop on Privacy, Security & Trust, 2010 November, Rome, Italy. (Unpublished)

J

Jaroucheh, Zakwan, Liu, Xiaodong, Smith, Sally and Zhao, Huiqun (2011) Lightweight software product line based privacy protection scheme for pervasive applications. In: 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW),. IEEE Computer Society, Munich, Germany, pp. 351-355. ISBN 978-1-4577-0980-7

Jacob, Benoit (2010) Experimental host-and network-based analyser and detector for Botnets. Other thesis, Edinburgh Napier University.

Jackson, Peter (2005) Detection of network threats using honeypots. Other thesis, Edinburgh Napier University.

K

Kwecka, Zbigniew, Buchanan, William J and Schafer, Burkhard (2014) "I am Spartacus" – privacy enhancing technologies and privacy as a public good. Artificial Intelligence and Law, 22 (2). pp. 113-139. ISSN 0924-8463

Kwecka, Zbigniew (2011) Cryptographic privacy-preserving enhancement method for investigative data acquisition. PhD thesis, Edinburgh Napier University.

Kwecka, Zbigniew, Buchanan, William J and Spiers, Duncan A (2011) Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach (IJITSA) : Special issue on Privacy and Security Issues in IT, 4 (2). pp. 12-31. ISSN 1935-570X

Kwecka, Zbigniew, Buchanan, William J and Spiers, Duncan A (2010) Privacy-preserving data acquisition protocol. In: IEEE International Conference of Computational Methods in Electrical and Electronics Engineering. IEEE, Listvyanka, 131 - 136. ISBN 978-1-4244-7625-1

Kwecka, Zbigniew, Buchanan, William J and Spiers, Duncan A (2009) Application and analysis of private matching schemes based on commutative cryptosystems. In: 9th European Conference on Information Warfare and Security, 6th-7th July 2009, Military Academy, Lisbon, Portugal.

Kwecka, Zbigniew, Buchanan, William J and Saliou, Lionel (2008) Validation of 1-N OT algorithms in privacy-preserving investigations. In: 7th European Conference on Information Warfare and Security, 30th June-1st July 2008, University of Plymouth, UK.

Kwecka, Zbigniew (2006) Application layer covert channel analysis and detection. Other thesis, Edinburgh Napier University.

L

Lo, Owen, Graves, Jamie and Buchanan, William J (2010) Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In: Proceedings of 9th European Conference on Information Warfare and Security. ACI, Greece, pp. 190-200.

Lo, Owen (2009) Framework for network IDS evaluation. Other thesis, Edinburgh Napier University.

Llamas, David (2004) Covert channel analysis and data hiding in tcp/ip. Other thesis, Edinburgh Napier University.

Liu, Xiaodong (1995) Design and implementation of digital signature systems. Academic Journal of North China Electric Power University, 11. ISSN 1008 2603

M

Miehling, Mathew, Buchanan, William J and Lawson, Alistair (2011) Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. In: SCONE-the Scottish Networking Event, August 2011 , School of Computing, University of Glasgow. (Unpublished)

Macfarlane, Richard, Buchanan, William J, Ekonomou, Elias, Uthmani, Omair, Fan, Lu and Lo, Owen (2011) Formal security policy implementations in network firewalls. Computers & Security, 31 (2). pp. 253-270. ISSN 01674048

Macfarlane, Richard (2009) An integrated firewall policy validation tool. Other thesis, Edinburgh Napier University.

P

Penrose, Philip, Macfarlane, Richard and Buchanan, William J (2013) Approaches to the classification of high entropy file fragments. Digital Investigation, 10 (4). pp. 372-384. ISSN 1742-2876

Pikoulas, John (2003) An agent-based Bayesian method for network intrusion detection. PhD thesis, Edinburgh Napier University.

Pikoulas, John, Buchanan, William J, Mannion, Mike and Triantafyllopoulos, K (2002) An Intelligent agent security intrusion system. Engineering of Computer-Based Systems, 2002. Proceedings. Ninth Annual IEEE International Conference and Workshop on the . 94 - 99 .

Pikoulas, John, Buchanan, William J, Mannion, Mike and Triantafyllopoulos, K (2001) An agent based Bayesian forecasting model for enhanced network security. In: Engineering of Computer Based Systems, 2001. ECBS 2001. Proceedings. Eighth Annual IEEE International Conference and Workshop on the. IEEE, Washington, 247 - 254. ISBN 0-7695-1086-8

R

Russell, Gordon, Macfarlane, Richard and Ludwiniak, Robert (2012) A forensic image description language for generating test images. In: Proceedings of the 6th International Conference on Cybercrime Forensics Education & Training. British Computer Society. ISBN 978-1-899253-94-4

Romdhani, Imed and Al-Dubai, Ahmed (2009) Integrated many-to-many multicast addressing and access control methods. In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC'09). IEEE Computer Society Press, Sousse, Tunisia, pp. 649-654. ISBN 978-1-4244-4671-1

Riley, Chris W, Buckner, Kathy, Johnson, Graham and Benyon, David (2009) Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & Society, 24 (3). pp. 295-306. ISSN 0951-5666

Romdhani, Imed and Al-Dubai, Ahmed (2008) A multi-channel hybrid MAC protocol for wireless Mesh networks. In: Proceedings of the IEEE 8th International Symposium on Computer Networks (ISCN?08), Istanbul, Turkey. IEEE.

S

Shaikh, Alan (2010) Botnet analysis and detection. Other thesis, Edinburgh Napier University.

Symon, Colin (2009) Enhanced event time-lining for digital forensic systems. Other thesis, Edinburgh Napier University.

Saliou, Lionel (2009) Network Firewall Dynamic Performance Evaluation and Formalisation. PhD thesis, Edinburgh Napier University.

Saliou, Lionel, Buchanan, William J, Graves, Jamie and Munoz, Jose (2007) Scenario Analysis using Out-of-line Firewall Evaluation Framework. In: 6th European Conference on Information Warfare, and Security, July 2-3, Shrivenham, UK.

Saliou, Lionel, Buchanan, William J, Graves, Jamie and Munoz, Jose (2006) Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In: 5th European Conference on Information Warfare and Security, 1 - 2 June 2006, Helsinki, Finland.

Saliou, Lionel, Buchanan, William J, Graves, Jamie and Munoz, Jose (2005) Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. In: 4th European Conference on Information Warfare and Security, 11 - 12 July 2005, Glamorgan, United Kingdom.

T

Thomson, Alistair, Graham, Martin and Kennedy, Jessie (2013) Pianola - visualization of multivariate time-series security event data. In: Proceedings of IV2013. IEEE, London, UK, pp. 123-131. ISBN 978-0-7695-5049-7

Thuemmler, Christoph, Fan, Lu, Buchanan, William J, Lo, Owen, Ekonomou, Elias and Khedim, Abou Sofyane (2012) E-Health: chances and challenges of distributed, service oriented architectures. Journal of Cyber Security and Mobility, 37 (52). ISSN 2245-1439

U

Uwagbole, Solomon, Buchanan, William J and Fan, Lu (2012) Novel tracking of rogue network packets using danger theory approach. 11th European Conference on Information Warfare and Security (ECIW-2012). pp. 277-286.

Uthmani, Omair, Buchanan, William J, Lawson, Alistair, Scott, Russell, Schafer, Burkhard and Fan, Lu (2011) Crime risk evaluation within information sharing between the Police and community partners. Information & Communications Technology Law, 20 (2). pp. 57-81. ISSN 1360-0834

Uthmani, Omair, Buchanan, William J and Lawson, Alistair (2011) Risk analysis for criminal context in information sharing policies. In: SCONE - the Scottish Networking event , August 2011, School of Computing, University of Glasgow. (Unpublished)

Uthmani, Omair, Buchanan, William J and Lawson, Alistair (2010) Novel information sharing architecture between the Police and their community partners. In: Scottish Networking Event 2010, 2010 February, Napier University, Edinburgh.

Uthmani, Omair, Buchanan, William J, Lawson, Alistair, Thuemmler, Christoph, Scott, Russell, Lavery, Anne and Mooney, Chris (2010) Novel information sharing syntax for data sharing between police and community partners, using role-based security. In: 9th European Conference on Information Warfare and Security. ACI, Greece, p. 394.

V

van Deursen Hazelhoff Roelfze, Nicole (2014) HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. PhD thesis, Edinburgh Napier University.

van Deursen, Nicole, Buchanan, William J and Duff, Alistair (2013) Monitoring information security risks within health care. Computers and Security, 37. pp. 31-45. ISSN 0167-4048

Vergin, Adrian (2010) Windows encyption threat analysis. Other thesis, Edinburgh Napier University.

W

Wang, Zhe, Chalmers, Kevin and Liu, Xiaodong (2014) Evolution pattern verification for services evolution in clouds with model driven architecture. the International Journal for e-Learning Security (IJeLS), Infonomics Society, UK, 3 (3/4). ISSN 2046-4568

Wang, Zhe, Liu, Xiaodong and Chalmers, Kevin (2012) Evolution pattern for service evolution in clouds. In: The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012). Infonomics Society, UK , London . ISBN 978-1-908320-08-7

Waheed, Shahzad (2012) Implementation and evaluation of a botnet analysis and detection method in a virtual environment. Other thesis, Edinburgh Napier University.

Wigan, Marcus (2011) Protecting our digital identities. Voice, 7 (9). p. 4.

Wigan, Marcus (2002) Personal data space in organisations: managing personal knowledge and identity. In: Organising in the Information Age: Distributed Technology, Distributed Leadership, Distributed Identity, Distributed Discourse. Voices in Development Management . Ashgate, pp. 45-56. ISBN 978-0754630678

Wang, Hsiu-Chiung (2000) Speed improvements for the RSA encryption method. MPhil thesis, Edinburgh Napier University.

Wigan, Marcus (2000) Personal data space in organisations: managing personal knowledge and identity. In: 8th International Asia Pacific Organisational Studies Colloquium, 14th-17th December 2000 , Sydney, Australia.

Z

Zhao, Liang, Al-Dubai, Ahmed and Min, Geyong (2010) GLBM: A new QoS aware multicast scheme for wireless Mesh network. Journal of Systems and Software , 83 (8). pp. 1318-1326. ISSN 0164-1212

This list was generated on Fri Aug 1 12:58:14 2014 IST.

Edinburgh Napier University is a registered Scottish charity. Registration number SC018373