INSPIRING FUTURES

Browse by Dewey Subject

Up a level
Export as [feed] RSS
Group by: Creators | Item Type | No Grouping
Jump to: A | B | C | F | G | J | K | M | P | S | T | V | W
Number of items at this level: 31.

A

Abimbola, Abiola, Munoz, Jose and Buchanan, William J (2004) Analysis and detection of cruising computer viruses. In: 3rd International Conference on Electronic Warfare and Security (EIWC), 2004.

B

Buchanan, William J (2011) Advanced security and network forensics: cloud computing. [Video]

Buchanan, William J (2011) Security and forensic computing: authentication. [Video]

Buchanan, William J (2011) Security and forensic computing: encryption. [Video]

Buchanan, William J (2011) Security and forensic computing: forensic computing. [Video]

Buchanan, William J (2011) Security and forensic computing: network security. [Video]

Buchanan, William J (2011) Security and forensic computing: software security. [Video]

Buchanan, William J, Macfarlane, Richard and Ludwiniak, Robert (2010) Student perception of on-line lectures with a blended learning environment. In: The 4th International Conference on Cybercrime Forensics Education & Training, 2nd-3rd Spetember 2010, Canterbury Christ Church University.

Buchanan, William J (2010) Advanced security and network forensics: Introduction. [Video]

Buchanan, William J (2010) Advanced security and network forensics: network forensics. [Video]

Buchanan, William J (2010) Advanced security and network forensics: obfuscation and data hiding. [Video]

Buchanan, William J (2010) Advanced security and network forensics: web Infrastructures. [Video]

Buchanan, William J (2010) Security and forensic computing: intrusion detection systems. [Video]

Buchanan, William J and Gupta, Naren K (1997) A novel parallel processing synchronization method for observing electric fields in and around PCBs. International Journal of Electronics, 82 (1). pp. 61-76. ISSN 0020 7217

Buchanan, William J (1996) Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing. PhD thesis, Edinburgh Napier University.

Buchanan, William J (1995) C for Electronic Engineering with Applied Software Engineering. Prentice Hall. ISBN 0133426688

C

Corsini, Julien (2009) Analysis and evaluation of network intrusion detection methods to uncover data theft. MEng thesis, Edinburgh Napier University.

F

Fernandez Sepulveda, Antonio (2008) Evaluation of digital identity using Windows CardSpace. MEng thesis, Edinburgh Napier University.

G

Gilbertson , Stuart (2009) Analysis and development of a prototype for the detection and mitigation of HTTP based distributed denial of service attacks. Other thesis, Edinburgh Napier University.

Geeringh, Christopher (2007) Generic firewall rule compiler and modeller. Other thesis, Edinburgh Napier University.

J

Jacob, Benoit (2010) Experimental host-and network-based analyser and detector for Botnets. Other thesis, Edinburgh Napier University.

Jackson, Peter (2005) Detection of network threats using honeypots. Other thesis, Edinburgh Napier University.

K

Kwecka, Zbigniew, Buchanan, William J and Saliou, Lionel (2008) Validation of 1-N OT algorithms in privacy-preserving investigations. In: 7th European Conference on Information Warfare and Security, 30th June-1st July 2008, University of Plymouth, UK.

Kumar, Vinoth (2007) Object-tracking in Health Care. MEng thesis, Edinburgh Napier University.

M

McLuskie, David (2008) Enhanced educational framework for networking. MEng thesis, Edinburgh Napier University.

P

Pikoulas, John (2003) An agent-based Bayesian method for network intrusion detection. PhD thesis, Edinburgh Napier University.

S

Symon, Colin (2009) Enhanced event time-lining for digital forensic systems. Other thesis, Edinburgh Napier University.

T

Tandon, Ashish (2007) Analysis and optimization of data storage using enhanced object models in the .NET framework. MEng thesis, Edinburgh Napier University.

V

Vergin, Adrian (2010) Windows encyption threat analysis. Other thesis, Edinburgh Napier University.

W

Wagstaff , Ashlef (2009) Comparing and contrasting different mobile phone technologies when implementing out-of-band authentication to a web portal using social security numbers to identify users. Other thesis, Edinburgh Napier University.

Wang, Hsiu-Chiung (2000) Speed improvements for the RSA encryption method. MPhil thesis, Edinburgh Napier University.

This list was generated on Fri Aug 22 16:44:14 2014 IST.

Edinburgh Napier University is a registered Scottish charity. Registration number SC018373