Date


People

Download Available

408 results

Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption

Journal Article
Buchanan, W. J., & Ali, H. (2025)
Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption. Cryptography, 9(2), Article 33. https://doi.org/10.3390/cryptography9020033
The requirement for privacy-aware machine learning increases as we continue to use PII (personally identifiable information) within machine training. To overcome the existing ...

FedBT: Effective and Robust Federated Unlearning via Bad Teacher Distillation for Secure Internet of Things

Journal Article
Wang, F., Huo, J., Wang, W., Zhang, X., Liu, Y., Tan, Z., & Wang, C. (in press)
FedBT: Effective and Robust Federated Unlearning via Bad Teacher Distillation for Secure Internet of Things. IEEE Internet of Things Journal,

Exploring DTrace as an Incident Response Tool for Unix Systems

Presentation / Conference Contribution
Duin, J., Mckeown, S., & Abubakar, M. (2024, June)
Exploring DTrace as an Incident Response Tool for Unix Systems. Presented at Cyber Science 2024, Edinburgh, Scotland
Critical National Infrastructure (CNI) is often the target of sophisticated and sustained cyber attacks perpetrated by advanced threat actors with considerable resources. Thes...

LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts

Journal Article
Kumar, G., Saha, R., Conti, M., & Buchanan, W. J. (online)
LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts. IEEE Transactions on Services Computing, https://doi.org/10.1109/tsc.2025.3562323
Smart contracts are integral to decentralized systems like blockchains and enable the automation of processes through programmable conditions. However, their immutability, onc...

A Lightweight Image Steganography Scheme Based on Invertible Neural Network Architecture with Progressive Channel Attention

Presentation / Conference Contribution
Li, Q., Yang, R., Wang, F., Wang, C., Zhang, X., Babaagba, K., & Tan, Z. (2025, July)
A Lightweight Image Steganography Scheme Based on Invertible Neural Network Architecture with Progressive Channel Attention. Presented at EAI SecureComm 2025, Xiangtan, China

Post-Quantum Migration of the Tor Application

Journal Article
Berger, D., Lemoudden, M., & Buchanan, W. J. (2025)
Post-Quantum Migration of the Tor Application. Journal of Cybersecurity and Privacy, 5(2), Article 13. https://doi.org/10.3390/jcp5020013
The efficiency of Shor's and Grover's algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one's privacy is potentially ...

Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques

Journal Article
Konstantinou, A., Kasimatis, D., Buchanan, W. J., Ullah Jan, S., Ahmad, J., Politis, I., & Pitropakis, N. (2025)
Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques. Machine Learning and Knowledge Extraction, 7(2), Article 31. https://doi.org/10.3390/make7020031
This paper explores the potential use of Large Language Models (LLMs), such as ChatGPT, Google Gemini, and Microsoft Copilot, in threat hunting, specifically focusing on Livin...

Beyond Hamming Distance: Exploring Spatial Encoding in Perceptual Hashes

Presentation / Conference Contribution
McKeown, S. (2025, April)
Beyond Hamming Distance: Exploring Spatial Encoding in Perceptual Hashes. Presented at DFRWS EU 2025, Brno, Czech Republic
Forensic analysts are often tasked with analysing large volumes of data in modern investigations, and frequently make use of hashing technologies to identify previously encoun...

Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode

Conference Proceeding
Buchanan, W., Grierson, S., & Uribe, D. (2024)
Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. In Proceedings of the 10th International Conference on Information Systems Security and Privacy (226-233). https://doi.org/10.5220/0012454300003648
Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of...

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography

Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Ali, M., Al Dubai, A., Pitropakis, N., & Buchanan, W. J. (2024, July)
VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. Presented at 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP), Sousse, Tunisia
In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. ...

Date


92 results

Data Sharing in Highly Secure Environments

2024 - 2027
In several areas of government there is a requirement for strong control of data sharing. This KTP investigates the usage of PQC (Post Quantum Cryptography) and Homomorphic Encryption (HE) to protect ...
Funder: Innovate UK | Value: £273,181

SafeNet: Unleashing Robust Security Measures to Safeguard IoT Networks

2024 - 2025
In today's interconnected world, the proliferation of the Internet of Things (IoT) has led to an unprecedented surge in the volume of connected devices revolutionizing industries and reshaping our dai...
Funder: Carnegie Trust for the Universities of Scotland | Value: £13,381

Privacy- and Consent-aware Data Sharing with Machine Learning

2024 - 2025
The the basic elements of the research work; this will include key objectives of: -Define an architecture of digital trust and identity integration using a Distributed Ledger. - Integrate a citizen-c...
Funder: Digital Health Institute | Value: £23,627

TrueDeploy - ICURe Exploit

2024 - 2024
As part of ICURe Explore, we pitched to a panel of experts. We have been successful in this, and have been invited to participated in its next stage which is called ICURe Exploit.
Funder: Innovate UK | Value: £20,715

Distinguished Visiting Fellow on AI-driven Cyber Security

2024 - 2024
Dr Houbing Song's visit will facilitate collaborations between Scottish-based Computer Scientists and North America-based Computer Scientists. Researchers at the host institution will be in a good pos...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £2,000

TrueDeploy - ICURe Explore

2024 - 2024
12 weeks full-time programme to help research teams get out of the lab and explore the commercial potential of their research/technology. TrueDeploy is an innovative platform designed to demystify ...
Funder: Innovate UK | Value: £34,999

TruElect

2023 - 2025
This KTP project aims to building a trustworthy infrastructure for the voting process, including using trusted methods of citizen identity, voting sustation, and privacy preserving methods.
Funder: Innovate UK | Value: £202,937

PhD Studentship (Homomorphic Encryption)

2023 - 2026
This PhD studentship will be funded at £10k per year for a period of three years, and focus on homomorphic encryption in 5G / 6G network slices and strategies to foster and enhance federated structure...
Funder: 6G Health Institute GmbH | Value: £35,082

Evaluation of Federated Machine Unlearning using Membership Inference Attacks

2023 - 2026
Federated Learning (FL) is a type of distributed Machine Learning (ML) training technique that allows for accurate predictions without sharing sensitive data. This is possible, as FL allows everyone t...
Funder: Carnegie Trust for the Universities of Scotland | Value: £73,564

False webs: Network to address the misinformation pandemic

2023 - 2025
Fake news (inaccurate information) peaked during the pandemic with around 46 000 daily Twitter posts containing false information (Lupi, 2020). In Europe over 70% people regularly encounter fake news ...
Funder: Royal Society of Edinburgh | Value: £19,931

Date


Qualification level

19 results

Cybersecurity training & awareness, and its effectiveness.

2024 - 2027
Basil Manoussos | Director of Studies: Dr Lorna Gillies | Second Supervisor: Prof Berk Canberk

On the Design of complex encryption schemes, for instance, chaos-based encryption, to achieve a desirable level of IoT security

2023 - date
Shahbaz Khan | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Nick Pitropakis

Contributions to crypto-ransomware analysis and detection

2020 - 2024
Dr Simon Davies | Director of Studies: Rich Macfarlane | Second Supervisor: Prof Bill Buchanan

Privacy-preserving systems around security, trust and identity

2019 - 2022
Dr Pavlos Papadopoulos | Director of Studies: Dr Nick Pitropakis | Second Supervisor: Prof Bill Buchanan

Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives

2019 - 2021
This work is concerned with the information practices associated with hyperlocal representation. The fin...
Dr Peter Cruickshank | Director of Studies: Prof Hazel Hall | Second Supervisor: Dr Kendall Richards

Electromagnetic side-channel resilience against lightweight cryptography

2018 - 2023
Dr Nilupulee Gunathilake | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Prof Bill Buchanan

Identity and identification in an information society: Augmenting formal systems of identification with technological artefacts

2018 - date
Mr Will Abramson | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Owen Lo

Industrial control systems cybersecurity analysis and countermeasures

2017 - 2021
Andres Santiago Robles Durazno | Director of Studies: Dr Naghmeh Moradpoor | Second Supervisor: James McWhinnie

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - 2021
Dr Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Efficient algorithms for MAC layer duty cycling and frame delivery in wireless sensor network

2016 - 2021
Dr Craig Thomson | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Thomas Tan
33 results

TrueDeploy recognised as Start Up of the Year

28 March 2025
Last night’s awards also saw recognition for start-up company TrueDeploy. Founded by Dr Pavlos Papadopoulos, Lecturer within ENU’s School of Computing, Engineering & the Built Environment, TrueDeploy ...

Two Cyber Entrepreneurs from Edinburgh Napier Shortlisted for Converge Awards 2023

4 October 2023
Edinburgh Napier University (ENU) is pleased to share that two of its entrepreneurs in the field of cyber security. LastingAsset’s Nanik Ramchandani and TrueDeploy’s Pavlos Papadopoulos - have been s...

Edinburgh Napier’s strength in cybersecurity bolsters Scotland’s tech ecosystem

21 April 2023
Lecturer and researcher Dr Pavlos Papadopoulos, is one of a line of innovators in cyber security looking to spin-out out of Edinburgh Napier’s School of Computing, Engineering and the Built Environmen...

Scottish Enterprise supports promising cyber security business

21 September 2022
SCOTTISH Enterprise has supported a new cyber security business project from Edinburgh Napier University (ENU) with a major cash injection. TrueDeploy, a project from the School of Computing, Enginee...

Promising cyber security project supported by new Scottish Enterprise funding

21 September 2022
TrueDeploy, an exciting project from the School of Computing, Engineering & the Built Environment (SCEBE) at Edinburgh Napier University (ENU), has secured £199,952 in additional support from Scottish...

Napier spin-outs help supply chain cyber security

21 March 2022
TWO projects from Edinburgh Napier’s School of Computing have won funding from a programme which develops innovative cyber security ideas for the commercial market. TrueDeploy and Trustd are being su...

Double funding success for School of Computing

21 March 2022
Two projects from Edinburgh Napier’s acclaimed School of Computing have won funding from a programme which develops innovative cyber security ideas for the commercial market. TrueDeploy and Trustd ar...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

15 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)