Date


People

Download Available

263 results

Machine learning and semantic analysis of in-game chat for cyber bullying

Journal Article
Murnion, S., Buchanan, W. J., Smales, A., & Russell, G. (2018)
Machine learning and semantic analysis of in-game chat for cyber bullying. Computers and Security, 76, 197-213. https://doi.org/10.1016/j.cose.2018.02.016
One major problem with cyberbullying research is the lack of data, since researchers are traditionally forced to rely on survey data where victims and perpetrators self-report...

Decentralised Privacy: A Distributed Ledger Approach

Book Chapter
Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (2021)
Decentralised Privacy: A Distributed Ledger Approach. In C. Mustansar Hussain, & P. Di Sia (Eds.), Handbook of Smart Materials, Technologies, and Devices (1-26). Cham: Springer. https://doi.org/10.1007/978-3-030-58675-1_58-1
Our world due to the technological progress became fast-paced and is constantly evolving, thus changing every single day. Consequently, the most valuable asset on earth is not...

A Forensic Audit of the Tor Browser Bundle

Journal Article
Muir, M., Leimich, P., & Buchanan, W. J. (2019)
A Forensic Audit of the Tor Browser Bundle. Digital Investigation, 29, 118-128. https://doi.org/10.1016/j.diin.2019.03.009
The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protoc...

Secret shares to protect health records in Cloud-based infrastructures

Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...

Enhanced Methods of Coursework Provision in Computer Networks.

Conference Proceeding
Buchanan, W. J., & Saliou, L. (2005)
Enhanced Methods of Coursework Provision in Computer Networks. In ITRE 2004. 2nd International Conference Information Technology: Research and Education, 111-115. https://doi.org/10.1109/ITRE.2004.1393657
Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from ...

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021)
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. In 2021 5th Cyber Security in Networking Conference (CSNet). https://doi.org/10.1109/csnet52717.2021.9614646
The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions...

Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption

Conference Proceeding
Asif, R., & Buchanan, W. J. (2017)
Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.140
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...

An agent based Bayesian forecasting model for enhanced network security.

Conference Proceeding
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001. , (247-254). https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...

When the ATM runs Windows, how safe is your money?

Other
Buchanan, W. J. (2014)
When the ATM runs Windows, how safe is your money?
How safe is Microsoft Windows? After all, the list of malware that has caused major headaches worldwide over the last 15 years is long – viruses, worms and Trojans have forced...

Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation

Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2020)
Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation. Forensic Science International: Digital Investigation, 33, https://doi.org/10.1016/j.fsidi.2020.300979
Ransomware continues to grow in both scale, cost, complexity and impact since its initial discovery nearly 30 years ago. Security practitioners are engaged in a continual "arm...
66 results

Fragment Finder

2015 - 2016
Fragment Finder (FF) enables a new, high-speed approach to digital forensics. It is unique in that it will build a more efficient technical architecture for the creation, storage and use of hash signa...
Funder: Scottish Enterprise | Value: £228,757

e-FRAIL - Early detection of FRAilty and Illness

2015 - 2016
Scottish Frailty Framework with Mobile Device Capture and Big Data Integration. The proposed innovation will develop and extend the current work into Frailty, with the long term focus on encompassing ...
Funder: Digital Health Institute | Value: £89,428

Data Capture and Auto Identification Reference

2009 - 2011
This project relates to the research collaboration between Edinburgh Napier University, CipherLab, Chelsea and Westminster Hospital, GS1 UK, Imperial College, and Kodit, and is funded through a resear...
Funder: Innovate UK | Value: £227,172

Eyecademy: Innovation Voucher for Food Provenance

2018 - 2018
This project will focus on the building of a food provenance platform based on distributed ledger technologies
Funder: Scottish Funding Council | Value: £5,000

Information Sharing between Police and Community Partners

2011 - 2012
The exchange of information between the police and community partner organisations forms a core aspect of effective policing and community service provision. However, this must be governed by sets of ...
Funder: Scottish Institute for Policing Research | Value: £5,830

Digital forensic Toolkit

2007 - 2008
This project aims to produce next generation digital forensics tools, using novel methods based on DNA matching.
Funder: Scottish Enterprise | Value: £14,703

First August - Real-time Cyber Tracking and Risk Assessment Tool

2013 - 2014
Prototype software and business case.
Funder: Scottish Funding Council | Value: £5,000

Payfont, innovation voucher

2013 - 2015
SMART Grant proposal.
Funder: Scottish Funding Council | Value: £4,930

Kulio Education Characters - online platform

2015 - 2015
Kulio Ltd and Edinburgh Napier University are planning to collaborate to create a new innovative application consisting of Kulio education characters. Children throughout local authorities are already...
Funder: Scottish Funding Council | Value: £5,000

Flexiant Ltd, Innovation voucher

2011 - 2012
This research project studies the feasibility of a Cloud-based platform which is used to evaluate the performance of digital forensics tools. Along with measuring key quality metrics, such as true-pos...
Funder: Scottish Funding Council | Value: £5,000
11 results

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

Test-bed and evaluation of a home-based adverse event prediction infrastructure

2013 - 2021
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Adrian Smales | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Electromagnetic side-channel resilience against lightweight cryptography

2018 - date
Dr Nilupulee Gunathilake | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Prof Bill Buchanan

Privacy-preserving systems around security, trust and identity

2019 - 2022
Dr Pavlos Papadopoulos | Director of Studies: Dr Nick Pitropakis | Second Supervisor: Prof Bill Buchanan

Ransomware detection techniques using file-based analysis

2020 - date
Simon Davies | Director of Studies: Rich Macfarlane | Second Supervisor: Prof Bill Buchanan

Advancing touch-based continuous authentication by automatically extracting user behaviours

2016 - date
Peter Aaby | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Ben Paechter

Forensic analysis of large capacity digital storage devices

2013 - 2017
Triage of large capacity digital devices
Philip Penrose | Director of Studies: Prof Bill Buchanan | Second Supervisor: Rich Macfarlane

Forensic verification of operating system activity via novel data, acquisition and analysis techniques

2005 - 2009
Dr Jamie Graves | Director of Studies: Prof Bill Buchanan | Second Supervisor: L. John Old

Framework for evaluation of e-health platform and services

2010 - 2015
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...
Dr Owen Lo | Director of Studies: Prof Bill Buchanan | Second Supervisor: Prof Christoph Thuemmler
17 results

Promising cyber security project supported by new Scottish Enterprise funding

21 September 2022
TrueDeploy, an exciting project from the School of Computing, Engineering & the Built Environment (SCEBE) at Edinburgh Napier University (ENU), has secured £199,952 in additional support from Scottish...

Double funding success for School of Computing

21 March 2022
Two projects from Edinburgh Napier’s acclaimed School of Computing have won funding from a programme which develops innovative cyber security ideas for the commercial market. TrueDeploy and Trustd ar...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

15 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

11 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Professor Opens Up on His Love of Edinburgh, Cryptography and Innovation

23 August 2017
In an interview with Inspired Edinburgh in The Victorian Townhouse, Professor Bill Buchanan outlined his career and his university, along with his love of his home city, cryptography and innovation. T...

Professor Gives Evidence on Cyber Security and Health Care at Scottish Parliament

20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee at the Scottish Parliament on Cyber Security risks within Health Care in Scotland.

Judy Murray among Scots on honours list

16 June 2017
Prof Bill Buchanan, head of Edinburgh Napier University's Cyber Academy, is made an OBE. He was recognised for his services to cyber security and innovation.

Distinguished Fellow To Talk on Real-Time Human Action Recognition

1 June 2017
ICSA DVF Professor Nasser Kehtarnavaz will be speaking about “Real-Time Human Action Recognition via Simultaneous Utilization of Depth Images and Inertial Signals” on Monday 19 June at 10am at Edinbur...