Privacy-preserving data acquisition protocol.
Conference Proceeding
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010)
Privacy-preserving data acquisition protocol. In IEEE International Conference of Computational Methods in Electrical and Electronics Engineering. , (131-136). https://doi.org/10.1109/SIBIRCON.2010.5555325
Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need t...
Application and analysis of private matching schemes based on commutative cryptosystems.
Conference Proceeding
Kwecka, Z., Buchanan, W. J. & Spiers, D. A. (2008)
Application and analysis of private matching schemes based on commutative cryptosystems
Privacy issues are becoming a key focus with software systems. Surveys show that the invasion of privacy is among the things peo-ple fear the most from the coming years. These...
Password Pattern and Vulnerability Analysis for Web and Mobile Applications
Journal Article
Li, S., Romdhani, I., & Buchanan, W. (2016)
Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile ...
Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security.
Presentation / Conference
Buchanan, W. J. (2011, September)
Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security. Paper presented at CFET: Cybercrime Forensics Education & Training., Canterbury Christ Church University, Canterbury
The use of virtualised and cloud-based environments provides an excellent opportunity to enhance learning and to provide students with skills which match exactly to the requir...
Minimising collateral damage: privacy-preserving Investigative data acquisition platform.
Journal Article
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2011)
Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach, 4, 12-31. https://doi.org/10.4018/jitsa.2011070102
Investigators define invasion of privacy during their operations as collateral damage. Inquiries that require gathering data about potential suspects from third parties, such ...
Truly distributed control systems using fieldbus technology.
Conference Proceeding
Scott, A., & Buchanan, W. J. (2000)
Truly distributed control systems using fieldbus technology. In Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the Issue Date: 2000, 165-173. https://doi.org/10.1109/ECBS.2000.839874
This paper outlines the three main field bus type standards: FOUNDATION Fieldbus; WorldFIP; and the CAN bus, each of which have great advantages over traditional instrumentati...
IoT Forensics: Amazon Echo as a Use Case
Journal Article
Li, S., Li, S., Choo, K. R., Sun, Q., Buchanan, W. J., & Cao, J. (2019)
IoT Forensics: Amazon Echo as a Use Case. IEEE Internet of Things, 1-11. https://doi.org/10.1109/jiot.2019.2906946
Internet of Things (IoT) are increasingly common in our society, and can be found in civilian settings as well as sensitive applications such as battlefields and national secu...
Evaluation of the DFET Cloud.
Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September)
Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...
Novel information sharing syntax for data sharing between police and community partners, using role-based security.
Conference Proceeding
Uthmani, O., Buchanan, W. J., Lawson, A., Thuemmler, C., Fan, L., Scott, R., …Mooney, C. (2010)
Novel information sharing syntax for data sharing between police and community partners, using role-based security
The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and...
Edinburgh leading world in beating online crime.
Other
Buchanan, W. J. (2015)
Edinburgh leading world in beating online crime. The Scotsman
Cyber security surges ahead in the capital, says Bill Buchanan As we become more dependent on the internet by the day, the risks around it also increase, especially from cyber...