27 results

Date


People

Download Available

387 results

Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode

Conference Proceeding
Buchanan, W., Grierson, S., & Uribe, D. (2024)
Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. In Proceedings of the 10th International Conference on Information Systems Security and Privacy (226-233). https://doi.org/10.5220/0012454300003648
Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of...

Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks

Journal Article
Bhatti, D. S., Saleem, S., Ali, Z., Park, T., Suh, B., Kamran, A., …Kim, K. (2024)
Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks. IEEE Access, 12, 41499-41516. https://doi.org/10.1109/access.2024.3377144
Wireless Sensor Networks (WSN) are deployed on a large scale and require protection from malicious energy drainage attacks, particularly those directed at the routing layer. T...

PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework

Journal Article
Mckeown, S., Aaby, P., & Steyven, A. (2024)
PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework. Forensic Science International: Digital Investigation, 48(Supplement), Article 301680
The automated comparison of visual content is a contemporary solution to scale the detection of illegal media and extremist material, both for detection on individual devices ...

A Probability Mapping-Based Privacy Preservation Method for Social Networks

Conference Proceeding
Li, Q., Wang, Y., Wang, F., Tan, Z., & Wang, C. (2024)
A Probability Mapping-Based Privacy Preservation Method for Social Networks. . https://doi.org/10.1007/978-981-97-1274-8_19
The mining and analysis of social networks can bring significant economic and social benefits. However, it also poses a risk of privacy leakages. Differential privacy is a de ...

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT

Journal Article
Alshehri, M. S., Ahmad, J., Almakdi, S., Qathrady, M. A., Ghadi, Y. Y., & Buchanan, W. J. (2024)
SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT. IEEE Access, 12, https://doi.org/10.1109/access.2024.3371992
The rise of Internet of Things (IoT) has led to increased security risks, particularly from botnet attacks that exploit IoT device vulnerabilities. This situation necessitates...

Reliable and Fair Trustworthiness Evaluation Protocol for Platoon Service Recommendation System

Journal Article
Cheng, H., Tan, Z., Zhang, X., & Liu, Y. (in press)
Reliable and Fair Trustworthiness Evaluation Protocol for Platoon Service Recommendation System. Chinese Journal of Electronics,
Aiming at the problems of the communication inefficiency and high energy consumption in vehicular networks, the platoon service recommendation systems (PSRS) are presented. Ma...

STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation

Journal Article
Fang, M., Yu, L., Xie, H., Tan, Q., Tan, Z., Hussain, A., …Tian, Z. (in press)
STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation. IEEE Transactions on Computational Social Systems, https://doi.org/10.1109/tcss.2024.3356549
The impressive development of facial manipulation techniques has raised severe public concerns. Identity-aware methods, especially suitable for protecting celebrities, are see...

Can Federated Models Be Rectified Through Learning Negative Gradients?

Conference Proceeding
Tahir, A., Tan, Z., & Babaagba, K. O. (2024)
Can Federated Models Be Rectified Through Learning Negative Gradients?. In Big Data Technologies and Applications (18-32). https://doi.org/10.1007/978-3-031-52265-9_2
Federated Learning (FL) is a method to train machine learning (ML) models in a decentralised manner, while preserving the privacy of data from multiple clients. However, FL is...

Machine Un-learning: An Overview of Techniques, Applications, and Future Directions

Journal Article
Sai, S., Mittal, U., Chamola, V., Huang, K., Spinelli, I., Scardapane, S., …Hussain, A. (2024)
Machine Un-learning: An Overview of Techniques, Applications, and Future Directions. Cognitive Computation, 16, 482-506. https://doi.org/10.1007/s12559-023-10219-3
ML applications proliferate across various sectors. Large internet firms employ ML to train intelligent models using vast datasets, including sensitive user information. Howev...

Hybrid Threats, Cyberterrorism and Cyberwarfare

Book
Ferrag, M. A., Kantzavelou, I., Maglaras, L., & Janicke, H. (Eds.)
(2024). Hybrid Threats, Cyberterrorism and Cyberwarfare. Boca Raton: CRC Press. https://doi.org/10.1201/9781003314721
Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart from the advantages the internet offers, it also hides numerous dangers fo...

Date


87 results

Repairing Polluted Artificial Intelligent Systems with Machine Unlearning

2019 - 2021
This project is intended to seek in-depth understanding of the new promising decentralised machine learning scheme, namely federated learning, and develop a proof-of-concept algorithm-independent unle...
Funder: ENU Development Trust | Value: £29,998

MemoryCrypt

2019 - 2020
The usage of encryption keys is an important aspect in preserving privacy in communications. Increasingly these communications are protected using SSL/TLS methods. Along with this, there is a general ...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £10,759

Cryptodoc

2019 - 2019
This project aims to investigate the integration of a cipher policy for the protection of data, and how these can be applied into a cloud-based infrastructure. A key focus for the implementation will ...
Funder: Scottish Funding Council | Value: £5,000

Freemove Innovation Voucher

2019 - 2020
A project to provide decentralised identity for meeting KYC & AML requirements in the property industry.
Funder: Scottish Funding Council | Value: £5,000

Shared Secret Steganography for Usable Mnemonic Based Security

2019 - 2020
This project will use steganography technology and shared secrets to improve the usability of the process of recovering cryptocurrency/distributed ledger wallet. It will do so by encoding parts of the...
Funder: Scottish Funding Council | Value: £5,000

Kippitech: Innovation Voucher for Incentivising Green Behaviour with Tokens

2018 - 2019
This will investigate the feasibility of incentivising environmentally friendly behaviours through rewards given in tokens as well as IoT wearables to discover this behaviour and reward automatically.
Funder: Scottish Funding Council | Value: £5,000

Next Generation Connectivity with Health and Well-being

2018 - 2021
This project will investigate existing consumer tech, IOT and connectivity capabilities for simulation activities. Napier and DHI will explore a range of technologies that can connect to DHI’s simul...
Funder: Digital Health Institute | Value: £69,355

Eyecademy: Innovation Voucher for Food Provenance

2018 - 2018
This project will focus on the building of a food provenance platform based on distributed ledger technologies
Funder: Scottish Funding Council | Value: £5,000

Hypervine: Innovation Voucher Construction Site Safety Enhancement

2018 - 2018
This focuses on the use of distributed ledger technologies to manage both compliance events such as signing off on work and also document management
Funder: Scottish Funding Council | Value: £5,000

The truth about cybersecurity in 7 words – 2018 (poster competition in cybersecurity)

2018 - 2018
In a recent report by International Information System Security Certification Consortium (ISC)2, it is estimated there will be a global shortfall of 1.5 million cybersecurity professionals by 2019, so...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

Date


Qualification level

18 results

Cryptography Artifact and Behavioural Analysis for Malware Detection

2021 - date
Leigh Turnbull | Director of Studies: Rich Macfarlane | Second Supervisor: Dr Gordon Russell

Ransomware detection techniques using file-based analysis

2020 - date
Simon Davies | Director of Studies: Rich Macfarlane | Second Supervisor: Prof Bill Buchanan

Privacy-preserving systems around security, trust and identity

2019 - 2022
Dr Pavlos Papadopoulos | Director of Studies: Dr Nick Pitropakis | Second Supervisor: Prof Bill Buchanan

Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives

2019 - 2021
This work is concerned with the information practices associated with hyperlocal representation. The fin...
Dr Peter Cruickshank | Director of Studies: Prof Hazel Hall | Second Supervisor: Dr Kendall Richards

Electromagnetic side-channel resilience against lightweight cryptography

2018 - date
Dr Nilupulee Gunathilake | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Prof Bill Buchanan

Identity and identification in an information society: Augmenting formal systems of identification with technological artefacts

2018 - date
Mr Will Abramson | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Owen Lo

Industrial control systems cybersecurity analysis and countermeasures

2017 - 2021
Andres Santiago Robles Durazno | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: James McWhinnie

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - 2021
Dr Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Efficient algorithms for MAC layer duty cycling and frame delivery in wireless sensor network

2016 - 2021
Dr Craig Thomson | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Thomas Tan

Advancing touch-based continuous authentication by automatically extracting user behaviours

2016 - date
Peter Aaby | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Ben Paechter
28 results

Promising cyber security project supported by new Scottish Enterprise funding

20 September 2022
TrueDeploy, an exciting project from the School of Computing, Engineering & the Built Environment (SCEBE) at Edinburgh Napier University (ENU), has secured £199,952 in additional support from Scottish...

Double funding success for School of Computing

21 March 2022
Two projects from Edinburgh Napier’s acclaimed School of Computing have won funding from a programme which develops innovative cyber security ideas for the commercial market. TrueDeploy and Trustd ar...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Basil Manoussos (Manager @ The Cyber Academy) delivers keynote at the 2019 Annual Conference of the Scottish Paralegal Association

17 April 2019
Basil Manoussos, Manager of The Cyber Academy delivers keynote presentation at the Annual Conference of the Scottish Paralegal Association in Glasgow, titled "Cyber threats to law firms: Do you want ...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

SOCLAB Launch

10 April 2018
Official launch of SOCLAB, the new SOC facility in Merchiston Campus