Critical analysis and error determination of locating-finding techniques in GSM.
Journal Article
Buchanan, W. J., Raja, A. & Munoz, J. (2005)
Critical analysis and error determination of locating-finding techniques in GSM. International Journal of Mobile Communications. 3, 165-182. doi:10.1504/IJMC.2005.005905. ISSN 1470-949X
GPS is a well-established technique for location-finding, but mobile phone-based methods are generally less expensive to implement, and can give reasonable accuracies. These t...
Uzytkowanie Komputerow.
Book
Buchanan, W. J. (2004)
Uzytkowanie Komputerow. Wkt (Poland
Przyst?pny i praktyczny poradnik dotycz?cy u?ytkowania komputerów, obejmuj?cy szeroki zakres zagadnie? zwi?zanych z przetwarzaniem informacji i transmisj? danych oraz ich komp...
Analysis and migration of location-finding methods for GSM and 3G networks.
Conference Proceeding
Buchanan, W. J., Munoz, J., Manson, R., & Raja, K. A. (2004)
Analysis and migration of location-finding methods for GSM and 3G networks. https://doi.org/10.1049/cp%3A20040695
This paper initially reviews the current range of location techniques on GSM networks, such as Cell-ID, GPS, AGPS, time difference of arrival (TDOA) and E-OTD (enhanced observ...
We know where you are [cellular location tracking]
Journal Article
Raja, K., Buchanan, W., & Munoz, J. (2004)
We know where you are [cellular location tracking]. Communications engineer, 2(3), 34-39. doi:10.1049/ce:20040307
Covert channel analysis and detection using reverse proxy servers.
Presentation / Conference
Buchanan, W. J., & Llamas, D. (2004, June)
Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC), London
Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls...
Handbook of data communications and networks.
Book
Buchanan, W. J. (2003)
Handbook of data communications and networks. Springer
The second edition of the Handbook of Data Communications and Networks covers many of the key areas in modern communication systems. It is split into several sections, includi...
The complete handbook of the Internet.
Book
Buchanan, W. J. (2001)
The complete handbook of the Internet. KLUWER ACADEMIC PUBLISHERS BOSTON
An agent based Bayesian forecasting model for enhanced network security.
Conference Proceeding
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001. , (247-254). https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...
Excluding inclusions [PCB inspection]
Journal Article
Scott, A. V., & Buchanan, W. J. (1999)
Excluding inclusions [PCB inspection]. Manufacturing Engineer, 78(4), 154-156. https://doi.org/10.1049/me%3A19990403
The authors look at the causes of a persistent annoyance for manufacturers of printed circuit boards, and suggest some steps that would help to speed inspection and reduce bot...
PC Interfacing, communications and Windows programming.
Book
Buchanan, W. J. (1998)
PC Interfacing, communications and Windows programming. Addison-Wesley Longman Ltd
author's successful Applied PC Interfacing, Graphics and Interrupts this book covers all the different aspects of computer systems from low-level hardware (such as processors ...