4 results

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Conference Proceeding
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2019)
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In 2018 IEEE International Conference on Big Data (Big Data)https://doi.org/10.1109/BigData.2018.8621922
Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exis...

Technical evaluation of an e-health platform.

Conference Proceeding
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012)
Technical evaluation of an e-health platform. In M. Macedo (Ed.), Proceedings of the IADIS International Conference e-Health 2012
Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation...

PC Interfacing, communications and Windows programming.

Book
Buchanan, W. J. (1998)
PC Interfacing, communications and Windows programming. Addison-Wesley Longman Ltd
author's successful Applied PC Interfacing, Graphics and Interrupts this book covers all the different aspects of computer systems from low-level hardware (such as processors ...

Software development for engineers.

Book
Buchanan, W. J. (1997)
Software development for engineers. Newton, MA, USA: Butterworth-Heinemann
Specialisation in software has become a thing of the past. With the move towards graphical user interface programming, engineers must have a sound knowledge of several program...