17 results

Date


People

Download Available

392 results

PLC Memory Attack Detection and Response in a Clean Water Supply System

Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
PLC Memory Attack Detection and Response in a Clean Water Supply System. International Journal of Critical Infrastructure Protection, 26, https://doi.org/10.1016/j.ijcip.2019.05.003
Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens ...

Formal security policy implementations in network firewalls.

Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012)
Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003
Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific ...

It's All in the Cloud: Reviewing Cloud Security

Conference Proceeding
Pitropakis, N., Darra, E., Vrakas, N., & Lambrinoudakis, C. (2014)
It's All in the Cloud: Reviewing Cloud Security. In 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computingdoi:10.1109/uic-atc.2013.13
Cloud computing is gradually replacing traditional IT infrastructures. However, an important issue that has emerged through that revolution is the preservation of an adequate ...

Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies

Conference Proceeding
Asif, R. (2017)
Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. In NoF 2017 Conference Proceedingshttps://doi.org/10.1109/NOF.2017.8251243
Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home...

An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay

Conference Proceeding
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2017)
An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. In 2016 IEEE Trustcom/BigDataSE/I​SPA, (178-184). https://doi.org/10.1109/trustcom.2016.0061
The firewalls were invented since 1990s [1] and have been developed to operate more secure and faster. From the first era of the firewalls until today, they still regulate pac...

Novel information sharing syntax for data sharing between police and community partners, using role-based security.

Conference Proceeding
Uthmani, O., Buchanan, W. J., Lawson, A., Thuemmler, C., Fan, L., Scott, R., …Mooney, C. (2010)
Novel information sharing syntax for data sharing between police and community partners, using role-based security
The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and...

The impact of routing schemes on group communication throughput in scalable networks.

Conference Proceeding
Al-Dubai, A. (2008)
The impact of routing schemes on group communication throughput in scalable networks. In Proceedings of the 2008 IEEE international parallel & distributed processing symposium, 1-8. https://doi.org/10.1109/IPDPS.2008.4536490
Multicast communication has been a major avenue for many studies in interconnection networks. However, such a communication pattern has been studied under either limited opera...

The future of computer science education and observations from on-line learning.

Presentation / Conference
Buchanan, W. J. (2014, January)
The future of computer science education and observations from on-line learning. Paper presented at Higher Computing Science National Qualifications Support, Edinburgh
This session will look at the opportunities at the present time and in the future for Computing, and provide key pointer to the skills that are required to undertake a career ...

GCHQ Cyber Zone at Cheltenham Science Festival (Curator)

Exhibition / Performance
Kerr, G. GCHQ Cyber Zone at Cheltenham Science Festival (Curator)
[https://issuu.com/cheltenhamfestivals/docs/science_festival_2019_brochure]. 4 June 2019 - 9 June 2019. (Unpublished
Step into a fascinating digital world…come into the GCHQ Cyber Zone and see what it’s like to be a code cracker, ethical hacker and cyber security expert. Escape to cyber spac...

Applied web traffic analysis for numerical encoding of SQL Injection attack features

Conference Proceeding
Uwagbole, S., Buchanan, W., & Fan, L. (2016)
Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web...

Date


83 results

TrustShare: Privacy-Preserving And Trusted Threat Intelligence Sharing Using Distributed Ledgers

2023 - 2024
Organisations are facing an increasing number of cyber threats, which is making it evident that relying solely on security tools and technologies may fail to identify emerging threats, malware, and ot...
Funder: Innovate UK | Value: £31,386

Cloud-based Cash-flow Project

2012 - 2012
IIDI is working with Level10 Ltd on a new project awarded under the SFC Innovation Voucher scheme
Funder: Scottish Funding Council | Value: £5,000

Information Sharing between the Police and their Community Partners

2008 - 2011
This is a three year PhD award from the SIPR (Scottish Institute for Policing Research) and focuses on creating new models for information sharing between the police and their community partners.
Funder: Scottish Institute for Policing Research | Value: £30,000

e-Health Security Infrastructure Evaluation

2012 - 2012
IIDI is working with Patient Reminders Limited supported the SFC Innovation Voucher scheme.  Patient Reminders Limited provides patient reminder products and solutions for use in clinical studies, ph...
Funder: Scottish Funding Council | Value: £4,979

IoT Hardware Security Test Framework

2017 - 2018
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
Funder: Centre for Sensor and Imaging Systems | Value: £58,807

The truth about cybersecurity in 7 words – 2018 (poster competition in cybersecurity)

2018 - 2018
In a recent report by International Information System Security Certification Consortium (ISC)2, it is estimated there will be a global shortfall of 1.5 million cybersecurity professionals by 2019, so...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

Next Generation Trust Architecture

2018 - 2020
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Funder: Digital Health Institute | Value: £149,959

Repairing Polluted Artificial Intelligent Systems with Machine Unlearning

2019 - 2021
This project is intended to seek in-depth understanding of the new promising decentralised machine learning scheme, namely federated learning, and develop a proof-of-concept algorithm-independent unle...
Funder: ENU Development Trust | Value: £29,998

Bare Metal Forensics - Pattern Analysis Heuristics - Data Analysis

2016 - 2017
Exploiting industry interconnect standards to gain visibility into devices.
Funder: Data Lab | Value: £49,468

Social Media Analysis Reporting Tool (SMART)

2012 - 2013
To develop a commercially viable tool to enable organisations to monitor and understand their organisation’s life on social media beyond those accounts they have created. This project is focused on ...
Funder: Scottish Funding Council | Value: £4,937
9 results

Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives

2019 - 2021
This work is concerned with the information practices associated with hyperlocal representation. The fin...
Dr Peter Cruickshank | Director of Studies: Prof Hazel Hall | Second Supervisor: Dr Kendall Richards

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments

2008 - 2012
The concept of context-awareness is widely used in mobile and pervasive computing t...
Dr Zakwan Jaroucheh | Director of Studies: Prof Xiaodong Liu | Second Supervisor: Prof Sally Smith

Test-bed and evaluation of a home-based adverse event prediction infrastructure

2013 - 2021
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Adrian Smales | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - 2021
Dr Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Forensic analysis of large capacity digital storage devices

2013 - 2017
Triage of large capacity digital devices
Philip Penrose | Director of Studies: Prof Bill Buchanan | Second Supervisor: Rich Macfarlane

Forensic verification of operating system activity via novel data, acquisition and analysis techniques

2005 - 2009
Dr Jamie Graves | Director of Studies: Prof Bill Buchanan | Second Supervisor: L. John Old

Framework for evaluation of e-health platform and services

2010 - 2015
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...
Dr Owen Lo | Director of Studies: Prof Bill Buchanan | Second Supervisor: Prof Christoph Thuemmler
27 results

Promising cyber security project supported by new Scottish Enterprise funding

20 September 2022
TrueDeploy, an exciting project from the School of Computing, Engineering & the Built Environment (SCEBE) at Edinburgh Napier University (ENU), has secured £199,952 in additional support from Scottish...

Double funding success for School of Computing

21 March 2022
Two projects from Edinburgh Napier’s acclaimed School of Computing have won funding from a programme which develops innovative cyber security ideas for the commercial market. TrueDeploy and Trustd ar...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

SOCLAB Launch

10 April 2018
Official launch of SOCLAB, the new SOC facility in Merchiston Campus

Dr. Zhiyuan Tan Invited to Deliver a Seminar on Internet of Things and Its Security at the Dongguan University of Technology, China, December 2017

12 December 2017
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...