Date


Output Type

Download Available

81 results

Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network

Conference Proceeding
Asif, R., Haithem, M., & Buchanan, W. J. (2018)
Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network. In Advanced Photonics Networkshttps://doi.org/10.1364/networks.2018.neth2f.3
We report a high capacity Quantum-to-the-Home (QTTH) network in a spatialdivision-multiplexing (SDM) network utilizing 7-core multicore fiber (MCF). Aggregate secure key rates...

Detection of Algorithmically Generated Malicious Domain

Conference Proceeding
Agyepong, E., Buchanan, W., & Jones, K. (2018)
Detection of Algorithmically Generated Malicious Domain. In CS & IT-CSCP 2018, (13-32). https://doi.org/10.5121/csit.2018.80802
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persist...

Employing machine learning techniques for detection and classification of phishing emails

Conference Proceeding
Moradpoor, N., Clavie, B., & Buchanan, B. (2018)
Employing machine learning techniques for detection and classification of phishing emails. In Proceedings of the IEEE Technically Sponsored Computing Conference 2017https://doi.org/10.1109/SAI.2017.8252096
A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or d...

Mining malware command and control traces

Conference Proceeding
McLaren, P., Russell, G., & Buchanan, B. (2018)
Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017https://doi.org/10.1109/SAI.2017.8252185
Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, w...

An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack

Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017)
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. In 2017 Seventh International Conference on Emerging Security Technologies (EST),https://doi.org/10.1109/est.2017.8090392
Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted w...

Performance Evaluation of a Fragmented Secret Share System

Conference Proceeding
Ukwandu, E., Buchanan, W. J., & Russell, G. (2017)
Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)https://doi.org/10.1109/cybersa.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...

Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention

Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017)
Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM),https://doi.org/10.23919/INM.2017.7987433
The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smar...

Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption

Conference Proceeding
Asif, R., & Buchanan, W. J. (2017)
Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.140
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...

Numerical Encoding to Tame SQL Injection Attacks

Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (in press)
Numerical Encoding to Tame SQL Injection Attacks
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases....

Protecting Documents with Sticky Policies and Identity-Based Encryption

Conference Proceeding
Spyra, G., & Buchanan, W. J. (2016)
Protecting Documents with Sticky Policies and Identity-Based Encryption. In Proceedings of the Future Technologies Conference (FTC) 2016https://doi.org/10.1109/FTC.2016.7821719
Documents are increasingly being held in public cloud-based systems, and there thus increasingly exposed to accesses from malicious entities. This paper focuses on the integra...