Date


People

Download Available

191 results

Advanced security and network forensics: network forensics.

Other
Buchanan, W. J. (2011)
Advanced security and network forensics: network forensics. Edinburgh Napier University
3 NETWORK FORENSICS 3.1 Objectives 3.2 Introduction 3.3 The key protocols 3.4 Ethernet, IP and TCP headers 3.5 TCP connection 3.6 ARP 3.7 SYN 3.8 Application Layer Ana...

HI-risk: A method to analyse health information risk intelligence

Conference Proceeding
Buchanan, W. J., & van Deursen, N. (2016)
HI-risk: A method to analyse health information risk intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)https://doi.org/10.1109/healthcom.2016.7749536
Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to securi...

Embedded document security using sticky policies and identity based encryption

Thesis
Spyra, G. K. Embedded document security using sticky policies and identity based encryption. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2090564
Data sharing domains have expanded over several, both trusted and insecure environments. At the same time, the data security boundaries have shrunk from internal network perim...

Real-Time Data Analytics in Support of Network Resource Management Protocols

Conference Proceeding
Moradpoor‫, N., Parr, G., Mcclean, S., Scotney, B., & Owusu, G. (2009)
Real-Time Data Analytics in Support of Network Resource Management Protocols. In Proceedings of 10th PGNET
Communications Networks Resource Management (RM) functions such as dynamic and static resource usage monitoring, real time resource reservation as well as advance resource res...

Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates

Conference Proceeding
Rooney, L., Chute, C., Buchanan, W. J., Smales, A., & Hepburn, L. (2018)
Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates. In Proceedings of ThinkMind - GLOBAL HEALTH 2018, The Seventh International Conference on Global Health Challenges
Long-term conditions in Scotland account for 80% of all GP consultations; they also account for 60% of all deaths in Scotland. Asthma and Chronic Obstructive Pulmonary Disease...

How the love of one teenager brought Tweetdeck to its knees.

Other
Buchanan, W. J. (2014)
How the love of one teenager brought Tweetdeck to its knees
TweetDeck, a Twitter app with millions of users, is back online after a rather surprising security scare. For several hours, the service was taken down all because a 19-year-o...

A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks

Journal Article
Sheykhkanloo, N. M. (2017)
A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks. International Journal of Cyber Warfare and Terrorism, 7(2), 16-41. https://doi.org/10.4018/ijcwt.2017040102
Structured Query Language injection (SQLi) attack is a code injection technique where hackers inject SQL commands into a database via a vulnerable web application. Injected SQ...

If you seek to ‘switch off’ encryption, you may as well switch off the whole internet.

Other
Buchanan, W. J. (2015)
If you seek to ‘switch off’ encryption, you may as well switch off the whole internet
Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This m...

Evaluation on multivariate correlation analysis based denial-of-service attack detection system

Conference Proceeding
Tan, Z., Jamdagni, A., Nanda, P., He, X., & Liu, R. P. (2012)
Evaluation on multivariate correlation analysis based denial-of-service attack detection system. In SecurIT '12 Proceedings of the First International Conference on Security of Internet of Things, 160-164. https://doi.org/10.1145/2490428.2490450
In this paper, a Denial-of-Service (DoS) attack detection system is explored, where a multivariate correlation analysis technique based on Euclidean distance is applied for ne...

Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)

Journal Article
Lo, O., Buchanan, W. J., & Carson, D. (2016)
Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). Journal of Cyber Security Technology, 1(2), 88-107. https://doi.org/10.1080/23742917.2016.1231523
This article demonstrates two fundamental techniques of power analysis, differential power analysis (DPA) and correlation power analysis (CPA), against a modern piece of hardw...