13 results

Date


People

Download Available

334 results

Reliable and Fair Trustworthiness Evaluation Protocol for Platoon Service Recommendation System

Journal Article
Cheng, H., Tan, Z., Zhang, X., & Liu, Y. (in press)
Reliable and Fair Trustworthiness Evaluation Protocol for Platoon Service Recommendation System. Chinese Journal of Electronics,
Aiming at the problems of the communication inefficiency and high energy consumption in vehicular networks, the platoon service recommendation systems (PSRS) are presented. Ma...

Can Federated Models Be Rectified Through Learning Negative Gradients?

Conference Proceeding
Tahir, A., Tan, Z., & Babaagba, K. O. (2024)
Can Federated Models Be Rectified Through Learning Negative Gradients?. In Big Data Technologies and Applications (18-32). https://doi.org/10.1007/978-3-031-52265-9_2
Federated Learning (FL) is a method to train machine learning (ML) models in a decentralised manner, while preserving the privacy of data from multiple clients. However, FL is...

Machine Un-learning: An Overview of Techniques, Applications, and Future Directions

Journal Article
Sai, S., Mittal, U., Chamola, V., Huang, K., Spinelli, I., Scardapane, S., …Hussain, A. (2024)
Machine Un-learning: An Overview of Techniques, Applications, and Future Directions. Cognitive Computation, 16, 482-506. https://doi.org/10.1007/s12559-023-10219-3
ML applications proliferate across various sectors. Large internet firms employ ML to train intelligent models using vast datasets, including sensitive user information. Howev...

Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation

Journal Article
Wang, F., Xie, M., Tan, Z., Li, Q., & Wang, C. (2024)
Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation. IEEE Transactions on Emerging Topics in Computing, 12(1), 307 - 315. https://doi.org/10.1109/TETC.2023.3244174
In the era of big data, deep learning techniques provide intelligent solutions for various problems in real-life scenarios. However, deep neural networks depend on large-scale...

Towards The Creation Of The Future Fish Farm

Journal Article
Papadopoulos, P., Buchanan, W. J., Sayeed, S., & Pitropakis, N. (2023)
Towards The Creation Of The Future Fish Farm. Journal of Surveillance, Security and Safety, 4, 1-3. https://doi.org/10.20517/jsss.2022.16
Aim: A fish farm is an area where fish raise and bred for food. Fish farm environments support the care and management of seafood within a controlled environment. Over the pas...

Using Social Media & Sentiment Analysis to Make Investment Decisions

Journal Article
Hasselgren, B., Chrysoulas, C., Pitropakis, N., & Buchanan, W. J. (2023)
Using Social Media & Sentiment Analysis to Make Investment Decisions. Future Internet, 15(1), Article 5. https://doi.org/10.3390/fi15010005
Making investment decisions by utilizing sentiment data from social media (SM) is starting to become a more tangible concept. There has been a broad investigation into this fi...

A framework for live host-based Bitcoin wallet forensics and triage

Journal Article
Holmes, A., & Buchanan, W. J. (2023)
A framework for live host-based Bitcoin wallet forensics and triage. Forensic Science International: Digital Investigation, 44, Article 301486. https://doi.org/10.1016/j.fsidi.2022.301486
Organised crime and cybercriminals use Bitcoin, a popular cryptocurrency, to launder money and move it across borders with impunity. The UK and other countries have legislatio...

Hamming Distributions of Popular Perceptual Hashing Techniques

Journal Article
McKeown, S., & Buchanan, W. J. (in press)
Hamming Distributions of Popular Perceptual Hashing Techniques. Forensic Science International: Digital Investigation,
Content-based file matching has been widely deployed for decades, largely for the detection of sources of copyright infringement, extremist materials, and abusive sexual media...

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

Journal Article
Davies, S., Macfarlane, R., & Buchanan, W. (2022)
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. Entropy, 24(10), Article 1503. https://doi.org/10.3390/e24101503
Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by ...

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022)
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively...
74 results

Next Generation Trust Architecture

2018 - 2020
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Funder: Digital Health Institute | Value: £149,959

Trisent: Innovation Voucher for Personal Context Data Project

2018 - 2018
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project. Trisent’s core technology is called the Personal Context Management System (PCM...
Funder: Scottish Funding Council | Value: £5,000

IoT Hardware Security Test Framework

2017 - 2018
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
Funder: Centre for Sensor and Imaging Systems | Value: £58,807

Virtualised Security Operations Centre (vSoC) KTP

2017 - 2019
The aim of this KTP project is to create a completely scripted environment for the creation of advanced cyber security training, using scripted scenarios for the creation of training elements, and pro...
Funder: Innovate UK | Value: £136,306

Health Blockchain

2017 - 2019
This is a Data Labs project which will investigate Blockchain technology - with Spiritus, the project will be ground-breaking in the implementation of a private blockchain within a large-scale healthc...
Funder: Data Lab | Value: £95,848

The truth about cybersecurity in 7 words (poster competition for women in cybersecurity)

2017 - 2017
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £500

Morgan Stanley: Security Analytics for Insider Threat Monitoring

2017 - 2017
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Funder: Data Lab | Value: £19,974

Payfont - PhD sponsorship -

2016 - 2018
Peter Aaby - PhD sponsorship
Value: £40,425

Post Graduate Cyber Security (PGCS) symposium

2016 - 2016
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas. It is a forum for early researchers to pres...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £800

Bare Metal Forensics - Pattern Analysis Heuristics - Data Analysis

2016 - 2017
Exploiting industry interconnect standards to gain visibility into devices.
Funder: Data Lab | Value: £49,468
8 results

Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives

2019 - 2021
This work is concerned with the information practices associated with hyperlocal representation. The fin...
Dr Peter Cruickshank | Director of Studies: Prof Hazel Hall | Second Supervisor: Dr Kendall Richards

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - 2021
Dr Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Test-bed and evaluation of a home-based adverse event prediction infrastructure

2013 - 2021
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Adrian Smales | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

Forensic analysis of large capacity digital storage devices

2013 - 2017
Triage of large capacity digital devices
Philip Penrose | Director of Studies: Prof Bill Buchanan | Second Supervisor: Rich Macfarlane

Framework for evaluation of e-health platform and services

2010 - 2015
Methodologies for evaluation of e-Health platforms are still lacking. This research proposes an e-Health evaluation framework that aims to pro...
Dr Owen Lo | Director of Studies: Prof Bill Buchanan | Second Supervisor: Prof Christoph Thuemmler

Forensic verification of operating system activity via novel data, acquisition and analysis techniques

2005 - 2009
Dr Jamie Graves | Director of Studies: Prof Bill Buchanan | Second Supervisor: L. John Old
26 results

Promising cyber security project supported by new Scottish Enterprise funding

20 September 2022
TrueDeploy, an exciting project from the School of Computing, Engineering & the Built Environment (SCEBE) at Edinburgh Napier University (ENU), has secured £199,952 in additional support from Scottish...

Double funding success for School of Computing

21 March 2022
Two projects from Edinburgh Napier’s acclaimed School of Computing have won funding from a programme which develops innovative cyber security ideas for the commercial market. TrueDeploy and Trustd ar...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

Dr. Zhiyuan Tan Invited to Deliver a Seminar on Internet of Things and Its Security at the Dongguan University of Technology, China, December 2017

12 December 2017
Dongguan University of Technology (DGUT) is a key university in Dongguan, China. DGUT has undertaken more than 900 significant research projects, such as the National Key Basic Research Development Pl...

Dr. Zhiyuan Tan Won The National Research Award 2017 from The Research Council of the Sultanate of Oman

12 November 2017
Dr. Zhiyuan Tan's research work entitled "Building an intrusion detection system using a filter-based feature selection algorithm" has been awarded by the The Research Council of the Sultanate of Oman...