Date


Output Type

Download Available

56 results

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure

Presentation / Conference
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October)
Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21), Online
Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine ...

Practical defences against model inversion attacks for split neural networks

Presentation / Conference
Titcombe, T., Hall, A. J., Papadopoulos, P., & Romanini, D. (2021, May)
Practical defences against model inversion attacks for split neural networks. Paper presented at ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021), Online
We describe a threat model under which a split network-based federated learning system is susceptible to a model inversion attack by a malicious computational server. We demon...

PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN

Presentation / Conference
Romanini, D., Hall, A. J., Papadopoulos, P., Titcombe, T., Ismail, A., Cebere, T., …Hoeh, M. A. (2021, May)
PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN. Poster presented at ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021), Online
We introduce PyVertical, a framework supporting vertical federated learning using split neural networks. The proposed framework allows a data scientist to train neural network...

The Importance of Authenticity in Cyber Security Training and Education

Presentation / Conference
Macfarlane, R., & Mata de Acuna, J. (2019, November)
The Importance of Authenticity in Cyber Security Training and Education. Presented at JISC Security Conference, Newcastle, England
The knowledge gap between academy and industry is a challenging issue that educators face every day. In the field of cyber security, it is important that students understand t...

Cloud Computing & Cyber Security

Presentation / Conference
Manoussos, B. (2018, April)
Cloud Computing & Cyber Security. Presented at The Law Society of Scotland - Law & Technology Roadshow, Glasgow
Presentation on Cloud Computing and Cyber Security in relation to Law Firms in Scotland.

Blockchain and Git repositories for sticky policies protected OOXML.

Presentation / Conference
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November)
Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based Information Rights Management (IRM) model extension with enhanced accountability for both a sticky policy and an attached data. This wor...

Evaluation of the DFET Cloud.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September)
Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury
The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated sta...

Cyber security challenges for cloud based services.

Presentation / Conference
Buchanan, W. J. (2015, June)
Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh
Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud

Teaching penetration and malware analysis in a cloud-based environment.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June)
Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...

Vulnerability analysis.

Presentation / Conference
Buchanan, W. J. (2015, May)
Vulnerability analysis. Presented at Advanced Threat Protection, Glazier's Hall, London
The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the bigge...