Date


Output Type

Download Available

85 results

Cyber risk and opportunities in the Cloud.

Presentation / Conference
Buchanan, W. J., & Smales, A. (2013, September)
Cyber risk and opportunities in the Cloud. Paper presented at Cloud Security Congress 2013, Edinburgh
This presentation outlines some of the key risks and opportunities in the Cloud.

A scaleable and trusted e-Health eco-system: safi.re

Presentation / Conference
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April)
A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013, European Commission, Brussels
At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main component...

Generation of Network Behaviour Descriptions Using MCA Based on TAM

Presentation / Conference
Tan, Z. (2013, March)
Generation of Network Behaviour Descriptions Using MCA Based on TAM. Paper presented at Kaspersky Lab's 2013 Annual Student Cyber Security Conference, Singapore
In this paper, a multivariate correlation analysis technique based on triangle area map is introduced. The technique is applied for network traffic characterization and provid...

The challenges of Big Data: future risks, governance and trust.

Presentation / Conference
Buchanan, W. J. (2013, March)
The challenges of Big Data: future risks, governance and trust. Paper presented at The Future of Cyber Security 2013, London, UK
The emphasis in computer security is moving from end point security towards data controls, and this is becoming an increasing threat as we move into an era build around Big Da...

e-Health in the Cloud

Presentation / Conference
Buchanan, W. J., & Smales, A. (2013, January)
e-Health in the Cloud. Presented at Future of e-Health, Hollyrood, Edinburgh
This presentation outlines how risk assessors can be used to create holistic care. A key focus is on the security infrastructure and in new risk assessors such as the frailty ...

Public perceptions in health care security.

Presentation / Conference
Buchanan, W. J., & Smales, A. (2013, January)
Public perceptions in health care security. Paper presented at Health Informatics 2013, Heriot-Watt University, Edinburgh
Over the past few years many industries have been revolutionized by the application of Information Technology, in fact, we are now moving from an Industrial Age into an Inform...

Building a new nation: risk, goverance and trust.

Presentation / Conference
Buchanan, W. J. (2013, January)
Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.

A nonlinear correlation measure for Intrusion Detection

Presentation / Conference
Ambusaidi, M., Lu, L. F., He, X., Tan, Z., Jamdagni, A., & Nanda, P. (2012, November)
A nonlinear correlation measure for Intrusion Detection. Paper presented at The 7th International Conference on Frontier of Computer Science and Technology (FCST-12
The popularity of using internet contains some risks of network attacks. It has attracted the attention of many researchers to overcome this problem. One of the effective ways...

On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space

Presentation / Conference
Bagley, R., Ferguson, R. I., & Leimich, P. (2012, September)
On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space. Paper presented at CFET (Cyberforensics in Education and Training
A technique and supporting tool for the recovery of browsing activity (both currently stored and deleted) from the Firefox web-browser is presented. The approach is based upon...

Towards simulation of patient data for evaluation of E-health platform and services.

Presentation / Conference
Lo, O., Fan, L., Buchanan, W. J., Thuemmler, C., & Lawson, A. (2012, June)
Towards simulation of patient data for evaluation of E-health platform and services. Paper presented at 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool
This paper presents the design and implementation of the Patient Simulator, a software application used for the simulation of patient data. The simulator aims to evaluate e- H...