Date


People

Download Available

192 results

Formal security policy implementations in network firewalls.

Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012)
Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003
Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific ...

Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies

Conference Proceeding
Asif, R. (2017)
Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. In NoF 2017 Conference Proceedingshttps://doi.org/10.1109/NOF.2017.8251243
Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home...

Novel information sharing syntax for data sharing between police and community partners, using role-based security.

Conference Proceeding
Uthmani, O., Buchanan, W. J., Lawson, A., Thuemmler, C., Fan, L., Scott, R., …Mooney, C. (2010)
Novel information sharing syntax for data sharing between police and community partners, using role-based security
The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and...

Monitoring information security risks within health care

Journal Article
van Deursen, N., Buchanan, W. J., & Duff, A. (2013)
Monitoring information security risks within health care. Computers and Security, 37, 31-45. https://doi.org/10.1016/j.cose.2013.04.005
This paper presents an overview of possible risks to the security of health care data. These risks were detected with a novel approach to information security. It is based on ...

Applied web traffic analysis for numerical encoding of SQL Injection attack features

Conference Proceeding
Uwagbole, S., Buchanan, W., & Fan, L. (2016)
Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016
SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web...

US hack shows data is the new frontier in cyber security conflict.

Other
Buchanan, W. J. (2015)
US hack shows data is the new frontier in cyber security conflict
More than four million personal records of US government workers are thought to have been hacked and stolen, it has been. With US investigators blaming the Chinese government ...

Secret shares to protect health records in Cloud-based infrastructures

Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...

Impact of cyberattacks on stock performance: a comparative study

Journal Article
Tweneboah-Kodua, S., Atsu, F., & Buchanan, W. (2018)
Impact of cyberattacks on stock performance: a comparative study. Information and Computer Security, 26(5), 637-652. doi:10.1108/ics-05-2018-0060
The study uses cyberattacks announcements on 96 firms that are listed on S&P 500 over the period January 03, 2013 and December 29, 2017. The empirical analysis was performed i...

Requirements for 5G based telemetric cardiac monitoring

Conference Proceeding
Thuemmler, C., Hindricks, G., Rolffs, C., Buchanan, W., & Bollmann, A. (2018)
Requirements for 5G based telemetric cardiac monitoring. In 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)https://doi.org/10.1109/WiMOB.2018.8589139
Several white papers have been published on general requirements for 5G in the health vertical. As 5G research and implementation continue more detailed real world information...

Network Firewall Dynamic Performance Evaluation and Formalisation

Thesis
Saliou, L. Network Firewall Dynamic Performance Evaluation and Formalisation. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/2599
Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to...