Skip to main content

Research Repository

Advanced Search

Outputs (406)

Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning (2020)
Presentation / Conference Contribution
Ilyas, M., Ahmad, J., Lawson, A., Khan, J. S., Tahir, A., Adeel, A., Larijani, H., Kerrouche, A., Shaikh, M. G., Buchanan, W., & Hussain, A. (2019, July). Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning. Presented at 10th International Conference, BICS 2019, Guangzhou, China

Prospective studies using longitudinal patient data can be used to help to predict responsiveness to Growth Hormone (GH) therapy and assess any suspected risks. In this paper, a novel Clinical Decision Support System (CDSS) is developed to predict gr... Read More about Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning.

An authentication protocol based on chaos and zero knowledge proof (2020)
Journal Article
Major, W., Buchanan, W. J., & Ahmad, J. (2020). An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065-3087. https://doi.org/10.1007/s11071-020-05463-3

Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port knocki... Read More about An authentication protocol based on chaos and zero knowledge proof.

Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction (2019)
Journal Article
Lowe, I., Buchanan, W. J., Macfarlane, R., & Lo, O. (2019). Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction. Journal of Networking Technology, 10(4), 124-155. https://doi.org/10.6025/jnt/2019/10/4/124-155

Bluetooth is a short-range wireless technology that provides audio and data links between personal smartphones and playback devices, such as speakers, headsets and car entertainment systems. Since its introduction in 2001, security researchers have s... Read More about Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction.

Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT (2019)
Journal Article
Li, S., Yuan, Y., Zhang, J. J., Buchanan, B., Liu, E., & Ramadoss, R. (2019). Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT. IEEE Transactions on Computational Social Systems, 6(6), 1369-1372. https://doi.org/10.1109/tcss.2019.2954939

The Internet of Things (IoT) is expected to connect a massive number of smart devices to the Internet. The existing centralized architecture for handling the huge volume of data created in the IoT is facing many research challenges, including securit... Read More about Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT.

A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks (2019)
Journal Article
Kim, T.-H., Goyat, R., Rai, M. K., Kumar, G., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks. IEEE Access, 7, 184133-184144. https://doi.org/10.1109/access.2019.2960609

In this research paper, blockchain-based trust management model is proposed to enhance trust relationship among beacon nodes and to eradicate malicious nodes in Wireless Sensor Networks (WSNs). This composite trust evaluation involves behavioral-base... Read More about A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks.

MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features (2019)
Journal Article
Saha, R., Geetha, G., Kumar, G., Kim, T.-H., & Buchanan, W. J. (2019). MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access, 7, 172045-172054. https://doi.org/10.1109/access.2019.2956160

The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weight cryptography. As an algorithm it has been considered to be one of the fas... Read More about MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features.

Machine Learning for Health and Social Care Demographics in Scotland (2019)
Presentation / Conference Contribution
Buchanan, W. J., Smales, A., Lawson, A., & Chute, C. (2019, November). Machine Learning for Health and Social Care Demographics in Scotland. Paper presented at HEALTHINFO 2019, Valencia, Spain

This paper outlines an extensive study of applying machine learning to the analysis of publicly available health and social care data within Scotland, with a focus on learning the most significant variables involved in key health care outcome factors... Read More about Machine Learning for Health and Social Care Demographics in Scotland.

Deriving ChaCha20 Key Streams From Targeted Memory Analysis (2019)
Journal Article
McLaren, P., Buchanan, W. J., Russell, G., & Tan, Z. (2019). Deriving ChaCha20 Key Streams From Targeted Memory Analysis. Journal of Information Security and Applications, 48, Article 102372. https://doi.org/10.1016/j.jisa.2019.102372

There can be performance and vulnerability concerns with block ciphers, thus stream ciphers can used as an alternative. Although many symmetric key stream ciphers are fairly resistant to side-channel attacks, cryptographic artefacts may exist in memo... Read More about Deriving ChaCha20 Key Streams From Targeted Memory Analysis.

Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications (2019)
Presentation / Conference Contribution
Gunathilake, N. A., Buchanan, W. J., & Asif, R. (2019, April). Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications. Presented at IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick

High/ultra-high speed data connections are currently being developed, and by the year 2020, it is expected that the 5th generation networking (5GN) should be much smarter. It would provide great quality of service (QoS) due to low latency, less imple... Read More about Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications.

A Forensic Audit of the Tor Browser Bundle (2019)
Journal Article
Muir, M., Leimich, P., & Buchanan, W. J. (2019). A Forensic Audit of the Tor Browser Bundle. Digital Investigation, 29, 118-128. https://doi.org/10.1016/j.diin.2019.03.009

The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protocol, as its main focus is to protect the privacy of the user, in both its lo... Read More about A Forensic Audit of the Tor Browser Bundle.