Skip to main content

Research Repository

Advanced Search

Outputs (406)

LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts (2025)
Journal Article
Kumar, G., Saha, R., Conti, M., & Buchanan, W. J. (2025). LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts. IEEE Transactions on Services Computing, 18(3), 1529-1542. https://doi.org/10.1109/tsc.2025.3562323

Smart contracts are integral to decentralized systems like blockchains and enable the automation of processes through programmable conditions. However, their immutability, once deployed, poses challenges when addressing errors or bugs. Existing solut... Read More about LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts.

Post-Quantum Migration of the Tor Application (2025)
Journal Article
Berger, D., Lemoudden, M., & Buchanan, W. J. (2025). Post-Quantum Migration of the Tor Application. Journal of Cybersecurity and Privacy, 5(2), Article 13. https://doi.org/10.3390/jcp5020013

The efficiency of Shor's and Grover's algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one's privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decr... Read More about Post-Quantum Migration of the Tor Application.

Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques (2025)
Journal Article
Konstantinou, A., Kasimatis, D., Buchanan, W. J., Ullah Jan, S., Ahmad, J., Politis, I., & Pitropakis, N. (2025). Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques. Machine Learning and Knowledge Extraction, 7(2), Article 31. https://doi.org/10.3390/make7020031

This paper explores the potential use of Large Language Models (LLMs), such as ChatGPT, Google Gemini, and Microsoft Copilot, in threat hunting, specifically focusing on Living off the Land (LotL) techniques. LotL methods allow threat actors to blend... Read More about Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques.

A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification (2025)
Presentation / Conference Contribution
Abubakar, M. A., Onyeashie, B. I., Wadhaj, I., Leimich, P., Ali, H., & Buchanan, W. J. (2024, November). A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification. Presented at 6th International Conference on Blockchain Computing and Applications (BCCA 2024), Dubai, UAE

This study provides a comprehensive overview of blockchain technology, discusses its characteristics, and explains the hierarchical structure of the blockchain. Additionally, the study provides an in-depth analysis of various security threats and vul... Read More about A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification.

Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode (2024)
Presentation / Conference Contribution
Buchanan, W., Grierson, S., & Uribe, D. (2024, February). Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. Presented at 10th International Conference on Information Systems Security and Privacy, Rome, Italy

Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of DNA data on individuals. A leak of this type of data without consent could... Read More about Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode.

Autonomous Queue Management System in Software-defined Routers for Sensor Networks (2024)
Presentation / Conference Contribution
Yigit, Y., Maglaras, L., Karantzalos, K., Gursu, K., Ozdem, M., Buchanan, W. J., & Canberk, B. (2024, November). Autonomous Queue Management System in Software-defined Routers for Sensor Networks. Presented at 2024 IEEE 10th World Forum on Internet of Things (WF-IoT), Ottawa, Canada

Recent advancements in sensor networks, the In-ternet of Things (IoT), and machine communication technologies have led to a significant increase in network traffic across various domains. However, this growth has brought forth the critical challenge... Read More about Autonomous Queue Management System in Software-defined Routers for Sensor Networks.

A True Random Number Generator Based On Race Hazard And Jitter Of Braided And Cross-Coupled Logic Gates Using FPGA (2024)
Journal Article
Ahmed, H. O., Kim, D., & Buchanan, B. (in press). A True Random Number Generator Based On Race Hazard And Jitter Of Braided And Cross-Coupled Logic Gates Using FPGA. IEEE Access, 12, 182943-182955. https://doi.org/10.1109/ACCESS.2024.3512419

In the contemporary digital landscape, security has become a vital element of our existence. The growing volume of sensitive information being stored and transmitted over networks necessitates the implementation of robust security measures. Cryptogra... Read More about A True Random Number Generator Based On Race Hazard And Jitter Of Braided And Cross-Coupled Logic Gates Using FPGA.

A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Driss, M., & Buchanan, W. J. (2024, September). A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments. Presented at 28th International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES 2024), Spain

With the widespread use of the Internet of Things (IoT), securing the storage and transmission of multimedia content across IoT devices is a critical concern. Chaos-based Pseudo-Random Number Generators (PRNGs) play an essential role in enhancing the... Read More about A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments.

DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof (2024)
Presentation / Conference Contribution
Kasimatis, D., Grierson, S., Buchanan, W. J., Eckl, C., Papadopoulos, P., Pitropakis, N., Chrysoulas, C., Thomson, C., & Ghaleb, B. (2024, September). DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof. Presented at 2024 IEEE International Conference on Cyber Security and Resilience (CSR), London, UK

Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper de... Read More about DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof.

AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks (2024)
Journal Article
Yigit, Y., Maglaras, L., Buchanan, W. J., Canberk, B., Shin, H., & Duong, T. Q. (2024). AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks. IEEE Internet of Things, 11(22), 36168-36181. https://doi.org/10.1109/jiot.2024.3455089

Digital twin technology is crucial to the development of the sixth-generation (6G) Internet of Vehicles (IoV) as it allows the monitoring and assessment of the dynamic and complicated vehicular environment. However, 6G IoV networks have critical chal... Read More about AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks.