Skip to main content

Research Repository

Advanced Search

Outputs (63)

Privacy-Preserving and Scalable Digital Evidence Management: A Hyperledger Fabric Architecture with Growth Projections for Law Enforcement (2025)
Presentation / Conference Contribution
Onyeashie, B. I., Abubakar, M., Leimich, P., McKeown, S., & Russell, G. (2025, April). Privacy-Preserving and Scalable Digital Evidence Management: A Hyperledger Fabric Architecture with Growth Projections for Law Enforcement. Presented at 2025 International Conference on New Trends in Computing Sciences (ICTCS), Amman, Jordan

Managing digital evidence presents challenges in scalability, security, and workflow separation. This paper presents a novel architecture using Hyperledger Fabric that separates law enforcement, forensic, and judicial workflows into different channel... Read More about Privacy-Preserving and Scalable Digital Evidence Management: A Hyperledger Fabric Architecture with Growth Projections for Law Enforcement.

Forensic Joint Photographic Experts Group (JPEG) Watermarking for Disk Image Leak Attribution: An Adaptive Discrete Cosine Transform–Discrete Wavelet Transform (DCT-DWT) Approach (2025)
Journal Article
Onyeashie, B. I., Leimich, P., McKeown, S., & Russell, G. (2025). Forensic Joint Photographic Experts Group (JPEG) Watermarking for Disk Image Leak Attribution: An Adaptive Discrete Cosine Transform–Discrete Wavelet Transform (DCT-DWT) Approach. Electronics, 14(9), Article 1800. https://doi.org/10.3390/electronics14091800

This paper presents a novel forensic watermarking method for digital evidence distribution in non-cloud environments. The approach addresses the critical need for the secure sharing of Joint Photographic Experts Group (JPEG) images in forensic invest... Read More about Forensic Joint Photographic Experts Group (JPEG) Watermarking for Disk Image Leak Attribution: An Adaptive Discrete Cosine Transform–Discrete Wavelet Transform (DCT-DWT) Approach.

Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains (2024)
Journal Article
Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., & Buchanan, W. J. (2024). Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains. Electronics, 13(17), Article 3467. https://doi.org/10.3390/electronics13173467

In the evolving landscape of the Internet of Things (IoT), ensuring the security and integrity of data transmission remains a paramount challenge. Routing Protocol for Low-Power and Lossy Networks (RPL) is commonly utilized in IoT networks to facili... Read More about Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains.

Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks (2024)
Presentation / Conference Contribution
Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., & Buchanan, W. J. (2024, June). Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks. Presented at 4th International Conference on Robotics and Control Engineering, Edinburgh

This paper introduces an innovative strategy for countering Sybil and DODAG Information Solicitation (DIS) flood attacks within lightweight Internet of Things (IoT) networks. The proposed method combines a one-way hash chain with a Bloom filter, leve... Read More about Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks.

Detection of Ransomware (2024)
Patent
Buchanan, B., McLaren, P., Russell, G., & Tan, Z. (2024). Detection of Ransomware. US20240152616A1

The present invention relates to a computer program product, a computing device and a method of detecting a file encrypted by ransomware by identifying a file write operation for a file on the computing device and determining if a predetermined numbe... Read More about Detection of Ransomware.

A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence (2024)
Presentation / Conference Contribution
Onyeashie, B. I., Leimich, P., McKeown, S., & Russell, G. (2023, August). A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence. Presented at EAI BDTA 2023 - 13th EAI International Conference on Big Data Technologies and Applications, Edinburgh, UK

The effective management of digital evidence is critical to modern forensic investigations. However, traditional evidence management approaches are often prone to security and integrity issues. In recent years, the use of blockchain technology has em... Read More about A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence.

An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case (2024)
Presentation / Conference Contribution
Onyeashie, B., Leimich, P., McKeown, S., & Russell, G. (2023, August). An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case. Presented at EAI BDTA 2023 - 13th EAI International Conference on Big Data Technologies and Applications, Edinburgh

This paper presents a decentralised framework for sharing and managing evidence that uses smart lockers, blockchain technology, and the InterPlanetary File System (IPFS). The system incorporates Hyperledger Fabric blockchain for immutability and tamp... Read More about An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case.

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis (2023)
Presentation / Conference Contribution
Thaeler, A., Yigit, Y., Maglaras, L. A., Buchanan, B., Moradpoor, N., & Russell, G. (2023, November). Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. Presented at IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMDAD) 2023, Edinburgh, UK

Malware research has predominantly focused on Windows and Android Operating Systems (OS), leaving Mac OS malware relatively unexplored. This paper addresses the growing threat of Mac OS malware by leveraging Machine Learning (ML) techniques. We propo... Read More about Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis.

Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System   (2021)
Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Tan, Z. (2021). Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System  . Ad hoc networks, 120, Article 102590. https://doi.org/10.1016/j.adhoc.2021.102590

Industrial Control Systems (ICS) are hardware, network, and software, upon which a facility depends to allow daily operations to function. In most cases society takes the operation of such systems, for example public transport, tap water or electrici... Read More about Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System  .

Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems (2021)
Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Porcel-Bustamante, J. (2021). Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems. Symmetry, 13(3), Article 519. https://doi.org/10.3390/sym13030519

Industrial Control Systems are an essential part of our daily lives and can be found in industries such as oil, utilities, and manufacturing. Rapid growth in technology has introduced industrial components with network capabilities that allow them to... Read More about Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems.