Skip to main content

Research Repository

Advanced Search

Outputs (34)

A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). (2011)
Presentation / Conference Contribution
Buchanan, W. J., Flandrin, F., Macfarlane, R., & Graves, J. (2011). A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). In Cyberforensics 2011

This paper defines a methodology for the evaluation of a Rate-based Intrusion Prevention System (IPS) for a Distributed Denial of Service (DDoS) threat. This evaluation system uses realistic background traffic along with attacking traffic, with four... Read More about A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS)..

Crime risk evaluation within information sharing between the Police and community partners. (2011)
Journal Article
Uthmani, O., Buchanan, W. J., Lawson, A., Scott, R., Schafer, B., & Fan, L. (2011). Crime risk evaluation within information sharing between the Police and community partners. Information and Communications Technology Law, 20, 57-81. https://doi.org/10.1080/13600834.2011.578922

The aim of this paper is to provide profiles for crimes which can be used to model the context for information sharing between the police and community partner organisations. This context can then be integrated with information-sharing syntax used by... Read More about Crime risk evaluation within information sharing between the Police and community partners..

Affliate advertising fraud and an investigatory fraud framework. (2011)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., & Lawson, A. (2011). Affliate advertising fraud and an investigatory fraud framework. In CyberForensics 2011

This paper outlines the details of a real-life scam, which involves creating fraudulent Web sites which pretend to sell goods, but are actually used to perform click-through crime or use identity fraud to claim commission on the sale of goods. It inv... Read More about Affliate advertising fraud and an investigatory fraud framework..

Minimising collateral damage: privacy-preserving Investigative data acquisition platform. (2011)
Journal Article
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2011). Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach, 4, 12-31. https://doi.org/10.4018/jitsa.2011070102

Investigators define invasion of privacy during their operations as collateral damage. Inquiries that require gathering data about potential suspects from third parties, such as banks, Internet Service Providers (ISPs) or employers are likely to impa... Read More about Minimising collateral damage: privacy-preserving Investigative data acquisition platform..

DACAR platform for eHealth services cloud. (2011)
Presentation / Conference Contribution
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011). DACAR platform for eHealth services cloud. . https://doi.org/10.1109/CLOUD.2011.31

The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services, but concerns over service integration, large scale deployment, and securit... Read More about DACAR platform for eHealth services cloud..

An Integrated Cloud-based Healthcare Infrastructure. (2011)
Presentation / Conference Contribution
Ekonomou, E., Fan, L., Buchanan, W. J., & Thuemmler, C. (2011, November). An Integrated Cloud-based Healthcare Infrastructure

We present a cloud-based healthcare system that integrates a formal care system (DACAR) with an informal care system (Microsoft HealthVault). The system provides high levels of security and privacy within a cloud environment, enabling sharing of both... Read More about An Integrated Cloud-based Healthcare Infrastructure..

A novel privacy preserving method for the location tracking of mobile devices (2011)
Journal Article
Buchanan, W. J., & Kwecka, Z. (2011). A novel privacy preserving method for the location tracking of mobile devices. Wireless Networks,

Two of the major changes within computing, at the present time, are the move towards serviceoriented architectures and the increasing usage of mobile devices to access these services. Along with this, as these devices are often moving, extra context... Read More about A novel privacy preserving method for the location tracking of mobile devices.

Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. (2011)
Journal Article
Buchanan, W. J., Graves, J., Bose, N., Macfarlane, R., Davison, B., & Ludwiniak, R. (2011). Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. HEA ICS Conference,

This paper focuses on the integration of virtualised environments within the teaching of computer security and digital forensics, and includes three case studies. The first case study involves assessing student perception on the usage of VMware Works... Read More about Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs..

How academic IT departments manage changing IT environments (2011)
Journal Article
Buchanan, W. J. (2011). How academic IT departments manage changing IT environments. VitAL Magazine, 5, 26-32

Matching what industry wants with what applicants want is a major problem for any IT academic department is matching what the jobs market requires to the types of courses which appeal to applicants. At the current time there is massive demand in the... Read More about How academic IT departments manage changing IT environments.