Skip to main content

Research Repository

Advanced Search

Outputs (21)

System and method for management of confidential data (2018)
Patent
Buchanan, B., Lo, O., Macfarlane, R., Penrose, P., & Ramsay, B. (2018). System and method for management of confidential data. GB2561176A

This application is for a method of data management to identify confidential digital content on a database by first receiving a management request 302 from a system 304 to carry out data management operations. These include the identification of data... Read More about System and method for management of confidential data.

Mitigating Disaster using Secure Threshold-Cloud Architecture (2018)
Journal Article
Ukwandu, E., Buchanan, W. J., & Russell, G. (2018). Mitigating Disaster using Secure Threshold-Cloud Architecture. Current Trends in Computer Sciences & Applications, 1(2),

There are many risks in moving data into public cloud environments, along with an increasing threat around large-scale data leakage during cloud outages. This work aims to apply secret sharing methods as used in cryptography to create shares of crypt... Read More about Mitigating Disaster using Secure Threshold-Cloud Architecture.

The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime (2018)
Journal Article
Dyson, S., Buchanan, W., & Bell, L. (2018). The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime. The Journal of the British Blockchain Association, 1(2), 1-6. https://doi.org/10.31585/jbba-1-2-%288%292018

We increasingly live in a world where there is a balance between the rights to privacy and the requirements for consent, and the rights of society to protect itself. Within this world, there is an ever-increasing requirement to protect the identities... Read More about The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime.

Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates (2018)
Conference Proceeding
Rooney, L., Chute, C., Buchanan, W. J., Smales, A., & Hepburn, L. (2018). Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates. In Proceedings of ThinkMind - GLOBAL HEALTH 2018, The Seventh International Conference on Global Health Challenges

Long-term conditions in Scotland account for 80% of all GP consultations; they also account for 60% of all deaths in Scotland. Asthma and Chronic Obstructive Pulmonary Disease (COPD) are common long-term respiratory diseases [1]. Asthma is a heteroge... Read More about Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates.

Impact of cyberattacks on stock performance: a comparative study (2018)
Journal Article
Tweneboah-Kodua, S., Atsu, F., & Buchanan, W. (2018). Impact of cyberattacks on stock performance: a comparative study. Information and Computer Security, 26(5), 637-652. https://doi.org/10.1108/ics-05-2018-0060

The study uses cyberattacks announcements on 96 firms that are listed on S&P 500 over the period January 03, 2013 and December 29, 2017. The empirical analysis was performed in two ways: cross-section and industry level. We employ statistical tests... Read More about Impact of cyberattacks on stock performance: a comparative study.

Requirements for 5G based telemetric cardiac monitoring (2018)
Conference Proceeding
Thuemmler, C., Hindricks, G., Rolffs, C., Buchanan, W., & Bollmann, A. (2018). Requirements for 5G based telemetric cardiac monitoring. In 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). https://doi.org/10.1109/WiMOB.2018.8589139

Several white papers have been published on general requirements for 5G in the health vertical. As 5G research and implementation continue more detailed real world information for application research are needed. This paper is focusing on the require... Read More about Requirements for 5G based telemetric cardiac monitoring.

Method for identification of digital content (2018)
Patent
Buchanan, B., Lo, O., Penrose, P., Ramsay, B., & Macfarlane, R. (2018). Method for identification of digital content. World Intellectual Property Organization

Many areas oi investigation require searching through data that may be oi interest. One example oi data that may be involved in an investigation is copyrighted material that may be suspected of having been obtained or reproduced illegally by a third... Read More about Method for identification of digital content.

Privacy Parameter Variation using RAPPOR on a Malware Dataset (2018)
Conference Proceeding
Aaby, P., Mata De Acuña, J. J., Macfarlane, R., & Buchanan, W. J. (2018). Privacy Parameter Variation using RAPPOR on a Malware Dataset. In Proceedings of 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18) (8). https://doi.org/10.1109/TrustCom/BigDataSE.2018.00133

Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of analysing sensitive user data. The RAPPOR (Randomized Aggregatable Privacy... Read More about Privacy Parameter Variation using RAPPOR on a Malware Dataset.

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device (2018)
Conference Proceeding
Lo, O., Buchanan, W. J., & Carson, D. (2018). Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. In ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. https://doi.org/10.1145/3230833.3232801

Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consumption or processing power is limited. Thus, there has been an increasing a... Read More about Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device.

GDPR and Cyber Security for Business Information Systems (2018)
Book
Gobeo, A., Fowler, C., & Buchanan, B. (2018). GDPR and Cyber Security for Business Information Systems. River Publishers

The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals i... Read More about GDPR and Cyber Security for Business Information Systems.