Skip to main content

Research Repository

Advanced Search

All Outputs (372)

Mass customisation through personalised brochures: the role of digital printing. (2007)
Journal Article
Migas, N., Anastasiadou, C., & Buchanan, W. J. (2007). Mass customisation through personalised brochures: the role of digital printing. Information Systems,

This paper argues that despite the wide adoption of Internet technologies in destination marketing, information is still disseminated through printed brochures that have largely remained unchanged and unaffected by the trend towards greater personali... Read More about Mass customisation through personalised brochures: the role of digital printing..

Scenario Analysis using Out-of-line Firewall Evaluation Framework. (2007)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall Evaluation Framework.

Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These attacks typically aim at disabling computer network infrastructure, and, sin... Read More about Scenario Analysis using Out-of-line Firewall Evaluation Framework..

Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology. (2007)
Journal Article
Thuemmler, C., Buchanan, W. J., & Kumar, V. (2007). Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology. International Journal of Healthcare Technology and Management, 8, 571-583

This paper outlines a large-scale audit for the enhancement of quality of care and staff and patient safety using passive RFID (Radio Frequency ID) wrist bands, which link to a patient's database, in order to reduce errors in patient care. It has bee... Read More about Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology..

Enhancing intrusion detection via an active target host. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). Enhancing intrusion detection via an active target host. In IEEE ICTe Africa 2006

Over the past decade, there have been increases in network attacks. These attacks are typically at-tempts to compromise the integrity, confidentiality or availability of networked resources. In other to reduce these attacks, Intrusion Detection Syste... Read More about Enhancing intrusion detection via an active target host..

A framework to detect novel computer viruses via system calls. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). A framework to detect novel computer viruses via system calls. In M. Merabti, R. Pereira, & O. Abuelma'atti (Eds.), 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadca

This paper describes a framework for detecting self-propagating email viruses based on deterministic system calls derived from associated email client’s dynamic link libraries (DLLs). Our research approach is based on the principle that a key objecti... Read More about A framework to detect novel computer viruses via system calls..

Agent-based systems for Ad-hoc routing. (2006)
Presentation / Conference Contribution
Buchanan, W. J., Migas, N., & McArtney, K. (2006). Agent-based systems for Ad-hoc routing.

Provides a foundation in agent-based systems for Ad-hoc routing.

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data (2006)
Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. https://doi.org/10.1016/j.cose.2006.04.001

Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these systems have evolved with the technology and have become more sophisticated. D... Read More about NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data.

Investigating false positive reduction in HTTP via procedure analysis. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). Investigating false positive reduction in HTTP via procedure analysis. . https://doi.org/10.1109/ICNS.2006.65

This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection systems (IDSs) are discussed. Then we present our research efforts in the form... Read More about Investigating false positive reduction in HTTP via procedure analysis..

Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. (2006)
Presentation / Conference Contribution
Graves, J., Buchanan, W. J., Saliou, L., & Old, L. J. (2006). Performance analysis of network based forensic systems for in-line and out-of-line detection and logging.

Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers and Intrusion Detection Systems (IDSs) can yield important information, whi... Read More about Performance analysis of network based forensic systems for in-line and out-of-line detection and logging..

Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. (2006)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2006). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In W. Hutchinson (Ed.),

Security in computer networks is typically passive, static, and reactive. This is typically due to most networking devices being rule-based, and when updates are necessary, they are normally done manually. Ultimately, the social and hierarchical stru... Read More about Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations..

An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing (2006)
Presentation / Conference Contribution
Migas, N., & Buchanan, W. (2006). An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing. In Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International Symposium and Workshop

Multi-hop ad-hoc routing is a challenging issue, because of the dynamic network topology, and limited capabilities of resource-constrained mobile devices. This paper proposes a metric-driven clustering organisation of participating nodes which provid... Read More about An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing.

NetHost-sensor: Monitoring a target host's application via system calls (2006)
Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. (2006). NetHost-sensor: Monitoring a target host's application via system calls. Information Security Technical Report, 11(4), 166-175. https://doi.org/10.1016/j.istr.2006.10.003

Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert network packet profiles for intrusive trends; whereas, host security may em... Read More about NetHost-sensor: Monitoring a target host's application via system calls.

Agent-based forensic investigations with an integrated framework. (2005)
Presentation / Conference Contribution
Buchanan, W. J., Graves, J., Saliou, L., Sebea, A. L., & Migas, N. (2005). Agent-based forensic investigations with an integrated framework.

Forensics investigations can be flawed for many reasons, such as that they can lack any real evidence of an incident. Also, it can be the case that the legal rights of an individual has been breached, or that the steps taken in the investigation cann... Read More about Agent-based forensic investigations with an integrated framework..

Analysis of an agent-based metric-driven method for ad-hoc, on-demand routing (2005)
Journal Article
Buchanan, W. J., Migas, N., Sinclair, G., & McArtney, K. (2006). Analysis of an agent-based metric-driven method for ad-hoc, on-demand routing. Ad hoc networks, 4(2), 147-167. https://doi.org/10.1016/j.adhoc.2004.04.009

Ad-hoc networks could bring many benefits over traditional, fixed networks. Unfortunately, they have many difficulties, including the selection of the optimal route, the availability of routes as mobile nodes move around the physical space, and probl... Read More about Analysis of an agent-based metric-driven method for ad-hoc, on-demand routing.

Correlation between academic and skills-based tests in computer networks (2005)
Journal Article
Buchanan, W. (2006). Correlation between academic and skills-based tests in computer networks. British Journal of Educational Technology, 37(1), 69-78. https://doi.org/10.1111/j.1467-8535.2005.00476.x

Computing-related programmes and modules have many problems, especially related to large class sizes, large-scale plagiarism, module franchising, and an increased requirement from students for increased amounts of hands-on, practical work. This paper... Read More about Correlation between academic and skills-based tests in computer networks.

Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification (2005)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2005). Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. In W. Hutchinson (Ed.),

This paper presents a novel framework for network security, and provides a complete solution to integrated security policies, which meets the objectives of an organisation, and also an automated verification process. The framework uses a security com... Read More about Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification.

Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing (2005)
Presentation / Conference Contribution
Migas, N., & Buchanan, W. J. (2005, April). Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing. Presented at 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (E

Ad-hoc wireless networks, which use ad-hoc routing methods may prove a good solution in certain applications, especially where networks have to be constructed where there is no possibly of creating a network backbone, and in emergency situations. The... Read More about Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing.

Enhanced Methods of Coursework Provision in Computer Networks. (2005)
Presentation / Conference Contribution
Buchanan, W. J., & Saliou, L. (2005). Enhanced Methods of Coursework Provision in Computer Networks. In ITRE 2004. 2nd International Conference Information Technology: Research and Education (111-115). https://doi.org/10.1109/ITRE.2004.1393657

Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from students for increased amounts of hands-on, practical work. This paper pres... Read More about Enhanced Methods of Coursework Provision in Computer Networks..

Critical analysis and error determination of locating-finding techniques in GSM. (2005)
Journal Article
Buchanan, W. J., Raja, A., & Munoz, J. (2005). Critical analysis and error determination of locating-finding techniques in GSM. International Journal of Mobile Communications, 3, 165-182. https://doi.org/10.1504/IJMC.2005.005905

GPS is a well-established technique for location-finding, but mobile phone-based methods are generally less expensive to implement, and can give reasonable accuracies. These techniques can thus be useful to network operators in providing services bas... Read More about Critical analysis and error determination of locating-finding techniques in GSM..

Analysis and detection of cruising computer viruses. (2004)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2004). Analysis and detection of cruising computer viruses.

Viral propagation is an important phenomenon of computer viruses. This paper focuses on viral movement and proposes the feasibility of a computer virus which is able to target a specific host, known as cruising. A novel component, based on target pro... Read More about Analysis and detection of cruising computer viruses..