Skip to main content

Research Repository

Advanced Search

All Outputs (380)

Correlation between academic and skills-based tests in computer networks (2005)
Journal Article
Buchanan, W. (2006). Correlation between academic and skills-based tests in computer networks. British Journal of Educational Technology, 37(1), 69-78. https://doi.org/10.1111/j.1467-8535.2005.00476.x

Computing-related programmes and modules have many problems, especially related to large class sizes, large-scale plagiarism, module franchising, and an increased requirement from students for increased amounts of hands-on, practical work. This paper... Read More about Correlation between academic and skills-based tests in computer networks.

Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification (2005)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2005). Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. In W. Hutchinson (Ed.),

This paper presents a novel framework for network security, and provides a complete solution to integrated security policies, which meets the objectives of an organisation, and also an automated verification process. The framework uses a security com... Read More about Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification.

Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing (2005)
Presentation / Conference Contribution
Migas, N., & Buchanan, W. J. (2005, April). Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing. Presented at 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'05), Greenbelt, MD, USA

Ad-hoc wireless networks, which use ad-hoc routing methods may prove a good solution in certain applications, especially where networks have to be constructed where there is no possibly of creating a network backbone, and in emergency situations. The... Read More about Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing.

Enhanced Methods of Coursework Provision in Computer Networks. (2005)
Presentation / Conference Contribution
Buchanan, W. J., & Saliou, L. (2005). Enhanced Methods of Coursework Provision in Computer Networks. In ITRE 2004. 2nd International Conference Information Technology: Research and Education (111-115). https://doi.org/10.1109/ITRE.2004.1393657

Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from students for increased amounts of hands-on, practical work. This paper pres... Read More about Enhanced Methods of Coursework Provision in Computer Networks..

Critical analysis and error determination of locating-finding techniques in GSM. (2005)
Journal Article
Buchanan, W. J., Raja, A., & Munoz, J. (2005). Critical analysis and error determination of locating-finding techniques in GSM. International Journal of Mobile Communications, 3, 165-182. https://doi.org/10.1504/IJMC.2005.005905

GPS is a well-established technique for location-finding, but mobile phone-based methods are generally less expensive to implement, and can give reasonable accuracies. These techniques can thus be useful to network operators in providing services bas... Read More about Critical analysis and error determination of locating-finding techniques in GSM..

Analysis and detection of cruising computer viruses. (2004)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2004). Analysis and detection of cruising computer viruses.

Viral propagation is an important phenomenon of computer viruses. This paper focuses on viral movement and proposes the feasibility of a computer virus which is able to target a specific host, known as cruising. A novel component, based on target pro... Read More about Analysis and detection of cruising computer viruses..

Uzytkowanie Komputerow. (2004)
Book
Buchanan, W. J. (2004). Uzytkowanie Komputerow. Wkt (Poland)

Przyst?pny i praktyczny poradnik dotycz?cy u?ytkowania komputerów, obejmuj?cy szeroki zakres zagadnie? zwi?zanych z przetwarzaniem informacji i transmisj? danych oraz ich kompresj?, przechowywaniem, szyfrowaniem i bezpiecze?stwem, zawieraj?cy tak?e o... Read More about Uzytkowanie Komputerow..

Analysis and migration of location-finding methods for GSM and 3G networks. (2004)
Presentation / Conference Contribution
Buchanan, W. J., Munoz, J., Manson, R., & Raja, K. A. (2004). Analysis and migration of location-finding methods for GSM and 3G networks. . https://doi.org/10.1049/cp%3A20040695

This paper initially reviews the current range of location techniques on GSM networks, such as Cell-ID, GPS, AGPS, time difference of arrival (TDOA) and E-OTD (enhanced observed time difference). It shows how these techniques can be applied to the fu... Read More about Analysis and migration of location-finding methods for GSM and 3G networks..

Migration of mobile agents in ad-hoc wireless networks. (2004)
Presentation / Conference Contribution
Migas, N., Buchanan, W. J., & McArtney, K. (2004, May). Migration of mobile agents in ad-hoc wireless networks

This paper focuses on the design and development of a novel architecture called MARIAN, which utilises static agents, mobile agents, and also a hybrid approach, in order to perform routing, network discovery, and automatic network reconfiguration, in... Read More about Migration of mobile agents in ad-hoc wireless networks..

Covert channel analysis and detection using reverse proxy servers. (2004)
Presentation / Conference Contribution
Buchanan, W. J., & Llamas, D. (2004, June). Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC)

Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls, and most other forms of network intrusion detection systems. In fact, mos... Read More about Covert channel analysis and detection using reverse proxy servers..

MARIAN: A framework using mobile agents for routing, topology discovery and automatic network reconfiguration in ad-hoc networks. (2003)
Presentation / Conference Contribution
Migas, N., Buchanan, W. J., & McArtney, K. (2003). MARIAN: A framework using mobile agents for routing, topology discovery and automatic network reconfiguration in ad-hoc networks.

The purpose of MARIAN is to investigate the degree of suitability for mobile agent technology in routing, topology discovery, and automatic network reconfiguration in ad-hoc networks. This research proposes to assess different models of the usage of... Read More about MARIAN: A framework using mobile agents for routing, topology discovery and automatic network reconfiguration in ad-hoc networks..

Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks. (2003)
Presentation / Conference Contribution
Migas, N., Buchanan, W. J., & McArtney, K. (2003, April). Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks

Wireless networks and the usage of mobile devices are becoming popular in recent days, especially in creating ad-hoc networks. There is thus scope for developing mobile systems, where devices take an active part of creating a network infrastructure,... Read More about Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks..

Mastering Computing. (2002)
Book
Buchanan, W. J. (2002). Mastering Computing. Macmillan Press

Computing is an area which continues to grow. This book covers the main areas of computing, including programming, computer hardware, operating systems, the Internet, data communications and networking. It uses practical examples to show basic concep... Read More about Mastering Computing..

Mastering Delphi programming. (2002)
Book
Buchanan, W. J. (2002). Mastering Delphi programming. Palgrave Publishers

This book provides an introduction to the use of Delphi Version 3/4 in developing programs, full of real-life applications including serial communications, internet programming and system interfacing. The book also contains tutorial questions, many w... Read More about Mastering Delphi programming..

Towards reusable and reconfigurable models for the WWW (2002)
Presentation / Conference Contribution
Brown, E., & Buchanan, W. (2002, August). Towards reusable and reconfigurable models for the WWW. Presented at 26th Annual International Computer Software and Applications, Oxford, UK

Reuse and component design have extensively been applied to software engineering, but reuse and formal design methods in WWW-based system is still in its infancy. Most WWW developers currently design WWW content for the most efficient delivery and do... Read More about Towards reusable and reconfigurable models for the WWW.