Skip to main content

Research Repository

Advanced Search

All Outputs (414)

Resilience without AI: Assessing the Viability of Deception-Based Ransomware Detection (2025)
Journal Article
Goddard, L., Shahbaz Khan, M., Driss, M., Ghaleb, B., Lemoudden, M., Buchanan, W. J., & Ahmad, J. (2025). Resilience without AI: Assessing the Viability of Deception-Based Ransomware Detection. Procedia Computer Science, 270, 871-880. https://doi.org/10.1016/j.procs.2025.09.207

From the first attack in 1989, to date, it is evident that ransomware is highly destructive. Today the vast majority of research on ransomware detection is focused on the use of AI techniques. While the use of these techniques is very effective, they... Read More about Resilience without AI: Assessing the Viability of Deception-Based Ransomware Detection.

Analysing the role of LLMs in cybersecurity incident management (2025)
Journal Article
Jones, G., Kasimatis, D., Pitropakis, N., Macfarlane, R., & Buchanan, W. J. (2025). Analysing the role of LLMs in cybersecurity incident management. International Journal of Information Security, 24(6), 228. https://doi.org/10.1007/s10207-025-01144-7

Cybersecurity and artificial intelligence (AI) increasingly intersect as organizations grapple with sophisticated cyber threats and expanding digital landscapes. Incident response teams traditionally rely on structured procedures to identify, manage,... Read More about Analysing the role of LLMs in cybersecurity incident management.

DISTIL: Digital Identities for the Evaluation of Job Skills (2025)
Presentation / Conference Contribution
Kasimatis, D., Papadopoulos, P., Buchanan, W. J., Chrysoulas, C., Sayeed, S., Mylonas, A., & Pitropakis, N. (2025). DISTIL: Digital Identities for the Evaluation of Job Skills. 2025 IEEE International Conference on Cyber Security and Resilience (CSR) (pp. 1057-1062). IEEE. https://doi.org/10.1109/csr64739.2025.11130029

In today’s digital era, identity and credentials have shifted to electronic formats, offering new opportunities for secure and efficient verification. However, recruitment processes still face inefficiencies, fraud risks, and privacy concerns. This w... Read More about DISTIL: Digital Identities for the Evaluation of Job Skills.

Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems (2025)
Presentation / Conference Contribution
Korac, S., Moradpoor, N., Buchanan, W., Canberk, B., Maglaras, L., & Kioskli, K. (2025). Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems. 2025 21st International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) (pp. 507-514). IEEE. https://doi.org/10.1109/DCOSS-IoT65416.2025.00084

Ransomware has been predominantly a threat to Windows systems. But, Linux systems became interesting for cybercriminals and this trend is expected to continue. This endangers IoT ecosystems, whereas many IoT systems are based on Linux (e.g. cloud inf... Read More about Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems.

Performance Evaluation of Threshold Signing Schemes in Cryptography (2025)
Presentation / Conference Contribution
Faneela., Ahmad, J., Ghaleb, B., Khan, I. U., Buchanan, W. J., Jan, S. U., & Khan, M. S. (2025). Performance Evaluation of Threshold Signing Schemes in Cryptography. In F. Saeed, F. Mohammed, E. Mohammed, S. Basurra, & M. Al-Sarem (Eds.), Advances on Intelligent Computing and Data Science II (pp. 13-24). Springer. https://doi.org/10.1007/978-3-031-91351-8_2

Threshold Signature Scheme (TSS) protocols have gained significant attention over the past Ten years due to their widespread adoption in cryptocurrencies. The adoption is mainly boosted by Gennaro and Goldfedder’s TSS protocol. Since then, various TS... Read More about Performance Evaluation of Threshold Signing Schemes in Cryptography.

RNA-TransCrypt: Image encryption using chaotic RNA encoding, novel transformative substitution, and tailored cryptographic operations (2025)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Ghaleb, B., Pitropakis, N., & Buchanan, W. J. (2025). RNA-TransCrypt: Image encryption using chaotic RNA encoding, novel transformative substitution, and tailored cryptographic operations. In A. A. Abd El-Latif, M. A. ElAffendi, M. Ali AlShara, & Y. Maleh (Eds.), Cybersecurity, Cybercrimes, and Smart Emerging Technologies. Taylor and Francis. https://doi.org/10.1201/9781003614197

Given the security concerns of Internet of Things (IoT) networks and limited computational resources of IoT devices, this paper presents RNA-TransCrypt, a novel image encryption scheme that is not only highly secure but also efficient and lightweight... Read More about RNA-TransCrypt: Image encryption using chaotic RNA encoding, novel transformative substitution, and tailored cryptographic operations.

A Secure Dockerized Architecture using IIoT Sensors Predicting Machine Health and Maintenance (2025)
Presentation / Conference Contribution
Bakhsh, S. A., Ahmed, F., Almas Khan, M., Boulila, W., Aziz, A., Ghaleb, B., Buchanan, W. J., & Ahmad, J. (2025). A Secure Dockerized Architecture using IIoT Sensors Predicting Machine Health and Maintenance. In A. A. Abd El-Latif, M. A. ElAffendi, M. Ali AlShara, & Y. Maleh (Eds.), Proceedings of the Second International Conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies (CCSET 2023), Riyadh, Saudi Arabia, 5th–7th December, 2023. Taylor and Francis. https://doi.org/10.1201/9781003614197-19

The Internet of Things (IoT) is playing a major role in technological innovation. An important area related to IoT is industrial process monitoring to boost production. In the case of spinning machinery, sensor nodes from the Industrial Internet of T... Read More about A Secure Dockerized Architecture using IIoT Sensors Predicting Machine Health and Maintenance.

Generative Adversarial Networks-enabled Anomaly Detection Systems: A Survey (2025)
Journal Article
Saeed, U., Jan, S. U., Ahmad, J., Shah, S. A., Alshehri, M. S., Ghadi, Y. Y., Pitropakis, N., & Buchanan, W. J. (2026). Generative Adversarial Networks-enabled Anomaly Detection Systems: A Survey. Expert Systems with Applications, 296(B), 128978. https://doi.org/10.1016/j.eswa.2025.128978

Anomaly Detection (AD) is an important area of research because it helps identify outliers in data, enabling early detection of errors, fraud, and potential security breaches. Machine Learning (ML) can be utilized for distinct AD systems, and Generat... Read More about Generative Adversarial Networks-enabled Anomaly Detection Systems: A Survey.

Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices (2025)
Journal Article
Patterson, J. C., Buchanan, W. J., & Turino, C. (2025). Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices. Journal of Cybersecurity and Privacy, 5(3), 42. https://doi.org/10.3390/jcp5030042

The emergence of quantum computing and Shor's algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum-robust techniques. The NIST has responded by standardising Post-Quantum Cryptography (PQC) algorith... Read More about Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices.

Privacy-aware White and Black List Searching for Fraud Analysis (2025)
Presentation / Conference Contribution
Buchanan, W. J., Gilchrist, J., Jaroucheh, Z., Timosenko, D., Ramchandani, N., & Ali, H. (2025, September 20-21). Privacy-aware White and Black List Searching for Fraud Analysis [Paper presentation]. 14th International Conference on Cryptography and Information Security, Copenhagen, Denmark. https://airccse.org/cscp.html

In many areas of cybersecurity, we require access to Personally Identifiable Information (PII), such as names, postal addresses and email addresses. Unfortunately, this can lead to data breaches, especially in relation to data compliance regulations... Read More about Privacy-aware White and Black List Searching for Fraud Analysis.

Anamorphic Cryptography using Baby-Step Giant-Step Recovery (2025)
Presentation / Conference Contribution
Buchanan, W. J., & Gilchrist, J. (2025, September 20-21). Anamorphic Cryptography using Baby-Step Giant-Step Recovery [Paper presentation]. 14th International Conference on Cryptography and Information Security, Copenhagen, Denmark. https://airccse.org/cscp.html

In 2022, Persianom, Phan and Yung outlined the creation of Anamor-phic Cryptography. With this, we can create a public key to encrypt data, and then have two secret keys. These secret keys are used to decrypt the cipher into different messages. So, o... Read More about Anamorphic Cryptography using Baby-Step Giant-Step Recovery.

TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing (2025)
Journal Article
Ali, H., Buchanan, W. J., Ahmad, J., Abubakar, M., Khan, M. S., & Wadhaj, I. (2025). TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing. Future Internet, 17(7), 289. https://doi.org/10.3390/fi17070289

We introduce TrustShare, a novel blockchain-based framework designed to enable secure, privacy-preserving, and trust-aware cyber threat intelligence (CTI) sharing across organizational boundaries. Leveraging Hyperledger Fabric, the architecture suppo... Read More about TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing.

Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption (2025)
Journal Article
Buchanan, W. J., & Ali, H. (2025). Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption. Cryptography, 9(2), 33. https://doi.org/10.3390/cryptography9020033

The requirement for privacy-aware machine learning increases as we continue to use PII (personally identifiable information) within machine training. To overcome the existing privacy issues, we can apply fully homomorphic encryption (FHE) to encrypt... Read More about Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption.

Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE (2025)
Presentation / Conference Contribution
Faneela., Ahmad, J., Ghaleb, B., Jan, S. U., & Buchanan, W. J. (2025). Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE. 2025 International Conference on New Trends in Computing Sciences (ICTCS) (pp. 219-226). Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/ictcs65341.2025.10989417

The rapid growth of cloud computing and data-driven applications has amplified privacy concerns, driven by the increasing demand to process sensitive data securely. Homomorphic encryption (HE) enables computation on encrypted data while maintaining p... Read More about Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE.

vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election (2025)
Presentation / Conference Contribution
Elnour, S., Buchanan, W. J., Keating, P., Abubakar, M., & Elnour, S. (2025). vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election. Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media (pp. 61-76). Springer. https://doi.org/10.1007/978-981-96-0401-2_4

The vSPACE experimental proof-of-concept (PoC) on a TrueElect extended protocol presents a novel approach to secure, private, and scalable elections, extending the TrueElect and other related protocols with the integration of Self-Sovereign Identity... Read More about vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election.

Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0 (2025)
Presentation / Conference Contribution
Connell, J., Kasimatis, D., Papadopoulos, P., Buchanan, W. J., Sarigiannidis, P., & Pitropakis, N. (2025). Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0. Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media (pp. 349-365). Springer Nature. https://doi.org/10.1007/978-981-96-0401-2_19

Recent instances have brought to light the inherent vulnerability of the manufacturing sector to cyber security threats, particularly within the food and beverage industries. With the rapid adoption of Industry 4.0, supply chains are exposed to an ex... Read More about Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0.

LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts (2025)
Journal Article
Kumar, G., Saha, R., Conti, M., & Buchanan, W. J. (2025). LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts. IEEE Transactions on Services Computing, 18(3), 1529-1542. https://doi.org/10.1109/tsc.2025.3562323

Smart contracts are integral to decentralized systems like blockchains and enable the automation of processes through programmable conditions. However, their immutability, once deployed, poses challenges when addressing errors or bugs. Existing solut... Read More about LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts.

Post-Quantum Migration of the Tor Application (2025)
Journal Article
Berger, D., Lemoudden, M., & Buchanan, W. J. (2025). Post-Quantum Migration of the Tor Application. Journal of Cybersecurity and Privacy, 5(2), 13. https://doi.org/10.3390/jcp5020013

The efficiency of Shor's and Grover's algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one's privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decr... Read More about Post-Quantum Migration of the Tor Application.

Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques (2025)
Journal Article
Konstantinou, A., Kasimatis, D., Buchanan, W. J., Ullah Jan, S., Ahmad, J., Politis, I., & Pitropakis, N. (2025). Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques. Machine Learning and Knowledge Extraction, 7(2), 31. https://doi.org/10.3390/make7020031

This paper explores the potential use of Large Language Models (LLMs), such as ChatGPT, Google Gemini, and Microsoft Copilot, in threat hunting, specifically focusing on Living off the Land (LotL) techniques. LotL methods allow threat actors to blend... Read More about Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques.

Image Encryption in Frequency Domain Using Hybrid Chaotic Maps, Hashing, and Lifting Wavelet Transform (2025)
Presentation / Conference Contribution
Batool, F., Kureshi, N., Marie, R. R., Ahmad, F., Khan, M. S., Lemoudden, M., Buchanan, W. J., & Ahmad, J. (2025). Image Encryption in Frequency Domain Using Hybrid Chaotic Maps, Hashing, and Lifting Wavelet Transform. In A. Bennour, A. Bouridane, S. Almaadeed, B. Bouaziz, & E. Edirisinghe (Eds.), Intelligent Systems and Pattern Recognition (pp. 262-273). Springer. https://doi.org/10.1007/978-3-031-82153-0_20

In the era of rapid digitization and extensive data exchange, security of transmitted data has become a significant concern. To overcome this issue, this paper proposes an image encryption scheme comprising of the integration of multiple chaotic maps... Read More about Image Encryption in Frequency Domain Using Hybrid Chaotic Maps, Hashing, and Lifting Wavelet Transform.