Skip to main content

Research Repository

Advanced Search

Outputs (34)

A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). (2011)
Presentation / Conference Contribution
Buchanan, W. J., Flandrin, F., Macfarlane, R., & Graves, J. (2011). A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). In Cyberforensics 2011

This paper defines a methodology for the evaluation of a Rate-based Intrusion Prevention System (IPS) for a Distributed Denial of Service (DDoS) threat. This evaluation system uses realistic background traffic along with attacking traffic, with four... Read More about A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS)..

Crime risk evaluation within information sharing between the Police and community partners. (2011)
Journal Article
Uthmani, O., Buchanan, W. J., Lawson, A., Scott, R., Schafer, B., & Fan, L. (2011). Crime risk evaluation within information sharing between the Police and community partners. Information and Communications Technology Law, 20, 57-81. https://doi.org/10.1080/13600834.2011.578922

The aim of this paper is to provide profiles for crimes which can be used to model the context for information sharing between the police and community partner organisations. This context can then be integrated with information-sharing syntax used by... Read More about Crime risk evaluation within information sharing between the Police and community partners..

Affliate advertising fraud and an investigatory fraud framework. (2011)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., & Lawson, A. (2011). Affliate advertising fraud and an investigatory fraud framework. In CyberForensics 2011

This paper outlines the details of a real-life scam, which involves creating fraudulent Web sites which pretend to sell goods, but are actually used to perform click-through crime or use identity fraud to claim commission on the sale of goods. It inv... Read More about Affliate advertising fraud and an investigatory fraud framework..

Minimising collateral damage: privacy-preserving Investigative data acquisition platform. (2011)
Journal Article
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2011). Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach, 4, 12-31. https://doi.org/10.4018/jitsa.2011070102

Investigators define invasion of privacy during their operations as collateral damage. Inquiries that require gathering data about potential suspects from third parties, such as banks, Internet Service Providers (ISPs) or employers are likely to impa... Read More about Minimising collateral damage: privacy-preserving Investigative data acquisition platform..

DACAR platform for eHealth services cloud. (2011)
Presentation / Conference Contribution
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011). DACAR platform for eHealth services cloud. . https://doi.org/10.1109/CLOUD.2011.31

The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services, but concerns over service integration, large scale deployment, and securit... Read More about DACAR platform for eHealth services cloud..

An Integrated Cloud-based Healthcare Infrastructure. (2011)
Presentation / Conference Contribution
Ekonomou, E., Fan, L., Buchanan, W. J., & Thuemmler, C. (2011, November). An Integrated Cloud-based Healthcare Infrastructure

We present a cloud-based healthcare system that integrates a formal care system (DACAR) with an informal care system (Microsoft HealthVault). The system provides high levels of security and privacy within a cloud environment, enabling sharing of both... Read More about An Integrated Cloud-based Healthcare Infrastructure..

A novel privacy preserving method for the location tracking of mobile devices (2011)
Journal Article
Buchanan, W. J., & Kwecka, Z. (2011). A novel privacy preserving method for the location tracking of mobile devices. Wireless Networks,

Two of the major changes within computing, at the present time, are the move towards serviceoriented architectures and the increasing usage of mobile devices to access these services. Along with this, as these devices are often moving, extra context... Read More about A novel privacy preserving method for the location tracking of mobile devices.

Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. (2011)
Journal Article
Buchanan, W. J., Graves, J., Bose, N., Macfarlane, R., Davison, B., & Ludwiniak, R. (2011). Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. HEA ICS Conference,

This paper focuses on the integration of virtualised environments within the teaching of computer security and digital forensics, and includes three case studies. The first case study involves assessing student perception on the usage of VMware Works... Read More about Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs..

Security and forensic computing: introduction to computer security. (2011)
Digital Artefact
Buchanan, W. J. (2011). Security and forensic computing: introduction to computer security

1 INTRODUCTION 14 1.1 The Industrial and the Information Age 14 1.2 CIA and AAA 15 1.3 Protecting against intruders 16 1.4 Users, systems and data 17 1.5 Security and Forensic Computing 19 1.6 ISO 27002 21 1.7 Risks 22 Annual Loss Expectancy... Read More about Security and forensic computing: introduction to computer security..

How academic IT departments manage changing IT environments (2011)
Journal Article
Buchanan, W. J. (2011). How academic IT departments manage changing IT environments. VitAL Magazine, 5, 26-32

Matching what industry wants with what applicants want is a major problem for any IT academic department is matching what the jobs market requires to the types of courses which appeal to applicants. At the current time there is massive demand in the... Read More about How academic IT departments manage changing IT environments.

Evidence to the Justice Committee at the Scottish Parliament. (2011)
Other
Buchanan, W. J. (2011). Evidence to the Justice Committee at the Scottish Parliament

On 20 September 2011, Bill gave evidence at Offensive Behaviour at Football and Threatening Communications Bill: http://news.bbc.co.uk/democracylive/hi/scotland/newsid_9594000/9594710.stm?t=1376s

Formal security policy implementations in network firewalls. (2011)
Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012). Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003

Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. Ther... Read More about Formal security policy implementations in network firewalls..

Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, September). Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security. Paper presented at CFET: Cybercrime Forensics Education & Training

The use of virtualised and cloud-based environments provides an excellent opportunity to enhance learning and to provide students with skills which match exactly to the requirements of industry, along with integrating with professional certification.... Read More about Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security..

Cloud-based e-Health System. (2011)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Thuemmler, C., Lo, O., & Ekonomou, E. (2011, September). Cloud-based e-Health System. Paper presented at BCS Health Informatics

This paper presents the future of health care system, which uses the newly developed security infrastructure.

Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. (2011)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., & Lawson, A. (2011, August). Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. Paper presented at SCONE-the Scottish Networking Event

This presentation focuses on outlining criminal activity within affiliate marketing related to click-through and ID theft crime, based on real-life crime data. It shows the mechanisms that criminals might use in order to act fraudulently, and present... Read More about Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing..

Risk analysis for criminal context in information sharing policies. (2011)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, August). Risk analysis for criminal context in information sharing policies. Paper presented at SCONE - the Scottish Networking event

This presentation outlines of a novel system which maps the information sharing between two domains. It involves the definition of a formalized information sharing policy, which maps the organisation infrastructure which is exposed for the sharing be... Read More about Risk analysis for criminal context in information sharing policies..

Next generation secure e-health platform. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, June). Next generation secure e-health platform. Paper presented at BCS ISSG seminar "The Insider Threat"

A patient-centric approach to integrating assisted living and formal health care and how the opportunity for insider threats is reduced through the enhanced identity checking system.

Cloud-based digital forensics evaluation test (D-FET) platform. (2011)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., …Ludwiniak, R. (2011, June). Cloud-based digital forensics evaluation test (D-FET) platform. Paper presented at Cyberforensics 2011

This paper outlines the specification of the Cloud-based DFET platform which is used to evaluate the performance of digital forensics tools, which aim to detect the presence of trails of evidence, such as for the presence of illicit images and determ... Read More about Cloud-based digital forensics evaluation test (D-FET) platform..

Intelligence information sharing between the police and their community partners. (2011)
Presentation / Conference Contribution
Scott, R., Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, June). Intelligence information sharing between the police and their community partners. Paper presented at Symposium on Security and Cybercrime

This presentation will show a newly developed system for information, and will outline the three "R"s involved in information sharing: RISK. Identify and managing risks to ensure a balanced approach to operational management and organisational develo... Read More about Intelligence information sharing between the police and their community partners..

D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures. (2011)
Presentation / Conference Contribution
Buchanan, W. J., & Macfarlane, R. (2011, June). D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures. Paper presented at Scottish Higher Education Employability Conference: Strengthening Partnerships with Employers

The use of virtualised and cloud-based environments provide an excellent opportunity to enhance learning and to provide students with skills which match exactly to the requirements of industry, along with integrating with professional certification.... Read More about D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures..

A next generation Cloud-based health care platform. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, May). A next generation Cloud-based health care platform. Paper presented at Innovation in Healthcare

This presentation outlines a novel Cloud-based e-Health Platform which integrates security within every single transaction. It involves a TSB/EPSRC funded project with Edinburgh Napier University, Chelsea and Westminster Hospital, and a number of col... Read More about A next generation Cloud-based health care platform..

Advanced security and network forensics: network forensics. (2011)
Other
Buchanan, W. J. (2011). Advanced security and network forensics: network forensics. [Educational toolkit]. Edinburgh Napier University

3 NETWORK FORENSICS 3.1 Objectives 3.2 Introduction 3.3 The key protocols 3.4 Ethernet, IP and TCP headers 3.5 TCP connection 3.6 ARP 3.7 SYN 3.8 Application Layer Analysis - FTP 3.9 ICMP 3.10 DNS 3.11 Port scan 3.12 SYN flood... Read More about Advanced security and network forensics: network forensics..

Advanced security and network forensics: obfuscation and data hiding. (2011)
Other
Buchanan, W. J. (2011). Advanced security and network forensics: obfuscation and data hiding. [Educational resource]. Edinburgh Napier University

4 DATA HIDING AND OBFUSCATION 4.1 Objectives 4.2 Introduction 4.3 Obfuscation using Encryption Private-key data hiding Public-key data hiding Hashing Encoding Ex-OR encoding Coding 4.4 Obfuscation through tunneling 4.5 Covert ch... Read More about Advanced security and network forensics: obfuscation and data hiding..

Advanced security and network forensics: web Infrastructures. (2011)
Other
Buchanan, W. J. (2011). Advanced security and network forensics: web Infrastructures. [Educational Resource]. Edinburgh Napier University

5 WEB INFRASTRUCTURES 5.1 Objectives 5.2 Introduction 5.3 Identity 2.0 5.4 SOAP over HTTP 5.5 LDAP X.500 5.6 Authentication Infrastructures 5.7 802.1x Authentication Infrastructure Authentication techniques Security weaknesses of... Read More about Advanced security and network forensics: web Infrastructures..

Making assessment and feedback fun: feedback before and after assessments. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, January). Making assessment and feedback fun: feedback before and after assessments. Paper presented at Edinburgh Napier University Staff Conference

Multiple Choice Questions (MCQs) are often seen as being weak in terms of their coverage, and are criticised for often only assessing knowledge and not encouraging deep learning. This presentation shows that it is possible to scientifically design an... Read More about Making assessment and feedback fun: feedback before and after assessments..

Student perception of on-line lectures with a blended learning environment. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, January). Student perception of on-line lectures with a blended learning environment. Paper presented at Edinburgh Napier University Staff Conference

Educational institutions are increasingly moving towards enhancing learning through the use of integrated information technology. Blended, or augmented, learning, aims to support the traditional learning environment – where the instructor blends onli... Read More about Student perception of on-line lectures with a blended learning environment..