Skip to main content

Research Repository

Advanced Search

Outputs (20)

Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives (2021)
Thesis
Cruickshank, P. Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives. (Thesis by Publication). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2805712

This work is concerned with the information practices associated with hyperlocal representation. The findings derive from an evaluation of a portfolio of ten previously published papers covering the period 2010-2020.

The main contributions are: (a... Read More about Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives.

RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture (2019)
Thesis
Ukwandu, E. A. RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2455031

Scaling big data infrastructure using multi-cloud environment has led to the demand for highly secure, resilient and reliable data sharing method. Several variants of secret sharing scheme have been proposed but there remains a gap in knowledge on th... Read More about RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture.

Embedded document security using sticky policies and identity based encryption (2019)
Thesis
Spyra, G. K. Embedded document security using sticky policies and identity based encryption. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2090564

Data sharing domains have expanded over several, both trusted and insecure environments. At the same time, the data security boundaries have shrunk from internal network perimeters down to a single identity and a piece of information. Since new EU GD... Read More about Embedded document security using sticky policies and identity based encryption.

Efficient Routing Primitives for Low-power and Lossy Networks in Internet of Things (2019)
Thesis
Ghaleb, B. Efficient Routing Primitives for Low-power and Lossy Networks in Internet of Things. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2070542

At the heart of the Internet of Things (IoTs) are the Low-power and Lossy networks (LLNs), a collection of interconnected battery-operated and resource-constrained tiny devices that enable the realization of a wide range of applications in multiple d... Read More about Efficient Routing Primitives for Low-power and Lossy Networks in Internet of Things.

HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society (2014)
Thesis
van Deursen Hazelhoff Roelfze, N. HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/6921

This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations experience similar risks and could benefit from sharing knowledge in order... Read More about HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society.

Garmin satnav forensic methods and artefacts: an exploratory study. (2014)
Thesis
Arbelet, A. Garmin satnav forensic methods and artefacts: an exploratory study. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/7334

Over ten years ago, major changes in the Global Positioning System (GPS) technology led to its explosion in popularity. GPS devices are now ubiquitous, escorting their users everywhere they go, and potentially recording the entirety of their whereabo... Read More about Garmin satnav forensic methods and artefacts: an exploratory study..

Implementation and evaluation of a botnet analysis and detection method in a virtual environment (2012)
Thesis
Waheed, S. Implementation and evaluation of a botnet analysis and detection method in a virtual environment. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/5667

Botnets are one of the biggest cyber threats. Botnets based on concepts that used for the development of malware or viruses before origin of the Internet in 1990s. Botnet is a form of malware controlled by a Botmaster using Command and Control (C&C).... Read More about Implementation and evaluation of a botnet analysis and detection method in a virtual environment.

Cryptographic privacy-preserving enhancement method for investigative data acquisition (2011)
Thesis
Kwecka, Z. Cryptographic privacy-preserving enhancement method for investigative data acquisition. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4437

The current processes involved in the acquisition of investigative data from third parties, such as banks, Internet Service Providers (ISPs) and employers, by the public authorities can breach the rights of the individuals under investigation. This i... Read More about Cryptographic privacy-preserving enhancement method for investigative data acquisition.

A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments (2010)
Thesis
Pallis, G. A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4005

For more than a century the classic circuit-switched telephony in the form of PSTN (Public Service Telephone Network) has dominated the world of phone communications (Varshney et al., 2002). The alternative solution of VoIP (Voice over Internet Proto... Read More about A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments.

An evaluation of the power consumption and carbon footprint of a cloud infrastructure (2010)
Thesis
Yampolsky, V. An evaluation of the power consumption and carbon footprint of a cloud infrastructure. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/3973

The Information and Communication Technology (ICT) sector represent two to three percents of the world energy consumption and about the same percentage of GreenHouse Gas(GHG) emission. Moreover the IT-related costs represent fifty per-cents of the el... Read More about An evaluation of the power consumption and carbon footprint of a cloud infrastructure.

Forensic verification of operating system activity via novel data, acquisition and analysis techniques (2009)
Thesis
Graves, J. Forensic verification of operating system activity via novel data, acquisition and analysis techniques. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/6699

Digital Forensics is a nascent field that faces a number of technical, procedural and cultural difficulties that must be overcome if it is to be recognised as a scientific discipline, and not just an art. Technical problems involve the need to develo... Read More about Forensic verification of operating system activity via novel data, acquisition and analysis techniques.

Network Firewall Dynamic Performance Evaluation and Formalisation (2009)
Thesis
Saliou, L. Network Firewall Dynamic Performance Evaluation and Formalisation. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/2599

Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to computer network security, but equally an organisation must be able to det... Read More about Network Firewall Dynamic Performance Evaluation and Formalisation.

MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks (2008)
Thesis
Migas, N. MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4000

Recent advances in technology provided the ground for highly dynamic, mobile, infrastructure-less networks, namely, ad-hoc networks. Despite their enormous benefits, the full potential cannot be reached unless certain issues are resolved. These mainl... Read More about MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks.

Distributed healthcare framework using patient-centric role-based security modelling and workflow (2008)
Thesis
Symes, M. Distributed healthcare framework using patient-centric role-based security modelling and workflow. (Dissertation). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4008

Healthcare professionals are spending less time with patients and more time on administrative duties (Royal College of Nursing, 2008). This is due to a high bureaucratic demand (Brindley, 2007) on the caring process, patient population and longevity... Read More about Distributed healthcare framework using patient-centric role-based security modelling and workflow.

An agent-based Bayesian method for network intrusion detection. (2003)
Thesis
Pikoulas, J. An agent-based Bayesian method for network intrusion detection. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4057

Security is one of the major issues in any network and on the Internet. It encapsulates many different areas, such as protecting individual users against intruders, protecting corporate systems against damage, and protecting data from intrusion. It i... Read More about An agent-based Bayesian method for network intrusion detection..

Component-based network test tools platform for network design and maintenance (2003)
Thesis
Golam, H. Component-based network test tools platform for network design and maintenance. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4066

Tools development for testing real time systems rely heavily on frameworks that are capable of delivering the advantages of precise control, the availability of a range of functions and the availability of standardised and reusable components. The ad... Read More about Component-based network test tools platform for network design and maintenance.

Speed improvements for the RSA encryption method (2000)
Thesis
Wang, H.-C. Speed improvements for the RSA encryption method. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4065

This thesis presents methods that can be used to improve the operation of the RSA encryption method. It shows the principles of encryption, and then expands this to give the operation of public-key methods, which includes the number value theorems ap... Read More about Speed improvements for the RSA encryption method.

Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing. (1996)
Thesis
Buchanan, W. J. Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4022

The 3D Finite-Difference Time-Domain (FDTD) method simulates structures in the time-domain using a direct form of Maxwell’s curl equations. This method has the advantage over other simulation methods in that it does not use empirical approximations.... Read More about Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing..