Skip to main content

Research Repository

Advanced Search

Outputs (41)

Future risks – Including the rise of the hacktivism. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, June). Future risks – Including the rise of the hacktivism. Presented at National Information Security Conference (NISC)

As organisations move towards infrastructures which are highly dependent on their Web infrastructure, they are now at great risk from external parties who can use a number of motivations, such as for a political agenda, to compromise their activities... Read More about Future risks – Including the rise of the hacktivism..

Performance modelling and analysis of cognitive mesh networks (2012)
Journal Article
Min, G., Wu, Y., & Al-Dubai, A. (2012). Performance modelling and analysis of cognitive mesh networks. IEEE Transactions on Communications, 60, 1474-1478. https://doi.org/10.1109/TCOMM.2012.041212.110075A

A new analytical model is proposed to investigate the delay and throughput in cognitive mesh networks. The validity of the model is demonstrated via extensive simulation experiments. The model is then used to evaluate the effects of the number of lic... Read More about Performance modelling and analysis of cognitive mesh networks.

A forensic image description language for generating test images. (2012)
Presentation / Conference Contribution
Russell, G., Macfarlane, R., & Ludwiniak, R. (2012, September). A forensic image description language for generating test images

Digital Forensics is a fast developing job market, as well as being topical and interesting, and as such is an area in which University students are keen to develop and study. At Edinburgh Napier University this topic has been taught with flexible an... Read More about A forensic image description language for generating test images..

Security issues of a publicly accessible cloud computing infrastructure. (2012)
Presentation / Conference Contribution
Russell, G., & Macfarlane, R. (2012, June). Security issues of a publicly accessible cloud computing infrastructure

Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accidental or deliberate acts by users can be dangerous to other systems. This pape... Read More about Security issues of a publicly accessible cloud computing infrastructure..

Many-to-Many embedded multicast addressing and access control method. (2012)
Patent
Romdhani, I. (2012). Many-to-Many embedded multicast addressing and access control method

A new addressing scheme for multicast IP with an extended scope field to include access rights. A new addressing scheme for multicast communications is disclosed. A new extended scope field is used which embeds a plurality of hierarchical scopes and... Read More about Many-to-Many embedded multicast addressing and access control method..

Technical evaluation of an e-health platform. (2012)
Presentation / Conference Contribution
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012, July). Technical evaluation of an e-health platform. Presented at IADIS International Conference e-Health 2012

Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation of e-Health platforms under three main categories: usability evaluation, l... Read More about Technical evaluation of an e-health platform..

SPoC: Protecting Patient Privacy for e-Health Services in the Cloud (2012)
Presentation / Conference Contribution
Fan, L., Buchanan, W. J., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., Ekonomou, E., & Khedim, A. S. (2012, January). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud

The use of digital technologies in providing health care services is in general subsumed under the term e-Health. The Data Capture and Auto Identification Reference (DACAR) project provides an open e-Health service platform that reinforces the integr... Read More about SPoC: Protecting Patient Privacy for e-Health Services in the Cloud.

Computational data protection law: trusting each other offline and online. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C., & Uthmani, O. (2012, December). Computational data protection law: trusting each other offline and online

The paper reports of a collaborative project between computer scientists, lawyers, police officers, medical professionals and social workers to develop a communication in infrastructure that allows information sharing while observing Data Protection... Read More about Computational data protection law: trusting each other offline and online..

Implementation and evaluation of a botnet analysis and detection method in a virtual environment (2012)
Thesis
Waheed, S. Implementation and evaluation of a botnet analysis and detection method in a virtual environment. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/5667

Botnets are one of the biggest cyber threats. Botnets based on concepts that used for the development of malware or viruses before origin of the Internet in 1990s. Botnet is a form of malware controlled by a Botmaster using Command and Control (C&C).... Read More about Implementation and evaluation of a botnet analysis and detection method in a virtual environment.

A privacy preserving application acquisition protocol. (2012)
Presentation / Conference Contribution
Akram, R. N., Markantonakis, K., & Mayes, K. (2012, June). A privacy preserving application acquisition protocol

In the smart card industry, the application acquisition process involves the card issuers and application providers. During this process, the respective card issuer reveals the identity of the smart card user to the individual application providers.... Read More about A privacy preserving application acquisition protocol..

Pseudorandom number generation in smart cards: an Implementation, performance and randomness analysis. (2012)
Presentation / Conference Contribution
Akram, R. N., Markantonakis, K., & Mayes, K. (2012, May). Pseudorandom number generation in smart cards: an Implementation, performance and randomness analysis

Smart cards rely on pseudorandom number generators to provide uniqueness and freshness in their cryptographic services i.e. encryption and digital signatures. Their implementations are kept proprietary by smart card manufacturers in order to remain c... Read More about Pseudorandom number generation in smart cards: an Implementation, performance and randomness analysis..

Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture. (2012)
Presentation / Conference Contribution
Akram, R. N., Markantonakis, K., & Mayes, K. (2012, October). Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture

Near Field Communication (NFC) has reinvigorated the multi-application smart card initiative. The NFC trials are relying on an extension of Issuer Centric Smart Card Model (ICOM) referred as Trusted Service Manager (TSM) architecture, which may creat... Read More about Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture..

A new analytical model for multi-hop cognitive radio networks (2012)
Journal Article
Wu, Y., Min, G., & Al-Dubai, A. (2012). A new analytical model for multi-hop cognitive radio networks. IEEE Transactions on Wireless Communications, 11, 1643-1648. https://doi.org/10.1109/TWC.2012.030812.111106

The cognitive radio (CR) is an emerging technique for increasing the utilisation of communication resources by allowing the unlicensed users to employ the under-utilised spectrum. In this paper, a new analytical performance model is developed to eval... Read More about A new analytical model for multi-hop cognitive radio networks.

Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem. (2012)
Presentation / Conference Contribution
Akram, R. N., Markantonakis, K., & Mayes, K. (2012, November). Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem

In late 1990s. the multi-application initiative was put forward to have multiple applications on a single smart card. This would have enabled a cardholder to accumulate all of her smart card based applications (e.g. banking, telecom, and transport et... Read More about Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem..

A nonlinear correlation measure for Intrusion Detection (2012)
Presentation / Conference Contribution
Ambusaidi, M., Lu, L. F., He, X., Tan, Z., Jamdagni, A., & Nanda, P. (2012, November). A nonlinear correlation measure for Intrusion Detection. Paper presented at The 7th International Conference on Frontier of Computer Science and Technology (FCST-12)

The popularity of using internet contains some risks of network attacks. It has attracted the attention of many researchers to overcome this problem. One of the effective ways that plays an important role to achieve higher security and protect networ... Read More about A nonlinear correlation measure for Intrusion Detection.

Towards OWL 2 Natively Supported Fuzzy Cloud Ontology (2012)
Presentation / Conference Contribution
Fang, D., Liu, X., Romdhani, I., & Zhao, H. (2012, July). Towards OWL 2 Natively Supported Fuzzy Cloud Ontology. Presented at 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops

Cloud Computing introduces a revolutionary paradigm of computing to Service Oriented Architecture (SOA), by provisioning various types of computational resources and applications as on-demand services. While presenting cloud services semantically usi... Read More about Towards OWL 2 Natively Supported Fuzzy Cloud Ontology.

Uses of Peer Assessment in Database Teaching and Learning (2012)
Presentation / Conference Contribution
Paterson, J., Wilson, J. N., & Leimich, P. (2010, June). Uses of Peer Assessment in Database Teaching and Learning. Presented at 27th British National Conference on Databases (BNCOD 27), Dundee

This discussion paper introduces three very different methods and contexts for the use of peer assessment in introductory database classes, each of which is supported by different learning software tools. In the first case study, at Glasgow Caledonia... Read More about Uses of Peer Assessment in Database Teaching and Learning.

New Velocity-Aware Probabilistic route discovery schemes for Mobile Ad hoc Networks. (2012)
Presentation / Conference Contribution
Bani Khalaf, M., Al-Dubai, A., & Abed, M. (2012, September). New Velocity-Aware Probabilistic route discovery schemes for Mobile Ad hoc Networks

In this paper, we investigate efficient strategies for supporting velocity aware probabilistic route discovery in Mobile Ad hoc Networks (MANETs). MANETs usually use broadcast mechanisms to discover routes between nodes by flooding the network with R... Read More about New Velocity-Aware Probabilistic route discovery schemes for Mobile Ad hoc Networks..

On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space (2012)
Presentation / Conference Contribution
Bagley, R., Ferguson, R. I., & Leimich, P. (2012, September). On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space. Paper presented at CFET (Cyberforensics in Education and Training )

A technique and supporting tool for the recovery of browsing activity (both currently stored and deleted) from the Firefox web-browser is presented. The approach is based upon applying file-carving techniques (matching regular expressions against raw... Read More about On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space.