Skip to main content

Research Repository

Advanced Search

Outputs (701)

Embedded document security using sticky policies and identity based encryption (2019)
Thesis
Spyra, G. K. Embedded document security using sticky policies and identity based encryption. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2090564

Data sharing domains have expanded over several, both trusted and insecure environments. At the same time, the data security boundaries have shrunk from internal network perimeters down to a single identity and a piece of information. Since new EU GD... Read More about Embedded document security using sticky policies and identity based encryption.

PLC Memory Attack Detection and Response in a Clean Water Supply System (2019)
Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019). PLC Memory Attack Detection and Response in a Clean Water Supply System. International Journal of Critical Infrastructure Protection, 26, https://doi.org/10.1016/j.ijcip.2019.05.003

Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens tend to take modern-day conveniences such as trains, planes or tap water fo... Read More about PLC Memory Attack Detection and Response in a Clean Water Supply System.

A Multi-UAV Clustering Strategy for Reducing Insecure Communication Range (2019)
Journal Article
Wu, J., Zou, L., Zhao, L., Al-Dubai, A., Mackenzie, L., & Min, G. (2019). A Multi-UAV Clustering Strategy for Reducing Insecure Communication Range. Computer Networks, 158, 132-142. https://doi.org/10.1016/j.comnet.2019.04.028

Multi-unmanned aerial vehicle (UAV) flight formations can be deployed to monitor large areas. Individual UAVs communicate and exchange information while formation flying. but, such communication presents a security risk. The area between the UAV group... Read More about A Multi-UAV Clustering Strategy for Reducing Insecure Communication Range.

A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers (2019)
Journal Article
Han, T., Jan, S., Tan, T., Usman, M., Jan, M., Khan, R., & Xu, Y. (2020). A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers. Concurrency and Computation: Practice and Experience, 32(16), Article e5300. https://doi.org/10.1002/cpe.5300

Software De ned Network (SDN) and Network Virtualization (NV) are emerged paradigms that simpli ed the control and management of the next generation networks, most importantly, Internet of Things (IoT), Cloud Computing, and Cyber-Physical Systems. Th... Read More about A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers.

Future Quantum-to-the-Home (QTTH) All-Optical Networks (Invited Talk) (2019)
Presentation / Conference Contribution
Asif, R. (2018, August). Future Quantum-to-the-Home (QTTH) All-Optical Networks (Invited Talk). Presented at 10th International Conference on Advanced Infocomm Technology, Stockholm, Sweden

For imparting data security to the end-users in a archetypal fiber-to-the-home (FTTH) network, quantum cryptography (QC) is getting much attention now-a-days. QC or more specifically quantum key distribution (QKD) promises unconditionally secure prot... Read More about Future Quantum-to-the-Home (QTTH) All-Optical Networks (Invited Talk).

A Forensic Audit of the Tor Browser Bundle (2019)
Journal Article
Muir, M., Leimich, P., & Buchanan, W. J. (2019). A Forensic Audit of the Tor Browser Bundle. Digital Investigation, 29, 118-128. https://doi.org/10.1016/j.diin.2019.03.009

The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protocol, as its main focus is to protect the privacy of the user, in both its lo... Read More about A Forensic Audit of the Tor Browser Bundle.

Decrypting Live SSH Traffic in Virtual Environments (2019)
Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019). Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010

Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts required for decrypting secure communications. This paper develops the MemDe-... Read More about Decrypting Live SSH Traffic in Virtual Environments.

IoT Forensics: Amazon Echo as a Use Case (2019)
Journal Article
Li, S., Li, S., Choo, K.-K. R., Sun, Q., Buchanan, W. J., & Cao, J. (2019). IoT Forensics: Amazon Echo as a Use Case. IEEE Internet of Things Journal, 1-11. https://doi.org/10.1109/jiot.2019.2906946

Internet of Things (IoT) are increasingly common in our society, and can be found in civilian settings as well as sensitive applications such as battlefields and national security. Given the potential of these devices to be targeted by attackers, the... Read More about IoT Forensics: Amazon Echo as a Use Case.

SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application. (2019)
Journal Article
Jan, M. A., Zhang, W., Usman, M., Tan, Z., Khan, F., & Luo, E. (2019). SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application. Journal of Network and Computer Applications, 137, 1-10. https://doi.org/10.1016/j.jnca.2019.02.023

The Internet of Things (IoT) has the potential to transform communities around the globe into smart cities. The massive deployment of sensor-embedded devices in the smart cities generates voluminous amounts of data that need to be stored and processe... Read More about SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application..

Lightweight Reinforcement Learning for Energy Efficient Communications in Wireless Sensor Networks (2019)
Journal Article
Savaglio, C., Pace, P., Aloi, G., Liotta, A., & Fortino, G. (2019). Lightweight Reinforcement Learning for Energy Efficient Communications in Wireless Sensor Networks. IEEE Access, 7, 29355-29364. https://doi.org/10.1109/access.2019.2902371

High-density communications in wireless sensor networks (WSNs) demand for new approaches to meet stringent energy and spectrum requirements. We turn to reinforcement learning, a prominent method in artificial intelligence, to design an energy-preserv... Read More about Lightweight Reinforcement Learning for Energy Efficient Communications in Wireless Sensor Networks.

Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop (2019)
Journal Article
Babar, M., Arif, F., Jan, M. A., Tan, Z., & Khan, F. (2019). Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop. Future Generation Computer Systems, 96, 398-409. https://doi.org/10.1016/j.future.2019.02.035

The unbroken amplfi cation of a versatile urban setup is challenged by huge Big Data processing. Understanding the voluminous data generated in a smart urban environment for decision making is a challenging task. Big Data analytics is performed to ob... Read More about Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop.

Top 10 Blockchain Predictions for the (Near) Future of Healthcare (2019)
Journal Article
Halamka, J. D., Alterovitz, G., Buchanan, W. J., Cenaj, T., Clauson, K. A., Dhillon, V., Hudson, F. D., Mokhtari, M. (., Porto, D. A., Rutschman, A., & Ngo, A. L. (2019). Top 10 Blockchain Predictions for the (Near) Future of Healthcare. Blockchain in Healthcare Today, 2, https://doi.org/10.30953/bhty.v2.106

To review blockchain lessons learned in 2018 and near-future predictions for blockchain in healthcare, Blockchain in Healthcare Today (BHTY) asked the world's blockchain in healthcare experts to share their insights. Here, our internationally-renowne... Read More about Top 10 Blockchain Predictions for the (Near) Future of Healthcare.

Analyzing Objective and Subjective Data in Social Sciences: Implications for Smart Cities (2019)
Journal Article
Erhan, L., Ndubuaku, M., Ferrara, E., Richardson, M., Sheffield, D., Ferguson, F. J., Brindley, P., & Liotta, A. (2019). Analyzing Objective and Subjective Data in Social Sciences: Implications for Smart Cities. IEEE Access, 7, 19890-19906. https://doi.org/10.1109/access.2019.2897217

The ease of deployment of digital technologies and the Internet of Things gives us the opportunity to carry out large-scale social studies and to collect vast amounts of data from our cities. In this paper, we investigate a novel way of analyzing dat... Read More about Analyzing Objective and Subjective Data in Social Sciences: Implications for Smart Cities.

ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System (2019)
Journal Article
Javaid, S., Afzal, H., Babar, M., Arif, F., Tan, Z., & Jan, M. A. (2019). ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System. IEEE Access, 1-1. https://doi.org/10.1109/access.2019.2897095

Putting trust in the world of the Internet of Things, where served and serving entities are often unknown, is very hard especially when personal and business information is often being exchanged for providing and consuming services. Moreover, the iss... Read More about ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System.

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier (2019)
Presentation / Conference Contribution
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2018, December). Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. Presented at International Workshop on Big Data Analytics for Cyber Threat Hunting, Seattle, WA, USA

Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exists between the requirements of this community and the solutions that are cu... Read More about Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier.

System and method for management of confidential data (2018)
Patent
Buchanan, B., Lo, O., Macfarlane, R., Penrose, P., & Ramsay, B. (2018). System and method for management of confidential data. GB2561176A

This application is for a method of data management to identify confidential digital content on a database by first receiving a management request 302 from a system 304 to carry out data management operations. These include the identification of data... Read More about System and method for management of confidential data.

Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System (2018)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2018, August). Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. Presented at The 4th International Conference on Technology Trends, Babahoyo, Ecuador

Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, such as programmable logic controllers (PLC), networking devices, and actua... Read More about Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System.

Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning (2018)
Journal Article
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2019). Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, 128, 56-63. https://doi.org/10.1016/j.jnca.2018.12.002

Suspicious emails are one big threat for Internet of Things (IoT) security, which aim to induce users to click and then redirect them to a phishing webpage. To protect IoT systems, email classification is an essential mechanism to classify spam and l... Read More about Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning.

NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification (2018)
Journal Article
Yazdania, S., Tan, Z., Kakavand, M., & Lau, S. (2022). NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification. Wireless Networks, 28(3), 1251-1261. https://doi.org/10.1007/s11276-018-01909-0

Research in financial domain has shown that sentiment aspects of stock news have a profound impact on volume trades, volatility, stock prices and firm earnings. With the ever growing social inetworking and online marketing sites, the reviews obtained... Read More about NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification.

Reducing the Impact of Network Bottlenecks on Remote Contraband Detection (2018)
Presentation / Conference Contribution
McKeown, S., Russell, G., & Leimich, P. (2018, June). Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. Presented at IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018), Glasgow, UK

Cloud based storage is increasing in popularity, with
large volumes of data being stored remotely. Digital forensics
investigators examining such systems remotely are limited by
bandwidth constraints when accessing this kind of data using
traditi... Read More about Reducing the Impact of Network Bottlenecks on Remote Contraband Detection.