Skip to main content

Research Repository

Advanced Search

Outputs (20)

Nitrate Pollution Mapping for Reservoirs Using Flexible Sensors Integrated with Underwater Robot (2025)
Journal Article
Markapudi, P. R., Beg, M., Kadara, R. O., Paul, F., Kerrouche, A., See, C. H., & Manjakkal, L. (in press). Nitrate Pollution Mapping for Reservoirs Using Flexible Sensors Integrated with Underwater Robot. IEEE Internet of Things Journal,

Water pollution monitoring is crucial for environmental protection, playing a key role in safeguarding ecosystems, protecting public health and promoting sustainable development. However, traditional methods face challenges related to accessibility,... Read More about Nitrate Pollution Mapping for Reservoirs Using Flexible Sensors Integrated with Underwater Robot.

Anamorphic Cryptography using Baby-Step Giant-Step Recovery (2025)
Presentation / Conference Contribution
Buchanan, W. J., & Gilchrist, J. (2025, September). Anamorphic Cryptography using Baby-Step Giant-Step Recovery. Presented at 14th International Conference on Cryptography and Information Security, Copenhagen, Denmark

In 2022, Persianom, Phan and Yung outlined the creation of Anamor-phic Cryptography. With this, we can create a public key to encrypt data, and then have two secret keys. These secret keys are used to decrypt the cipher into different messages. So, o... Read More about Anamorphic Cryptography using Baby-Step Giant-Step Recovery.

Privacy-aware White and Black List Searching for Fraud Analysis (2025)
Presentation / Conference Contribution
Buchanan, W. J., Gilchrist, J., Jaroucheh, Z., Timosenko, D., Ramchandani, N., & Ali, H. (2025, September). Privacy-aware White and Black List Searching for Fraud Analysis. Presented at 14th International Conference on Cryptography and Information Security, Copenhagen, Denmark

In many areas of cybersecurity, we require access to Personally Identifiable Information (PII), such as names, postal addresses and email addresses. Unfortunately, this can lead to data breaches, especially in relation to data compliance regulations... Read More about Privacy-aware White and Black List Searching for Fraud Analysis.

Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices (2025)
Journal Article
Patterson, J. C., Buchanan, W. J., & Turino, C. (2025). Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices. Journal of Cybersecurity and Privacy, 5(3), Article 42. https://doi.org/10.3390/jcp5030042

The emergence of quantum computing and Shor's algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum-robust techniques. The NIST has responded by standardising Post-Quantum Cryptography (PQC) algorith... Read More about Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices.

A Survey on LoRaWAN MAC Schemes: From Conventional Solutions To AI-driven Protocols (2025)
Journal Article
Alahmadi, H., Bouabdallah, F., Al-Dubai, A., Ghaleb, B., Hussain, A., Chamola, V., Hawbani, A., Zhao, L., & Yu, R. (in press). A Survey on LoRaWAN MAC Schemes: From Conventional Solutions To AI-driven Protocols. Communications Surveys and Tutorials,

Long Range (LoRa) networks have emerged as a vital solution catering to applications requiring coverage over relatively long distances in the world of Internet of Things (IoT), where connectivity and efficient data transmission are paramount. LoRa’s... Read More about A Survey on LoRaWAN MAC Schemes: From Conventional Solutions To AI-driven Protocols.

TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing (2025)
Journal Article
Ali, H., Buchanan, W. J., Ahmad, J., Abubakar, M., Khan, M. S., & Wadhaj, I. (2025). TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing. Future Internet, 17(7), Article 289. https://doi.org/10.3390/fi17070289

We introduce TrustShare, a novel blockchain-based framework designed to enable secure, privacy-preserving, and trust-aware cyber threat intelligence (CTI) sharing across organizational boundaries. Leveraging Hyperledger Fabric, the architecture suppo... Read More about TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing.

Discipline-Sensitive Predictive Analytics for IPA-Driven Building Maintenance Management: Material Stock Quantity Modeling (2025)
Journal Article
Huang, Z., Liu, X., & Romdhani, I. (online). Discipline-Sensitive Predictive Analytics for IPA-Driven Building Maintenance Management: Material Stock Quantity Modeling. Journal of Data Science and Intelligent Systems, https://doi.org/10.47852/bonviewJDSIS52023947

The study introduces a machine learning model for BMM (Building Maintenance Management), which utilized IPA (Intelligent Process Automation) to predict the material stock required in a period, to manage the cost efficiency. Traditional BMM approaches... Read More about Discipline-Sensitive Predictive Analytics for IPA-Driven Building Maintenance Management: Material Stock Quantity Modeling.

Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption (2025)
Journal Article
Buchanan, W. J., & Ali, H. (2025). Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption. Cryptography, 9(2), Article 33. https://doi.org/10.3390/cryptography9020033

The requirement for privacy-aware machine learning increases as we continue to use PII (personally identifiable information) within machine training. To overcome the existing privacy issues, we can apply fully homomorphic encryption (FHE) to encrypt... Read More about Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption.

FedBT: Effective and Robust Federated Unlearning via Bad Teacher Distillation for Secure Internet of Things (2025)
Journal Article
Wang, F., Huo, J., Wang, W., Zhang, X., Liu, Y., Tan, Z., & Wang, C. (online). FedBT: Effective and Robust Federated Unlearning via Bad Teacher Distillation for Secure Internet of Things. IEEE Internet of Things Journal, https://doi.org/10.1109/JIOT.2025.3571432

Smart Internet of Things (IoT) devices generate vast, distributed data, and their limited computational and storage capacities complicate data protection. Federated Learning (FL) enables collaborative model training across clients, enhancing performa... Read More about FedBT: Effective and Robust Federated Unlearning via Bad Teacher Distillation for Secure Internet of Things.

Forensic Joint Photographic Experts Group (JPEG) Watermarking for Disk Image Leak Attribution: An Adaptive Discrete Cosine Transform–Discrete Wavelet Transform (DCT-DWT) Approach (2025)
Journal Article
Onyeashie, B. I., Leimich, P., McKeown, S., & Russell, G. (2025). Forensic Joint Photographic Experts Group (JPEG) Watermarking for Disk Image Leak Attribution: An Adaptive Discrete Cosine Transform–Discrete Wavelet Transform (DCT-DWT) Approach. Electronics, 14(9), Article 1800. https://doi.org/10.3390/electronics14091800

This paper presents a novel forensic watermarking method for digital evidence distribution in non-cloud environments. The approach addresses the critical need for the secure sharing of Joint Photographic Experts Group (JPEG) images in forensic invest... Read More about Forensic Joint Photographic Experts Group (JPEG) Watermarking for Disk Image Leak Attribution: An Adaptive Discrete Cosine Transform–Discrete Wavelet Transform (DCT-DWT) Approach.

Exploring DTrace as an Incident Response Tool for Unix Systems (2025)
Presentation / Conference Contribution
Duin, J., Mckeown, S., & Abubakar, M. (2024, June). Exploring DTrace as an Incident Response Tool for Unix Systems. Presented at Cyber Science 2024, Edinburgh, Scotland

Critical National Infrastructure (CNI) is often the target of sophisticated and sustained cyber attacks perpetrated by advanced threat actors with considerable resources. These attacks can lead to interruptions in core services such as energy and wat... Read More about Exploring DTrace as an Incident Response Tool for Unix Systems.

LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts (2025)
Journal Article
Kumar, G., Saha, R., Conti, M., & Buchanan, W. J. (2025). LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts. IEEE Transactions on Services Computing, 18(3), 1529-1542. https://doi.org/10.1109/tsc.2025.3562323

Smart contracts are integral to decentralized systems like blockchains and enable the automation of processes through programmable conditions. However, their immutability, once deployed, poses challenges when addressing errors or bugs. Existing solut... Read More about LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts.

Post-Quantum Migration of the Tor Application (2025)
Journal Article
Berger, D., Lemoudden, M., & Buchanan, W. J. (2025). Post-Quantum Migration of the Tor Application. Journal of Cybersecurity and Privacy, 5(2), Article 13. https://doi.org/10.3390/jcp5020013

The efficiency of Shor's and Grover's algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one's privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decr... Read More about Post-Quantum Migration of the Tor Application.

Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques (2025)
Journal Article
Konstantinou, A., Kasimatis, D., Buchanan, W. J., Ullah Jan, S., Ahmad, J., Politis, I., & Pitropakis, N. (2025). Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques. Machine Learning and Knowledge Extraction, 7(2), Article 31. https://doi.org/10.3390/make7020031

This paper explores the potential use of Large Language Models (LLMs), such as ChatGPT, Google Gemini, and Microsoft Copilot, in threat hunting, specifically focusing on Living off the Land (LotL) techniques. LotL methods allow threat actors to blend... Read More about Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques.

Beyond Hamming Distance: Exploring Spatial Encoding in Perceptual Hashes (2025)
Presentation / Conference Contribution
McKeown, S. (2025, April). Beyond Hamming Distance: Exploring Spatial Encoding in Perceptual Hashes. Presented at DFRWS EU 2025, Brno, Czech Republic

Forensic analysts are often tasked with analysing large volumes of data in modern investigations, and frequently make use of hashing technologies to identify previously encountered images. Perceptual hashes, which seek to model the semantic (visual)... Read More about Beyond Hamming Distance: Exploring Spatial Encoding in Perceptual Hashes.

Wireless Rechargeable Sensor Networks: Energy Provisioning Technologies, Charging Scheduling Schemes, and Challenges (2025)
Journal Article
Abdel Aziz, S., Wang, X., Hawbani, A., Qureshi, . B., Alsamhi, S. H., Alabsi, A., Zhao, L., Al-Dubai, A., & Ismail, . A. (online). Wireless Rechargeable Sensor Networks: Energy Provisioning Technologies, Charging Scheduling Schemes, and Challenges. IEEE Transactions on Sustainable Computing, https://doi.org/10.1109/TSUSC.2025.3549414

Recently, a plethora of promising green energy provisioning technologies has been discussed in the orientation of prolonging the lifetime of energy-limited devices (e.g., sensor nodes). Wireless rechargeable sensor networks (WRSNs) have emerged among... Read More about Wireless Rechargeable Sensor Networks: Energy Provisioning Technologies, Charging Scheduling Schemes, and Challenges.

Multiagent Deep-Reinforcement-Learning-Based Cooperative Perception and Computation in VEC (2025)
Journal Article
Zhao, L., Li, L., Tan, Z., Hawbani, A., He, Q., & Liu, Z. (2025). Multiagent Deep-Reinforcement-Learning-Based Cooperative Perception and Computation in VEC. IEEE Internet of Things Journal, 12(12), 21350-21363. https://doi.org/10.1109/jiot.2025.3546915

Connected and autonomous vehicles (CAVs) are an important paradigm of intelligent transportation systems. Cooperative perception (CP) and vehicular edge computing (VEC) enhance CAVs’ perception capacity of the region of interest (RoI) while alleviati... Read More about Multiagent Deep-Reinforcement-Learning-Based Cooperative Perception and Computation in VEC.

Dynamic Caching Dependency-Aware Task Offloading in Mobile EdgeComputing (2025)
Journal Article
Zhao, L., Zhao, Z., Hawbani, A., Liu, Z., Tan, Z., & Yu, K. (2025). Dynamic Caching Dependency-Aware Task Offloading in Mobile EdgeComputing. IEEE Transactions on Computers, 74(5), 1510-1523. https://doi.org/10.1109/tc.2025.3533091

Mobile Edge Computing (MEC) is a distributed computing paradigm that provides computing capabilities at the periphery of mobile cellular networks. This architecture empowers Mobile Users (MUs) to offload computation-intensive applications to large-sc... Read More about Dynamic Caching Dependency-Aware Task Offloading in Mobile EdgeComputing.

IoT Authentication Protocols: Challenges, and Comparative Analysis (2025)
Journal Article
Alsheavi, A., Hawbani, A., Othman, W., Wang, X., Qaid, G. R. S., Zhao, L., Al-Dubai, A., Liu, Z., Ismail, A., Haveri, R. H., Alsamhi, S. H., & Al-Qaness, M. A. A. (2025). IoT Authentication Protocols: Challenges, and Comparative Analysis. ACM computing surveys, 57(5), Article 116. https://doi.org/10.1145/3703444

In the ever-evolving information technology landscape, the Internet of Things (IoT) is a groundbreaking concept that bridges the physical and digital worlds. It is the backbone of an increasingly sophisticated interactive environment, yet it is a sub... Read More about IoT Authentication Protocols: Challenges, and Comparative Analysis.