Skip to main content

Research Repository

Advanced Search

Intrusion Detection Using Geometrical Structure (2009)
Presentation / Conference Contribution
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. (2009, December). Intrusion Detection Using Geometrical Structure. Presented at 2009 Fourth International Conference on Frontier of Computer Science and Technology, Shanghai, China

We propose a statistical model, namely Geometrical Structure Anomaly Detection (GSAD) to detect intrusion using the packet payload in the network. GSAD takes into account the correlations among the packet payload features arranged in a geometrical st... Read More about Intrusion Detection Using Geometrical Structure.

An integrated firewall policy validation tool (2009)
Thesis
Macfarlane, R. An integrated firewall policy validation tool. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/3971

Security policies are increasingly being implemented by organisations. Policies are mapped to device configurations to enforce the policies. This is typically performed manually by network administrators. The development and management of these enfor... Read More about An integrated firewall policy validation tool.

Application and analysis of private matching schemes based on commutative cryptosystems. (2009)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2009, July). Application and analysis of private matching schemes based on commutative cryptosystems. Presented at 9th European Conference on Information Warfare and Security

Privacy issues are becoming a key focus with software systems. Surveys show that the invasion of privacy is among the things peo-ple fear the most from the coming years. These fears seem to be justified, in the light of recent events involving the UK... Read More about Application and analysis of private matching schemes based on commutative cryptosystems..

Analysis and evaluation of network intrusion detection methods to uncover data theft (2009)
Thesis
Corsini, J. Analysis and evaluation of network intrusion detection methods to uncover data theft. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4031

Nowadays, the majority of corporations mainly use signature-based intrusion detection. This trend is partly due to the fact that signature detection is a well-known technology, as opposed to anomaly detection which is one of the hot topics in network... Read More about Analysis and evaluation of network intrusion detection methods to uncover data theft.

Enhanced event time-lining for digital forensic systems (2009)
Thesis
Symon, C. Enhanced event time-lining for digital forensic systems. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4028

In a digital forensics investigation, log files can be used as a form of evidence by reconstructing timelines of the computer system events recorded in log files. Log files can come from a variety of sources, each of which may make use of proprietary... Read More about Enhanced event time-lining for digital forensic systems.

Integrated many-to-many multicast addressing and access control method (2009)
Presentation / Conference Contribution
Romdhani, I., & Yassin Al-Dubai, A. (2009, July). Integrated many-to-many multicast addressing and access control method. Presented at 2009 IEEE Symposium on Computers and Communications, Sousse, Tunisia

IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on the source side. However, current IP multicast deployment figure is still fa... Read More about Integrated many-to-many multicast addressing and access control method.

Culture & biometrics: regional differences in the perception of biometric authentication technologies (2009)
Journal Article
Riley, C. W., Buckner, K., Johnson, G., & Benyon, D. (2009). Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & society, 24(3), 295-306. https://doi.org/10.1007/s00146-009-0218-1

Previous research has identified user concerns about biometric authentication technology, but most of this research has been conducted in European contexts. There is a lack of research that has investigated attitudes towards biometric technology in o... Read More about Culture & biometrics: regional differences in the perception of biometric authentication technologies.

Real-Time Data Analytics in Support of Network Resource Management Protocols (2009)
Presentation / Conference Contribution
Moradpoor‫, N., Parr, G., Mcclean, S., Scotney, B., & Owusu, G. (2009, March). Real-Time Data Analytics in Support of Network Resource Management Protocols. Presented at 10th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK

Communications Networks Resource Management (RM) functions such as dynamic and static resource usage monitoring, real time resource reservation as well as advance resource reservation have been widely studied in the past few years. Research has been... Read More about Real-Time Data Analytics in Support of Network Resource Management Protocols.

Network Firewall Dynamic Performance Evaluation and Formalisation (2009)
Thesis
Saliou, L. Network Firewall Dynamic Performance Evaluation and Formalisation. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/2599

Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to computer network security, but equally an organisation must be able to det... Read More about Network Firewall Dynamic Performance Evaluation and Formalisation.