Skip to main content

Research Repository

Advanced Search

A Two-Tier System for Web Attack Detection Using Linear Discriminant Method (2010)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., Jia, W., & Yeh, W.-C. (2010, December). A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. Presented at 12th International Conference, ICICS 2010, Barcelona, Spain

The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis... Read More about A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.

Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs) (2010)
Presentation / Conference Contribution
Moradpoor, N., Parr, G., Mcclean, S., Scotney, B., Sivalingam, K., & Madras, I. (2010, December). Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs). Paper presented at OPNETWORK 2010

Ethernet Passive Optical Network (EPON) has been considered for access networks for quite some time to provide high-speed and high-capacity services. As a novel type of network, EPON presents many challenges so one main aim of this paper is to provid... Read More about Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs).

Privacy-preserving data acquisition protocol. (2010)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010, July). Privacy-preserving data acquisition protocol

Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need to reveal to the data controller precise details of their suspect’s identity... Read More about Privacy-preserving data acquisition protocol..

RC2 Encryption and Decryption in Microsoft .NET. (2010)
Preprint / Working Paper
Buchanan, W. J. RC2 Encryption and Decryption in Microsoft .NET

This paper outlines the usage of RC2 in Microsoft .NET. It provides a basic overview of the RC2 method, along with a review of other popular encryption methods and some sample code which can be used to implement RC2.

AES Encryption and Decryption in Microsoft .NET. (2010)
Report
Buchanan, W. J. (2010). AES Encryption and Decryption in Microsoft .NET

This paper outlines the usage of AES in Microsoft .NET. It provides a basic overview of the AES method, along with a review of other popular encryption methods and some sample code which can be used to implement AES.

3DES Encryption and Decryption in Microsoft .NET. (2010)
Report
Buchanan, W. J. (2010). 3DES Encryption and Decryption in Microsoft .NET

This paper outlines the usage of 3DES in Microsoft .NET. It provides a basic overview of the 3-DES method, along with a review of other popular encryption methods and some sample code which can be used to implement 3DES.

Novel security assessment for personal health data. (2010)
Presentation / Conference Contribution
Hazelhoff Roelfzema, N. (2010, November). Novel security assessment for personal health data. Paper presented at Perada workshop on Privacy, Security & Trust

An e-Health cloud. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Thuemmler, C., Fan, L., Lo, O., & Khedim, A. S. (2010, August). An e-Health cloud. Presented at Cloud Computing for the Public Sector

A significant weakness within cloud-based systems is often their security. This presentation shows how a health care cloud has been created which preserves the rights of the patient to control access to their captured data, and then how this is used... Read More about An e-Health cloud..

GLBM: A new QoS aware multicast scheme for wireless Mesh network (2010)
Journal Article
Zhao, L., Al-Dubai, A., & Min, G. (2010). GLBM: A new QoS aware multicast scheme for wireless Mesh network. Journal of Systems and Software, 83, 1318-1326. https://doi.org/10.1016/j.jss.2010.01.044

Wireless mesh networks (WMNs) have been attracting significant attention due to their promising technology. The WMN technology is becoming a major avenue for the fourth generation of wireless mobility. Communication in large-scale wireless networks c... Read More about GLBM: A new QoS aware multicast scheme for wireless Mesh network.

Novel information sharing syntax for data sharing between police and community partners, using role-based security. (2010)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., Lawson, A., Thuemmler, C., Fan, L., Scott, R., Lavery, A., & Mooney, C. (2010, July). Novel information sharing syntax for data sharing between police and community partners, using role-based security. Presented at 9th European Conference on Information Warfare and Security, University of Macedonia, Thessaloniki, Greece

The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing syntax for data sharing between police and community partners, using role-based security..

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems (2010)
Presentation / Conference Contribution
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010, July). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. Presented at European Conference on Information Warfare and Security

There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat such threats, multiple lines of defence are applied to a network including... Read More about Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems.

Intrusion detection using GSAD model for HTTP traffic on web services (2010)
Presentation / Conference Contribution
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. P. (2010, June). Intrusion detection using GSAD model for HTTP traffic on web services. Presented at Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ - IWCMC '10

Intrusion detection systems are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. Hypertext Transport Protocol (HTTP) is used for new applications without much interference. In this paper, w... Read More about Intrusion detection using GSAD model for HTTP traffic on web services.

Experimental host-and network-based analyser and detector for Botnets (2010)
Thesis
Jacob, B. Experimental host-and network-based analyser and detector for Botnets. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4026

Botnets are networks of malware-infected machines that are controlled by an adversary are the cause of a large number of problems on the internet [1]. They are increasing faster than any other type of malware and have created a huge army of hosts ove... Read More about Experimental host-and network-based analyser and detector for Botnets.

Novel information sharing architecture between the Police and their community partners. (2010)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., & Lawson, A. (2010, February). Novel information sharing architecture between the Police and their community partners. Presented at Scottish Networking Event 2010

The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing architecture between the Police and their community partners..