Skip to main content

Research Repository

Advanced Search

Pianola - visualization of multivariate time-series security event data. (2013)
Presentation / Conference Contribution
Thomson, A., Graham, M., & Kennedy, J. (2013, July). Pianola - visualization of multivariate time-series security event data. Presented at 17th International Conference on Information Visualisation

Monitoring log files for network intrusions is unwieldy. To build a mental model of the log, an analyst is required to recognise continuous timelines and attack patterns from a dataset that is essentially limited to an ordered list of events. Informa... Read More about Pianola - visualization of multivariate time-series security event data..

Designing self-aware adaptive systems: from autonomic computing to cognitive immune networks. (2013)
Presentation / Conference Contribution
Capodieci, N., Hart, E., & Cabri, G. (2013, September). Designing self-aware adaptive systems: from autonomic computing to cognitive immune networks. Presented at IEEE Conference on Self-Organising and Self-Adaptative Systems (SASO)

An autonomic system is composed of ensembles of heterogeneous autonomic components in which large sets of components are dynamically added and removed. Nodes within such an ensemble should cooperate to achieve system or human goals, and systems are e... Read More about Designing self-aware adaptive systems: from autonomic computing to cognitive immune networks..

Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., & Clayton, J. (2013, June). Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. Presented at Cyberforensics 2013, Cardiff, UK

There is a problem in the world of digital forensics. The demands on digital forensic investigators and resources will continue to increase as the use of computers and other electronic devices increases, and as the storage capacity of these devices i... Read More about Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter..

Approaches to the classification of high entropy file fragments. (2013)
Journal Article
Penrose, P., Macfarlane, R., & Buchanan, W. J. (2013). Approaches to the classification of high entropy file fragments. Digital Investigation, 10(4), 372-384. https://doi.org/10.1016/j.diin.2013.08.004

In this paper we propose novel approaches to the problem of classifying high entropy file fragments. We achieve 97% correct classification for encrypted fragments and 78% for compressed. Although classification of file fragments is central to the sci... Read More about Approaches to the classification of high entropy file fragments..

Evolution pattern verification for services evolution in clouds with model driven architecture. (2013)
Journal Article
Wang, Z., Chalmers, K., & Liu, X. (2013). Evolution pattern verification for services evolution in clouds with model driven architecture. International Journal for e-Learning Security, 3, 340-349. https://doi.org/10.20533/ijels.2046.4568.2013.0042

In this paper we will provide some discovered evolution patterns and its detailed underlying constitution components. Following the featured orientated model driven product line engineering approach for service evolution in clouds, an analysis on... Read More about Evolution pattern verification for services evolution in clouds with model driven architecture..

Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds (2013)
Presentation / Conference Contribution
Thuemmler, C., Mueller, J., Covaci, S., Magedanz, T., de Panfilis, S., Jell, T., Schneider, A., & Gavras, A. (2013, April). Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds. Presented at 2013 10th International Conference on Information Technology: New Generations, Las Vegas, NV, USA

Health care providers have over years continuously rejected Public Cloud technology for understandable concerns regarding privacy and confidentiality. The pick up rate on cloud computing in health care has been very poor reminding at the typical hype... Read More about Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds.

Cyber risk and opportunities in the Cloud. (2013)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2013, September). Cyber risk and opportunities in the Cloud. Paper presented at Cloud Security Congress 2013

This presentation outlines some of the key risks and opportunities in the Cloud.

An Investigation of Security Trends in Personal Wireless Networks (2013)
Journal Article
Liu, L., Stimpson, T., Antonopoulos, N., Ding, Z., & Zhan, Y. (2014). An Investigation of Security Trends in Personal Wireless Networks. Wireless Personal Communications, 75(3), 1669-1687. https://doi.org/10.1007/s11277-013-1386-3

Wireless networks are an integral part of day-to-day life for many people, with businesses and home users relying on them for connectivity and communication. This paper examines the problems relating to the topic of wireless security and the backgrou... Read More about An Investigation of Security Trends in Personal Wireless Networks.

Improving cloud network security using the Tree-Rule firewall (2013)
Journal Article
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems, 30, 116-126. https://doi.org/10.1016/j.future.2013.06.024

This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The recently available firewalls (i.e., Listed-Rule firewalls) have their limita... Read More about Improving cloud network security using the Tree-Rule firewall.

A Practical Steganographic Approach for Matroska Based High Quality Video Files (2013)
Presentation / Conference Contribution
Pitropakis, N., Lambrinoudakis, C., Geneiatakis, D., & Gritzalis, D. (2013, March). A Practical Steganographic Approach for Matroska Based High Quality Video Files. Presented at 2013 Workshops of 27th International Conference on Advanced Information Networking and Applications (WAINA), Barcelona, Spain

Several steganographic algorithms have been proposed for protecting message secrecy against unauthorized "reads". The most used method for hiding a message relies on embedding the secret message in Least Significant Bit (LSB) on the cover object. Tho... Read More about A Practical Steganographic Approach for Matroska Based High Quality Video Files.

Monitoring information security risks within health care (2013)
Journal Article
van Deursen, N., Buchanan, W. J., & Duff, A. (2013). Monitoring information security risks within health care. Computers and Security, 37, 31-45. https://doi.org/10.1016/j.cose.2013.04.005

This paper presents an overview of possible risks to the security of health care data. These
risks were detected with a novel approach to information security. It is based on the
philosophy that information security risk monitoring should include h... Read More about Monitoring information security risks within health care.

Generation of Network Behaviour Descriptions Using MCA Based on TAM (2013)
Presentation / Conference Contribution
Tan, Z. (2013, March). Generation of Network Behaviour Descriptions Using MCA Based on TAM. Paper presented at Kaspersky Lab's 2013 Annual Student Cyber Security Conference

In this paper, a multivariate correlation analysis technique based on triangle area map is introduced. The technique is applied for network traffic characterization and provides quality network behaviour descriptors for intrusion detectors to use. Th... Read More about Generation of Network Behaviour Descriptions Using MCA Based on TAM.

The challenges of Big Data: future risks, governance and trust. (2013)
Presentation / Conference Contribution
Buchanan, W. J. (2013, March). The challenges of Big Data: future risks, governance and trust. Paper presented at The Future of Cyber Security 2013

The emphasis in computer security is moving from end point security towards data controls, and this is becoming an increasing threat as we move into an era build around Big Data. This presentation thus outlines the change in emphasis of security cont... Read More about The challenges of Big Data: future risks, governance and trust..

e-Health in the Cloud (2013)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2013, January). e-Health in the Cloud. Presented at Future of e-Health

This presentation outlines how risk assessors can be used to create holistic care. A key focus is on the security infrastructure and in new risk assessors such as the frailty index.

Public perceptions in health care security. (2013)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2013, January). Public perceptions in health care security. Paper presented at Health Informatics 2013

Over the past few years many industries have been revolutionized by the application of Information Technology, in fact, we are now moving from an Industrial Age into an Information Age, where almost every part of our lives involves some form of integ... Read More about Public perceptions in health care security..