Skip to main content

Research Repository

Advanced Search

Network Firewall Dynamic Performance Evaluation and Formalisation (2009)
Thesis
Saliou, L. Network Firewall Dynamic Performance Evaluation and Formalisation. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/2599

Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to computer network security, but equally an organisation must be able to det... Read More about Network Firewall Dynamic Performance Evaluation and Formalisation.

Validation of 1-N OT algorithms in privacy-preserving investigations. (2008)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Saliou, L. (2008, June). Validation of 1-N OT algorithms in privacy-preserving investigations. Presented at 7th European Conference on Information Warfare and Security

Most organisations relay on digital information systems (ISs) in day-to-day operations, and often sensitive data about employees and customers are stored in such systems. This, effectively, makes ISs enhanced surveillance measures, which can reach fu... Read More about Validation of 1-N OT algorithms in privacy-preserving investigations..

Evaluation of digital identity using Windows CardSpace (2008)
Thesis
Fernandez Sepulveda, A. Evaluation of digital identity using Windows CardSpace. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4032

The Internet was initially created for academic purposes, and due to its success, it has been extended to commercial environments such as e-commerce, banking, and email. As a result, Internet crime has also increased. This can take many forms, such a... Read More about Evaluation of digital identity using Windows CardSpace.

You are where you have been. (2008)
Presentation / Conference Contribution
Clarke, R. A., & Wigan, M. (2008, July). You are where you have been. Presented at Seminar on 'Location Privacy'

Location is a critical aspect of both privacy and surveillance. A detailed record of locations allows all sorts of other information to be linked together, adding to information about the subject and his or her associates in the same way that a uniq... Read More about You are where you have been..

Scenario Analysis using Out-of-line Firewall Evaluation Framework. (2007)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007, July). Scenario Analysis using Out-of-line Firewall Evaluation Framework. Presented at 6th European Conference on Information Warfare, and Security, Shrivenham, UK

Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These attacks typically aim at disabling computer network infrastructure, and, sin... Read More about Scenario Analysis using Out-of-line Firewall Evaluation Framework..

A framework to detect novel computer viruses via system calls. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006, December). A framework to detect novel computer viruses via system calls. Presented at 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting

This paper describes a framework for detecting self-propagating email viruses based on deterministic system calls derived from associated email client’s dynamic link libraries (DLLs). Our research approach is based on the principle that a key objecti... Read More about A framework to detect novel computer viruses via system calls..

Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. (2006)
Presentation / Conference Contribution
Graves, J., Buchanan, W. J., Saliou, L., & Old, L. J. (2006, June). Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. Presented at 5th European Conference on Information Warfare and Security (ECIW)

Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers and Intrusion Detection Systems (IDSs) can yield important information, whi... Read More about Performance analysis of network based forensic systems for in-line and out-of-line detection and logging..

Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. (2006)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2006, June). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. Presented at 5th European Conference on Information Warfare and Security

Security in computer networks is typically passive, static, and reactive. This is typically due to most networking devices being rule-based, and when updates are necessary, they are normally done manually. Ultimately, the social and hierarchical stru... Read More about Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations..

Agent-based forensic investigations with an integrated framework. (2005)
Presentation / Conference Contribution
Buchanan, W. J., Graves, J., Saliou, L., Sebea, A. L., & Migas, N. (2005, July). Agent-based forensic investigations with an integrated framework. Presented at 4th European Conference of Information Warfare and Security

Forensics investigations can be flawed for many reasons, such as that they can lack any real evidence of an incident. Also, it can be the case that the legal rights of an individual has been breached, or that the steps taken in the investigation cann... Read More about Agent-based forensic investigations with an integrated framework..

Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification (2005)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2005, July). Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. Presented at 4th European Conference on Information Warfare and Security

This paper presents a novel framework for network security, and provides a complete solution to integrated security policies, which meets the objectives of an organisation, and also an automated verification process. The framework uses a security com... Read More about Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification.

Analysis and detection of cruising computer viruses. (2004)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006, August). Analysis and detection of cruising computer viruses. Presented at 3rd International Conference on Electronic Warfare and Security (EIWC)

Viral propagation is an important phenomenon of computer viruses. This paper focuses on viral movement and proposes the feasibility of a computer virus which is able to target a specific host, known as cruising. A novel component, based on target pro... Read More about Analysis and detection of cruising computer viruses..

Covert channel analysis and detection using reverse proxy servers. (2004)
Presentation / Conference Contribution
Buchanan, W. J., & Llamas, D. (2004, June). Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC)

Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls, and most other forms of network intrusion detection systems. In fact, mos... Read More about Covert channel analysis and detection using reverse proxy servers..

An agent-based Bayesian method for network intrusion detection. (2003)
Thesis
Pikoulas, J. An agent-based Bayesian method for network intrusion detection. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4057

Security is one of the major issues in any network and on the Internet. It encapsulates many different areas, such as protecting individual users against intruders, protecting corporate systems against damage, and protecting data from intrusion. It i... Read More about An agent-based Bayesian method for network intrusion detection..

Personal data space in organisations: managing personal knowledge and identity. (2002)
Book Chapter
Wigan, M. (2002). Personal data space in organisations: managing personal knowledge and identity. In L. Holmes, D. M. Hosking, & M. Grieco (Eds.), Organising in the Information Age: Distributed Technology, Distributed Leadership, Distributed Identity, Distributed Discourse (45-56). Ashgate Publishing

Identity and information ownership are increasingly confused. One of the key aspects of this area of dispute is the personal data space within which people perceive that they operate. This concept allows many of the attitudes and behaviours in organi... Read More about Personal data space in organisations: managing personal knowledge and identity..

An intelligent agent security intrusion system (2002)
Presentation / Conference Contribution
Pikoulas, J., Buchanan, W., Mannion, M., & Triantafyllopoulos, K. (2002, April). An intelligent agent security intrusion system. Presented at Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, Lund, Sweden

Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing network, thus they must be protected at different levels of the OSI mo... Read More about An intelligent agent security intrusion system.

An agent based Bayesian forecasting model for enhanced network security. (2001)
Presentation / Conference Contribution
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001, April). An agent based Bayesian forecasting model for enhanced network security. Presented at ECBS 2001

Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and validation. They also tend to be centralized in their approach which makes... Read More about An agent based Bayesian forecasting model for enhanced network security..

Speed improvements for the RSA encryption method (2000)
Thesis
Wang, H.-C. Speed improvements for the RSA encryption method. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4065

This thesis presents methods that can be used to improve the operation of the RSA encryption method. It shows the principles of encryption, and then expands this to give the operation of public-key methods, which includes the number value theorems ap... Read More about Speed improvements for the RSA encryption method.