Skip to main content

Research Repository

Advanced Search

E-Health: chances and challenges of distributed, service oriented architectures (2012)
Journal Article
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012). E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,

Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remain affordable for governments and individuals. Mobile technology and cloud c... Read More about E-Health: chances and challenges of distributed, service oriented architectures.

Novel tracking of rogue network packets using danger theory approach (2012)
Journal Article
Uwagbole, S., Buchanan, W. J., & Fan, L. (2012). Novel tracking of rogue network packets using danger theory approach. Proceedings of the ... international conference on information warfare and security, 277-286

Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hacking groups, such as Anonymous and Lulzsec. These groups often aim to disrupt computer networks and gain access to private confidential data. A typica... Read More about Novel tracking of rogue network packets using danger theory approach.

A forensic image description language for generating test images. (2012)
Presentation / Conference Contribution
Russell, G., Macfarlane, R., & Ludwiniak, R. (2012, September). A forensic image description language for generating test images

Digital Forensics is a fast developing job market, as well as being topical and interesting, and as such is an area in which University students are keen to develop and study. At Edinburgh Napier University this topic has been taught with flexible an... Read More about A forensic image description language for generating test images..

Implementation and evaluation of a botnet analysis and detection method in a virtual environment (2012)
Thesis
Waheed, S. Implementation and evaluation of a botnet analysis and detection method in a virtual environment. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/5667

Botnets are one of the biggest cyber threats. Botnets based on concepts that used for the development of malware or viruses before origin of the Internet in 1990s. Botnet is a form of malware controlled by a Botmaster using Command and Control (C&C).... Read More about Implementation and evaluation of a botnet analysis and detection method in a virtual environment.

Evolution pattern for service evolution in clouds. (2012)
Presentation / Conference Contribution
Wang, Z., Liu, X., & Chalmers, K. (2012, December). Evolution pattern for service evolution in clouds

The proposed research will focus on
developing a novel approach to solve Software Service
Evolution problems in Computing Clouds. The
approach will support dynamic evolution of the
software service in clouds via a set of discovered
evolution pat... Read More about Evolution pattern for service evolution in clouds..

A privacy preserving application acquisition protocol. (2012)
Presentation / Conference Contribution
Akram, R. N., Markantonakis, K., & Mayes, K. (2012, June). A privacy preserving application acquisition protocol

In the smart card industry, the application acquisition process involves the card issuers and application providers. During this process, the respective card issuer reveals the identity of the smart card user to the individual application providers.... Read More about A privacy preserving application acquisition protocol..

A nonlinear correlation measure for Intrusion Detection (2012)
Presentation / Conference Contribution
Ambusaidi, M., Lu, L. F., He, X., Tan, Z., Jamdagni, A., & Nanda, P. (2012, November). A nonlinear correlation measure for Intrusion Detection. Paper presented at The 7th International Conference on Frontier of Computer Science and Technology (FCST-12)

The popularity of using internet contains some risks of network attacks. It has attracted the attention of many researchers to overcome this problem. One of the effective ways that plays an important role to achieve higher security and protect networ... Read More about A nonlinear correlation measure for Intrusion Detection.

Towards OWL 2 Natively Supported Fuzzy Cloud Ontology (2012)
Presentation / Conference Contribution
Fang, D., Liu, X., Romdhani, I., & Zhao, H. (2012, July). Towards OWL 2 Natively Supported Fuzzy Cloud Ontology. Presented at 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops

Cloud Computing introduces a revolutionary paradigm of computing to Service Oriented Architecture (SOA), by provisioning various types of computational resources and applications as on-demand services. While presenting cloud services semantically usi... Read More about Towards OWL 2 Natively Supported Fuzzy Cloud Ontology.

RePIDS: A multi tier Real-time Payload-based Intrusion Detection System (2012)
Journal Article
Jamdagni, A., Tan, Z., He, X., Nanda, P., & Liu, R. P. (2013). RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. Computer Networks, 57(3), 811-824. https://doi.org/10.1016/j.comnet.2012.10.002

Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of existing systems lack the ability to process data for real-time anomaly detec... Read More about RePIDS: A multi tier Real-time Payload-based Intrusion Detection System.

On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space (2012)
Presentation / Conference Contribution
Bagley, R., Ferguson, R. I., & Leimich, P. (2012, September). On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space. Paper presented at CFET (Cyberforensics in Education and Training )

A technique and supporting tool for the recovery of browsing activity (both currently stored and deleted) from the Firefox web-browser is presented. The approach is based upon applying file-carving techniques (matching regular expressions against raw... Read More about On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space.

Evaluation on multivariate correlation analysis based denial-of-service attack detection system (2012)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., Nanda, P., He, X., & Liu, R. P. (2012, August). Evaluation on multivariate correlation analysis based denial-of-service attack detection system. Presented at Proceedings of the First International Conference on Security of Internet of Things - SecurIT '12, Kollam, India

In this paper, a Denial-of-Service (DoS) attack detection system is explored, where a multivariate correlation analysis technique based on Euclidean distance is applied for network traffic characterization and the principal of anomaly-based detection... Read More about Evaluation on multivariate correlation analysis based denial-of-service attack detection system.

Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection (2012)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2012, June). Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. Presented at 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications

Cloud computing plays an important role in current converged networks. It brings convenience of accessing services and information to users regardless of location and time. However, there are some critical security issues residing in cloud computing,... Read More about Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection.

Training the next generation. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, June). Training the next generation

This presentation outlines how cloud infrastructures could be used to deliver the in-depth skills required for a cyber professional.

Education & training for future threats. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, May). Education & training for future threats. Paper presented at ITEC 2012

This presentation gives an outline of the aspects for virtualised training for security and cybercrime.

Cloud4Health. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., & Lo, O. (2012, May). Cloud4Health. Paper presented at Symposium on the Future of e-Health

The cloud4health platform focuses on creating a next generation infrastructure which aims to integrate assisted living with primary and secondary health care, in order to reduce patient risks. This presentation outlines how it integrates assisted liv... Read More about Cloud4Health..

Integrating assisted living with primary and secondary health care. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., & Thuemmler, C. (2012, May). Integrating assisted living with primary and secondary health care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing

This presentation outlines the Cloud4Health platform.

A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services (2012)
Journal Article
Buchanan, W. J., Kwecka, Z., & Ekonomou, E. (2013). A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services. Mobile Networks and Applications, 18(5), 728-737. https://doi.org/10.1007/s11036-012-0362-6

Two of the major changes within computing, at the present time, are the move towards service-oriented architectures and the increasing usage of mobile devices to access these services. Along with this, as these devices are often moving, extra context... Read More about A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services.

Skills for cyber security. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, February). Skills for cyber security. Paper presented at Cybercrime and Data Protection, Edinburgh

This talk outlines the future for cyberskills.

Patient centric health care: an integrated and secure, cloud-based, e-Health platform. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., & Thuemmler, C. (2012, February). Patient centric health care: an integrated and secure, cloud-based, e-Health platform. Paper presented at BCS Branch Meeting

There are many issues related to health care infrastructure within the UK, including the lack of integration of data between the different parts of the health and social care system, and around an aging population. This presentation outlines a new Cl... Read More about Patient centric health care: an integrated and secure, cloud-based, e-Health platform..