Skip to main content

Research Repository

Advanced Search

Cognitive Internet of Everything (CIoE): State of the Art and Approaches (2017)
Book Chapter
Jamnal, G. S., Liu, X., Fan, L., & Ramachandran, M. (2017). Cognitive Internet of Everything (CIoE): State of the Art and Approaches. In R. Mihajlovic, M. Ramachandran, R. Behringer, & P. Kocovic (Eds.), Emerging Trends and Applications of the Internet of Things; Advances in Wireless Technologies and Telecommunication (277-309). IGI Global. https://doi.org/10.4018/978-1-5225-2437-3.ch010

In today's world, we are living in busy metropolitan cities and want our homes to be ambient intelligent enough towards our cognitive requirements for assisted living in smart space environment and an excellent smart home control system should not re... Read More about Cognitive Internet of Everything (CIoE): State of the Art and Approaches.

An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack (2017)
Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017). An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. In 2017 Seventh International Conference on Emerging Security Technologies (EST),. https://doi.org/10.1109/est.2017.8090392

Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted web applications. Structured Query Language (SQL) Injection Attack (SQLIA) r... Read More about An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack.

Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention (2017)
Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017). Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM),. https://doi.org/10.23919/INM.2017.7987433

The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smart devices. Structured Query Language (SQL) Injection Attack (SQLIA) remains... Read More about Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention.

Numerical Encoding to Tame SQL Injection Attacks (2017)
Conference Proceeding
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (in press). Numerical Encoding to Tame SQL Injection Attacks.

Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases. Intruders becoming smarter in obfuscating web requests to evade detection... Read More about Numerical Encoding to Tame SQL Injection Attacks.

Applied web traffic analysis for numerical encoding of SQL Injection attack features (2016)
Conference Proceeding
Uwagbole, S., Buchanan, W., & Fan, L. (2016). Applied web traffic analysis for numerical encoding of SQL Injection attack features. In ECCWS-2016

SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web form’s input and query strings used in web requests with malicious intent... Read More about Applied web traffic analysis for numerical encoding of SQL Injection attack features.

Numerical encoding to tame SQL injection attacks (2016)
Conference Proceeding
Uwagbole, S., Buchanan, W. J., & Fan, L. (2016). Numerical encoding to tame SQL injection attacks. In 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS),. https://doi.org/10.1109/NOMS.2016.7502997

Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases. Intruders becoming smarter in obfuscating web requests to evade detection... Read More about Numerical encoding to tame SQL injection attacks.

Information sharing. (2014)
Patent
Buchanan, W. J., Fan, L., Uthmani, O., & Lawson, A. (2014). Information sharing

http://www.google.com/patents/US20140201804 The present disclosure relates to improved information sharing and in particular to formal representations of information sharing policies between organizations. An organization comprises various agents wit... Read More about Information sharing..

A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation. (2013)
Working Paper
Uthmani, O., Buchanan, W. J., Fan, L., & Lawson, A. A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation

This paper outlines a novel information sharing method using Binary Decision Diagrams (BBDs). It is inspired by the work of Al-Shaer and Hamed, who applied BDDs into the modelling of network firewalls. This is applied into an information sharing poli... Read More about A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation..

Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model. (2013)
Working Paper
Uthmani, O., Buchanan, W. J., Fan, L., & Lawson, A. Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model

This paper defines a structured methodology which is based on the foundational work of Al-Shaer et al. in [1] and that of Hamed and Al-Shaer in [2]. It defines a methodology for the declaration of policy field elements, through to the syntax, ontolog... Read More about Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model..

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. (2013)
Conference Proceeding
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013). Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy (91-101). https://doi.org/10.1007/978-3-642-41205-9_8

We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, organisations and units, into a formal definition, and then implement these as... Read More about Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture..

Interagency data exchange, privacy protection and governance architecture for Information sharing across domains (2013)
Working Paper
Buchanan, W. J., Fan, L., Uthmani, O., & Schafer, B. Interagency data exchange, privacy protection and governance architecture for Information sharing across domains

This paper discusses privacy enhancing technologies in the field of inter-agency data sharing, a key government objective for efficient public service delivery. We analyse the legal and conceptual framework that governs multi-agency cooperation in pa... Read More about Interagency data exchange, privacy protection and governance architecture for Information sharing across domains.

Novel tracking of rogue network packets using danger theory approach (2012)
Journal Article
Uwagbole, S., Buchanan, W. J., & Fan, L. (2012). Novel tracking of rogue network packets using danger theory approach. Proceedings of the ... international conference on information warfare and security, 277-286

Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hacking groups, such as Anonymous and Lulzsec. These groups often aim to disrupt computer networks and gain access to private confidential data. A typica... Read More about Novel tracking of rogue network packets using danger theory approach.

Cloud4Health. (2012)
Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., & Lo, O. (2012, May). Cloud4Health. Paper presented at Symposium on the Future of e-Health

The cloud4health platform focuses on creating a next generation infrastructure which aims to integrate assisted living with primary and secondary health care, in order to reduce patient risks. This presentation outlines how it integrates assisted liv... Read More about Cloud4Health..

Integrating assisted living with primary and secondary health care. (2012)
Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., & Thuemmler, C. (2012, May). Integrating assisted living with primary and secondary health care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing

This presentation outlines the Cloud4Health platform.

Crime risk evaluation within information sharing between the Police and community partners. (2011)
Journal Article
Uthmani, O., Buchanan, W. J., Lawson, A., Scott, R., Schafer, B., & Fan, L. (2011). Crime risk evaluation within information sharing between the Police and community partners. Information and Communications Technology Law, 20, 57-81. https://doi.org/10.1080/13600834.2011.578922

The aim of this paper is to provide profiles for crimes which can be used to model the context for information sharing between the police and community partner organisations. This context can then be integrated with information-sharing syntax used by... Read More about Crime risk evaluation within information sharing between the Police and community partners..

DACAR platform for eHealth services cloud. (2011)
Conference Proceeding
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011). DACAR platform for eHealth services cloud. . https://doi.org/10.1109/CLOUD.2011.31

The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services, but concerns over service integration, large scale deployment, and securit... Read More about DACAR platform for eHealth services cloud..

An Integrated Cloud-based Healthcare Infrastructure. (2011)
Conference Proceeding
Ekonomou, E., Fan, L., Buchanan, W. J., & Thuemmler, C. (2011). An Integrated Cloud-based Healthcare Infrastructure. In 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom) (532-536). https://doi.org/10.1109/CloudCom.2011.80

We present a cloud-based healthcare system that integrates a formal care system (DACAR) with an informal care system (Microsoft HealthVault). The system provides high levels of security and privacy within a cloud environment, enabling sharing of both... Read More about An Integrated Cloud-based Healthcare Infrastructure..

Formal security policy implementations in network firewalls. (2011)
Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012). Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003

Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. Ther... Read More about Formal security policy implementations in network firewalls..

Cloud-based e-Health System. (2011)
Presentation / Conference
Buchanan, W. J., Fan, L., Thuemmler, C., Lo, O., & Ekonomou, E. (2011, September). Cloud-based e-Health System. Paper presented at BCS Health Informatics

This paper presents the future of health care system, which uses the newly developed security infrastructure.

Cloud-based digital forensics evaluation test (D-FET) platform. (2011)
Presentation / Conference
Buchanan, W. J., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., …Ludwiniak, R. (2011, June). Cloud-based digital forensics evaluation test (D-FET) platform. Paper presented at Cyberforensics 2011

This paper outlines the specification of the Cloud-based DFET platform which is used to evaluate the performance of digital forensics tools, which aim to detect the presence of trails of evidence, such as for the presence of illicit images and determ... Read More about Cloud-based digital forensics evaluation test (D-FET) platform..