Skip to main content

Research Repository

Advanced Search

Outputs (408)

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems (2010)
Presentation / Conference Contribution
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010, July). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. Presented at European Conference on Information Warfare and Security

There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat such threats, multiple lines of defence are applied to a network including... Read More about Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems.

A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments (2010)
Thesis
Pallis, G. (2010). A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4005

For more than a century the classic circuit-switched telephony in the form of PSTN (Public Service Telephone Network) has dominated the world of phone communications (Varshney et al., 2002). The alternative solution of VoIP (Voice over Internet Proto... Read More about A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments.

Framework for network IDS evaluation (2009)
Thesis
Lo, O. (2009). Framework for network IDS evaluation. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3981

There are a multitude of threats now faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data stealing and denial of service. As a first line of defence, firewalls can be used to prevent threats... Read More about Framework for network IDS evaluation.

Network Firewall Dynamic Performance Evaluation and Formalisation (2009)
Thesis
Saliou, L. Network Firewall Dynamic Performance Evaluation and Formalisation. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/2599

Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to computer network security, but equally an organisation must be able to det... Read More about Network Firewall Dynamic Performance Evaluation and Formalisation.

Protecting mobile agents from external replay attacks (2009)
Journal Article
Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009). Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018

This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of... Read More about Protecting mobile agents from external replay attacks.

Radio frequency identification (RFID) in pervasive healthcare (2009)
Journal Article
Fekri, A. H., Thuemmler, C., Buchanan, W., Fekri, H., & Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management, 10(1/2), 119. https://doi.org/10.1504/ijhtm.2009.023731

Active and passive RFID (Radio Frequency Identification) technology are available and licensed for the use in hospitals, and can be used to establish highly reliable pervasive environments within healthcare facilities. They should not be understood a... Read More about Radio frequency identification (RFID) in pervasive healthcare.

Distributed healthcare framework using patient-centric role-based security modelling and workflow (2008)
Thesis
Symes, M. (2008). Distributed healthcare framework using patient-centric role-based security modelling and workflow. (Dissertation). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4008

Healthcare professionals are spending less time with patients and more time on administrative duties (Royal College of Nursing, 2008). This is due to a high bureaucratic demand (Brindley, 2007) on the caring process, patient population and longevity... Read More about Distributed healthcare framework using patient-centric role-based security modelling and workflow.

System and method for management of confidential data (2018)
Patent
Buchanan, B., Lo, O., Macfarlane, R., Penrose, P., & Ramsay, B. (2018). System and method for management of confidential data. GB2561176A

This application is for a method of data management to identify confidential digital content on a database by first receiving a management request 302 from a system 304 to carry out data management operations. These include the identification of data... Read More about System and method for management of confidential data.

Method for identification of digital content (2018)
Patent
Buchanan, B., Lo, O., Penrose, P., Ramsay, B., & Macfarlane, R. (2018). Method for identification of digital content. World Intellectual Property Organization

Many areas oi investigation require searching through data that may be oi interest. One example oi data that may be involved in an investigation is copyrighted material that may be suspected of having been obtained or reproduced illegally by a third... Read More about Method for identification of digital content.

MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks (2008)
Thesis
Migas, N. (2008). MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4000

Recent advances in technology provided the ground for highly dynamic, mobile, infrastructure-less networks, namely, ad-hoc networks. Despite their enormous benefits, the full potential cannot be reached unless certain issues are resolved. These mainl... Read More about MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks.

Ad-hoc routing metrics and applied weighting for QoS support (2008)
Presentation / Conference Contribution
Migas, N., & Buchanan, W. J. (2008). Ad-hoc routing metrics and applied weighting for QoS support. In 22nd IEEE International Parallel & Distributed Processing Symposium (1-8). https://doi.org/10.1109/IPDPS.2008.4536496

In the vast majority of ad-hoc routing protocols, the hop-counting mechanisms for identifying the optimal route are dominant. However, this approach oversimplifies such a complex decision by ignoring the fact that participating devices may have consi... Read More about Ad-hoc routing metrics and applied weighting for QoS support.

Scenario Analysis using Out-of-line Firewall Evaluation Framework. (2007)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall Evaluation Framework.

Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These attacks typically aim at disabling computer network infrastructure, and, sin... Read More about Scenario Analysis using Out-of-line Firewall Evaluation Framework..

Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology. (2007)
Journal Article
Thuemmler, C., Buchanan, W. J., & Kumar, V. (2007). Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology. International Journal of Healthcare Technology and Management, 8, 571-583. https://doi.org/10.1504/IJHTM.2007.013524

This paper outlines a large-scale audit for the enhancement of quality of care and staff and patient safety using passive RFID (Radio Frequency ID) wrist bands, which link to a patient's database, in order to reduce errors in patient care. It has bee... Read More about Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology..

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data (2006)
Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. https://doi.org/10.1016/j.cose.2006.04.001

Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these systems have evolved with the technology and have become more sophisticated. D... Read More about NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data.

STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation (2024)
Journal Article
Fang, M., Yu, L., Xie, H., Tan, Q., Tan, Z., Hussain, A., Wang, Z., Li, J., & Tian, Z. (online). STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation. IEEE Transactions on Computational Social Systems, https://doi.org/10.1109/tcss.2024.3356549

The impressive development of facial manipulation techniques has raised severe public concerns. Identity-aware methods, especially suitable for protecting celebrities, are seen as one of promising face forgery detection approaches with additional ref... Read More about STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation.

Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing (2005)
Presentation / Conference Contribution
Migas, N., & Buchanan, W. J. (2005, April). Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing. Presented at 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'05), Greenbelt, MD, USA

Ad-hoc wireless networks, which use ad-hoc routing methods may prove a good solution in certain applications, especially where networks have to be constructed where there is no possibly of creating a network backbone, and in emergency situations. The... Read More about Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing.

Majority Voting Ransomware Detection System (2023)
Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2023). Majority Voting Ransomware Detection System. Journal of Information Security, 14(4), 264-293. https://doi.org/10.4236/jis.2023.144016

Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic la... Read More about Majority Voting Ransomware Detection System.

Enhanced Methods of Coursework Provision in Computer Networks. (2005)
Presentation / Conference Contribution
Buchanan, W. J., & Saliou, L. (2005). Enhanced Methods of Coursework Provision in Computer Networks. In ITRE 2004. 2nd International Conference Information Technology: Research and Education (111-115). https://doi.org/10.1109/ITRE.2004.1393657

Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from students for increased amounts of hands-on, practical work. This paper pres... Read More about Enhanced Methods of Coursework Provision in Computer Networks..