Skip to main content

Research Repository

Advanced Search

Outputs (408)

A novel privacy preserving method for the location tracking of mobile devices (2011)
Journal Article
Buchanan, W. J., & Kwecka, Z. (2011). A novel privacy preserving method for the location tracking of mobile devices. Wireless Networks,

Two of the major changes within computing, at the present time, are the move towards serviceoriented architectures and the increasing usage of mobile devices to access these services. Along with this, as these devices are often moving, extra context... Read More about A novel privacy preserving method for the location tracking of mobile devices.

Fingerprinting JPEGs With Optimised Huffman Tables (2018)
Journal Article
McKeown, S., Russell, G., & Leimich, P. (2018). Fingerprinting JPEGs With Optimised Huffman Tables. Journal of Digital Forensics, Security and Law, 13(2), Article 7. https://doi.org/10.15394/jdfsl.2018.1451

A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given medium, and comparing indiv... Read More about Fingerprinting JPEGs With Optimised Huffman Tables.

A methodology for the security evaluation within third-party Android Marketplaces (2017)
Journal Article
Buchanan, W. J., Chiale, S., & Macfarlane, R. (2017). A methodology for the security evaluation within third-party Android Marketplaces. Digital Investigation, 23, 88-98. https://doi.org/10.1016/j.diin.2017.10.002

This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo localize the malware distribution over three main regions: China, Europe; and Russia. It provides a comprehensive review of existing academic literature about... Read More about A methodology for the security evaluation within third-party Android Marketplaces.

A framework for data security in cloud using collaborative intrusion detection scheme (2017)
Presentation / Conference Contribution
Nagar, U., Nanda, P., He, X., & Tan, Z. (. (2017, October). A framework for data security in cloud using collaborative intrusion detection scheme. Presented at Proceedings of the 10th International Conference on Security of Information and Networks - SIN '17, Jaipur, India

Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go feature which is based on measured usage and can be compared to other utility se... Read More about A framework for data security in cloud using collaborative intrusion detection scheme.

Distance Measurement Methods for Improved Insider Threat Detection (2018)
Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018). Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368

Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account change... Read More about Distance Measurement Methods for Improved Insider Threat Detection.

Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study (2018)
Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018). Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002

Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods of assessing critical systems security risk exposure. The question is; do ex... Read More about Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study.

The implications of the COVID-19 pandemic for cybercrime policing in Scotland: A rapid review of the evidence and future considerations
Preprint / Working Paper
Collier, B., Horgan, S., Jones, R., & Shepherd, L. (2020). The implications of the COVID-19 pandemic for cybercrime policing in Scotland: A rapid review of the evidence and future considerations. Edinburgh

This report is written with a Scottish audience in mind, but our conclusions are potentially relevant to changing police practices around the world. COVID-19 and the government response to it have given rise to a small number of novel ‘targeted’ cybe... Read More about The implications of the COVID-19 pandemic for cybercrime policing in Scotland: A rapid review of the evidence and future considerations.

Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases (2018)
Presentation / Conference Contribution
Clavie, B., & Moradpoor, N. (2018, May). Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases. Poster presented at 10th ACM Conference on Web Science, Amsterdam

This article explores a perceived bias between two British reddit communities dedicated to discussing British politics.We analyse the popular sources favoured by each community and study semantic indicators that would be indicative of a bias. Althoug... Read More about Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases.

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system (2018)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018, June). A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. Presented at Cyber Security 2018: 2018 International Conference on Cyber Security and Protection of Digital Services, Glasgow, United Kingdom

Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development over time have improved their components including operating system platforms... Read More about A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system.

Applications of Blockchain Within Healthcare. (2018)
Journal Article
Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2018). Applications of Blockchain Within Healthcare. Blockchain in Healthcare Today,

There are several areas of healthcare and well-being that could be enhanced using blockchain technologies. These include device tracking, clinical trials, pharmaceutical tracing, and health insurance. Within device tracking, hospitals can trace their... Read More about Applications of Blockchain Within Healthcare..

Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain (2018)
Journal Article
Buchanan, B., & Naqvi, N. (2018). Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain. The Journal of the British Blockchain Association, 1(1), 1-4

A blockchain enabled 'Digital Single Economy " can act as a catalyst for growth and could provide a platform where borderless innovative practices will thrive and create a true collaborative global economy, with shared goals and objectives for the be... Read More about Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain.

Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns (2018)
Presentation / Conference Contribution
Mcneill, M., Lawson, A., Raeside, R., & Peisl, T. (2018, July). Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns. Presented at 32nd International BCS Human Computer Interaction Conference (HCI 2018), Belfast

Creating a good crowdfunding campaign is difficult. By understanding why people contribute to crowdfunding campaigns we can make campaigns better and raise more money. Crowdfunding websites allow entrepreneurs to make a pitch, which is watched by pot... Read More about Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns.

Cloud Computing & Cyber Security (2018)
Presentation / Conference Contribution
Manoussos, B. (2018, April). Cloud Computing & Cyber Security. Presented at The Law Society of Scotland - Law & Technology Roadshow, Glasgow

Presentation on Cloud Computing and Cyber Security in relation to Law Firms in Scotland.

A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment (2018)
Journal Article
Babar, M., Khan, F., Iqbal, W., Yahya, A., Arif, F., Tan, Z., & Chuma, J. (2018). A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment. IEEE Access, 6, 43088-43099

Smart societies have an increasing demand for quality-oriented services and infrastructure in an Industrial Internet of Things (IIoT) paradigm. Smart urbanization faces numerous challenges. Among them, secured energy Demand Side Management (DSM) is o... Read More about A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment.

Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System (2018)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2018, August). Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. Presented at The 4th International Conference on Technology Trends, Babahoyo, Ecuador

Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, such as programmable logic controllers (PLC), networking devices, and actua... Read More about Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System.

Privacy Parameter Variation using RAPPOR on a Malware Dataset (2018)
Presentation / Conference Contribution
Aaby, P., Mata De Acuña, J. J., Macfarlane, R., & Buchanan, W. J. (2018, August). Privacy Parameter Variation using RAPPOR on a Malware Dataset. Presented at 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA

Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of analysing sensitive user data. The RAPPOR (Randomized Aggregatable Privacy... Read More about Privacy Parameter Variation using RAPPOR on a Malware Dataset.

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device (2018)
Presentation / Conference Contribution
Lo, O., Buchanan, W. J., & Carson, D. (2018, August). Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. Presented at ACM Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany

Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consumption or processing power is limited. Thus, there has been an increasing a... Read More about Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device.

An Enhanced Cyber Attack Attribution Framework (2018)
Presentation / Conference Contribution
Pitropakis, N., Panaousis, E., Giannakoulias, A., Kalpakis, G., Rodriguez, R. D., & Sarigiannidis, P. (2018, September). An Enhanced Cyber Attack Attribution Framework. Presented at International Conference on Trust and Privacy in Digital Business TrustBus 2018, Regensburg, Germany

Advanced Persistent Threats (APTs) are considered as the threats that are the most challenging to detect and defend against. As APTs use sophisticated attack methods, cyber situational awareness and especially cyber attack attribution are necessary f... Read More about An Enhanced Cyber Attack Attribution Framework.

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse (2017)
Presentation / Conference Contribution
Kintis, P., Miramirkhani, N., Lever, C., Chen, Y., Romero-Gómez, R., Pitropakis, N., Nikiforakis, N., & Antonakakis, M. (2017, October). Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. Presented at 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, Texas, USA

Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific type of domain squatting called "combosquatting," in which attackers register... Read More about Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse.

If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments (2014)
Journal Article
Pitropakis, N., Anastasopoulou, D., Pikrakis, A., & Lambrinoudakis, C. (2014). If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments. Journal of cloud computing: advances, systems and applications, 3(1), https://doi.org/10.1186/s13677-014-0020-6

Computational systems are gradually moving towards Cloud Computing Infrastructures, using the several advantages they have to offer and especially the economic advantages in the era of an economic crisis. In addition to this revolution, several secur... Read More about If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments.