Skip to main content

Research Repository

Advanced Search

Outputs (412)

Using Amazon Alexa APIs as a Source of Digital Evidence (2020)
Presentation / Conference Contribution
Krueger, C., & Mckeown, S. (2020). Using Amazon Alexa APIs as a Source of Digital Evidence. . https://doi.org/10.1109/CyberSecurity49315.2020.9138849

With the release of Amazon Alexa and the first Amazon Echo device, the company revolutionised the smart home. It allowed their users to communicate with, and control, their smart home ecosystem purely using voice commands. However, this also means th... Read More about Using Amazon Alexa APIs as a Source of Digital Evidence.

GCHQ Cyber Zone at Cheltenham Science Festival (Curator) (2019)
Exhibition / Performance
Kerr, G. GCHQ Cyber Zone at Cheltenham Science Festival (Curator). [https://issuu.com/cheltenhamfestivals/docs/science_festival_2019_brochure]. 4 June 2019 - 9 June 2019. (Unpublished)

Step into a fascinating digital world…come into the GCHQ Cyber Zone and see what it’s like to be a code cracker, ethical hacker and cyber security expert. Escape to cyber space using our VR headsets and try your hand at coding, solving puzzles and g... Read More about GCHQ Cyber Zone at Cheltenham Science Festival (Curator).

Fast Probabilistic Consensus with Weighted Votes (2020)
Presentation / Conference Contribution
Müller, S., Penzkofer, A., Ku´smierz, B., Camargo, D., & Buchanan, W. J. (2020, November). Fast Probabilistic Consensus with Weighted Votes. Presented at FTC 2020 - Future Technologies Conference 2020, Vancouver, Canada

The fast probabilistic consensus (FPC) is a voting consensus protocol that is robust and efficient in Byzantine infrastructure. We propose an adaption of the FPC to a setting where the voting power is proportional to the nodes reputations. We model t... Read More about Fast Probabilistic Consensus with Weighted Votes.

A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect (2020)
Journal Article
Kim, T., Kumar, G., Saha, R., Rai, M. K., Buchanan, W. J., Thomas, R., & Alazab, M. (2020). A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect. IEEE Access, 8, 96455-96467. https://doi.org/10.1109/access.2020.2995481

Blockchain is a technology used with the series of users in peer-to-peer transactions to utilize the usability properties of the immutable data records. The distributed nature of this technology has given the wide acceptance to its range of applicati... Read More about A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect.

A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos (2020)
Journal Article
Masood, F., Boulila, W., Ahmad, J., Arshad, A., Sankar, S., Rubaiee, S., & Buchanan, W. J. (2020). A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos. Remote Sensing, 12(11), Article 1893. https://doi.org/10.3390/rs12111893

Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can contain sensitive information that requires secure processing. We proposed an... Read More about A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos.

Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting (2020)
Journal Article
Abramson, W., van Deursen, N. E., & Buchanan, W. J. (2020). Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting. Blockchain in Healthcare Today, 3, https://doi.org/10.30953/bhty.v3.140

A substantial administrative burden is placed on healthcare professionals as they manage and progress through their careers. Identity verification, pre-employment screening and appraisals: the bureaucracy associated with each of these processes takes... Read More about Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting.

BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond (2020)
Journal Article
Xu, H., Zhang, L., Onireti, O., Fang, Y., Buchanan, W. J., & Imran, M. A. (2021). BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond. IEEE Internet of Things, 8(5), 3915-3929. https://doi.org/10.1109/jiot.2020.3025953

The outbreak of COVID-19 pandemic has exposed an urgent need for effective contact tracing solutions through mobile phone applications to prevent the infection from spreading further. However, due to the nature of contact tracing, public concern on p... Read More about BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond.

Towards Continuous User Authentication Using Personalised Touch-Based Behaviour (2020)
Presentation / Conference Contribution
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (2020, August). Towards Continuous User Authentication Using Personalised Touch-Based Behaviour. Presented at CyberSciTech 2020, Calgary, Canada

In this paper, we present an empirical evaluation of 30 features used in touch-based continuous authentication. It is essential to identify the most significant features for each user, as behaviour is different amongst humans. Thus, a fixed feature s... Read More about Towards Continuous User Authentication Using Personalised Touch-Based Behaviour.

Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT (2022)
Journal Article
Wang, F., Yang, S., Wang, C., Li, Q., Babaagba, K., & Tan, Z. (2022). Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT. International Journal of Intelligent Systems, 37(10), 7058-7078. https://doi.org/10.1002/int.22871

Internet of Things (IoT) is fast growing. Non-PC devices under the umbrella of IoT have been increasingly applied in various fields and will soon account for a significant share of total Internet traffic. However, the security and privacy of IoT and... Read More about Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT.

Privacy-Preserving Passive DNS (2020)
Journal Article
Papadopoulos, P., Pitropakis, N., Buchanan, W. J., Lo, O., & Katsikas, S. (2020). Privacy-Preserving Passive DNS. Computers, 9(3), Article 64. https://doi.org/10.3390/computers9030064

The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and trust has exposed the global... Read More about Privacy-Preserving Passive DNS.

Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust (2020)
Preprint / Working Paper
Buchanan, B., Imran, M., Pagliari, C., Pell, J., & Rimpiläinen, S. (2020). Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust. Glasgow

On December 31st, 2019, the World Health Organisation received a report from the Chinese government detailing a cluster of cases of ‘pneumonia of unknown origin’, later identified as novel coronavirus. The virus, now referred to as COVID-19, quickly... Read More about Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust.

A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric (2020)
Journal Article
Stamatellis, C., Papadopoulos, P., Pitropakis, N., Katsikas, S., & Buchanan, W. J. (2020). A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. Sensors, 20(22), Article 6587. https://doi.org/10.3390/s20226587

Electronic health record (EHR) management systems require the adoption of effective technologies when health information is being exchanged. Current management approaches often face risks that may expose medical record storage solutions to common sec... Read More about A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.

The reality of 'cyber security awareness': findings and policy implications for Scotland (2021)
Report
Horgan, S. (2021). The reality of 'cyber security awareness': findings and policy implications for Scotland. Scottish Centre for Crime and Justice Research, the Scottish Institute for Policing Research, and the Scottish Government

This briefing paper represents a summary of doctoral research that explores how different groups make sense of and respond to cybercrime in their everyday lives. The research found that people from different groups, places, and times think about cybe... Read More about The reality of 'cyber security awareness': findings and policy implications for Scotland.

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism (2020)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020, December). PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. Presented at ICVISP 2020: The 2020 4th International Conference on Vision, Image and Signal Processing, Bangkok

The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms o... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism.

A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions (2021)
Journal Article
Saha, R., Geetha, G., Kumar, G., Buchanan, W. J., & Kim, T. (2021). A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions. Applied Sciences, 11(17), Article 8073. https://doi.org/10.3390/app11178073

Cryptographic algorithms and functions should possess some of the important functional requirements such as: non-linearity, resiliency, propagation and immunity. Several previous studies were executed to analyze these characteristics of the cryptogra... Read More about A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions.

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT (2021)
Journal Article
Papadopoulos, P., Thornewill Von Essen, O., Pitropakis, N., Chrysoulas, C., Mylonas, A., & Buchanan, W. J. (2021). Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. Journal of Cybersecurity and Privacy, 1(2), 252-273. https://doi.org/10.3390/jcp1020014

As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an afterthought. Traditional defe... Read More about Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT.

PyDentity: A playground for education and experimentation with the hyperledger verifiable information exchange platform (2021)
Journal Article
Abramson, W., Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (2021). PyDentity: A playground for education and experimentation with the hyperledger verifiable information exchange platform. Software Impacts, 9, Article 100101. https://doi.org/10.1016/j.simpa.2021.100101

PyDentity lowers the entry barrier for parties interested in experimenting with the Hyperledger’s verifiable information exchange platform. It enables educators, developers and researchers to configure and initialise a set of actors easily as associa... Read More about PyDentity: A playground for education and experimentation with the hyperledger verifiable information exchange platform.

Developing Visualisations to Enhance an Insider Threat Product: A Case Study (2021)
Presentation / Conference Contribution
Graham, M., Kukla, R., Mandrychenko, O., Hart, D., & Kennedy, J. (2021, October). Developing Visualisations to Enhance an Insider Threat Product: A Case Study. Presented at 2021 IEEE Symposium on Visualization for Cyber Security (VizSec), New Orleans, USA

This paper describes the process of developing data visualisations to enhance a commercial software platform for combating insider threat, whose existing UI, while perfectly functional, was limited in its ability to allow analysts to easily spot the... Read More about Developing Visualisations to Enhance an Insider Threat Product: A Case Study.

Blockchain for edge-enabled smart cities applications (2021)
Journal Article
Jan, M. A., Yeh, K., Tan, Z., & Wu, Y. (2021). Blockchain for edge-enabled smart cities applications. Journal of Information Security and Applications, 61, 102937. https://doi.org/10.1016/j.jisa.2021.102937

The Internet of Things (IoT)-enabled devices are increasing at an exponential rate and share massive data generated in smart cities around the globe. The time-critical and delay-sensitive nature of this data means that cloud service providers are una... Read More about Blockchain for edge-enabled smart cities applications.

IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities (2020)
Journal Article
Li, S., Choo, K. R., Tan, Z., He, X., Hu, J., & Qin, T. (2020). IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities. IEEE Access, 8, 145033-145036. https://doi.org/10.1109/access.2020.3014416

Industrial IoT (IIoT) interconnects critical devices and sensors in critical infrastructure sectors with existing Internet of Things (IoT) devices and applications. Generally, IIoT deployment allows organizations and users to gain invaluable insights... Read More about IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities.