Skip to main content

Research Repository

Advanced Search

Outputs (408)

Analysis of an agent-based metric-driven method for ad-hoc, on-demand routing (2005)
Journal Article
Buchanan, W. J., Migas, N., Sinclair, G., & McArtney, K. (2006). Analysis of an agent-based metric-driven method for ad-hoc, on-demand routing. Ad hoc networks, 4(2), 147-167. https://doi.org/10.1016/j.adhoc.2004.04.009

Ad-hoc networks could bring many benefits over traditional, fixed networks. Unfortunately, they have many difficulties, including the selection of the optimal route, the availability of routes as mobile nodes move around the physical space, and probl... Read More about Analysis of an agent-based metric-driven method for ad-hoc, on-demand routing.

Hamming Distributions of Popular Perceptual Hashing Techniques (2023)
Journal Article
McKeown, S., & Buchanan, W. J. (2023). Hamming Distributions of Popular Perceptual Hashing Techniques. Forensic Science International: Digital Investigation, 44(Supplement), Article 301509. https://doi.org/10.1016/j.fsidi.2023.301509

Content-based file matching has been widely deployed for decades, largely for the detection of sources of copyright infringement, extremist materials, and abusive sexual media. Perceptual hashes, such as Microsoft's PhotoDNA, are one automated mechan... Read More about Hamming Distributions of Popular Perceptual Hashing Techniques.

Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation (2023)
Journal Article
Wang, F., Xie, M., Tan, Z., Li, Q., & Wang, C. (2024). Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation. IEEE Transactions on Emerging Topics in Computing, 12(1), 307 - 315. https://doi.org/10.1109/TETC.2023.3244174

In the era of big data, deep learning techniques provide intelligent solutions for various problems in real-life scenarios. However, deep neural networks depend on large-scale datasets including sensitive data, which causes the potential risk of priv... Read More about Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation.

Uzytkowanie Komputerow. (2004)
Book
Buchanan, W. J. (2004). Uzytkowanie Komputerow. Wkt (Poland)

Przyst?pny i praktyczny poradnik dotycz?cy u?ytkowania komputerów, obejmuj?cy szeroki zakres zagadnie? zwi?zanych z przetwarzaniem informacji i transmisj? danych oraz ich kompresj?, przechowywaniem, szyfrowaniem i bezpiecze?stwem, zawieraj?cy tak?e o... Read More about Uzytkowanie Komputerow..

Covert channel analysis and detection using reverse proxy servers. (2004)
Presentation / Conference Contribution
Buchanan, W. J., & Llamas, D. (2004, June). Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC)

Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls, and most other forms of network intrusion detection systems. In fact, mos... Read More about Covert channel analysis and detection using reverse proxy servers..

Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks. (2003)
Presentation / Conference Contribution
Migas, N., Buchanan, W. J., & McArtney, K. (2003, April). Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks

Wireless networks and the usage of mobile devices are becoming popular in recent days, especially in creating ad-hoc networks. There is thus scope for developing mobile systems, where devices take an active part of creating a network infrastructure,... Read More about Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks..

A novel flow-vector generation approach for malicious traffic detection (2022)
Journal Article
Hou, J., Liu, F., Lu, H., Tan, Z., Zhuang, X., & Tian, Z. (2022). A novel flow-vector generation approach for malicious traffic detection. Journal of Parallel and Distributed Computing, 169, 72-86. https://doi.org/10.1016/j.jpdc.2022.06.004

Malicious traffic detection is one of the most important parts of cyber security. The approaches of using the flow as the detection object are recognized as effective. Benefiting from the development of deep learning techniques, raw traffic can be di... Read More about A novel flow-vector generation approach for malicious traffic detection.

An agent-based Bayesian method for network intrusion detection. (2003)
Thesis
Pikoulas, J. (2003). An agent-based Bayesian method for network intrusion detection. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4057

Security is one of the major issues in any network and on the Internet. It encapsulates many different areas, such as protecting individual users against intruders, protecting corporate systems against damage, and protecting data from intrusion. It i... Read More about An agent-based Bayesian method for network intrusion detection..

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers (2022)
Presentation / Conference Contribution
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2021, December). Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. Presented at IEEE SINCONF: 14th International Conference on Security of Information and Networks, Edinburgh

Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the... Read More about Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.

GLASS: Towards Secure and Decentralized eGovernance Services using IPFS (2022)
Presentation / Conference Contribution
Chrysoulas, C., Thomson, A., Pitropakis, N., Papadopoulos, P., Lo, O., Buchanan, W. J., Domalis, G., Karacapilidis, N., Tsakalidis, D., & Tsolis, D. (2021, October). GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. Presented at 7th Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2021). In Conjunction With ESORICS 2021, Darmstadt, Germany

The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation, broadened the attack surface and made them a popular target for cyber attacks.... Read More about GLASS: Towards Secure and Decentralized eGovernance Services using IPFS.

An intelligent agent security intrusion system (2002)
Presentation / Conference Contribution
Pikoulas, J., Buchanan, W., Mannion, M., & Triantafyllopoulos, K. (2002, April). An intelligent agent security intrusion system. Presented at Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, Lund, Sweden

Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing network, thus they must be protected at different levels of the OSI mo... Read More about An intelligent agent security intrusion system.

NapierOne: A modern mixed file data set alternative to Govdocs1 (2022)
Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2022). NapierOne: A modern mixed file data set alternative to Govdocs1. Forensic Science International: Digital Investigation, 40, Article 301330. https://doi.org/10.1016/j.fsidi.2021.301330

It was found when reviewing the ransomware detection research literature that almost no proposal provided enough detail on how the test data set was created, or sufficient description of its actual content, to allow it to be recreated by other resear... Read More about NapierOne: A modern mixed file data set alternative to Govdocs1.

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure (2021)
Presentation / Conference Contribution
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October). Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21), Online

Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from tw... Read More about Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.

A Blockchain Framework in Post-Quantum Decentralization (2021)
Journal Article
Saha, R., Kumar, G., Devgun, T., Buchanan, W., Thomas, R., Alazab, M., Kim, T., & Rodrigues, J. (2023). A Blockchain Framework in Post-Quantum Decentralization. IEEE Transactions on Services Computing, 16(1), https://doi.org/10.1109/tsc.2021.3116896

The decentralization and transparency have provided wide acceptance of blockchain technology in various sectors through numerous applications. The claimed security services by blockchain have been proved using various cryptographic techniques, mainly... Read More about A Blockchain Framework in Post-Quantum Decentralization.

Speed improvements for the RSA encryption method (2000)
Thesis
Wang, H. (2000). Speed improvements for the RSA encryption method. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4065

This thesis presents methods that can be used to improve the operation of the RSA encryption method. It shows the principles of encryption, and then expands this to give the operation of public-key methods, which includes the number value theorems ap... Read More about Speed improvements for the RSA encryption method.

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data (2021)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021, August). A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. Presented at 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), Barcelona, Spain

Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical technology and the Internet of Things. The evidence of this potential has been pr... Read More about A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data.

Distributed systems and networks. (2000)
Book
Buchanan, W. J. (2000). Distributed systems and networks. McGraw-Hill

This book provides the student with comprehensive coverage of both networks and system architecture. It aims to introduce the most widely used networking protocols and distributed systems, covering recent developments in distributed processing and th... Read More about Distributed systems and networks..