Skip to main content

Research Repository

Advanced Search

Outputs (414)

Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. (2011)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., & Lawson, A. (2011, August). Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. Paper presented at SCONE-the Scottish Networking Event

This presentation focuses on outlining criminal activity within affiliate marketing related to click-through and ID theft crime, based on real-life crime data. It shows the mechanisms that criminals might use in order to act fraudulently, and present... Read More about Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing..

Risk analysis for criminal context in information sharing policies. (2011)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, August). Risk analysis for criminal context in information sharing policies. Paper presented at SCONE - the Scottish Networking event

This presentation outlines of a novel system which maps the information sharing between two domains. It involves the definition of a formalized information sharing policy, which maps the organisation infrastructure which is exposed for the sharing be... Read More about Risk analysis for criminal context in information sharing policies..

Next generation secure e-health platform. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, June). Next generation secure e-health platform. Paper presented at BCS ISSG seminar "The Insider Threat"

A patient-centric approach to integrating assisted living and formal health care and how the opportunity for insider threats is reduced through the enhanced identity checking system.

Cloud-based digital forensics evaluation test (D-FET) platform. (2011)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., …Ludwiniak, R. (2011, June). Cloud-based digital forensics evaluation test (D-FET) platform. Paper presented at Cyberforensics 2011

This paper outlines the specification of the Cloud-based DFET platform which is used to evaluate the performance of digital forensics tools, which aim to detect the presence of trails of evidence, such as for the presence of illicit images and determ... Read More about Cloud-based digital forensics evaluation test (D-FET) platform..

D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures. (2011)
Presentation / Conference Contribution
Buchanan, W. J., & Macfarlane, R. (2011, June). D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures. Paper presented at Scottish Higher Education Employability Conference: Strengthening Partnerships with Employers

The use of virtualised and cloud-based environments provide an excellent opportunity to enhance learning and to provide students with skills which match exactly to the requirements of industry, along with integrating with professional certification.... Read More about D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures..

Intelligence information sharing between the police and their community partners. (2011)
Presentation / Conference Contribution
Scott, R., Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, June). Intelligence information sharing between the police and their community partners. Paper presented at Symposium on Security and Cybercrime

This presentation will show a newly developed system for information, and will outline the three "R"s involved in information sharing: RISK. Identify and managing risks to ensure a balanced approach to operational management and organisational develo... Read More about Intelligence information sharing between the police and their community partners..

A next generation Cloud-based health care platform. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, May). A next generation Cloud-based health care platform. Paper presented at Innovation in Healthcare

This presentation outlines a novel Cloud-based e-Health Platform which integrates security within every single transaction. It involves a TSB/EPSRC funded project with Edinburgh Napier University, Chelsea and Westminster Hospital, and a number of col... Read More about A next generation Cloud-based health care platform..

Cryptographic privacy-preserving enhancement method for investigative data acquisition (2011)
Thesis
Kwecka, Z. (2011). Cryptographic privacy-preserving enhancement method for investigative data acquisition. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4437

The current processes involved in the acquisition of investigative data from third parties, such as banks, Internet Service Providers (ISPs) and employers, by the public authorities can breach the rights of the individuals under investigation. This i... Read More about Cryptographic privacy-preserving enhancement method for investigative data acquisition.

A comparative review of information security risk assessment methodologies for health care. (2011)
Presentation / Conference Contribution
Hazelhoff Roelfzema, N. (2011, March). A comparative review of information security risk assessment methodologies for health care. Paper presented at IADIS e-Society

Health care organizations face major compliance challenges as they need to secure patient information. An important compliance requirement is the performance of regular risk assessments and the implementation of controls to secure data. In theory, an... Read More about A comparative review of information security risk assessment methodologies for health care..

Making assessment and feedback fun: feedback before and after assessments. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, January). Making assessment and feedback fun: feedback before and after assessments. Paper presented at Edinburgh Napier University Staff Conference

Multiple Choice Questions (MCQs) are often seen as being weak in terms of their coverage, and are criticised for often only assessing knowledge and not encouraging deep learning. This presentation shows that it is possible to scientifically design an... Read More about Making assessment and feedback fun: feedback before and after assessments..

Privacy-preserving data acquisition protocol. (2010)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010, July). Privacy-preserving data acquisition protocol

Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need to reveal to the data controller precise details of their suspect’s identity... Read More about Privacy-preserving data acquisition protocol..

Analysis of malicious affiliate network activity as a test case for an investigatory framework. (2010)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., Old, L. J., Batey, A., & Rahman, A. (2010, July). Analysis of malicious affiliate network activity as a test case for an investigatory framework

Currently there is a great deal of literature surrounding methods that can be used to de-tect click-fraud, but there is very little published work on actual cases of click-through fraud. The aim of this paper is to present the details of a real-life... Read More about Analysis of malicious affiliate network activity as a test case for an investigatory framework..

An evaluation of the power consumption and carbon footprint of a cloud infrastructure (2010)
Thesis
Yampolsky, V. (2010). An evaluation of the power consumption and carbon footprint of a cloud infrastructure. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3973

The Information and Communication Technology (ICT) sector represent two to three percents of the world energy consumption and about the same percentage of GreenHouse Gas(GHG) emission. Moreover the IT-related costs represent fifty per-cents of the el... Read More about An evaluation of the power consumption and carbon footprint of a cloud infrastructure.

3DES Encryption and Decryption in Microsoft .NET. (2010)
Report
Buchanan, W. J. (2010). 3DES Encryption and Decryption in Microsoft .NET

This paper outlines the usage of 3DES in Microsoft .NET. It provides a basic overview of the 3-DES method, along with a review of other popular encryption methods and some sample code which can be used to implement 3DES.

AES Encryption and Decryption in Microsoft .NET. (2010)
Report
Buchanan, W. J. (2010). AES Encryption and Decryption in Microsoft .NET

This paper outlines the usage of AES in Microsoft .NET. It provides a basic overview of the AES method, along with a review of other popular encryption methods and some sample code which can be used to implement AES.

RC2 Encryption and Decryption in Microsoft .NET. (2010)
Preprint / Working Paper
Buchanan, W. J. RC2 Encryption and Decryption in Microsoft .NET

This paper outlines the usage of RC2 in Microsoft .NET. It provides a basic overview of the RC2 method, along with a review of other popular encryption methods and some sample code which can be used to implement RC2.

A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments (2010)
Thesis
Pallis, G. (2010). A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4005

For more than a century the classic circuit-switched telephony in the form of PSTN (Public Service Telephone Network) has dominated the world of phone communications (Varshney et al., 2002). The alternative solution of VoIP (Voice over Internet Proto... Read More about A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments.

A Two-Tier System for Web Attack Detection Using Linear Discriminant Method (2010)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., Jia, W., & Yeh, W. (2010, December). A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. Presented at 12th International Conference, ICICS 2010, Barcelona, Spain

The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis... Read More about A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.