Skip to main content

Research Repository

Advanced Search

Outputs (414)

Machine independent algorithm for concurrent finite-element problems (1996)
Presentation / Conference Contribution
Buchanan, W. J., & Gupta, N. K. (1996). Machine independent algorithm for concurrent finite-element problems. In 3rd International IEEE Conference on Computation in Electromagnetics, 1996 (17-20). https://doi.org/10.1049/cp%3A19960150

The finite-element method, initially developed for mechanical and civil engineering applications, is now applied to electromagnetics. This paper describes how parallel processing applies to finite-element simulations. The methods discussed are the pa... Read More about Machine independent algorithm for concurrent finite-element problems.

Prediction of electric fields in and around PCBs — 3D finite-difference time-domain approach with parallel processing (1995)
Journal Article
Buchanan, W. J., & Gupta, N. K. (1995). Prediction of electric fields in and around PCBs — 3D finite-difference time-domain approach with parallel processing. Advances in engineering software, 23(2), 111-114. https://doi.org/10.1016/0965-9978%2895%2900068-8

The authors have taken the 3D FDTD approach to simulate the propagation of electrical signals within and around printed circuit boards (PCBs). This relates to the work currently being carried out into the propagation of very high speed digital pulses... Read More about Prediction of electric fields in and around PCBs — 3D finite-difference time-domain approach with parallel processing.

Application of 3D finite-difference time-domain (FDTD) method to predict radiation from a PCB with high speed pulse propagation. (1994)
Presentation / Conference Contribution
Buchanan, W. J., Gupta, N. K., & Arnold, J. M. (1994, September). Application of 3D finite-difference time-domain (FDTD) method to predict radiation from a PCB with high speed pulse propagation

The authors have applied the 3D FDTD technique to simulate the propagation of electrical signals within printed circuit boards (PCBs). This relates to the work currently being carried out into the propagation of very high speed digital pulses in PCBs... Read More about Application of 3D finite-difference time-domain (FDTD) method to predict radiation from a PCB with high speed pulse propagation..

Lightweight threads for portable software (1993)
Presentation / Conference Contribution
Russell, G. (1993). Lightweight threads for portable software. In Proceedings of the UKUUG/SUKUG

No abstract available.

Simulation of radiation from a microstrip antenna using three-dimensional finite-difference time-domain (FDTD) method. (1993)
Presentation / Conference Contribution
Buchanan, W. J., Gupta, N. K., & Arnold, J. M. (1993). Simulation of radiation from a microstrip antenna using three-dimensional finite-difference time-domain (FDTD) method.

The authors have used the FDTD method to model and predict the radiation patterns from a microstrip antenna. One problem in modelling microstrip antennas is that these structures are highly resonant. The authors have described techniques to reduce th... Read More about Simulation of radiation from a microstrip antenna using three-dimensional finite-difference time-domain (FDTD) method..

Simulation of three-dimensional finite-difference time-domain method on limited memory systems. (1991)
Presentation / Conference Contribution
Buchanan, W. J., & Gupta, N. K. (1991). Simulation of three-dimensional finite-difference time-domain method on limited memory systems.

The authors discuss techniques in the modelling of electromagnetic fields using finite difference time domain (FDTD) methods applied to 80×86-based PCs or limited memory computers. Electrical modelling of structures is currently carried out mainly in... Read More about Simulation of three-dimensional finite-difference time-domain method on limited memory systems..

Who would you trust to identify you in accessing your health record?
Presentation / Conference Contribution
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. Who would you trust to identify you in accessing your health record?

Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper outlines a joint project between Edinburgh Napier University and miiCard [10]... Read More about Who would you trust to identify you in accessing your health record?.

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure
Presentation / Conference Contribution
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October). Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21), Online

Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from tw... Read More about Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.

Numerical Encoding to Tame SQL Injection Attacks
Presentation / Conference Contribution
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017, May). Numerical Encoding to Tame SQL Injection Attacks. Presented at 3RD IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), Lisbon, Portugal

Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases. Intruders becoming smarter in obfuscating web requests to evade detection... Read More about Numerical Encoding to Tame SQL Injection Attacks.

The implications of the COVID-19 pandemic for cybercrime policing in Scotland: A rapid review of the evidence and future considerations
Preprint / Working Paper
Collier, B., Horgan, S., Jones, R., & Shepherd, L. (2020). The implications of the COVID-19 pandemic for cybercrime policing in Scotland: A rapid review of the evidence and future considerations. Edinburgh

This report is written with a Scottish audience in mind, but our conclusions are potentially relevant to changing police practices around the world. COVID-19 and the government response to it have given rise to a small number of novel ‘targeted’ cybe... Read More about The implications of the COVID-19 pandemic for cybercrime policing in Scotland: A rapid review of the evidence and future considerations.

A Blockchain-based two Factor Honeytoken Authentication System
Presentation / Conference Contribution
Papaspirou, V., Maglaras, L., Kantzavelou, I., Moradpoor, N., & Katsikas, S. (2023, September). A Blockchain-based two Factor Honeytoken Authentication System . Poster presented at 28th European Symposium on Research in Computer Security (ESORICS), The Hague

This paper extends and advances our recently introduced two-factor Honeytoken authentication method by incorporating blockchain technology. This novel approach strengthens the authentication method, preventing various attacks, including tampering att... Read More about A Blockchain-based two Factor Honeytoken Authentication System.

BOAZ, Yet Another Layered Evasion Tool: Evasion Tool Evaluations and AV Testing
Presentation / Conference Contribution
Macfarlane, R., & Xuan Meng, T. (2024, August). BOAZ, Yet Another Layered Evasion Tool: Evasion Tool Evaluations and AV Testing. Presented at blackhat USA 2024, Las Vegas, US

In the rapidly evolving landscape of cybersecurity, there has been an increasing deployment of evasion techniques in organizational vulnerability assessments and found post-discovery of security incidents, owing to the more sophisticated defense mech... Read More about BOAZ, Yet Another Layered Evasion Tool: Evasion Tool Evaluations and AV Testing.