Skip to main content

Research Repository

Advanced Search

Outputs (307)

Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing. (1996)
Thesis
Buchanan, W. J. Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4022

The 3D Finite-Difference Time-Domain (FDTD) method simulates structures in the time-domain using a direct form of Maxwell’s curl equations. This method has the advantage over other simulation methods in that it does not use empirical approximations.... Read More about Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing..

C for Electronic Engineering with Applied Software Engineering. (1995)
Book
Buchanan, W. J. (1995). C for Electronic Engineering with Applied Software Engineering. Prentice Hall

The objective of this text is to provide a practical introduction to the C programming language through the usage of electrical/electronic examples. All the examples in the text are related to the specific discipline of electronics, and this approach... Read More about C for Electronic Engineering with Applied Software Engineering..

Microwaves in the laboratory. (1988)
Presentation / Conference Contribution
Buchanan, W. J. (1988). Microwaves in the laboratory.

The place for increasing interest and enhancing learning in the area of Microwave/ EM Wave propagation is in the laboratory.

Who would you trust to identify you in accessing your health record?
Presentation / Conference Contribution
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. Who would you trust to identify you in accessing your health record?

Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper outlines a joint project between Edinburgh Napier University and miiCard [10]... Read More about Who would you trust to identify you in accessing your health record?.

Numerical Encoding to Tame SQL Injection Attacks
Presentation / Conference Contribution
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017, May). Numerical Encoding to Tame SQL Injection Attacks. Presented at 3RD IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), Lisbon, Portugal

Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases. Intruders becoming smarter in obfuscating web requests to evade detection... Read More about Numerical Encoding to Tame SQL Injection Attacks.

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure
Presentation / Conference Contribution
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October). Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21), Online

Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from tw... Read More about Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.