Skip to main content

Research Repository

Advanced Search

Outputs (682)

Implementation and evaluation of a botnet analysis and detection method in a virtual environment (2012)
Thesis
Waheed, S. (2012). Implementation and evaluation of a botnet analysis and detection method in a virtual environment. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5667

Botnets are one of the biggest cyber threats. Botnets based on concepts that used for the development of malware or viruses before origin of the Internet in 1990s. Botnet is a form of malware controlled by a Botmaster using Command and Control (C&C).... Read More about Implementation and evaluation of a botnet analysis and detection method in a virtual environment.

Routing metrics for wireless mesh networks: a survey (2012)
Book Chapter
Zhao, L., & Al-Dubai, A. (2012). Routing metrics for wireless mesh networks: a survey. In Recent Advances in Computer Science and Information Engineering (311-316). (127). Springer. https://doi.org/10.1007/978-3-642-25769-8_45

Wireless Mesh Network (WMN) is a key emerging technology to construct next generation wireless multi-hop network. It combines the advantages of both mobile ad-hoc network (MANET) and traditional fixed network, attracting significant industrial and ac... Read More about Routing metrics for wireless mesh networks: a survey.

Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. (2011)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., & Lawson, A. (2011, August). Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. Paper presented at SCONE-the Scottish Networking Event

This presentation focuses on outlining criminal activity within affiliate marketing related to click-through and ID theft crime, based on real-life crime data. It shows the mechanisms that criminals might use in order to act fraudulently, and present... Read More about Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing..

Cryptographic privacy-preserving enhancement method for investigative data acquisition (2011)
Thesis
Kwecka, Z. (2011). Cryptographic privacy-preserving enhancement method for investigative data acquisition. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4437

The current processes involved in the acquisition of investigative data from third parties, such as banks, Internet Service Providers (ISPs) and employers, by the public authorities can breach the rights of the individuals under investigation. This i... Read More about Cryptographic privacy-preserving enhancement method for investigative data acquisition.

Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection (2012)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2012). Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. . https://doi.org/10.1109/trustcom.2012.284

Cloud computing plays an important role in current converged networks. It brings convenience of accessing services and information to users regardless of location and time. However, there are some critical security issues residing in cloud computing,... Read More about Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection.

Resilient secret sharing cloud based architecture for data vault (2016)
Patent
Lanc, D., Fan, L., MacKinnon, L., & Buchanan, B. (2016). Resilient secret sharing cloud based architecture for data vault

A method of securely storing data including: providing, within a secure data storage system, a plurality of secret sharing methods for selection and identifying a striping policy for storage of the data, in accordance with input preferences. The data... Read More about Resilient secret sharing cloud based architecture for data vault.

Leaf-based Routing Mechanism for Low-Power and Lossy Networks (2018)
Patent
Ghaleb, B., & Al-Dubai, A. (2018). Leaf-based Routing Mechanism for Low-Power and Lossy Networks. 1800668.4. Intellectual Property Office, UK

Unlike existing solutions, our invention provides a “Leaf-Based” mechanism for establishing the Downward routes in Low-Power and Lossy Networks (LLNs) that seeks to provide a novel, scalable and efficient routing solution for LLNs, which are the back... Read More about Leaf-based Routing Mechanism for Low-Power and Lossy Networks.

Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, September). Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security. Paper presented at CFET: Cybercrime Forensics Education & Training

The use of virtualised and cloud-based environments provides an excellent opportunity to enhance learning and to provide students with skills which match exactly to the requirements of industry, along with integrating with professional certification.... Read More about Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and computer security..

Evidence to the Justice Committee at the Scottish Parliament. (2011)
Other
Buchanan, W. J. (2011). Evidence to the Justice Committee at the Scottish Parliament

On 20 September 2011, Bill gave evidence at Offensive Behaviour at Football and Threatening Communications Bill: http://news.bbc.co.uk/democracylive/hi/scotland/newsid_9594000/9594710.stm?t=1376s

Making assessment and feedback fun: feedback before and after assessments. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, January). Making assessment and feedback fun: feedback before and after assessments. Paper presented at Edinburgh Napier University Staff Conference

Multiple Choice Questions (MCQs) are often seen as being weak in terms of their coverage, and are criticised for often only assessing knowledge and not encouraging deep learning. This presentation shows that it is possible to scientifically design an... Read More about Making assessment and feedback fun: feedback before and after assessments..

Next generation secure e-health platform. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, June). Next generation secure e-health platform. Paper presented at BCS ISSG seminar "The Insider Threat"

A patient-centric approach to integrating assisted living and formal health care and how the opportunity for insider threats is reduced through the enhanced identity checking system.

Security and forensic computing: introduction to computer security. (2011)
Digital Artefact
Buchanan, W. J. (2011). Security and forensic computing: introduction to computer security

1 INTRODUCTION 14 1.1 The Industrial and the Information Age 14 1.2 CIA and AAA 15 1.3 Protecting against intruders 16 1.4 Users, systems and data 17 1.5 Security and Forensic Computing 19 1.6 ISO 27002 21 1.7 Risks 22 Annual Loss Expectancy... Read More about Security and forensic computing: introduction to computer security..

Student perception of on-line lectures with a blended learning environment. (2011)
Presentation / Conference Contribution
Buchanan, W. J. (2011, January). Student perception of on-line lectures with a blended learning environment. Paper presented at Edinburgh Napier University Staff Conference

Educational institutions are increasingly moving towards enhancing learning through the use of integrated information technology. Blended, or augmented, learning, aims to support the traditional learning environment – where the instructor blends onli... Read More about Student perception of on-line lectures with a blended learning environment..