Skip to main content

Research Repository

Advanced Search

Outputs (682)

Identifying areas of vulnerability. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, April). Identifying areas of vulnerability. Presented at Scot-secure 2015

Using penetration testing to highlight areas of weakness with practical steps for improving the security of your organisation.

Promoting passion in an innovation and enterprise culture. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, April). Promoting passion in an innovation and enterprise culture. Presented at Exploring 21st Century Organisational Culture: inclusivity, agility and innovation

This presentation will show how organisations can encourage a culture of innovation and enterprise, including showcasing examples of good practice and how management styles can be created to encourage innovation. This will include the usage of intern... Read More about Promoting passion in an innovation and enterprise culture..

New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). (2015)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2015, April). New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). Paper presented at Cybercrime and Cyberterrorism - the EU Research roadmap

DFET creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the development of a virtual (cloud-based) cybercrime training environment to i... Read More about New forensic investigation and training methods in a virtual environment (cloud) (D-FET project)..

Creating efficiency by managing innovation. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, March). Creating efficiency by managing innovation. Paper presented at Efficiency Through Technology: Public Sector 2.0

Creating efficiency by managing innovation • Driving innovation within the public sector • Creating an organisational structure that rewards efficiency • Identify the issues stifling innovation public organisations through audience live voting.

Architecting the Internet of Things: State of the Art (2015)
Book Chapter
Abdmeziem, M. R., Romdhani, I., & Tandjaoui, D. (2016). Architecting the Internet of Things: State of the Art. In A. Koubaa, & E. Shakshuki (Eds.), Robots and Sensor Clouds; Studies in Systems, Decision and Control (55-75). Springer. https://doi.org/10.1007/978-3-319-22168-7_3

Internet of things (IoT) constitutes one of the most important technological development in the last decade. It has the potential to deeply affect our life style. However, its success relies greatly on a well-defined architecture that will provide sc... Read More about Architecting the Internet of Things: State of the Art.

Lenovo’s security debacle reveals blurred boundary between adware and malware (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Lenovo’s security debacle reveals blurred boundary between adware and malware

A widely disliked habit of PC vendors is their bundling of all manner of unwanted software into brand new computers – demo software, games, or part-functional trials. Faced with shrinking margins vendors have treated this as an alternative income str... Read More about Lenovo’s security debacle reveals blurred boundary between adware and malware.

It's all hackable. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, February). It's all hackable. Paper presented at SBRC Insider Threat Conference 2015

New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks (2015)
Journal Article
Bani Khalaf, M., Al-Dubai, A. Y., & Min, G. (2015). New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks. Journal of Computer and System Sciences, 81(1), 97-109. https://doi.org/10.1016/j.jcss.2014.06.014

Most existing route discovery schemes in MANETs are based on probabilistic models by which MANETs usually deploy broadcast mechanisms to discover routes between nodes. This is implemented by flooding the network with routing requests (RREQ) packets w... Read More about New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks.

If Obama is talking about securing the net, it should be on everyone else’s lips too. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). If Obama is talking about securing the net, it should be on everyone else’s lips too

We have spent years promoting the need for change in our approach to internet infrastructure, forcing politicians to recognise it as a serious issue. So it’s great to see Barack Obama tackling the issue in his State of the Union address. You may agre... Read More about If Obama is talking about securing the net, it should be on everyone else’s lips too..

If you seek to ‘switch off’ encryption, you may as well switch off the whole internet. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). If you seek to ‘switch off’ encryption, you may as well switch off the whole internet

Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This might make a grand statement but it is impossible to implement and extremely... Read More about If you seek to ‘switch off’ encryption, you may as well switch off the whole internet..

A decentralized group key management protocol for mobile Internet of things (DBGK) (2015)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015, August). A decentralized group key management protocol for mobile Internet of things (DBGK). Paper presented at The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)

A new adaptive probabilistic broadcast protocol for vehicular networks (2015)
Presentation / Conference Contribution
Al-Dubai, A. Y., Khalaf, M. B., Gharibi, W., & Ouenniche, J. (2015, May). A new adaptive probabilistic broadcast protocol for vehicular networks. Presented at 2015 IEEE 81st Vehicular Technology Conference: VTC Spring 2015

In VANETs, there are many applications that use broadcast communication as a fundamental operational tool, in disseminating information of interest to other road users under the umbrella of both safety and entertainment applications. Recently, the pr... Read More about A new adaptive probabilistic broadcast protocol for vehicular networks.

QoS-aware Inter-domain multicast for scalable wireless community networks (2014)
Journal Article
Al-Dubai, A. Y., Zhao, L., Zomaya, A. Y., & Min, G. (2014). QoS-aware Inter-domain multicast for scalable wireless community networks. IEEE Transactions on Parallel and Distributed Systems, 26(11), 3136-3148. https://doi.org/10.1109/TPDS.2014.2365190

Wireless Community Networks (WCNs) have emerged as a cost-effective ubiquitous broadband connectivity solution, offering a wide range of services in a given geographical area. QoS-aware multicast over WCNs is among the most challenging issues and has... Read More about QoS-aware Inter-domain multicast for scalable wireless community networks.

Stable Infrastructure-based routing for Intelligent transportation systems (2015)
Presentation / Conference Contribution
Al-Kubati, G., Al-Dubai, A., Mackenzie, L., & Pezaros, D. P. (2015, June). Stable Infrastructure-based routing for Intelligent transportation systems. Presented at 2015 IEEE International Conference on Communications (ICC), London, UK

Intelligent Transportation Systems (ITSs) have been instrumental in reshaping transportation towards safer roads, seamless logistics, and digital business-oriented services under the umbrella of smart city platforms. Undoubtedly, ITS applications wil... Read More about Stable Infrastructure-based routing for Intelligent transportation systems.

Performance evaluation of RPL objective functions (2015)
Presentation / Conference Contribution
Qasem, M., Altwassi, H., Yassein, M. B., & Al-Dubai, A. (2015, October). Performance evaluation of RPL objective functions. Presented at International Workshop on Internet of Things and Smart Spaces (IoT-Smart-2015): Applications, Challenges and Future Trends in conjunction with the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), Liverpool, UK

IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard for Wireless Sensors Networks. RPL uses two different ‘objective functions’ (OFs), namely Minimum Rank with Hysteresis Objective Function (MRHOF); and Objective Function Zero... Read More about Performance evaluation of RPL objective functions.

Advanced persistent threat and Insiders. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, January). Advanced persistent threat and Insiders. Paper presented at Advanced Persistent Threat

With an increase in the range and mobility of devices which connect to the network, there are now so many opportunities for intruders to compromise systems. Leading with the recent Sony hack, Bill explores the pitfalls of their defences and how they... Read More about Advanced persistent threat and Insiders..

An Analysis of N5 and Higher Computing. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, January). An Analysis of N5 and Higher Computing. Paper presented at Computing at School

This presentation outlined an analysis of N5 and Higher Computing in Scotland.

Cyber security challenges for cloud based services. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, June). Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh

Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud