Skip to main content

Research Repository

Advanced Search

Outputs (682)

Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives (2021)
Thesis
Cruickshank, P. Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives. (Thesis by Publication). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2805712

This work is concerned with the information practices associated with hyperlocal representation. The findings derive from an evaluation of a portfolio of ten previously published papers covering the period 2010-2020. The main contributions are: (a... Read More about Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives.

PC Interfacing, communications and Windows programming. (1999)
Book
Buchanan, W. J. (1999). PC Interfacing, communications and Windows programming. Addison-Wesley Longman Ltd

author's successful Applied PC Interfacing, Graphics and Interrupts this book covers all the different aspects of computer systems from low-level hardware (such as processors and interface devices) to high-level software (such as Win32 programming).... Read More about PC Interfacing, communications and Windows programming..

LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments (2021)
Journal Article
Kim, T., Kumar, G., Saha, R., Buchanan, W. J., Devgun, T., & Thomas, R. (2021). LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments. IEEE Access, 9, 100972-100980. https://doi.org/10.1109/access.2021.3097267

There is an increasing drive to provide improved levels of trust within an Internet-of-Things (IoTs) environments, but the devices and sensors used tend to be limited in their capabilities for dealing with traditional cryptography methods. Resource c... Read More about LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments.

Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets (2021)
Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2021). Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets. Computers and Security, 108, Article 102377. https://doi.org/10.1016/j.cose.2021.102377

The threat from ransomware continues to grow both in the number of affected victims as well as the cost incurred by the people and organisations impacted in a successful attack. In the majority of cases, once a victim has been attacked there remain o... Read More about Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets.

Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System   (2021)
Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Tan, Z. (2021). Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System  . Ad hoc networks, 120, Article 102590. https://doi.org/10.1016/j.adhoc.2021.102590

Industrial Control Systems (ICS) are hardware, network, and software, upon which a facility depends to allow daily operations to function. In most cases society takes the operation of such systems, for example public transport, tap water or electrici... Read More about Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System  .

Mastering Java. (1998)
Book
Buchanan, W. J. (1998). Mastering Java. Macmillan Press

This book provides an introduction to the Java programming language and also covers other related areas such as HTML, JavaScript, CGIscript and VRML. Most of the Java programs relate to practical examples, including: * Menus and forms * Graphics... Read More about Mastering Java..

Mastering the Internet. (1997)
Book
Buchanan, W. J. (1997). Mastering the Internet. Macmillan Press

This work offers an up-to-date account of all the component parts of the Internet and the World Wide Web, from architecture to networking. The book discusses key specifications relating to electronic mail, such as MiMe encoding and SMTP, and shows ho... Read More about Mastering the Internet..

Software development for engineers. (1997)
Book
Buchanan, W. J. (1997). Software development for engineers. Newton, MA, USA: Butterworth-Heinemann

Specialisation in software has become a thing of the past. With the move towards graphical user interface programming, engineers must have a sound knowledge of several programming languages and for the first time most of the main technical languages... Read More about Software development for engineers..

Wiedziec wiecej Internet (1997)
Book
Buchanan, W. J. (1997). Wiedziec wiecej Internet. Wkt (Poland)

Ksi??ka ta m. In. Uczy jak korzysta? z internetu i sieci www.Opisuje bowiem techniczne aspekty tej ?wiatowej sieci informacyjnej. Dlatego te? mo?e by? wykorzystywana przez wszystkich uczniów i studentów, którzy nie tylko chc? korzysta? z internetu, l... Read More about Wiedziec wiecej Internet.

A Comparative Analysis of Honeypots on Different Cloud Platforms (2021)
Journal Article
Kelly, C., Pitropakis, N., Mylonas, A., McKeown, S., & Buchanan, W. J. (2021). A Comparative Analysis of Honeypots on Different Cloud Platforms. Sensors, 21(7), Article 2433. https://doi.org/10.3390/s21072433

In 2019, the majority of companies used at least one cloud computing service and it is expected that by the end of 2021, cloud data centres will process 94% of workloads. The financial and operational advantages of moving IT infrastructure to special... Read More about A Comparative Analysis of Honeypots on Different Cloud Platforms.

Privacy and Trust Redefined in Federated Machine Learning (2021)
Journal Article
Papadopoulos, P., Abramson, W., Hall, A. J., Pitropakis, N., & Buchanan, W. J. (2021). Privacy and Trust Redefined in Federated Machine Learning. Machine Learning and Knowledge Extraction, 3(2), 333-356. https://doi.org/10.3390/make3020017

A common privacy issue in traditional machine learning is that data needs to be disclosed for the training procedures. In situations with highly sensitive data such as healthcare records, accessing this information is challenging and often prohibited... Read More about Privacy and Trust Redefined in Federated Machine Learning.

A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node (2021)
Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2021). A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node. Wireless Networks, 27(5), 3423-3439. https://doi.org/10.1007/s11276-021-02580-8

Utilising the mobilisation of a sink node in a wireless sensor network to combat the energy hole, or hotspot issue, is well referenced. However, another issue , that of energy spikes may remain. With the mobile sink node potentially communicating wit... Read More about A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node.

A RAM triage methodology for Hadoop HDFS forensics (2016)
Journal Article
Leimich, P., Harrison, J., & Buchanan, W. J. (2016). A RAM triage methodology for Hadoop HDFS forensics. Digital Investigation, 18, 96-109. https://doi.org/10.1016/j.diin.2016.07.003

This paper discusses the challenges of performing a forensic investigation against a multi-node Hadoop cluster and proposes a methodology for examiners to use in such situations. The procedure's aim of minimising disruption to the data centre during... Read More about A RAM triage methodology for Hadoop HDFS forensics.