Skip to main content

Research Repository

Advanced Search

Outputs (682)

Novel security assessment for personal health data. (2010)
Presentation / Conference Contribution
Hazelhoff Roelfzema, N. (2010, November). Novel security assessment for personal health data. Paper presented at Perada workshop on Privacy, Security & Trust

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems (2010)
Presentation / Conference Contribution
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010, July). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. Presented at European Conference on Information Warfare and Security

There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat such threats, multiple lines of defence are applied to a network including... Read More about Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems.

A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments (2010)
Thesis
Pallis, G. (2010). A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4005

For more than a century the classic circuit-switched telephony in the form of PSTN (Public Service Telephone Network) has dominated the world of phone communications (Varshney et al., 2002). The alternative solution of VoIP (Voice over Internet Proto... Read More about A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments.

Concept neighbourhoods in knowledge organisation systems. (2010)
Presentation / Conference Contribution
Priss, U., & Old, L. J. (2010). Concept neighbourhoods in knowledge organisation systems. In C. Gnoli, & F. Mazzocchi (Eds.), Paradigms and conceptual systems in knowledge organization

This paper discusses the application of concept neighbourhoods (in the sense of Formal Concept Analysis) to Knowledge Organisation Systems. Examples are provided using Roget’s Thesaurus, WordNet and Wikipedia categories

DACAR - data capture and auto identification reference project. (2010)
Book Chapter
Thuemmler, C. (2010). DACAR - data capture and auto identification reference project. In H. Sundmaeker, P. Guillemin, P. Friess, & S. Woelffle (Eds.), Vision and Challenges for Realising the Internet of Things (202-202). European Commission

The Data Capture and Auto Identification Reference [DACAR] project is a TSB funded initiative to improve network security and to provide dynamic network strategies to safely and securely link smart devices such as RFID tags and mobile diagnostic devi... Read More about DACAR - data capture and auto identification reference project..

A cloudy end to a testing routine. (2010)
Newspaper / Magazine
Thuemmler, C. (2010). A cloudy end to a testing routine

Societal change and novel technologies are driving the evolution of healthcare systems. Cloud computing has the potential to support current structural changes in healthcare in the UK and elsewhere.

A new probabilistic Linear Exponential Backoff scheme for MANETs (2010)
Presentation / Conference Contribution
Yassein, M. B., Manaseer, S., Al-hassan, A. A., Taye', Z. A., & Al-Dubai, A. Y. (2010, April). A new probabilistic Linear Exponential Backoff scheme for MANETs. Presented at 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), Atlanta, USA

Broadcasting is an essential operation in Mobile ad hoc Networks (MANETs) environments. It is used in the initial phase of route discovery process in many reactive protocols. Although broadcasting is simple, it causes the well known broadcast storm p... Read More about A new probabilistic Linear Exponential Backoff scheme for MANETs.

Framework for network IDS evaluation (2009)
Thesis
Lo, O. (2009). Framework for network IDS evaluation. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3981

There are a multitude of threats now faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data stealing and denial of service. As a first line of defence, firewalls can be used to prevent threats... Read More about Framework for network IDS evaluation.

Integrated many-to-many multicast addressing and access control method (2009)
Presentation / Conference Contribution
Romdhani, I., & Yassin Al-Dubai, A. (2009, July). Integrated many-to-many multicast addressing and access control method. Presented at 2009 IEEE Symposium on Computers and Communications, Sousse, Tunisia

IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on the source side. However, current IP multicast deployment figure is still fa... Read More about Integrated many-to-many multicast addressing and access control method.

Network Firewall Dynamic Performance Evaluation and Formalisation (2009)
Thesis
Saliou, L. Network Firewall Dynamic Performance Evaluation and Formalisation. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/2599

Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to computer network security, but equally an organisation must be able to det... Read More about Network Firewall Dynamic Performance Evaluation and Formalisation.

Forensic verification of operating system activity via novel data, acquisition and analysis techniques (2009)
Thesis
Graves, J. Forensic verification of operating system activity via novel data, acquisition and analysis techniques. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6699

Digital Forensics is a nascent field that faces a number of technical, procedural and cultural difficulties that must be overcome if it is to be recognised as a scientific discipline, and not just an art. Technical problems involve the need to develo... Read More about Forensic verification of operating system activity via novel data, acquisition and analysis techniques.

Protecting mobile agents from external replay attacks (2009)
Journal Article
Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009). Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018

This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of... Read More about Protecting mobile agents from external replay attacks.

Radio frequency identification (RFID) in pervasive healthcare (2009)
Journal Article
Fekri, A. H., Thuemmler, C., Buchanan, W., Fekri, H., & Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management, 10(1/2), 119. https://doi.org/10.1504/ijhtm.2009.023731

Active and passive RFID (Radio Frequency Identification) technology are available and licensed for the use in hospitals, and can be used to establish highly reliable pervasive environments within healthcare facilities. They should not be understood a... Read More about Radio frequency identification (RFID) in pervasive healthcare.

Distributed healthcare framework using patient-centric role-based security modelling and workflow (2008)
Thesis
Symes, M. (2008). Distributed healthcare framework using patient-centric role-based security modelling and workflow. (Dissertation). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4008

Healthcare professionals are spending less time with patients and more time on administrative duties (Royal College of Nursing, 2008). This is due to a high bureaucratic demand (Brindley, 2007) on the caring process, patient population and longevity... Read More about Distributed healthcare framework using patient-centric role-based security modelling and workflow.

Towards QoS aware collective communications: from theory to practice: design & analysis of highly parallel multicast & broadcast algorithms. (2008)
Book
Al-Dubai, A. (2008). Towards QoS aware collective communications: from theory to practice: design & analysis of highly parallel multicast & broadcast algorithms. German Publishing House, VDM Verlag

Inter-processor communication in interconnectionnetworks can create bottlenecks for scalable parallelimplementations of computationally intensiveapplications. Multicast and broadcast are generallythe most fundamental communication operationsrequired... Read More about Towards QoS aware collective communications: from theory to practice: design & analysis of highly parallel multicast & broadcast algorithms..

System and method for management of confidential data (2018)
Patent
Buchanan, B., Lo, O., Macfarlane, R., Penrose, P., & Ramsay, B. (2018). System and method for management of confidential data. GB2561176A

This application is for a method of data management to identify confidential digital content on a database by first receiving a management request 302 from a system 304 to carry out data management operations. These include the identification of data... Read More about System and method for management of confidential data.

Method for identification of digital content (2018)
Patent
Buchanan, B., Lo, O., Penrose, P., Ramsay, B., & Macfarlane, R. (2018). Method for identification of digital content. World Intellectual Property Organization

Many areas oi investigation require searching through data that may be oi interest. One example oi data that may be involved in an investigation is copyrighted material that may be suspected of having been obtained or reproduced illegally by a third... Read More about Method for identification of digital content.

MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks (2008)
Thesis
Migas, N. (2008). MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4000

Recent advances in technology provided the ground for highly dynamic, mobile, infrastructure-less networks, namely, ad-hoc networks. Despite their enormous benefits, the full potential cannot be reached unless certain issues are resolved. These mainl... Read More about MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks.