Skip to main content

Research Repository

Advanced Search

Outputs (3322)

An Analysis of N5 and Higher Computing. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, January). An Analysis of N5 and Higher Computing. Paper presented at Computing at School

This presentation outlined an analysis of N5 and Higher Computing in Scotland.

Cyber security challenges for cloud based services. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, June). Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh

Areas covered - IoT security - Data loss detection and prevention - Cryptography in the Cloud

US hack shows data is the new frontier in cyber security conflict. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). US hack shows data is the new frontier in cyber security conflict

More than four million personal records of US government workers are thought to have been hacked and stolen, it has been. With US investigators blaming the Chinese government (although the Chinese deny involvement), this incident shows how data could... Read More about US hack shows data is the new frontier in cyber security conflict..

When amateurs do the job of a professional, the result is smart grids secured by dumb crypto. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). When amateurs do the job of a professional, the result is smart grids secured by dumb crypto

Security relies upon good programming and correct adherence to well-designed standards. If the standards are sloppy, then security has been compromised from the outset. Smart grids, which include the smart meters being rolled out to millions of homes... Read More about When amateurs do the job of a professional, the result is smart grids secured by dumb crypto..

Evaluation of the DFET Cloud. (2015)
Presentation / Conference Contribution
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., Keane, E., Callahan, C., …Popov, O. (2015, September). Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference

The DFET (Digital Forensics Evaluation and Training) Cloud creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the development of a virt... Read More about Evaluation of the DFET Cloud..

Teaching penetration and malware analysis in a cloud-based environment. (2015)
Presentation / Conference Contribution
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June). Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education

This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network Forensics (BEng (Hons) level and focused on Penetration testing and Malwar... Read More about Teaching penetration and malware analysis in a cloud-based environment..

Cyber security in practice: identifying areas of vulnerability. (2015)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2015, February). Cyber security in practice: identifying areas of vulnerability. Paper presented at Scot-Secure 2015

Areas covered include: - Using penetration testing to highlight areas of weakness - Practical steps for improving the security of your organisation.

The future internet: a world of secret shares (2015)
Journal Article
Buchanan, W. J., Lanc, D., Ukwandu, E., Fan, L., Russell, G., & Lo, O. (2015). The future internet: a world of secret shares. Future Internet, 7(4), 445-464. https://doi.org/10.3390/fi7040445

The PKI infrastructure is crumbling, especially due to the lack of a strong understanding of how encryption actually works, and in threats around its implementation. This paper outlines an Internet storage using secret sharing methods, and which coul... Read More about The future internet: a world of secret shares.

The Communities of Practice model for understanding digital engagement by hyperlocal elected representatives (2016)
Presentation / Conference Contribution
Cruickshank, P., & Ryan, B. (2016, September). The Communities of Practice model for understanding digital engagement by hyperlocal elected representatives. Presented at IFIP EGOV and ePart 2015, Thessalonki, Greece

There has been much research into citizens’ engagement with their representatives. This paper offers an approach to understanding sustained take-up of internet technologies by these representatives in a (hyperlocal) democratic context using Community... Read More about The Communities of Practice model for understanding digital engagement by hyperlocal elected representatives.

Joseph Conrad and H. G. Wells: The Fin de Siecle Literary Scene. (2015)
Book
Dryden, L. (2015). Joseph Conrad and H. G. Wells: The Fin de Siecle Literary Scene. Palgrave

This is the first sustained examination of of the literary friendship between Conrad and Wells. Drawing upon archival research, diaries, letters and a close analysis of texts, the book traces the relationship between the two authors at the close of t... Read More about Joseph Conrad and H. G. Wells: The Fin de Siecle Literary Scene..

Cyber-Green: idealism in the information age (2015)
Journal Article
Duff, A. S. (2015). Cyber-Green: idealism in the information age. Journal of Information, Communication and Ethics in Society, 13(2), 146-164. https://doi.org/10.1108/jices-10-2014-0049

Purpose This paper retrieves relevant aspects of the work of idealist thinker T.H. Green in order to improve comprehension of, and policy responses to, various dilemmas facing contemporary ‘information societies’. Design/methodology/approach The... Read More about Cyber-Green: idealism in the information age.

Key principles of the good information society. (2015)
Presentation / Conference Contribution
Duff, A. (2015). Key principles of the good information society. In P. Kommers, & P. Isaias (Eds.), Proceedings of 13th IADIS International Conference on e-Society (175-182)

Needing NoDI (normal democratic information)? The problem of information poverty in post-industrial society (2014)
Journal Article
Duff, A. S. (2015). Needing NoDI (normal democratic information)? The problem of information poverty in post-industrial society. Information, Communication and Society, 18(1), 63-77. https://doi.org/10.1080/1369118x.2014.934389

The paper addresses one of the main paradoxes of post-industrial society: information poverty. While digital divides of various types have been extensively theorized and researched, the actual condition of the information poor – those at the wrong en... Read More about Needing NoDI (normal democratic information)? The problem of information poverty in post-industrial society.

The Poetry of Modernity (1870–1950) (2015)
Book Chapter
Dymock, E., & Lyall, S. (2015). The Poetry of Modernity (1870–1950). In C. Sassi (Ed.), The International Companion to Scottish Poetry (74-82). Glasgow: Association for Scottish Literary Studies

No abstract available.

An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks (2015)
Presentation / Conference Contribution
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Yassein, M. B. (2015, December). An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks. Presented at Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia - MoMM 2015

In Wireless Sensor Networks (WSNs), clustering techniques are among the effective solutions to reduce energy consumption and prolong the network lifetime. During the iterative re-clustering process, extra energy and time are consumed especially at th... Read More about An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks.

A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks (2015)
Presentation / Conference Contribution
Eshaftri, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015, September). A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks. Presented at Proceedings of the 2015 Federated Conference on Computer Science and Information Systems

In Wireless Sensor Networks (WSNs), clustering techniques are usually used as a key effective solution to reduce energy consumption and prolong the network lifetime. Despite many works on clustering in WSNs, this issue is still, however, in its infan... Read More about A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks.

An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework (2015)
Journal Article
Fang, D., Liu, X., Romdhani, I., & Pahl, C. (2015). An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework. Journal of cloud computing: advances, systems and applications, 4(1), https://doi.org/10.1186/s13677-015-0039-3

Cloud computing offers various computational resources via convenient on-demand service provision. Currently, heterogeneous services and cloud resources are usually utilized and managed through diverse service portals. This significantly limits the e... Read More about An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework.

AGADE Using Personal Preferences and World Knowledge to Model Agent Behaviour (2015)
Presentation / Conference Contribution
Farrenkopf, T., Guckert, M., & Urquhart, N. (2015, June). AGADE Using Personal Preferences and World Knowledge to Model Agent Behaviour. Presented at International Conference on Practical Applications of Agents and Multi-Agent Systems PAAMS 2015, Salamanca, Spain

BDI agents provide a common well established approach for building multi-agent simulations. In this paper we demonstrate how semantic technologies can be used to model agent behaviour. Beliefs, desires and intentions are mapped flexibly to correspond... Read More about AGADE Using Personal Preferences and World Knowledge to Model Agent Behaviour.

Supporting management strategies with a Figurational approach. (2015)
Presentation / Conference Contribution
Fascia, M. (2015, September). Supporting management strategies with a Figurational approach. Paper presented at Said Business School Research Series

The aim of this theoretical discussion is to provide construct to a research scheme using figurational underpinning, which can then be able to support adaptive management strategies. A common feature of contemporary management issues is the underlyin... Read More about Supporting management strategies with a Figurational approach..