Skip to main content

Research Repository

Advanced Search

Outputs (3)

An e-Health cloud. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Thuemmler, C., Fan, L., Lo, O., & Khedim, A. S. (2010, August). An e-Health cloud. Presented at Cloud Computing for the Public Sector

A significant weakness within cloud-based systems is often their security. This presentation shows how a health care cloud has been created which preserves the rights of the patient to control access to their captured data, and then how this is used... Read More about An e-Health cloud..

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems (2010)
Presentation / Conference Contribution
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010, July). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. Presented at European Conference on Information Warfare and Security

There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat such threats, multiple lines of defence are applied to a network including... Read More about Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems.