


default search action
William J. Buchanan
Person information
- affiliation: Edinburgh Napier University, School of Computing, UK
Other persons with the same name
- Bill Buchanan — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i64]William J. Buchanan, Hisham Ali:
Partial and Fully Homomorphic Matching of IP Addresses Against Blacklists for Threat Analysis. CoRR abs/2502.16272 (2025) - [i63]William J. Buchanan, Hisham Ali:
Partial and Fully Homomorphic Matching of IP Addresses Against Blacklists for Threat Analysis. IACR Cryptol. ePrint Arch. 2025: 322 (2025) - [i62]William J. Buchanan, Hisham Ali:
Evaluation of Privacy-aware Support Vector Machine (SVM) Learning using Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2025: 417 (2025) - 2024
- [j82]Mohammed S. Alshehri
, Jawad Ahmad
, Sultan Almakdi
, Mimonah Al Qathrady, Yazeed Yasin Ghadi
, William J. Buchanan
:
SkipGateNet: A Lightweight CNN-LSTM Hybrid Model With Learnable Skip Connections for Efficient Botnet Attack Detection in IoT. IEEE Access 12: 35521-35538 (2024) - [j81]David Samuel Bhatti
, Shahzad Saleem
, Zulfiqar Ali
, Tae-Jin Park
, Beomkyu Suh, Ali Kamran, William J. Buchanan
, Ki-Il Kim
:
Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks. IEEE Access 12: 41499-41516 (2024) - [j80]Hossam O. Ahmed
, Donghoon Kim
, William J. Buchanan
:
A True Random Number Generator Based on Race Hazard and Jitter of Braided and Cross-Coupled Logic Gates Using FPGA. IEEE Access 12: 182943-182955 (2024) - [j79]Marius Elmiger
, Mouad Lemoudden
, Nikolaos Pitropakis, William J. Buchanan:
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. Int. J. Inf. Sec. 23(1): 467-485 (2024) - [j78]Yagmur Yigit
, Leandros A. Maglaras
, William J. Buchanan
, Berk Canberk
, Hyundong Shin
, Trung Q. Duong
:
AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks. IEEE Internet Things J. 11(22): 36168-36181 (2024) - [j77]Muhammad Shahbaz Khan
, Jawad Ahmad
, Ahmed Al-Dubai
, Nikolaos Pitropakis
, Baraq Ghaleb
, Amjad Ullah
, Muhammad Attique Khan
, William J. Buchanan
:
Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology. IEEE Trans. Consumer Electron. 70(4): 7087-7101 (2024) - [j76]Rahul Saha
, Gulshan Kumar
, G. Geetha
, Mauro Conti
, William J. Buchanan
:
Application of Randomness for Security and Privacy in Multi-Party Computation. IEEE Trans. Dependable Secur. Comput. 21(6): 5694-5705 (2024) - [c79]Muhammad Shahbaz Khan
, Jawad Ahmad, Muhammad Ali, Ahmed Al-Dubai, Nikolaos Pitropakis, William J. Buchanan:
VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. ATSIP 2024: 376-381 - [c78]Mwrwan Abubakar, Belinda I. Onyeashie, Isam Wadhaj, Petra Leimich, Hisham Ali, William J. Buchanan:
A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification. BCCA 2024: 684-697 - [c77]Dimitrios Kasimatis, Sam Grierson, William J. Buchanan, Chris Eckl, Pavlos Papadopoulos, Nikolaos Pitropakis, Christos Chrysoulas
, Craig Thomson, Baraq Ghaleb:
DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof. CSR 2024: 866-871 - [c76]Burcu Bolat-Akça, Elif Bozkaya-Aras, Berk Canberk
, Bill Buchanan, Stefan Schmid:
An Intelligent Digital Twin Model for Attack Detection in Zero-Touch 6G Networks. ICC Workshops 2024: 773-778 - [c75]Zil e Huma, Jawad Ahmad, Hussam Al Hamadi
, Baraq Ghaleb, William J. Buchanan, Sana Ullah Jan:
ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT. ICCR 2024: 1-6 - [c74]William J. Buchanan, Sam Grierson, Daniel Uribe:
Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. ICISSP 2024: 226-233 - [c73]Fizza Batool, Nadeem Kureshi, Rashiq Rafiq Marie, Fawad Ahmad, Muhammad Shahbaz Khan, Mouad Lemoudden, William J. Buchanan, Jawad Ahmad:
Image Encryption in Frequency Domain Using Hybrid Chaotic Maps, Hashing, and Lifting Wavelet Transform. ISPR (2) 2024: 262-273 - [c72]Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Nikolaos Pitropakis, Maha Driss, William J. Buchanan:
A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments. KES 2024: 4214-4223 - [c71]Iain Baird
, Baraq Ghaleb
, Isam Wadhaj
, Gordon Russell
, William J. Buchanan
:
Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks. RobCE 2024: 165-170 - [c70]Dimitrios Kasimatis
, William J. Buchanan
, Mwrwan Abubakar, Owen Lo
, Christos Chrysoulas
, Nikolaos Pitropakis
, Pavlos Papadopoulos
, Sarwar Sayeed
, Marc Sel
:
Transforming EU Governance: The Digital Integration Through EBSI and GLASS. SEC 2024: 250-263 - [c69]Yagmur Yigit, Leandros Maglaras
, Konstantinos Karantzalos, Kerem Gursu, Mehmet Özdem, William J. Buchanan, Berk Canberk:
Autonomous Queue Management System in Software-defined Routers for Sensor Networks. WF-IoT 2024: 719-724 - [i61]Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Baraq Ghaleb, Nikolaos Pitropakis, William J. Buchanan:
RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations. CoRR abs/2401.04707 (2024) - [i60]William J. Buchanan, Sam Grierson, Daniel Uribe:
Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) using Bilinear Group Accumulators in Batch Mode. CoRR abs/2401.07691 (2024) - [i59]Lakshmi Rama Kiran Pasumarthy, Hisham Ali, William J. Buchanan, Jawad Ahmad, Audun Jøsang, Vasileios Mavroeidis, Mouad Lemoudden:
TIPS: Threat Sharing Information Platform for Enhanced Security. CoRR abs/2403.05210 (2024) - [i58]Dimitrios Kasimatis, Sam Grierson, William J. Buchanan, Chris Eckl, Pavlos Papadopoulos, Nikolaos Pitropakis, Craig Thomson, Baraq Ghaleb:
DID: RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity. CoRR abs/2403.05271 (2024) - [i57]Se Elnour, William J. Buchanan, Paul Keating, Mwrwan Abubakar, Sirag Elnour:
vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election. CoRR abs/2403.05275 (2024) - [i56]Yagmur Yigit, William J. Buchanan, Madjid G. Tehrani, Leandros Maglaras
:
Review of Generative AI Methods in Cybersecurity. CoRR abs/2403.08701 (2024) - [i55]Salko Korac, Leandros Maglaras
, Naghmeh Moradpoor, Bill Buchanan, Berk Canberk
:
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems. CoRR abs/2403.17571 (2024) - [i54]Sam Grierson, William J. Buchanan, Craig Thomson, Baraq Ghaleb, Chris Eckl:
A Framework for the Security and Privacy of Biometric System Constructions under Defined Computational Assumptions. CoRR abs/2411.17321 (2024) - 2023
- [j75]Peter Aaby
, Mario Valerio Giuffrida
, William J. Buchanan
, Zhiyuan Tan
:
An omnidirectional approach to touch-based continuous authentication. Comput. Secur. 128: 103146 (2023) - [j74]Joseph Haddad, Nikolaos Pitropakis
, Christos Chrysoulas
, Mouad Lemoudden
, William J. Buchanan
:
Attacking Windows Hello for Business: Is It What We Were Promised? Cryptogr. 7(1): 9 (2023) - [j73]Arran Holmes, William J. Buchanan
:
A framework for live host-based Bitcoin wallet forensics and triage. Forensic Sci. Int. Digit. Investig. 44: 301486 (2023) - [j72]Sean McKeown, William J. Buchanan:
Hamming distributions of popular perceptual hashing techniques. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301509 (2023) - [j71]Ben Hasselgren
, Christos Chrysoulas
, Nikolaos Pitropakis
, William J. Buchanan
:
Using Social Media & Sentiment Analysis to Make Investment Decisions. Future Internet 15(1): 5 (2023) - [j70]Fawad Ahmed
, Muneeb Ur Rehman
, Jawad Ahmad
, Muhammad Shahbaz Khan
, Wadii Boulila
, Gautam Srivastava
, Jerry Chun-Wei Lin
, William J. Buchanan
:
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder. ACM Trans. Multim. Comput. Commun. Appl. 19(3s): 128:1-128:21 (2023) - [j69]Rahul Saha
, Gulshan Kumar
, Tannishtha Devgun, William J. Buchanan
, Reji Thomas
, Mamoun Alazab
, Tai-Hoon Kim
, Joel J. P. C. Rodrigues
:
A Blockchain Framework in Post-Quantum Decentralization. IEEE Trans. Serv. Comput. 16(1): 1-12 (2023) - [c68]Sarwar Sayeed
, Nikolaos Pitropakis
, William J. Buchanan
, Evangelos K. Markakis
, Dimitra Papatsaroucha
, Ilias Politis
:
TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework. ARES 2023: 145:1-145:10 - [c67]Mwrwan Abubakar, Nilupulee Anuradha Gunathilake, William J. Buchanan, Brian O'Reilly:
A Review of the Non-Fungible Tokens (NFT): Challenges and Opportunities. BDTA 2023: 171-190 - [c66]Andrew Thaeler, Yagmur Yigit, Leandros Maglaras
, William J. Buchanan, Naghmeh Moradpoor, Gordon Russell:
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. CAMAD 2023: 170-175 - [c65]Sam Grierson, William J. Buchanan, Craig Thomson, Baraq Ghaleb, Leandros Maglaras
, Chris Eckl:
Scalable Multi-domain Trust Infrastructures for Segmented Networks. CAMAD 2023: 182-187 - [c64]Muhammad Shahbaz Khan
, Jawad Ahmad, Ahmed Al-Dubai
, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan:
PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms. CAMAD 2023: 188-193 - [c63]Sam Grierson, Konstantinos Chalkias, William J. Buchanan, Leandros Maglaras
:
Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations. CAMAD 2023: 194-199 - [c62]Hisham Ali, Mwrwan Abubakar, Jawad Ahmad, William J. Buchanan, Zakwan Jaroucheh:
PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks. CAMAD 2023: 200-205 - [c61]William J. Buchanan, Leandros Maglaras
:
Review of the NIST Light-Weight Cryptography Finalists. DCOSS-IoT 2023: 469-474 - [c60]Peter Aaby, Mario Valerio Giuffrida, William J. Buchanan, Zhiyuan Tan:
TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication. TrustCom 2023: 788-795 - [c59]Hassan Ali, Muhammad Shahbaz Khan
, Maha Driss, Jawad Ahmad, William J. Buchanan, Nikolaos Pitropakis:
CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption. VTC Fall 2023: 1-6 - [i53]Pavlos Papadopoulos, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis:
Towards The Creation Of The Future Fish Farm. CoRR abs/2301.01618 (2023) - [i52]Peter Aaby, Mario Valerio Giuffrida, William J. Buchanan, Zhiyuan Tan:
An Omnidirectional Approach to Touch-based Continuous Authentication. CoRR abs/2302.08498 (2023) - [i51]William J. Buchanan, Leandros Maglaras
:
Review of the NIST Light-weight Cryptography Finalists. CoRR abs/2303.14785 (2023) - [i50]Simon R. Davies, Richard Macfarlane, William J. Buchanan:
Majority Voting Approach to Ransomware Detection. CoRR abs/2305.18852 (2023) - [i49]Muhammad Shahbaz Khan, Jawad Ahmad, Hisham Ali, Nikolaos Pitropakis, Ahmed Al-Dubai
, Baraq Ghaleb, William J. Buchanan:
SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data. CoRR abs/2308.10834 (2023) - [i48]Sam Grierson, Konstantinos Chalkias, William J. Buchanan:
Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations. CoRR abs/2308.15009 (2023) - [i47]Hassan Ali, Muhammad Shahbaz Khan, Maha Driss, Jawad Ahmad, William J. Buchanan, Nikolaos Pitropakis:
CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption. CoRR abs/2309.11476 (2023) - [i46]Sam Grierson, William J. Buchanan, Craig Thomson, Baraq Ghaleb, Leandros Maglaras
, Chris Eckl:
Scalable Multi-domain Trust Infrastructures for Segmented Networks. CoRR abs/2310.04898 (2023) - [i45]Hisham Ali, Mwrwan Abubakar
, Jawad Ahmad, William J. Buchanan, Zakwan Jaroucheh:
PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks. CoRR abs/2310.05032 (2023) - [i44]Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan:
PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms. CoRR abs/2311.02795 (2023) - 2022
- [j68]Adel R. Alharbi, Jawad Ahmad
, Arshad Ali
, Sajjad Shaukat Jamal
, Fawad Masood, Yazeed Yasin Ghadi
, Nikolaos Pitropakis, William J. Buchanan:
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complex. 2022: 7047282:1-7047282:15 (2022) - [j67]Simon R. Davies
, Richard Macfarlane
, William J. Buchanan
:
NapierOne: A modern mixed file data set alternative to Govdocs1. Digit. Investig. 40(Supplement): 301330 (2022) - [j66]Hisham Ali, Jawad Ahmad
, Zakwan Jaroucheh, Pavlos Papadopoulos
, Nikolaos Pitropakis
, Owen Lo, Will Abramson, William J. Buchanan
:
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy 24(10): 1379 (2022) - [j65]Simon R. Davies
, Richard Macfarlane
, William J. Buchanan
:
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. Entropy 24(10): 1503 (2022) - [j64]Ashish Kumar, Rahul Saha
, Mauro Conti
, Gulshan Kumar
, William J. Buchanan, Tai-Hoon Kim:
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. J. Netw. Comput. Appl. 204: 103414 (2022) - [j63]Grant McDonald, Pavlos Papadopoulos
, Nikolaos Pitropakis
, Jawad Ahmad
, William J. Buchanan
:
Ransomware: Analysing the Impact on Windows Active Directory Domain Services. Sensors 22(3): 953 (2022) - [j62]Safi Ullah
, Muazzam Ali Khan
, Jawad Ahmad
, Sajjad Shaukat Jamal
, Zil E. Huma, Muhammad Tahir Hassan, Nikolaos Pitropakis
, Arshad Ali
, William J. Buchanan
:
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles. Sensors 22(4): 1340 (2022) - [j61]Owen Lo
, William J. Buchanan
, Sarwar Sayeed
, Pavlos Papadopoulos
, Nikolaos Pitropakis
, Christos Chrysoulas
:
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors 22(6): 2291 (2022) - [j60]Fawad Masood, Maha Driss
, Wadii Boulila
, Jawad Ahmad
, Sadaqat ur Rehman, Sana Ullah Jan
, Abdullah Qayyum
, William J. Buchanan
:
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations. Wirel. Pers. Commun. 127(2): 1405-1432 (2022) - [c58]Nilupulee Anuradha Gunathilake
, Ahmed Al-Dubai
, William J. Buchanan, Owen Lo:
Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher. CSP 2022: 51-55 - [c57]Jon Barton, William J. Buchanan, Nikolaos Pitropakis, Sarwar Sayeed, Will Abramson:
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. ICISSP 2022: 551-561 - [i43]Simon R. Davies, Richard Macfarlane, William J. Buchanan:
NapierOne: A modern mixed file data set alternative to Govdocs1. CoRR abs/2201.08154 (2022) - [i42]Grant McDonald, Pavlos Papadopoulos, Nikolaos Pitropakis, Jawad Ahmad, William J. Buchanan:
Ransomware: Analysing the Impact on Windows Active Directory Domain Services. CoRR abs/2202.03276 (2022) - [i41]Owen Lo, William J. Buchanan, Sarwar Sayeed, Pavlos Papadopoulos, Nikolaos Pitropakis, Christos Chrysoulas:
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. CoRR abs/2203.08781 (2022) - [i40]Simon R. Davies, Richard Macfarlane, William J. Buchanan:
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. CoRR abs/2210.13376 (2022) - [i39]Fawad Ahmed, Muneeb Ur Rehman, Jawad Ahmad, Muhammad Shahbaz Khan, Wadii Boulila, Gautam Srivastava, Jerry Chun-Wei Lin
, William J. Buchanan:
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder. CoRR abs/2211.03662 (2022) - [i38]William J. Buchanan, Mwrwan Abubakar
, Owen Lo, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, Sarwar Sayeed, Marc Sel:
The Future of Integrated Digital Governance in the EU: EBSI and GLASS. CoRR abs/2212.03218 (2022) - [i37]Sean McKeown, William J. Buchanan:
Hamming Distributions of Popular Perceptual Hashing Techniques. CoRR abs/2212.08035 (2022) - 2021
- [j59]Tai-Hoon Kim
, Gulshan Kumar
, Rahul Saha
, William J. Buchanan
, Tannishtha Devgun, Reji Thomas
:
LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments. IEEE Access 9: 100972-100980 (2021) - [j58]Simon R. Davies
, Richard Macfarlane, William J. Buchanan
:
Differential area analysis for ransomware attack detection within mixed file datasets. Comput. Secur. 108: 102377 (2021) - [j57]Kris Hughes, Pavlos Papadopoulos
, Nikolaos Pitropakis
, Adrian Smales
, Jawad Ahmad
, William J. Buchanan
:
Browsers' Private Mode: Is It What We Were Promised? Comput. 10(12): 165 (2021) - [j56]Hao Xu
, Lei Zhang
, Oluwakayode Onireti
, Yang Fang, William J. Buchanan
, Muhammad Ali Imran
:
BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for COVID-19 Pandemic and Beyond. IEEE Internet Things J. 8(5): 3915-3929 (2021) - [j55]Pavlos Papadopoulos
, Oliver Thornewill von Essen, Nikolaos Pitropakis
, Christos Chrysoulas
, Alexios Mylonas
, William J. Buchanan
:
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. J. Cybersecur. Priv. 1(2): 252-273 (2021) - [j54]Serguei Popov
, William J. Buchanan
:
FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures. J. Parallel Distributed Comput. 147: 77-86 (2021) - [j53]Pavlos Papadopoulos
, Will Abramson
, Adam J. Hall, Nikolaos Pitropakis
, William J. Buchanan
:
Privacy and Trust Redefined in Federated Machine Learning. Mach. Learn. Knowl. Extr. 3(2): 333-356 (2021) - [j52]Andrew Churcher
, Rehmat Ullah
, Jawad Ahmad
, Sadaqat ur Rehman
, Fawad Masood, Mandar Gogate
, Fehaid Alqahtani
, Boubakr Nour
, William J. Buchanan
:
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks. Sensors 21(2): 446 (2021) - [j51]Christopher Kelly, Nikolaos Pitropakis
, Alexios Mylonas
, Sean McKeown
, William J. Buchanan
:
A Comparative Analysis of Honeypots on Different Cloud Platforms. Sensors 21(7): 2433 (2021) - [j50]Muhammad Almas Khan
, Muazzam Ali Khan
, Sana Ullah Jan
, Jawad Ahmad
, Sajjad Shaukat Jamal
, Awais Aziz Shah
, Nikolaos Pitropakis
, William J. Buchanan
:
A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT. Sensors 21(21): 7016 (2021) - [j49]Will Abramson
, Pavlos Papadopoulos
, Nikolaos Pitropakis
, William J. Buchanan
:
PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform. Softw. Impacts 9: 100101 (2021) - [c56]Mwrwan Abubakar
, Zakwan Jaroucheh, Ahmed Al-Dubai
, Bill Buchanan
:
A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. COINS 2021: 1-7 - [c55]Mwrwan Abubakar
, Zakwan Jaroucheh, Ahmed Yassin Al-Dubai
, William J. Buchanan
:
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. CSNet 2021: 63-70 - [c54]Christos Chrysoulas
, Amanda Thomson, Nikolaos Pitropakis
, Pavlos Papadopoulos
, Owen Lo
, William J. Buchanan
, George Domalis, Nikos I. Karacapilidis, Dimitris Tsakalidis, Dimitrios Tsolis:
GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 40-57 - [c53]Will Abramson
, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis, Owen Lo:
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. SIN 2021: 1-8 - [c52]Mwrwan Abubakar
, Pádraig McCarron, Zakwan Jaroucheh, Ahmed Yassin Al-Dubai
, Bill Buchanan:
Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. SIN 2021: 1-8 - [c51]Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan:
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. SIN 2021: 1-6 - [c50]Sam Grierson
, Craig Thomson, Pavlos Papadopoulos
, Bill Buchanan:
Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems. SIN 2021: 1-8 - [c49]Bruno Marchand, Nikolaos Pitropakis
, William J. Buchanan
, Costas Lambrinoudakis
:
Launching Adversarial Label Contamination Attacks Against Malicious URL Detection. TrustBus 2021: 69-82 - [c48]Masoud Barati, William J. Buchanan
, Owen Lo, Omer F. Rana
:
A privacy-preserving distributed platform for COVID-19 vaccine passports. UCC Companion 2021: 16:1-16:6 - [i36]Andrew Churcher, Rehmat Ullah, Jawad Ahmad, Sadaqat ur Rehman, Fawad Masood, Mandar Gogate, Fehaid Alqahtani, Boubakr Nour, William J. Buchanan:
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks. CoRR abs/2101.12270 (2021) - [i35]Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan:
Privacy and Trust Redefined in Federated Machine Learning. CoRR abs/2103.15753 (2021) - [i34]Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas
, William J. Buchanan:
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT. CoRR abs/2104.12426 (2021) - [i33]Simon R. Davies, Richard Macfarlane, William J. Buchanan:
Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets. CoRR abs/2106.14418 (2021) - [i32]Nilupulee Anuradha Gunathilake, Ahmed Al-Dubai, William J. Buchanan, Owen Lo:
Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT. CoRR abs/2106.15225 (2021) - [i31]Christos Chrysoulas, Amanda Thomson, Nikolaos Pitropakis, Pavlos Papadopoulos, Owen Lo, William J. Buchanan, George Domalis, Nikos I. Karacapilidis, Dimitris Tsakalidis, Dimitrios Tsolis:
GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. CoRR abs/2109.08566 (2021) - [i30]Edward Henry Young, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, William J. Buchanan:
Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. CoRR abs/2110.01970 (2021) - [i29]Masoud Barati, William J. Buchanan, Owen Lo, Omer F. Rana:
A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports. CoRR abs/2112.01815 (2021) - [i28]William Abramson, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis, Owen Lo:
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. CoRR abs/2112.02855 (2021) - [i27]Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan:
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. CoRR abs/2112.10092 (2021) - [i26]Mwrwan Abubakar, Pádraig McCarron, Zakwan Jaroucheh, Ahmed Al-Dubai, William J. Buchanan:
Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. CoRR abs/2112.10124 (2021) - [i25]Nilupulee Anuradha Gunathilake, Ahmed Al-Dubai, William J. Buchanan, Owen Lo:
Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher. CoRR abs/2112.12232 (2021) - 2020
- [j48]Isam Wadhaj
, Baraq Ghaleb, Craig Thomson, Ahmed Al-Dubai
, William J. Buchanan
:
Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL). IEEE Access 8: 43665-43675 (2020) - [j47]Tai-Hoon Kim
, Gulshan Kumar
, Rahul Saha
, Mamoun Alazab
, William J. Buchanan
, Mritunjay Kumar Rai
, G. Geetha
, Reji Thomas
:
CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure. IEEE Access 8: 94748-94756 (2020) - [j46]Tai-Hoon Kim
, Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai
, William J. Buchanan
, Reji Thomas
, Mamoun Alazab
:
A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect. IEEE Access 8: 96455-96467 (2020) - [j45]Abdullah Qayyum
, Jawad Ahmad
, Wadii Boulila
, Saeed Rubaiee
, Arshad Ali
, Fawad Masood
, Fawad Khan
, William J. Buchanan
:
Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution. IEEE Access 8: 140876-140895 (2020) - [j44]Jan Sher Khan
, Wadii Boulila
, Jawad Ahmad
, Saeed Rubaiee
, Atique Ur Rehman
, Roobaea Alroobaea
, William J. Buchanan
:
DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption. IEEE Access 8: 159732-159744 (2020) - [j43]Pavlos Papadopoulos
, Nikolaos Pitropakis
, William J. Buchanan
, Owen Lo, Sokratis K. Katsikas
:
Privacy-Preserving Passive DNS. Comput. 9(3): 64 (2020) - [j42]Simon Dyson, William J. Buchanan
, Liam Bell:
Scenario-based creation and digital investigation of ethereum ERC20 tokens. Digit. Investig. 32: 200894 (2020) - [j41]Simon R. Davies
, Richard Macfarlane, William J. Buchanan
:
Evaluation of live forensic techniques in ransomware attack mitigation. Digit. Investig. 33: 300979 (2020) - [j40]Jawad Ahmad, Ahsen Tahir, Hadi Larijani, Fawad Ahmed, Syed Aziz Shah
, Adam James Hall, William J. Buchanan
:
Energy demand forecasting of buildings using random neural networks. J. Intell. Fuzzy Syst. 38(4): 4753-4765 (2020) - [j39]Fawad Masood
, Wadii Boulila
, Jawad Ahmad
, Arshad Ali
, Syam Sankar
, Saeed Rubaiee
, William J. Buchanan
:
A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos. Remote. Sens. 12(11): 1893 (2020) - [j38]Charalampos S. Stamatellis
, Pavlos Papadopoulos
, Nikolaos Pitropakis
, Sokratis K. Katsikas
, William J. Buchanan
:
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. Sensors 20(22): 6587 (2020) - [j37]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai
, William J. Buchanan
, Reji Thomas
, G. Geetha
, Tai-Hoon Kim
, Joel J. P. C. Rodrigues
:
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption. IEEE Trans. Veh. Technol. 69(7): 7707-7722 (2020) - [c47]Nilupulee Anuradha Gunathilake
, Ahmed Al-Dubai
, William J. Buchanan:
Recent Advances and Trends in Lightweight Cryptography for IoT Security. CNSM 2020: 1-5 - [c46]Zakwan Jaroucheh, Mohamad Alissa
, William J. Buchanan
, Xiaodong Liu:
TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies. COMPSAC 2020: 1235-1240 - [c45]Peter Aaby
, Mario Valerio Giuffrida, William J. Buchanan
, Zhiyuan Tan:
Towards Continuous User Authentication Using Personalised Touch-Based Behaviour. DASC/PiCom/CBDCom/CyberSciTech 2020: 41-48 - [c44]Zakwan Jaroucheh, Mohamad Alissa
, William J. Buchanan
:
Trust-based Ecosystem to Combat Fake News. IEEE ICBC 2020: 1-3 - [c43]William Bowditch, Will Abramson, William J. Buchanan
, Nikolaos Pitropakis, Adam J. Hall:
Privacy-preserving Surveillance Methods using Homomorphic Encryption. ICISSP 2020: 240-248 - [c42]Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos
, Sean McKeown, William J. Buchanan
:
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach. ICISSP 2020: 289-298 - [c41]Zakwan Jaroucheh, Baraq Ghaleb, William J. Buchanan
:
SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain. ICSA Companion 2020: 143-150 - [c40]Mwrwan Abubakar
, Zakwan Jaroucheh, Ahmed Al-Dubai
, Bill Buchanan
:
PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. ICVISP 2020: 58:1-58:8 - [c39]Jan Sher Khan
, Ahsen Tahir, Jawad Ahmad, Syed Aziz Shah, Qammer H. Abbasi, Gordon Russell, William J. Buchanan
:
5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum. SAI (3) 2020: 26-36 - [c38]Will Abramson
, Adam James Hall, Pavlos Papadopoulos
, Nikolaos Pitropakis, William J. Buchanan
:
A Distributed Trust Framework for Privacy-Preserving Machine Learning. TrustBus 2020: 205-220 - [i24]Will Major, William J. Buchanan, Jawad Ahmad:
An authentication protocol based on chaos and zero knowledge proof. CoRR abs/2001.07897 (2020) - [i23]Ian Low, William J. Buchanan, Richard J. Macfarlane, Owen Lo:
Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction. CoRR abs/2002.05126 (2020) - [i22]Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan:
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach. CoRR abs/2005.06599 (2020) - [i21]Hao Xu, Lei Zhang, Oluwakayode Onireti, Yang Fang, William J. Buchanan, Muhammad Ali Imran:
BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond. CoRR abs/2005.10103 (2020) - [i20]Sebastian Müller, Andreas Penzkofer, Bartosz Kusmierz, Darcy Camargo, William J. Buchanan:
Fast Probabilistic Consensus with Weighted Votes. CoRR abs/2006.00928 (2020) - [i19]Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan:
A Distributed Trust Framework for Privacy-Preserving Machine Learning. CoRR abs/2006.02456 (2020) - [i18]Will Abramson, Nicole E. van Deursen, William J. Buchanan:
Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting. CoRR abs/2006.14864 (2020) - [i17]Gulshan Kumar, Rahul Saha, William J. Buchanan, G. Geetha, Reji Thomas, Tai-Hoon Kim, Mamoun Alazab:
Decentralized Accessibility of e-commerce Products through Blockchain Technology. CoRR abs/2007.05265 (2020) - [i16]Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan, Owen Lo, Sokratis K. Katsikas:
Privacy Preserving Passive DNS. CoRR abs/2008.06430 (2020) - [i15]Zakwan Jaroucheh, Baraq Ghaleb, William J. Buchanan:
SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain. CoRR abs/2008.06763 (2020) - [i14]Zakwan Jaroucheh, Mohamad Alissa
, William J. Buchanan:
TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies. CoRR abs/2008.13632 (2020) - [i13]William J. Buchanan, Muhammad Ali Imran, Masood Ur Rehman, Lei Zhang, Qammer H. Abbasi, Christos Chrysoulas, David Haynes
, Nikolaos Pitropakis, Pavlos Papadopoulos
:
Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing. CoRR abs/2009.05126 (2020) - [i12]Charalampos S. Stamatellis, Pavlos Papadopoulos, Nikolaos Pitropakis, Sokratis K. Katsikas, William J. Buchanan:
A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. CoRR abs/2011.09260 (2020) - [i11]Simon R. Davies, Richard Macfarlane, William J. Buchanan:
Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation. CoRR abs/2012.08487 (2020)
2010 – 2019
- 2019
- [j36]Rahul Saha
, G. Geetha
, Gulshan Kumar
, Tai-Hoon Kim
, William J. Buchanan
:
MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access 7: 172045-172054 (2019) - [j35]Tai-Hoon Kim
, Rekha Goyat, Mritunjay Kumar Rai
, Gulshan Kumar
, William J. Buchanan
, Rahul Saha
, Reji Thomas
:
A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks. IEEE Access 7: 184133-184144 (2019) - [j34]Peter McLaren, Gordon Russell
, William J. Buchanan
, Zhiyuan Tan:
Decrypting live SSH traffic in virtual environments. Digit. Investig. 29: 109-117 (2019) - [j33]Matt Muir, Petra Leimich
, William J. Buchanan
:
A Forensic Audit of the Tor Browser Bundle. Digit. Investig. 29: 118-128 (2019) - [j32]Shancang Li
, Kim-Kwang Raymond Choo
, Qindong Sun
, William J. Buchanan
, Jiuxin Cao:
IoT Forensics: Amazon Echo as a Use Case. IEEE Internet Things J. 6(4): 6487-6497 (2019) - [j31]Peter McLaren, William J. Buchanan
, Gordon Russell
, Zhiyuan Tan:
Deriving ChaCha20 key streams from targeted memory analysis. J. Inf. Secur. Appl. 48 (2019) - [j30]Rameez Asif
, William J. Buchanan
:
Corrigendum to "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment". Secur. Commun. Networks 2019: 2637028:1 (2019) - [j29]Shancang Li
, Yong Yuan
, Jun Jason Zhang
, Bill Buchanan
, Erwu Liu
, Ramesh Ramadoss:
Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT. IEEE Trans. Comput. Soc. Syst. 6(6): 1369-1372 (2019) - [c37]Muhammad Ilyas, Jawad Ahmad
, Alistair Lawson, Jan Sher Khan
, Ahsen Tahir, Ahsan Adeel, Hadi Larijani, Abdelfateh Kerrouche, M. Guftar Shaikh, William J. Buchanan
, Amir Hussain:
Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning. BICS 2019: 76-85 - [c36]Bill Buchanan:
Building the Future: Tokenization, Blockchain and Citizen-focused Systems. ICISSP 2019: 5 - [c35]Nilupulee Anuradha Gunathilake
, William J. Buchanan
, Rameez Asif
:
Next Generation Lightweight Cryptography for Smart IoT Devices: : Implementation, Challenges and Applications. WF-IoT 2019: 707-710 - [i10]Adam James Hall, Nikolaos Pitropakis, William J. Buchanan
, Naghmeh Moradpoor:
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. CoRR abs/1907.10272 (2019) - [i9]Matt Muir, Petra Leimich, William J. Buchanan
:
A Forensic Audit of the Tor Browser Bundle. CoRR abs/1907.10279 (2019) - [i8]Peter Aaby, Juanjo Mata De Acuna, Richard Macfarlane, William J. Buchanan
:
Privacy Parameter Variation Using RAPPOR on a Malware Dataset. CoRR abs/1907.10387 (2019) - [i7]Peter McLaren, Gordon Russell, William J. Buchanan
, Zhiyuan Tan:
Decrypting live SSH traffic in virtual environments. CoRR abs/1907.10835 (2019) - [i6]Shane Murnion, William J. Buchanan
, Adrian Smales, Gordon Russell:
Machine learning and semantic analysis of in-game chat for cyberbullying. CoRR abs/1907.10855 (2019) - [i5]Pierre Chevalier, Bartlomiej Kaminski, Fraser Hutchison, Qi Ma, Spandan Sharma, Andreas Fackler, William J. Buchanan
:
Protocol for Asynchronous, Reliable, Secure and Efficient Consensus (PARSEC) Version 2.0. CoRR abs/1907.11445 (2019) - [i4]Peter McLaren, William J. Buchanan
, Gordon Russell, Zhiyuan Tan:
Deriving ChaCha20 Key Streams From Targeted Memory Analysis. CoRR abs/1907.11941 (2019) - [i3]Peter McLaren, William J. Buchanan
, Gordon Russell, Zhiyuan Tan:
Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge. CoRR abs/1907.11954 (2019) - [i2]Simon Dyson, William J. Buchanan
, Liam Bell:
The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime. CoRR abs/1907.12221 (2019) - [i1]Jon Barton, William J. Buchanan, Will Abramson, Nikolaos Pitropakis:
Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device. CoRR abs/1912.12257 (2019) - 2018
- [j28]Samuel Tweneboah-Koduah, William J. Buchanan
:
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Comput. J. 61(9): 1389-1406 (2018) - [j27]Shane Murnion
, William J. Buchanan
, Adrian Smales, Gordon Russell
:
Machine learning and semantic analysis of in-game chat for cyberbullying. Comput. Secur. 76: 197-213 (2018) - [j26]M. A. K. Sudozai, Shahzad Saleem
, William J. Buchanan
, Nisar Habib, Haleemah Zia:
Forensics study of IMO call and chat app. Digit. Investig. 25: 5-23 (2018) - [j25]William J. Buchanan
, Scott Helme, Alan Woodward
:
Analysis of the adoption of security headers in HTTP. IET Inf. Secur. 12(2): 118-126 (2018) - [j24]Samuel Tweneboah-Koduah, Francis Atsu, William J. Buchanan
:
Impact of cyberattacks on stock performance: a comparative study. Inf. Comput. Secur. 26(5): 637-652 (2018) - [j23]Owen Lo
, William J. Buchanan
, Paul Griffiths, Richard Macfarlane:
Distance Measurement Methods for Improved Insider Threat Detection. Secur. Commun. Networks 2018: 5906368:1-5906368:18 (2018) - [c34]Owen Lo, William J. Buchanan
, Douglas Carson:
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. ARES 2018: 21:1-21:6 - [c33]Adam James Hall, Nikolaos Pitropakis, William J. Buchanan
, Naghmeh Moradpoor:
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. IEEE BigData 2018: 5034-5039 - [c32]Peter Aaby
, Juanjo Mata De Acuna, Richard Macfarlane, William J. Buchanan
:
Privacy Parameter Variation Using RAPPOR on a Malware Dataset. TrustCom/BigDataSE 2018: 938-945 - [c31]Christoph Thuemmler, Claudia Rolffs, Andreas Bollmann, Gerhard Hindricks, William J. Buchanan
:
Requirements for 5G based telemetric cardiac monitoring. WiMob 2018: 1-4 - 2017
- [j22]Grzegorz Spyra, William J. Buchanan
, Elias Ekonomou:
Sticky policies approach within cloud computing. Comput. Secur. 70: 366-375 (2017) - [j21]William J. Buchanan
, Simone Chiale, Richard Macfarlane:
A methodology for the security evaluation within third-party Android Marketplaces. Digit. Investig. 23: 88-98 (2017) - [j20]Rameez Asif
, William J. Buchanan
:
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Secur. Commun. Networks 2017: 7616847:1-7616847:10 (2017) - [c30]Elochukwu Ukwandu
, William J. Buchanan
, Gordon Russell:
Performance evaluation of a fragmented secret share system. CyberSA 2017: 1-6 - [c29]Solomon Ogbomon Uwagbole, William J. Buchanan
, Lu Fan:
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. EST 2017: 12-17 - [c28]Solomon Ogbomon Uwagbole, William J. Buchanan
, Lu Fan:
Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention. IM 2017: 1087-1090 - [c27]Rameez Asif
, William J. Buchanan
:
Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. iThings/GreenCom/CPSCom/SmartData 2017: 910-916 - 2016
- [j19]Boris Sieklik, Richard Macfarlane, William J. Buchanan
:
Evaluation of TFTP DDoS amplification attack. Comput. Secur. 57: 67-92 (2016) - [j18]Petra Leimich
, Josh Harrison, William J. Buchanan
:
A RAM triage methodology for Hadoop HDFS forensics. Digit. Investig. 18: 96-109 (2016) - [c26]William J. Buchanan
, Nicole van Deursen
:
HI-risk: A method to analyse health information risk intelligence. HealthCom 2016: 1-7 - [c25]Solomon Ogbomon Uwagbole, William J. Buchanan
, Lu Fan:
Numerical encoding to Tame SQL injection attacks. NOMS 2016: 1253-1256 - 2015
- [j17]Philip Penrose
, William J. Buchanan
, Richard Macfarlane:
Fast contraband detection in large capacity disk drives. Digit. Investig. 12 Supplement 1: S22-S29 (2015) - [j16]William J. Buchanan
, David Lanc, Elochukwu Ukwandu
, Lu Fan, Gordon Russell
:
The Future Internet: A World of Secret Shares. Future Internet 7(4): 445-464 (2015) - [c24]William J. Buchanan
, Elochukwu Ukwandu
, Nicole van Deursen
, Lu Fan, Gordon Russell
, Owen Lo, Christoph Thuemmler:
Secret shares to protect health records in Cloud-based infrastructures. HealthCom 2015: 669-672 - [c23]Elochukwu Ukwandu
, William J. Buchanan
, Lu Fan, Gordon Russell
, Owen Lo:
RESCUE: Resilient Secret Sharing Cloud-Based Architecture. TrustCom/BigDataSE/ISPA (1) 2015: 872-879 - 2014
- [j15]Zbigniew Kwecka, William J. Buchanan
, Burkhard Schafer, Judith Rauhofer:
"I am Spartacus": privacy enhancing technologies, collaborative obfuscation and privacy as a public good. Artif. Intell. Law 22(2): 113-139 (2014) - 2013
- [j14]Nicole van Deursen
, William J. Buchanan
, Alistair Duff:
Monitoring information security risks within health care. Comput. Secur. 37: 31-45 (2013) - [j13]Philip Penrose
, Richard Macfarlane, William J. Buchanan
:
Approaches to the classification of high entropy file fragments. Digit. Investig. 10(4): 372-384 (2013) - [j12]William J. Buchanan
, Zbigniew Kwecka, Elias Ekonomou:
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services. Mob. Networks Appl. 18(5): 728-737 (2013) - [c22]Zbigniew Kwecka, William J. Buchanan, Burkhard Schafer, Judith Rauhofer:
Schutz der Anonymität als Gemeinschaftsaufgabe - eine neue Generation von PETs? GI-Jahrestagung 2013: 2134-2148 - [c21]Christoph Thuemmler, Oli H. Mival, David Benyon, William J. Buchanan
, Alois Paulin, Samuel A. Fricker, Markus Fiedler, Astrid Grøttland, Thomas Jell, Thomas Magedanz, Ioana Ispas, Bert-Jaap Koops, Eleni Kosta, Armin Schneider
, Anastasius Gavras
, Maria Barros, Philippe Cousin
, Euripides G. M. Petrakis
:
Norms and standards in modular medical architectures. Healthcom 2013: 382-387 - 2012
- [j11]Richard Macfarlane, William J. Buchanan
, Elias Ekonomou, Omair Uthmani, Lu Fan, Owen Lo:
Formal security policy implementations in network firewalls. Comput. Secur. 31(2): 253-270 (2012) - [j10]Christoph Thuemmler, Lu Fan, William J. Buchanan, Owen Lo, Elias Ekonomou, Abou Sofyane Khedim:
E-Health: Chances and Challenges of Distributed, Service oriented Architectures. J. Cyber Secur. Mobil. 1(1) (2012) - [c20]William J. Buchanan
, Lu Fan, Alistair Lawson, Burkhard Schafer, Russel Scott, Christoph Thuemmler, Omair Uthmani:
Computational data protection law: trusting each other offline and online. JURIX 2012: 31-40 - [c19]Mustafa Bani Khalaf, Ahmed Yassin Al-Dubai
, William J. Buchanan
:
A new efficient distributed route discovery for wireless mobile ad hoc networks. WTS 2012: 1-6 - 2011
- [j9]Zbigniew Kwecka, William J. Buchanan
:
Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform. Int. J. Inf. Technol. Syst. Approach 4(2): 12-31 (2011) - [c18]Lu Fan, William J. Buchanan
, Christoph Thümmler, Owen Lo, Abou Sofyane Khedim, Omair Uthmani, Alistair Lawson, Derek Bell
:
DACAR Platform for eHealth Services Cloud. IEEE CLOUD 2011: 219-226 - [c17]Elias Ekonomou, Lu Fan, William J. Buchanan
, Christoph Thümmler:
An Integrated Cloud-based Healthcare Infrastructure. CloudCom 2011: 532-536 - 2010
- [j8]Ahmed Yassin Al-Dubai, Geyong Min, Mohamed Ould-Khaoua, Xiaolong Jin, William J. Buchanan
:
Special issue: Performance evaluation and optimization of ubiquitous computing and networked systems. J. Syst. Softw. 83(8): 1299-1300 (2010) - [j7]Nikos Migas, William J. Buchanan
:
Ad hoc routing metrics and applied weighting for QoS support. Int. J. Parallel Emergent Distributed Syst. 25(4): 293-314 (2010) - [c16]William J. Buchanan
, Lu Fan, Alistair Lawson, Burkhard Schafer, Russel Scott, Christoph Thuemmler, Omair Uthmani:
Interagency data exchange protocols as computational data protection law. JURIX 2010: 143-146
2000 – 2009
- 2009
- [j6]Carles Garrigues
, Nikos Migas, William J. Buchanan
, Sergi Robles
, Joan Borrell
:
Protecting mobile agents from external replay attacks. J. Syst. Softw. 82(2): 197-206 (2009) - 2008
- [c15]Nikos Migas, William J. Buchanan
:
Ad-hoc Routing Metrics and Applied Weighting for QoS support. IPDPS 2008: 1-8 - 2007
- [c14]Nikos Migas, Constantia Anastasiadou, William J. Buchanan, Jim Marshall:
Mass Customisation through Personalised Brochures: The Role of Emerging Technologies. ECIS 2007: 2283-2294 - 2006
- [j5]William J. Buchanan
, Nikos Migas, G. Sinclair, Kevin A. McArtney:
Analysis of an agent-based metric-driven method for ad-hoc, on-demand routing. Ad Hoc Networks 4(2): 147-167 (2006) - [j4]William J. Buchanan
:
Correlation between academic and skills-based tests in computer networks. Br. J. Educ. Technol. 37(1): 69-78 (2006) - [j3]A. A. Abimbola, Jose Munoz, William J. Buchanan
:
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Comput. Secur. 25(6): 445-451 (2006) - [j2]A. A. Abimbola, J. M. Munoz, William J. Buchanan
:
NetHost-sensor: Monitoring a target host's application via system calls. Inf. Secur. Tech. Rep. 11(4): 166-175 (2006) - [c13]Nikos Migas, William J. Buchanan
:
An auto-Configurable, and, Adaptable, Metric-driven Cluster-head Organisation for Hybrid Multi-hop Routing. ECBS 2006: 13-22 - [c12]A. A. Abimbola, Jose Munoz, William J. Buchanan
:
Investigating False Positive Reduction in HTTP via Procedure Analysis. ICNS 2006: 87 - 2005
- [j1]William J. Buchanan
, Jose Munoz, Kashif Ali Raja:
Critical analysis and error determination of locating-finding techniques in GSM. Int. J. Mob. Commun. 3(2): 165-182 (2005) - [c11]Nikos Migas, William J. Buchanan:
Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing. ECBS 2005: 147-154 - [c10]William J. Buchanan, Jamie Graves, Lionel Saliou, Hussain Al Sebea, Nikos Migas:
Agent-based Forensic Investigations with an Integrated Framework. ECIW 2005: 47-52 - [c9]Lionel Saliou, William J. Buchanan, Jamie Graves, Jose Munoz:
Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. ECIW 2005: 303-312 - 2004
- [c8]Nikos Migas, William J. Buchanan
, Kevin A. McArtney:
Migration of Mobile Agents in Ad-hoc, Wireless Networks. ECBS 2004: 530-535 - 2003
- [c7]Nikos Migas, William J. Buchanan
, Kevin A. McArtney:
Mobile Agents for Routing, Topology Discovery, and Automatic Network Reconfiguration in Ad-Hoc Networks. ECBS 2003: 200-206 - [c6]Nikos Migas, William J. Buchanan, Kevin A. McArtney:
MARIAN: A Framework Using Mobile Agents for Routing in Ad-Hoc Networks. ICWI 2003: 1129-1134 - 2002
- [b4]William J. Buchanan:
The Complete Handbook of the Internet. Springer 2002, ISBN 978-1-4613-4999-0, pp. 1-1639 - [c5]John Pikoulas, William J. Buchanan
, Mike Mannion
, Kostas Triantafyllopoulos:
An Intelligent Agent Security Intrusion System. ECBS 2002: 94- - 2001
- [b3]William J. Buchanan, Austin Wilson:
Advanced PC architecture. Addison-Wesley-Longman 2001, ISBN 978-0-201-39858-8, pp. I-VIII, 1-583 - [c4]John Pikoulas, William J. Buchanan, Mike Mannion, Kostas Triantafyllopoulos:
An Agent-Based Bayesian Forecasting Model for Enhanced Network Security. ECBS 2001: 247-254 - 2000
- [b2]William J. Buchanan:
Computer busses - design and application. Arnold 2000, ISBN 978-0-340-74076-7, pp. I-XIV, 1-608 - [c3]A. V. Scott, William J. Buchanan:
Truly Distributed Control Systems using Fieldbus Technology. ECBS 2000: 165- - [c2]John Pikoulas, Mike Mannion
, William J. Buchanan:
Software Agents and Computer Network Security. ECBS 2000: 211-217 - [c1]William J. Buchanan, M. Naylor, A. V. Scott:
Enhancing Network Management using Mobile Agents. ECBS 2000: 218-
1990 – 1999
- 1996
- [b1]William J. Buchanan:
Analysis of electromagnetic wave propagation using 3D finite-difference time-domain methods with parallel processing. Edinburgh Napier University, UK, 1996
Coauthor Index
aka: William Abramson
aka: Richard J. Macfarlane
aka: Leandros A. Maglaras

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-22 00:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint