BibTeX records: William J. Buchanan

download as .bib file

@article{DBLP:journals/access/AlshehriAAQGB24,
  author       = {Mohammed S. Alshehri and
                  Jawad Ahmad and
                  Sultan Almakdi and
                  Mimonah Al Qathrady and
                  Yazeed Yasin Ghadi and
                  William J. Buchanan},
  title        = {SkipGateNet: {A} Lightweight {CNN-LSTM} Hybrid Model With Learnable
                  Skip Connections for Efficient Botnet Attack Detection in IoT},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {35521--35538},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3371992},
  doi          = {10.1109/ACCESS.2024.3371992},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AlshehriAAQGB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BhattiSAPSKBK24,
  author       = {David Samuel Bhatti and
                  Shahzad Saleem and
                  Zulfiqar Ali and
                  Tae{-}Jin Park and
                  Beomkyu Suh and
                  Ali Kamran and
                  William J. Buchanan and
                  Ki{-}Il Kim},
  title        = {Design and Evaluation of Memory Efficient Data Structure Scheme for
                  Energy Drainage Attacks in Wireless Sensor Networks},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {41499--41516},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3377144},
  doi          = {10.1109/ACCESS.2024.3377144},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BhattiSAPSKBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ElmigerLPB24,
  author       = {Marius Elmiger and
                  Mouad Lemoudden and
                  Nikolaos Pitropakis and
                  William J. Buchanan},
  title        = {Start thinking in graphs: using graphs to address critical attack
                  paths in a Microsoft cloud tenant},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {1},
  pages        = {467--485},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-023-00751-6},
  doi          = {10.1007/S10207-023-00751-6},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ElmigerLPB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BuchananGU24,
  author       = {William J. Buchanan and
                  Sam Grierson and
                  Daniel Uribe},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear
                  Group Accumulators in Batch Mode},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {226--233},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012454300003648},
  doi          = {10.5220/0012454300003648},
  timestamp    = {Tue, 02 Apr 2024 14:37:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BuchananGU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-04707,
  author       = {Muhammad Shahbaz Khan and
                  Jawad Ahmad and
                  Ahmed Al{-}Dubai and
                  Baraq Ghaleb and
                  Nikolaos Pitropakis and
                  William J. Buchanan},
  title        = {RNA-TransCrypt: Image Encryption Using Chaotic {RNA} Encoding, Novel
                  Transformative Substitution, and Tailored Cryptographic Operations},
  journal      = {CoRR},
  volume       = {abs/2401.04707},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.04707},
  doi          = {10.48550/ARXIV.2401.04707},
  eprinttype    = {arXiv},
  eprint       = {2401.04707},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-04707.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-07691,
  author       = {William J. Buchanan and
                  Sam Grierson and
                  Daniel Uribe},
  title        = {Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) using Bilinear
                  Group Accumulators in Batch Mode},
  journal      = {CoRR},
  volume       = {abs/2401.07691},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.07691},
  doi          = {10.48550/ARXIV.2401.07691},
  eprinttype    = {arXiv},
  eprint       = {2401.07691},
  timestamp    = {Thu, 01 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-07691.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-05210,
  author       = {Lakshmi Rama Kiran Pasumarthy and
                  Hisham Ali and
                  William J. Buchanan and
                  Jawad Ahmad and
                  Audun J{\o}sang and
                  Vasileios Mavroeidis and
                  Mouad Lemoudden},
  title        = {{TIPS:} Threat Sharing Information Platform for Enhanced Security},
  journal      = {CoRR},
  volume       = {abs/2403.05210},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.05210},
  doi          = {10.48550/ARXIV.2403.05210},
  eprinttype    = {arXiv},
  eprint       = {2403.05210},
  timestamp    = {Wed, 03 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-05210.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-05271,
  author       = {Dimitrios Kasimatis and
                  Sam Grierson and
                  William J. Buchanan and
                  Chris Eckl and
                  Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  Craig Thomson and
                  Baraq Ghaleb},
  title        = {{DID:} {RING:} Ring Signatures using Decentralised Identifiers For
                  Privacy-Aware Identity},
  journal      = {CoRR},
  volume       = {abs/2403.05271},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.05271},
  doi          = {10.48550/ARXIV.2403.05271},
  eprinttype    = {arXiv},
  eprint       = {2403.05271},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-05271.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-05275,
  author       = {Se Elnour and
                  William J. Buchanan and
                  Paul Keating and
                  Mwrwan Abubakar and
                  Sirag Elnour},
  title        = {vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election},
  journal      = {CoRR},
  volume       = {abs/2403.05275},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.05275},
  doi          = {10.48550/ARXIV.2403.05275},
  eprinttype    = {arXiv},
  eprint       = {2403.05275},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-05275.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-08701,
  author       = {Yagmur Yigit and
                  William J. Buchanan and
                  Madjid G. Tehrani and
                  Leandros Maglaras},
  title        = {Review of Generative {AI} Methods in Cybersecurity},
  journal      = {CoRR},
  volume       = {abs/2403.08701},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.08701},
  doi          = {10.48550/ARXIV.2403.08701},
  eprinttype    = {arXiv},
  eprint       = {2403.08701},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-08701.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-17571,
  author       = {Salko Korac and
                  Leandros Maglaras and
                  Naghmeh Moradpoor and
                  Bill Buchanan and
                  Berk Canberk},
  title        = {Ransomware: Analysis and Evaluation of Live Forensic Techniques and
                  the Impact on Linux based IoT Systems},
  journal      = {CoRR},
  volume       = {abs/2403.17571},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.17571},
  doi          = {10.48550/ARXIV.2403.17571},
  eprinttype    = {arXiv},
  eprint       = {2403.17571},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-17571.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AabyGBT23,
  author       = {Peter Aaby and
                  Mario Valerio Giuffrida and
                  William J. Buchanan and
                  Zhiyuan Tan},
  title        = {An omnidirectional approach to touch-based continuous authentication},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103146},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103146},
  doi          = {10.1016/J.COSE.2023.103146},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AabyGBT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HaddadPCLB23,
  author       = {Joseph Haddad and
                  Nikolaos Pitropakis and
                  Christos Chrysoulas and
                  Mouad Lemoudden and
                  William J. Buchanan},
  title        = {Attacking Windows Hello for Business: Is It What We Were Promised?},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {9},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010009},
  doi          = {10.3390/CRYPTOGRAPHY7010009},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/HaddadPCLB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HolmesB23,
  author       = {Arran Holmes and
                  William J. Buchanan},
  title        = {A framework for live host-based Bitcoin wallet forensics and triage},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  pages        = {301486},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301486},
  doi          = {10.1016/J.FSIDI.2022.301486},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HolmesB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/McKeownB23,
  author       = {Sean McKeown and
                  William J. Buchanan},
  title        = {Hamming distributions of popular perceptual hashing techniques},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301509},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301509},
  doi          = {10.1016/J.FSIDI.2023.301509},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/McKeownB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/HasselgrenCPB23,
  author       = {Ben Hasselgren and
                  Christos Chrysoulas and
                  Nikolaos Pitropakis and
                  William J. Buchanan},
  title        = {Using Social Media {\&} Sentiment Analysis to Make Investment
                  Decisions},
  journal      = {Future Internet},
  volume       = {15},
  number       = {1},
  pages        = {5},
  year         = {2023},
  url          = {https://doi.org/10.3390/fi15010005},
  doi          = {10.3390/FI15010005},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/HasselgrenCPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/AhmedR0KB0LB23,
  author       = {Fawad Ahmed and
                  Muneeb Ur Rehman and
                  Jawad Ahmad and
                  Muhammad Shahbaz Khan and
                  Wadii Boulila and
                  Gautam Srivastava and
                  Jerry Chun{-}Wei Lin and
                  William J. Buchanan},
  title        = {A {DNA} Based Colour Image Encryption Scheme Using {A} Convolutional
                  Autoencoder},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {19},
  number       = {3s},
  pages        = {128:1--128:21},
  year         = {2023},
  url          = {https://doi.org/10.1145/3570165},
  doi          = {10.1145/3570165},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/AhmedR0KB0LB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/SahaKDBTAHR23,
  author       = {Rahul Saha and
                  Gulshan Kumar and
                  Tannishtha Devgun and
                  William J. Buchanan and
                  Reji Thomas and
                  Mamoun Alazab and
                  Tai{-}Hoon Kim and
                  Joel J. P. C. Rodrigues},
  title        = {A Blockchain Framework in Post-Quantum Decentralization},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {1},
  pages        = {1--12},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2021.3116896},
  doi          = {10.1109/TSC.2021.3116896},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/SahaKDBTAHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SayeedPBMPP23,
  author       = {Sarwar Sayeed and
                  Nikolaos Pitropakis and
                  William J. Buchanan and
                  Evangelos K. Markakis and
                  Dimitra Papatsaroucha and
                  Ilias Politis},
  title        = {{TRUSTEE:} Towards the creation of secure, trustworthy and privacy-preserving
                  framework},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {145:1--145:10},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3604997},
  doi          = {10.1145/3600160.3604997},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SayeedPBMPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdta/AbubakarGBO23,
  author       = {Mwrwan Abubakar and
                  Nilupulee Anuradha Gunathilake and
                  William J. Buchanan and
                  Brian O'Reilly},
  editor       = {Zhiyuan Tan and
                  Yulei Wu and
                  Min Xu},
  title        = {A Review of the Non-Fungible Tokens {(NFT):} Challenges and Opportunities},
  booktitle    = {Big Data Technologies and Applications - 13th {EAI} International
                  Conference, {BDTA} 2023, Edinburgh, UK, August 23-24, 2023, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {555},
  pages        = {171--190},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52265-9\_12},
  doi          = {10.1007/978-3-031-52265-9\_12},
  timestamp    = {Wed, 07 Feb 2024 17:33:12 +0100},
  biburl       = {https://dblp.org/rec/conf/bdta/AbubakarGBO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/camad/ThaelerYMBMR23,
  author       = {Andrew Thaeler and
                  Yagmur Yigit and
                  Leandros Maglaras and
                  William J. Buchanan and
                  Naghmeh Moradpoor and
                  Gordon Russell},
  title        = {Enhancing Mac {OS} Malware Detection through Machine Learning and
                  Mach-O File Analysis},
  booktitle    = {28th {IEEE} International Workshop on Computer Aided Modeling and
                  Design of Communication Links and Networks , {CAMAD} 2023, Edinburgh,
                  United Kingdom, November 6-8, 2023},
  pages        = {170--175},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CAMAD59638.2023.10478430},
  doi          = {10.1109/CAMAD59638.2023.10478430},
  timestamp    = {Thu, 11 Apr 2024 08:58:17 +0200},
  biburl       = {https://dblp.org/rec/conf/camad/ThaelerYMBMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/camad/GriersonBTGME23,
  author       = {Sam Grierson and
                  William J. Buchanan and
                  Craig Thomson and
                  Baraq Ghaleb and
                  Leandros Maglaras and
                  Chris Eckl},
  title        = {Scalable Multi-domain Trust Infrastructures for Segmented Networks},
  booktitle    = {28th {IEEE} International Workshop on Computer Aided Modeling and
                  Design of Communication Links and Networks , {CAMAD} 2023, Edinburgh,
                  United Kingdom, November 6-8, 2023},
  pages        = {182--187},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CAMAD59638.2023.10478427},
  doi          = {10.1109/CAMAD59638.2023.10478427},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/camad/GriersonBTGME23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/camad/KhanAAJPB23,
  author       = {Muhammad Shahbaz Khan and
                  Jawad Ahmad and
                  Ahmed Al{-}Dubai and
                  Zakwan Jaroucheh and
                  Nikolaos Pitropakis and
                  William J. Buchanan},
  title        = {PermutEx: Feature-Extraction-Based Permutation - {A} New Diffusion
                  Scheme for Image Encryption Algorithms},
  booktitle    = {28th {IEEE} International Workshop on Computer Aided Modeling and
                  Design of Communication Links and Networks , {CAMAD} 2023, Edinburgh,
                  United Kingdom, November 6-8, 2023},
  pages        = {188--193},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CAMAD59638.2023.10478378},
  doi          = {10.1109/CAMAD59638.2023.10478378},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/camad/KhanAAJPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/camad/GriersonCBM23,
  author       = {Sam Grierson and
                  Konstantinos Chalkias and
                  William J. Buchanan and
                  Leandros Maglaras},
  title        = {Double Public Key Signing Function Oracle Attack on EdDSA Software
                  Implementations},
  booktitle    = {28th {IEEE} International Workshop on Computer Aided Modeling and
                  Design of Communication Links and Networks , {CAMAD} 2023, Edinburgh,
                  United Kingdom, November 6-8, 2023},
  pages        = {194--199},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CAMAD59638.2023.10478409},
  doi          = {10.1109/CAMAD59638.2023.10478409},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/camad/GriersonCBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/camad/AliAABJ23,
  author       = {Hisham Ali and
                  Mwrwan Abubakar and
                  Jawad Ahmad and
                  William J. Buchanan and
                  Zakwan Jaroucheh},
  title        = {{PASSION:} Permissioned Access Control for Segmented Devices and Identity
                  for IoT Networks},
  booktitle    = {28th {IEEE} International Workshop on Computer Aided Modeling and
                  Design of Communication Links and Networks , {CAMAD} 2023, Edinburgh,
                  United Kingdom, November 6-8, 2023},
  pages        = {200--205},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CAMAD59638.2023.10478386},
  doi          = {10.1109/CAMAD59638.2023.10478386},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/camad/AliAABJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/AliKDABP23,
  author       = {Hassan Ali and
                  Muhammad Shahbaz Khan and
                  Maha Driss and
                  Jawad Ahmad and
                  William J. Buchanan and
                  Nikolaos Pitropakis},
  title        = {CellSecure: Securing Image Data in Industrial Internet-of-Things via
                  Cellular Automata and Chaos-Based Encryption},
  booktitle    = {98th {IEEE} Vehicular Technology Conference, {VTC} Fall 2023, Hong
                  Kong, SAR, China, October 10-13, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VTC2023-Fall60731.2023.10333478},
  doi          = {10.1109/VTC2023-FALL60731.2023.10333478},
  timestamp    = {Thu, 11 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/AliKDABP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-01618,
  author       = {Pavlos Papadopoulos and
                  William J. Buchanan and
                  Sarwar Sayeed and
                  Nikolaos Pitropakis},
  title        = {Towards The Creation Of The Future Fish Farm},
  journal      = {CoRR},
  volume       = {abs/2301.01618},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.01618},
  doi          = {10.48550/ARXIV.2301.01618},
  eprinttype    = {arXiv},
  eprint       = {2301.01618},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-01618.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-08498,
  author       = {Peter Aaby and
                  Mario Valerio Giuffrida and
                  William J. Buchanan and
                  Zhiyuan Tan},
  title        = {An Omnidirectional Approach to Touch-based Continuous Authentication},
  journal      = {CoRR},
  volume       = {abs/2302.08498},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.08498},
  doi          = {10.48550/ARXIV.2302.08498},
  eprinttype    = {arXiv},
  eprint       = {2302.08498},
  timestamp    = {Mon, 20 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-08498.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-14785,
  author       = {William J. Buchanan and
                  Leandros A. Maglaras},
  title        = {Review of the {NIST} Light-weight Cryptography Finalists},
  journal      = {CoRR},
  volume       = {abs/2303.14785},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.14785},
  doi          = {10.48550/ARXIV.2303.14785},
  eprinttype    = {arXiv},
  eprint       = {2303.14785},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-14785.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-18852,
  author       = {Simon R. Davies and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Majority Voting Approach to Ransomware Detection},
  journal      = {CoRR},
  volume       = {abs/2305.18852},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.18852},
  doi          = {10.48550/ARXIV.2305.18852},
  eprinttype    = {arXiv},
  eprint       = {2305.18852},
  timestamp    = {Wed, 07 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-18852.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-10834,
  author       = {Muhammad Shahbaz Khan and
                  Jawad Ahmad and
                  Hisham Ali and
                  Nikolaos Pitropakis and
                  Ahmed Al{-}Dubai and
                  Baraq Ghaleb and
                  William J. Buchanan},
  title        = {{SRSS:} {A} New Chaos-Based Single-Round Single S-Box Image Encryption
                  Scheme for Highly Auto-Correlated Data},
  journal      = {CoRR},
  volume       = {abs/2308.10834},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.10834},
  doi          = {10.48550/ARXIV.2308.10834},
  eprinttype    = {arXiv},
  eprint       = {2308.10834},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-10834.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-15009,
  author       = {Sam Grierson and
                  Konstantinos Chalkias and
                  William J. Buchanan},
  title        = {Double Public Key Signing Function Oracle Attack on EdDSA Software
                  Implementations},
  journal      = {CoRR},
  volume       = {abs/2308.15009},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.15009},
  doi          = {10.48550/ARXIV.2308.15009},
  eprinttype    = {arXiv},
  eprint       = {2308.15009},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-15009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-11476,
  author       = {Hassan Ali and
                  Muhammad Shahbaz Khan and
                  Maha Driss and
                  Jawad Ahmad and
                  William J. Buchanan and
                  Nikolaos Pitropakis},
  title        = {CellSecure: Securing Image Data in Industrial Internet-of-Things via
                  Cellular Automata and Chaos-Based Encryption},
  journal      = {CoRR},
  volume       = {abs/2309.11476},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.11476},
  doi          = {10.48550/ARXIV.2309.11476},
  eprinttype    = {arXiv},
  eprint       = {2309.11476},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-11476.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-04898,
  author       = {Sam Grierson and
                  William J. Buchanan and
                  Craig Thomson and
                  Baraq Ghaleb and
                  Leandros Maglaras and
                  Chris Eckl},
  title        = {Scalable Multi-domain Trust Infrastructures for Segmented Networks},
  journal      = {CoRR},
  volume       = {abs/2310.04898},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.04898},
  doi          = {10.48550/ARXIV.2310.04898},
  eprinttype    = {arXiv},
  eprint       = {2310.04898},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-04898.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-05032,
  author       = {Hisham Ali and
                  Mwrwan Abubakar and
                  Jawad Ahmad and
                  William J. Buchanan and
                  Zakwan Jaroucheh},
  title        = {{PASSION:} Permissioned Access Control for Segmented Devices and Identity
                  for IoT Networks},
  journal      = {CoRR},
  volume       = {abs/2310.05032},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.05032},
  doi          = {10.48550/ARXIV.2310.05032},
  eprinttype    = {arXiv},
  eprint       = {2310.05032},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-05032.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-02795,
  author       = {Muhammad Shahbaz Khan and
                  Jawad Ahmad and
                  Ahmed Al{-}Dubai and
                  Zakwan Jaroucheh and
                  Nikolaos Pitropakis and
                  William J. Buchanan},
  title        = {PermutEx: Feature-Extraction-Based Permutation - {A} New Diffusion
                  Scheme for Image Encryption Algorithms},
  journal      = {CoRR},
  volume       = {abs/2311.02795},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.02795},
  doi          = {10.48550/ARXIV.2311.02795},
  eprinttype    = {arXiv},
  eprint       = {2311.02795},
  timestamp    = {Wed, 08 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-02795.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/AlharbiAAJMGPB22,
  author       = {Adel R. Alharbi and
                  Jawad Ahmad and
                  Arshad and
                  Sajjad Shaukat Jamal and
                  Fawad Masood and
                  Yazeed Yasin Ghadi and
                  Nikolaos Pitropakis and
                  William J. Buchanan},
  title        = {A New Multistage Encryption Scheme Using Linear Feedback Register
                  and Chaos-Based Quantum Map},
  journal      = {Complex.},
  volume       = {2022},
  pages        = {7047282:1--7047282:15},
  year         = {2022},
  url          = {https://doi.org/10.1155/2022/7047282},
  doi          = {10.1155/2022/7047282},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/complexity/AlharbiAAJMGPB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DaviesMB22,
  author       = {Simon R. Davies and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {NapierOne: {A} modern mixed file data set alternative to Govdocs1},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301330},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301330},
  doi          = {10.1016/J.FSIDI.2021.301330},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DaviesMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/AliAJPPLAB22,
  author       = {Hisham Ali and
                  Jawad Ahmad and
                  Zakwan Jaroucheh and
                  Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  Owen Lo and
                  Will Abramson and
                  William J. Buchanan},
  title        = {Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking
                  through the Hyperledger Fabric Platform},
  journal      = {Entropy},
  volume       = {24},
  number       = {10},
  pages        = {1379},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24101379},
  doi          = {10.3390/E24101379},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/AliAJPPLAB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/DaviesMB22,
  author       = {Simon R. Davies and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Comparison of Entropy Calculation Methods for Ransomware Encrypted
                  File Identification},
  journal      = {Entropy},
  volume       = {24},
  number       = {10},
  pages        = {1503},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24101503},
  doi          = {10.3390/E24101503},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/DaviesMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KumarSCKBK22,
  author       = {Ashish Kumar and
                  Rahul Saha and
                  Mauro Conti and
                  Gulshan Kumar and
                  William J. Buchanan and
                  Tai{-}Hoon Kim},
  title        = {A comprehensive survey of authentication methods in Internet-of-Things
                  and its conjunctions},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {204},
  pages        = {103414},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jnca.2022.103414},
  doi          = {10.1016/J.JNCA.2022.103414},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/KumarSCKBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/McDonaldPPAB22,
  author       = {Grant McDonald and
                  Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  Jawad Ahmad and
                  William J. Buchanan},
  title        = {Ransomware: Analysing the Impact on Windows Active Directory Domain
                  Services},
  journal      = {Sensors},
  volume       = {22},
  number       = {3},
  pages        = {953},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22030953},
  doi          = {10.3390/S22030953},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/McDonaldPPAB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/UllahKAJHHPAB22,
  author       = {Safi Ullah and
                  Muazzam Ali Khan and
                  Jawad Ahmad and
                  Sajjad Shaukat Jamal and
                  Zil E. Huma and
                  Muhammad Tahir Hassan and
                  Nikolaos Pitropakis and
                  Arshad and
                  William J. Buchanan},
  title        = {{HDL-IDS:} {A} Hybrid Deep Learning Architecture for Intrusion Detection
                  in the Internet of Vehicles},
  journal      = {Sensors},
  volume       = {22},
  number       = {4},
  pages        = {1340},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22041340},
  doi          = {10.3390/S22041340},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/UllahKAJHHPAB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LoBSPPC22,
  author       = {Owen Lo and
                  William J. Buchanan and
                  Sarwar Sayeed and
                  Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  Christos Chrysoulas},
  title        = {{GLASS:} {A} Citizen-Centric Distributed Data-Sharing Model within
                  an e-Governance Architecture},
  journal      = {Sensors},
  volume       = {22},
  number       = {6},
  pages        = {2291},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22062291},
  doi          = {10.3390/S22062291},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LoBSPPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/MasoodDBARJQB22,
  author       = {Fawad Masood and
                  Maha Driss and
                  Wadii Boulila and
                  Jawad Ahmad and
                  Sadaqat ur Rehman and
                  Sana Ullah Jan and
                  Abdullah Qayyum and
                  William J. Buchanan},
  title        = {A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random
                  Shuffling and {XOR} Operations},
  journal      = {Wirel. Pers. Commun.},
  volume       = {127},
  number       = {2},
  pages        = {1405--1432},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-021-08584-z},
  doi          = {10.1007/S11277-021-08584-Z},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/MasoodDBARJQB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/GunathilakeABL22,
  author       = {Nilupulee Anuradha Gunathilake and
                  Ahmed Al{-}Dubai and
                  William J. Buchanan and
                  Owen Lo},
  title        = {Electromagnetic Side-Channel Attack Resilience against {PRESENT} Lightweight
                  Block Cipher},
  booktitle    = {6th International Conference on Cryptography, Security and Privacy,
                  {CSP} 2022, Tianjin, China, January 14-16, 2022},
  pages        = {51--55},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSP55486.2022.00018},
  doi          = {10.1109/CSP55486.2022.00018},
  timestamp    = {Mon, 06 Nov 2023 13:06:30 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/GunathilakeABL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BartonBPSA22,
  author       = {Jon Barton and
                  William J. Buchanan and
                  Nikolaos Pitropakis and
                  Sarwar Sayeed and
                  Will Abramson},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Post Quantum Cryptography Analysis of {TLS} Tunneling on a Constrained
                  Device},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {551--561},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010903000003120},
  doi          = {10.5220/0010903000003120},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BartonBPSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-08154,
  author       = {Simon R. Davies and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {NapierOne: {A} modern mixed file data set alternative to Govdocs1},
  journal      = {CoRR},
  volume       = {abs/2201.08154},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.08154},
  eprinttype    = {arXiv},
  eprint       = {2201.08154},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-08154.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-03276,
  author       = {Grant McDonald and
                  Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  Jawad Ahmad and
                  William J. Buchanan},
  title        = {Ransomware: Analysing the Impact on Windows Active Directory Domain
                  Services},
  journal      = {CoRR},
  volume       = {abs/2202.03276},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.03276},
  eprinttype    = {arXiv},
  eprint       = {2202.03276},
  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-03276.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-08781,
  author       = {Owen Lo and
                  William J. Buchanan and
                  Sarwar Sayeed and
                  Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  Christos Chrysoulas},
  title        = {{GLASS:} {A} Citizen-Centric Distributed Data-Sharing Model within
                  an e-Governance Architecture},
  journal      = {CoRR},
  volume       = {abs/2203.08781},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.08781},
  doi          = {10.48550/ARXIV.2203.08781},
  eprinttype    = {arXiv},
  eprint       = {2203.08781},
  timestamp    = {Mon, 28 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-08781.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-13376,
  author       = {Simon R. Davies and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Comparison of Entropy Calculation Methods for Ransomware Encrypted
                  File Identification},
  journal      = {CoRR},
  volume       = {abs/2210.13376},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.13376},
  doi          = {10.48550/ARXIV.2210.13376},
  eprinttype    = {arXiv},
  eprint       = {2210.13376},
  timestamp    = {Fri, 28 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-13376.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-03662,
  author       = {Fawad Ahmed and
                  Muneeb Ur Rehman and
                  Jawad Ahmad and
                  Muhammad Shahbaz Khan and
                  Wadii Boulila and
                  Gautam Srivastava and
                  Jerry Chun{-}Wei Lin and
                  William J. Buchanan},
  title        = {A {DNA} Based Colour Image Encryption Scheme Using {A} Convolutional
                  Autoencoder},
  journal      = {CoRR},
  volume       = {abs/2211.03662},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.03662},
  doi          = {10.48550/ARXIV.2211.03662},
  eprinttype    = {arXiv},
  eprint       = {2211.03662},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-03662.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-03218,
  author       = {William J. Buchanan and
                  Mwrwan Abubakar and
                  Owen Lo and
                  Christos Chrysoulas and
                  Nikolaos Pitropakis and
                  Pavlos Papadopoulos and
                  Sarwar Sayeed and
                  Marc Sel},
  title        = {The Future of Integrated Digital Governance in the {EU:} {EBSI} and
                  {GLASS}},
  journal      = {CoRR},
  volume       = {abs/2212.03218},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.03218},
  doi          = {10.48550/ARXIV.2212.03218},
  eprinttype    = {arXiv},
  eprint       = {2212.03218},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-03218.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-08035,
  author       = {Sean McKeown and
                  William J. Buchanan},
  title        = {Hamming Distributions of Popular Perceptual Hashing Techniques},
  journal      = {CoRR},
  volume       = {abs/2212.08035},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.08035},
  doi          = {10.48550/ARXIV.2212.08035},
  eprinttype    = {arXiv},
  eprint       = {2212.08035},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-08035.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimKSBDT21,
  author       = {Tai{-}Hoon Kim and
                  Gulshan Kumar and
                  Rahul Saha and
                  William J. Buchanan and
                  Tannishtha Devgun and
                  Reji Thomas},
  title        = {LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained
                  Environments},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {100972--100980},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3097267},
  doi          = {10.1109/ACCESS.2021.3097267},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KimKSBDT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DaviesMB21,
  author       = {Simon R. Davies and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Differential area analysis for ransomware attack detection within
                  mixed file datasets},
  journal      = {Comput. Secur.},
  volume       = {108},
  pages        = {102377},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102377},
  doi          = {10.1016/J.COSE.2021.102377},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DaviesMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/HughesPPSAB21,
  author       = {Kris Hughes and
                  Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  Adrian Smales and
                  Jawad Ahmad and
                  William J. Buchanan},
  title        = {Browsers' Private Mode: Is It What We Were Promised?},
  journal      = {Comput.},
  volume       = {10},
  number       = {12},
  pages        = {165},
  year         = {2021},
  url          = {https://doi.org/10.3390/computers10120165},
  doi          = {10.3390/COMPUTERS10120165},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computers/HughesPPSAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XuZOFBI21,
  author       = {Hao Xu and
                  Lei Zhang and
                  Oluwakayode Onireti and
                  Yang Fang and
                  William J. Buchanan and
                  Muhammad Ali Imran},
  title        = {BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for
                  {COVID-19} Pandemic and Beyond},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {5},
  pages        = {3915--3929},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3025953},
  doi          = {10.1109/JIOT.2020.3025953},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/XuZOFBI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/PapadopoulosEPCMB21,
  author       = {Pavlos Papadopoulos and
                  Oliver Thornewill von Essen and
                  Nikolaos Pitropakis and
                  Christos Chrysoulas and
                  Alexios Mylonas and
                  William J. Buchanan},
  title        = {Launching Adversarial Attacks against Network Intrusion Detection
                  Systems for IoT},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {2},
  pages        = {252--273},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1020014},
  doi          = {10.3390/JCP1020014},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/PapadopoulosEPCMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/PopovB21,
  author       = {Serguei Popov and
                  William J. Buchanan},
  title        = {{FPC-BI:} Fast Probabilistic Consensus within Byzantine Infrastructures},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {147},
  pages        = {77--86},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jpdc.2020.09.002},
  doi          = {10.1016/J.JPDC.2020.09.002},
  timestamp    = {Sat, 26 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/PopovB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/make/PapadopoulosAHP21,
  author       = {Pavlos Papadopoulos and
                  Will Abramson and
                  Adam J. Hall and
                  Nikolaos Pitropakis and
                  William J. Buchanan},
  title        = {Privacy and Trust Redefined in Federated Machine Learning},
  journal      = {Mach. Learn. Knowl. Extr.},
  volume       = {3},
  number       = {2},
  pages        = {333--356},
  year         = {2021},
  url          = {https://doi.org/10.3390/make3020017},
  doi          = {10.3390/MAKE3020017},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/make/PapadopoulosAHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ChurcherUARMGAN21,
  author       = {Andrew Churcher and
                  Rehmat Ullah and
                  Jawad Ahmad and
                  Sadaqat ur Rehman and
                  Fawad Masood and
                  Mandar Gogate and
                  Fehaid Alqahtani and
                  Boubakr Nour and
                  William J. Buchanan},
  title        = {An Experimental Analysis of Attack Classification Using Machine Learning
                  in IoT Networks},
  journal      = {Sensors},
  volume       = {21},
  number       = {2},
  pages        = {446},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21020446},
  doi          = {10.3390/S21020446},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ChurcherUARMGAN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KellyPMMB21,
  author       = {Christopher Kelly and
                  Nikolaos Pitropakis and
                  Alexios Mylonas and
                  Sean McKeown and
                  William J. Buchanan},
  title        = {A Comparative Analysis of Honeypots on Different Cloud Platforms},
  journal      = {Sensors},
  volume       = {21},
  number       = {7},
  pages        = {2433},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21072433},
  doi          = {10.3390/S21072433},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KellyPMMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KhanKJAJSPB21,
  author       = {Muhammad Almas Khan and
                  Muazzam Ali Khan and
                  Sana Ullah Jan and
                  Jawad Ahmad and
                  Sajjad Shaukat Jamal and
                  Awais Aziz Shah and
                  Nikolaos Pitropakis and
                  William J. Buchanan},
  title        = {A Deep Learning-Based Intrusion Detection System for {MQTT} Enabled
                  IoT},
  journal      = {Sensors},
  volume       = {21},
  number       = {21},
  pages        = {7016},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21217016},
  doi          = {10.3390/S21217016},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KhanKJAJSPB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpa/AbramsonPPB21,
  author       = {Will Abramson and
                  Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  William J. Buchanan},
  title        = {PyDentity: {A} playground for education and experimentation with the
                  Hyperledger verifiable information exchange platform},
  journal      = {Softw. Impacts},
  volume       = {9},
  pages        = {100101},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.simpa.2021.100101},
  doi          = {10.1016/J.SIMPA.2021.100101},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simpa/AbramsonPPB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coins/AbubakarJ0021,
  author       = {Mwrwan Abubakar and
                  Zakwan Jaroucheh and
                  Ahmed Al{-}Dubai and
                  Bill Buchanan},
  title        = {A Decentralised Authentication and Access Control Mechanism for Medical
                  Wearable Sensors Data},
  booktitle    = {2021 {IEEE} International Conference on Omni-Layer Intelligent Systems,
                  {COINS} 2021, Barcelona, Spain, August 23-25, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/COINS51742.2021.9524172},
  doi          = {10.1109/COINS51742.2021.9524172},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/coins/AbubakarJ0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csnet/AbubakarJAB21,
  author       = {Mwrwan Abubakar and
                  Zakwan Jaroucheh and
                  Ahmed Yassin Al{-}Dubai and
                  William J. Buchanan},
  title        = {Blockchain-Based Authentication and Registration Mechanism for SIP-Based
                  VoIP Systems},
  booktitle    = {5th Cyber Security in Networking Conference, CSNet 2021, Abu Dhabi,
                  United Arab Emirates, October 12-14, 2021},
  pages        = {63--70},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSNet52717.2021.9614646},
  doi          = {10.1109/CSNET52717.2021.9614646},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csnet/AbubakarJAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChrysoulasTPPLB21,
  author       = {Christos Chrysoulas and
                  Amanda Thomson and
                  Nikolaos Pitropakis and
                  Pavlos Papadopoulos and
                  Owen Lo and
                  William J. Buchanan and
                  George Domalis and
                  Nikos I. Karacapilidis and
                  Dimitris Tsakalidis and
                  Dimitrios Tsolis},
  editor       = {Sokratis K. Katsikas and
                  Costas Lambrinoudakis and
                  Nora Cuppens and
                  John Mylopoulos and
                  Christos Kalloniatis and
                  Weizhi Meng and
                  Steven Furnell and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge},
  title        = {{GLASS:} Towards Secure and Decentralized eGovernance Services Using
                  {IPFS}},
  booktitle    = {Computer Security. {ESORICS} 2021 International Workshops - CyberICPS,
                  SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT{\&}SECOMANE, Darmstadt,
                  Germany, October 4-8, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13106},
  pages        = {40--57},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95484-0\_3},
  doi          = {10.1007/978-3-030-95484-0\_3},
  timestamp    = {Wed, 09 Nov 2022 13:58:44 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ChrysoulasTPPLB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AbramsonBSPL21,
  author       = {Will Abramson and
                  William J. Buchanan and
                  Sarwar Sayeed and
                  Nikolaos Pitropakis and
                  Owen Lo},
  editor       = {Naghmeh Moradpoor and
                  Atilla El{\c{c}}i and
                  Andrei Petrovski},
  title        = {{PAN-DOMAIN:} Privacy-preserving Sharing and Auditing of Infection
                  Identifier Matching},
  booktitle    = {14th International Conference on Security of Information and Networks,
                  {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SIN54109.2021.9699138},
  doi          = {10.1109/SIN54109.2021.9699138},
  timestamp    = {Wed, 23 Feb 2022 18:55:51 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AbramsonBSPL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AbubakarMJAB21,
  author       = {Mwrwan Abubakar and
                  P{\'{a}}draig McCarron and
                  Zakwan Jaroucheh and
                  Ahmed Yassin Al{-}Dubai and
                  Bill Buchanan},
  editor       = {Naghmeh Moradpoor and
                  Atilla El{\c{c}}i and
                  Andrei Petrovski},
  title        = {Blockchain-based Platform for Secure Sharing and Validation of Vaccination
                  Certificates},
  booktitle    = {14th International Conference on Security of Information and Networks,
                  {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SIN54109.2021.9699221},
  doi          = {10.1109/SIN54109.2021.9699221},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AbubakarMJAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AliPAPJB21,
  author       = {Hisham Ali and
                  Pavlos Papadopoulos and
                  Jawad Ahmad and
                  Nikolaos Pitropakis and
                  Zakwan Jaroucheh and
                  William J. Buchanan},
  editor       = {Naghmeh Moradpoor and
                  Atilla El{\c{c}}i and
                  Andrei Petrovski},
  title        = {Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed
                  Ledgers},
  booktitle    = {14th International Conference on Security of Information and Networks,
                  {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SIN54109.2021.9699366},
  doi          = {10.1109/SIN54109.2021.9699366},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AliPAPJB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/GriersonTPB21,
  author       = {Sam Grierson and
                  Craig Thomson and
                  Pavlos Papadopoulos and
                  Bill Buchanan},
  editor       = {Naghmeh Moradpoor and
                  Atilla El{\c{c}}i and
                  Andrei Petrovski},
  title        = {Min-max Training: Adversarially Robust Learning Models for Network
                  Intrusion Detection Systems},
  booktitle    = {14th International Conference on Security of Information and Networks,
                  {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SIN54109.2021.9699157},
  doi          = {10.1109/SIN54109.2021.9699157},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/GriersonTPB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/MarchandPBL21,
  author       = {Bruno Marchand and
                  Nikolaos Pitropakis and
                  William J. Buchanan and
                  Costas Lambrinoudakis},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis and
                  Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {Launching Adversarial Label Contamination Attacks Against Malicious
                  {URL} Detection},
  booktitle    = {Trust, Privacy and Security in Digital Business - 18th International
                  Conference, TrustBus 2021, Virtual Event, September 27-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12927},
  pages        = {69--82},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86586-3\_5},
  doi          = {10.1007/978-3-030-86586-3\_5},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/MarchandPBL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucc/BaratiBLR21,
  author       = {Masoud Barati and
                  William J. Buchanan and
                  Owen Lo and
                  Omer F. Rana},
  editor       = {Luiz F. Bittencourt and
                  Alan Sill},
  title        = {A privacy-preserving distributed platform for {COVID-19} vaccine passports},
  booktitle    = {{UCC} '21: 2021 {IEEE/ACM} 14th International Conference on Utility
                  and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021
                  - Companion Volume},
  pages        = {16:1--16:6},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3492323.3495626},
  doi          = {10.1145/3492323.3495626},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ucc/BaratiBLR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-12270,
  author       = {Andrew Churcher and
                  Rehmat Ullah and
                  Jawad Ahmad and
                  Sadaqat ur Rehman and
                  Fawad Masood and
                  Mandar Gogate and
                  Fehaid Alqahtani and
                  Boubakr Nour and
                  William J. Buchanan},
  title        = {An Experimental Analysis of Attack Classification Using Machine Learning
                  in IoT Networks},
  journal      = {CoRR},
  volume       = {abs/2101.12270},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.12270},
  eprinttype    = {arXiv},
  eprint       = {2101.12270},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-12270.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-15753,
  author       = {Pavlos Papadopoulos and
                  Will Abramson and
                  Adam J. Hall and
                  Nikolaos Pitropakis and
                  William J. Buchanan},
  title        = {Privacy and Trust Redefined in Federated Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2103.15753},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.15753},
  eprinttype    = {arXiv},
  eprint       = {2103.15753},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-15753.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-12426,
  author       = {Pavlos Papadopoulos and
                  Oliver Thornewill von Essen and
                  Nikolaos Pitropakis and
                  Christos Chrysoulas and
                  Alexios Mylonas and
                  William J. Buchanan},
  title        = {Launching Adversarial Attacks against Network Intrusion Detection
                  Systems for IoT},
  journal      = {CoRR},
  volume       = {abs/2104.12426},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.12426},
  eprinttype    = {arXiv},
  eprint       = {2104.12426},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-12426.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-14418,
  author       = {Simon R. Davies and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Differential Area Analysis for Ransomware Attack Detection within
                  Mixed File Datasets},
  journal      = {CoRR},
  volume       = {abs/2106.14418},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.14418},
  eprinttype    = {arXiv},
  eprint       = {2106.14418},
  timestamp    = {Wed, 30 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-14418.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-15225,
  author       = {Nilupulee Anuradha Gunathilake and
                  Ahmed Al{-}Dubai and
                  William J. Buchanan and
                  Owen Lo},
  title        = {Electromagnetic Analysis of an Ultra-Lightweight Cipher: {PRESENT}},
  journal      = {CoRR},
  volume       = {abs/2106.15225},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.15225},
  eprinttype    = {arXiv},
  eprint       = {2106.15225},
  timestamp    = {Mon, 05 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-15225.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-08566,
  author       = {Christos Chrysoulas and
                  Amanda Thomson and
                  Nikolaos Pitropakis and
                  Pavlos Papadopoulos and
                  Owen Lo and
                  William J. Buchanan and
                  George Domalis and
                  Nikos I. Karacapilidis and
                  Dimitris Tsakalidis and
                  Dimitrios Tsolis},
  title        = {{GLASS:} Towards Secure and Decentralized eGovernance Services using
                  {IPFS}},
  journal      = {CoRR},
  volume       = {abs/2109.08566},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.08566},
  eprinttype    = {arXiv},
  eprint       = {2109.08566},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-08566.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-01970,
  author       = {Edward Henry Young and
                  Christos Chrysoulas and
                  Nikolaos Pitropakis and
                  Pavlos Papadopoulos and
                  William J. Buchanan},
  title        = {Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services
                  After Forensic Seizure},
  journal      = {CoRR},
  volume       = {abs/2110.01970},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.01970},
  eprinttype    = {arXiv},
  eprint       = {2110.01970},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-01970.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-01815,
  author       = {Masoud Barati and
                  William J. Buchanan and
                  Owen Lo and
                  Omer F. Rana},
  title        = {A Privacy-Preserving Platform for Recording {COVID-19} Vaccine Passports},
  journal      = {CoRR},
  volume       = {abs/2112.01815},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.01815},
  eprinttype    = {arXiv},
  eprint       = {2112.01815},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-01815.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-02855,
  author       = {William Abramson and
                  William J. Buchanan and
                  Sarwar Sayeed and
                  Nikolaos Pitropakis and
                  Owen Lo},
  title        = {{PAN-DOMAIN:} Privacy-preserving Sharing and Auditing of Infection
                  Identifier Matching},
  journal      = {CoRR},
  volume       = {abs/2112.02855},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.02855},
  eprinttype    = {arXiv},
  eprint       = {2112.02855},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-02855.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-10092,
  author       = {Hisham Ali and
                  Pavlos Papadopoulos and
                  Jawad Ahmad and
                  Nikolaos Pitropakis and
                  Zakwan Jaroucheh and
                  William J. Buchanan},
  title        = {Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed
                  Ledgers},
  journal      = {CoRR},
  volume       = {abs/2112.10092},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.10092},
  eprinttype    = {arXiv},
  eprint       = {2112.10092},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-10092.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-10124,
  author       = {Mwrwan Abubakar and
                  P{\'{a}}draig McCarron and
                  Zakwan Jaroucheh and
                  Ahmed Al{-}Dubai and
                  William J. Buchanan},
  title        = {Blockchain-based Platform for Secure Sharing and Validation of Vaccination
                  Certificates},
  journal      = {CoRR},
  volume       = {abs/2112.10124},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.10124},
  eprinttype    = {arXiv},
  eprint       = {2112.10124},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-10124.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-12232,
  author       = {Nilupulee Anuradha Gunathilake and
                  Ahmed Al{-}Dubai and
                  William J. Buchanan and
                  Owen Lo},
  title        = {Electromagnetic Side-Channel Attack Resilience against {PRESENT} Lightweight
                  Block Cipher},
  journal      = {CoRR},
  volume       = {abs/2112.12232},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.12232},
  eprinttype    = {arXiv},
  eprint       = {2112.12232},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-12232.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WadhajGTAB20,
  author       = {Isam Wadhaj and
                  Baraq Ghaleb and
                  Craig Thomson and
                  Ahmed Al{-}Dubai and
                  William J. Buchanan},
  title        = {Mitigation Mechanisms Against the {DAO} Attack on the Routing Protocol
                  for Low Power and Lossy Networks {(RPL)}},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {43665--43675},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2977476},
  doi          = {10.1109/ACCESS.2020.2977476},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WadhajGTAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimKSABRGT20,
  author       = {Tai{-}Hoon Kim and
                  Gulshan Kumar and
                  Rahul Saha and
                  Mamoun Alazab and
                  William J. Buchanan and
                  Mritunjay Kumar Rai and
                  G. Geetha and
                  Reji Thomas},
  title        = {{CASCF:} Certificateless Aggregated SignCryption Framework for Internet-of-Things
                  Infrastructure},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {94748--94756},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2995443},
  doi          = {10.1109/ACCESS.2020.2995443},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KimKSABRGT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimKSRBTA20,
  author       = {Tai{-}Hoon Kim and
                  Gulshan Kumar and
                  Rahul Saha and
                  Mritunjay Kumar Rai and
                  William J. Buchanan and
                  Reji Thomas and
                  Mamoun Alazab},
  title        = {A Privacy Preserving Distributed Ledger Framework for Global Human
                  Resource Record Management: The Blockchain Aspect},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {96455--96467},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2995481},
  doi          = {10.1109/ACCESS.2020.2995481},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KimKSRBTA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/QayyumABRAMKB20,
  author       = {Abdullah Qayyum and
                  Jawad Ahmad and
                  Wadii Boulila and
                  Saeed Rubaiee and
                  Arshad Ali and
                  Fawad Masood and
                  Fawad Khan and
                  William J. Buchanan},
  title        = {Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic
                  Substitution},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {140876--140895},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3012912},
  doi          = {10.1109/ACCESS.2020.3012912},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/QayyumABRAMKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanBARRAB20,
  author       = {Jan Sher Khan and
                  Wadii Boulila and
                  Jawad Ahmad and
                  Saeed Rubaiee and
                  Atique Ur Rehman and
                  Roobaea Alroobaea and
                  William J. Buchanan},
  title        = {{DNA} and Plaintext Dependent Chaotic Visual Selective Image Encryption},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {159732--159744},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3020917},
  doi          = {10.1109/ACCESS.2020.3020917},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KhanBARRAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/PapadopoulosPBL20,
  author       = {Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  William J. Buchanan and
                  Owen Lo and
                  Sokratis K. Katsikas},
  title        = {Privacy-Preserving Passive {DNS}},
  journal      = {Comput.},
  volume       = {9},
  number       = {3},
  pages        = {64},
  year         = {2020},
  url          = {https://doi.org/10.3390/computers9030064},
  doi          = {10.3390/COMPUTERS9030064},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/PapadopoulosPBL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DysonBB20,
  author       = {Simon Dyson and
                  William J. Buchanan and
                  Liam Bell},
  title        = {Scenario-based creation and digital investigation of ethereum {ERC20}
                  tokens},
  journal      = {Digit. Investig.},
  volume       = {32},
  pages        = {200894},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200894},
  doi          = {10.1016/J.FSIDI.2019.200894},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DysonBB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DaviesMB20,
  author       = {Simon R. Davies and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Evaluation of live forensic techniques in ransomware attack mitigation},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {300979},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300979},
  doi          = {10.1016/J.FSIDI.2020.300979},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DaviesMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/AhmadTLASHB20,
  author       = {Jawad Ahmad and
                  Ahsen Tahir and
                  Hadi Larijani and
                  Fawad Ahmed and
                  Syed Aziz Shah and
                  Adam James Hall and
                  William J. Buchanan},
  title        = {Energy demand forecasting of buildings using random neural networks},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {38},
  number       = {4},
  pages        = {4753--4765},
  year         = {2020},
  url          = {https://doi.org/10.3233/JIFS-191458},
  doi          = {10.3233/JIFS-191458},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/AhmadTLASHB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/MasoodBAASRB20,
  author       = {Fawad Masood and
                  Wadii Boulila and
                  Jawad Ahmad and
                  Arshad Ali and
                  Syam Sankar and
                  Saeed Rubaiee and
                  William J. Buchanan},
  title        = {A Novel Privacy Approach of Digital Aerial Images Based on Mersenne
                  Twister Method with {DNA} Genetic Encoding and Chaos},
  journal      = {Remote. Sens.},
  volume       = {12},
  number       = {11},
  pages        = {1893},
  year         = {2020},
  url          = {https://doi.org/10.3390/rs12111893},
  doi          = {10.3390/RS12111893},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/MasoodBAASRB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/StamatellisPPKB20,
  author       = {Charalampos S. Stamatellis and
                  Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  Sokratis K. Katsikas and
                  William J. Buchanan},
  title        = {A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric},
  journal      = {Sensors},
  volume       = {20},
  number       = {22},
  pages        = {6587},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20226587},
  doi          = {10.3390/S20226587},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/StamatellisPPKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/KumarSRBT0KR20,
  author       = {Gulshan Kumar and
                  Rahul Saha and
                  Mritunjay Kumar Rai and
                  William J. Buchanan and
                  Reji Thomas and
                  G. Geetha and
                  Tai{-}Hoon Kim and
                  Joel J. P. C. Rodrigues},
  title        = {A Privacy-Preserving Secure Framework for Electric Vehicles in IoT
                  Using Matching Market and Signcryption},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {7},
  pages        = {7707--7722},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2020.2989817},
  doi          = {10.1109/TVT.2020.2989817},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/KumarSRBT0KR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/GunathilakeAB20,
  author       = {Nilupulee Anuradha Gunathilake and
                  Ahmed Al{-}Dubai and
                  William J. Buchanan},
  editor       = {Nur Zincir{-}Heywood and
                  Mehmet Ulema and
                  M{\"{u}}ge Sayit and
                  Stuart Clayman and
                  Myung{-}Sup Kim and
                  Cihat Cetinkaya},
  title        = {Recent Advances and Trends in Lightweight Cryptography for IoT Security},
  booktitle    = {16th International Conference on Network and Service Management, {CNSM}
                  2020, Izmir, Turkey, November 2-6, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/CNSM50824.2020.9269083},
  doi          = {10.23919/CNSM50824.2020.9269083},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsm/GunathilakeAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/JarouchehABL20,
  author       = {Zakwan Jaroucheh and
                  Mohamad Alissa and
                  William J. Buchanan and
                  Xiaodong Liu},
  title        = {{TRUSTD:} Combat Fake Content using Blockchain and Collective Signature
                  Technologies},
  booktitle    = {44th {IEEE} Annual Computers, Software, and Applications Conference,
                  {COMPSAC} 2020, Madrid, Spain, July 13-17, 2020},
  pages        = {1235--1240},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMPSAC48688.2020.00-87},
  doi          = {10.1109/COMPSAC48688.2020.00-87},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/JarouchehABL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/AabyGB020,
  author       = {Peter Aaby and
                  Mario Valerio Giuffrida and
                  William J. Buchanan and
                  Zhiyuan Tan},
  title        = {Towards Continuous User Authentication Using Personalised Touch-Based
                  Behaviour},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22,
                  2020},
  pages        = {41--48},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00023},
  doi          = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH49142.2020.00023},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dasc/AabyGB020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbc2/JarouchehAB20,
  author       = {Zakwan Jaroucheh and
                  Mohamad Alissa and
                  William J. Buchanan},
  title        = {Trust-based Ecosystem to Combat Fake News},
  booktitle    = {{IEEE} International Conference on Blockchain and Cryptocurrency,
                  {ICBC} 2020, Toronto, ON, Canada, May 2-6, 2020},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICBC48266.2020.9169435},
  doi          = {10.1109/ICBC48266.2020.9169435},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icbc2/JarouchehAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BowditchABPH20,
  author       = {William Bowditch and
                  Will Abramson and
                  William J. Buchanan and
                  Nikolaos Pitropakis and
                  Adam J. Hall},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Privacy-preserving Surveillance Methods using Homomorphic Encryption},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {240--248},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008864902400248},
  doi          = {10.5220/0008864902400248},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BowditchABPH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ChristouPPMB20,
  author       = {Orestis Christou and
                  Nikolaos Pitropakis and
                  Pavlos Papadopoulos and
                  Sean McKeown and
                  William J. Buchanan},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Phishing {URL} Detection Through Top-level Domain Analysis: {A} Descriptive
                  Approach},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {289--298},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008902202890298},
  doi          = {10.5220/0008902202890298},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ChristouPPMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsa/JarouchehGB20,
  author       = {Zakwan Jaroucheh and
                  Baraq Ghaleb and
                  William J. Buchanan},
  title        = {SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature
                  Based Consensus Protocol for Strong Consistency in Blockchain},
  booktitle    = {2020 {IEEE} International Conference on Software Architecture Companion,
                  {ICSA} Companion 2020, Salvador, Brazil, March 16-20, 2020},
  pages        = {143--150},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICSA-C50368.2020.00034},
  doi          = {10.1109/ICSA-C50368.2020.00034},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsa/JarouchehGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icvisp/AbubakarJ0020,
  author       = {Mwrwan Abubakar and
                  Zakwan Jaroucheh and
                  Ahmed Al{-}Dubai and
                  Bill Buchanan},
  title        = {PoNW: {A} Secure and Scalable Proof-of-Notarized-Work Based Consensus
                  Mechanism},
  booktitle    = {{ICVISP} 2020: 4th International Conference on Vision, Image and Signal
                  Processing, Bangkok, Thailand, December, 2020},
  pages        = {58:1--58:8},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3448823.3448875},
  doi          = {10.1145/3448823.3448875},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icvisp/AbubakarJ0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sai/KhanTASA0B20,
  author       = {Jan Sher Khan and
                  Ahsen Tahir and
                  Jawad Ahmad and
                  Syed Aziz Shah and
                  Qammer H. Abbasi and
                  Gordon Russell and
                  William J. Buchanan},
  editor       = {Kohei Arai and
                  Supriya Kapoor and
                  Rahul Bhatia},
  title        = {5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural
                  Network Exploiting 5G Spectrum},
  booktitle    = {Intelligent Computing - Proceedings of the 2020 Computing Conference,
                  Volume 3},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1230},
  pages        = {26--36},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-52243-8\_3},
  doi          = {10.1007/978-3-030-52243-8\_3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sai/KhanTASA0B20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/AbramsonHPPB20,
  author       = {Will Abramson and
                  Adam James Hall and
                  Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  William J. Buchanan},
  editor       = {Stefanos Gritzalis and
                  Edgar R. Weippl and
                  Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {A Distributed Trust Framework for Privacy-Preserving Machine Learning},
  booktitle    = {Trust, Privacy and Security in Digital Business - 17th International
                  Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12395},
  pages        = {205--220},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58986-8\_14},
  doi          = {10.1007/978-3-030-58986-8\_14},
  timestamp    = {Mon, 26 Jun 2023 16:42:40 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/AbramsonHPPB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-07897,
  author       = {Will Major and
                  William J. Buchanan and
                  Jawad Ahmad},
  title        = {An authentication protocol based on chaos and zero knowledge proof},
  journal      = {CoRR},
  volume       = {abs/2001.07897},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.07897},
  eprinttype    = {arXiv},
  eprint       = {2001.07897},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-07897.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-05126,
  author       = {Ian Low and
                  William J. Buchanan and
                  Richard J. Macfarlane and
                  Owen Lo},
  title        = {Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture
                  of Bluetooth Through Channel Usage Restriction},
  journal      = {CoRR},
  volume       = {abs/2002.05126},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.05126},
  eprinttype    = {arXiv},
  eprint       = {2002.05126},
  timestamp    = {Fri, 14 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-05126.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-06599,
  author       = {Orestis Christou and
                  Nikolaos Pitropakis and
                  Pavlos Papadopoulos and
                  Sean McKeown and
                  William J. Buchanan},
  title        = {Phishing {URL} Detection Through Top-level Domain Analysis: {A} Descriptive
                  Approach},
  journal      = {CoRR},
  volume       = {abs/2005.06599},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.06599},
  eprinttype    = {arXiv},
  eprint       = {2005.06599},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-06599.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-10103,
  author       = {Hao Xu and
                  Lei Zhang and
                  Oluwakayode Onireti and
                  Yang Fang and
                  William J. Buchanan and
                  Muhammad Ali Imran},
  title        = {BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for
                  {COVID-19} Pandemic and Beyond},
  journal      = {CoRR},
  volume       = {abs/2005.10103},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.10103},
  eprinttype    = {arXiv},
  eprint       = {2005.10103},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-10103.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-00928,
  author       = {Sebastian M{\"{u}}ller and
                  Andreas Penzkofer and
                  Bartosz Kusmierz and
                  Darcy Camargo and
                  William J. Buchanan},
  title        = {Fast Probabilistic Consensus with Weighted Votes},
  journal      = {CoRR},
  volume       = {abs/2006.00928},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.00928},
  eprinttype    = {arXiv},
  eprint       = {2006.00928},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-00928.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-02456,
  author       = {Will Abramson and
                  Adam James Hall and
                  Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  William J. Buchanan},
  title        = {A Distributed Trust Framework for Privacy-Preserving Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2006.02456},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.02456},
  eprinttype    = {arXiv},
  eprint       = {2006.02456},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-02456.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-14864,
  author       = {Will Abramson and
                  Nicole E. van Deursen and
                  William J. Buchanan},
  title        = {Trust-by-Design: Evaluating Issues and Perceptions within Clinical
                  Passporting},
  journal      = {CoRR},
  volume       = {abs/2006.14864},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.14864},
  eprinttype    = {arXiv},
  eprint       = {2006.14864},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-14864.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-05265,
  author       = {Gulshan Kumar and
                  Rahul Saha and
                  William J. Buchanan and
                  G. Geetha and
                  Reji Thomas and
                  Tai{-}Hoon Kim and
                  Mamoun Alazab},
  title        = {Decentralized Accessibility of e-commerce Products through Blockchain
                  Technology},
  journal      = {CoRR},
  volume       = {abs/2007.05265},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.05265},
  eprinttype    = {arXiv},
  eprint       = {2007.05265},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-05265.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-06430,
  author       = {Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  William J. Buchanan and
                  Owen Lo and
                  Sokratis K. Katsikas},
  title        = {Privacy Preserving Passive {DNS}},
  journal      = {CoRR},
  volume       = {abs/2008.06430},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.06430},
  eprinttype    = {arXiv},
  eprint       = {2008.06430},
  timestamp    = {Wed, 21 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-06430.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-06763,
  author       = {Zakwan Jaroucheh and
                  Baraq Ghaleb and
                  William J. Buchanan},
  title        = {SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature
                  Based Consensus Protocol for Strong Consistency in Blockchain},
  journal      = {CoRR},
  volume       = {abs/2008.06763},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.06763},
  eprinttype    = {arXiv},
  eprint       = {2008.06763},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-06763.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-13632,
  author       = {Zakwan Jaroucheh and
                  Mohamad Alissa and
                  William J. Buchanan},
  title        = {{TRUSTD:} Combat Fake Content using Blockchain and Collective Signature
                  Technologies},
  journal      = {CoRR},
  volume       = {abs/2008.13632},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.13632},
  eprinttype    = {arXiv},
  eprint       = {2008.13632},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-13632.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-05126,
  author       = {William J. Buchanan and
                  Muhammad Ali Imran and
                  Masood Ur Rehman and
                  Lei Zhang and
                  Qammer H. Abbasi and
                  Christos Chrysoulas and
                  David Haynes and
                  Nikolaos Pitropakis and
                  Pavlos Papadopoulos},
  title        = {Review and Critical Analysis of Privacy-preserving Infection Tracking
                  and Contact Tracing},
  journal      = {CoRR},
  volume       = {abs/2009.05126},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.05126},
  eprinttype    = {arXiv},
  eprint       = {2009.05126},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-05126.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-09260,
  author       = {Charalampos S. Stamatellis and
                  Pavlos Papadopoulos and
                  Nikolaos Pitropakis and
                  Sokratis K. Katsikas and
                  William J. Buchanan},
  title        = {A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric},
  journal      = {CoRR},
  volume       = {abs/2011.09260},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.09260},
  eprinttype    = {arXiv},
  eprint       = {2011.09260},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-09260.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-08487,
  author       = {Simon R. Davies and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation},
  journal      = {CoRR},
  volume       = {abs/2012.08487},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.08487},
  eprinttype    = {arXiv},
  eprint       = {2012.08487},
  timestamp    = {Sat, 02 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-08487.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SahaGKKB19,
  author       = {Rahul Saha and
                  G. Geetha and
                  Gulshan Kumar and
                  Tai{-}Hoon Kim and
                  William J. Buchanan},
  title        = {{MRC4:} {A} Modified {RC4} Algorithm Using Symmetric Random Function
                  Generator for Improved Cryptographic Features},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {172045--172054},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2956160},
  doi          = {10.1109/ACCESS.2019.2956160},
  timestamp    = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SahaGKKB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimGRKBST19,
  author       = {Tai{-}Hoon Kim and
                  Rekha Goyat and
                  Mritunjay Kumar Rai and
                  Gulshan Kumar and
                  William J. Buchanan and
                  Rahul Saha and
                  Reji Thomas},
  title        = {A Novel Trust Evaluation Process for Secure Localization Using a Decentralized
                  Blockchain in Wireless Sensor Networks},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {184133--184144},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2960609},
  doi          = {10.1109/ACCESS.2019.2960609},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KimGRKBST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/McLarenRBT19,
  author       = {Peter McLaren and
                  Gordon Russell and
                  William J. Buchanan and
                  Zhiyuan Tan},
  title        = {Decrypting live {SSH} traffic in virtual environments},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {109--117},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.03.010},
  doi          = {10.1016/J.DIIN.2019.03.010},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/McLarenRBT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MuirLB19,
  author       = {Matt Muir and
                  Petra Leimich and
                  William J. Buchanan},
  title        = {A Forensic Audit of the Tor Browser Bundle},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {118--128},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.03.009},
  doi          = {10.1016/J.DIIN.2019.03.009},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MuirLB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiCSBC19,
  author       = {Shancang Li and
                  Kim{-}Kwang Raymond Choo and
                  Qindong Sun and
                  William J. Buchanan and
                  Jiuxin Cao},
  title        = {IoT Forensics: Amazon Echo as a Use Case},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {4},
  pages        = {6487--6497},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2906946},
  doi          = {10.1109/JIOT.2019.2906946},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiCSBC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/McLarenBRT19,
  author       = {Peter McLaren and
                  William J. Buchanan and
                  Gordon Russell and
                  Zhiyuan Tan},
  title        = {Deriving ChaCha20 key streams from targeted memory analysis},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102372},
  doi          = {10.1016/J.JISA.2019.102372},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/McLarenBRT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AsifB19,
  author       = {Rameez Asif and
                  William J. Buchanan},
  title        = {Corrigendum to "Quantum-to-the-Home: Achieving Gbits/s Secure
                  Key Rates via Commercial Off-the-Shelf Telecommunication Equipment"},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2637028:1},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2637028},
  doi          = {10.1155/2019/2637028},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AsifB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/LiYZBLR19,
  author       = {Shancang Li and
                  Yong Yuan and
                  Jun Jason Zhang and
                  Bill Buchanan and
                  Erwu Liu and
                  Ramesh Ramadoss},
  title        = {Guest Editorial Special Issue on Blockchain-Based Secure and Trusted
                  Computing for IoT},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {6},
  number       = {6},
  pages        = {1369--1372},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCSS.2019.2954939},
  doi          = {10.1109/TCSS.2019.2954939},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/LiYZBLR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bics/IlyasALKTALKSBH19,
  author       = {Muhammad Ilyas and
                  Jawad Ahmad and
                  Alistair Lawson and
                  Jan Sher Khan and
                  Ahsen Tahir and
                  Ahsan Adeel and
                  Hadi Larijani and
                  Abdelfateh Kerrouche and
                  M. Guftar Shaikh and
                  William J. Buchanan and
                  Amir Hussain},
  editor       = {Jinchang Ren and
                  Amir Hussain and
                  Huimin Zhao and
                  Kaizhu Huang and
                  Jiangbin Zheng and
                  Jun Cai and
                  Rongjun Chen and
                  Yinyin Xiao},
  title        = {Height Prediction for Growth Hormone Deficiency Treatment Planning
                  Using Deep Learning},
  booktitle    = {Advances in Brain Inspired Cognitive Systems - 10th International
                  Conference, {BICS} 2019, Guangzhou, China, July 13-14, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11691},
  pages        = {76--85},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39431-8\_8},
  doi          = {10.1007/978-3-030-39431-8\_8},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bics/IlyasALKTALKSBH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Buchanan19,
  author       = {Bill Buchanan},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Building the Future: Tokenization, Blockchain and Citizen-focused
                  Systems},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {5},
  publisher    = {SciTePress},
  year         = {2019},
  timestamp    = {Thu, 13 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Buchanan19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wf-iot/GunathilakeBA19,
  author       = {Nilupulee Anuradha Gunathilake and
                  William J. Buchanan and
                  Rameez Asif},
  title        = {Next Generation Lightweight Cryptography for Smart IoT Devices: :
                  Implementation, Challenges and Applications},
  booktitle    = {5th {IEEE} World Forum on Internet of Things, WF-IoT 2019, Limerick,
                  Ireland, April 15-18, 2019},
  pages        = {707--710},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WF-IoT.2019.8767250},
  doi          = {10.1109/WF-IOT.2019.8767250},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wf-iot/GunathilakeBA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-10272,
  author       = {Adam James Hall and
                  Nikolaos Pitropakis and
                  William J. Buchanan and
                  Naghmeh Moradpoor},
  title        = {Predicting Malicious Insider Threat Scenarios Using Organizational
                  Data and a Heterogeneous Stack-Classifier},
  journal      = {CoRR},
  volume       = {abs/1907.10272},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.10272},
  eprinttype    = {arXiv},
  eprint       = {1907.10272},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-10272.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-10279,
  author       = {Matt Muir and
                  Petra Leimich and
                  William J. Buchanan},
  title        = {A Forensic Audit of the Tor Browser Bundle},
  journal      = {CoRR},
  volume       = {abs/1907.10279},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.10279},
  eprinttype    = {arXiv},
  eprint       = {1907.10279},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-10279.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-10387,
  author       = {Peter Aaby and
                  Juanjo Mata De Acuna and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Privacy Parameter Variation Using {RAPPOR} on a Malware Dataset},
  journal      = {CoRR},
  volume       = {abs/1907.10387},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.10387},
  eprinttype    = {arXiv},
  eprint       = {1907.10387},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-10387.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-10835,
  author       = {Peter McLaren and
                  Gordon Russell and
                  William J. Buchanan and
                  Zhiyuan Tan},
  title        = {Decrypting live {SSH} traffic in virtual environments},
  journal      = {CoRR},
  volume       = {abs/1907.10835},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.10835},
  eprinttype    = {arXiv},
  eprint       = {1907.10835},
  timestamp    = {Tue, 05 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-10835.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-10855,
  author       = {Shane Murnion and
                  William J. Buchanan and
                  Adrian Smales and
                  Gordon Russell},
  title        = {Machine learning and semantic analysis of in-game chat for cyberbullying},
  journal      = {CoRR},
  volume       = {abs/1907.10855},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.10855},
  eprinttype    = {arXiv},
  eprint       = {1907.10855},
  timestamp    = {Tue, 01 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-10855.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-11445,
  author       = {Pierre Chevalier and
                  Bartlomiej Kaminski and
                  Fraser Hutchison and
                  Qi Ma and
                  Spandan Sharma and
                  Andreas Fackler and
                  William J. Buchanan},
  title        = {Protocol for Asynchronous, Reliable, Secure and Efficient Consensus
                  {(PARSEC)} Version 2.0},
  journal      = {CoRR},
  volume       = {abs/1907.11445},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.11445},
  eprinttype    = {arXiv},
  eprint       = {1907.11445},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-11445.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-11941,
  author       = {Peter McLaren and
                  William J. Buchanan and
                  Gordon Russell and
                  Zhiyuan Tan},
  title        = {Deriving ChaCha20 Key Streams From Targeted Memory Analysis},
  journal      = {CoRR},
  volume       = {abs/1907.11941},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.11941},
  eprinttype    = {arXiv},
  eprint       = {1907.11941},
  timestamp    = {Tue, 05 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-11941.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-11954,
  author       = {Peter McLaren and
                  William J. Buchanan and
                  Gordon Russell and
                  Zhiyuan Tan},
  title        = {Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection
                  Without {A} Priori Knowledge},
  journal      = {CoRR},
  volume       = {abs/1907.11954},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.11954},
  eprinttype    = {arXiv},
  eprint       = {1907.11954},
  timestamp    = {Tue, 05 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-11954.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-12221,
  author       = {Simon Dyson and
                  William J. Buchanan and
                  Liam Bell},
  title        = {The Challenges of Investigating Cryptocurrencies and Blockchain Related
                  Crime},
  journal      = {CoRR},
  volume       = {abs/1907.12221},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.12221},
  eprinttype    = {arXiv},
  eprint       = {1907.12221},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-12221.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-12257,
  author       = {Jon Barton and
                  William J. Buchanan and
                  Will Abramson and
                  Nikolaos Pitropakis},
  title        = {Performance Analysis of {TLS} for Quantum Robust Cryptography on a
                  Constrained Device},
  journal      = {CoRR},
  volume       = {abs/1912.12257},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.12257},
  eprinttype    = {arXiv},
  eprint       = {1912.12257},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-12257.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Tweneboah-Koduah18,
  author       = {Samuel Tweneboah{-}Koduah and
                  William J. Buchanan},
  title        = {Security Risk Assessment of Critical Infrastructure Systems: {A} Comparative
                  Study},
  journal      = {Comput. J.},
  volume       = {61},
  number       = {9},
  pages        = {1389--1406},
  year         = {2018},
  url          = {https://doi.org/10.1093/comjnl/bxy002},
  doi          = {10.1093/COMJNL/BXY002},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/Tweneboah-Koduah18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MurnionBSR18,
  author       = {Shane Murnion and
                  William J. Buchanan and
                  Adrian Smales and
                  Gordon Russell},
  title        = {Machine learning and semantic analysis of in-game chat for cyberbullying},
  journal      = {Comput. Secur.},
  volume       = {76},
  pages        = {197--213},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.02.016},
  doi          = {10.1016/J.COSE.2018.02.016},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MurnionBSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SudozaiSBHZ18,
  author       = {M. A. K. Sudozai and
                  Shahzad Saleem and
                  William J. Buchanan and
                  Nisar Habib and
                  Haleemah Zia},
  title        = {Forensics study of {IMO} call and chat app},
  journal      = {Digit. Investig.},
  volume       = {25},
  pages        = {5--23},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.006},
  doi          = {10.1016/J.DIIN.2018.04.006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SudozaiSBHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BuchananHW18,
  author       = {William J. Buchanan and
                  Scott Helme and
                  Alan Woodward},
  title        = {Analysis of the adoption of security headers in {HTTP}},
  journal      = {{IET} Inf. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {118--126},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-ifs.2016.0621},
  doi          = {10.1049/IET-IFS.2016.0621},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BuchananHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Tweneboah-Koduah18,
  author       = {Samuel Tweneboah{-}Koduah and
                  Francis Atsu and
                  William J. Buchanan},
  title        = {Impact of cyberattacks on stock performance: a comparative study},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {5},
  pages        = {637--652},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-05-2018-0060},
  doi          = {10.1108/ICS-05-2018-0060},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/Tweneboah-Koduah18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LoBGM18,
  author       = {Owen Lo and
                  William J. Buchanan and
                  Paul Griffiths and
                  Richard Macfarlane},
  title        = {Distance Measurement Methods for Improved Insider Threat Detection},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {5906368:1--5906368:18},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/5906368},
  doi          = {10.1155/2018/5906368},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LoBGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LoBC18,
  author       = {Owen Lo and
                  William J. Buchanan and
                  Douglas Carson},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Correlation Power Analysis on the {PRESENT} Block Cipher on an Embedded
                  Device},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {21:1--21:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3232801},
  doi          = {10.1145/3230833.3232801},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LoBC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/HallPBM18,
  author       = {Adam James Hall and
                  Nikolaos Pitropakis and
                  William J. Buchanan and
                  Naghmeh Moradpoor},
  editor       = {Naoki Abe and
                  Huan Liu and
                  Calton Pu and
                  Xiaohua Hu and
                  Nesreen K. Ahmed and
                  Mu Qiao and
                  Yang Song and
                  Donald Kossmann and
                  Bing Liu and
                  Kisung Lee and
                  Jiliang Tang and
                  Jingrui He and
                  Jeffrey S. Saltz},
  title        = {Predicting Malicious Insider Threat Scenarios Using Organizational
                  Data and a Heterogeneous Stack-Classifier},
  booktitle    = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018),
                  Seattle, WA, USA, December 10-13, 2018},
  pages        = {5034--5039},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/BigData.2018.8621922},
  doi          = {10.1109/BIGDATA.2018.8621922},
  timestamp    = {Fri, 19 Nov 2021 16:08:20 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/HallPBM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AabyAMB18,
  author       = {Peter Aaby and
                  Juanjo Mata De Acuna and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Privacy Parameter Variation Using {RAPPOR} on a Malware Dataset},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {938--945},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00133},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00133},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AabyAMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/ThuemmlerRBHB18,
  author       = {Christoph Thuemmler and
                  Claudia Rolffs and
                  Andreas Bollmann and
                  Gerhard Hindricks and
                  William J. Buchanan},
  title        = {Requirements for 5G based telemetric cardiac monitoring},
  booktitle    = {14th International Conference on Wireless and Mobile Computing, Networking
                  and Communications, WiMob 2018, Limassol, Cyprus, October 15-17, 2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WiMOB.2018.8589139},
  doi          = {10.1109/WIMOB.2018.8589139},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wimob/ThuemmlerRBHB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SpyraBE17,
  author       = {Grzegorz Spyra and
                  William J. Buchanan and
                  Elias Ekonomou},
  title        = {Sticky policies approach within cloud computing},
  journal      = {Comput. Secur.},
  volume       = {70},
  pages        = {366--375},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.07.005},
  doi          = {10.1016/J.COSE.2017.07.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SpyraBE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BuchananCM17,
  author       = {William J. Buchanan and
                  Simone Chiale and
                  Richard Macfarlane},
  title        = {A methodology for the security evaluation within third-party Android
                  Marketplaces},
  journal      = {Digit. Investig.},
  volume       = {23},
  pages        = {88--98},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.10.002},
  doi          = {10.1016/J.DIIN.2017.10.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BuchananCM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AsifB17,
  author       = {Rameez Asif and
                  William J. Buchanan},
  title        = {Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial
                  Off-the-Shelf Telecommunication Equipment},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {7616847:1--7616847:10},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/7616847},
  doi          = {10.1155/2017/7616847},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AsifB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/UkwanduBR17,
  author       = {Elochukwu Ukwandu and
                  William J. Buchanan and
                  Gordon Russell},
  title        = {Performance evaluation of a fragmented secret share system},
  booktitle    = {2017 International Conference On Cyber Situational Awareness, Data
                  Analytics And Assessment (Cyber SA), London, United Kingdom, June
                  19-20, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CyberSA.2017.8073396},
  doi          = {10.1109/CYBERSA.2017.8073396},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/UkwanduBR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/UwagboleBF17,
  author       = {Solomon Ogbomon Uwagbole and
                  William J. Buchanan and
                  Lu Fan},
  editor       = {Gareth Howells},
  title        = {An applied pattern-driven corpus to predictive analytics in mitigating
                  {SQL} injection attack},
  booktitle    = {Seventh International Conference on Emerging Security Technologies,
                  {EST} 2017, Canterbury, United Kingdom, September 6-8, 2017},
  pages        = {12--17},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EST.2017.8090392},
  doi          = {10.1109/EST.2017.8090392},
  timestamp    = {Fri, 15 Jul 2022 22:45:24 +0200},
  biburl       = {https://dblp.org/rec/conf/est/UwagboleBF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/UwagboleBF17,
  author       = {Solomon Ogbomon Uwagbole and
                  William J. Buchanan and
                  Lu Fan},
  title        = {Applied Machine Learning predictive analytics to {SQL} Injection Attack
                  detection and prevention},
  booktitle    = {2017 {IFIP/IEEE} Symposium on Integrated Network and Service Management
                  (IM), Lisbon, Portugal, May 8-12, 2017},
  pages        = {1087--1090},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/INM.2017.7987433},
  doi          = {10.23919/INM.2017.7987433},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/im/UwagboleBF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/AsifB17,
  author       = {Rameez Asif and
                  William J. Buchanan},
  editor       = {Yulei Wu and
                  Geyong Min and
                  Nektarios Georgalas and
                  Ahmed Al{-}Dubi and
                  Xiaolong Jin and
                  Laurence T. Yang and
                  Jianhua Ma and
                  Po Yang},
  title        = {Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication
                  Components for End-to-End Data Encryption},
  booktitle    = {2017 {IEEE} International Conference on Internet of Things (iThings)
                  and {IEEE} Green Computing and Communications (GreenCom) and {IEEE}
                  Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data
                  (SmartData), Exeter, United Kingdom, June 21-23, 2017},
  pages        = {910--916},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.140},
  doi          = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2017.140},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/ithings/AsifB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SieklikMB16,
  author       = {Boris Sieklik and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Evaluation of {TFTP} DDoS amplification attack},
  journal      = {Comput. Secur.},
  volume       = {57},
  pages        = {67--92},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2015.09.006},
  doi          = {10.1016/J.COSE.2015.09.006},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SieklikMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeimichHB16,
  author       = {Petra Leimich and
                  Josh Harrison and
                  William J. Buchanan},
  title        = {A {RAM} triage methodology for Hadoop {HDFS} forensics},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {96--109},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.07.003},
  doi          = {10.1016/J.DIIN.2016.07.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LeimichHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/healthcom/BuchananD16,
  author       = {William J. Buchanan and
                  Nicole van Deursen},
  title        = {HI-risk: {A} method to analyse health information risk intelligence},
  booktitle    = {18th {IEEE} International Conference on e-Health Networking, Applications
                  and Services, Healthcom 2016, Munich, Germany, September 14-16, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/HealthCom.2016.7749536},
  doi          = {10.1109/HEALTHCOM.2016.7749536},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/healthcom/BuchananD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/UwagboleBF16,
  author       = {Solomon Ogbomon Uwagbole and
                  William J. Buchanan and
                  Lu Fan},
  editor       = {Sema Oktug and
                  Mehmet Ulema and
                  Cicek Cavdar and
                  Lisandro Zambenedetti Granville and
                  Carlos Raniery Paula dos Santos},
  title        = {Numerical encoding to Tame {SQL} injection attacks},
  booktitle    = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2016, Istanbul, Turkey, April 25-29, 2016},
  pages        = {1253--1256},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NOMS.2016.7502997},
  doi          = {10.1109/NOMS.2016.7502997},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/UwagboleBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PenroseBM15,
  author       = {Philip Penrose and
                  William J. Buchanan and
                  Richard Macfarlane},
  title        = {Fast contraband detection in large capacity disk drives},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S22--S29},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.007},
  doi          = {10.1016/J.DIIN.2015.01.007},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PenroseBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/BuchananLUFR15,
  author       = {William J. Buchanan and
                  David Lanc and
                  Elochukwu Ukwandu and
                  Lu Fan and
                  Gordon Russell},
  title        = {The Future Internet: {A} World of Secret Shares},
  journal      = {Future Internet},
  volume       = {7},
  number       = {4},
  pages        = {445--464},
  year         = {2015},
  url          = {https://doi.org/10.3390/fi7040445},
  doi          = {10.3390/FI7040445},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/BuchananLUFR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/healthcom/BuchananUDFRLT15,
  author       = {William J. Buchanan and
                  Elochukwu Ukwandu and
                  Nicole van Deursen and
                  Lu Fan and
                  Gordon Russell and
                  Owen Lo and
                  Christoph Thuemmler},
  title        = {Secret shares to protect health records in Cloud-based infrastructures},
  booktitle    = {17th International Conference on E-health Networking, Application
                  {\&} Services, HealthCom 2015, Boston, MA, USA, October 14-17,
                  2015},
  pages        = {669--672},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/HealthCom.2015.7454589},
  doi          = {10.1109/HEALTHCOM.2015.7454589},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/healthcom/BuchananUDFRLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/UkwanduBFRL15,
  author       = {Elochukwu Ukwandu and
                  William J. Buchanan and
                  Lu Fan and
                  Gordon Russell and
                  Owen Lo},
  title        = {{RESCUE:} Resilient Secret Sharing Cloud-Based Architecture},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {872--879},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.459},
  doi          = {10.1109/TRUSTCOM.2015.459},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/UkwanduBFRL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ail/KweckaBSR14,
  author       = {Zbigniew Kwecka and
                  William J. Buchanan and
                  Burkhard Schafer and
                  Judith Rauhofer},
  title        = {"I am Spartacus": privacy enhancing technologies, collaborative
                  obfuscation and privacy as a public good},
  journal      = {Artif. Intell. Law},
  volume       = {22},
  number       = {2},
  pages        = {113--139},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10506-014-9155-5},
  doi          = {10.1007/S10506-014-9155-5},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ail/KweckaBSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DeursenBD13,
  author       = {Nicole van Deursen and
                  William J. Buchanan and
                  Alistair Duff},
  title        = {Monitoring information security risks within health care},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {31--45},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.04.005},
  doi          = {10.1016/J.COSE.2013.04.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/DeursenBD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PenroseMB13,
  author       = {Philip Penrose and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Approaches to the classification of high entropy file fragments},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {4},
  pages        = {372--384},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.08.004},
  doi          = {10.1016/J.DIIN.2013.08.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PenroseMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/BuchananKE13,
  author       = {William J. Buchanan and
                  Zbigniew Kwecka and
                  Elias Ekonomou},
  title        = {A Privacy Preserving Method Using Privacy Enhancing Techniques for
                  Location Based Services},
  journal      = {Mob. Networks Appl.},
  volume       = {18},
  number       = {5},
  pages        = {728--737},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11036-012-0362-6},
  doi          = {10.1007/S11036-012-0362-6},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/BuchananKE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/KweckaBSR13,
  author       = {Zbigniew Kwecka and
                  William J. Buchanan and
                  Burkhard Schafer and
                  Judith Rauhofer},
  editor       = {Matthias Horbach},
  title        = {Schutz der Anonymit{\"{a}}t als Gemeinschaftsaufgabe - eine neue
                  Generation von PETs?},
  booktitle    = {43. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik
                  angepasst an Mensch, Organisation und Umwelt, {INFORMATIK} 2013, Koblenz,
                  Germany, September 16-20, 2013},
  series       = {{LNI}},
  volume       = {{P-220}},
  pages        = {2134--2148},
  publisher    = {{GI}},
  year         = {2013},
  url          = {https://dl.gi.de/handle/20.500.12116/20645},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/KweckaBSR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/healthcom/ThuemmlerMBBPFFGJMIKKSGBCP13,
  author       = {Christoph Thuemmler and
                  Oli H. Mival and
                  David Benyon and
                  William J. Buchanan and
                  Alois Paulin and
                  Samuel A. Fricker and
                  Markus Fiedler and
                  Astrid Gr{\o}ttland and
                  Thomas Jell and
                  Thomas Magedanz and
                  Ioana Ispas and
                  Bert{-}Jaap Koops and
                  Eleni Kosta and
                  Armin Schneider and
                  Anastasius Gavras and
                  Maria Barros and
                  Philippe Cousin and
                  Euripides G. M. Petrakis},
  title        = {Norms and standards in modular medical architectures},
  booktitle    = {{IEEE} 15th International Conference on e-Health Networking, Applications
                  and Services, Healthcom 2013, Lisbon, Portugal, October 9-12, 2013},
  pages        = {382--387},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/HealthCom.2013.6720705},
  doi          = {10.1109/HEALTHCOM.2013.6720705},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/healthcom/ThuemmlerMBBPFFGJMIKKSGBCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MacfarlaneBEUFL12,
  author       = {Richard Macfarlane and
                  William J. Buchanan and
                  Elias Ekonomou and
                  Omair Uthmani and
                  Lu Fan and
                  Owen Lo},
  title        = {Formal security policy implementations in network firewalls},
  journal      = {Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {253--270},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.cose.2011.10.003},
  doi          = {10.1016/J.COSE.2011.10.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MacfarlaneBEUFL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ThuemmlerFBLEK12,
  author       = {Christoph Thuemmler and
                  Lu Fan and
                  William J. Buchanan and
                  Owen Lo and
                  Elias Ekonomou and
                  Abou Sofyane Khedim},
  title        = {E-Health: Chances and Challenges of Distributed, Service oriented
                  Architectures},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {1},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ThuemmlerFBLEK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jurix/BuchananFLSSTU12,
  author       = {William J. Buchanan and
                  Lu Fan and
                  Alistair Lawson and
                  Burkhard Schafer and
                  Russel Scott and
                  Christoph Thuemmler and
                  Omair Uthmani},
  editor       = {Burkhard Sch{\"{a}}fer},
  title        = {Computational data protection law: trusting each other offline and
                  online},
  booktitle    = {Legal Knowledge and Information Systems - {JURIX} 2012: The Twenty-Fifth
                  Annual Conference, University of Amsterdam, The Netherlands, 17-19
                  December 2012},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {250},
  pages        = {31--40},
  publisher    = {{IOS} Press},
  year         = {2012},
  url          = {https://doi.org/10.3233/978-1-61499-167-0-31},
  doi          = {10.3233/978-1-61499-167-0-31},
  timestamp    = {Fri, 04 Jun 2021 08:32:02 +0200},
  biburl       = {https://dblp.org/rec/conf/jurix/BuchananFLSSTU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wts/KhalafAB12,
  author       = {Mustafa Bani Khalaf and
                  Ahmed Yassin Al{-}Dubai and
                  William J. Buchanan},
  editor       = {Steven R. Powell and
                  Thomas Ketseoglou and
                  J. P. Shim and
                  Michael R. Bartolacci and
                  Robert Stewart},
  title        = {A new efficient distributed route discovery for wireless mobile ad
                  hoc networks},
  booktitle    = {2012 Wireless Telecommunications Symposium, {WTS} 2012, London, United
                  Kingdom, April 18-20, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WTS.2012.6266129},
  doi          = {10.1109/WTS.2012.6266129},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/wts/KhalafAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitsa/KweckaB11,
  author       = {Zbigniew Kwecka and
                  William J. Buchanan},
  title        = {Minimising Collateral Damage: Privacy-Preserving Investigative Data
                  Acquisition Platform},
  journal      = {Int. J. Inf. Technol. Syst. Approach},
  volume       = {4},
  number       = {2},
  pages        = {12--31},
  year         = {2011},
  url          = {https://doi.org/10.4018/jitsa.2011070102},
  doi          = {10.4018/JITSA.2011070102},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitsa/KweckaB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/FanBTLKULB11,
  author       = {Lu Fan and
                  William J. Buchanan and
                  Christoph Th{\"{u}}mmler and
                  Owen Lo and
                  Abou Sofyane Khedim and
                  Omair Uthmani and
                  Alistair Lawson and
                  Derek Bell},
  editor       = {Ling Liu and
                  Manish Parashar},
  title        = {{DACAR} Platform for eHealth Services Cloud},
  booktitle    = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011,
                  Washington, DC, USA, 4-9 July, 2011},
  pages        = {219--226},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CLOUD.2011.31},
  doi          = {10.1109/CLOUD.2011.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/FanBTLKULB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/EkonomouFBT11,
  author       = {Elias Ekonomou and
                  Lu Fan and
                  William J. Buchanan and
                  Christoph Th{\"{u}}mmler},
  editor       = {Costas Lambrinoudakis and
                  Panagiotis Rizomiliotis and
                  Tomasz Wiktor Wlodarczyk},
  title        = {An Integrated Cloud-based Healthcare Infrastructure},
  booktitle    = {{IEEE} 3rd International Conference on Cloud Computing Technology
                  and Science, CloudCom 2011, Athens, Greece, November 29 - December
                  1, 2011},
  pages        = {532--536},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CloudCom.2011.80},
  doi          = {10.1109/CLOUDCOM.2011.80},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/EkonomouFBT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/Al-DubaiMOJB10,
  author       = {Ahmed Yassin Al{-}Dubai and
                  Geyong Min and
                  Mohamed Ould{-}Khaoua and
                  Xiaolong Jin and
                  William J. Buchanan},
  title        = {Special issue: Performance evaluation and optimization of ubiquitous
                  computing and networked systems},
  journal      = {J. Syst. Softw.},
  volume       = {83},
  number       = {8},
  pages        = {1299--1300},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.jss.2010.03.028},
  doi          = {10.1016/J.JSS.2010.03.028},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/Al-DubaiMOJB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/MigasB10,
  author       = {Nikos Migas and
                  William J. Buchanan},
  title        = {\emph{Ad hoc} routing metrics and applied weighting for QoS support},
  journal      = {Int. J. Parallel Emergent Distributed Syst.},
  volume       = {25},
  number       = {4},
  pages        = {293--314},
  year         = {2010},
  url          = {https://doi.org/10.1080/17445760902894704},
  doi          = {10.1080/17445760902894704},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/paapp/MigasB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jurix/BuchananFLSSTU10,
  author       = {William J. Buchanan and
                  Lu Fan and
                  Alistair Lawson and
                  Burkhard Schafer and
                  Russel Scott and
                  Christoph Thuemmler and
                  Omair Uthmani},
  editor       = {Radboud Winkels},
  title        = {Interagency data exchange protocols as computational data protection
                  law},
  booktitle    = {Legal Knowledge and Information Systems - {JURIX} 2010: The Twenty-Third
                  Annual Conference on Legal Knowledge and Information Systems, Liverpool,
                  UK, 16-17 December 2010},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {223},
  pages        = {143--146},
  publisher    = {{IOS} Press},
  year         = {2010},
  url          = {https://doi.org/10.3233/978-1-60750-682-9-143},
  doi          = {10.3233/978-1-60750-682-9-143},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/jurix/BuchananFLSSTU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/GarriguesMBRB09,
  author       = {Carles Garrigues and
                  Nikos Migas and
                  William J. Buchanan and
                  Sergi Robles and
                  Joan Borrell},
  title        = {Protecting mobile agents from external replay attacks},
  journal      = {J. Syst. Softw.},
  volume       = {82},
  number       = {2},
  pages        = {197--206},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jss.2008.05.018},
  doi          = {10.1016/J.JSS.2008.05.018},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/GarriguesMBRB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/MigasB08,
  author       = {Nikos Migas and
                  William J. Buchanan},
  title        = {Ad-hoc Routing Metrics and Applied Weighting for QoS support},
  booktitle    = {22nd {IEEE} International Symposium on Parallel and Distributed Processing,
                  {IPDPS} 2008, Miami, Florida USA, April 14-18, 2008},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/IPDPS.2008.4536496},
  doi          = {10.1109/IPDPS.2008.4536496},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/MigasB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/MigasABM07,
  author       = {Nikos Migas and
                  Constantia Anastasiadou and
                  William J. Buchanan and
                  Jim Marshall},
  editor       = {Hubert {\"{O}}sterle and
                  Joachim Schelp and
                  Robert Winter},
  title        = {Mass Customisation through Personalised Brochures: The Role of Emerging
                  Technologies},
  booktitle    = {Proceedings of the Fifteenth European Conference on Information Systems,
                  {ECIS} 2007, St. Gallen, Switzerland, 2007},
  pages        = {2283--2294},
  publisher    = {University of St. Gallen},
  year         = {2007},
  url          = {http://aisel.aisnet.org/ecis2007/82},
  timestamp    = {Wed, 24 Jul 2019 16:44:05 +0200},
  biburl       = {https://dblp.org/rec/conf/ecis/MigasABM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/BuchananMSA06,
  author       = {William J. Buchanan and
                  Nikos Migas and
                  G. Sinclair and
                  Kevin A. McArtney},
  title        = {Analysis of an agent-based metric-driven method for ad-hoc, on-demand
                  routing},
  journal      = {Ad Hoc Networks},
  volume       = {4},
  number       = {2},
  pages        = {147--167},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.adhoc.2004.04.009},
  doi          = {10.1016/J.ADHOC.2004.04.009},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/BuchananMSA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bjet/Buchanan06,
  author       = {William J. Buchanan},
  title        = {Correlation between academic and skills-based tests in computer networks},
  journal      = {Br. J. Educ. Technol.},
  volume       = {37},
  number       = {1},
  pages        = {69--78},
  year         = {2006},
  url          = {https://doi.org/10.1111/j.1467-8535.2005.00476.x},
  doi          = {10.1111/J.1467-8535.2005.00476.X},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bjet/Buchanan06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AbimbolaMB06,
  author       = {A. A. Abimbola and
                  Jose Munoz and
                  William J. Buchanan},
  title        = {NetHost-Sensor: Investigating the capture of end-to-end encrypted
                  intrusive data},
  journal      = {Comput. Secur.},
  volume       = {25},
  number       = {6},
  pages        = {445--451},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.cose.2006.04.001},
  doi          = {10.1016/J.COSE.2006.04.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AbimbolaMB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AbimbolaMB06,
  author       = {A. A. Abimbola and
                  J. M. Munoz and
                  William J. Buchanan},
  title        = {NetHost-sensor: Monitoring a target host's application via system
                  calls},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {4},
  pages        = {166--175},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.10.003},
  doi          = {10.1016/J.ISTR.2006.10.003},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AbimbolaMB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/MigasB06,
  author       = {Nikos Migas and
                  William J. Buchanan},
  title        = {An auto-Configurable, and, Adaptable, Metric-driven Cluster-head Organisation
                  for Hybrid Multi-hop Routing},
  booktitle    = {13th Annual {IEEE} International Conference and Workshop on Engineering
                  of Computer Based Systems {(ECBS} 2006), 27-30 March 2006, Potsdam,
                  Germany},
  pages        = {13--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ECBS.2006.23},
  doi          = {10.1109/ECBS.2006.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecbs/MigasB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icns/AbimbolaMB06,
  author       = {A. A. Abimbola and
                  Jose Munoz and
                  William J. Buchanan},
  title        = {Investigating False Positive Reduction in {HTTP} via Procedure Analysis},
  booktitle    = {2006 International Conference on Networking and Services {(ICNS} 2006),
                  16-21 July 2006, Silicon Valley, California, {USA}},
  pages        = {87},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICNS.2006.65},
  doi          = {10.1109/ICNS.2006.65},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icns/AbimbolaMB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/BuchananMR05,
  author       = {William J. Buchanan and
                  Jose Munoz and
                  Kashif Ali Raja},
  title        = {Critical analysis and error determination of locating-finding techniques
                  in {GSM}},
  journal      = {Int. J. Mob. Commun.},
  volume       = {3},
  number       = {2},
  pages        = {165--182},
  year         = {2005},
  url          = {https://doi.org/10.1504/IJMC.2005.005905},
  doi          = {10.1504/IJMC.2005.005905},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmc/BuchananMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/MigasB05,
  author       = {Nikos Migas and
                  William J. Buchanan},
  title        = {Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices
                  in Cluster-Based Ad Hoc Routing},
  booktitle    = {12th {IEEE} International Conference on the Engineering of Computer-Based
                  Systems {(ECBS} 2005), 4-7 April 2005, Greenbelt, MD, {USA}},
  pages        = {147--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ECBS.2005.51},
  doi          = {10.1109/ECBS.2005.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecbs/MigasB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/BuchananGSSM05,
  author       = {William J. Buchanan and
                  Jamie Graves and
                  Lionel Saliou and
                  Hussain Al Sebea and
                  Nikos Migas},
  title        = {Agent-based Forensic Investigations with an Integrated Framework},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {47--52},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Tue, 06 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/BuchananGSSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/SaliouBGM05,
  author       = {Lionel Saliou and
                  William J. Buchanan and
                  Jamie Graves and
                  Jose Munoz},
  title        = {Novel Framework for Automated Security Abstraction, Modelling, Implementation
                  and Verification},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {303--312},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/SaliouBGM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/MigasBM04,
  author       = {Nikos Migas and
                  William J. Buchanan and
                  Kevin A. McArtney},
  title        = {Migration of Mobile Agents in Ad-hoc, Wireless Networks},
  booktitle    = {11th {IEEE} International Conference on the Engineering of Computer-Based
                  Systems {(ECBS} 2004), 24-27 May 2004, Brno, Czech Republic},
  pages        = {530--535},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ECBS.2004.1316743},
  doi          = {10.1109/ECBS.2004.1316743},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecbs/MigasBM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/MigasBA03,
  author       = {Nikos Migas and
                  William J. Buchanan and
                  Kevin A. McArtney},
  title        = {Mobile Agents for Routing, Topology Discovery, and Automatic Network
                  Reconfiguration in Ad-Hoc Networks},
  booktitle    = {10th {IEEE} International Conference on Engineering of Computer-Based
                  Systems {(ECBS} 2003), 7-10 April 2003, Huntsville, AL, {USA}},
  pages        = {200--206},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ECBS.2003.1194800},
  doi          = {10.1109/ECBS.2003.1194800},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecbs/MigasBA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iadis/MigasBA03,
  author       = {Nikos Migas and
                  William J. Buchanan and
                  Kevin A. McArtney},
  title        = {{MARIAN:} {A} Framework Using Mobile Agents for Routing in Ad-Hoc
                  Networks},
  booktitle    = {Proceedings of the {IADIS} International Conference WWW/Internet 2003,
                  {ICWI} 2003, Algarve, Portugal, November 5-8, 2003},
  pages        = {1129--1134},
  publisher    = {{IADIS}},
  year         = {2003},
  timestamp    = {Thu, 12 Jul 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iadis/MigasBA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Buchanan02,
  author       = {William J. Buchanan},
  title        = {The Complete Handbook of the Internet},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-0-306-48331-8},
  doi          = {10.1007/978-0-306-48331-8},
  isbn         = {978-1-4613-4999-0},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Buchanan02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/PikoulasBMT02,
  author       = {John Pikoulas and
                  William J. Buchanan and
                  Mike Mannion and
                  Kostas Triantafyllopoulos},
  title        = {An Intelligent Agent Security Intrusion System},
  booktitle    = {9th {IEEE} International Conference on Engineering of Computer-Based
                  Systems {(ECBS} 2002), 8-11 April 2002, Lund, Sweden},
  pages        = {94},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ECBS.2002.999827},
  doi          = {10.1109/ECBS.2002.999827},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecbs/PikoulasBMT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0000778,
  author       = {William J. Buchanan and
                  Austin Wilson},
  title        = {Advanced {PC} architecture},
  publisher    = {Addison-Wesley-Longman},
  year         = {2001},
  isbn         = {978-0-201-39858-8},
  timestamp    = {Wed, 02 Feb 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0000778.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/PikoulasBMT01,
  author       = {John Pikoulas and
                  William J. Buchanan and
                  Mike Mannion and
                  Kostas Triantafyllopoulos},
  title        = {An Agent-Based Bayesian Forecasting Model for Enhanced Network Security},
  booktitle    = {8th {IEEE} International Conference on Engineering of Computer-Based
                  Systems {(ECBS} 2001), 17-20 April 2001, Washington, DC, {USA}},
  pages        = {247--254},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ECBS.2001.922429},
  doi          = {10.1109/ECBS.2001.922429},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecbs/PikoulasBMT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0002937,
  author       = {William J. Buchanan},
  title        = {Computer busses - design and application},
  publisher    = {Arnold},
  year         = {2000},
  isbn         = {978-0-340-74076-7},
  timestamp    = {Mon, 18 Apr 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0002937.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/ScottB00,
  author       = {A. V. Scott and
                  William J. Buchanan},
  title        = {Truly Distributed Control Systems using Fieldbus Technology},
  booktitle    = {7th {IEEE} International Symposium on Engineering of Computer-Based
                  Systems {(ECBS} 2000), 3-7 April 2000, Edinburgh, Scotland, {UK}},
  pages        = {165},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ECBS.2000.839874},
  doi          = {10.1109/ECBS.2000.839874},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecbs/ScottB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/PikoulasMB00,
  author       = {John Pikoulas and
                  Mike Mannion and
                  William J. Buchanan},
  title        = {Software Agents and Computer Network Security},
  booktitle    = {7th {IEEE} International Symposium on Engineering of Computer-Based
                  Systems {(ECBS} 2000), 3-7 April 2000, Edinburgh, Scotland, {UK}},
  pages        = {211--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ECBS.2000.839879},
  doi          = {10.1109/ECBS.2000.839879},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecbs/PikoulasMB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/BuchananNS00,
  author       = {William J. Buchanan and
                  M. Naylor and
                  A. V. Scott},
  title        = {Enhancing Network Management using Mobile Agents},
  booktitle    = {7th {IEEE} International Symposium on Engineering of Computer-Based
                  Systems {(ECBS} 2000), 3-7 April 2000, Edinburgh, Scotland, {UK}},
  pages        = {218},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ECBS.2000.839880},
  doi          = {10.1109/ECBS.2000.839880},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecbs/BuchananNS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Buchanan96,
  author       = {William J. Buchanan},
  title        = {Analysis of electromagnetic wave propagation using 3D finite-difference
                  time-domain methods with parallel processing},
  school       = {Edinburgh Napier University, {UK}},
  year         = {1996},
  url          = {http://researchrepository.napier.ac.uk/4022/},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Buchanan96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics