Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: William J. Buchanan
@article{DBLP:journals/access/AlshehriAAQGB24, author = {Mohammed S. Alshehri and Jawad Ahmad and Sultan Almakdi and Mimonah Al Qathrady and Yazeed Yasin Ghadi and William J. Buchanan}, title = {SkipGateNet: {A} Lightweight {CNN-LSTM} Hybrid Model With Learnable Skip Connections for Efficient Botnet Attack Detection in IoT}, journal = {{IEEE} Access}, volume = {12}, pages = {35521--35538}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3371992}, doi = {10.1109/ACCESS.2024.3371992}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AlshehriAAQGB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BhattiSAPSKBK24, author = {David Samuel Bhatti and Shahzad Saleem and Zulfiqar Ali and Tae{-}Jin Park and Beomkyu Suh and Ali Kamran and William J. Buchanan and Ki{-}Il Kim}, title = {Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks}, journal = {{IEEE} Access}, volume = {12}, pages = {41499--41516}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3377144}, doi = {10.1109/ACCESS.2024.3377144}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BhattiSAPSKBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ElmigerLPB24, author = {Marius Elmiger and Mouad Lemoudden and Nikolaos Pitropakis and William J. Buchanan}, title = {Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {1}, pages = {467--485}, year = {2024}, url = {https://doi.org/10.1007/s10207-023-00751-6}, doi = {10.1007/S10207-023-00751-6}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ElmigerLPB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BuchananGU24, author = {William J. Buchanan and Sam Grierson and Daniel Uribe}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {226--233}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012454300003648}, doi = {10.5220/0012454300003648}, timestamp = {Tue, 02 Apr 2024 14:37:52 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BuchananGU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-04707, author = {Muhammad Shahbaz Khan and Jawad Ahmad and Ahmed Al{-}Dubai and Baraq Ghaleb and Nikolaos Pitropakis and William J. Buchanan}, title = {RNA-TransCrypt: Image Encryption Using Chaotic {RNA} Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations}, journal = {CoRR}, volume = {abs/2401.04707}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.04707}, doi = {10.48550/ARXIV.2401.04707}, eprinttype = {arXiv}, eprint = {2401.04707}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-04707.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-07691, author = {William J. Buchanan and Sam Grierson and Daniel Uribe}, title = {Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) using Bilinear Group Accumulators in Batch Mode}, journal = {CoRR}, volume = {abs/2401.07691}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.07691}, doi = {10.48550/ARXIV.2401.07691}, eprinttype = {arXiv}, eprint = {2401.07691}, timestamp = {Thu, 01 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-07691.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-05210, author = {Lakshmi Rama Kiran Pasumarthy and Hisham Ali and William J. Buchanan and Jawad Ahmad and Audun J{\o}sang and Vasileios Mavroeidis and Mouad Lemoudden}, title = {{TIPS:} Threat Sharing Information Platform for Enhanced Security}, journal = {CoRR}, volume = {abs/2403.05210}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.05210}, doi = {10.48550/ARXIV.2403.05210}, eprinttype = {arXiv}, eprint = {2403.05210}, timestamp = {Wed, 03 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-05210.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-05271, author = {Dimitrios Kasimatis and Sam Grierson and William J. Buchanan and Chris Eckl and Pavlos Papadopoulos and Nikolaos Pitropakis and Craig Thomson and Baraq Ghaleb}, title = {{DID:} {RING:} Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity}, journal = {CoRR}, volume = {abs/2403.05271}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.05271}, doi = {10.48550/ARXIV.2403.05271}, eprinttype = {arXiv}, eprint = {2403.05271}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-05271.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-05275, author = {Se Elnour and William J. Buchanan and Paul Keating and Mwrwan Abubakar and Sirag Elnour}, title = {vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election}, journal = {CoRR}, volume = {abs/2403.05275}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.05275}, doi = {10.48550/ARXIV.2403.05275}, eprinttype = {arXiv}, eprint = {2403.05275}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-05275.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-08701, author = {Yagmur Yigit and William J. Buchanan and Madjid G. Tehrani and Leandros Maglaras}, title = {Review of Generative {AI} Methods in Cybersecurity}, journal = {CoRR}, volume = {abs/2403.08701}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.08701}, doi = {10.48550/ARXIV.2403.08701}, eprinttype = {arXiv}, eprint = {2403.08701}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-08701.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-17571, author = {Salko Korac and Leandros Maglaras and Naghmeh Moradpoor and Bill Buchanan and Berk Canberk}, title = {Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems}, journal = {CoRR}, volume = {abs/2403.17571}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.17571}, doi = {10.48550/ARXIV.2403.17571}, eprinttype = {arXiv}, eprint = {2403.17571}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-17571.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AabyGBT23, author = {Peter Aaby and Mario Valerio Giuffrida and William J. Buchanan and Zhiyuan Tan}, title = {An omnidirectional approach to touch-based continuous authentication}, journal = {Comput. Secur.}, volume = {128}, pages = {103146}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103146}, doi = {10.1016/J.COSE.2023.103146}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AabyGBT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HaddadPCLB23, author = {Joseph Haddad and Nikolaos Pitropakis and Christos Chrysoulas and Mouad Lemoudden and William J. Buchanan}, title = {Attacking Windows Hello for Business: Is It What We Were Promised?}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {9}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010009}, doi = {10.3390/CRYPTOGRAPHY7010009}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/HaddadPCLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HolmesB23, author = {Arran Holmes and William J. Buchanan}, title = {A framework for live host-based Bitcoin wallet forensics and triage}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, pages = {301486}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2022.301486}, doi = {10.1016/J.FSIDI.2022.301486}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HolmesB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/McKeownB23, author = {Sean McKeown and William J. Buchanan}, title = {Hamming distributions of popular perceptual hashing techniques}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301509}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301509}, doi = {10.1016/J.FSIDI.2023.301509}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/McKeownB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/HasselgrenCPB23, author = {Ben Hasselgren and Christos Chrysoulas and Nikolaos Pitropakis and William J. Buchanan}, title = {Using Social Media {\&} Sentiment Analysis to Make Investment Decisions}, journal = {Future Internet}, volume = {15}, number = {1}, pages = {5}, year = {2023}, url = {https://doi.org/10.3390/fi15010005}, doi = {10.3390/FI15010005}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/HasselgrenCPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/AhmedR0KB0LB23, author = {Fawad Ahmed and Muneeb Ur Rehman and Jawad Ahmad and Muhammad Shahbaz Khan and Wadii Boulila and Gautam Srivastava and Jerry Chun{-}Wei Lin and William J. Buchanan}, title = {A {DNA} Based Colour Image Encryption Scheme Using {A} Convolutional Autoencoder}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {19}, number = {3s}, pages = {128:1--128:21}, year = {2023}, url = {https://doi.org/10.1145/3570165}, doi = {10.1145/3570165}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/AhmedR0KB0LB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/SahaKDBTAHR23, author = {Rahul Saha and Gulshan Kumar and Tannishtha Devgun and William J. Buchanan and Reji Thomas and Mamoun Alazab and Tai{-}Hoon Kim and Joel J. P. C. Rodrigues}, title = {A Blockchain Framework in Post-Quantum Decentralization}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {1}, pages = {1--12}, year = {2023}, url = {https://doi.org/10.1109/TSC.2021.3116896}, doi = {10.1109/TSC.2021.3116896}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/SahaKDBTAHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SayeedPBMPP23, author = {Sarwar Sayeed and Nikolaos Pitropakis and William J. Buchanan and Evangelos K. Markakis and Dimitra Papatsaroucha and Ilias Politis}, title = {{TRUSTEE:} Towards the creation of secure, trustworthy and privacy-preserving framework}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {145:1--145:10}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3604997}, doi = {10.1145/3600160.3604997}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SayeedPBMPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdta/AbubakarGBO23, author = {Mwrwan Abubakar and Nilupulee Anuradha Gunathilake and William J. Buchanan and Brian O'Reilly}, editor = {Zhiyuan Tan and Yulei Wu and Min Xu}, title = {A Review of the Non-Fungible Tokens {(NFT):} Challenges and Opportunities}, booktitle = {Big Data Technologies and Applications - 13th {EAI} International Conference, {BDTA} 2023, Edinburgh, UK, August 23-24, 2023, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {555}, pages = {171--190}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52265-9\_12}, doi = {10.1007/978-3-031-52265-9\_12}, timestamp = {Wed, 07 Feb 2024 17:33:12 +0100}, biburl = {https://dblp.org/rec/conf/bdta/AbubakarGBO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/camad/ThaelerYMBMR23, author = {Andrew Thaeler and Yagmur Yigit and Leandros Maglaras and William J. Buchanan and Naghmeh Moradpoor and Gordon Russell}, title = {Enhancing Mac {OS} Malware Detection through Machine Learning and Mach-O File Analysis}, booktitle = {28th {IEEE} International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , {CAMAD} 2023, Edinburgh, United Kingdom, November 6-8, 2023}, pages = {170--175}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CAMAD59638.2023.10478430}, doi = {10.1109/CAMAD59638.2023.10478430}, timestamp = {Thu, 11 Apr 2024 08:58:17 +0200}, biburl = {https://dblp.org/rec/conf/camad/ThaelerYMBMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/camad/GriersonBTGME23, author = {Sam Grierson and William J. Buchanan and Craig Thomson and Baraq Ghaleb and Leandros Maglaras and Chris Eckl}, title = {Scalable Multi-domain Trust Infrastructures for Segmented Networks}, booktitle = {28th {IEEE} International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , {CAMAD} 2023, Edinburgh, United Kingdom, November 6-8, 2023}, pages = {182--187}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CAMAD59638.2023.10478427}, doi = {10.1109/CAMAD59638.2023.10478427}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/camad/GriersonBTGME23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/camad/KhanAAJPB23, author = {Muhammad Shahbaz Khan and Jawad Ahmad and Ahmed Al{-}Dubai and Zakwan Jaroucheh and Nikolaos Pitropakis and William J. Buchanan}, title = {PermutEx: Feature-Extraction-Based Permutation - {A} New Diffusion Scheme for Image Encryption Algorithms}, booktitle = {28th {IEEE} International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , {CAMAD} 2023, Edinburgh, United Kingdom, November 6-8, 2023}, pages = {188--193}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CAMAD59638.2023.10478378}, doi = {10.1109/CAMAD59638.2023.10478378}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/camad/KhanAAJPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/camad/GriersonCBM23, author = {Sam Grierson and Konstantinos Chalkias and William J. Buchanan and Leandros Maglaras}, title = {Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations}, booktitle = {28th {IEEE} International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , {CAMAD} 2023, Edinburgh, United Kingdom, November 6-8, 2023}, pages = {194--199}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CAMAD59638.2023.10478409}, doi = {10.1109/CAMAD59638.2023.10478409}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/camad/GriersonCBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/camad/AliAABJ23, author = {Hisham Ali and Mwrwan Abubakar and Jawad Ahmad and William J. Buchanan and Zakwan Jaroucheh}, title = {{PASSION:} Permissioned Access Control for Segmented Devices and Identity for IoT Networks}, booktitle = {28th {IEEE} International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , {CAMAD} 2023, Edinburgh, United Kingdom, November 6-8, 2023}, pages = {200--205}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CAMAD59638.2023.10478386}, doi = {10.1109/CAMAD59638.2023.10478386}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/camad/AliAABJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/AliKDABP23, author = {Hassan Ali and Muhammad Shahbaz Khan and Maha Driss and Jawad Ahmad and William J. Buchanan and Nikolaos Pitropakis}, title = {CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption}, booktitle = {98th {IEEE} Vehicular Technology Conference, {VTC} Fall 2023, Hong Kong, SAR, China, October 10-13, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VTC2023-Fall60731.2023.10333478}, doi = {10.1109/VTC2023-FALL60731.2023.10333478}, timestamp = {Thu, 11 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vtc/AliKDABP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-01618, author = {Pavlos Papadopoulos and William J. Buchanan and Sarwar Sayeed and Nikolaos Pitropakis}, title = {Towards The Creation Of The Future Fish Farm}, journal = {CoRR}, volume = {abs/2301.01618}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.01618}, doi = {10.48550/ARXIV.2301.01618}, eprinttype = {arXiv}, eprint = {2301.01618}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-01618.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-08498, author = {Peter Aaby and Mario Valerio Giuffrida and William J. Buchanan and Zhiyuan Tan}, title = {An Omnidirectional Approach to Touch-based Continuous Authentication}, journal = {CoRR}, volume = {abs/2302.08498}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.08498}, doi = {10.48550/ARXIV.2302.08498}, eprinttype = {arXiv}, eprint = {2302.08498}, timestamp = {Mon, 20 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-08498.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-14785, author = {William J. Buchanan and Leandros A. Maglaras}, title = {Review of the {NIST} Light-weight Cryptography Finalists}, journal = {CoRR}, volume = {abs/2303.14785}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.14785}, doi = {10.48550/ARXIV.2303.14785}, eprinttype = {arXiv}, eprint = {2303.14785}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-14785.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-18852, author = {Simon R. Davies and Richard Macfarlane and William J. Buchanan}, title = {Majority Voting Approach to Ransomware Detection}, journal = {CoRR}, volume = {abs/2305.18852}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.18852}, doi = {10.48550/ARXIV.2305.18852}, eprinttype = {arXiv}, eprint = {2305.18852}, timestamp = {Wed, 07 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-18852.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-10834, author = {Muhammad Shahbaz Khan and Jawad Ahmad and Hisham Ali and Nikolaos Pitropakis and Ahmed Al{-}Dubai and Baraq Ghaleb and William J. Buchanan}, title = {{SRSS:} {A} New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data}, journal = {CoRR}, volume = {abs/2308.10834}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.10834}, doi = {10.48550/ARXIV.2308.10834}, eprinttype = {arXiv}, eprint = {2308.10834}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-10834.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-15009, author = {Sam Grierson and Konstantinos Chalkias and William J. Buchanan}, title = {Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations}, journal = {CoRR}, volume = {abs/2308.15009}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.15009}, doi = {10.48550/ARXIV.2308.15009}, eprinttype = {arXiv}, eprint = {2308.15009}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-15009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-11476, author = {Hassan Ali and Muhammad Shahbaz Khan and Maha Driss and Jawad Ahmad and William J. Buchanan and Nikolaos Pitropakis}, title = {CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption}, journal = {CoRR}, volume = {abs/2309.11476}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.11476}, doi = {10.48550/ARXIV.2309.11476}, eprinttype = {arXiv}, eprint = {2309.11476}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-11476.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-04898, author = {Sam Grierson and William J. Buchanan and Craig Thomson and Baraq Ghaleb and Leandros Maglaras and Chris Eckl}, title = {Scalable Multi-domain Trust Infrastructures for Segmented Networks}, journal = {CoRR}, volume = {abs/2310.04898}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.04898}, doi = {10.48550/ARXIV.2310.04898}, eprinttype = {arXiv}, eprint = {2310.04898}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-04898.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-05032, author = {Hisham Ali and Mwrwan Abubakar and Jawad Ahmad and William J. Buchanan and Zakwan Jaroucheh}, title = {{PASSION:} Permissioned Access Control for Segmented Devices and Identity for IoT Networks}, journal = {CoRR}, volume = {abs/2310.05032}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.05032}, doi = {10.48550/ARXIV.2310.05032}, eprinttype = {arXiv}, eprint = {2310.05032}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-05032.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-02795, author = {Muhammad Shahbaz Khan and Jawad Ahmad and Ahmed Al{-}Dubai and Zakwan Jaroucheh and Nikolaos Pitropakis and William J. Buchanan}, title = {PermutEx: Feature-Extraction-Based Permutation - {A} New Diffusion Scheme for Image Encryption Algorithms}, journal = {CoRR}, volume = {abs/2311.02795}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.02795}, doi = {10.48550/ARXIV.2311.02795}, eprinttype = {arXiv}, eprint = {2311.02795}, timestamp = {Wed, 08 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-02795.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/AlharbiAAJMGPB22, author = {Adel R. Alharbi and Jawad Ahmad and Arshad and Sajjad Shaukat Jamal and Fawad Masood and Yazeed Yasin Ghadi and Nikolaos Pitropakis and William J. Buchanan}, title = {A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map}, journal = {Complex.}, volume = {2022}, pages = {7047282:1--7047282:15}, year = {2022}, url = {https://doi.org/10.1155/2022/7047282}, doi = {10.1155/2022/7047282}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/AlharbiAAJMGPB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DaviesMB22, author = {Simon R. Davies and Richard Macfarlane and William J. Buchanan}, title = {NapierOne: {A} modern mixed file data set alternative to Govdocs1}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301330}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2021.301330}, doi = {10.1016/J.FSIDI.2021.301330}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DaviesMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/AliAJPPLAB22, author = {Hisham Ali and Jawad Ahmad and Zakwan Jaroucheh and Pavlos Papadopoulos and Nikolaos Pitropakis and Owen Lo and Will Abramson and William J. Buchanan}, title = {Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform}, journal = {Entropy}, volume = {24}, number = {10}, pages = {1379}, year = {2022}, url = {https://doi.org/10.3390/e24101379}, doi = {10.3390/E24101379}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/AliAJPPLAB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/DaviesMB22, author = {Simon R. Davies and Richard Macfarlane and William J. Buchanan}, title = {Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification}, journal = {Entropy}, volume = {24}, number = {10}, pages = {1503}, year = {2022}, url = {https://doi.org/10.3390/e24101503}, doi = {10.3390/E24101503}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/DaviesMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KumarSCKBK22, author = {Ashish Kumar and Rahul Saha and Mauro Conti and Gulshan Kumar and William J. Buchanan and Tai{-}Hoon Kim}, title = {A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions}, journal = {J. Netw. Comput. Appl.}, volume = {204}, pages = {103414}, year = {2022}, url = {https://doi.org/10.1016/j.jnca.2022.103414}, doi = {10.1016/J.JNCA.2022.103414}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/KumarSCKBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/McDonaldPPAB22, author = {Grant McDonald and Pavlos Papadopoulos and Nikolaos Pitropakis and Jawad Ahmad and William J. Buchanan}, title = {Ransomware: Analysing the Impact on Windows Active Directory Domain Services}, journal = {Sensors}, volume = {22}, number = {3}, pages = {953}, year = {2022}, url = {https://doi.org/10.3390/s22030953}, doi = {10.3390/S22030953}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/McDonaldPPAB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/UllahKAJHHPAB22, author = {Safi Ullah and Muazzam Ali Khan and Jawad Ahmad and Sajjad Shaukat Jamal and Zil E. Huma and Muhammad Tahir Hassan and Nikolaos Pitropakis and Arshad and William J. Buchanan}, title = {{HDL-IDS:} {A} Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles}, journal = {Sensors}, volume = {22}, number = {4}, pages = {1340}, year = {2022}, url = {https://doi.org/10.3390/s22041340}, doi = {10.3390/S22041340}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/UllahKAJHHPAB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LoBSPPC22, author = {Owen Lo and William J. Buchanan and Sarwar Sayeed and Pavlos Papadopoulos and Nikolaos Pitropakis and Christos Chrysoulas}, title = {{GLASS:} {A} Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture}, journal = {Sensors}, volume = {22}, number = {6}, pages = {2291}, year = {2022}, url = {https://doi.org/10.3390/s22062291}, doi = {10.3390/S22062291}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LoBSPPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/MasoodDBARJQB22, author = {Fawad Masood and Maha Driss and Wadii Boulila and Jawad Ahmad and Sadaqat ur Rehman and Sana Ullah Jan and Abdullah Qayyum and William J. Buchanan}, title = {A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and {XOR} Operations}, journal = {Wirel. Pers. Commun.}, volume = {127}, number = {2}, pages = {1405--1432}, year = {2022}, url = {https://doi.org/10.1007/s11277-021-08584-z}, doi = {10.1007/S11277-021-08584-Z}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/MasoodDBARJQB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/GunathilakeABL22, author = {Nilupulee Anuradha Gunathilake and Ahmed Al{-}Dubai and William J. Buchanan and Owen Lo}, title = {Electromagnetic Side-Channel Attack Resilience against {PRESENT} Lightweight Block Cipher}, booktitle = {6th International Conference on Cryptography, Security and Privacy, {CSP} 2022, Tianjin, China, January 14-16, 2022}, pages = {51--55}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSP55486.2022.00018}, doi = {10.1109/CSP55486.2022.00018}, timestamp = {Mon, 06 Nov 2023 13:06:30 +0100}, biburl = {https://dblp.org/rec/conf/iccsp/GunathilakeABL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BartonBPSA22, author = {Jon Barton and William J. Buchanan and Nikolaos Pitropakis and Sarwar Sayeed and Will Abramson}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Post Quantum Cryptography Analysis of {TLS} Tunneling on a Constrained Device}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {551--561}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010903000003120}, doi = {10.5220/0010903000003120}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BartonBPSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-08154, author = {Simon R. Davies and Richard Macfarlane and William J. Buchanan}, title = {NapierOne: {A} modern mixed file data set alternative to Govdocs1}, journal = {CoRR}, volume = {abs/2201.08154}, year = {2022}, url = {https://arxiv.org/abs/2201.08154}, eprinttype = {arXiv}, eprint = {2201.08154}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-08154.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-03276, author = {Grant McDonald and Pavlos Papadopoulos and Nikolaos Pitropakis and Jawad Ahmad and William J. Buchanan}, title = {Ransomware: Analysing the Impact on Windows Active Directory Domain Services}, journal = {CoRR}, volume = {abs/2202.03276}, year = {2022}, url = {https://arxiv.org/abs/2202.03276}, eprinttype = {arXiv}, eprint = {2202.03276}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-03276.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-08781, author = {Owen Lo and William J. Buchanan and Sarwar Sayeed and Pavlos Papadopoulos and Nikolaos Pitropakis and Christos Chrysoulas}, title = {{GLASS:} {A} Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture}, journal = {CoRR}, volume = {abs/2203.08781}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.08781}, doi = {10.48550/ARXIV.2203.08781}, eprinttype = {arXiv}, eprint = {2203.08781}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-08781.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-13376, author = {Simon R. Davies and Richard Macfarlane and William J. Buchanan}, title = {Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification}, journal = {CoRR}, volume = {abs/2210.13376}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.13376}, doi = {10.48550/ARXIV.2210.13376}, eprinttype = {arXiv}, eprint = {2210.13376}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-13376.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-03662, author = {Fawad Ahmed and Muneeb Ur Rehman and Jawad Ahmad and Muhammad Shahbaz Khan and Wadii Boulila and Gautam Srivastava and Jerry Chun{-}Wei Lin and William J. Buchanan}, title = {A {DNA} Based Colour Image Encryption Scheme Using {A} Convolutional Autoencoder}, journal = {CoRR}, volume = {abs/2211.03662}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.03662}, doi = {10.48550/ARXIV.2211.03662}, eprinttype = {arXiv}, eprint = {2211.03662}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-03662.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-03218, author = {William J. Buchanan and Mwrwan Abubakar and Owen Lo and Christos Chrysoulas and Nikolaos Pitropakis and Pavlos Papadopoulos and Sarwar Sayeed and Marc Sel}, title = {The Future of Integrated Digital Governance in the {EU:} {EBSI} and {GLASS}}, journal = {CoRR}, volume = {abs/2212.03218}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.03218}, doi = {10.48550/ARXIV.2212.03218}, eprinttype = {arXiv}, eprint = {2212.03218}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-03218.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-08035, author = {Sean McKeown and William J. Buchanan}, title = {Hamming Distributions of Popular Perceptual Hashing Techniques}, journal = {CoRR}, volume = {abs/2212.08035}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.08035}, doi = {10.48550/ARXIV.2212.08035}, eprinttype = {arXiv}, eprint = {2212.08035}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-08035.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KimKSBDT21, author = {Tai{-}Hoon Kim and Gulshan Kumar and Rahul Saha and William J. Buchanan and Tannishtha Devgun and Reji Thomas}, title = {LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments}, journal = {{IEEE} Access}, volume = {9}, pages = {100972--100980}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3097267}, doi = {10.1109/ACCESS.2021.3097267}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KimKSBDT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DaviesMB21, author = {Simon R. Davies and Richard Macfarlane and William J. Buchanan}, title = {Differential area analysis for ransomware attack detection within mixed file datasets}, journal = {Comput. Secur.}, volume = {108}, pages = {102377}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102377}, doi = {10.1016/J.COSE.2021.102377}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DaviesMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/HughesPPSAB21, author = {Kris Hughes and Pavlos Papadopoulos and Nikolaos Pitropakis and Adrian Smales and Jawad Ahmad and William J. Buchanan}, title = {Browsers' Private Mode: Is It What We Were Promised?}, journal = {Comput.}, volume = {10}, number = {12}, pages = {165}, year = {2021}, url = {https://doi.org/10.3390/computers10120165}, doi = {10.3390/COMPUTERS10120165}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computers/HughesPPSAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XuZOFBI21, author = {Hao Xu and Lei Zhang and Oluwakayode Onireti and Yang Fang and William J. Buchanan and Muhammad Ali Imran}, title = {BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for {COVID-19} Pandemic and Beyond}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {5}, pages = {3915--3929}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3025953}, doi = {10.1109/JIOT.2020.3025953}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/XuZOFBI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/PapadopoulosEPCMB21, author = {Pavlos Papadopoulos and Oliver Thornewill von Essen and Nikolaos Pitropakis and Christos Chrysoulas and Alexios Mylonas and William J. Buchanan}, title = {Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {2}, pages = {252--273}, year = {2021}, url = {https://doi.org/10.3390/jcp1020014}, doi = {10.3390/JCP1020014}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/PapadopoulosEPCMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/PopovB21, author = {Serguei Popov and William J. Buchanan}, title = {{FPC-BI:} Fast Probabilistic Consensus within Byzantine Infrastructures}, journal = {J. Parallel Distributed Comput.}, volume = {147}, pages = {77--86}, year = {2021}, url = {https://doi.org/10.1016/j.jpdc.2020.09.002}, doi = {10.1016/J.JPDC.2020.09.002}, timestamp = {Sat, 26 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/PopovB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/make/PapadopoulosAHP21, author = {Pavlos Papadopoulos and Will Abramson and Adam J. Hall and Nikolaos Pitropakis and William J. Buchanan}, title = {Privacy and Trust Redefined in Federated Machine Learning}, journal = {Mach. Learn. Knowl. Extr.}, volume = {3}, number = {2}, pages = {333--356}, year = {2021}, url = {https://doi.org/10.3390/make3020017}, doi = {10.3390/MAKE3020017}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/make/PapadopoulosAHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ChurcherUARMGAN21, author = {Andrew Churcher and Rehmat Ullah and Jawad Ahmad and Sadaqat ur Rehman and Fawad Masood and Mandar Gogate and Fehaid Alqahtani and Boubakr Nour and William J. Buchanan}, title = {An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks}, journal = {Sensors}, volume = {21}, number = {2}, pages = {446}, year = {2021}, url = {https://doi.org/10.3390/s21020446}, doi = {10.3390/S21020446}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ChurcherUARMGAN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KellyPMMB21, author = {Christopher Kelly and Nikolaos Pitropakis and Alexios Mylonas and Sean McKeown and William J. Buchanan}, title = {A Comparative Analysis of Honeypots on Different Cloud Platforms}, journal = {Sensors}, volume = {21}, number = {7}, pages = {2433}, year = {2021}, url = {https://doi.org/10.3390/s21072433}, doi = {10.3390/S21072433}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KellyPMMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KhanKJAJSPB21, author = {Muhammad Almas Khan and Muazzam Ali Khan and Sana Ullah Jan and Jawad Ahmad and Sajjad Shaukat Jamal and Awais Aziz Shah and Nikolaos Pitropakis and William J. Buchanan}, title = {A Deep Learning-Based Intrusion Detection System for {MQTT} Enabled IoT}, journal = {Sensors}, volume = {21}, number = {21}, pages = {7016}, year = {2021}, url = {https://doi.org/10.3390/s21217016}, doi = {10.3390/S21217016}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KhanKJAJSPB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpa/AbramsonPPB21, author = {Will Abramson and Pavlos Papadopoulos and Nikolaos Pitropakis and William J. Buchanan}, title = {PyDentity: {A} playground for education and experimentation with the Hyperledger verifiable information exchange platform}, journal = {Softw. Impacts}, volume = {9}, pages = {100101}, year = {2021}, url = {https://doi.org/10.1016/j.simpa.2021.100101}, doi = {10.1016/J.SIMPA.2021.100101}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simpa/AbramsonPPB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coins/AbubakarJ0021, author = {Mwrwan Abubakar and Zakwan Jaroucheh and Ahmed Al{-}Dubai and Bill Buchanan}, title = {A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data}, booktitle = {2021 {IEEE} International Conference on Omni-Layer Intelligent Systems, {COINS} 2021, Barcelona, Spain, August 23-25, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/COINS51742.2021.9524172}, doi = {10.1109/COINS51742.2021.9524172}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coins/AbubakarJ0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csnet/AbubakarJAB21, author = {Mwrwan Abubakar and Zakwan Jaroucheh and Ahmed Yassin Al{-}Dubai and William J. Buchanan}, title = {Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems}, booktitle = {5th Cyber Security in Networking Conference, CSNet 2021, Abu Dhabi, United Arab Emirates, October 12-14, 2021}, pages = {63--70}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSNet52717.2021.9614646}, doi = {10.1109/CSNET52717.2021.9614646}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csnet/AbubakarJAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChrysoulasTPPLB21, author = {Christos Chrysoulas and Amanda Thomson and Nikolaos Pitropakis and Pavlos Papadopoulos and Owen Lo and William J. Buchanan and George Domalis and Nikos I. Karacapilidis and Dimitris Tsakalidis and Dimitrios Tsolis}, editor = {Sokratis K. Katsikas and Costas Lambrinoudakis and Nora Cuppens and John Mylopoulos and Christos Kalloniatis and Weizhi Meng and Steven Furnell and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Jorge Maestre Vidal and Marco Antonio Sotelo Monge}, title = {{GLASS:} Towards Secure and Decentralized eGovernance Services Using {IPFS}}, booktitle = {Computer Security. {ESORICS} 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT{\&}SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13106}, pages = {40--57}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-95484-0\_3}, doi = {10.1007/978-3-030-95484-0\_3}, timestamp = {Wed, 09 Nov 2022 13:58:44 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ChrysoulasTPPLB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AbramsonBSPL21, author = {Will Abramson and William J. Buchanan and Sarwar Sayeed and Nikolaos Pitropakis and Owen Lo}, editor = {Naghmeh Moradpoor and Atilla El{\c{c}}i and Andrei Petrovski}, title = {{PAN-DOMAIN:} Privacy-preserving Sharing and Auditing of Infection Identifier Matching}, booktitle = {14th International Conference on Security of Information and Networks, {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SIN54109.2021.9699138}, doi = {10.1109/SIN54109.2021.9699138}, timestamp = {Wed, 23 Feb 2022 18:55:51 +0100}, biburl = {https://dblp.org/rec/conf/sin/AbramsonBSPL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AbubakarMJAB21, author = {Mwrwan Abubakar and P{\'{a}}draig McCarron and Zakwan Jaroucheh and Ahmed Yassin Al{-}Dubai and Bill Buchanan}, editor = {Naghmeh Moradpoor and Atilla El{\c{c}}i and Andrei Petrovski}, title = {Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates}, booktitle = {14th International Conference on Security of Information and Networks, {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SIN54109.2021.9699221}, doi = {10.1109/SIN54109.2021.9699221}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AbubakarMJAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AliPAPJB21, author = {Hisham Ali and Pavlos Papadopoulos and Jawad Ahmad and Nikolaos Pitropakis and Zakwan Jaroucheh and William J. Buchanan}, editor = {Naghmeh Moradpoor and Atilla El{\c{c}}i and Andrei Petrovski}, title = {Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers}, booktitle = {14th International Conference on Security of Information and Networks, {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SIN54109.2021.9699366}, doi = {10.1109/SIN54109.2021.9699366}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AliPAPJB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/GriersonTPB21, author = {Sam Grierson and Craig Thomson and Pavlos Papadopoulos and Bill Buchanan}, editor = {Naghmeh Moradpoor and Atilla El{\c{c}}i and Andrei Petrovski}, title = {Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems}, booktitle = {14th International Conference on Security of Information and Networks, {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SIN54109.2021.9699157}, doi = {10.1109/SIN54109.2021.9699157}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/GriersonTPB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/MarchandPBL21, author = {Bruno Marchand and Nikolaos Pitropakis and William J. Buchanan and Costas Lambrinoudakis}, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and Gabriele Kotsis and A Min Tjoa and Ismail Khalil}, title = {Launching Adversarial Label Contamination Attacks Against Malicious {URL} Detection}, booktitle = {Trust, Privacy and Security in Digital Business - 18th International Conference, TrustBus 2021, Virtual Event, September 27-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12927}, pages = {69--82}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86586-3\_5}, doi = {10.1007/978-3-030-86586-3\_5}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/MarchandPBL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucc/BaratiBLR21, author = {Masoud Barati and William J. Buchanan and Owen Lo and Omer F. Rana}, editor = {Luiz F. Bittencourt and Alan Sill}, title = {A privacy-preserving distributed platform for {COVID-19} vaccine passports}, booktitle = {{UCC} '21: 2021 {IEEE/ACM} 14th International Conference on Utility and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021 - Companion Volume}, pages = {16:1--16:6}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3492323.3495626}, doi = {10.1145/3492323.3495626}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ucc/BaratiBLR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-12270, author = {Andrew Churcher and Rehmat Ullah and Jawad Ahmad and Sadaqat ur Rehman and Fawad Masood and Mandar Gogate and Fehaid Alqahtani and Boubakr Nour and William J. Buchanan}, title = {An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks}, journal = {CoRR}, volume = {abs/2101.12270}, year = {2021}, url = {https://arxiv.org/abs/2101.12270}, eprinttype = {arXiv}, eprint = {2101.12270}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-12270.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-15753, author = {Pavlos Papadopoulos and Will Abramson and Adam J. Hall and Nikolaos Pitropakis and William J. Buchanan}, title = {Privacy and Trust Redefined in Federated Machine Learning}, journal = {CoRR}, volume = {abs/2103.15753}, year = {2021}, url = {https://arxiv.org/abs/2103.15753}, eprinttype = {arXiv}, eprint = {2103.15753}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-15753.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-12426, author = {Pavlos Papadopoulos and Oliver Thornewill von Essen and Nikolaos Pitropakis and Christos Chrysoulas and Alexios Mylonas and William J. Buchanan}, title = {Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT}, journal = {CoRR}, volume = {abs/2104.12426}, year = {2021}, url = {https://arxiv.org/abs/2104.12426}, eprinttype = {arXiv}, eprint = {2104.12426}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-12426.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-14418, author = {Simon R. Davies and Richard Macfarlane and William J. Buchanan}, title = {Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets}, journal = {CoRR}, volume = {abs/2106.14418}, year = {2021}, url = {https://arxiv.org/abs/2106.14418}, eprinttype = {arXiv}, eprint = {2106.14418}, timestamp = {Wed, 30 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-14418.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-15225, author = {Nilupulee Anuradha Gunathilake and Ahmed Al{-}Dubai and William J. Buchanan and Owen Lo}, title = {Electromagnetic Analysis of an Ultra-Lightweight Cipher: {PRESENT}}, journal = {CoRR}, volume = {abs/2106.15225}, year = {2021}, url = {https://arxiv.org/abs/2106.15225}, eprinttype = {arXiv}, eprint = {2106.15225}, timestamp = {Mon, 05 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-15225.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-08566, author = {Christos Chrysoulas and Amanda Thomson and Nikolaos Pitropakis and Pavlos Papadopoulos and Owen Lo and William J. Buchanan and George Domalis and Nikos I. Karacapilidis and Dimitris Tsakalidis and Dimitrios Tsolis}, title = {{GLASS:} Towards Secure and Decentralized eGovernance Services using {IPFS}}, journal = {CoRR}, volume = {abs/2109.08566}, year = {2021}, url = {https://arxiv.org/abs/2109.08566}, eprinttype = {arXiv}, eprint = {2109.08566}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-08566.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-01970, author = {Edward Henry Young and Christos Chrysoulas and Nikolaos Pitropakis and Pavlos Papadopoulos and William J. Buchanan}, title = {Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure}, journal = {CoRR}, volume = {abs/2110.01970}, year = {2021}, url = {https://arxiv.org/abs/2110.01970}, eprinttype = {arXiv}, eprint = {2110.01970}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-01970.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-01815, author = {Masoud Barati and William J. Buchanan and Owen Lo and Omer F. Rana}, title = {A Privacy-Preserving Platform for Recording {COVID-19} Vaccine Passports}, journal = {CoRR}, volume = {abs/2112.01815}, year = {2021}, url = {https://arxiv.org/abs/2112.01815}, eprinttype = {arXiv}, eprint = {2112.01815}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-01815.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-02855, author = {William Abramson and William J. Buchanan and Sarwar Sayeed and Nikolaos Pitropakis and Owen Lo}, title = {{PAN-DOMAIN:} Privacy-preserving Sharing and Auditing of Infection Identifier Matching}, journal = {CoRR}, volume = {abs/2112.02855}, year = {2021}, url = {https://arxiv.org/abs/2112.02855}, eprinttype = {arXiv}, eprint = {2112.02855}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-02855.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-10092, author = {Hisham Ali and Pavlos Papadopoulos and Jawad Ahmad and Nikolaos Pitropakis and Zakwan Jaroucheh and William J. Buchanan}, title = {Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers}, journal = {CoRR}, volume = {abs/2112.10092}, year = {2021}, url = {https://arxiv.org/abs/2112.10092}, eprinttype = {arXiv}, eprint = {2112.10092}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-10092.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-10124, author = {Mwrwan Abubakar and P{\'{a}}draig McCarron and Zakwan Jaroucheh and Ahmed Al{-}Dubai and William J. Buchanan}, title = {Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates}, journal = {CoRR}, volume = {abs/2112.10124}, year = {2021}, url = {https://arxiv.org/abs/2112.10124}, eprinttype = {arXiv}, eprint = {2112.10124}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-10124.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-12232, author = {Nilupulee Anuradha Gunathilake and Ahmed Al{-}Dubai and William J. Buchanan and Owen Lo}, title = {Electromagnetic Side-Channel Attack Resilience against {PRESENT} Lightweight Block Cipher}, journal = {CoRR}, volume = {abs/2112.12232}, year = {2021}, url = {https://arxiv.org/abs/2112.12232}, eprinttype = {arXiv}, eprint = {2112.12232}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-12232.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WadhajGTAB20, author = {Isam Wadhaj and Baraq Ghaleb and Craig Thomson and Ahmed Al{-}Dubai and William J. Buchanan}, title = {Mitigation Mechanisms Against the {DAO} Attack on the Routing Protocol for Low Power and Lossy Networks {(RPL)}}, journal = {{IEEE} Access}, volume = {8}, pages = {43665--43675}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2977476}, doi = {10.1109/ACCESS.2020.2977476}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WadhajGTAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KimKSABRGT20, author = {Tai{-}Hoon Kim and Gulshan Kumar and Rahul Saha and Mamoun Alazab and William J. Buchanan and Mritunjay Kumar Rai and G. Geetha and Reji Thomas}, title = {{CASCF:} Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure}, journal = {{IEEE} Access}, volume = {8}, pages = {94748--94756}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2995443}, doi = {10.1109/ACCESS.2020.2995443}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KimKSABRGT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KimKSRBTA20, author = {Tai{-}Hoon Kim and Gulshan Kumar and Rahul Saha and Mritunjay Kumar Rai and William J. Buchanan and Reji Thomas and Mamoun Alazab}, title = {A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect}, journal = {{IEEE} Access}, volume = {8}, pages = {96455--96467}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2995481}, doi = {10.1109/ACCESS.2020.2995481}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KimKSRBTA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/QayyumABRAMKB20, author = {Abdullah Qayyum and Jawad Ahmad and Wadii Boulila and Saeed Rubaiee and Arshad Ali and Fawad Masood and Fawad Khan and William J. Buchanan}, title = {Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution}, journal = {{IEEE} Access}, volume = {8}, pages = {140876--140895}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3012912}, doi = {10.1109/ACCESS.2020.3012912}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/QayyumABRAMKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanBARRAB20, author = {Jan Sher Khan and Wadii Boulila and Jawad Ahmad and Saeed Rubaiee and Atique Ur Rehman and Roobaea Alroobaea and William J. Buchanan}, title = {{DNA} and Plaintext Dependent Chaotic Visual Selective Image Encryption}, journal = {{IEEE} Access}, volume = {8}, pages = {159732--159744}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3020917}, doi = {10.1109/ACCESS.2020.3020917}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KhanBARRAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/PapadopoulosPBL20, author = {Pavlos Papadopoulos and Nikolaos Pitropakis and William J. Buchanan and Owen Lo and Sokratis K. Katsikas}, title = {Privacy-Preserving Passive {DNS}}, journal = {Comput.}, volume = {9}, number = {3}, pages = {64}, year = {2020}, url = {https://doi.org/10.3390/computers9030064}, doi = {10.3390/COMPUTERS9030064}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/PapadopoulosPBL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DysonBB20, author = {Simon Dyson and William J. Buchanan and Liam Bell}, title = {Scenario-based creation and digital investigation of ethereum {ERC20} tokens}, journal = {Digit. Investig.}, volume = {32}, pages = {200894}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2019.200894}, doi = {10.1016/J.FSIDI.2019.200894}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DysonBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DaviesMB20, author = {Simon R. Davies and Richard Macfarlane and William J. Buchanan}, title = {Evaluation of live forensic techniques in ransomware attack mitigation}, journal = {Digit. Investig.}, volume = {33}, pages = {300979}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300979}, doi = {10.1016/J.FSIDI.2020.300979}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DaviesMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/AhmadTLASHB20, author = {Jawad Ahmad and Ahsen Tahir and Hadi Larijani and Fawad Ahmed and Syed Aziz Shah and Adam James Hall and William J. Buchanan}, title = {Energy demand forecasting of buildings using random neural networks}, journal = {J. Intell. Fuzzy Syst.}, volume = {38}, number = {4}, pages = {4753--4765}, year = {2020}, url = {https://doi.org/10.3233/JIFS-191458}, doi = {10.3233/JIFS-191458}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/AhmadTLASHB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/MasoodBAASRB20, author = {Fawad Masood and Wadii Boulila and Jawad Ahmad and Arshad Ali and Syam Sankar and Saeed Rubaiee and William J. Buchanan}, title = {A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with {DNA} Genetic Encoding and Chaos}, journal = {Remote. Sens.}, volume = {12}, number = {11}, pages = {1893}, year = {2020}, url = {https://doi.org/10.3390/rs12111893}, doi = {10.3390/RS12111893}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/MasoodBAASRB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/StamatellisPPKB20, author = {Charalampos S. Stamatellis and Pavlos Papadopoulos and Nikolaos Pitropakis and Sokratis K. Katsikas and William J. Buchanan}, title = {A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric}, journal = {Sensors}, volume = {20}, number = {22}, pages = {6587}, year = {2020}, url = {https://doi.org/10.3390/s20226587}, doi = {10.3390/S20226587}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/StamatellisPPKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/KumarSRBT0KR20, author = {Gulshan Kumar and Rahul Saha and Mritunjay Kumar Rai and William J. Buchanan and Reji Thomas and G. Geetha and Tai{-}Hoon Kim and Joel J. P. C. Rodrigues}, title = {A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {7}, pages = {7707--7722}, year = {2020}, url = {https://doi.org/10.1109/TVT.2020.2989817}, doi = {10.1109/TVT.2020.2989817}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/KumarSRBT0KR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/GunathilakeAB20, author = {Nilupulee Anuradha Gunathilake and Ahmed Al{-}Dubai and William J. Buchanan}, editor = {Nur Zincir{-}Heywood and Mehmet Ulema and M{\"{u}}ge Sayit and Stuart Clayman and Myung{-}Sup Kim and Cihat Cetinkaya}, title = {Recent Advances and Trends in Lightweight Cryptography for IoT Security}, booktitle = {16th International Conference on Network and Service Management, {CNSM} 2020, Izmir, Turkey, November 2-6, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CNSM50824.2020.9269083}, doi = {10.23919/CNSM50824.2020.9269083}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/cnsm/GunathilakeAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/JarouchehABL20, author = {Zakwan Jaroucheh and Mohamad Alissa and William J. Buchanan and Xiaodong Liu}, title = {{TRUSTD:} Combat Fake Content using Blockchain and Collective Signature Technologies}, booktitle = {44th {IEEE} Annual Computers, Software, and Applications Conference, {COMPSAC} 2020, Madrid, Spain, July 13-17, 2020}, pages = {1235--1240}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/COMPSAC48688.2020.00-87}, doi = {10.1109/COMPSAC48688.2020.00-87}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/JarouchehABL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/AabyGB020, author = {Peter Aaby and Mario Valerio Giuffrida and William J. Buchanan and Zhiyuan Tan}, title = {Towards Continuous User Authentication Using Personalised Touch-Based Behaviour}, booktitle = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22, 2020}, pages = {41--48}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00023}, doi = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH49142.2020.00023}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dasc/AabyGB020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbc2/JarouchehAB20, author = {Zakwan Jaroucheh and Mohamad Alissa and William J. Buchanan}, title = {Trust-based Ecosystem to Combat Fake News}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2020, Toronto, ON, Canada, May 2-6, 2020}, pages = {1--3}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICBC48266.2020.9169435}, doi = {10.1109/ICBC48266.2020.9169435}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/JarouchehAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BowditchABPH20, author = {William Bowditch and Will Abramson and William J. Buchanan and Nikolaos Pitropakis and Adam J. Hall}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Privacy-preserving Surveillance Methods using Homomorphic Encryption}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {240--248}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008864902400248}, doi = {10.5220/0008864902400248}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BowditchABPH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ChristouPPMB20, author = {Orestis Christou and Nikolaos Pitropakis and Pavlos Papadopoulos and Sean McKeown and William J. Buchanan}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Phishing {URL} Detection Through Top-level Domain Analysis: {A} Descriptive Approach}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {289--298}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008902202890298}, doi = {10.5220/0008902202890298}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ChristouPPMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsa/JarouchehGB20, author = {Zakwan Jaroucheh and Baraq Ghaleb and William J. Buchanan}, title = {SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain}, booktitle = {2020 {IEEE} International Conference on Software Architecture Companion, {ICSA} Companion 2020, Salvador, Brazil, March 16-20, 2020}, pages = {143--150}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICSA-C50368.2020.00034}, doi = {10.1109/ICSA-C50368.2020.00034}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsa/JarouchehGB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icvisp/AbubakarJ0020, author = {Mwrwan Abubakar and Zakwan Jaroucheh and Ahmed Al{-}Dubai and Bill Buchanan}, title = {PoNW: {A} Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism}, booktitle = {{ICVISP} 2020: 4th International Conference on Vision, Image and Signal Processing, Bangkok, Thailand, December, 2020}, pages = {58:1--58:8}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3448823.3448875}, doi = {10.1145/3448823.3448875}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icvisp/AbubakarJ0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sai/KhanTASA0B20, author = {Jan Sher Khan and Ahsen Tahir and Jawad Ahmad and Syed Aziz Shah and Qammer H. Abbasi and Gordon Russell and William J. Buchanan}, editor = {Kohei Arai and Supriya Kapoor and Rahul Bhatia}, title = {5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum}, booktitle = {Intelligent Computing - Proceedings of the 2020 Computing Conference, Volume 3}, series = {Advances in Intelligent Systems and Computing}, volume = {1230}, pages = {26--36}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-52243-8\_3}, doi = {10.1007/978-3-030-52243-8\_3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sai/KhanTASA0B20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/AbramsonHPPB20, author = {Will Abramson and Adam James Hall and Pavlos Papadopoulos and Nikolaos Pitropakis and William J. Buchanan}, editor = {Stefanos Gritzalis and Edgar R. Weippl and Gabriele Kotsis and A Min Tjoa and Ismail Khalil}, title = {A Distributed Trust Framework for Privacy-Preserving Machine Learning}, booktitle = {Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12395}, pages = {205--220}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58986-8\_14}, doi = {10.1007/978-3-030-58986-8\_14}, timestamp = {Mon, 26 Jun 2023 16:42:40 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/AbramsonHPPB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-07897, author = {Will Major and William J. Buchanan and Jawad Ahmad}, title = {An authentication protocol based on chaos and zero knowledge proof}, journal = {CoRR}, volume = {abs/2001.07897}, year = {2020}, url = {https://arxiv.org/abs/2001.07897}, eprinttype = {arXiv}, eprint = {2001.07897}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-07897.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-05126, author = {Ian Low and William J. Buchanan and Richard J. Macfarlane and Owen Lo}, title = {Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction}, journal = {CoRR}, volume = {abs/2002.05126}, year = {2020}, url = {https://arxiv.org/abs/2002.05126}, eprinttype = {arXiv}, eprint = {2002.05126}, timestamp = {Fri, 14 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-05126.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-06599, author = {Orestis Christou and Nikolaos Pitropakis and Pavlos Papadopoulos and Sean McKeown and William J. Buchanan}, title = {Phishing {URL} Detection Through Top-level Domain Analysis: {A} Descriptive Approach}, journal = {CoRR}, volume = {abs/2005.06599}, year = {2020}, url = {https://arxiv.org/abs/2005.06599}, eprinttype = {arXiv}, eprint = {2005.06599}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-06599.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-10103, author = {Hao Xu and Lei Zhang and Oluwakayode Onireti and Yang Fang and William J. Buchanan and Muhammad Ali Imran}, title = {BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for {COVID-19} Pandemic and Beyond}, journal = {CoRR}, volume = {abs/2005.10103}, year = {2020}, url = {https://arxiv.org/abs/2005.10103}, eprinttype = {arXiv}, eprint = {2005.10103}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-10103.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-00928, author = {Sebastian M{\"{u}}ller and Andreas Penzkofer and Bartosz Kusmierz and Darcy Camargo and William J. Buchanan}, title = {Fast Probabilistic Consensus with Weighted Votes}, journal = {CoRR}, volume = {abs/2006.00928}, year = {2020}, url = {https://arxiv.org/abs/2006.00928}, eprinttype = {arXiv}, eprint = {2006.00928}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-00928.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-02456, author = {Will Abramson and Adam James Hall and Pavlos Papadopoulos and Nikolaos Pitropakis and William J. Buchanan}, title = {A Distributed Trust Framework for Privacy-Preserving Machine Learning}, journal = {CoRR}, volume = {abs/2006.02456}, year = {2020}, url = {https://arxiv.org/abs/2006.02456}, eprinttype = {arXiv}, eprint = {2006.02456}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-02456.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-14864, author = {Will Abramson and Nicole E. van Deursen and William J. Buchanan}, title = {Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting}, journal = {CoRR}, volume = {abs/2006.14864}, year = {2020}, url = {https://arxiv.org/abs/2006.14864}, eprinttype = {arXiv}, eprint = {2006.14864}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-14864.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-05265, author = {Gulshan Kumar and Rahul Saha and William J. Buchanan and G. Geetha and Reji Thomas and Tai{-}Hoon Kim and Mamoun Alazab}, title = {Decentralized Accessibility of e-commerce Products through Blockchain Technology}, journal = {CoRR}, volume = {abs/2007.05265}, year = {2020}, url = {https://arxiv.org/abs/2007.05265}, eprinttype = {arXiv}, eprint = {2007.05265}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-05265.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-06430, author = {Pavlos Papadopoulos and Nikolaos Pitropakis and William J. Buchanan and Owen Lo and Sokratis K. Katsikas}, title = {Privacy Preserving Passive {DNS}}, journal = {CoRR}, volume = {abs/2008.06430}, year = {2020}, url = {https://arxiv.org/abs/2008.06430}, eprinttype = {arXiv}, eprint = {2008.06430}, timestamp = {Wed, 21 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-06430.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-06763, author = {Zakwan Jaroucheh and Baraq Ghaleb and William J. Buchanan}, title = {SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain}, journal = {CoRR}, volume = {abs/2008.06763}, year = {2020}, url = {https://arxiv.org/abs/2008.06763}, eprinttype = {arXiv}, eprint = {2008.06763}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-06763.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-13632, author = {Zakwan Jaroucheh and Mohamad Alissa and William J. Buchanan}, title = {{TRUSTD:} Combat Fake Content using Blockchain and Collective Signature Technologies}, journal = {CoRR}, volume = {abs/2008.13632}, year = {2020}, url = {https://arxiv.org/abs/2008.13632}, eprinttype = {arXiv}, eprint = {2008.13632}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-13632.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-05126, author = {William J. Buchanan and Muhammad Ali Imran and Masood Ur Rehman and Lei Zhang and Qammer H. Abbasi and Christos Chrysoulas and David Haynes and Nikolaos Pitropakis and Pavlos Papadopoulos}, title = {Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing}, journal = {CoRR}, volume = {abs/2009.05126}, year = {2020}, url = {https://arxiv.org/abs/2009.05126}, eprinttype = {arXiv}, eprint = {2009.05126}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-05126.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-09260, author = {Charalampos S. Stamatellis and Pavlos Papadopoulos and Nikolaos Pitropakis and Sokratis K. Katsikas and William J. Buchanan}, title = {A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric}, journal = {CoRR}, volume = {abs/2011.09260}, year = {2020}, url = {https://arxiv.org/abs/2011.09260}, eprinttype = {arXiv}, eprint = {2011.09260}, timestamp = {Wed, 25 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-09260.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-08487, author = {Simon R. Davies and Richard Macfarlane and William J. Buchanan}, title = {Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation}, journal = {CoRR}, volume = {abs/2012.08487}, year = {2020}, url = {https://arxiv.org/abs/2012.08487}, eprinttype = {arXiv}, eprint = {2012.08487}, timestamp = {Sat, 02 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-08487.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SahaGKKB19, author = {Rahul Saha and G. Geetha and Gulshan Kumar and Tai{-}Hoon Kim and William J. Buchanan}, title = {{MRC4:} {A} Modified {RC4} Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features}, journal = {{IEEE} Access}, volume = {7}, pages = {172045--172054}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2956160}, doi = {10.1109/ACCESS.2019.2956160}, timestamp = {Thu, 19 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/SahaGKKB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KimGRKBST19, author = {Tai{-}Hoon Kim and Rekha Goyat and Mritunjay Kumar Rai and Gulshan Kumar and William J. Buchanan and Rahul Saha and Reji Thomas}, title = {A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks}, journal = {{IEEE} Access}, volume = {7}, pages = {184133--184144}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2960609}, doi = {10.1109/ACCESS.2019.2960609}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KimGRKBST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/McLarenRBT19, author = {Peter McLaren and Gordon Russell and William J. Buchanan and Zhiyuan Tan}, title = {Decrypting live {SSH} traffic in virtual environments}, journal = {Digit. Investig.}, volume = {29}, pages = {109--117}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.03.010}, doi = {10.1016/J.DIIN.2019.03.010}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/McLarenRBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MuirLB19, author = {Matt Muir and Petra Leimich and William J. Buchanan}, title = {A Forensic Audit of the Tor Browser Bundle}, journal = {Digit. Investig.}, volume = {29}, pages = {118--128}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.03.009}, doi = {10.1016/J.DIIN.2019.03.009}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MuirLB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiCSBC19, author = {Shancang Li and Kim{-}Kwang Raymond Choo and Qindong Sun and William J. Buchanan and Jiuxin Cao}, title = {IoT Forensics: Amazon Echo as a Use Case}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {4}, pages = {6487--6497}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2906946}, doi = {10.1109/JIOT.2019.2906946}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiCSBC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/McLarenBRT19, author = {Peter McLaren and William J. Buchanan and Gordon Russell and Zhiyuan Tan}, title = {Deriving ChaCha20 key streams from targeted memory analysis}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102372}, doi = {10.1016/J.JISA.2019.102372}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/McLarenBRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AsifB19, author = {Rameez Asif and William J. Buchanan}, title = {Corrigendum to "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment"}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2637028:1}, year = {2019}, url = {https://doi.org/10.1155/2019/2637028}, doi = {10.1155/2019/2637028}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AsifB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/LiYZBLR19, author = {Shancang Li and Yong Yuan and Jun Jason Zhang and Bill Buchanan and Erwu Liu and Ramesh Ramadoss}, title = {Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {6}, number = {6}, pages = {1369--1372}, year = {2019}, url = {https://doi.org/10.1109/TCSS.2019.2954939}, doi = {10.1109/TCSS.2019.2954939}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/LiYZBLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bics/IlyasALKTALKSBH19, author = {Muhammad Ilyas and Jawad Ahmad and Alistair Lawson and Jan Sher Khan and Ahsen Tahir and Ahsan Adeel and Hadi Larijani and Abdelfateh Kerrouche and M. Guftar Shaikh and William J. Buchanan and Amir Hussain}, editor = {Jinchang Ren and Amir Hussain and Huimin Zhao and Kaizhu Huang and Jiangbin Zheng and Jun Cai and Rongjun Chen and Yinyin Xiao}, title = {Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning}, booktitle = {Advances in Brain Inspired Cognitive Systems - 10th International Conference, {BICS} 2019, Guangzhou, China, July 13-14, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11691}, pages = {76--85}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39431-8\_8}, doi = {10.1007/978-3-030-39431-8\_8}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bics/IlyasALKTALKSBH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Buchanan19, author = {Bill Buchanan}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Building the Future: Tokenization, Blockchain and Citizen-focused Systems}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {5}, publisher = {SciTePress}, year = {2019}, timestamp = {Thu, 13 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Buchanan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wf-iot/GunathilakeBA19, author = {Nilupulee Anuradha Gunathilake and William J. Buchanan and Rameez Asif}, title = {Next Generation Lightweight Cryptography for Smart IoT Devices: : Implementation, Challenges and Applications}, booktitle = {5th {IEEE} World Forum on Internet of Things, WF-IoT 2019, Limerick, Ireland, April 15-18, 2019}, pages = {707--710}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WF-IoT.2019.8767250}, doi = {10.1109/WF-IOT.2019.8767250}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wf-iot/GunathilakeBA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-10272, author = {Adam James Hall and Nikolaos Pitropakis and William J. Buchanan and Naghmeh Moradpoor}, title = {Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier}, journal = {CoRR}, volume = {abs/1907.10272}, year = {2019}, url = {http://arxiv.org/abs/1907.10272}, eprinttype = {arXiv}, eprint = {1907.10272}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-10272.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-10279, author = {Matt Muir and Petra Leimich and William J. Buchanan}, title = {A Forensic Audit of the Tor Browser Bundle}, journal = {CoRR}, volume = {abs/1907.10279}, year = {2019}, url = {http://arxiv.org/abs/1907.10279}, eprinttype = {arXiv}, eprint = {1907.10279}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-10279.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-10387, author = {Peter Aaby and Juanjo Mata De Acuna and Richard Macfarlane and William J. Buchanan}, title = {Privacy Parameter Variation Using {RAPPOR} on a Malware Dataset}, journal = {CoRR}, volume = {abs/1907.10387}, year = {2019}, url = {http://arxiv.org/abs/1907.10387}, eprinttype = {arXiv}, eprint = {1907.10387}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-10387.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-10835, author = {Peter McLaren and Gordon Russell and William J. Buchanan and Zhiyuan Tan}, title = {Decrypting live {SSH} traffic in virtual environments}, journal = {CoRR}, volume = {abs/1907.10835}, year = {2019}, url = {http://arxiv.org/abs/1907.10835}, eprinttype = {arXiv}, eprint = {1907.10835}, timestamp = {Tue, 05 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-10835.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-10855, author = {Shane Murnion and William J. Buchanan and Adrian Smales and Gordon Russell}, title = {Machine learning and semantic analysis of in-game chat for cyberbullying}, journal = {CoRR}, volume = {abs/1907.10855}, year = {2019}, url = {http://arxiv.org/abs/1907.10855}, eprinttype = {arXiv}, eprint = {1907.10855}, timestamp = {Tue, 01 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-10855.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-11445, author = {Pierre Chevalier and Bartlomiej Kaminski and Fraser Hutchison and Qi Ma and Spandan Sharma and Andreas Fackler and William J. Buchanan}, title = {Protocol for Asynchronous, Reliable, Secure and Efficient Consensus {(PARSEC)} Version 2.0}, journal = {CoRR}, volume = {abs/1907.11445}, year = {2019}, url = {http://arxiv.org/abs/1907.11445}, eprinttype = {arXiv}, eprint = {1907.11445}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-11445.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-11941, author = {Peter McLaren and William J. Buchanan and Gordon Russell and Zhiyuan Tan}, title = {Deriving ChaCha20 Key Streams From Targeted Memory Analysis}, journal = {CoRR}, volume = {abs/1907.11941}, year = {2019}, url = {http://arxiv.org/abs/1907.11941}, eprinttype = {arXiv}, eprint = {1907.11941}, timestamp = {Tue, 05 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-11941.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-11954, author = {Peter McLaren and William J. Buchanan and Gordon Russell and Zhiyuan Tan}, title = {Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without {A} Priori Knowledge}, journal = {CoRR}, volume = {abs/1907.11954}, year = {2019}, url = {http://arxiv.org/abs/1907.11954}, eprinttype = {arXiv}, eprint = {1907.11954}, timestamp = {Tue, 05 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-11954.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-12221, author = {Simon Dyson and William J. Buchanan and Liam Bell}, title = {The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime}, journal = {CoRR}, volume = {abs/1907.12221}, year = {2019}, url = {http://arxiv.org/abs/1907.12221}, eprinttype = {arXiv}, eprint = {1907.12221}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-12221.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-12257, author = {Jon Barton and William J. Buchanan and Will Abramson and Nikolaos Pitropakis}, title = {Performance Analysis of {TLS} for Quantum Robust Cryptography on a Constrained Device}, journal = {CoRR}, volume = {abs/1912.12257}, year = {2019}, url = {http://arxiv.org/abs/1912.12257}, eprinttype = {arXiv}, eprint = {1912.12257}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-12257.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Tweneboah-Koduah18, author = {Samuel Tweneboah{-}Koduah and William J. Buchanan}, title = {Security Risk Assessment of Critical Infrastructure Systems: {A} Comparative Study}, journal = {Comput. J.}, volume = {61}, number = {9}, pages = {1389--1406}, year = {2018}, url = {https://doi.org/10.1093/comjnl/bxy002}, doi = {10.1093/COMJNL/BXY002}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/Tweneboah-Koduah18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MurnionBSR18, author = {Shane Murnion and William J. Buchanan and Adrian Smales and Gordon Russell}, title = {Machine learning and semantic analysis of in-game chat for cyberbullying}, journal = {Comput. Secur.}, volume = {76}, pages = {197--213}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.02.016}, doi = {10.1016/J.COSE.2018.02.016}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MurnionBSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SudozaiSBHZ18, author = {M. A. K. Sudozai and Shahzad Saleem and William J. Buchanan and Nisar Habib and Haleemah Zia}, title = {Forensics study of {IMO} call and chat app}, journal = {Digit. Investig.}, volume = {25}, pages = {5--23}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.006}, doi = {10.1016/J.DIIN.2018.04.006}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SudozaiSBHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BuchananHW18, author = {William J. Buchanan and Scott Helme and Alan Woodward}, title = {Analysis of the adoption of security headers in {HTTP}}, journal = {{IET} Inf. Secur.}, volume = {12}, number = {2}, pages = {118--126}, year = {2018}, url = {https://doi.org/10.1049/iet-ifs.2016.0621}, doi = {10.1049/IET-IFS.2016.0621}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BuchananHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Tweneboah-Koduah18, author = {Samuel Tweneboah{-}Koduah and Francis Atsu and William J. Buchanan}, title = {Impact of cyberattacks on stock performance: a comparative study}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {5}, pages = {637--652}, year = {2018}, url = {https://doi.org/10.1108/ICS-05-2018-0060}, doi = {10.1108/ICS-05-2018-0060}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/Tweneboah-Koduah18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LoBGM18, author = {Owen Lo and William J. Buchanan and Paul Griffiths and Richard Macfarlane}, title = {Distance Measurement Methods for Improved Insider Threat Detection}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {5906368:1--5906368:18}, year = {2018}, url = {https://doi.org/10.1155/2018/5906368}, doi = {10.1155/2018/5906368}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LoBGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LoBC18, author = {Owen Lo and William J. Buchanan and Douglas Carson}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Correlation Power Analysis on the {PRESENT} Block Cipher on an Embedded Device}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {21:1--21:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3232801}, doi = {10.1145/3230833.3232801}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/LoBC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/HallPBM18, author = {Adam James Hall and Nikolaos Pitropakis and William J. Buchanan and Naghmeh Moradpoor}, editor = {Naoki Abe and Huan Liu and Calton Pu and Xiaohua Hu and Nesreen K. Ahmed and Mu Qiao and Yang Song and Donald Kossmann and Bing Liu and Kisung Lee and Jiliang Tang and Jingrui He and Jeffrey S. Saltz}, title = {Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier}, booktitle = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018), Seattle, WA, USA, December 10-13, 2018}, pages = {5034--5039}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/BigData.2018.8621922}, doi = {10.1109/BIGDATA.2018.8621922}, timestamp = {Fri, 19 Nov 2021 16:08:20 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/HallPBM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AabyAMB18, author = {Peter Aaby and Juanjo Mata De Acuna and Richard Macfarlane and William J. Buchanan}, title = {Privacy Parameter Variation Using {RAPPOR} on a Malware Dataset}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {938--945}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00133}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00133}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AabyAMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/ThuemmlerRBHB18, author = {Christoph Thuemmler and Claudia Rolffs and Andreas Bollmann and Gerhard Hindricks and William J. Buchanan}, title = {Requirements for 5G based telemetric cardiac monitoring}, booktitle = {14th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2018, Limassol, Cyprus, October 15-17, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/WiMOB.2018.8589139}, doi = {10.1109/WIMOB.2018.8589139}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wimob/ThuemmlerRBHB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SpyraBE17, author = {Grzegorz Spyra and William J. Buchanan and Elias Ekonomou}, title = {Sticky policies approach within cloud computing}, journal = {Comput. Secur.}, volume = {70}, pages = {366--375}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.07.005}, doi = {10.1016/J.COSE.2017.07.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SpyraBE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BuchananCM17, author = {William J. Buchanan and Simone Chiale and Richard Macfarlane}, title = {A methodology for the security evaluation within third-party Android Marketplaces}, journal = {Digit. Investig.}, volume = {23}, pages = {88--98}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.10.002}, doi = {10.1016/J.DIIN.2017.10.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BuchananCM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AsifB17, author = {Rameez Asif and William J. Buchanan}, title = {Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {7616847:1--7616847:10}, year = {2017}, url = {https://doi.org/10.1155/2017/7616847}, doi = {10.1155/2017/7616847}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AsifB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/UkwanduBR17, author = {Elochukwu Ukwandu and William J. Buchanan and Gordon Russell}, title = {Performance evaluation of a fragmented secret share system}, booktitle = {2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), London, United Kingdom, June 19-20, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CyberSA.2017.8073396}, doi = {10.1109/CYBERSA.2017.8073396}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/UkwanduBR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/UwagboleBF17, author = {Solomon Ogbomon Uwagbole and William J. Buchanan and Lu Fan}, editor = {Gareth Howells}, title = {An applied pattern-driven corpus to predictive analytics in mitigating {SQL} injection attack}, booktitle = {Seventh International Conference on Emerging Security Technologies, {EST} 2017, Canterbury, United Kingdom, September 6-8, 2017}, pages = {12--17}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EST.2017.8090392}, doi = {10.1109/EST.2017.8090392}, timestamp = {Fri, 15 Jul 2022 22:45:24 +0200}, biburl = {https://dblp.org/rec/conf/est/UwagboleBF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/UwagboleBF17, author = {Solomon Ogbomon Uwagbole and William J. Buchanan and Lu Fan}, title = {Applied Machine Learning predictive analytics to {SQL} Injection Attack detection and prevention}, booktitle = {2017 {IFIP/IEEE} Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal, May 8-12, 2017}, pages = {1087--1090}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/INM.2017.7987433}, doi = {10.23919/INM.2017.7987433}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/im/UwagboleBF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/AsifB17, author = {Rameez Asif and William J. Buchanan}, editor = {Yulei Wu and Geyong Min and Nektarios Georgalas and Ahmed Al{-}Dubi and Xiaolong Jin and Laurence T. Yang and Jianhua Ma and Po Yang}, title = {Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption}, booktitle = {2017 {IEEE} International Conference on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData), Exeter, United Kingdom, June 21-23, 2017}, pages = {910--916}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.140}, doi = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2017.140}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/ithings/AsifB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SieklikMB16, author = {Boris Sieklik and Richard Macfarlane and William J. Buchanan}, title = {Evaluation of {TFTP} DDoS amplification attack}, journal = {Comput. Secur.}, volume = {57}, pages = {67--92}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2015.09.006}, doi = {10.1016/J.COSE.2015.09.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SieklikMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeimichHB16, author = {Petra Leimich and Josh Harrison and William J. Buchanan}, title = {A {RAM} triage methodology for Hadoop {HDFS} forensics}, journal = {Digit. Investig.}, volume = {18}, pages = {96--109}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.07.003}, doi = {10.1016/J.DIIN.2016.07.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LeimichHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/healthcom/BuchananD16, author = {William J. Buchanan and Nicole van Deursen}, title = {HI-risk: {A} method to analyse health information risk intelligence}, booktitle = {18th {IEEE} International Conference on e-Health Networking, Applications and Services, Healthcom 2016, Munich, Germany, September 14-16, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/HealthCom.2016.7749536}, doi = {10.1109/HEALTHCOM.2016.7749536}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/healthcom/BuchananD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/UwagboleBF16, author = {Solomon Ogbomon Uwagbole and William J. Buchanan and Lu Fan}, editor = {Sema Oktug and Mehmet Ulema and Cicek Cavdar and Lisandro Zambenedetti Granville and Carlos Raniery Paula dos Santos}, title = {Numerical encoding to Tame {SQL} injection attacks}, booktitle = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2016, Istanbul, Turkey, April 25-29, 2016}, pages = {1253--1256}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NOMS.2016.7502997}, doi = {10.1109/NOMS.2016.7502997}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/UwagboleBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PenroseBM15, author = {Philip Penrose and William J. Buchanan and Richard Macfarlane}, title = {Fast contraband detection in large capacity disk drives}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S22--S29}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.007}, doi = {10.1016/J.DIIN.2015.01.007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/PenroseBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/BuchananLUFR15, author = {William J. Buchanan and David Lanc and Elochukwu Ukwandu and Lu Fan and Gordon Russell}, title = {The Future Internet: {A} World of Secret Shares}, journal = {Future Internet}, volume = {7}, number = {4}, pages = {445--464}, year = {2015}, url = {https://doi.org/10.3390/fi7040445}, doi = {10.3390/FI7040445}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/BuchananLUFR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/healthcom/BuchananUDFRLT15, author = {William J. Buchanan and Elochukwu Ukwandu and Nicole van Deursen and Lu Fan and Gordon Russell and Owen Lo and Christoph Thuemmler}, title = {Secret shares to protect health records in Cloud-based infrastructures}, booktitle = {17th International Conference on E-health Networking, Application {\&} Services, HealthCom 2015, Boston, MA, USA, October 14-17, 2015}, pages = {669--672}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HealthCom.2015.7454589}, doi = {10.1109/HEALTHCOM.2015.7454589}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/healthcom/BuchananUDFRLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/UkwanduBFRL15, author = {Elochukwu Ukwandu and William J. Buchanan and Lu Fan and Gordon Russell and Owen Lo}, title = {{RESCUE:} Resilient Secret Sharing Cloud-Based Architecture}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {872--879}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.459}, doi = {10.1109/TRUSTCOM.2015.459}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/UkwanduBFRL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ail/KweckaBSR14, author = {Zbigniew Kwecka and William J. Buchanan and Burkhard Schafer and Judith Rauhofer}, title = {"I am Spartacus": privacy enhancing technologies, collaborative obfuscation and privacy as a public good}, journal = {Artif. Intell. Law}, volume = {22}, number = {2}, pages = {113--139}, year = {2014}, url = {https://doi.org/10.1007/s10506-014-9155-5}, doi = {10.1007/S10506-014-9155-5}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ail/KweckaBSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DeursenBD13, author = {Nicole van Deursen and William J. Buchanan and Alistair Duff}, title = {Monitoring information security risks within health care}, journal = {Comput. Secur.}, volume = {37}, pages = {31--45}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.04.005}, doi = {10.1016/J.COSE.2013.04.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/DeursenBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PenroseMB13, author = {Philip Penrose and Richard Macfarlane and William J. Buchanan}, title = {Approaches to the classification of high entropy file fragments}, journal = {Digit. Investig.}, volume = {10}, number = {4}, pages = {372--384}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.08.004}, doi = {10.1016/J.DIIN.2013.08.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PenroseMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/BuchananKE13, author = {William J. Buchanan and Zbigniew Kwecka and Elias Ekonomou}, title = {A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services}, journal = {Mob. Networks Appl.}, volume = {18}, number = {5}, pages = {728--737}, year = {2013}, url = {https://doi.org/10.1007/s11036-012-0362-6}, doi = {10.1007/S11036-012-0362-6}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/BuchananKE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/KweckaBSR13, author = {Zbigniew Kwecka and William J. Buchanan and Burkhard Schafer and Judith Rauhofer}, editor = {Matthias Horbach}, title = {Schutz der Anonymit{\"{a}}t als Gemeinschaftsaufgabe - eine neue Generation von PETs?}, booktitle = {43. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik angepasst an Mensch, Organisation und Umwelt, {INFORMATIK} 2013, Koblenz, Germany, September 16-20, 2013}, series = {{LNI}}, volume = {{P-220}}, pages = {2134--2148}, publisher = {{GI}}, year = {2013}, url = {https://dl.gi.de/handle/20.500.12116/20645}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/KweckaBSR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/healthcom/ThuemmlerMBBPFFGJMIKKSGBCP13, author = {Christoph Thuemmler and Oli H. Mival and David Benyon and William J. Buchanan and Alois Paulin and Samuel A. Fricker and Markus Fiedler and Astrid Gr{\o}ttland and Thomas Jell and Thomas Magedanz and Ioana Ispas and Bert{-}Jaap Koops and Eleni Kosta and Armin Schneider and Anastasius Gavras and Maria Barros and Philippe Cousin and Euripides G. M. Petrakis}, title = {Norms and standards in modular medical architectures}, booktitle = {{IEEE} 15th International Conference on e-Health Networking, Applications and Services, Healthcom 2013, Lisbon, Portugal, October 9-12, 2013}, pages = {382--387}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/HealthCom.2013.6720705}, doi = {10.1109/HEALTHCOM.2013.6720705}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/healthcom/ThuemmlerMBBPFFGJMIKKSGBCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MacfarlaneBEUFL12, author = {Richard Macfarlane and William J. Buchanan and Elias Ekonomou and Omair Uthmani and Lu Fan and Owen Lo}, title = {Formal security policy implementations in network firewalls}, journal = {Comput. Secur.}, volume = {31}, number = {2}, pages = {253--270}, year = {2012}, url = {https://doi.org/10.1016/j.cose.2011.10.003}, doi = {10.1016/J.COSE.2011.10.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MacfarlaneBEUFL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ThuemmlerFBLEK12, author = {Christoph Thuemmler and Lu Fan and William J. Buchanan and Owen Lo and Elias Ekonomou and Abou Sofyane Khedim}, title = {E-Health: Chances and Challenges of Distributed, Service oriented Architectures}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {1}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ThuemmlerFBLEK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jurix/BuchananFLSSTU12, author = {William J. Buchanan and Lu Fan and Alistair Lawson and Burkhard Schafer and Russel Scott and Christoph Thuemmler and Omair Uthmani}, editor = {Burkhard Sch{\"{a}}fer}, title = {Computational data protection law: trusting each other offline and online}, booktitle = {Legal Knowledge and Information Systems - {JURIX} 2012: The Twenty-Fifth Annual Conference, University of Amsterdam, The Netherlands, 17-19 December 2012}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {250}, pages = {31--40}, publisher = {{IOS} Press}, year = {2012}, url = {https://doi.org/10.3233/978-1-61499-167-0-31}, doi = {10.3233/978-1-61499-167-0-31}, timestamp = {Fri, 04 Jun 2021 08:32:02 +0200}, biburl = {https://dblp.org/rec/conf/jurix/BuchananFLSSTU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wts/KhalafAB12, author = {Mustafa Bani Khalaf and Ahmed Yassin Al{-}Dubai and William J. Buchanan}, editor = {Steven R. Powell and Thomas Ketseoglou and J. P. Shim and Michael R. Bartolacci and Robert Stewart}, title = {A new efficient distributed route discovery for wireless mobile ad hoc networks}, booktitle = {2012 Wireless Telecommunications Symposium, {WTS} 2012, London, United Kingdom, April 18-20, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/WTS.2012.6266129}, doi = {10.1109/WTS.2012.6266129}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/wts/KhalafAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitsa/KweckaB11, author = {Zbigniew Kwecka and William J. Buchanan}, title = {Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform}, journal = {Int. J. Inf. Technol. Syst. Approach}, volume = {4}, number = {2}, pages = {12--31}, year = {2011}, url = {https://doi.org/10.4018/jitsa.2011070102}, doi = {10.4018/JITSA.2011070102}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitsa/KweckaB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/FanBTLKULB11, author = {Lu Fan and William J. Buchanan and Christoph Th{\"{u}}mmler and Owen Lo and Abou Sofyane Khedim and Omair Uthmani and Alistair Lawson and Derek Bell}, editor = {Ling Liu and Manish Parashar}, title = {{DACAR} Platform for eHealth Services Cloud}, booktitle = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011, Washington, DC, USA, 4-9 July, 2011}, pages = {219--226}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CLOUD.2011.31}, doi = {10.1109/CLOUD.2011.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/FanBTLKULB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/EkonomouFBT11, author = {Elias Ekonomou and Lu Fan and William J. Buchanan and Christoph Th{\"{u}}mmler}, editor = {Costas Lambrinoudakis and Panagiotis Rizomiliotis and Tomasz Wiktor Wlodarczyk}, title = {An Integrated Cloud-based Healthcare Infrastructure}, booktitle = {{IEEE} 3rd International Conference on Cloud Computing Technology and Science, CloudCom 2011, Athens, Greece, November 29 - December 1, 2011}, pages = {532--536}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CloudCom.2011.80}, doi = {10.1109/CLOUDCOM.2011.80}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/EkonomouFBT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Al-DubaiMOJB10, author = {Ahmed Yassin Al{-}Dubai and Geyong Min and Mohamed Ould{-}Khaoua and Xiaolong Jin and William J. Buchanan}, title = {Special issue: Performance evaluation and optimization of ubiquitous computing and networked systems}, journal = {J. Syst. Softw.}, volume = {83}, number = {8}, pages = {1299--1300}, year = {2010}, url = {https://doi.org/10.1016/j.jss.2010.03.028}, doi = {10.1016/J.JSS.2010.03.028}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Al-DubaiMOJB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paapp/MigasB10, author = {Nikos Migas and William J. Buchanan}, title = {\emph{Ad hoc} routing metrics and applied weighting for QoS support}, journal = {Int. J. Parallel Emergent Distributed Syst.}, volume = {25}, number = {4}, pages = {293--314}, year = {2010}, url = {https://doi.org/10.1080/17445760902894704}, doi = {10.1080/17445760902894704}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/paapp/MigasB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jurix/BuchananFLSSTU10, author = {William J. Buchanan and Lu Fan and Alistair Lawson and Burkhard Schafer and Russel Scott and Christoph Thuemmler and Omair Uthmani}, editor = {Radboud Winkels}, title = {Interagency data exchange protocols as computational data protection law}, booktitle = {Legal Knowledge and Information Systems - {JURIX} 2010: The Twenty-Third Annual Conference on Legal Knowledge and Information Systems, Liverpool, UK, 16-17 December 2010}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {223}, pages = {143--146}, publisher = {{IOS} Press}, year = {2010}, url = {https://doi.org/10.3233/978-1-60750-682-9-143}, doi = {10.3233/978-1-60750-682-9-143}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/jurix/BuchananFLSSTU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/GarriguesMBRB09, author = {Carles Garrigues and Nikos Migas and William J. Buchanan and Sergi Robles and Joan Borrell}, title = {Protecting mobile agents from external replay attacks}, journal = {J. Syst. Softw.}, volume = {82}, number = {2}, pages = {197--206}, year = {2009}, url = {https://doi.org/10.1016/j.jss.2008.05.018}, doi = {10.1016/J.JSS.2008.05.018}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/GarriguesMBRB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/MigasB08, author = {Nikos Migas and William J. Buchanan}, title = {Ad-hoc Routing Metrics and Applied Weighting for QoS support}, booktitle = {22nd {IEEE} International Symposium on Parallel and Distributed Processing, {IPDPS} 2008, Miami, Florida USA, April 14-18, 2008}, pages = {1--8}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/IPDPS.2008.4536496}, doi = {10.1109/IPDPS.2008.4536496}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/MigasB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/MigasABM07, author = {Nikos Migas and Constantia Anastasiadou and William J. Buchanan and Jim Marshall}, editor = {Hubert {\"{O}}sterle and Joachim Schelp and Robert Winter}, title = {Mass Customisation through Personalised Brochures: The Role of Emerging Technologies}, booktitle = {Proceedings of the Fifteenth European Conference on Information Systems, {ECIS} 2007, St. Gallen, Switzerland, 2007}, pages = {2283--2294}, publisher = {University of St. Gallen}, year = {2007}, url = {http://aisel.aisnet.org/ecis2007/82}, timestamp = {Wed, 24 Jul 2019 16:44:05 +0200}, biburl = {https://dblp.org/rec/conf/ecis/MigasABM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/BuchananMSA06, author = {William J. Buchanan and Nikos Migas and G. Sinclair and Kevin A. McArtney}, title = {Analysis of an agent-based metric-driven method for ad-hoc, on-demand routing}, journal = {Ad Hoc Networks}, volume = {4}, number = {2}, pages = {147--167}, year = {2006}, url = {https://doi.org/10.1016/j.adhoc.2004.04.009}, doi = {10.1016/J.ADHOC.2004.04.009}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/BuchananMSA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bjet/Buchanan06, author = {William J. Buchanan}, title = {Correlation between academic and skills-based tests in computer networks}, journal = {Br. J. Educ. Technol.}, volume = {37}, number = {1}, pages = {69--78}, year = {2006}, url = {https://doi.org/10.1111/j.1467-8535.2005.00476.x}, doi = {10.1111/J.1467-8535.2005.00476.X}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bjet/Buchanan06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AbimbolaMB06, author = {A. A. Abimbola and Jose Munoz and William J. Buchanan}, title = {NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data}, journal = {Comput. Secur.}, volume = {25}, number = {6}, pages = {445--451}, year = {2006}, url = {https://doi.org/10.1016/j.cose.2006.04.001}, doi = {10.1016/J.COSE.2006.04.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AbimbolaMB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AbimbolaMB06, author = {A. A. Abimbola and J. M. Munoz and William J. Buchanan}, title = {NetHost-sensor: Monitoring a target host's application via system calls}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {4}, pages = {166--175}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.10.003}, doi = {10.1016/J.ISTR.2006.10.003}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AbimbolaMB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/MigasB06, author = {Nikos Migas and William J. Buchanan}, title = {An auto-Configurable, and, Adaptable, Metric-driven Cluster-head Organisation for Hybrid Multi-hop Routing}, booktitle = {13th Annual {IEEE} International Conference and Workshop on Engineering of Computer Based Systems {(ECBS} 2006), 27-30 March 2006, Potsdam, Germany}, pages = {13--22}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ECBS.2006.23}, doi = {10.1109/ECBS.2006.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecbs/MigasB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icns/AbimbolaMB06, author = {A. A. Abimbola and Jose Munoz and William J. Buchanan}, title = {Investigating False Positive Reduction in {HTTP} via Procedure Analysis}, booktitle = {2006 International Conference on Networking and Services {(ICNS} 2006), 16-21 July 2006, Silicon Valley, California, {USA}}, pages = {87}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICNS.2006.65}, doi = {10.1109/ICNS.2006.65}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icns/AbimbolaMB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmc/BuchananMR05, author = {William J. Buchanan and Jose Munoz and Kashif Ali Raja}, title = {Critical analysis and error determination of locating-finding techniques in {GSM}}, journal = {Int. J. Mob. Commun.}, volume = {3}, number = {2}, pages = {165--182}, year = {2005}, url = {https://doi.org/10.1504/IJMC.2005.005905}, doi = {10.1504/IJMC.2005.005905}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmc/BuchananMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/MigasB05, author = {Nikos Migas and William J. Buchanan}, title = {Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing}, booktitle = {12th {IEEE} International Conference on the Engineering of Computer-Based Systems {(ECBS} 2005), 4-7 April 2005, Greenbelt, MD, {USA}}, pages = {147--154}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ECBS.2005.51}, doi = {10.1109/ECBS.2005.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecbs/MigasB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/BuchananGSSM05, author = {William J. Buchanan and Jamie Graves and Lionel Saliou and Hussain Al Sebea and Nikos Migas}, title = {Agent-based Forensic Investigations with an Integrated Framework}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {47--52}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Tue, 06 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/BuchananGSSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/SaliouBGM05, author = {Lionel Saliou and William J. Buchanan and Jamie Graves and Jose Munoz}, title = {Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {303--312}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/SaliouBGM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/MigasBM04, author = {Nikos Migas and William J. Buchanan and Kevin A. McArtney}, title = {Migration of Mobile Agents in Ad-hoc, Wireless Networks}, booktitle = {11th {IEEE} International Conference on the Engineering of Computer-Based Systems {(ECBS} 2004), 24-27 May 2004, Brno, Czech Republic}, pages = {530--535}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ECBS.2004.1316743}, doi = {10.1109/ECBS.2004.1316743}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecbs/MigasBM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/MigasBA03, author = {Nikos Migas and William J. Buchanan and Kevin A. McArtney}, title = {Mobile Agents for Routing, Topology Discovery, and Automatic Network Reconfiguration in Ad-Hoc Networks}, booktitle = {10th {IEEE} International Conference on Engineering of Computer-Based Systems {(ECBS} 2003), 7-10 April 2003, Huntsville, AL, {USA}}, pages = {200--206}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ECBS.2003.1194800}, doi = {10.1109/ECBS.2003.1194800}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecbs/MigasBA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iadis/MigasBA03, author = {Nikos Migas and William J. Buchanan and Kevin A. McArtney}, title = {{MARIAN:} {A} Framework Using Mobile Agents for Routing in Ad-Hoc Networks}, booktitle = {Proceedings of the {IADIS} International Conference WWW/Internet 2003, {ICWI} 2003, Algarve, Portugal, November 5-8, 2003}, pages = {1129--1134}, publisher = {{IADIS}}, year = {2003}, timestamp = {Thu, 12 Jul 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iadis/MigasBA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Buchanan02, author = {William J. Buchanan}, title = {The Complete Handbook of the Internet}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-0-306-48331-8}, doi = {10.1007/978-0-306-48331-8}, isbn = {978-1-4613-4999-0}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Buchanan02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/PikoulasBMT02, author = {John Pikoulas and William J. Buchanan and Mike Mannion and Kostas Triantafyllopoulos}, title = {An Intelligent Agent Security Intrusion System}, booktitle = {9th {IEEE} International Conference on Engineering of Computer-Based Systems {(ECBS} 2002), 8-11 April 2002, Lund, Sweden}, pages = {94}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ECBS.2002.999827}, doi = {10.1109/ECBS.2002.999827}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecbs/PikoulasBMT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0000778, author = {William J. Buchanan and Austin Wilson}, title = {Advanced {PC} architecture}, publisher = {Addison-Wesley-Longman}, year = {2001}, isbn = {978-0-201-39858-8}, timestamp = {Wed, 02 Feb 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0000778.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/PikoulasBMT01, author = {John Pikoulas and William J. Buchanan and Mike Mannion and Kostas Triantafyllopoulos}, title = {An Agent-Based Bayesian Forecasting Model for Enhanced Network Security}, booktitle = {8th {IEEE} International Conference on Engineering of Computer-Based Systems {(ECBS} 2001), 17-20 April 2001, Washington, DC, {USA}}, pages = {247--254}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ECBS.2001.922429}, doi = {10.1109/ECBS.2001.922429}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecbs/PikoulasBMT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0002937, author = {William J. Buchanan}, title = {Computer busses - design and application}, publisher = {Arnold}, year = {2000}, isbn = {978-0-340-74076-7}, timestamp = {Mon, 18 Apr 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0002937.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/ScottB00, author = {A. V. Scott and William J. Buchanan}, title = {Truly Distributed Control Systems using Fieldbus Technology}, booktitle = {7th {IEEE} International Symposium on Engineering of Computer-Based Systems {(ECBS} 2000), 3-7 April 2000, Edinburgh, Scotland, {UK}}, pages = {165}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ECBS.2000.839874}, doi = {10.1109/ECBS.2000.839874}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecbs/ScottB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/PikoulasMB00, author = {John Pikoulas and Mike Mannion and William J. Buchanan}, title = {Software Agents and Computer Network Security}, booktitle = {7th {IEEE} International Symposium on Engineering of Computer-Based Systems {(ECBS} 2000), 3-7 April 2000, Edinburgh, Scotland, {UK}}, pages = {211--217}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ECBS.2000.839879}, doi = {10.1109/ECBS.2000.839879}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecbs/PikoulasMB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/BuchananNS00, author = {William J. Buchanan and M. Naylor and A. V. Scott}, title = {Enhancing Network Management using Mobile Agents}, booktitle = {7th {IEEE} International Symposium on Engineering of Computer-Based Systems {(ECBS} 2000), 3-7 April 2000, Edinburgh, Scotland, {UK}}, pages = {218}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ECBS.2000.839880}, doi = {10.1109/ECBS.2000.839880}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecbs/BuchananNS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Buchanan96, author = {William J. Buchanan}, title = {Analysis of electromagnetic wave propagation using 3D finite-difference time-domain methods with parallel processing}, school = {Edinburgh Napier University, {UK}}, year = {1996}, url = {http://researchrepository.napier.ac.uk/4022/}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Buchanan96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.