cybercrime ()

Projects

RATTRAP (Guardian Toolkit)
The Office of Cyber Security & Information Assurance (OCSIA) estimates that the cost of cybercrime to businesses, in the UK alone, is over £21 billion per annum. This project focuses on the real-time assessment of the risks associated with affiliate marketing networks.
IIDI & Flexiant Ltd
This research project studies the feasibility of a Cloud-based platform which is used to evaluate the performance of digital forensics tools. Along with measuring key quality metrics, such as true-positives, and false-positives, the platform also measures operational performance, such as the speed...
Symposium on Security Risk, Cybercrime and Critical Infrastructure
This symposium aims to bring together knowledge from many different domains in order to create knowledge exchange and collaborative infrastructures, which address the key risks that Scotland faces. The focus on this symposium is security risk, cybercrime and the protection of critical...

Members

William Buchanan
Director of CDCS
w.buchanan@napier.ac.uk
+44 131 455 2759
Owen Lo
Research Fellow
o.lo@napier.ac.uk
+44 131 455
Richard Macfarlane
Lecturer
r.macfarlane@napier.ac.uk
+44 131 455 2335
Alastair Wilson
Visting Academic
A.Wilson2@napier.ac.uk
+44 131 455
Jamie Graves
Affiliate Research Fellow
j.graves@napier.ac.uk
+44 131 455
Robert Ludwiniak
Lecturer
r.ludwiniak@napier.ac.uk
+44 131 455 2780
Omair Uthmani
Academic
o.uthmani@napier.ac.uk
+44 131 455

Publications

Buchanan, W. (2012, Feb). Skills for cyber security. Paper presented at Cybercrime and Data Protection, Dynamic Earth, Edinburgh.

Buchanan, W. (2012, ). Training the Next Generation. Paper presented at Digital Security and Cybercrime Staff Skills Shortage: Addressing the Issues, Edinburgh.

Buchanan, W., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., Bose, N., Ludwiniak, R. (2011). Cloud-based Digital Forensics Evaluation Test (D-FET) Platform. Cyberforensics 2011, , (), .

Buchanan, W. (2011, Sept). Creation of Dynamic Environments for Virtualised and Cloud-based Teaching in Digital Forensics and Computer Security. Paper presented at CFET, Canterbury.

Buchanan, W., Macfarlane, R. (2011, June). D-FET – A Community Cloud for Enhancing Skills using Virtualised Environments and Cloud-based Infrastructures. Paper presented at Scottish Higher Education Employability Conference: Strengthening Partnerships with Employers, Heriot-Watt, Edinburgh.

Kwecka, Z., Buchanan, W., Spiers, D. (2011). Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform. International Journal of Information Technologies and Systems Approach (IJITSA) : Special issue on Privacy and Security Issues in IT, 4, (2), 12-31.

Miehling, M., Buchanan, W., Lawson, A. (2011). Affliate Advertising Fraud and an Investigatory Fraud Framework. In: (Ed.) CyberForensics 2011, , () ( ed.). (pp. ). Glasgow: . .

Miehling, M., Buchanan, W., Lawson, A. (2011, Auguest). Detection Framework for the Reduction of Click-through and ID Theft Fraud in Affiliate Marketing. Paper presented at SCONE, Glasgow.

Scott, R., Uthmani, O., Buchanan, W., Lawson, A. (2011, June). Intelligence Information Sharing between the Police and their Community Partners. Paper presented at Symposium on Security and Cybercrime, Edinburgh Napier University.

Uthmani, O., Buchanan, W., Lawson, A. (2011, August). Risk Analysis for Criminal Context in Information Sharing Policies. Paper presented at SCONE, Glasgow.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Thuemmler, C., Uthmani, O. (2010, ). Interagency data exchange protocols as computational data protection law. Paper presented at Legal Knowledge and Information Systems, .

Buchanan, W., Macfarlane, R., Ludwiniak, R. (2010, ). Student Perception of On-Line Lectures with a Blended Learning Environment. Paper presented at The 4th International Conference on Cybercrime Forensics Education & Training, Canterbury.

Kwecka, Z., Buchanan, W., Spiers, D. (2010). Privacy-preserving data acquisition protocol. In: (Ed.) IEEE International Conference of Computational Methods in Electrical and Electronics Engineering, , () ( ed.). (pp. 131 - 136). Listvyanka: . IEEE.

Lo, O., Graves, J., Buchanan, W. (2010). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. 190-200). Greece: . .

Miehling, M., Buchanan, W., Old, L.J., Batey, A., Rahman, A. (2010). Analysis of Malicious Affiliate Network Activity as a Test Case for an Investigatory Framework. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). Greece: . .

Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C. (2010). Novel Information Sharing Syntax for Data Sharing between Police and Community Partners, using Role-based Security. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. 394-402). Greece: . .

Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C., Fan, L. (2010). Novel Information Sharing Syntax for Data Sharing Between Police and Community Partners, Using Role-Based Security. Proceedings of the 9th European Conference on Information Warfare and Security, , (), 394-402.

Buchanan, W., Thuemmler, C. (Eds.) (2009). International Journal of Healthcare Technology and Management: Special Issue on Patient-Centric Modelling and Enhanced Security in Distributed Healthcare Systems, 10 (1/2), () ( ed.). : . Inderscience.

Kwecka, Z., Buchanan, W., Saliou, L. (2008). Validation of 1-N OT Algorithms in Privacy-Preserving Investigations. In: (Ed.) 7th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). : . .