security ()

Areas of Expertise

Electronic information now plays a vital role in almost every aspect of our daily lives. So the need for a secure and trustworthy online infrastructure is more important than ever. without it, not only the growth of the internet but our personal interactions and the economy itself could be at risk.

Projects

Dynamic Forensics Evaluation and Training (DFET)
Dynamic Forensics Evaluation and Training (DFET) will create new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the development of a virtual (cloud-based) cybercrime training environment to...
Symposium on Cyber Security
Aim and Scope of Symposium This symposium aims to bring together knowledge from many different domains in order to create knowledge exchange and collaborative infrastructures, which address the key cyber risks that Scotland and the UK faces.
IMP
IMP
The collaboration between Edinburgh Napier University and Silver IMP aims to apply existing patent pending technology for targeted marketing, into secure working, where documents can only be accessed based on the location of the user.
Trust and Governance Integration into Living It Up (Sitekit)
The focus on this application is to integrate a Trust and Governance Engine into the TSB-funded DALLAS Living It Up (LiU) project. DALLAS (Delivering Assisted Living At Scale) aims to create new information infrastructures for health and social care, and which are citizen focused.
Digital Investigator
The focus of this course is to provide a foundation in investigating network-based crimes, and in proactive methods that can be used to assess network-based threats. The course is structured in five key areas, and will re-enforce knowledge, building up to a final large-scale investigation.
IPv6 Business Case Demonstrators for Farrpoint
The project aims to provide demonstrators for IPv6 which will showcase it within key business sectors, including in the finance sector and in health care.
Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures
This project extends the e-Health Cloud-based Platform, and integrates with assisted living. The project integrates Edinburgh Napier University, Microsoft and HoIP, and has created a novel governance policy infrastructure using a circle-of-trust relationship for assisted living, which then links to...
Allatus Consultancy
The main aim is to create optimal search methods for the matching of terms within a finance ontology.
Symposium on Security Risk, Cybercrime and Critical Infrastructure
This symposium aims to bring together knowledge from many different domains in order to create knowledge exchange and collaborative infrastructures, which address the key risks that Scotland faces. The focus on this symposium is security risk, cybercrime and the protection of critical...
Cloud-based Cash-flow Project
IIDI is working with Level10 Ltd on a new project awarded under the SFC Innovation Voucher scheme
Information Sharing between Police and Community Partners
The exchange of information between the police and community partner organisations forms a core aspect of effective policing and community service provision. However, this must be governed by sets of legislative and organisational rules, or policies.
IIDI & Flexiant Ltd
This research project studies the feasibility of a Cloud-based platform which is used to evaluate the performance of digital forensics tools. Along with measuring key quality metrics, such as true-positives, and false-positives, the platform also measures operational performance, such as the speed...
Data Capture and Auto Identification Reference
This project relates to the research collaboration between Edinburgh Napier University, CipherLab, Chelsea and Westminster Hospital, GS1 UK, Imperial College, and Kodit, and is funded through a research project with the TSB (Technology Strategy Board).
FSA PhD Studentship
This studentship is in co-operation with the Financial Services Authority (FSA) and the original aim was to examine an issue in the area of e-commerce that could greatly affect the financial sector. Throughout the course of the research, a framework for the automatic evaluation of web sites has...
.net Mobile Agents
Mobile agents are capable of enhancing distributed applications due to their inherent characteristics, such as code and state mobility, network awareness, intelligence, and so on. The predominant development language of mobile agent systems is Java due to its platform independence and sandbox...
e-Representative: A virtual desktop to support the mobile elected Representative
The primary focus of the “eRepresentative” package was to investigate the potential impact of a “virtual elected representative’s desktop” to support the work of elected representatives at national, regional and local level by making legislative services more effective and more tailored to meet...
Cisco Local Academy 2005-6
This course presents the Cisco CCNA syllabus.
ILI TRUSTLii Personal Data Security
This project aims to enhance ILI's existing TRUSTLii system by using novel and unique methods to extract useful insights from personal data, as well as improving the security of personal data stores to endow the customers with the maximum protection available.
Transcribe UK - iVano
This IIDI project, led by Alistair Lawson is a review of the Transcribe UK current system documentation, code base, workflow, and manual administration processes, followed by interviews of key staff and stakeholders, with a view to compiling a report with recommendations that Transcribe UK can use...
Deiseal Ltd: Research into and initial development of support systems and software applications
This IIDI project, led by Alistair Lawson, involves research into and initial development of support systems and software applications for Deiseal Ltd in relation to Ùlpan (Gaelic Language Learning for Adults). The project is funded by Deiseal Ltd who have in turn have received funding from Bòrd na...
CM2000
Investigates the integration of data from social care visits.
First August - Real-time Cyber Tracking and Risk Assessment Tool
The aim of the project is to develop a Cyber risk tool, which is able to assess the financial costs of cyber attacks
sa.Fire
Information Sharing between Domains using Policy Integration and Modelling. The Safi.re project builds upon collaboration with the Scottish Police into information sharing between the Police and their Community partners. This project aims to provide a completely integrated platform for the creation...
SHEDFINDERS
Integration of multiple sources of data from industrial property sites. Scanning of affiliate sites for industrial property information. Creation of federated data streams.
RATTRAP (Guardian Toolkit)
The Office of Cyber Security & Information Assurance (OCSIA) estimates that the cost of cybercrime to businesses, in the UK alone, is over £21 billion per annum. This project focuses on the real-time assessment of the risks associated with affiliate marketing networks.
e-Health Security Infrastructure Evaluation
IIDI is working with Patient Reminders Limited supported the SFC Innovation Voucher scheme. Patient Reminders Limited provides patient reminder products and solutions for use in clinical studies, pharma marketing, public health, assisted living, safety surveillance, patient care and disease...
Core Product Development
IIDI is working with Core Business Psychology Ltd supported by the SFC Innovation Voucher scheme
IIDI & The Online Pension Company Ltd
IIDI has been successful in obtaining funding for a new collaborative project with The Online Pension Company Ltd supported by the SFC Innovation Voucher Scheme.
Symposium in Security and Cybercrime
The UK is faced with many new threats which could damage the infrastructure of the country, especially in terms of its critical infrastructure. These threats include the risk to individuals, to communities, and to businesses. Thus there needs to be an integrated approach to understanding these...
Information Sharing between the Police and their Community Partners
This is a three year PhD award from the SIPR (Scottish Institute for Policing Research) and focuses on creating new models for information sharing between the police and their community partners.
DigitalDNA
This work is funded by Scottish Enterprise for a Proof-of-Concept, and involves translating system call information into Digital DNS. It investigates highly authenticated and verifiable digital forensics.
Digital forensic Toolkit
This project aims to produce next generation digital forensics tools, using novel methods based on DNA matching.
QMAX
This project aims to create a Web site for auditing within the motor industry.
Seven Layer Communications Ltd
The TCD aims to produce an advanced testing system using reusable components.

Members

Peter Aaby
Research student
p.aaby@napier.ac.uk
+44 131 455
Emidio Battipaglia
student developer
E.Battipaglia@napier.ac.uk
+44 131 455
William Buchanan
Director of CDCS
w.buchanan@napier.ac.uk
+44 131 455 2759
Gabrielle Cleary
PhD Student
+44 131 455
Mike Dickson
Visiting Academic
M.Dickson@napier.ac.uk
+44 131 455
Lu Fan
Senior Research Fellow
l.fan@napier.ac.uk
+44 131 455 2438
Frank Greig
Lecturer
f.greig@napier.ac.uk
+44 131 455 2755
Abou Sofyane Khedim
Affiliate Research Associate
a.khedim@napier.ac.uk
+44 131 455 2775
Petra Leimich
Lecturer in Security and Networks
P.Leimich@napier.ac.uk
+44 131 455 2593
Owen Lo
Research Fellow
o.lo@napier.ac.uk
+44 131 455
Richard Macfarlane
Lecturer
r.macfarlane@napier.ac.uk
+44 131 455 2335
Sean McKeown
Associate
S.McKeown@napier.ac.uk
+44 131 455
Philip Penrose
Research student
P.Penrose@napier.ac.uk
+44 131 455
Imed Romdhani
Associate Professor
i.romdhani@napier.ac.uk
+44 131 455 2726
Adrian Smales
Research Fellow
a.smales@napier.ac.uk
+44 131 455
Andreas Steyven
Research Student
A.Steyven@napier.ac.uk
+44 131 455
Christoph Thuemmler
Professor
c.thuemmler@napier.ac.uk
+44 131 455 2758
Omair Uthmani
Academic
o.uthmani@napier.ac.uk
+44 131 455
Nicole van Deursen (Hazelhoff Roelfze
Research Student
n.hazelhoffroelfzema@napier.ac.uk
+44 131 455
Alastair Wilson
Visting Academic
A.Wilson2@napier.ac.uk
+44 131 455
Aurelien Ammeloot
Research student
a.ammeloot@napier.ac.uk
+44 131 455 2964
Liam Bell
Research Fellow
L.Bell@napier.ac.uk
+44 131 455
Charley Celice
Researcher
c.celice@napier.ac.uk
+44 131 455
Peter Cruickshank
Lecturer
p.cruickshank@napier.ac.uk
+44 131 455 2309
Elias Ekonomou
Lecturer
E.Ekonomou@napier.ac.uk
+44 131 455 2789
Jamie Graves
Affiliate Research Fellow
j.graves@napier.ac.uk
+44 131 455
John Howie
Visiting Professor
J.Howie@napier.ac.uk
+44 131 455
Alistair Lawson
Associate Professor (Reader)
al.lawson@napier.ac.uk
+44 131 455 2730
Shancang Li
Lecturer
S.Li@napier.ac.uk
+44 131 455 2822
Robert Ludwiniak
Lecturer
r.ludwiniak@napier.ac.uk
+44 131 455 2780
Vassilis Manoussos
Digital Forensics & Cybercrime Consultant
V.Manoussos@napier.ac.uk
+44 131 455
Naghmeh Moradpoor
Lecturer in Cybersecurity and Networks
N.Moradpoor@napier.ac.uk
+44 131 455 2596
Bruce Ramsay
Senior Research Fellow
B.Ramsay@napier.ac.uk
+44 131 455 2746
Gordon Russell
Senior Lecturer
g.russell@napier.ac.uk
+44 131 455 2754
Grzegorz Spyra
Research student
G.Spyra@napier.ac.uk
+44 131 455
Zhiyuan Tan
Lecturer
Z.Tan@napier.ac.uk
+44 131 455 2822
Elochukwu Ukwandu
Resarch Student
E.Ukwandu@napier.ac.uk
+44 131 455 +44 131 455 2789
Solomon Uwagbole
Research Student
s.uwagbole@napier.ac.uk
+44 131 455 2779
Zhe Wang
Research student
z.wang2@napier.ac.uk
+44 131 455 2303

Publications

Buchanan, W., woodward, a., helme, s. (2017). Cryptography across industry sectors. Journal of Cyber Security Technology, , (), .

Saleem, K., Tan, Z., Buchanan, W. (2017). Security for Cyber-Physical Systems in Healthcare. Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare, 12, (), 233-251.

Abdmeziem, M., Tandjaoui, D., Romdhani, I. (2016). A New Distributed MIKEY Mode to Secure E-health Applications. In: (Ed.) Proceedings of the International Conference on Internet of Things and Big Data (IoTBD 2016), , () ( ed.). (pp. 88-95). Rome, Italy: . .

Abdmeziem, M., Tandjaoui, D., Romdhani, I. (2016). DBGK: A Decentralized Batch-based Group Key Management Protocol for the Internet of Things. IEEE Transactions on Dependable and Secure Computing, , (), .

Abdmeziem, M., Tandjaoui, D., Romdhani, I. (2016). Distributed and Compressed MIKEY Mode to Secure End-to-End Communications in the Internet of Things. In: Society, I., Society, I. (Eds.) Proceedings of the 5th IEEE International Conference on Mobile Services, , () ( ed.). (pp. ). : . IEEE.

Abdmeziem, M., Tandjaoui, D., Romdhani, I. (2016). Lightweighted and Energy-Aware Mikey-Ticket For E-Health Applications in the Context of Internet of Things. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, , (), .

Buchanan, W., Deursen, N. (2016). HI-risk: A Method to Analyse Health Information Risk Intelligence. In: (Ed.) IEEE 15th International Conference on e-Health Networking, Applications & Services, , () ( ed.). (pp. ). Munich, Germany: . IEEE.

Buchanan, W. (2016). vSoC: Advanced Virtualised Security Operations Centre for Training and Research. In: (Ed.) UKNOF, , () ( ed.). (pp. ). Glasgow: . .

Killick, L., Duff, A., Hall, H., Deakin, M. (2016). Power to the Population? The Population Census under Review. In: (Ed.) ACTIS 2015, , () ( ed.). (pp. ). Japan: . IAFOR.

Li, S., Romdhani, I., Buchanan, W. (2016). Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, (3), 32-36.

Li, S., Romdhani, I., Buchanan, W. (2016). Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications: Recent Development on Security and Privacy in Modern Communication Environments, S0, (), 32-36.

Li, S., Tryfonas, T., Li, H. (2016). The Internet of Things: A Security Point of View. Internet Research, 26, (2), 337 - 359.

Molla, R., Romdhani, I., Buchanan, W. (2016). 3LS-Authenticate: an e-Commerce Challenge-Response Mobile Application. In: (Ed.) 13th ACS/IEEE International Conference on Computer Systems and Applications, , () ( ed.). (pp. ). Agadir, Morocco: . IEEE.

spyra, g., Buchanan, W., Ekonomou, E. (2016). Sticky policy enabled authenticated OOXML. In: (Ed.) IEEE SAI Computing Conference, , () ( ed.). (pp. ). : . .

Spyra, G., Buchanan, B., Ekonomou, E. (2016). Sticky policy enabled authenticated OOXML. In: (Ed.) TC - 2016 SAI Computing Conference (SAI) 2016 13-15 July, , () ( ed.). (pp. ). : . IEEE.

Tan, Z., Saleem, K., Buchanan, W. (2016). Security for Cyber-Physical Systems in Healthcare. In: (Ed.) Health 4.0: How Industry 4.0 and Virtualization are Revolutionizing Healthcare (In-print), , () ( ed.). (pp. ). : . .

Uwagbole, S., Buchanan, W., Fan, L. (2016). Applied Web Traffic Analysis for Numerical Encoding of SQL Injection Attack Features. In: (Ed.) ECCWS-2016, , () ( ed.). (pp. ). Munich, Germany: . .

Uwagbole, S., Buchanan, W., Fan, L. (2016). ECCWS 2016 - Proceedings of The 15th European Conference on Cyber Warfare and Security. In: (Ed.) ECCWS 2016 - Proceedings of The 15th European Conference on Cyber Warfare and Security, , () ( ed.). (pp. ). Munich, Germany: . .

Buchanan, W. (2015, July, 21). Ashley Madison breach reveals the rise of the moralist hacker. theconversation.com, .

Buchanan, W. (2015, June). Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh.

Buchanan, W., Smales, A. (2015, ). Cyber Security in Practice: Identifying areas of vulnerability. Paper presented at Scot-Secure 2015, Holyrood, Edinburgh.

Buchanan, W. (2015, May 7). Edinburgh leading world in beating online crime. The Scotsman, .

Buchanan, W., Ramsay, B., Macfarlane, R., Smales, A., keane, e., callahan, c., Blazic, B., Popov, O. (2015, August). Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury.

Buchanan, W. (2015, April). Identifying areas of vulnerability. Paper presented at Scot-secure 2015, Dynamic Earth, Edinburgh.

Buchanan, W. (2015, Jan 2015). If you seek to ‘switch off’ encryption, you may as well switch off the whole internet. The Conversation, .

Buchanan, W. (2015, February 24). Lenovo’s security debacle reveals blurred boundary between adware and malware. The Conversation, .

Buchanan, W., Ramsay, B., Macfarlane, R., Smales, A., Russell, G. (2015). Teaching Penetration and Malware Analysis in a Cloud-based Environment. In: (Ed.) Proceedings of the 1st Uk Workshop on Cybersecurity Training & Education, , () ( ed.). (pp. ). : . .

Buchanan, W. (2015, June, 8). US hack shows data is the new frontier in cyber security conflict. theconversation.com, .

Buchanan, W. (2015, May 15). When amateurs do the job of a professional, the result is smart grids secured by dumb crypto. theconversation.com, .

Killick, L., Deakin, M., Duff, A., Hall, H. (2015, June). The role of the census in public policy-making: information practices of policy makers. Paper presented at Information: interactions and impact (i3) 2015, Robert Gordon University, Aberdeen, Scotland.

Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., Russell, G. (2015). Real-time Monitoring of Privacy Abuses and Intrusion Detection in Android System. In: (Ed.) Proceedings of HCI International 2015, , () ( ed.). (pp. ). : . .

Moradpoor, N. (2015). SQL-IDS: Evaluation of SQLi Attack Detection and Classification Based on Machine Learning Techniques. In: (Ed.) 8th International Conference on Security of Information and Networks (SIN15), , () ( ed.). (pp. 258-266). Russia: . ACM.

Ryan, F., Cruickshank, P., Hall, H., Lawson, A. (2015, June). Assessing the available and accessible evidence: How personal reputations are determined and managed online. Paper presented at Information: interactions and impact (i3) 2015, Robert Gordon University, Aberdeen, Scotland.

spyra, g., Buchanan, W., Ekonomou, E. (2015, ). Sticky policy enabled authenticated OOXML for Health Care. Paper presented at HIS 2015, Edinburgh.

Spyra, G., Buchanan, W., Ekonomou, E. (2015). Sticky-Policy enabled authenticated OOXML for Health Care. In: (Ed.) The Workshops in Computing, , () ( ed.). (pp. ). Edinburgh: . British Computer Society.

Ambusaidi, Mohammed A., He, X., Tan, Z., Nanda, P., Lu, L., Nagar, Upasana T. (2014). A Novel Feature Selection Approach for Intrusion Detection Data Classification. In: (Ed.) 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. 82 - 89). Beijing, China: . IEEE.

Buchanan, W. (2014, Nov 2014). Better locks to secure our data are the inevitable result of too many prying eyes. The Conversation, .

Buchanan, W. (2014, April 2014). Discrete Logarithms within Computer and Network Security. Paper presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium, International Centre for Mathematical Sciences, University of Edinburgh.

Buchanan, W. (2014, June,2014). How the love of one teenager brought Tweetdeck to its knees. theconversation.com, .

Buchanan, W. (2014, ). In cybersecurity, the weakest link is … you. The Conversation, .

Buchanan, W. (2014, Oct 2014). iWorm hack shows Macs are vulnerable too. The Conversation, .

Buchanan, W. (2014, ). The New Enlightenment in Scotland. Paper presented at Secure Scotland, Royal Exchange Square, Glasgow.

Buchanan, W., Smales, A. (2014, Feb). The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working, Edinburgh.

Buchanan, W. (2014, Oct 2014). When the ATM runs Windows, how safe is your money?. The Conversation, .

Chinenyeze, S., Liu, X., Al-Dubai, A. (2014). An Aspect Oriented Model for Software Energy Efficiency in Decentralised Servers. In: (Ed.) 2nd International Conference on ICT for Sustainability (ICT4S 2014), , () ( ed.). (pp. ). Stockholm, Sweden: . Atlantis Press.

He, X., Chomsiri, T., Nanda, P., Tan, Z. (2014). Improving Cloud Network Security Using Tree-Rule Firewall. Future Generation Computer Systems, 30, (), 116-126.

Jan, M., Nanda, P., He, X., Tan, Z., Liu, R. (2014). A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In: (Ed.) 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. 205 - 211). Beijing, China: . IEEE.

Kwecka, Z., Buchanan, W., SCHAFER, B. (2014). "I am Spartacus" – Privacy Enhancing technologies and Privacy as a public good. Artificial Intelligence and Law, 22, (2), 113-139.

Lawson, A., Macfarlane, R. (2014, April). Embedding programming skills to support the student journey in networking, security and digital forensics. Paper presented at HEA STEM Annual Learning and Teaching Conference 2014: Enhancing the STEM Student Journey, University of Edinburgh.

Molla, R., Romdhani, I., Buchanan, W., Fadel, Etimad Y. (2014). Mobile User Authentication System for E-commerce Applications. In: (Ed.) International Conference on Advanced Networking, Distributed Systems and Applications 2014, , () ( ed.). (pp. ). : . IEEE.

Moradpoor, N. (2014). Employing Neural Networks for the Detection of SQL Injection Attack. In: (Ed.) 7th International Conference on Security of Information and Networks (SIN14), , () ( ed.). (pp. 318). UK: . ACM.

Spyra, G., Buchanan, W., Cruickshank, P., Ekonomou, E. (2014). CLOUD-BASED IDENTITY AND IDENTITY META-DATA: SECURE AND CONTROL OWN DATA IN GLOBALIZATION ERA. International Journal of Reliable and Quality E-Healthcare (IJRQEH), 3, (1), 49-66.

spyra, g., Buchanan, W. (2014). Distributed, Highly-Scalable, Sticky Policies Implementation for Healthcare. In: (Ed.) BCS Health Informatics Scotland (HIS), , () ( ed.). (pp. ). Glasgow, UK: . BCS.

Tan, Z., Nagar, Upasana T., He, X., Nanda, P., Liu, R., Wang, S., Hu, J. (2014, September). Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE Cloud Computing, 27 - 33.

van Deursen (Hazelhoff Roelfze, N. (2014). HI-Risk: a Socio-Technical Method for the Identification and Monitoring of Healthcare Information Security Risks in the Information Society (PhD). Edinburgh Napier University (Duff, P., Buchanan, W.).

Wu, Y., Ko, Ryan K. L., Al-Dubai, A. (2014). Special Issue on Advances in Trust, Security and Privacy for Wireless and Mobile Networks. Wireless Personal Communications. Wireless Personal Communications, 75, (3), .

Buchanan, W., Kwecka, Z., Ekonomou, E. (2013). A Novel Privacy Preserving Method for the Location Tracking of Mobile Devices. The Journal of Mobile Communication, Computation and Information: Special Issue on Security, 18, (), 728–737.

Buchanan, W., Burns, N., Lo, O., Lewis, R., Uthmani, O., Fan, L. (2013, April). A Scaleable and Trusted e-Health eco-System: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013, European Commission, Brussels.

Buchanan, W. (2013, ). Building a New Nation: Risk, Goverance and Trust. Paper presented at Cyber Security 2013, Edinburgh.

Buchanan, W., Smales, A. (2013, ). e-Health in the Cloud. Paper presented at Future of e-Health, Hollyrood, Edinburgh.

Buchanan, W., Macfarlane, R., Clayton, J. (2013). Experimental Evaluation of Disk Sector Hash Comparison for Forensic Triage using a Bloom Filter. In: (Ed.) CyberForensics 2013, , () ( ed.). (pp. ). : . .

Buchanan, W., Fan, L., Uthmani, O., SCHAFER, B. (2013). Interagency Data exchange, Privacy protection and Governance Architecture for Information Sharing across Domains. Artificial Intelligence and Law, , (), .

Buchanan, W., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., varga, j., anderson, c. (2013). Modelling of Integrated Trust, Governance and Access safi.re: Information Sharing Architecture. Communications in Computer and Information Science, 182, (), 91-101 .

Buchanan, W., Smales, A. (2013, ). Public Perceptions in Health Care Security. Paper presented at Health Informatics 2013, Heriot-Watt, Edinburgh.

Buchanan, W. (2013, March). The Challenges of Big Data: Future Risks, Governance and Trust. Paper presented at The Future of Cyber Security 2013, London, UK.

Buchanan, W., Burns, N., Lo, O., Uthmani, O., varga, j., Lawson, A., anderson, c. (2013). Who Would You Trust To Identify You In Accessing Your Health Record?. Communications in Computer and Information Science, , (), .

Kwecka, Z., Buchanan, W., SCHAFER, B. (2013). Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?. In: (Ed.) INFORMATIK 2013, , () ( ed.). (pp. 2134-2148 ). : . Köllen Druck+Verlag.

Thomson, A., Graham, M., Kennedy, J. (2013). Pianola - Visualization of Multivariate Time-Series Security Event Data. In: (Ed.) Proceedings of IV2013, , () ( ed.). (pp. 123-131). London, UK: . .

van Deursen (Hazelhoff Roelfze, N., Buchanan, W., Duff, A. (2013). Monitoring information security risks within health care. Computers and Security, 37, (), 31-45.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C. (2012, ). Case Study: Moving Towards an e-health Platform to Store NHS Patient Information in the Cloud . Paper presented at Cloud Computing in the Public Sector: The Way Forward, London.

Buchanan, W., Macfarlane, R., Graves, J., Fan, L., Ekonomou, E., Bose, N. (2012). Cloud Forensics. In: (Ed.) , , () ( ed.). (pp. ). : . .

Buchanan, W., Fan, L., Ekonomou, E., Lo, O. (2012, ). Cloud4Health. Paper presented at Symposium on the Future of e-Health, Edinburgh.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Scott, R., Thuemmler, C., Uthmani, O. (2012). Computational data protection law: trusting each other offline and online. Frontiers in Artificial Intelligence and Applications, Volume 250: Legal Knowledge and Information Systems, (), 31 - 40.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Scott, R., Thuemmler, C., Uthmani, O. (2012). Computational data protection law: trusting each other offline and online. . Legal Knowledge and Information Systems, 250, (), 31-40.

Buchanan, W. (2012, ). Education & Training for Future Threats. Paper presented at ITEC 2012, London.

Buchanan, W. (2012). Future Risks – Including The Rise of the Hacktivism. In: (Ed.) National Information Security Conference (NISC), , () ( ed.). (pp. ). : . .

Buchanan, W. (2012). Hashing Functions in Microsoft .NET. .

Buchanan, W., Fan, L., Lo, O., Ekonomou, E. (2012, ). HOLISTIC HEALTHCARE WITHIN DYNAMIC INFORMATION INFRASTRUCTURES - THE CLOUD BASED eHEALTH PLATFORM. Paper presented at eHealth 2012, Dynamic Earth, Edinburgh.

Buchanan, W., Lewis, R., Fan, L., Uthmani, O. (2012, June). Information Sharing Around Child Protection. Paper presented at Information Sharing in the Public Sector, Edinburgh.

Buchanan, W. (2012, June). Innovation in Cloud Environments. Paper presented at Future of Technology, Royal Society of Edinburgh.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., Thuemmler, C. (2012, May). Integrating Assisted Living with Primary and Secondary Health Care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing, Edinburgh.

Buchanan, W. (2012, ). New Threats. Paper presented at Transatlantic Conference 2012, Edinburgh.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C. (2012, ). Patient Centric Health Care: An Integrated and Secure, Cloud-based, e-Health Platform. Paper presented at BCS Branch Meeting, University of Edinburgh Informatics Forum.

Buchanan, W. (2012). Plugging the Gaps. ITNOW, 54, (4), 36-37(2).

Buchanan, W. (2012, Feb). Skills for cyber security. Paper presented at Cybercrime and Data Protection, Dynamic Earth, Edinburgh.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C., Lawson, A. (2012, ). The UK’s eHealth Cloud Project: EHR And The Cloud: Assessing The Benefits And Mitigating The Risks. Paper presented at Arab Health 2012 (Electronic Healthcare Records), Dubai.

Buchanan, W. (2012). Towards a New Health and Social Care Information Sharing Architecture. .

Buchanan, W. (2012, ). Training the Next Generation. Paper presented at Digital Security and Cybercrime Staff Skills Shortage: Addressing the Issues, Edinburgh.

Fan, L., Buchanan, W., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., Ekonomou, E., Khedim, A. (2012). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In: (Ed.) eTELEMED 2012, , () ( ed.). (pp. 99-104). : . .

Lo, O., Fan, L., Buchanan, W., Thuemmler, C. (2012). Technical Evaluation of an E-Health Platform. IADIS E-Health 2012, , (), 21-28.

Lo, O., Fan, L., Buchanan, W., Thuemmler, C., Lawson, A. (2012). Towards Simulation of Patient Data for Evaluation of E-Health Platform and Services. In: (Ed.) PGNET 2012, , () ( ed.). (pp. 160-165). : . .

Macfarlane, R., Buchanan, W., Ekonomou, E., Uthmani, O., Fan, L., Lo, O. (2012). Review of Security Policy Implementations. Computers & Security, 31, (2), 253-271.

Russell, G., Macfarlane, R. (2012). Security Issues of a Publicly Accessible Cloud Computing Infrastructure. In: (Ed.) Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), , () ( ed.). (pp. 1210-1216). : . IEEE Computer Society.

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. (2012). Triangle-area-based multivariate correlation analysis for effective denial-of-service attack detection. In: (Ed.) Proceeding of 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. 33-40). : . IEEE.

Thuemmler, C., Fan, L., Buchanan, W., Lo, O., Ekonomou, E., Khedim, A. (2012). E-Health: Chances and Challenges of Distributed, Service oriented Architectures. Journal of Cyber Security and Mobility, 37, (52), .

Uwagbole, S., Buchanan, W., Fan, L. (2012). Novel Tracking of Rogue Network Packets Using Danger Theory Approach. 11th European Conference on Information Warfare and Security (ECIW-2012), , (), .

Buchanan, W., Flandrin, F., Macfarlane, R., Graves, J. (2011). A Methodology to Evaluate Rate-Based Intrusion Prevention System against Distributed Denial-of-Service (DDoS). In: (Ed.) Cyberforensics 2011, , () ( ed.). (pp. ). : . .

Buchanan, W. (2011, May). A next generation Cloud-based health care platform. Paper presented at Innovation in Healthcare, London.

Buchanan, W. (2011). Advanced Cloud and Virtualisation ( ed.). : . CRC Press.

Buchanan, W., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., Bose, N., Ludwiniak, R. (2011). Cloud-based Digital Forensics Evaluation Test (D-FET) Platform. Cyberforensics 2011, , (), .

Buchanan, W., Fan, L., Thuemmler, C., Lo, O., Ekonomou, E. (2011, Sept). Cloud-based e-Health System. Paper presented at BCS Health Informatics, Edinburgh.

Buchanan, W. (2011, Sept). Creation of Dynamic Environments for Virtualised and Cloud-based Teaching in Digital Forensics and Computer Security. Paper presented at CFET, Canterbury.

Buchanan, W., Macfarlane, R. (2011, June). D-FET – A Community Cloud for Enhancing Skills using Virtualised Environments and Cloud-based Infrastructures. Paper presented at Scottish Higher Education Employability Conference: Strengthening Partnerships with Employers, Heriot-Watt, Edinburgh.

Buchanan, W. (2011). Evidence to the Justice Committee at the Scottish Parliament . Scottish Executive.

Buchanan, W. (2011). How Academic IT Departments Manage Changing IT Environments. VitAL, 5 , (1), 26-32.

Buchanan, W. (2011). Introduction to Security and Network Forensics ( ed.). : . Auerbach Publications.

Buchanan, W. (2011, ). Making assessment and feedback fun: feedback before and after assessments. Paper presented at Edinburgh Napier University Staff Conference, Edinburgh Napier University.

Buchanan, W. (2011, June). Next Generation Secure e-Health Platform. Paper presented at BCS ISSG seminar "The Insider Threat", Edinburgh.

Buchanan, W., Graves, J., Bose, N., Macfarlane, R., Davison, B., Ludwiniak, R. (2011). Performance and Student Perception Evaluation of Cloud-based Virtualised Security and Digital Forensics Labs. HEA ICS Conference, , (), .

Buchanan, W. (2011, ). Student Perception of On-line Lectures with a Blended Learning Environment. Paper presented at Edinburgh Napier University Staff Conference, Craiglockhart.

Ekonomou, E., Buchanan, W., Fan, L., Thuemmler, C. (2011). An Integrated Cloud-based Healthcare Infrastructure. In: (Ed.) IEEE CloudCom '11, , () ( ed.). (pp. 532 - 536). Athens, Greece: . IEEE.

Fan, L., Buchanan, W., Thuemmler, C., Lo, O., Khedim, A., Uthmani, O., Lawson, A., Bell, D. (2011). DACAR Platform for eHealth Services Cloud. IEEE 4th International Conference on Cloud Computing, , (), 219-226.

Kwecka, Z. (2011). Cryptographic Privacy Enhancement Method for Investigative Data Acquisition (PhD). Edinburgh Napier University (Buchanan, W.).

Kwecka, Z., Buchanan, W., Spiers, D. (2011). Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform. International Journal of Information Technologies and Systems Approach (IJITSA) : Special issue on Privacy and Security Issues in IT, 4, (2), 12-31.

Kwecka, Z., Buchanan, W. (2011). Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform. In: Association, I. (Ed.) Cyber Crime: Concepts, Methodologies, Tools and Applications, , () ( ed.). (pp. ). : . Information Resources Management Associa (Author).

Miehling, M., Buchanan, W., Lawson, A. (2011). Affliate Advertising Fraud and an Investigatory Fraud Framework. In: (Ed.) CyberForensics 2011, , () ( ed.). (pp. ). Glasgow: . .

Miehling, M., Buchanan, W., Lawson, A. (2011, Auguest). Detection Framework for the Reduction of Click-through and ID Theft Fraud in Affiliate Marketing. Paper presented at SCONE, Glasgow.

Paechter, B., Pitt, J., Serbedzija, N., Michael, K., Willies, J. (2011). Heaven and Hell: Visions for Pervasive Adaptation. In: Giacobino, E., Pfeifer, R. (Eds.) Proceedings of the 2nd European Future Technologies Conference and Exhibition 2011 (FET 11), , () ( ed.). (pp. ). Hungary: . Elsevier Science.

Scott, R., Uthmani, O., Buchanan, W., Lawson, A. (2011, June). Intelligence Information Sharing between the Police and their Community Partners. Paper presented at Symposium on Security and Cybercrime, Edinburgh Napier University.

Uthmani, O., Buchanan, W., Lawson, A., Scott, R., SCHAFER, B., Fan, L. (2011). Crime Risk Evaluation within Information Sharing between the Police and Community Partners. Information & Communications Technology Law, 20, (2), 57 - 81.

Uthmani, O., Buchanan, W., Lawson, A. (2011, August). Risk Analysis for Criminal Context in Information Sharing Policies. Paper presented at SCONE, Glasgow.

Buchanan, W. (2010). 3DES Encryption and Decryption in Microsoft .NET. CDCS, (), ..

Buchanan, W. (2010). AES Encryption and Decryption in Microsoft .NET. CDCS, (), ..

Buchanan, W., Thuemmler, C., Fan, L., Lo, O., Khedim, A. (2010, September). An e-Health Cloud. Paper presented at Cloud Computing for the Public Sector, Edinburgh.

Buchanan, W. (2010). Data Communications and Computer Networks ( ed.). : . Springer.

Buchanan, W., Thuemmler, C., Fan, L., Lo, O., Khedim, A. (2010, August). Information sharing framework: Next Generation e-Health Cloud. Paper presented at BCS Health Informatics Scotland, Glasgow.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Thuemmler, C., Uthmani, O. (2010, ). Interagency data exchange protocols as computational data protection law. Paper presented at Legal Knowledge and Information Systems, .

Buchanan, W., Uthmani, O. (2010, February). Novel Information Sharing Architecture between the Police and their Community Partners. Paper presented at Scottish Networking Event 2010, Napier University, Edinburgh.

Buchanan, W., Uthmani, O. (2010, Feb). Novel Information Sharing Architecture between the Police and their Community Partners. Paper presented at SCONE, Edinburgh Napier University.

Buchanan, W., Graves, J., Bose, N. (2010). Patent: IMPROVEMENTS IN OR RELATING TO DIGITAL FORENSICS ( ed.). : . .

Buchanan, W. (2010). RC2 Encryption and Decryption in Microsoft .NET. CDCS, (), ..

Buchanan, W., Macfarlane, R., Ludwiniak, R. (2010, ). Student Perception of On-Line Lectures with a Blended Learning Environment. Paper presented at The 4th International Conference on Cybercrime Forensics Education & Training, Canterbury.

Howie, J. (2010, September). Identity Management Challenges in Cloud Computing. Paper presented at RSA Europe, London.

Howie, J. (2010, August). Key note: Information Lifecycle and Data Governance. Paper presented at Goverance, Risk and Compliance, Lisbon, Portugal .

Jamdagni, A., Tan, Z., Nanda, P., He, X., Liu, R. (2010). Intrusion detection using GSAD model for HTTP traffic on web services. In: (Ed.) Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, , () ( ed.). (pp. 1193-1197). New York, NY, USA: . ACM.

Kwecka, Z., Buchanan, W., Spiers, D. (2010). Privacy-preserving data acquisition protocol. In: (Ed.) IEEE International Conference of Computational Methods in Electrical and Electronics Engineering, , () ( ed.). (pp. 131 - 136). Listvyanka: . IEEE.

Lo, O., Graves, J., Buchanan, W. (2010). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. 190-200). Greece: . .

Mason, A., Dingle, N., Knottenbelt, W., Bell, D., Buchanan, W., Thuemmler, C. (2010). Modelling infection spread using location tracking. Int. J. Healthcare Technology and Management,, 11, (6), 442-461.

Miehling, M., Buchanan, W., Old, L.J., Batey, A., Rahman, A. (2010). Analysis of Malicious Affiliate Network Activity as a Test Case for an Investigatory Framework. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). Greece: . .

Migas, N., Buchanan, W. (2010). Ad-hoc Routing Metrics and Applied Weighting for QoS support. International Journal of Parallel, Emergent, and Distributed Systems, 25, (4), 293 - 314.

Smith, M., Buchanan, W., Thuemmler, C., Bell, D., van Deursen (Hazelhoff Roelfze, N. (2010). Analysis of Information Governance and Patient Data Protection within Primary Health Care. International Journal for Quality in Health Care , , (), .

Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C. (2010). Novel Information Sharing Syntax for Data Sharing between Police and Community Partners, using Role-based Security. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. 394-402). Greece: . .

Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C., Fan, L. (2010). Novel Information Sharing Syntax for Data Sharing Between Police and Community Partners, Using Role-Based Security. Proceedings of the 9th European Conference on Information Warfare and Security, , (), 394-402.

Buchanan, W., Thuemmler, C. (Eds.) (2009). International Journal of Healthcare Technology and Management: Special Issue on Patient-Centric Modelling and Enhanced Security in Distributed Healthcare Systems, 10 (1/2), () ( ed.). : . Inderscience.

Garrigues, C., Migas, N., Buchanan, W., Robles, S. (2009). Protecting mobile agents from external replay attacks. Journal of Systems and Software Journal of Systems and Software, 82, (2), 197-206.

Kwecka, Z., Buchanan, W., Spiers, D. (2009). Application and Analysis of Private Matching Schemes Based on Commutative Cryptosystems. In: (Ed.) 8th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). Lisbon: . .

Saliou, L. (2009). Network Firewalls Dynamic Performance Evaluation and Formalisation (PhD). Edinburgh Napier University (Buchanan, W.).

Thuemmler, C., Buchanan, W., Fekri, H., Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management , 10, (1-2), 119 - 131.

Dougan, S., Saliou, L. (2008). An Information Economy Built on Sand?. Expert Witness Institute NewsLetter, 12, (2), 14-15.

Kwecka, Z., Buchanan, W., Saliou, L. (2008). Validation of 1-N OT Algorithms in Privacy-Preserving Investigations. In: (Ed.) 7th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). : . .

Migas, N., Buchanan, W. (2008). Ad-hoc Routing Metrics and Applied Weighting for QoS support. In: (Ed.) 22nd IEEE International Parallel & Distributed Processing Symposium, , () ( ed.). (pp. 1 - 8 ). Miami, FL: . IEEE.

Migas, N. (2008). MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop (PhD). Edinburgh Napier University (Buchanan, W.).

Powers, S., He, J. (2008). A hybrid artificial immune system and Self Organising Map for network intrusion detection. Information Sciences, 178, (15), 3024-3042.

Buchanan, W. (2007). The Handbook of Data & Networks Security 1 (1 ed.). : . Springer-Verlag New York, Inc. Secaucus, NJ, USA.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: Remenyi, D. (Ed.) 6th European Conference on Information Warfare and Security, , () ( ed.). (pp. 227-235). Shrivenham, UK: . Academic Conferences International.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: (Ed.) 6th European Conference on Information Warfare and Security, , () ( ed.). (pp. 227-235). Shrivenham, UK,: . .

Thuemmler, C., Buchanan, W. (2007). Setting Safety Standards by Designing a Low-budget and Compatible Patient Identification System based on Passive RFID Technology. International Journal of Healthcare Technology and Management (IJHTM), 8, (5), 571-583.

Abimbola, A., Munoz, J., Buchanan, W. (2006). A Framework to detect novel Computer Viruses via System Calls. In: Merabti, M., Pereira, R., Abuelma'atti, O. (Eds.) 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting, , () ( ed.). (pp. 308-313). John Moores University, Liverpool, UK: . PGNet.

Abimbola, A., Munoz, J., Buchanan, W. (2006). Enhancing Intrusion Detection via a Active Target Host. In: (Ed.) IEEE ICTe Africa 2006, , () ( ed.). (pp. ). Kenya: . IEEE Computer Society Press.

Abimbola, A., Munoz, J., Buchanan, W. (2006). Investigating False Positive Reduction in HTTP via Procedure Analysis. In: (Ed.) IEEE International Conference on Networking and Services, , () ( ed.). (pp. 87 - 87). Slicon Valley, CA: . IEEE Computer Society Press.

Abimbola, A., Munoz, J., Buchanan, W. (2006). NetHost-Sensor: Investigating the Capture of End-To-End Encrypted Intrusive Data. Computers & Security, 25, (6), 445-451.

Abimbola, A., Munoz, J., Buchanan, W. (2006). NetHost-sensor: Monitoring a target host's application via system calls. Information Security Tech. Report, 11, (4), 166-175.

Buchanan, W., Migas, N., McArtney, K. (2006). Analysis of an Agent-based Metric-Driven for Ah-hoc, On-Demand Routing. Journal of Ad-hoc Networks, 4, (2), 146-167.

Graves, J., Buchanan, W., Saliou, L., Old, L.J. (2006). Performance Analysis of Network Based Forensic Systems for In-line and Out-of-line Detection and Logging. In: Hutchinson, B. (Ed.) 5th European Conference on Information Warfare and Security, , () ( ed.). (pp. 41-50). Helsink, Finland: . Academic Conferences International.

Migas, N., Buchanan, W. (2006). An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing. In: (Ed.) Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International Symposium and Workshop on , , () ( ed.). (pp. 8-22). : . IEEE Computer Society.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2006). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In: Hutchinson, B. (Ed.) 5th European Conference on Information Warfare and Security, , () ( ed.). (pp. 205-214). Helsinki, Finland: . .

Buchanan, W., Graves, J., Saliou, L., Migas, N. (2005). Agent-based Forensic Investigations with an Integrated Framework. In: Hutchinson, W. (Ed.) 4th European Conference of Information Warfare and Security, , () ( ed.). (pp. 47-52). Glamorgan, United Kingdom: . Academic Conferences International.

Buchanan, W., Munoz, J., Raja, K. (2005). Critical Analysis and Error Determination of Locating-finding Techniques in GSM. International Journal of Mobile Communications (IJMC), 3, (2), 165-182.

Migas, N., Buchanan, W. (2005). Metric Evaluation of Embedded Java-based Proxies on Handheld Devices in Cluster-based Ad-hoc Routing. ECBS '05 Proceedings of the 12th IEEE International Conference and Workshops on Engineering of Computer-Based Systems , , (), 147 - 154.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2005). Novel Framework for Automated Security Abstraction, Modelling and Verification. In: Hutchinson, W. (Ed.) 4th European Conference on Information Warfare and Security, , () ( ed.). (pp. 303-311). Glamorgan, United Kingdom: . Academic Conferences International.

Abimbola, A., Munoz, J., Buchanan, W. (2004). Analysis and Detection of Cruising Computer Viruses. 3rd International Conference on Electronic Warfare and Security (EIWC), , (), .

Abimbola, A., Munoz, J., Buchanan, W. (2004). Viral-Net System Via Autonomous Agent Technology. BCS Symposium/Colloquium on Mobile and Complex Agent Applications, , (), .

Buchanan, W., McArtney, K., Migas, N. (2004). Agent-based Clustering over Ad-hoc Networks. Expert Update, , (), .

Buchanan, W., Raja, K., Munoz, J. (2004). Analysis and migration of location-finding methods for GSM and 3G networks. 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on , , (), 352 - 358 .

Buchanan, W. (2004). Covert Channel Analysis and Detection using Reverse Proxy Servers. 3rd International Conference on Electronic Warfare and Security (EIWC), , (), .

Buchanan, W., Llamas, D. (2004). Covert Channel Analysis and Detection using Reverse Proxy Servers. 3rd International Conference on Electronic Warfare and Security (EIWC, , (), .

Buchanan, W. (2004). The handbook of data communications and networks 1 (2 ed.). : . Springer.

Buchanan, W. (2004). Uzytkowanie Komputerow ( ed.). : . Wkt (Poland).

Buchanan, W., Raja, K., Munoz, J. (2004). We know where you are [Location tracking]. Communications Engineer , 2 , (3), 34 - 39 .

Migas, N., Buchanan, W., McArtney, K. (2004). Migration of Mobile Agents in Ad-hoc Wireless Networks. Engineering of Computer-Based Systems, 2004. Proceedings. 11th IEEE International Conference and Workshop on the , , (), 530 - 535.

Migas, N., Buchanan, W., McArtney, K. (2003). MARIAN: A Framework using Mobile Agents for Routing, Topology Discovery and Automatic Network Reconfiguration in Ad-hoc Networks. IADIS International Conference, WWW/Internet 2003, , (), 1129-1134.

Migas, N., Buchanan, W., McArtney, K. (2003). Mobile Agents for Routing, Topology Discovery, and Automatic Network Reconfiguration in Ad-Hoc Networks. IEEE ECBS 2003, , (), 200 - 206 .

Pikoulas, J. (2003). An Agent-based Bayesian Method for Network Intrusion Detection (PhD). Edinburgh Napier University (Buchanan, W.).

Buchanan, W. (2002). Complete Handbook of the Internet ( ed.). : . Kluwer Academic Publishers Norwell, MA, USA.

Buchanan, W. (2002). Mastering Computing ( ed.). : . Macmillan Press.

Golam, H., Buchanan, W., Munoz, J. (2002). Component-based Tools Platform for Network Testing. IEEE ECBS 2003, , (), .

Pikoulas, J., Buchanan, W., Mannion, M. (2002). An Intelligent Agent Security Intrusion System. Engineering of Computer-Based Systems, 2002. Proceedings. Ninth Annual IEEE International Conference and Workshop on the , , (), 94 - 99 .

Pikoulas, J., Buchanan, W., Mannion, M., Triantafyllopoulos, K. (2001). An Agent Based Bayesian Forecasting Model for Enhanced Network Security. In: (Ed.) Engineering of Computer Based Systems, 2001. ECBS 2001. Proceedings. Eighth Annual IEEE International Conference and Workshop on the , , () (April ed.). (pp. 247 - 254). Washington: . IEEE.

Buchanan, W., Scott, A., Mannion, M., Naylor, M., Pikoulas, J. (2000). Agents, Network Security and Network Management. In: (Ed.) Distributed Systems and Networks, , () ( ed.). (pp. 600-640). : . Addison-Wesley.

Buchanan, W. (2000). Distributed Systems and Networks ( ed.). : . McGraw-Hill.

Buchanan, W., Naylor, M., Scott, A. (2000). Enhancing network management using mobile agents. In: (Ed.) Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop on the , , () ( ed.). (pp. 218-226). : . .

Buchanan, W., Scott, A., Mannion, M., Naylor, M., Pikoulas, J. (2000). Mobile Agents. Computer Bulletin, , (), .

Buchanan, W., Naylor, M., Scott, A. (2000). Mobile Agents with Enhanced Network Management. In: (Ed.) 7th IEEE Conference on electronic Computer Based Systems, , () (April ed.). (pp. 218-226). : . .

Pikoulas, J., Mannion, M., Buchanan, W. (2000). Software Agents and Computer Network Security. In: (Ed.) Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the , , () (April ed.). (pp. 211-217). : . IEEE.

Scott, A., Buchanan, W. (2000). Truly distributed control systems using fieldbus technology. In: (Ed.) Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the Issue Date: 2000, , () ( ed.). (pp. 165-173). Edinburgh , UK : . IEEE.

Wang, H. (2000). Speed Improvements for the RSA (MPhil). Edinburgh Napier University (Buchanan, W.).

Wang, H. (2000). Speed Improvements for the RSA Encryption Method (MPhil). Edinburgh Napier University (Buchanan, W.).

Buchanan, W. (1999). Handbook of Data Communications and Networks 1 (1 ed.). : . Kluwer.

Buchanan, W. (1999). Wiedziec wieceg Internet ( ed.). : . .

Buchanan, W. (1998). Advanced Data Communications and Networks ( ed.). : . Kluwer Academic Publishers Norwell, MA, USA.

Buchanan, W. (1998). CD-ROM Handbook of Data Communications & Networks ( ed.). : . Kluwer.

Buchanan, W. (1997). Mastering the Internet ( ed.). : . Macmillan Press.

Buchanan, W. (1997). Mastering the Internet ( ed.). : . Palgrave Publishers.

Buchanan, W. (1996). Applied Data Communications and Networks ( ed.). : . Springer.

Buchanan, W., Gupta, N.K., Arnold, J.M. (1994). Application of 3D finite-difference time-domain (FDTD) method to predict radiation from a PCB with high speed pulse propagation. In: (Ed.) 9th International IEE Conference on Electromagnetic Compatibility, , () (August ed.). (pp. 287-291). University of Manchester, UK: . IEE.