Publications (Cyber-Security)

2017

Buchanan, W., woodward, a., helme, s. (2017). Cryptography across industry sectors. Journal of Cyber Security Technology, , (), .

Buchanan, W. (2017, May 18, 2017). How WannaCry caused global panic but failed to turn much of a profit. Theconversation.com, .

Buchanan, W. (2017, March 27, 2017). The next cyberattack could come from sound waves. Theconvesation.com, .

Buchanan, W., Thuemmler, C., spyra, g., Prajapati, B. (2017). Towards Trust and Governance in Integrated Health and Social Care Platforms. Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare, , (), 219-231.

Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., Han, W. (2017). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In: (Ed.) 2017 IEEE Trustcom/BigDataSE/ICESS, , () ( ed.). (pp. ). Sydney, Australia: . IEEE Computer Society.

Lo, O., Buchanan, W., carson, d. (2017). Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). Journal of Cyber Security Technology, 1, (2), 88-107.

Moradpoor, N., Clavie, B., Buchanan, W. (2017). Machine Learning Techniques for the Detection and Classification of Phishing Emails. In: (Ed.) IEEE Technically Sponsored Computing Conference 2017, , () ( ed.). (pp. ). London: . IEEE.

spyra, g., Buchanan, W., Ekonomou, E. (2017). Applied Machine Learning Predictive Analytics to SQL Injection Attack Detection and Prevention. In: (Ed.) 3RD IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), , () ( ed.). (pp. ). : . IEEE.

2016

Ambusaidi, M., He, X., Nanda, P., Tan, Z. (2016). Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Transactions on Computers, 65, (10), 2986-2998.

Buchanan, W. (2016, April, 26). Bitcoin mining is about to become a lot less profitable. The Conversation, .

Buchanan, W. (2016, Spring 2006). Data is King. IISP Pulse, 14-17.

Buchanan, W., Deursen, N. (2016). HI-risk: A Method to Analyse Health Information Risk Intelligence. In: (Ed.) IEEE 15th International Conference on e-Health Networking, Applications & Services, , () ( ed.). (pp. ). Munich, Germany: . IEEE.

Buchanan, W. (2016, ). If two countries waged cyber war on each another, here’s what to expect. Theconversation, .

Buchanan, W. (2016). vSoC: Advanced Virtualised Security Operations Centre for Training and Research. In: (Ed.) UKNOF, , () ( ed.). (pp. ). Glasgow: . .

Chomsiri, T., He, X., Nanda, P., Tan, Z. (2016). An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. In: (Ed.) The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. ). Tianjian, China: . IEEE.

Chomsiri, T., He, X., Nanda, P., Tan, Z. (2016). Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE Transactions on Cloud Computing, (PrePrints), (), .

Leimich, P., Buchanan, W. (2016). A RAM triage methodology for Hadoop HDFS forensics. Digital Investigation, , (), .

Li, S., Romdhani, I., Buchanan, W. (2016). Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, (3), 32-36.

Li, S., Romdhani, I., Buchanan, W. (2016). Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications: Recent Development on Security and Privacy in Modern Communication Environments, S0, (), 32-36.

Li, S., Tryfonas, T., Russell, G., Andriotis, P. (2016). Risk Assessment for Mobile Systems through a Multi-Layered Hierarchical Bayesian Network. IEEE TRANSACTIONS ON CYBERNETICS, 46, (), .

Li, S., Tryfonas, T., Li, H. (2016). The Internet of Things: A Security Point of View. Internet Research, 26, (2), 337 - 359.

Lo, O., Buchanan, W., carson, d. (2016). Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). Journal of Cyber Security Technology, , (), .

Molla, R., Romdhani, I., Buchanan, W. (2016). 3LS-Authenticate: an e-Commerce Challenge-Response Mobile Application. In: (Ed.) 13th ACS/IEEE International Conference on Computer Systems and Applications, , () ( ed.). (pp. ). Agadir, Morocco: . IEEE.

Sieklik, B., Macfarlane, R., Buchanan, W. (2016). Evaluation of TFTP DDoS Amplification Attack. Computers & Security, 57, (March 2016), 67–92.

spyra, g., Buchanan, W., Ekonomou, E. (2016). Protecting Documents with Sticky Policies and Identity-Based Encryption. In: (Ed.) TC 2016 - Future Technologies Conference 2016 6-7 December 2016 |, , () ( ed.). (pp. ). San Francisco, United States: . IEEE.

Spyra, G., Buchanan, B. (2016). Protecting Documents with Sticky Policies and Identity-Based Encryption. In: (Ed.) TC - Future Technologies Conference 2016 6-7 December, , () ( ed.). (pp. ). : . IEEE.

spyra, g., Buchanan, W., Ekonomou, E. (2016). Sticky policy enabled authenticated OOXML. In: (Ed.) IEEE SAI Computing Conference, , () ( ed.). (pp. ). : . .

Spyra, G., Buchanan, B., Ekonomou, E. (2016). Sticky policy enabled authenticated OOXML. In: (Ed.) TC - 2016 SAI Computing Conference (SAI) 2016 13-15 July, , () ( ed.). (pp. ). : . IEEE.

Tan, Z., Saleem, K., Buchanan, W. (2016). Security for Cyber-Physical Systems in Healthcare. In: (Ed.) Health 4.0: How Industry 4.0 and Virtualization are Revolutionizing Healthcare (In-print), , () ( ed.). (pp. ). : . .

Uwagbole, S., Buchanan, W., Fan, L. (2016). Applied Web Traffic Analysis for Numerical Encoding of SQL Injection Attack Features. In: (Ed.) ECCWS-2016, , () ( ed.). (pp. ). Munich, Germany: . .

Uwagbole, S., Buchanan, W., Fan, L. (2016). ECCWS 2016 - Proceedings of The 15th European Conference on Cyber Warfare and Security. In: (Ed.) ECCWS 2016 - Proceedings of The 15th European Conference on Cyber Warfare and Security, , () ( ed.). (pp. ). Munich, Germany: . .

Uwagbole, S., Buchanan, W., Fan, L. (2016). Numerical Encoding to Tame SQL Injection Attacks. In: (Ed.) 2ND IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), , () ( ed.). (pp. ). Istanbul, Turkey: . IEEE.

woodward, a., Buchanan, W. (2016). Will quantum computers be the end of public key encryption?. Journal of Cyber Security Technology, , (), .

2015

Buchanan, W. (2015, ). Advanced Persistent Threat and Insiders. Paper presented at Advanced Persistent Threat, London.

Buchanan, W. (2015, ). Apple and Starbucks could have avoided being hacked if they'd taken this simple step. The Conversation, .

Buchanan, W. (2015, July, 21). Ashley Madison breach reveals the rise of the moralist hacker. theconversation.com, .

Buchanan, W. (2015, June). Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh.

Buchanan, W., Smales, A. (2015, ). Cyber Security in Practice: Identifying areas of vulnerability. Paper presented at Scot-Secure 2015, Holyrood, Edinburgh.

Buchanan, W. (2015, May 7). Edinburgh leading world in beating online crime. The Scotsman, .

Buchanan, W., Ramsay, B., Macfarlane, R., Smales, A., keane, e., callahan, c., Blazic, B., Popov, O. (2015, August). Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury.

Buchanan, W. (2015, April). Identifying areas of vulnerability. Paper presented at Scot-secure 2015, Dynamic Earth, Edinburgh.

Buchanan, W. (2015, Jan 22). If Obama is talking about securing the net, it should be on everyone else’s lips too. The Conversation, .

Buchanan, W. (2015, Jan 2015). If you seek to ‘switch off’ encryption, you may as well switch off the whole internet. The Conversation, .

Buchanan, W. (2015, Feb). It's All Hackable. Paper presented at SBRC Insider Threat Conference 2015, RBS, Gogarburn.

Buchanan, W. (2015, February 24). Lenovo’s security debacle reveals blurred boundary between adware and malware. The Conversation, .

Buchanan, W., Smales, A. (2015, April). New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). Paper presented at Cybercrime and Cyberterrorism - the EU Research roadmap, Montpellier, France.

Buchanan, W., Ukwandu, E., van Deursen (Hazelhoff Roelfze, N., Fan, L., Russell, G., Lo, O., Thuemmler, C. (2015). Secret Shares to Protect Health Records in Cloud-based Infrastructures. In: (Ed.) Proceedings of the IEEE 17th International Conference on E-health Networking, Application and Services (HealthCom), , () ( ed.). (pp. 669 - 672). Boston, MA: . IEEE.

Buchanan, W., Ramsay, B., Macfarlane, R., Smales, A., Russell, G. (2015). Teaching Penetration and Malware Analysis in a Cloud-based Environment. In: (Ed.) Proceedings of the 1st Uk Workshop on Cybersecurity Training & Education, , () ( ed.). (pp. ). : . .

Buchanan, W., Ukwandu, E., Fan, L., Russell, G., Lo, O. (2015). The Future Internet: A World of Secret Shares. Future Internet 2015, 7, (), 445-464.

Buchanan, W. (2015, Jan 2015). The Increasing Challenge for Digital Forensics. The Texas Investigator, 10-12.

Buchanan, W. (2015, June, 8). US hack shows data is the new frontier in cyber security conflict. theconversation.com, .

Buchanan, W. (2015, May). Vulnerability Analysis. Paper presented at Advanced Threat Protection, Glazier's Hall, London.

Buchanan, W. (2015, May 15). When amateurs do the job of a professional, the result is smart grids secured by dumb crypto. theconversation.com, .

Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., Russell, G. (2015). Real-time Monitoring of Privacy Abuses and Intrusion Detection in Android System. In: (Ed.) Proceedings of HCI International 2015, , () ( ed.). (pp. ). : . .

Moradpoor, N. (2015). A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9, (6), 1409-1419.

Moradpoor, N. (2015). SQL-IDS: Evaluation of SQLi Attack Detection and Classification Based on Machine Learning Techniques. In: (Ed.) 8th International Conference on Security of Information and Networks (SIN15), , () ( ed.). (pp. 258-266). Russia: . ACM.

Penrose, P., Buchanan, W., Macfarlane, R. (2015). Fast contraband detection in large capacity disk drives. Digital Investigator, , (March 2015), S22–S29.

Prajapati, B., Buchanan, W., Smales, A., Macfarlane, R., spyra, g. (2015). Review of e-Health Frameworks. In: (Ed.) Health Informatics Conference 2015, , () ( ed.). (pp. ). : . BCS.

spyra, g., Buchanan, W., Ekonomou, E. (2015, ). Sticky policy enabled authenticated OOXML for Health Care. Paper presented at HIS 2015, Edinburgh.

Spyra, G., Buchanan, W., Ekonomou, E. (2015). Sticky-Policy enabled authenticated OOXML for Health Care. In: (Ed.) The Workshops in Computing, , () ( ed.). (pp. ). Edinburgh: . British Computer Society.

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R., Hu, J. (2015). Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64, (9), 2519 - 2533.

Ukwandu, E., Buchanan, W., Fan, L., Russell, G., Lo, O. (2015). RESCUE: Resilient Secret Sharing Cloud-based Architecture. In: (Ed.) 2015 IEEE International Conference on Recent Advances of Trust, Security and Privacy, , () ( ed.). (pp. ). Helsinki, Finland: . IEEE Computer Society.

Xu, Q., Gong, P., Chen, T., Michael, J., Li, S. (2015). Modelling and characterization of NAND flash memory channels. Measurement, 70, (), 225-231.

2014

Ambusaidi, Mohammed A., He, X., Tan, Z., Nanda, P., Lu, L., Nagar, Upasana T. (2014). A Novel Feature Selection Approach for Intrusion Detection Data Classification. In: (Ed.) 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. 82 - 89). Beijing, China: . IEEE.

Ambusaidi, Mohammed A., Tan, Z., He, X., Nanda, P., Lu, L., Jamdagni, A. (2014). Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8, (2/3), 77-86.

Buchanan, W. (2014, Nov 2014). Better locks to secure our data are the inevitable result of too many prying eyes. The Conversation, .

Buchanan, W. (2014, Nov 2014). Codebreaking has moved on since Turing’s day, with dangerous implications. The Conversation, .

Buchanan, W. (2014, ). Complete Anatomy of Heartbleed, TrueCrypt and Large-scale Vulnerabilities. Paper presented at 7th International Conference on Security of Information and Networks (SIN 2014), Glasgow.

Buchanan, W. (2014, April 2014). Discrete Logarithms within Computer and Network Security. Paper presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium, International Centre for Mathematical Sciences, University of Edinburgh.

Buchanan, W. (2014, June,2014). How the love of one teenager brought Tweetdeck to its knees. theconversation.com, .

Buchanan, W. (2014, ). In cybersecurity, the weakest link is … you. The Conversation, .

Buchanan, W., Fan, L., Uthmani, O., Lawson, A. (2014). Information sharing. US 13/739,074, US: , US.

Buchanan, W. (2014, Oct 2014). iWorm hack shows Macs are vulnerable too. The Conversation, .

Buchanan, W. (2014, ). The Future of Computer Science Education and Observations from On-line Learning. Paper presented at Higher Computing Science National Qualifications Support, Edinburgh.

Buchanan, W. (2014, ). The New Enlightenment in Scotland. Paper presented at Secure Scotland, Royal Exchange Square, Glasgow.

Buchanan, W., Smales, A. (2014, Feb). The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working, Edinburgh.

Buchanan, W. (2014, ). Traffic light hacking shows the Internet of Things must come with better security. Theconverstation.com, .

Buchanan, W. (2014, Oct 2014). When the ATM runs Windows, how safe is your money?. The Conversation, .

Chomsiri, T., He, X., Nanda, P., Tan, Z. (2014). A Stateful Mechanism for the Tree-Rule Firewall. In: (Ed.) 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. 122 - 129). Beijing, China: . IEEE.

Flandrin, F., Buchanan, W., Macfarlane, R., Ramsay, B., Smales, A. (2014). Evaluating Digital Forensic Tools (DFTs). In: (Ed.) 7th International Conference : Cybercrime Forensics Education & Training, , () ( ed.). (pp. ). : . .

He, X., Chomsiri, T., Nanda, P., Tan, Z. (2014). Improving Cloud Network Security Using Tree-Rule Firewall. Future Generation Computer Systems, 30, (), 116-126.

Jan, M., Nanda, P., He, X., Tan, Z., Liu, R. (2014). A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In: (Ed.) 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. 205 - 211). Beijing, China: . IEEE.

Kwecka, Z., Buchanan, W., SCHAFER, B. (2014). "I am Spartacus" – Privacy Enhancing technologies and Privacy as a public good. Artificial Intelligence and Law, 22, (2), 113-139.

Lawson, A., Macfarlane, R. (2014, April). Embedding programming skills to support the student journey in networking, security and digital forensics. Paper presented at HEA STEM Annual Learning and Teaching Conference 2014: Enhancing the STEM Student Journey, University of Edinburgh.

Li, W., Meng, W., Tan, Z., Xiang, Y. (2014). Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. In: (Ed.) Proceedings of 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. 174-181). Beijing: . IEEE.

Moradpoor, N. (2014). Employing Neural Networks for the Detection of SQL Injection Attack. In: (Ed.) 7th International Conference on Security of Information and Networks (SIN14), , () ( ed.). (pp. 318). UK: . ACM.

Spyra, G., Buchanan, W., Cruickshank, P., Ekonomou, E. (2014). CLOUD-BASED IDENTITY AND IDENTITY META-DATA: SECURE AND CONTROL OWN DATA IN GLOBALIZATION ERA. International Journal of Reliable and Quality E-Healthcare (IJRQEH), 3, (1), 49-66.

spyra, g., Buchanan, W. (2014). Distributed, Highly-Scalable, Sticky Policies Implementation for Healthcare. In: (Ed.) BCS Health Informatics Scotland (HIS), , () ( ed.). (pp. ). Glasgow, UK: . BCS.

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. (2014). A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. IEEE Transactions on Parallel and Distributed Systems, 25, (2), 447-456.

Tan, Z., Nagar, Upasana T., He, X., Nanda, P., Liu, R., Wang, S., Hu, J. (2014, September). Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE Cloud Computing, 27 - 33.

van Deursen (Hazelhoff Roelfze, N. (2014). HI-Risk: a Socio-Technical Method for the Identification and Monitoring of Healthcare Information Security Risks in the Information Society (PhD). Edinburgh Napier University (Duff, P., Buchanan, W.).

2013

Buchanan, W., Kwecka, Z., Ekonomou, E. (2013). A Novel Privacy Preserving Method for the Location Tracking of Mobile Devices. The Journal of Mobile Communication, Computation and Information: Special Issue on Security, 18, (), 728–737.

Buchanan, W., Burns, N., Lo, O., Lewis, R., Uthmani, O., Fan, L. (2013, April). A Scaleable and Trusted e-Health eco-System: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013, European Commission, Brussels.

Buchanan, W. (2013, ). Building a New Nation: Risk, Goverance and Trust. Paper presented at Cyber Security 2013, Edinburgh.

Buchanan, W., Smales, A. (2013, Sept). Cyber Risk and Opportunities in the Cloud. Paper presented at Cloud Security Congress 2013, Edinburgh.

Buchanan, W., Smales, A. (2013, ). e-Health in the Cloud. Paper presented at Future of e-Health, Hollyrood, Edinburgh.

Buchanan, W., Macfarlane, R., Clayton, J. (2013). Experimental Evaluation of Disk Sector Hash Comparison for Forensic Triage using a Bloom Filter. In: (Ed.) CyberForensics 2013, , () ( ed.). (pp. ). : . .

Buchanan, W., Fan, L., Uthmani, O., SCHAFER, B. (2013). Interagency Data exchange, Privacy protection and Governance Architecture for Information Sharing across Domains. Artificial Intelligence and Law, , (), .

Buchanan, W., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., varga, j., anderson, c. (2013). Modelling of Integrated Trust, Governance and Access safi.re: Information Sharing Architecture. Communications in Computer and Information Science, 182, (), 91-101 .

Buchanan, W., Smales, A. (2013, ). Public Perceptions in Health Care Security. Paper presented at Health Informatics 2013, Heriot-Watt, Edinburgh.

Buchanan, W. (2013, March). The Challenges of Big Data: Future Risks, Governance and Trust. Paper presented at The Future of Cyber Security 2013, London, UK.

Buchanan, W., Burns, N., Lo, O., Uthmani, O., varga, j., Lawson, A., anderson, c. (2013). Who Would You Trust To Identify You In Accessing Your Health Record?. Communications in Computer and Information Science, , (), .

Jamdagni, A., Tan, Z., Nanda, P., He, X., Liu, R. (2013). RePIDS: A Multi Tier Real-Time Payload-Based Intrusion Detection System. Computer Networks, 57, (3), 811-824.

Kwecka, Z., Buchanan, W., SCHAFER, B. (2013). Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?. In: (Ed.) INFORMATIK 2013, , () ( ed.). (pp. 2134-2148 ). : . Köllen Druck+Verlag.

Penrose, P., Macfarlane, R., Buchanan, W. (2013). Approaches to the Classification Of High Entropy File Fragments. Digital Investigator, 10, (4), 372–384.

Tan, Z. (2013). Detection of Denial-of-Service Attacks Based on Computer Vision Techniques (PhD). University of Technology, Sydney, Australia (He, X., Nanda, P., Liu, R.).

Tan, Z. (2013, March). Generation of Network Behaviour Descriptions Using MCA Based on TAM. Paper presented at Kaspersky Lab's 2013 Annual Student Cyber Security Conference, Singapore.

Thuemmler, C., Mival, O., Benyon, D., Buchanan, W., Paulin, A., Barros, M. (2013). Norms and Standards in Modular Medical Architectures. In: (Ed.) 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom) (IEEE Healthcom 2013), , () ( ed.). (pp. 382 - 387). Lisbon, Portugal: . .

van Deursen (Hazelhoff Roelfze, N., Buchanan, W., Duff, A. (2013). Monitoring information security risks within health care. Computers and Security, 37, (), 31-45.

2012

Akram, R., Markantonakis, K., Mayes, K. (2012). Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem. In: Xie, S. (Ed.) The 8th International Conference on Computational Intelligence and Security (CIS 2012), , () ( ed.). (pp. ). Guangzhou, China: . IEEE Computer Society Press.

Akram, R., Markantonakis, K., Mayes, K. (2012). Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture. In: Chow, K.P, Hui, Lucas C.K. (Eds.) The 2012 International Conference on Information and Communications Security (ICICS 2012), , () ( ed.). (pp. ). Hong Kong, China: . Springer.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C. (2012, ). Case Study: Moving Towards an e-health Platform to Store NHS Patient Information in the Cloud . Paper presented at Cloud Computing in the Public Sector: The Way Forward, London.

Buchanan, W., Macfarlane, R., Graves, J., Fan, L., Ekonomou, E., Bose, N. (2012). Cloud Forensics. In: (Ed.) , , () ( ed.). (pp. ). : . .

Buchanan, W., Fan, L., Ekonomou, E., Lo, O. (2012, ). Cloud4Health. Paper presented at Symposium on the Future of e-Health, Edinburgh.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Scott, R., Thuemmler, C., Uthmani, O. (2012). Computational data protection law: trusting each other offline and online. Frontiers in Artificial Intelligence and Applications, Volume 250: Legal Knowledge and Information Systems, (), 31 - 40.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Scott, R., Thuemmler, C., Uthmani, O. (2012). Computational data protection law: trusting each other offline and online. . Legal Knowledge and Information Systems, 250, (), 31-40.

Buchanan, W. (2012, ). Education & Training for Future Threats. Paper presented at ITEC 2012, London.

Buchanan, W. (2012). Future Risks – Including The Rise of the Hacktivism. In: (Ed.) National Information Security Conference (NISC), , () ( ed.). (pp. ). : . .

Buchanan, W. (2012). Hashing Functions in Microsoft .NET. .

Buchanan, W., Fan, L., Lo, O., Ekonomou, E. (2012, ). HOLISTIC HEALTHCARE WITHIN DYNAMIC INFORMATION INFRASTRUCTURES - THE CLOUD BASED eHEALTH PLATFORM. Paper presented at eHealth 2012, Dynamic Earth, Edinburgh.

Buchanan, W., Lewis, R., Fan, L., Uthmani, O. (2012, June). Information Sharing Around Child Protection. Paper presented at Information Sharing in the Public Sector, Edinburgh.

Buchanan, W. (2012, June). Innovation in Cloud Environments. Paper presented at Future of Technology, Royal Society of Edinburgh.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., Thuemmler, C. (2012, May). Integrating Assisted Living with Primary and Secondary Health Care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing, Edinburgh.

Buchanan, W. (2012, ). New Threats. Paper presented at Transatlantic Conference 2012, Edinburgh.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C. (2012, ). Patient Centric Health Care: An Integrated and Secure, Cloud-based, e-Health Platform. Paper presented at BCS Branch Meeting, University of Edinburgh Informatics Forum.

Buchanan, W. (2012, Feb). Skills for cyber security. Paper presented at Cybercrime and Data Protection, Dynamic Earth, Edinburgh.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C., Lawson, A. (2012, ). The UK’s eHealth Cloud Project: EHR And The Cloud: Assessing The Benefits And Mitigating The Risks. Paper presented at Arab Health 2012 (Electronic Healthcare Records), Dubai.

Buchanan, W. (2012). Towards a New Health and Social Care Information Sharing Architecture. .

Buchanan, W. (2012, ). Training the Next Generation. Paper presented at Digital Security and Cybercrime Staff Skills Shortage: Addressing the Issues, Edinburgh.

Fan, L., Buchanan, W., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., Ekonomou, E., Khedim, A. (2012). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In: (Ed.) eTELEMED 2012, , () ( ed.). (pp. 99-104). : . .

Flandrin, F., Buchanan, W., Macfarlane, R. (2012). A Platform for Digital Forensics Evaluation (D-FET). , (), ..

Lo, O., Fan, L., Buchanan, W., Thuemmler, C., Lawson, A. (2012). Towards Simulation of Patient Data for Evaluation of E-Health Platform and Services. In: (Ed.) PGNET 2012, , () ( ed.). (pp. 160-165). : . .

Macfarlane, R., Buchanan, W., Ekonomou, E., Uthmani, O., Fan, L., Lo, O. (2012). Review of Security Policy Implementations. Computers & Security, 31, (2), 253-271.

Russell, G., Macfarlane, R., Ludwiniak, R. (2012). A Forensic Image Description Language for Generating Test Images. In: (Ed.) Proceedings of the 6th International Conference on Cybercrime Forensics Education & Training, , () ( ed.). (pp. ). Canterbury: . .

Russell, G., Macfarlane, R. (2012). Security Issues of a Publicly Accessible Cloud Computing Infrastructure. In: (Ed.) Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), , () ( ed.). (pp. 1210-1216). : . IEEE Computer Society.

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. (2012). Evaluation on Multivariate Correlation Analysis Based Denial-of-Service Attack Detection System. In: (Ed.) Proceedings of the First International Conference on Security of Internet of Things, , () ( ed.). (pp. 160-164). New York, NY, USA: . ACM.

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. (2012). Triangle-area-based multivariate correlation analysis for effective denial-of-service attack detection. In: (Ed.) Proceeding of 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, , () ( ed.). (pp. 33-40). : . IEEE.

Thuemmler, C., Fan, L., Buchanan, W., Lo, O., Ekonomou, E., Khedim, A. (2012). E-Health: Chances and Challenges of Distributed, Service oriented Architectures. Journal of Cyber Security and Mobility, 37, (52), .

Uwagbole, S., Buchanan, W., Fan, L. (2012). Novel Tracking of Rogue Network Packets Using Danger Theory Approach. 11th European Conference on Information Warfare and Security (ECIW-2012), , (), .

2011

Buchanan, W., Flandrin, F., Macfarlane, R., Graves, J. (2011). A Methodology to Evaluate Rate-Based Intrusion Prevention System against Distributed Denial-of-Service (DDoS). In: (Ed.) Cyberforensics 2011, , () ( ed.). (pp. ). : . .

Buchanan, W. (2011, May). A next generation Cloud-based health care platform. Paper presented at Innovation in Healthcare, London.

Buchanan, W. (2011). Advanced Cloud and Virtualisation ( ed.). : . CRC Press.

Buchanan, W., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., Bose, N., Ludwiniak, R. (2011). Cloud-based Digital Forensics Evaluation Test (D-FET) Platform. Cyberforensics 2011, , (), .

Buchanan, W., Fan, L., Thuemmler, C., Lo, O., Ekonomou, E. (2011, Sept). Cloud-based e-Health System. Paper presented at BCS Health Informatics, Edinburgh.

Buchanan, W. (2011, Sept). Creation of Dynamic Environments for Virtualised and Cloud-based Teaching in Digital Forensics and Computer Security. Paper presented at CFET, Canterbury.

Buchanan, W., Macfarlane, R. (2011, June). D-FET – A Community Cloud for Enhancing Skills using Virtualised Environments and Cloud-based Infrastructures. Paper presented at Scottish Higher Education Employability Conference: Strengthening Partnerships with Employers, Heriot-Watt, Edinburgh.

Buchanan, W. (2011). Evidence to the Justice Committee at the Scottish Parliament . Scottish Executive.

Buchanan, W. (2011). How Academic IT Departments Manage Changing IT Environments. VitAL, 5 , (1), 26-32.

Buchanan, W. (2011). Introduction to Security and Network Forensics ( ed.). : . Auerbach Publications.

Buchanan, W. (2011, ). Making assessment and feedback fun: feedback before and after assessments. Paper presented at Edinburgh Napier University Staff Conference, Edinburgh Napier University.

Buchanan, W. (2011, June). Next Generation Secure e-Health Platform. Paper presented at BCS ISSG seminar "The Insider Threat", Edinburgh.

Buchanan, W., Graves, J., Bose, N., Macfarlane, R., Davison, B., Ludwiniak, R. (2011). Performance and Student Perception Evaluation of Cloud-based Virtualised Security and Digital Forensics Labs. HEA ICS Conference, , (), .

Buchanan, W. (2011, ). Student Perception of On-line Lectures with a Blended Learning Environment. Paper presented at Edinburgh Napier University Staff Conference, Craiglockhart.

Ekonomou, E., Buchanan, W., Fan, L., Thuemmler, C. (2011). An Integrated Cloud-based Healthcare Infrastructure. In: (Ed.) IEEE CloudCom '11, , () ( ed.). (pp. 532 - 536). Athens, Greece: . IEEE.

Fan, L., Buchanan, W., Thuemmler, C., Lo, O., Khedim, A., Uthmani, O., Lawson, A., Bell, D. (2011). DACAR Platform for eHealth Services Cloud. IEEE 4th International Conference on Cloud Computing, , (), 219-226.

Kwecka, Z. (2011). Cryptographic Privacy Enhancement Method for Investigative Data Acquisition (PhD). Edinburgh Napier University (Buchanan, W.).

Kwecka, Z., Buchanan, W., Spiers, D. (2011). Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform. International Journal of Information Technologies and Systems Approach (IJITSA) : Special issue on Privacy and Security Issues in IT, 4, (2), 12-31.

Kwecka, Z., Buchanan, W. (2011). Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform. In: Association, I. (Ed.) Cyber Crime: Concepts, Methodologies, Tools and Applications, , () ( ed.). (pp. ). : . Information Resources Management Associa (Author).

Miehling, M., Buchanan, W., Lawson, A. (2011). Affliate Advertising Fraud and an Investigatory Fraud Framework. In: (Ed.) CyberForensics 2011, , () ( ed.). (pp. ). Glasgow: . .

Miehling, M., Buchanan, W., Lawson, A. (2011, Auguest). Detection Framework for the Reduction of Click-through and ID Theft Fraud in Affiliate Marketing. Paper presented at SCONE, Glasgow.

Rietsche, R., Russell, G., Karduck, A. (2011). Creation of an Online Virtual Cisco Router Learning Environment. In: (Ed.) Proceedings of the 14th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2011), , () ( ed.). (pp. ). : . .

Russell, G., Cumming, A. (2011). Student Behaviour in a Flexible Learning Course Framework. In: (Ed.) Proceedings of the IADIS International Conference on e-Learning, 1, () ( ed.). (pp. 181-188). : . .

Scott, R., Uthmani, O., Buchanan, W., Lawson, A. (2011, June). Intelligence Information Sharing between the Police and their Community Partners. Paper presented at Symposium on Security and Cybercrime, Edinburgh Napier University.

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. (2011). Denial-of-service attack detection based on multivariate correlation analysis. In: Lu, B., Zhang, L., Kwok, J. (Eds.) Neural Information Processing, 7064, () ( ed.). (pp. 756-765). : . Springer Berlin Heidelberg.

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. (2011). Multivariate correlation analysis technique based on Euclidean distance map for network traffic characterization. In: Qing, S., Susilo, W., Wang, G., Liu, D. (Eds.) Information and Communications Security, 7043, () ( ed.). (pp. 388-398). : . Springer Berlin Heidelberg.

Uthmani, O., Buchanan, W., Lawson, A., Scott, R., SCHAFER, B., Fan, L. (2011). Crime Risk Evaluation within Information Sharing between the Police and Community Partners. Information & Communications Technology Law, 20, (2), 57 - 81.

Uthmani, O., Buchanan, W., Lawson, A., Scott, R., SCHAFER, B., Fan, L., Uthmani, S. (2011). Crime Risk Evaluation within Information Sharing between the Police and Community Partners. Information & Communications Technology Law, 20, (2), 57-81.

Uthmani, O., Buchanan, W., Lawson, A. (2011, August). Risk Analysis for Criminal Context in Information Sharing Policies. Paper presented at SCONE, Glasgow.

van Deursen (Hazelhoff Roelfze, N. (2011, March). A comparative review of information security risk assessment methodologies for health care. Paper presented at IADIS e-Society, Avilla, Spain.

2010

Buchanan, W. (2010). 3DES Encryption and Decryption in Microsoft .NET. CDCS, (), ..

Buchanan, W. (2010). AES Encryption and Decryption in Microsoft .NET. CDCS, (), ..

Buchanan, W., Thuemmler, C., Fan, L., Lo, O., Khedim, A. (2010, September). An e-Health Cloud. Paper presented at Cloud Computing for the Public Sector, Edinburgh.

Buchanan, W. (2010). Data Communications and Computer Networks ( ed.). : . Springer.

Buchanan, W., Thuemmler, C., Fan, L., Lo, O., Khedim, A. (2010, August). Information sharing framework: Next Generation e-Health Cloud. Paper presented at BCS Health Informatics Scotland, Glasgow.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Thuemmler, C., Uthmani, O. (2010, ). Interagency data exchange protocols as computational data protection law. Paper presented at Legal Knowledge and Information Systems, .

Buchanan, W., Uthmani, O. (2010, February). Novel Information Sharing Architecture between the Police and their Community Partners. Paper presented at Scottish Networking Event 2010, Napier University, Edinburgh.

Buchanan, W., Uthmani, O. (2010, Feb). Novel Information Sharing Architecture between the Police and their Community Partners. Paper presented at SCONE, Edinburgh Napier University.

Buchanan, W., Graves, J., Bose, N. (2010). Patent: IMPROVEMENTS IN OR RELATING TO DIGITAL FORENSICS ( ed.). : . .

Buchanan, W. (2010). RC2 Encryption and Decryption in Microsoft .NET. CDCS, (), ..

Buchanan, W., Macfarlane, R., Ludwiniak, R. (2010, ). Student Perception of On-Line Lectures with a Blended Learning Environment. Paper presented at The 4th International Conference on Cybercrime Forensics Education & Training, Canterbury.

Howie, J. (2010, September). Identity Management Challenges in Cloud Computing. Paper presented at RSA Europe, London.

Howie, J. (2010, August). Key note: Information Lifecycle and Data Governance. Paper presented at Goverance, Risk and Compliance, Lisbon, Portugal .

Jamdagni, A., Tan, Z., Nanda, P., He, X., Liu, R. (2010). Intrusion detection using GSAD model for HTTP traffic on web services. In: (Ed.) Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, , () ( ed.). (pp. 1193-1197). New York, NY, USA: . ACM.

Kwecka, Z., Buchanan, W., Spiers, D. (2010). Privacy-preserving data acquisition protocol. In: (Ed.) IEEE International Conference of Computational Methods in Electrical and Electronics Engineering, , () ( ed.). (pp. 131 - 136). Listvyanka: . IEEE.

Lo, O., Graves, J., Buchanan, W. (2010). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. 190-200). Greece: . .

Mason, A., Dingle, N., Knottenbelt, W., Bell, D., Buchanan, W., Thuemmler, C. (2010). Modelling infection spread using location tracking. Int. J. Healthcare Technology and Management,, 11, (6), 442-461.

Miehling, M., Buchanan, W., Old, L.J., Batey, A., Rahman, A. (2010). Analysis of Malicious Affiliate Network Activity as a Test Case for an Investigatory Framework. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). Greece: . .

Migas, N., Buchanan, W. (2010). Ad-hoc Routing Metrics and Applied Weighting for QoS support. International Journal of Parallel, Emergent, and Distributed Systems, 25, (4), 293 - 314.

Smith, M., Buchanan, W., Thuemmler, C., Bell, D., van Deursen (Hazelhoff Roelfze, N. (2010). Analysis of Information Governance and Patient Data Protection within Primary Health Care. International Journal for Quality in Health Care , , (), .

Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R., Jia, W., Yeh, W. (2010). A two-tier system for web attack detection using linear discriminant method. In: Soriano, M., Qing, S., López, J. (Eds.) Information and Communications Security, 6476, () ( ed.). (pp. 459-471). : . Springer Berlin Heidelberg.

Tan, Z., Jamdagni, A., He, X., Nanda, P. (2010). Network Intrusion Detection based on LDA for payload feature selection. In: (Ed.) Proceedings of 2010 IEEE GLOBECOM Workshops, , () ( ed.). (pp. 1545-1549). : . IEEE.

Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C., Fan, L. (2010). Novel Information Sharing Syntax for Data Sharing Between Police and Community Partners, Using Role-Based Security. Proceedings of the 9th European Conference on Information Warfare and Security, , (), 394-402.

Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C. (2010). Novel Information Sharing Syntax for Data Sharing between Police and Community Partners, using Role-based Security. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. 394-402). Greece: . .

van Deursen (Hazelhoff Roelfze, N. (2010, November). Novel security assessment for personal health data. Paper presented at Perada workshop on Privacy, Security & Trust, Rome, Italy.

2009

Buchanan, W., Thuemmler, C. (Eds.) (2009). International Journal of Healthcare Technology and Management: Special Issue on Patient-Centric Modelling and Enhanced Security in Distributed Healthcare Systems, 10 (1/2), () ( ed.). : . Inderscience.

Ekonomou, E., Booth, K. (2009). SecRose: a data transportation layer security mechanisms for Wireless Sensor Networks. In: (Ed.) PGNet 2009 Proceedings, , () ( ed.). (pp. 19-23). Liverpool, UK: . Liverpool John Moores University, UK.

Garrigues, C., Migas, N., Buchanan, W., Robles, S. (2009). Protecting mobile agents from external replay attacks. Journal of Systems and Software Journal of Systems and Software, 82, (2), 197-206.

Kwecka, Z., Buchanan, W., Spiers, D. (2009). Application and Analysis of Private Matching Schemes Based on Commutative Cryptosystems. In: (Ed.) 8th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). Lisbon: . .

Saliou, L. (2009). Network Firewalls Dynamic Performance Evaluation and Formalisation (PhD). Edinburgh Napier University (Buchanan, W.).

Thuemmler, C., Buchanan, W., Fekri, H., Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management , 10, (1-2), 119 - 131.

2008

Al-Dubai, A. (2008). The impact of routing schemes on multicast throughput in scalable networks. In: (Ed.) the Proc. 22nd Int. Parallel and Distributed Processing Symposium (IEEE/ACM-IPDPS' 2008, IEEE Computer Society Press, , () ( ed.). (pp. ). Miami, USA: . IEEE Computer Society Press.

Dougan, S., Saliou, L. (2008). An Information Economy Built on Sand?. Expert Witness Institute NewsLetter, 12, (2), 14-15.

Kwecka, Z., Buchanan, W., Saliou, L. (2008). Validation of 1-N OT Algorithms in Privacy-Preserving Investigations. In: (Ed.) 7th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). : . .

Migas, N., Buchanan, W. (2008). Ad-hoc Routing Metrics and Applied Weighting for QoS support. In: (Ed.) 22nd IEEE International Parallel & Distributed Processing Symposium, , () ( ed.). (pp. 1 - 8 ). Miami, FL: . IEEE.

Migas, N. (2008). MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop (PhD). Edinburgh Napier University (Buchanan, W.).

2007

Buchanan, W. (2007). The Handbook of Data & Networks Security 1 (1 ed.). : . Springer-Verlag New York, Inc. Secaucus, NJ, USA.

Migas, N., Constantia, A., Buchanan, W. (2007). Mass Customisation through Personalised Brochures: the Role of Digital Printing. The 15th European Conference on Information Systems, , (), .

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: Remenyi, D. (Ed.) 6th European Conference on Information Warfare and Security, , () ( ed.). (pp. 227-235). Shrivenham, UK: . Academic Conferences International.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: (Ed.) 6th European Conference on Information Warfare and Security, , () ( ed.). (pp. 227-235). Shrivenham, UK,: . .

Thuemmler, C., Buchanan, W. (2007). Setting Safety Standards by Designing a Low-budget and Compatible Patient Identification System based on Passive RFID Technology. International Journal of Healthcare Technology and Management (IJHTM), 8, (5), 571-583.

2006

Abimbola, A., Munoz, J., Buchanan, W. (2006). A Framework to detect novel Computer Viruses via System Calls. In: Merabti, M., Pereira, R., Abuelma'atti, O. (Eds.) 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting, , () ( ed.). (pp. 308-313). John Moores University, Liverpool, UK: . PGNet.

Abimbola, A., Munoz, J., Buchanan, W. (2006). Enhancing Intrusion Detection via a Active Target Host. In: (Ed.) IEEE ICTe Africa 2006, , () ( ed.). (pp. ). Kenya: . IEEE Computer Society Press.

Abimbola, A., Munoz, J., Buchanan, W. (2006). Investigating False Positive Reduction in HTTP via Procedure Analysis. In: (Ed.) IEEE International Conference on Networking and Services, , () ( ed.). (pp. 87 - 87). Slicon Valley, CA: . IEEE Computer Society Press.

Abimbola, A., Munoz, J., Buchanan, W. (2006). NetHost-Sensor: Investigating the Capture of End-To-End Encrypted Intrusive Data. Computers & Security, 25, (6), 445-451.

Abimbola, A., Munoz, J., Buchanan, W. (2006). NetHost-sensor: Monitoring a target host's application via system calls. Information Security Tech. Report, 11, (4), 166-175.

Buchanan, W., Migas, N., McArtney, K. (2006). Analysis of an Agent-based Metric-Driven for Ah-hoc, On-Demand Routing. Journal of Ad-hoc Networks, 4, (2), 146-167.

Buchanan, W. (2006). Mastering Information Technology (Palgrave Masters Series (Computing)) 1 (1 ed.). : . Palgrave.

Graves, J., Buchanan, W., Saliou, L., Old, L.J. (2006). Performance Analysis of Network Based Forensic Systems for In-line and Out-of-line Detection and Logging. In: Hutchinson, B. (Ed.) 5th European Conference on Information Warfare and Security, , () ( ed.). (pp. 41-50). Helsink, Finland: . Academic Conferences International.

Migas, N., Buchanan, W. (2006). An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing. In: (Ed.) Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International Symposium and Workshop on , , () ( ed.). (pp. 8-22). : . IEEE Computer Society.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2006). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In: Hutchinson, B. (Ed.) 5th European Conference on Information Warfare and Security, , () ( ed.). (pp. 205-214). Helsinki, Finland: . .

2005

Buchanan, W., Graves, J., Saliou, L., Migas, N. (2005). Agent-based Forensic Investigations with an Integrated Framework. In: Hutchinson, W. (Ed.) 4th European Conference of Information Warfare and Security, , () ( ed.). (pp. 47-52). Glamorgan, United Kingdom: . Academic Conferences International.

Buchanan, W., Munoz, J., Raja, K. (2005). Critical Analysis and Error Determination of Locating-finding Techniques in GSM. International Journal of Mobile Communications (IJMC), 3, (2), 165-182.

Migas, N., Buchanan, W. (2005). Metric Evaluation of Embedded Java-based Proxies on Handheld Devices in Cluster-based Ad-hoc Routing. ECBS '05 Proceedings of the 12th IEEE International Conference and Workshops on Engineering of Computer-Based Systems , , (), 147 - 154.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2005). Novel Framework for Automated Security Abstraction, Modelling and Verification. In: Hutchinson, W. (Ed.) 4th European Conference on Information Warfare and Security, , () ( ed.). (pp. 303-311). Glamorgan, United Kingdom: . Academic Conferences International.

2004

Abimbola, A., Munoz, J., Buchanan, W. (2004). Analysis and Detection of Cruising Computer Viruses. 3rd International Conference on Electronic Warfare and Security (EIWC), , (), .

Abimbola, A., Munoz, J., Buchanan, W. (2004). Viral-Net System Via Autonomous Agent Technology. BCS Symposium/Colloquium on Mobile and Complex Agent Applications, , (), .

Buchanan, W., McArtney, K., Migas, N. (2004). Agent-based Clustering over Ad-hoc Networks. Expert Update, , (), .

Buchanan, W., Raja, K., Munoz, J. (2004). Analysis and migration of location-finding methods for GSM and 3G networks. 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on , , (), 352 - 358 .

Buchanan, W. (2004). Covert Channel Analysis and Detection using Reverse Proxy Servers. 3rd International Conference on Electronic Warfare and Security (EIWC), , (), .

Buchanan, W., Llamas, D. (2004). Covert Channel Analysis and Detection using Reverse Proxy Servers. 3rd International Conference on Electronic Warfare and Security (EIWC, , (), .

Buchanan, W., Saliou, L. (2004). Enhanced Methods of Coursework Provision of Computing. IEEE International Conference on Information Technology: Research and Education, , (), 111 - 115.

Buchanan, W. (2004). The handbook of data communications and networks 1 (2 ed.). : . Springer.

Buchanan, W. (2004). Uzytkowanie Komputerow ( ed.). : . Wkt (Poland).

Buchanan, W., Raja, K., Munoz, J. (2004). We know where you are [Location tracking]. Communications Engineer , 2 , (3), 34 - 39 .

Migas, N., Buchanan, W., McArtney, K. (2004). Migration of Mobile Agents in Ad-hoc Wireless Networks. Engineering of Computer-Based Systems, 2004. Proceedings. 11th IEEE International Conference and Workshop on the , , (), 530 - 535.

Raja, K., Buchanan, W., Munoz, J. (2004). Analytical Review of Mobile Phone-based Location-finding. IEE Communication Engineer, 2, (3), 34-39 .

2003

Migas, N., Buchanan, W., McArtney, K. (2003). MARIAN: A Framework using Mobile Agents for Routing, Topology Discovery and Automatic Network Reconfiguration in Ad-hoc Networks. IADIS International Conference, WWW/Internet 2003, , (), 1129-1134.

Migas, N., Buchanan, W., McArtney, K. (2003). Mobile Agents for Routing, Topology Discovery, and Automatic Network Reconfiguration in Ad-Hoc Networks. IEEE ECBS 2003, , (), 200 - 206 .

Pikoulas, J. (2003). An Agent-based Bayesian Method for Network Intrusion Detection (PhD). Edinburgh Napier University (Buchanan, W.).

2002

Buchanan, W. (2002). Complete Handbook of the Internet ( ed.). : . Kluwer Academic Publishers Norwell, MA, USA.

Golam, H., Buchanan, W., Munoz, J. (2002). Component-based Tools Platform for Network Testing. IEEE ECBS 2003, , (), .

Migas, N., Buchanan, W., McArtney, K. (2002). Mobile Agetns for Routing, Topology Discovery and Automatic Network Reconfiguration. IEEE ECBS 2002, , (), .

Pikoulas, J., Buchanan, W., Mannion, M. (2002). An Intelligent Agent Security Intrusion System. Engineering of Computer-Based Systems, 2002. Proceedings. Ninth Annual IEEE International Conference and Workshop on the , , (), 94 - 99 .

2001

Pikoulas, J., Buchanan, W., Mannion, M., Triantafyllopoulos, K. (2001). An Agent Based Bayesian Forecasting Model for Enhanced Network Security. In: (Ed.) Engineering of Computer Based Systems, 2001. ECBS 2001. Proceedings. Eighth Annual IEEE International Conference and Workshop on the , , () (April ed.). (pp. 247 - 254). Washington: . IEEE.

2000

Buchanan, W., Scott, A., Mannion, M., Naylor, M., Pikoulas, J. (2000). Agents, Network Security and Network Management. In: (Ed.) Distributed Systems and Networks, , () ( ed.). (pp. 600-640). : . Addison-Wesley.

Buchanan, W. (2000). Distributed Systems and Networks ( ed.). : . McGraw-Hill.

Buchanan, W., Naylor, M., Scott, A. (2000). Enhancing network management using mobile agents. In: (Ed.) Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop on the , , () ( ed.). (pp. 218-226). : . .

Buchanan, W., Scott, A., Mannion, M., Naylor, M., Pikoulas, J. (2000). Mobile Agents. Computer Bulletin, , (), .

Buchanan, W., Naylor, M., Scott, A. (2000). Mobile Agents with Enhanced Network Management. In: (Ed.) 7th IEEE Conference on electronic Computer Based Systems, , () (April ed.). (pp. 218-226). : . .

Pikoulas, J., Mannion, M., Buchanan, W. (2000). Software Agents and Computer Network Security. In: (Ed.) Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the , , () (April ed.). (pp. 211-217). : . IEEE.

Scott, A., Buchanan, W. (2000). Truly distributed control systems using fieldbus technology. In: (Ed.) Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the Issue Date: 2000, , () ( ed.). (pp. 165-173). Edinburgh , UK : . IEEE.

Wang, H. (2000). Speed Improvements for the RSA (MPhil). Edinburgh Napier University (Buchanan, W.).

Wang, H. (2000). Speed Improvements for the RSA Encryption Method (MPhil). Edinburgh Napier University (Buchanan, W.).

1999

Buchanan, W. (1999). Handbook of Data Communications and Networks 1 (1 ed.). : . Kluwer.

Buchanan, W. (1999). Wiedziec wieceg Internet ( ed.). : . .

1998

Buchanan, W. (1998). Advanced Data Communications and Networks ( ed.). : . Kluwer Academic Publishers Norwell, MA, USA.

Buchanan, W. (1998). Advanced PC Interfacing, Communications and Windows Programming ( ed.). : . Addison-Wesley.

Buchanan, W. (1998). CD-ROM Handbook of Data Communications & Networks ( ed.). : . Kluwer.

1997

Buchanan, W. (1997). Mastering Global Information Systems (English ed.). : . Macmillan Press.

Buchanan, W. (1997). Mastering the Internet ( ed.). : . Macmillan Press.

1996

Buchanan, W. (1996). Applied Data Communications and Networks ( ed.). : . Springer.

Buchanan, W., Gupta, N.K. (1996). Machine independent algorithm for concurrent finite-element problems. In: (Ed.) 3rd International IEEE Conference on Computation in Electromagnetics, 1996, Conf. Publ. No.420, () (Conf. Publ. No.420 ed.). (pp. 17-20). London, UK: . .

1995

Buchanan, W., Gupta, N.K. (1995). Prediction of Electric Fields from Conductors on a PCB by 3D Finite-Difference Time-Domain Method. IEE Engineering, Science and Education Journal, 4, (4), 177-182.

Buchanan, W., Gupta, N.K. (1995). Prediction of Electric Fields in and around PCBs - 3D Finite-Difference Time-Domain Approach with Parallel Processing. Journal of Advances in Engineering Software, 23, (2), 111-114 .

1994

Buchanan, W., Gupta, N.K., Arnold, J.M. (1994). Application of 3D finite-difference time-domain (FDTD) method to predict radiation from a PCB with high speed pulse propagation. In: (Ed.) 9th International IEE Conference on Electromagnetic Compatibility, , () (August ed.). (pp. 287-291). University of Manchester, UK: . IEE.

1993

Buchanan, W., Gupta, N.K., Arnold, J.M. (1993). Simulation of Radiation from a Microstrip Antenna using Three-Dimensional Finite-Difference Time-Domain (FDTD) Method. In: (Ed.) 8th International Conference on Antennas and Propagation, 1993, , () (April ed.). (pp. 639 - 642). Edinburgh: . IEE.

1991

Buchanan, W., Gupta, N.K. (1991). Simulation of three-dimensional finite-difference time-domain method on limited memory systems. In: (Ed.) International Conference on Computation in Electromagnetics, , () ( ed.). (pp. 75-78). , IEE, Savoy Place, London: . IEE.