Publications (William Buchanan)

2014

Buchanan, W. (2014, ). Complete Anatomy of Heartbleed, TrueCrypt and Large-scale Vulnerabilities. Paper presented at 7th International Conference on Security of Information and Networks (SIN 2014), Glasgow.

Buchanan, W. (2014, ). Creating engaging and stimulating Web based material. Paper presented at LTT 2014, Holyrood, Edinburgh.

Buchanan, W. (2014, April 2014). Discrete Logarithms within Computer and Network Security. Paper presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium, International Centre for Mathematical Sciences, University of Edinburgh.

Buchanan, W., Fan, L., Uthmani, O., Lawson, A. (2014). Information sharing. US 13/739,074, US: , US.

Buchanan, W. (2014, ). The Future of Computer Science Education and Observations from On-line Learning. Paper presented at Higher Computing Science National Qualifications Support, Edinburgh.

Buchanan, W. (2014, ). The New Enlightenment in Scotland. Paper presented at Secure Scotland, Royal Exchange Square, Glasgow.

Buchanan, W., Smales, A. (2014, Feb). The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working, Edinburgh.

Buchanan, W. (2014, ). Traffic light hacking shows the Internet of Things must come with better security. Theconverstation.com, .

Flandrin, F., Buchanan, W., Macfarlane, R., Ramsay, B., Smales, A. (2014). Evaluating Digital Forensic Tools (DFTs). In: (Ed.) 7th International Conference : Cybercrime Forensics Education & Training, , () ( ed.). (pp. ). : . .

Kwecka, Z., Buchanan, W., SCHAFER, B. (2014). "I am Spartacus" – Privacy Enhancing technologies and Privacy as a public good. Artificial Intelligence and Law, 22, (2), 113-139.

Molla, R., Romdhani, I., Buchanan, W., Fadel, Etimad Y. (2014). Mobile User Authentication System for E-commerce Applications. In: (Ed.) International Conference on Advanced Networking, Distributed Systems and Applications 2014, , () ( ed.). (pp. ). : . IEEE.

Spyra, G., Buchanan, W., Cruickshank, P., Ekonomou, E. (2014). CLOUD-BASED IDENTITY AND IDENTITY META-DATA: SECURE AND CONTROL OWN DATA IN GLOBALIZATION ERA. International Journal of Reliable and Quality E-Healthcare (IJRQEH), 3, (1), 49-66.

2013

Buchanan, W., Kwecka, Z., Ekonomou, E. (2013). A Novel Privacy Preserving Method for the Location Tracking of Mobile Devices. The Journal of Mobile Communication, Computation and Information: Special Issue on Security, 18, (), 728–737.

Buchanan, W., Burns, N., Lo, O., Lewis, R., Uthmani, O., Fan, L. (2013, April). A Scaleable and Trusted e-Health eco-System: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013, European Commission, Brussels.

Buchanan, W. (2013, ). Building a New Nation: Risk, Goverance and Trust. Paper presented at Cyber Security 2013, Edinburgh.

Buchanan, W., Smales, A. (2013, Sept). Cyber Risk and Opportunities in the Cloud. Paper presented at Cloud Security Congress 2013, Edinburgh.

Buchanan, W., Smales, A. (2013, ). e-Health in the Cloud. Paper presented at Future of e-Health, Hollyrood, Edinburgh.

Buchanan, W., Macfarlane, R., Clayton, J. (2013). Experimental Evaluation of Disk Sector Hash Comparison for Forensic Triage using a Bloom Filter. In: (Ed.) CyberForensics 2013, , () ( ed.). (pp. ). : . .

Buchanan, W., Fan, L., Uthmani, O., SCHAFER, B. (2013). Interagency Data exchange, Privacy protection and Governance Architecture for Information Sharing across Domains. Artificial Intelligence and Law, , (), .

Buchanan, W., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., varga, j., anderson, c. (2013). Modelling of Integrated Trust, Governance and Access safi.re: Information Sharing Architecture. Communications in Computer and Information Science, 182, (), 91-101 .

Buchanan, W., Smales, A. (2013, ). Public Perceptions in Health Care Security. Paper presented at Health Informatics 2013, Heriot-Watt, Edinburgh.

Buchanan, W. (2013, March). The Challenges of Big Data: Future Risks, Governance and Trust. Paper presented at The Future of Cyber Security 2013, London, UK.

Buchanan, W., Burns, N., Lo, O., Uthmani, O., varga, j., Lawson, A., anderson, c. (2013). Who Would You Trust To Identify You In Accessing Your Health Record?. Communications in Computer and Information Science, , (), .

Kwecka, Z., Buchanan, W., SCHAFER, B. (2013). Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?. In: (Ed.) INFORMATIK 2013, , () ( ed.). (pp. 2134-2148 ). : . Köllen Druck+Verlag.

Lo, O., Fan, L., Buchanan, W., Thuemmler, C. (2013). Conducting Performance Evaluation of an e-Health Platform. In: Issa, T., Isaías, P., Kommers, P. (Eds.) Information Systems and Technology for Organizations in a Networked Society, , () ( ed.). (pp. 295-315). Hershey, PA.: . IGI Global Publishing.

Penrose, P., Macfarlane, R., Buchanan, W. (2013). Approaches to the Classification Of High Entropy File Fragments. Digital Investigator, 10, (4), 372–384.

Thuemmler, C., Mival, O., Benyon, D., Buchanan, W., Paulin, A., Barros, M. (2013). Norms and Standards in Modular Medical Architectures. In: (Ed.) 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom) (IEEE Healthcom 2013), , () ( ed.). (pp. 382 - 387). Lisbon, Portugal: . .

Thuemmler, C., Mival, O., Benyon, D., Buchanan, W. (2013). Norms and standards in modular medical architectures. In: (Ed.) Proceedings IEEE 15th International Conference on e-Health Networking, Applications & Services, , () ( ed.). (pp. ). : . .

van Deursen (Hazelhoff Roelfze, N., Buchanan, W., Duff, A. (2013). Monitoring information security risks within health care. Computers and Security, 37, (), 31-45.

2012

Bani Khalaf, M., Al-Dubai, A., Buchanan, W. (2012). A New Efficient Distributed Route Discovery for Wireless Mobile Ad hoc Networks. In: (Ed.) the 11th IEEE International Wireless Telecommunications Symposium, , () ( ed.). (pp. 1-6). : . IEEE Communication Society.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C. (2012, ). Case Study: Moving Towards an e-health Platform to Store NHS Patient Information in the Cloud . Paper presented at Cloud Computing in the Public Sector: The Way Forward, London.

Buchanan, W., Macfarlane, R., Graves, J., Fan, L., Ekonomou, E., Bose, N. (2012). Cloud Forensics. In: (Ed.) , , () ( ed.). (pp. ). : . .

Buchanan, W., Fan, L., Ekonomou, E., Lo, O. (2012, ). Cloud4Health. Paper presented at Symposium on the Future of e-Health, Edinburgh.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Scott, R., Thuemmler, C., Uthmani, O. (2012). Computational data protection law: trusting each other offline and online. Frontiers in Artificial Intelligence and Applications, Volume 250: Legal Knowledge and Information Systems, (), 31 - 40.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Scott, R., Thuemmler, C., Uthmani, O. (2012). Computational data protection law: trusting each other offline and online. . Legal Knowledge and Information Systems, 250, (), 31-40.

Buchanan, W. (2012, ). Education & Training for Future Threats. Paper presented at ITEC 2012, London.

Buchanan, W. (2012). Future Risks – Including The Rise of the Hacktivism. In: (Ed.) National Information Security Conference (NISC), , () ( ed.). (pp. ). : . .

Buchanan, W. (2012). Hashing Functions in Microsoft .NET. .

Buchanan, W., Fan, L., Lo, O., Ekonomou, E. (2012, ). HOLISTIC HEALTHCARE WITHIN DYNAMIC INFORMATION INFRASTRUCTURES - THE CLOUD BASED eHEALTH PLATFORM. Paper presented at eHealth 2012, Dynamic Earth, Edinburgh.

Buchanan, W., Lewis, R., Fan, L., Uthmani, O. (2012, June). Information Sharing Around Child Protection. Paper presented at Information Sharing in the Public Sector, Edinburgh.

Buchanan, W. (2012, June). Innovation in Cloud Environments. Paper presented at Future of Technology, Royal Society of Edinburgh.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., Thuemmler, C. (2012, May). Integrating Assisted Living with Primary and Secondary Health Care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing, Edinburgh.

Buchanan, W. (2012, June). Introducing Cloud-based virtualised environments and their use in supporting learning and teaching. Paper presented at Enhancing, extending and empowering student learning within online environments, Edinburgh.

Buchanan, W. (2012, ). New Threats. Paper presented at Transatlantic Conference 2012, Edinburgh.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C. (2012, ). Patient Centric Health Care: An Integrated and Secure, Cloud-based, e-Health Platform. Paper presented at BCS Branch Meeting, University of Edinburgh Informatics Forum.

Buchanan, W. (2012). Plugging the Gaps. ITNOW, 54, (4), 36-37(2).

Buchanan, W. (2012, Feb). Skills for cyber security. Paper presented at Cybercrime and Data Protection, Dynamic Earth, Edinburgh.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C., Lawson, A. (2012, ). The UK’s eHealth Cloud Project: EHR And The Cloud: Assessing The Benefits And Mitigating The Risks. Paper presented at Arab Health 2012 (Electronic Healthcare Records), Dubai.

Buchanan, W. (2012). Towards a New Health and Social Care Information Sharing Architecture. .

Buchanan, W. (2012, ). Training the Next Generation. Paper presented at Digital Security and Cybercrime Staff Skills Shortage: Addressing the Issues, Edinburgh.

Fan, L., Buchanan, W., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., Ekonomou, E., Khedim, A. (2012). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In: (Ed.) eTELEMED 2012, , () ( ed.). (pp. 99-104). : . .

Flandrin, F., Buchanan, W., Macfarlane, R. (2012). A Platform for Digital Forensics Evaluation (D-FET). , (), ..

Lo, O., Fan, L., Buchanan, W., Thuemmler, C. (2012). Technical Evaluation of an E-Health Platform. IADIS E-Health 2012, , (), 21-28.

Lo, O., Fan, L., Buchanan, W., Thuemmler, C., Lawson, A. (2012). Towards Simulation of Patient Data for Evaluation of E-Health Platform and Services. In: (Ed.) PGNET 2012, , () ( ed.). (pp. 160-165). : . .

Macfarlane, R., Buchanan, W., Ekonomou, E., Uthmani, O., Fan, L., Lo, O. (2012). Review of Security Policy Implementations. Computers & Security, 31, (2), 253-271.

Thuemmler, C., Fan, L., Buchanan, W., Lo, O., Ekonomou, E., Khedim, A. (2012). E-Health: Chances and Challenges of Distributed, Service oriented Architectures. Journal of Cyber Security and Mobility, 37, (52), .

Uwagbole, S., Buchanan, W., Fan, L. (2012). Novel Tracking of Rogue Network Packets Using Danger Theory Approach. 11th European Conference on Information Warfare and Security (ECIW-2012), , (), .

2011

Buchanan, W., Flandrin, F., Macfarlane, R., Graves, J. (2011). A Methodology to Evaluate Rate-Based Intrusion Prevention System against Distributed Denial-of-Service (DDoS). In: (Ed.) Cyberforensics 2011, , () ( ed.). (pp. ). : . .

Buchanan, W. (2011, May). A next generation Cloud-based health care platform. Paper presented at Innovation in Healthcare, London.

Buchanan, W. (2011). Advanced Cloud and Virtualisation ( ed.). : . CRC Press.

Buchanan, W., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., Bose, N., Ludwiniak, R. (2011). Cloud-based Digital Forensics Evaluation Test (D-FET) Platform. Cyberforensics 2011, , (), .

Buchanan, W., Fan, L., Thuemmler, C., Lo, O., Ekonomou, E. (2011, Sept). Cloud-based e-Health System. Paper presented at BCS Health Informatics, Edinburgh.

Buchanan, W. (2011, Sept). Creation of Dynamic Environments for Virtualised and Cloud-based Teaching in Digital Forensics and Computer Security. Paper presented at CFET, Canterbury.

Buchanan, W., Macfarlane, R. (2011, June). D-FET – A Community Cloud for Enhancing Skills using Virtualised Environments and Cloud-based Infrastructures. Paper presented at Scottish Higher Education Employability Conference: Strengthening Partnerships with Employers, Heriot-Watt, Edinburgh.

Buchanan, W. (2011). Evidence to the Justice Committee at the Scottish Parliament . Scottish Executive.

Buchanan, W. (2011). How Academic IT Departments Manage Changing IT Environments. VitAL, 5 , (1), 26-32.

Buchanan, W. (2011). Introduction to Security and Network Forensics ( ed.). : . Auerbach Publications.

Buchanan, W. (2011, ). Making assessment and feedback fun: feedback before and after assessments. Paper presented at Edinburgh Napier University Staff Conference, Edinburgh Napier University.

Buchanan, W. (2011, June). Next Generation Secure e-Health Platform. Paper presented at BCS ISSG seminar "The Insider Threat", Edinburgh.

Buchanan, W., Graves, J., Bose, N., Macfarlane, R., Davison, B., Ludwiniak, R. (2011). Performance and Student Perception Evaluation of Cloud-based Virtualised Security and Digital Forensics Labs. HEA ICS Conference, , (), .

Buchanan, W. (2011, ). Student Perception of On-line Lectures with a Blended Learning Environment. Paper presented at Edinburgh Napier University Staff Conference, Craiglockhart.

Ekonomou, E., Buchanan, W., Fan, L., Thuemmler, C. (2011). An Integrated Cloud-based Healthcare Infrastructure. In: (Ed.) IEEE CloudCom '11, , () ( ed.). (pp. 532 - 536). Athens, Greece: . IEEE.

Fan, L., Buchanan, W., Thuemmler, C., Lo, O., Khedim, A., Uthmani, O., Lawson, A., Bell, D. (2011). DACAR Platform for eHealth Services Cloud. IEEE 4th International Conference on Cloud Computing, , (), 219-226.

Kwecka, Z., Buchanan, W., Spiers, D. (2011). Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform. International Journal of Information Technologies and Systems Approach (IJITSA) : Special issue on Privacy and Security Issues in IT, 4, (2), 12-31.

Miehling, M., Buchanan, W., Lawson, A. (2011). Affliate Advertising Fraud and an Investigatory Fraud Framework. In: (Ed.) CyberForensics 2011, , () ( ed.). (pp. ). Glasgow: . .

Miehling, M., Buchanan, W., Lawson, A. (2011, Auguest). Detection Framework for the Reduction of Click-through and ID Theft Fraud in Affiliate Marketing. Paper presented at SCONE, Glasgow.

Scott, R., Uthmani, O., Buchanan, W., Lawson, A. (2011, June). Intelligence Information Sharing between the Police and their Community Partners. Paper presented at Symposium on Security and Cybercrime, Edinburgh Napier University.

Uthmani, O., Buchanan, W., Lawson, A., Scott, R., SCHAFER, B., Fan, L. (2011). Crime Risk Evaluation within Information Sharing between the Police and Community Partners. Information & Communications Technology Law, 20, (2), 57 - 81.

Uthmani, O., Buchanan, W., Lawson, A., Scott, R., SCHAFER, B., Fan, L., Uthmani, S. (2011). Crime Risk Evaluation within Information Sharing between the Police and Community Partners. Information & Communications Technology Law, 20, (2), 57-81.

Uthmani, O., Buchanan, W., Lawson, A. (2011, August). Risk Analysis for Criminal Context in Information Sharing Policies. Paper presented at SCONE, Glasgow.

2010

Bani Khalaf, M., Al-Dubai, A., Buchanan, W. (2010). A New Adaptive Broadcasting Approach for Mobile Ad hoc Networks. In: (Ed.) Proceedings of 2010 6th Conference on Wireless Advanced (WiAD) , , () ( ed.). (pp. 1 - 6 ). London: . IEEE Computer Society.

Buchanan, W. (2010). 3DES Encryption and Decryption in Microsoft .NET. CDCS, (), ..

Buchanan, W. (2010). AES Encryption and Decryption in Microsoft .NET. CDCS, (), ..

Buchanan, W., Thuemmler, C., Fan, L., Lo, O., Khedim, A. (2010, September). An e-Health Cloud. Paper presented at Cloud Computing for the Public Sector, Edinburgh.

Buchanan, W. (2010). Data Communications and Computer Networks ( ed.). : . Springer.

Buchanan, W., Thuemmler, C., Fan, L., Lo, O., Khedim, A. (2010, August). Information sharing framework: Next Generation e-Health Cloud. Paper presented at BCS Health Informatics Scotland, Glasgow.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Thuemmler, C., Uthmani, O. (2010, ). Interagency data exchange protocols as computational data protection law. Paper presented at Legal Knowledge and Information Systems, .

Buchanan, W., Thuemmler, C. (2010). Modelling Infection Spread Using Location Tracking. International Journal of Healthcare Technology and Management (IJHTM), 11, (6), .

Buchanan, W., Uthmani, O. (2010, February). Novel Information Sharing Architecture between the Police and their Community Partners. Paper presented at Scottish Networking Event 2010, Napier University, Edinburgh.

Buchanan, W., Uthmani, O. (2010, Feb). Novel Information Sharing Architecture between the Police and their Community Partners. Paper presented at SCONE, Edinburgh Napier University.

Buchanan, W., Graves, J., Bose, N. (2010). Patent: IMPROVEMENTS IN OR RELATING TO DIGITAL FORENSICS ( ed.). : . .

Buchanan, W. (2010). RC2 Encryption and Decryption in Microsoft .NET. CDCS, (), ..

Buchanan, W., Macfarlane, R., Ludwiniak, R. (2010, ). Student Perception of On-Line Lectures with a Blended Learning Environment. Paper presented at The 4th International Conference on Cybercrime Forensics Education & Training, Canterbury.

Kwecka, Z., Buchanan, W., Spiers, D. (2010). Privacy-preserving data acquisition protocol. In: (Ed.) IEEE International Conference of Computational Methods in Electrical and Electronics Engineering, , () ( ed.). (pp. 131 - 136). Listvyanka: . IEEE.

Lo, O., Graves, J., Buchanan, W. (2010). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. 190-200). Greece: . .

Mason, A., Dingle, N., Knottenbelt, W., Bell, D., Buchanan, W., Thuemmler, C. (2010). Modelling infection spread using location tracking. Int. J. Healthcare Technology and Management,, 11, (6), 442-461.

Miehling, M., Buchanan, W., Old, L.J., Batey, A., Rahman, A. (2010). Analysis of Malicious Affiliate Network Activity as a Test Case for an Investigatory Framework. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). Greece: . .

Migas, N., Buchanan, W. (2010). Ad-hoc Routing Metrics and Applied Weighting for QoS support. International Journal of Parallel, Emergent, and Distributed Systems, 25, (4), 293 - 314.

Smith, M., Buchanan, W., Thuemmler, C., Bell, D., van Deursen (Hazelhoff Roelfze, N. (2010). Analysis of Information Governance and Patient Data Protection within Primary Health Care. International Journal for Quality in Health Care , , (), .

Thuemmler, C., Buchanan, W. (2010). Review of coding for success implementation. , (), ..

Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C. (2010). Novel Information Sharing Syntax for Data Sharing between Police and Community Partners, using Role-based Security. In: (Ed.) 9th European Conference on Information Warfare and Security, , () ( ed.). (pp. 394-402). Greece: . .

Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C., Fan, L. (2010). Novel Information Sharing Syntax for Data Sharing Between Police and Community Partners, Using Role-Based Security. Proceedings of the 9th European Conference on Information Warfare and Security, , (), 394-402.

2009

Buchanan, W., Thuemmler, C. (Eds.) (2009). International Journal of Healthcare Technology and Management: Special Issue on Patient-Centric Modelling and Enhanced Security in Distributed Healthcare Systems, 10 (1/2), () ( ed.). : . Inderscience.

Garrigues, C., Migas, N., Buchanan, W., Robles, S. (2009). Protecting mobile agents from external replay attacks. Journal of Systems and Software Journal of Systems and Software, 82, (2), 197-206.

Kwecka, Z., Buchanan, W., Spiers, D. (2009). Application and Analysis of Private Matching Schemes Based on Commutative Cryptosystems. In: (Ed.) 8th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). Lisbon: . .

Thuemmler, C., Buchanan, W., Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management (IJHTM), , (), 119-131.

Thuemmler, C., Buchanan, W., Fekri, H., Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management , 10, (1-2), 119 - 131.

2008

Kwecka, Z., Buchanan, W., Saliou, L. (2008). Validation of 1-N OT Algorithms in Privacy-Preserving Investigations. In: (Ed.) 7th European Conference on Information Warfare and Security, , () ( ed.). (pp. ). : . .

Migas, N., Buchanan, W. (2008). Ad-hoc Routing Metrics and Applied Weighting for QoS support. In: (Ed.) 22nd IEEE International Parallel & Distributed Processing Symposium, , () ( ed.). (pp. 1 - 8 ). Miami, FL: . IEEE.

2007

Buchanan, W. (2007). The Handbook of Data & Networks Security 1 (1 ed.). : . Springer-Verlag New York, Inc. Secaucus, NJ, USA.

Lawson, A., Buchanan, W. (2007, ). Challenge-based Learning Framework for Teaching Programming Skills. Paper presented at HEA-ICS 7th Programming Workshop, University of Kent, Canterbury, 2nd April 2007, .

Migas, N., Constantia, A., Buchanan, W. (2007). Mass Customisation through Personalised Brochures: the Role of Digital Printing. The 15th European Conference on Information Systems, , (), .

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: Remenyi, D. (Ed.) 6th European Conference on Information Warfare and Security, , () ( ed.). (pp. 227-235). Shrivenham, UK: . Academic Conferences International.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: (Ed.) 6th European Conference on Information Warfare and Security, , () ( ed.). (pp. 227-235). Shrivenham, UK,: . .

Thuemmler, C., Buchanan, W. (2007). Setting Safety Standards by Designing a Low-budget and Compatible Patient Identification System based on Passive RFID Technology. International Journal of Healthcare Technology and Management (IJHTM), 8, (5), 571-583.

2006

Abimbola, A., Munoz, J., Buchanan, W. (2006). A Framework to detect novel Computer Viruses via System Calls. In: Merabti, M., Pereira, R., Abuelma'atti, O. (Eds.) 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting, , () ( ed.). (pp. 308-313). John Moores University, Liverpool, UK: . PGNet.

Abimbola, A., Munoz, J., Buchanan, W. (2006). Enhancing Intrusion Detection via a Active Target Host. In: (Ed.) IEEE ICTe Africa 2006, , () ( ed.). (pp. ). Kenya: . IEEE Computer Society Press.

Abimbola, A., Munoz, J., Buchanan, W. (2006). Investigating False Positive Reduction in HTTP via Procedure Analysis. In: (Ed.) IEEE International Conference on Networking and Services, , () ( ed.). (pp. 87 - 87). Slicon Valley, CA: . IEEE Computer Society Press.

Abimbola, A., Munoz, J., Buchanan, W. (2006). NetHost-Sensor: Investigating the Capture of End-To-End Encrypted Intrusive Data. Computers & Security, 25, (6), 445-451.

Abimbola, A., Munoz, J., Buchanan, W. (2006). NetHost-sensor: Monitoring a target host's application via system calls. Information Security Tech. Report, 11, (4), 166-175.

Buchanan, W., Migas, N., McArtney, K. (2006). Analysis of an Agent-based Metric-Driven for Ah-hoc, On-Demand Routing. Journal of Ad-hoc Networks, 4, (2), 146-167.

Buchanan, W. (2006). Mastering Information Technology (Palgrave Masters Series (Computing)) 1 (1 ed.). : . Palgrave.

Graves, J., Buchanan, W., Saliou, L., Old, L.J. (2006). Performance Analysis of Network Based Forensic Systems for In-line and Out-of-line Detection and Logging. In: Hutchinson, B. (Ed.) 5th European Conference on Information Warfare and Security, , () ( ed.). (pp. 41-50). Helsink, Finland: . Academic Conferences International.

Migas, N., Buchanan, W. (2006). An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing. In: (Ed.) Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International Symposium and Workshop on , , () ( ed.). (pp. 8-22). : . IEEE Computer Society.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2006). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In: Hutchinson, B. (Ed.) 5th European Conference on Information Warfare and Security, , () ( ed.). (pp. 205-214). Helsinki, Finland: . .

2005

Buchanan, W., Graves, J., Saliou, L., Migas, N. (2005). Agent-based Forensic Investigations with an Integrated Framework. In: Hutchinson, W. (Ed.) 4th European Conference of Information Warfare and Security, , () ( ed.). (pp. 47-52). Glamorgan, United Kingdom: . Academic Conferences International.

Buchanan, W., Munoz, J., Raja, K. (2005). Critical Analysis and Error Determination of Locating-finding Techniques in GSM. International Journal of Mobile Communications (IJMC), 3, (2), 165-182.

Migas, N., Buchanan, W. (2005). Metric Evaluation of Embedded Java-based Proxies on Handheld Devices in Cluster-based Ad-hoc Routing. ECBS '05 Proceedings of the 12th IEEE International Conference and Workshops on Engineering of Computer-Based Systems , , (), 147 - 154.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2005). Novel Framework for Automated Security Abstraction, Modelling and Verification. In: Hutchinson, W. (Ed.) 4th European Conference on Information Warfare and Security, , () ( ed.). (pp. 303-311). Glamorgan, United Kingdom: . Academic Conferences International.

2004

Abimbola, A., Munoz, J., Buchanan, W. (2004). Analysis and Detection of Cruising Computer Viruses. 3rd International Conference on Electronic Warfare and Security (EIWC), , (), .

Abimbola, A., Munoz, J., Buchanan, W. (2004). Viral-Net System Via Autonomous Agent Technology. BCS Symposium/Colloquium on Mobile and Complex Agent Applications, , (), .

Buchanan, W., McArtney, K., Migas, N. (2004). Agent-based Clustering over Ad-hoc Networks. Expert Update, , (), .

Buchanan, W., Migas, N., McArtney, K. (2004). Agent-based Systems for Ah-hoc Routing in Wireless Networks. In: (Ed.) BCS Symposium/Colloquium on Mobile and Complex Agent Applications, , () ( ed.). (pp. ). Napier University, Edinburgh: . .

Buchanan, W., Raja, K., Munoz, J. (2004). Analysis and migration of location-finding methods for GSM and 3G networks. 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on , , (), 352 - 358 .

Buchanan, W. (2004). Correlation between academic and skills-based tests in computer networks. British Journal of Education Technology (BJET), 37, (1), 69-78.

Buchanan, W. (2004). Covert Channel Analysis and Detection using Reverse Proxy Servers. 3rd International Conference on Electronic Warfare and Security (EIWC), , (), .

Buchanan, W., Llamas, D. (2004). Covert Channel Analysis and Detection using Reverse Proxy Servers. 3rd International Conference on Electronic Warfare and Security (EIWC, , (), .

Buchanan, W., Saliou, L. (2004). Enhanced Methods of Coursework Provision of Computing. IEEE International Conference on Information Technology: Research and Education, , (), 111 - 115.

Buchanan, W. (2004). Network-based Computer Forensics for Misuse Detection. Industrial Management & Data Systems (IMDS) Journal, , (), .

Buchanan, W. (2004). Replacing Courseworks with Practical Assessments in Computer Networks. Napier Teaching Fellow’s Journal, , (), .

Buchanan, W. (2004). The handbook of data communications and networks 1 (2 ed.). : . Springer.

Buchanan, W. (2004). Uzytkowanie Komputerow ( ed.). : . Wkt (Poland).

Buchanan, W., Raja, K., Munoz, J. (2004). We know where you are [Location tracking]. Communications Engineer , 2 , (3), 34 - 39 .

Migas, N., Buchanan, W., McArtney, K. (2004). Benchmarking bandwidth and resource consumptions of Java-based proxy PDAs in ad-hoc networks. Expert Update, , (), .

Migas, N., Buchanan, W., McArtney, K. (2004). Migration of Mobile Agents in Ad-hoc Wireless Networks. Engineering of Computer-Based Systems, 2004. Proceedings. 11th IEEE International Conference and Workshop on the , , (), 530 - 535.

Raja, K., Buchanan, W., Munoz, J. (2004). Analytical Review of Mobile Phone-based Location-finding. IEE Communication Engineer, 2, (3), 34-39 .

2003

Buchanan, W. (2003). Some Studies on the CAN Specification. In: Mahalik, N. (Ed.) Fieldbus Technology: Industrial Network Standards for Real-Time Distributed Control, , () ( ed.). (pp. 516-532). : . Springer.

Migas, N., Buchanan, W., McArtney, K. (2003). MARIAN: A Framework using Mobile Agents for Routing, Topology Discovery and Automatic Network Reconfiguration in Ad-hoc Networks. IADIS International Conference, WWW/Internet 2003, , (), 1129-1134.

Migas, N., Buchanan, W., McArtney, K. (2003). Mobile Agents for Routing, Topology Discovery, and Automatic Network Reconfiguration in Ad-Hoc Networks. IEEE ECBS 2003, , (), 200 - 206 .

2002

Brown, E., Buchanan, W. (2002). EML in the Support of Minority Languages. LSTN 2002, , (), 106-107.

Buchanan, W. (2002). Complete Handbook of the Internet ( ed.). : . Kluwer Academic Publishers Norwell, MA, USA.

Buchanan, W. (2002). Mastering Computing ( ed.). : . Macmillan Press.

Buchanan, W. (2002). Mastering Delphi Programming ( ed.). : . Palgrave Publishers.

Buchanan, W., Brown, E. (2002). Towards a Reusable and Reconfigurable WWW, System-Level Issues and Approaches in Software Development. IEEE 26th Annual International Computer Software and Applications Conference,, , (), 814 - 815.

Golam, H., Buchanan, W. (2002). Component-based Tools Platform for Network Testing. 9th IEEE Conference in ECBS, , (), .

Golam, H., Buchanan, W., Munoz, J. (2002). Component-based Tools Platform for Network Testing. IEEE ECBS 2003, , (), .

Lewis, O., Mannion, M., Buchanan, W. (2002). Performance Issues of Variability Design for Embedded System Product Lines. Fraunhofer IESE Technical Report 070.00/E, , (), .

Migas, N., Buchanan, W., McArtney, K. (2002). Mobile Agetns for Routing, Topology Discovery and Automatic Network Reconfiguration. IEEE ECBS 2002, , (), .

Pikoulas, J., Buchanan, W., Mannion, M. (2002). An Intelligent Agent Security Intrusion System. Engineering of Computer-Based Systems, 2002. Proceedings. Ninth Annual IEEE International Conference and Workshop on the , , (), 94 - 99 .

2001

Buchanan, W. (2001). Computer busses ( ed.). : . Butterworth-Heinemann Newton, MA, USA..

Buchanan, W. (2001). PC Interfacing, Communications and Windows Programming (Chinese ed.). : . Addison Wesley.

Pikoulas, J., Buchanan, W., Mannion, M., Triantafyllopoulos, K. (2001). An Agent Based Bayesian Forecasting Model for Enhanced Network Security. In: (Ed.) Engineering of Computer Based Systems, 2001. ECBS 2001. Proceedings. Eighth Annual IEEE International Conference and Workshop on the , , () (April ed.). (pp. 247 - 254). Washington: . IEEE.

2000

Buchanan, W., Wilson, A. (2000). Advanced PC Architecture ( ed.). : . Addison-Wesley.

Buchanan, W., Scott, A., Mannion, M., Naylor, M., Pikoulas, J. (2000). Agents, Network Security and Network Management. In: (Ed.) Distributed Systems and Networks, , () ( ed.). (pp. 600-640). : . Addison-Wesley.

Buchanan, W. (2000). Compression Techniques for Real-Time Signals. Computer Bulletin (BCS), 2, (1), 32.

Buchanan, W. (2000). Computer Busses ( ed.). : . Butterworth-Heinemann Newton, MA, USA.

Buchanan, W. (2000). Distributed Systems and Networks ( ed.). : . McGraw-Hill.

Buchanan, W., Naylor, M., Scott, A. (2000). Enhancing network management using mobile agents. In: (Ed.) Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop on the , , () ( ed.). (pp. 218-226). : . .

Buchanan, W., Scott, A., Mannion, M., Naylor, M., Pikoulas, J. (2000). Mobile Agents. Computer Bulletin, , (), .

Buchanan, W., Naylor, M., Scott, A. (2000). Mobile Agents with Enhanced Network Management. In: (Ed.) 7th IEEE Conference on electronic Computer Based Systems, , () (April ed.). (pp. 218-226). : . .

Lewis, O., Mannion, M., Buchanan, W. (2000). Performance Issues of Variability Design for Embedded System Product Lines. In: (Ed.) 22nd International Conference on Software Engineering, ICSE 2000, , () (June ed.). (pp. ). Limerick: . .

Pikoulas, J., Mannion, M., Buchanan, W. (2000). Software Agents and Computer Network Security. In: (Ed.) Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the , , () (April ed.). (pp. 211-217). : . IEEE.

Scott, A., Buchanan, W. (2000). Investigation, Analysis and Determination of Inclusions in High-Tolerance Board Design. Journal of the Institute of Circuit Technology, 26, (2), 7-9.

Scott, A., Buchanan, W. (2000). Truly distributed control systems using fieldbus technology. In: (Ed.) Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the Issue Date: 2000, , () ( ed.). (pp. 165-173). Edinburgh , UK : . IEEE.

1999

Buchanan, W., Scott, A. (1999). AOI false rejects PCB manufacture. Printed Circuit Fabrication, 22, (10), 34-37.

Buchanan, W. (1999). Handbook of Data Communications and Networks 1 (1 ed.). : . Kluwer.

Buchanan, W. (1999). Java Sockets and Integration with HTTP. Visual Systems Journal, , (), .

Buchanan, W. (1999). Mastering Global Information Systems (Chinese ed.). : . Bejing Press.

Buchanan, W. (1999). Mastering Microsoft Windows, Novell NetWare and UNIX ( ed.). : . Palgrave Publishers.

Buchanan, W. (1999). Mastering Networks ( ed.). : . Macmillan Press.

Buchanan, W. (1999). Mastering Windows NT, Novell NetWare and UNIX ( ed.). : . Macmillan Press.

Buchanan, W. (1999). PC Interfacing, Communications and Windows Programming ( ed.). : . Addison-Wesley Longman Ltd. Essex, UK, UK.

Buchanan, W., Scott, A. (1999). Tadpole inclusions in laminate structures PCB AOI. Printed Circuit Fabrication, 22, (11), 58-62.

Buchanan, W. (1999). Wiedziec wieceg Internet ( ed.). : . .

Pearson, B., Buchanan, W. (1999). Intelligent Methods in Industrial Control. In: (Ed.) EPSRC PREP '99, , () ( ed.). (pp. ). : . .

Scott, A., Buchanan, W. (1999). Excluding inclusions PCB inspection. Journal of Manufacturing Engineer, 78, (4), 154-156.

Scott, A., Buchanan, W. (1999). Sources and Causes of Tadpoles. PCB Fab, , (), .

Scott, A., Buchanan, W. (1999). Sources of Inclusions in Laminates. IEE Journal in Engineering Manufacture, , (), .

1998

Buchanan, W. (1998). Advanced Data Communications and Networks ( ed.). : . Kluwer Academic Publishers Norwell, MA, USA.

Buchanan, W. (1998). Advanced PC Interfacing, Communications and Windows Programming ( ed.). : . Addison-Wesley.

Buchanan, W. (1998). CD-ROM Handbook of Data Communications & Networks ( ed.). : . Kluwer.

Buchanan, W. (1998). Mastering Java ( ed.). : . Macmillan Press.

Buchanan, W. (1998). Mastering Pascal and Delphi (2nd ed.). : . Macmillan Press.

1997

Buchanan, W., Gupta, N.K. (1997). A Novel Parallel Processing Synchronisation Method for Observing Electric Fields in and around PCBs. International Journal of Electronics, 82, (1), 61-67.

Buchanan, W. (1997). Applied PC Interfacing, Interrupts and Graphics ( ed.). : . Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA.

Buchanan, W. (1997). Mastering Global Information Systems (English ed.). : . Macmillan Press.

Buchanan, W. (1997). Mastering the Internet ( ed.). : . Macmillan Press.

Buchanan, W. (1997). Mastering the Internet ( ed.). : . Palgrave Publishers.

Buchanan, W. (1997). Microelectronic Systems: Design, Modelling and Test ( ed.). : . Arnold.

Buchanan, W. (1997). Software Development ( ed.). : . Butterworth-Heinemann Newton, MA, USA.

Buchanan, W. (1997). Software Development for Engineers with C, Pascal, C++, Assembly Language, Visual Basic, HTML, Javascript and Java ( ed.). : . John Wiley & Sons, Inc. New York, NY, USA.

Buchanan, W. (1997). Wiedziec wiecej Internet ( ed.). : . Wkt (Poland).

1996

Buchanan, W. (1996). Analysis of Electromagnetic Wave Propogation using 3D Finite-Difference Time-Domain Methods with Parallel Processing (PhD). Edinburgh Napier University.

Buchanan, W. (1996). Applied Data Communications and Networks ( ed.). : . Springer.

Buchanan, W., Gupta, N.K. (1996). Machine independent algorithm for concurrent finite-element problems. In: (Ed.) 3rd International IEEE Conference on Computation in Electromagnetics, 1996, Conf. Publ. No.420, () (Conf. Publ. No.420 ed.). (pp. 17-20). London, UK: . .

Buchanan, W., Cordiner, S. (1996). Turbocompressor Control using Fuzzy Logic. In: (Ed.) EPSRC Neural Networks Symposium, 1996, , () (September ed.). (pp. ). University of Edinburgh: . .

1995

Buchanan, W. (1995). C for Electronic Engineering with Applied Software Engineering ( ed.). : . Prentice-Hall, Inc. Upper Saddle River, NJ, USA.

Buchanan, W., Gupta, N.K. (1995). Prediction of Electric Fields from Conductors on a PCB by 3D Finite-Difference Time-Domain Method. IEE Engineering, Science and Education Journal, 4, (4), 177-182.

Buchanan, W., Gupta, N.K. (1995). Prediction of Electric Fields in and around PCBs - 3D Finite-Difference Time-Domain Approach with Parallel Processing. Journal of Advances in Engineering Software, 23, (2), 111-114 .

1994

Buchanan, W., Gupta, N.K., Arnold, J.M. (1994). 3D FDTD Method in a Microstrip Antenna's Near-Field Simulation. In: (Ed.) 2nd International Conference on Computation in Electromagnetics, 1994, , () (April ed.). (pp. ). : . .

Buchanan, W., Gupta, N.K., Arnold, J.M. (1994). Application of 3D finite-difference time-domain (FDTD) method to predict radiation from a PCB with high speed pulse propagation. In: (Ed.) 9th International IEE Conference on Electromagnetic Compatibility, , () (August ed.). (pp. 287-291). University of Manchester, UK: . IEE.

1993

Buchanan, W., Gupta, N.K. (1993). Enhancements for the 3D FDTD Method. In: (Ed.) FDTD (Antennas) Section, , () (July ed.). (pp. ). Queen Mary’s and Westfield College: . .

Buchanan, W., Gupta, N.K. (1993). Maxwell's Equations in the 21st Century. IJEEE, 30, (4), .

Buchanan, W., Gupta, N.K. (1993). Parallel Processing Techniques in EMP Propagation using 3D Finite-Difference Time-Domain (FDTD) Method. Journal of Advances in Engineering Software, 18, (3), 149-159.

Buchanan, W., Gupta, N.K. (1993). Simulation of Electromagnetic Pulse Propagation in Three- Dimensional Finite Difference Time-Domain Method using Parallel Processing Techniques. In: (Ed.) 2nd International Conference on Software for Electrical Engineering Analysis and Design. Electrosoft '93, , () ( ed.). (pp. ). Southampton, UK: . .

Buchanan, W., Gupta, N.K. (1993). Simulation of near-field radiation for a Microstrip antenna using the 3D FDTD method. In: (Ed.) NRSC 93 Colloquium, , () (April ed.). (pp. ). University of Leeds: . .

Buchanan, W., Gupta, N.K., Arnold, J.M. (1993). Simulation of Radiation from a Microstrip Antenna using Three-Dimensional Finite-Difference Time-Domain (FDTD) Method. In: (Ed.) 8th International Conference on Antennas and Propagation, 1993, , () (April ed.). (pp. 639 - 642). Edinburgh: . IEE.

1992

Buchanan, W., Gupta, N.K. (1992). Computers as Applied to Time-Domain Methods in Electrical Engineering. In: (Ed.) World Conference on Engineering Education, 1992, , () ( ed.). (pp. ). University of Portsmouth, UK: . .

Buchanan, W., Gupta, N.K. (1992). Parallel Processing of the Three-Dimensional Finite-Difference Time-Domain Method. In: (Ed.) NRSC, , () (July ed.). (pp. ). University of Bradford: . .

1991

Buchanan, W., Gupta, N.K. (1991). Simulation of three-dimensional finite-difference time-domain method on limited memory systems. In: (Ed.) International Conference on Computation in Electromagnetics, , () ( ed.). (pp. 75-78). , IEE, Savoy Place, London: . IEE.

1988

Buchanan, W. (1988). Microwaves in the laboratory. In: (Ed.) IEE Colloquium on 'Teaching Antennas and Propagation to Undergraduates', 1988, Digest No.84, () ((Digest No.84) ed.). (pp. 10-12). . London, UK: . IEE.