Bill Buchanan
#151,311
Most Influential Person Now
British computer scientist
Bill Buchanan 's AcademicInfluence.com Rankings
Bill Buchanan criminal-justice Degrees
Criminal Justice
#216
World Rank
#242
Historical Rank
Cyber Security
#26
World Rank
#28
Historical Rank
Bill Buchanan computer-science Degrees
Computer Science
#10406
World Rank
#10928
Historical Rank
Cybersecurity
#26
World Rank
#28
Historical Rank
Software Engineering
#295
World Rank
#301
Historical Rank
Database
#7459
World Rank
#7732
Historical Rank
Download Badge
Criminal Justice Computer Science
Bill Buchanan 's Degrees
- PhD Computer Science Edinburgh Napier University
- Masters Software Engineering Heriot-Watt University
- Bachelors Computer Science Edinburgh Napier University
Similar Degrees You Can Earn
Why Is Bill Buchanan Influential?
(Suggest an Edit or Addition)According to Wikipedia, William Johnston Buchanan OBE FBCS CEng PFHEA is a Scottish computer scientist. Buchanan is a professor in the School of Computing, Engineering and the Built Environment. He currently leads the Blockpass ID Lab and the Centre for Cybersecurity, IoT and Cyberphysical at Edinburgh Napier University. In 2017, he was appointed Officer of the Order of the British Empire in the 2017 Birthday Honours for services to cyber security.
Bill Buchanan 's Published Works
Published Works
- BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for COVID-19 Pandemic and Beyond (2020) (104)
- Lightweight cryptography methods (2017) (100)
- Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention (2017) (90)
- DACAR Platform for eHealth Services Cloud (2011) (85)
- IoT Forensics: Amazon Echo as a Use Case (2019) (79)
- Applications of Blockchain Within Healthcare (2018) (73)
- An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks (2021) (62)
- An Integrated Cloud-based Healthcare Infrastructure (2011) (54)
- Monitoring information security risks within health care (2013) (53)
- Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks (2003) (53)
- Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA) (2017) (50)
- DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption (2020) (49)
- Machine learning and semantic analysis of in-game chat for cyberbullying (2018) (48)
- A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations (2021) (47)
- A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric (2020) (47)
- A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks (2019) (45)
- Decentralized Accessibility of e-commerce Products through Blockchain Technology (2020) (44)
- Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution (2020) (44)
- Will quantum computers be the end of public key encryption? (2017) (40)
- Next Generation Lightweight Cryptography for Smart IoT Devices: : Implementation, Challenges and Applications (2019) (36)
- An intelligent agent security intrusion system (2002) (35)
- A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos (2020) (34)
- Distance Measurement Methods for Improved Insider Threat Detection (2018) (33)
- Enhancing network management using mobile agents (2000) (33)
- Evaluation of TFTP DDoS amplification attack (2016) (32)
- Employing machine learning techniques for detection and classification of phishing emails (2017) (30)
- Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology (2007) (29)
- FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures (2019) (29)
- A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services (2013) (28)
- SPoC: Protecting Patient Privacy for e-Health Services in the Cloud (2012) (27)
- Truly distributed control systems using fieldbus technology (2000) (25)
- A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). (2011) (24)
- A new adaptive broadcasting approach for mobile ad hoc networks (2010) (24)
- Radio frequency identification (RFID) in pervasive healthcare (2009) (24)
- Approaches to the classification of high entropy file fragments (2013) (24)
- A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT (2021) (24)
- An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack (2017) (22)
- Privacy and Trust Redefined in Federated Machine Learning (2021) (22)
- An agent-based Bayesian forecasting model for enhanced network security (2001) (22)
- Security for Cyber-Physical Systems in Healthcare (2017) (21)
- A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption (2020) (20)
- Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL) (2020) (20)
- Protecting mobile agents from external replay attacks (2009) (20)
- A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect (2020) (20)
- Microcomputer Instruction For The Learning Disabled (1982) (19)
- An authentication protocol based on chaos and zero knowledge proof (2020) (19)
- Analysis of the adoption of security headers in HTTP (2017) (19)
- Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study (2018) (18)
- Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication (2020) (18)
- Analysis and migration of location-finding methods for GSM and 3G networks (2004) (18)
- Software agents and computer network security (2000) (17)
- Distributed Systems and Networks (2000) (17)
- Migration of mobile agents in ad-hoc, wireless networks (2004) (17)
- Introduction to Networks (2004) (16)
- Fast Probabilistic Consensus with Weighted Votes (2020) (16)
- A Distributed Trust Framework for Privacy-Preserving Machine Learning (2020) (16)
- Numerical encoding to Tame SQL injection attacks (2016) (16)
- Impact of cyberattacks on stock performance: a comparative study (2018) (15)
- Formal security policy implementations in network firewalls (2012) (15)
- Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation (2020) (14)
- A Forensic Audit of the Tor Browser Bundle (2019) (14)
- NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data (2006) (14)
- Evaluating Digital Forensic Tools (DFTs). (2014) (14)
- Simulation of radiation from a microstrip antenna using three-dimensional finite-difference time-dom (1993) (14)
- Review and Critical Analysis of Privacy-Preserving Infection Tracking and Contact Tracing (2020) (13)
- Fast contraband detection in large capacity disk drives (2015) (13)
- Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT (2021) (13)
- A RAM triage methodology for Hadoop HDFS forensics (2016) (13)
- A methodology for the security evaluation within third-party Android Marketplaces (2017) (13)
- “I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good (2014) (12)
- Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform (2011) (12)
- The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime (2018) (12)
- The Future Internet: A World of Secret Shares (2015) (12)
- Analysis of electromagnetic wave propagation using 3D finite-difference time-domain methods with parallel processing (1996) (12)
- Integrated Services Digital Network (ISDN) (1996) (11)
- HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles (2022) (11)
- Introduction to Security and Network Forensics (2011) (11)
- Norms and standards in modular medical architectures (2013) (10)
- Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier (2018) (10)
- Recent Advances and Trends in Lightweight Cryptography for IoT Security (2020) (10)
- A Comparative Analysis of Honeypots on Different Cloud Platforms (2021) (10)
- Forensics study of IMO call and chat app (2018) (10)
- Scenario-based creation and digital investigation of ethereum ERC20 tokens (2020) (10)
- Deriving ChaCha20 Key Streams From Targeted Memory Analysis (2019) (10)
- Windows 95/98/NT (1999) (10)
- Investigating False Positive Reduction in HTTP via Procedure Analysis (2006) (10)
- Top 10 Blockchain Predictions for the (Near) Future of Healthcare (2019) (10)
- E-Health: Chances and Challenges of Distributed, Service oriented Architectures (2012) (9)
- Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. (2006) (9)
- Technical evaluation of an e-health platform. (2012) (9)
- Building the Future of EU: Moving forward with International Collaboration on Blockchain (2018) (9)
- Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment (2017) (9)
- Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device (2018) (9)
- Novel information sharing syntax for data sharing between police and community partners, using role-based security. (2010) (9)
- Privacy Preserving Passive DNS (2020) (9)
- Parallel processing techniques in EMP propagation using 3D Finite-Difference Time-Domain (FDTD) method (1993) (8)
- Correlation between academic and skills-based tests in computer networks (2006) (8)
- Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption (2017) (8)
- An intelligent agent intrusion system (2002) (8)
- Requirements for 5G based telemetric cardiac monitoring (2018) (8)
- Privacy-preserving data acquisition protocol (2010) (8)
- Protocol for Asynchronous, Reliable, Secure and Efficient Consensus (PARSEC) Version 2.0 (2019) (8)
- High-level Data Link Control (HDLC) (1996) (8)
- Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification (2005) (7)
- Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets (2021) (7)
- CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure (2020) (7)
- Prediction of electric fields from conductors on a PCB by 3D finite-difference time-domain (FDTD) method (1995) (7)
- Detection of Algorithmically Generated Malicious Domain (2018) (7)
- Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach (2020) (7)
- NetHost-sensor: Monitoring a target host's application via system calls (2006) (7)
- GDPR and Cyber Security for Business Information Systems (2018) (7)
- NapierOne: A modern mixed file data set alternative to Govdocs1 (2022) (7)
- We know where you are [Location tracking] (2004) (7)
- Crime risk evaluation within information sharing between the police and community partners (2011) (7)
- Sticky policies approach within cloud computing (2017) (7)
- Covert Channel Analysis and Detection with Reverse Proxy Servers using Microsoft Windows (2004) (7)
- Analysis of Information governance and patient data protection within primary health care. (2010) (7)
- Interagency data exchange protocols as computational data protection law (2010) (7)
- A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions (2022) (6)
- Decrypting live SSH traffic in virtual environments (2019) (6)
- Application of 3D finite-difference time-domain (FDTD) method to predict radiation from a PCB with h (1994) (6)
- Validation of 1-N OT algorithms in privacy-preserving investigations. (2008) (6)
- Prediction of electric fields in and around PCBs : 3D finite-difference time-domain approach with parallel processing (1995) (6)
- The Complete Handbook of the Internet (2002) (6)
- A Novel Multi-Chaos Based Compressive Sensing Encryption Technique (2020) (6)
- Applied web traffic analysis for numerical encoding of SQL Injection attack features. (2016) (5)
- GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture (2022) (5)
- PC Interfacing, Communications and Windows Programming (1999) (5)
- Fiber-optic systems (1989) (5)
- A new efficient distributed route discovery for wireless mobile ad hoc networks (2012) (5)
- Computer Busses (2000) (5)
- Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. (2011) (5)
- Cloud-Based Identity and Identity Meta-Data: Secure and Control of Data in Globalization Era (2014) (5)
- Computer busses - design and application (2000) (5)
- Visual Basic Language (1997) (5)
- Analysis and detection of cruising computer viruses. (2004) (5)
- Cryptography across industry sectors (2017) (5)
- Towards Trust and Governance in Integrated Health and Social Care Platforms (2017) (4)
- A privacy-preserving distributed platform for COVID-19 vaccine passports (2021) (4)
- TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies (2020) (4)
- Image Compression (JPEG) (2004) (4)
- Use of Computers in the Teaching of Electronics: A Survey (1994) (4)
- MARIAN: A framework using mobile agents for routing, topology discovery and automatic network reconfiguration in ad-hoc networks. (2003) (4)
- Simulation of three-dimensional finite-difference time domain method on limited memory systems (1991) (4)
- Analysis of an agent-based metric-driven method for ad-hoc, on-demand routing (2006) (4)
- MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features (2019) (4)
- Computational data protection law: trusting each other offline and online (2012) (3)
- Privacy-preserving Surveillance Methods using Homomorphic Encryption (2020) (3)
- Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. (2006) (3)
- GLASS: Towards Secure and Decentralized eGovernance Services using IPFS (2021) (3)
- Internet of Things: Concept, Implementation and Challenges (2022) (3)
- TEMPLATE Quantum-tothe-Home ( QTTH ) : Achieving Gbits / s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipments (2017) (3)
- A Blockchain Framework in Post-Quantum Decentralization (2021) (3)
- Performance issues of variability design for embedded system product lines. (2000) (3)
- RESCUE: Resilient Secret Sharing Cloud-Based Architecture (2015) (3)
- An intelligent intrusion detection environment using software agents (2000) (3)
- Ransomware: Analysing the Impact on Windows Active Directory Domain Services (2022) (3)
- 33 – Windows 95/NT (1997) (3)
- Analysis of malicious affiliate network activity as a test case for an investigatory framework. (2010) (3)
- Wireless LAN Architecture (2004) (3)
- Patient simulator: towards testing and validation. (2011) (3)
- Agent-based Forensic Investigations with an Integrated Framework (2005) (3)
- Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates (2021) (3)
- Sticky policy enabled authenticated OOXML (2016) (3)
- Mining malware command and control traces (2017) (3)
- Energy demand forecasting of buildings using random neural networks (2020) (3)
- BREWSCHEME: Stata module for generating customized graph scheme files (2016) (3)
- MARIAN: A Framework Using Mobile Agents for Routing in Ad-Hoc Networks (2003) (3)
- Mastering the internet (1997) (2)
- Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT (2021) (2)
- Metric evaluation of embedded Java-based proxies on handheld devices in cluster-based ad-hoc routing (2005) (2)
- Advanced data communications and networks (1997) (2)
- Use of Participatory Apps in Contact Tracing – Options and Implications for Public Health, Privacy and Trust (2020) (2)
- Applied PC interfacing, graphics and interrupts (1996) (2)
- Detection of Algorithmically Generated Malicious Domain Using Frequency Analysis (2018) (2)
- Investigation, analysis and determination of inclusions in high‐tolerance board design (2000) (2)
- Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device (2022) (2)
- Ad-hoc Routing Metrics and Applied Weighting for QoS support (2008) (2)
- SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain (2020) (2)
- Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure (2021) (2)
- A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports (2021) (2)
- Sticky policy enabled authenticated OOXML for health care. (2015) (2)
- Privacy Parameter Variation Using RAPPOR on a Malware Dataset (2018) (2)
- Review of Security Policy Implementations (2011) (2)
- Platform for eHealth Services Cloud (2011) (2)
- Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning (2019) (2)
- Handbook of data communications and networks : by Bill Buchanan (1999) (2)
- Conducting performance evaluation of an e-Health platform. (2013) (2)
- A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder (2022) (2)
- 5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum (2020) (2)
- Trust by Design: Evaluating Issues and Perceptions within Clinical Passporting (2020) (2)
- A novel parallel processing synchronization method for observing electric fields in and around PCBs. (1997) (2)
- Modelling of Integrated Trust, Governance and Access (2013) (2)
- Towards a framework for the generation of enhanced attack/background network traffic for evaluation (2010) (2)
- Review Of Formal Security Policy implementations In Network Firewalls (2011) (2)
- Advanced security and network forensics: network forensics. (2010) (2)
- Critical analysis and error determination of locating-finding techniques in GSM (2005) (2)
- Scenario Analysis using Out-of-line Firewall Evaluation Framework. (2007) (2)
- Who would you trust to identify you in accessing your health record (2013) (2)
- Introduction to network forensics (2009) (1)
- Browsers' Private Mode: Is It What We Were Promised? (2021) (1)
- Cloud-based digital forensics evaluation test (D-FET) platform. (2011) (1)
- Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT (2019) (1)
- Information sharing around child protection. (2012) (1)
- RS-422, RS-423 and RS-485 (2004) (1)
- Java Socket Programming (1998) (1)
- Special issue: Performance evaluation and optimization of ubiquitous computing and networked systems (2010) (1)
- Databases and data storage (2002) (1)
- DNS in Botnets and Advanced Persistent Threats (2016) (1)
- Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device (2019) (1)
- Wireless Networks (IEEE 802.11b) (2004) (1)
- File I/O (1998) (1)
- Recent Progress in the Quantum-to-the-Home Networks (2018) (1)
- Java (Extended functions) (1997) (1)
- Simulation of Near-Field Radiation for a Microstrip Antenna using the 3D-FDTD Method (1993) (1)
- Covert channel analysis and detection using reverse proxy servers. (2004) (1)
- Enhanced methods of coursework provision in computer networks (2004) (1)
- Transmission Control Protocol (TCP) and Internet Protocol (IP) (1997) (1)
- Local Area Networks (Ethernet) (1997) (1)
- Protecting documents with sticky policies and identity-based encryption (2016) (1)
- CITY OF PRINEVILLE RAILWAY (1998) (1)
- The Spaceflight and Life Sciences Training Program – Developing Human Capital for Space Exploration through Systematic Scholarship (2004) (1)
- Security and forensic computing: encryption. (2011) (1)
- JSONIO: Stata module for I/O operations on JSON data (2017) (1)
- A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data (2021) (1)
- Review of e-Health Frameworks. (2015) (1)
- C for Electronic Engineering: With Applied Software Engineering (1995) (1)
- Advanced PC architecture (2000) (1)
- Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network (2018) (1)
- Applied Data Communications and Networks (1996) (1)
- Mobile User Authentication System for E-commerce Applications. (2014) (1)
- Data Encryption Principles (1999) (1)
- Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge (2019) (1)
- Mastering Pascal and Delphi Programming (1998) (1)
- Review of "Coding for Success" implementation. (2010) (1)
- Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction (2020) (1)
- Advanced cloud computing and virtualization (2012) (1)
- 32 – File Management (1997) (1)
- Intranets and HTTP (1997) (1)
- Simulation Of Electromagnetic Pulse Propagation InThree-dimensional Finite-difference Time-domain(FDTD) Method Using Parallel Processing Techniques (1970) (1)
- CBR) The handbook of data communications and networks (2005) (1)
- Computers as Applied to Time-Domain Methods in Electrical Engineering (1992) (1)
- A shining season (1979) (1)
- Mastering Delphi Programming (2003) (1)
- Trust-based Ecosystem to Combat Fake News (2020) (1)
- Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems (2021) (1)
- 3D FDTD Method in a Microstrip Antennas Near-Field Simulation (1994) (1)
- Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification (2022) (1)
- Machine Independent Algorithm For Concurrent Finite-Element Problems (1996) (1)
- Introduction to Delphi (1998) (1)
- Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems (2021) (1)
- A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services (2012) (1)
- TCloud : Availability at Zero Downtime (2016) (1)
- Student perception of on-line lectures with a blended learning environment. (2010) (1)
- A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions (2021) (1)
- Secret shares to protect health records in Cloud-based infrastructures (2015) (1)
- Towards Continuous User Authentication Using Personalised Touch-Based Behaviour (2020) (1)
- Excluding inclusions [PCB inspection] (1999) (1)
- Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers (2021) (1)
- A novel methodology for the monitoring of risks within health care data. (2013) (1)
- D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures. (2011) (1)
- The Risks and Opportunities of Mobile Working within Cloud Environments. (2014) (0)
- Advanced security and network forensics: Introduction. (2010) (0)
- Enhancements for the 3D FDTD Method (1993) (0)
- Java Buttons and Menus (1998) (0)
- 35 – Introduction to UNIX (1997) (0)
- Microwaves in the laboratory (1988) (0)
- Stata Extensibility with the Java API: Tools, Examples, and Advice (2017) (0)
- TCP, IP Ver6 and TCP/IP Command (1999) (0)
- Building the Future: Tokenization, Blockchain and Citizen-focused Systems (2019) (0)
- Local Bus and PC Motherboard (1999) (0)
- Fast Ethernet and Switches (1999) (0)
- Error Coding Principles (1999) (0)
- IDE and Mass Storage (1999) (0)
- Image Compression (GIF/TIFF/PCX) (1999) (0)
- LIBD3: Stata module providing D3js Mata library (2016) (0)
- IRSCHARITIES: Stata module to import and format IRS Exempt Organization Business Master File Data (2014) (0)
- LIBHTML: Stata module providing an object oriented implementation of HTML in Mata (2016) (0)
- Interactive Data Visualization for the Web: Using jsonio, libd3, and libhtml to Create Reusable D3js (2016) (0)
- Java (Events and Windows) (1999) (0)
- Mobile agents using the Tracy environment (2002) (0)
- JSONIO: Stata module for IO operations involving JSON (2015) (0)
- Interrupt-driven Parallel Port (1999) (0)
- PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism (2020) (0)
- Error Coding (Correction) (1999) (0)
- Visual Basic RS-232 (1999) (0)
- Using Stata for Educational Accountability and Compliance Reporting (2014) (0)
- Internet Routing Protocols (1999) (0)
- Error Coding (Detection) (1999) (0)
- RAILROAD POLICE: PATROLLING THE BEAT. (1998) (0)
- ABERDEEN & ROCKFISH RAILROAD (1998) (0)
- Measuring the Benefits of an Electronic Medical Record System in Orthopedics (1998) (0)
- BRANSON SCENIC RAILWAY (1999) (0)
- Leading a department of a Baptist university through curriculum evaluation and development (2002) (0)
- SALT LAKE CITY SOUTHERN: RAILROAD FOCUS (1999) (0)
- A DAY IN THE LIFE OF A YOLO SHORTLINE CREW (1998) (0)
- Plugging the Gaps. (2012) (0)
- Creating engaging and stimulating Web based material (2014) (0)
- ARCADE & ATTICA: RAILROAD FOCUS (1999) (0)
- Delphi menus and dialog boxes (2003) (0)
- USB and Firewire (2004) (0)
- Application and analysis of private matching schemes based on commutative cryptosystems. (2009) (0)
- Secret share architecture to protect health records. (2015) (0)
- Image Compression (GIF) (2004) (0)
- FTP and HTTP clients (2004) (0)
- Microelectronic Systems: Design, Modelling and Testing (1997) (0)
- Enhancing intrusion detection via an active target host. (2006) (0)
- While/Repeat Loops (1998) (0)
- Towards The Creation Of The Future Fish Farm (2023) (0)
- Java (applets and events) (2002) (0)
- Advanced persistent threat and Insiders. (2015) (0)
- e-Health in the Cloud (2013) (0)
- Review of e-Frailty evaluation frameworks. (2015) (0)
- IPCONFIG Command and Host (2004) (0)
- Data Communications Models, Networks and Standards (1997) (0)
- Holistic healthcare within dynamic information infrastructures-the cloud based eHealth platform. (2012) (0)
- Agent-based systems for Ad-hoc routing. (2006) (0)
- Introduction to Security and Digital Forensics (2011) (0)
- NDS and NetWare 4/5 (1999) (0)
- Networking Operating Systems (2004) (0)
- Audio Compression (MPEG-Audio and Dolby AC-3) (2004) (0)
- The UK’s eHealth cloud project: EHR and the cloud: assessing the benefits and mitigating the risks. (2012) (0)
- 37 – Editing and Text Processing (1997) (0)
- Public-key Encryption (1999) (0)
- Design tips (part 1) (2002) (0)
- Introduction to Java (1998) (0)
- The Future of Integrated Digital Governance in the EU: EBSI and GLASS (2022) (0)
- Menus and Dialog Boxes (1997) (0)
- Network Design, Switches and vLANs (2004) (0)
- Making assessment and feedback fun: feedback before and after assessments. (2011) (0)
- 15 – 8086/88 Instructions (1997) (0)
- Cyber security challenges for cloud based services. (2015) (0)
- TCP/IP Commands (2004) (0)
- HTTP/Socket Programming (1999) (0)
- Security and forensic computing: software security. (2011) (0)
- "I am Spartacus" – privacy enhancing technologies and privacy as a public good. (2014) (0)
- Software Development for Engineers: with C, Pascal, C++, Assembly Language, Visual Basic, HTML, JavaScript and Java (1997) (0)
- 6 – Parameter Passing (1997) (0)
- Risk analysis for criminal context in information sharing policies. (2011) (0)
- Java Class Libraries and Arrays (1998) (0)
- Advanced security and network forensics: cloud computing. (2011) (0)
- 36 – UNIX Commands (1997) (0)
- SNMP, WINS and DHCP (1999) (0)
- Edinburgh leading world in beating online crime. (2015) (0)
- 4 – PCI Bus (2000) (0)
- How academic IT departments manage changing IT environments. (2011) (0)
- Firewalls, Tunnels and Routers (1999) (0)
- A next generation Cloud-based health care platform. (2011) (0)
- Forensic Science International: Digital Investigation (2020) (0)
- 17 – 8086 Interrupts (1997) (0)
- 14 – Computer Architecture (1997) (0)
- Information sharing framework: next generation e-Health cloud. (2010) (0)
- The increasing challenge for digital forensics. (2015) (0)
- 10 – Structures and Records (1997) (0)
- 23 – TCP/IP (2000) (0)
- Tadpole inclusions in laminate structures (1999) (0)
- An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing (2006) (0)
- An e-Health cloud. (2010) (0)
- 27 – RS-232 Programming using Visual Basic (2000) (0)
- UNIX Networking and Processes (1999) (0)
- 11 – Introduction to C++ (1997) (0)
- HTML (Tables, Forms and Helpers) (1999) (0)
- Security and forensic computing: authentication. (2011) (0)
- New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). (2015) (0)
- Evaluation of the DFET Cloud. (2015) (0)
- Mitigating Disaster using Secure Threshold-Cloud Architecture (2018) (0)
- Security and forensic computing: intrusion detection systems. (2010) (0)
- 5 – Motherboard Design (2000) (0)
- 3 – Selection Statements (1997) (0)
- Motion Video Compression (2004) (0)
- Evidence to the Justice Committee at the Scottish Parliament. (2011) (0)
- Windows NT/95 Networking (1997) (0)
- 25 – Further HTML (1997) (0)
- Review of Current Ransomware Detection Techniques (2021) (0)
- Simulation of electromagnetic pulse propagation in three-dimensional finitedifference time-domain (F (1993) (0)
- Cyber risk and opportunities in the Cloud. (2013) (0)
- 12 – Fibre Channel (2000) (0)
- Information Sources and Multimedia (1997) (0)
- Operating system access (2003) (0)
- 2 – Input/Output (1997) (0)
- Modelling Infection Spread Using Location Tracking (2010) (0)
- Ashley Madison breach reveals the rise of the moralist hacker. (2015) (0)
- Education & training for future threats. (2012) (0)
- Security and forensic computing: network security. (2011) (0)
- MAN: Asynchronous Transfer Mode (ATM) (1997) (0)
- Novel tracking of rogue network packets using danger theory approach. (2012) (0)
- Cloud-based e-Health System. (2011) (0)
- Launching Adversarial Label Contamination Attacks Against Malicious URL Detection (2021) (0)
- Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. (2013) (0)
- Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities. (2014) (0)
- The Handbook of Data & Networks Security (2007) (0)
- 27 – Java (Introduction) (1997) (0)
- Discrete Logarithms within Computer and Network Security. (2014) (0)
- Software development for engineers. (1997) (0)
- The challenges of Big Data: future risks, governance and trust. (2013) (0)
- Maxwell's equations in the Twentyfirst Century (1993) (0)
- The New Enlightenment in Scotland. (2014) (0)
- Hub-based Architecture (2004) (0)
- If you seek to ‘switch off’ encryption, you may as well switch off the whole internet. (2015) (0)
- 17 – Enhanced Parallel Port (2000) (0)
- Intranets and Security (1999) (0)
- 22 – IEEE-488, VME and VXI (2000) (0)
- Performance evaluation of a fragmented secret share system (2017) (0)
- Analysis of digital pulses (1996) (0)
- Asynchronous Transfer Mode (ATM) (1996) (0)
- 4 – Repetitive Statements (1997) (0)
- Interrupt-driven RS-232 (2004) (0)
- Advanced security and network forensics: obfuscation and data hiding. (2010) (0)
- Router Programming and ACLs (2004) (0)
- Emerald Article: Investigation, analysis and determination of inclusions in high-tolerance board des (2000) (0)
- 24 – TCP and UDP (2000) (0)
- Huffman/Lempel-Ziv Compression Methods (2004) (0)
- AOI FALSE REJECTS-Some sources and causes of inclusions in laminates. (1999) (0)
- Distributed File Systems (2004) (0)
- LAN: Ethernet, token ring and FDDI (1996) (0)
- Novell NetWare and NDS (2004) (0)
- Mastering Information Technology (Palgrave Masters Series (Computing)) (2006) (0)
- Next generation secure e-health platform. (2011) (0)
- RS-232/Parallel Port Hardware (2004) (0)
- Affiliate Advertising Fraud and an Investigatory Framework for Fraud (2011) (0)
- US hack shows data is the new frontier in cyber security conflict. (2015) (0)
- Cyber security in practice: identifying areas of vulnerability. (2015) (0)
- 7th international workshop on Performance Modeling, Evaluation, and Optimization of Ubiquitous Computing and Networked Systems (PMEO-UCNS'08) (2008) (0)
- Security and forensic computing: introduction to computer security. (2011) (0)
- Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform (2022) (0)
- Some Studies on CAN Specification (2003) (0)
- Apple and Starbucks could have avoided being hacked if they'd taken this simple step. (2015) (0)
- TCP/IP II (1997) (0)
- IEEE-488, VME and VXI (2004) (0)
- AOI false rejects (1999) (0)
- EML in the support of minority languages. (2002) (0)
- Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. (2013) (0)
- Introducing Cloud-based virtualised environments and their use in supporting learning and teaching. (2012) (0)
- 16 – 8086 Interfacing and Timing (1997) (0)
- Integrating assisted living with primary and secondary health care. (2012) (0)
- Building a new nation: risk, goverance and trust. (2013) (0)
- A scaleable and trusted e-Health eco-system: safi.re (2013) (0)
- Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model. (2013) (0)
- Lenovo’s security debacle reveals blurred boundary between adware and malware? (2015) (0)
- WWW and HTTP (2004) (0)
- Training the next generation. (2012) (0)
- TCP and TCP/IP Commands (1999) (0)
- NetBEUI and NetBIOS (2004) (0)
- It's all hackable. (2015) (0)
- A Framework to Detect Novel Computer Viruses via System Calls (2006) (0)
- Exploring the Need For an Updated Mixed File Research Data Set (2021) (0)
- Mastering global information systems (1997) (0)
- Lan/Wan: FDDI (1997) (0)
- Delphi Input/Output (1998) (0)
- Affliate advertising fraud and an investigatory fraud framework. (2011) (0)
- 38 – Csh (C Shell) (1997) (0)
- PHP (Sessions and Databases) (2004) (0)
- In cybersecurity, the weakest link is … you. (2014) (0)
- Using Social Media & Sentiment Analysis to Make Investment Decisions (2022) (0)
- 16 – Parallel Port (2000) (0)
- Towards a reusable and reconfigurable WWW, system-level issues and approaches in software development. (2002) (0)
- Games Port, Keyboard and Mouse (2004) (0)
- Intelligence information sharing between the police and their community partners. (2011) (0)
- HI-risk: A method to analyse health information risk intelligence (2016) (0)
- When the ATM runs Windows, how safe is your money? (2014) (0)
- Optical fibre systems (1996) (0)
- 34 – Extra Windows (1997) (0)
- Reports of Certain Remarkable Cases in the Court of Session: And Trials in the High Court of Justiciary (2010) (0)
- Introduction to the Internet (1997) (0)
- Creation of dynamic environments for virtualised and cloud-based teaching in digital forensics and c (2011) (0)
- Mass Customisation through Personalised Brochures: The Role of Emerging Technologies (2007) (0)
- 28 – Java (Extended functions) (1997) (0)
- PPP, SLIP and VPN’s (2004) (0)
- Distributed, Highly-Scalable, Sticky Policies Implementation for Healthcare (2014) (0)
- An authentication protocol based on chaos and zero knowledge proof (2020) (0)
- Java Graphics and Sound (1998) (0)
- Hierarchical network management: a scalable and dynamic mobile agent-based approach. volume 38 (2002) (0)
- Java (date, strings and multithreading) (2002) (0)
- FTP/HTTP/Telnet Set Up and Programming (2004) (0)
- Towards simulation of patient data for evaluation of E-health platform and services. (2012) (0)
- Plant Operations : Thoughts on Intelligent Control (0)
- Corrigendum to "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment" (2019) (0)
- Pulse coded modulation (PCM) (1996) (0)
- 3DES Encryption and Decryption in Microsoft .NET. (2010) (0)
- PCMCIA (PC Card) (2004) (0)
- Public perceptions in health care security. (2013) (0)
- NIS, NFS, RC, FTP and DNS (2004) (0)
- Busses, Interrupts and PC Systems (2004) (0)
- Security and forensic computing: forensic computing. (2011) (0)
- Mass customisation through personalised brochures: the role of digital printing. (2007) (0)
- 24 – HTML (Introduction) (1997) (0)
- The handbook of data & networks security (2 Volume-set) with CD-ROM (2008) (0)
- A novel privacy preserving method for the location tracking of mobile devices. (2011) (0)
- Traffic light hacking shows the Internet of Things must come with better security. (2014) (0)
- How the love of one teenager brought Tweetdeck to its knees. (2014) (0)
- Novel information sharing architecture between the Police and their community partners. (2010) (0)
- Patent: Improvements in or relating to digital forensics. (2010) (0)
- Bitcoin mining is about to become a lot less profitable. (2016) (0)
- Enhanced methods of coursework provision of computing. (2004) (0)
- Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates (2018) (0)
- Towards reusable and reconfigurable models for the WWW (2002) (0)
- A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation. (2013) (0)
- Java Sockets using Threads (2004) (0)
- 9 – File I/O (1997) (0)
- Advanced PC interfacing, communications and Windows programming. (1998) (0)
- Java Mouse and Keyboard Methods (1998) (0)
- Creating efficiency by managing innovation. (2015) (0)
- An Applied Viewpoint on Software Engineering for Electrical and Electronic Engineers (1995) (0)
- TCP/IP Commands and IPv6 (1999) (0)
- Promoting passion in an innovation and enterprise culture. (2015) (0)
- Java Text and Date (1998) (0)
- 3 – Interfacing Standards (2000) (0)
- Hamming Distributions of Popular Perceptual Hashing Techniques (2022) (0)
- Java Objects and Classes (1998) (0)
- Delphi Menus and Dialogs (1998) (0)
- Private-Key Encryption (1999) (0)
- Real-time Data and Compression (2004) (0)
- Asynchronous communications: RS-232 (1996) (0)
- Patient centric health care: an integrated and secure, cloud-based, e-Health platform. (2012) (0)
- PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform (2021) (0)
- Identifying areas of vulnerability. (2015) (0)
- Teaching penetration and malware analysis in a cloud-based environment. (2015) (0)
- An Omnidirectional Approach to Touch-based Continuous Authentication (2023) (0)
- Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. (2011) (0)
- iWorm hack shows Macs are vulnerable too. (2014) (0)
- Speech and Audio Signals (2004) (0)
- Advanced cloud and virtualisation. (2012) (0)
- 28 – Interrupt-driven RS-232 (2000) (0)
- Analytics for Improving Patient Outcome by Utilising Comprehensive IoRN Assessment Scoring Metrics (2015) (0)
- Towards a new health and social care information sharing architecture. (2012) (0)
- LAN: Token Ring (1997) (0)
- Advanced security and network forensics: web Infrastructures. (2010) (0)
- Better locks to secure our data are the inevitable result of too many prying eyes. (2014) (0)
- Processes and Scheduling (2004) (0)
- ▼ Feature The Increasing Challenge of DIGITAL FORENSICS (2015) (0)
- ULTRA-LIGHTWEIGHT CIPHER: PRESENT (2021) (0)
- A framework for live host-based Bitcoin wallet forensics and triage (2023) (0)
- Interagency data exchange, privacy protection and governance architecture for Information sharing across domains. (2013) (0)
- ADSL and Cable Modems (2004) (0)
- The Journal Dictionary And Bookkeepers' Proof Book: Based On Laws And Principles Of Commercial Science : Designed For Use In The Counting Room And Business Office, High School And College (2011) (0)
- Codebreaking has moved on since Turing’s day, with dangerous implications. (2014) (0)
- An Analysis of N5 and Higher Computing. (2015) (0)
- Mastering Microsoft Windows, Novell NetWare and Unix (1999) (0)
- Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher (2021) (0)
- Case Study: moving towards an e-health platform to store NHS patient Information in the cloud. (2012) (0)
- The World Wide Web (1997) (0)
- Innovation in cloud environments. (2012) (0)
- Review of the NIST Light-weight Cryptography Finalists (2023) (0)
- 21 – CAN bus (2000) (0)
- WAN: X.25 packet switching (1996) (0)
- Future risks – Including the rise of the hacktivism. (2012) (0)
- Skills for cyber security. (2012) (0)
- LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments (2021) (0)
- Correlation electromagnetic attack on PRESENT lightweight block cipher (2023) (0)
- Cryptocurrency and Blockchains (2020) (0)
- The future of computer science education and observations from on-line learning. (2014) (0)
- When amateurs do the job of a professional, the result is smart grids secured by dumb crypto. (2015) (0)
- ASP (forms, sessions and databases) (2004) (0)
- If Obama is talking about securing the net, it should be on everyone else’s lips too. (2015) (0)
- Design tips (part 2) (2002) (0)
- PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching (2021) (0)
- Attacking Windows Hello for Business: Is It What We Were Promised? (2023) (0)
- A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map (2022) (0)
- SNMP, Wins, Bootp, DNS and DHCP (2004) (0)
This paper list is powered by the following services:
Other Resources About Bill Buchanan
What Schools Are Affiliated With Bill Buchanan ?
Bill Buchanan is affiliated with the following schools: