William J. Buchanan
Orcid: 0000-0003-0809-3523Affiliations:
- Edinburgh Napier University, School of Computing, UK
According to our database1,
William J. Buchanan
authored at least 183 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on viaf.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks.
IEEE Internet Things J., November, 2024
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant.
Int. J. Inf. Sec., February, 2024
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems.
CoRR, 2024
DID: RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity.
CoRR, 2024
RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations.
CoRR, 2024
Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks.
IEEE Access, 2024
SkipGateNet: A Lightweight CNN-LSTM Hybrid Model With Learnable Skip Connections for Efficient Botnet Attack Detection in IoT.
IEEE Access, 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks.
Proceedings of the 2024 4th International Conference on Robotics and Control Engineering, 2024
Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Proceedings of the IEEE International Conference on Communications Workshops, 2024
DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography.
Proceedings of the 7th IEEE International Conference on Advanced Technologies, 2024
2023
Comput. Secur., May, 2023
Forensic Sci. Int. Digit. Investig., March, 2023
Forensic Sci. Int. Digit. Investig., March, 2023
Cryptogr., March, 2023
IEEE Trans. Serv. Comput., 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
Future Internet, 2023
CoRR, 2023
SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.
CoRR, 2023
CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023
TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023
PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023
PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023
Proceedings of the Big Data Technologies and Applications, 2023
TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations.
Wirel. Pers. Commun., 2022
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.
Sensors, 2022
Sensors, 2022
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture.
Sensors, 2022
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions.
J. Netw. Comput. Appl., 2022
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification.
Entropy, 2022
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.
Entropy, 2022
Digit. Investig., 2022
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.
Complex., 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022
2021
J. Cybersecur. Priv., April, 2021
PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform.
Softw. Impacts, 2021
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks.
Sensors, 2021
Mach. Learn. Knowl. Extr., 2021
J. Parallel Distributed Comput., 2021
BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for COVID-19 Pandemic and Beyond.
IEEE Internet Things J., 2021
Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.
CoRR, 2021
Differential area analysis for ransomware attack detection within mixed file datasets.
Comput. Secur., 2021
LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments.
IEEE Access, 2021
Proceedings of the UCC '21: 2021 IEEE/ACM 14th International Conference on Utility and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021, 2021
Proceedings of the Trust, Privacy and Security in Digital Business, 2021
Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems.
Proceedings of the 5th Cyber Security in Networking Conference, 2021
A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data.
Proceedings of the 2021 IEEE International Conference on Omni-Layer Intelligent Systems, 2021
2020
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption.
IEEE Trans. Veh. Technol., 2020
A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos.
Remote. Sens., 2020
J. Intell. Fuzzy Syst., 2020
Digit. Investig., 2020
Digit. Investig., 2020
Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing.
CoRR, 2020
CoRR, 2020
CoRR, 2020
CoRR, 2020
Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction.
CoRR, 2020
Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL).
IEEE Access, 2020
IEEE Access, 2020
A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect.
IEEE Access, 2020
CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure.
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the Trust, Privacy and Security in Digital Business, 2020
5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum.
Proceedings of the Intelligent Computing, 2020
Proceedings of the ICVISP 2020: 4th International Conference on Vision, 2020
SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain.
Proceedings of the 2020 IEEE International Conference on Software Architecture Companion, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020
Proceedings of the IEEE Intl Conf on Dependable, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 16th International Conference on Network and Service Management, 2020
2019
Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT.
IEEE Trans. Comput. Soc. Syst., 2019
Corrigendum to "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment".
Secur. Commun. Networks, 2019
J. Inf. Secur. Appl., 2019
CoRR, 2019
CoRR, 2019
Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge.
CoRR, 2019
Protocol for Asynchronous, Reliable, Secure and Efficient Consensus (PARSEC) Version 2.0.
CoRR, 2019
MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features.
IEEE Access, 2019
A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks.
IEEE Access, 2019
Next Generation Lightweight Cryptography for Smart IoT Devices: : Implementation, Challenges and Applications.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019
Building the Future: Tokenization, Blockchain and Citizen-focused Systems.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2019
2018
Secur. Commun. Networks, 2018
Inf. Comput. Secur., 2018
Comput. Secur., 2018
Comput. J., 2018
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment.
Secur. Commun. Networks, 2017
Digit. Investig., 2017
Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack.
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017
2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 17th International Conference on E-health Networking, 2015
2014
"I am Spartacus": privacy enhancing technologies, collaborative obfuscation and privacy as a public good.
Artif. Intell. Law, 2014
2013
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services.
Mob. Networks Appl., 2013
Digit. Investig., 2013
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013
2012
E-Health: Chances and Challenges of Distributed, Service oriented Architectures.
J. Cyber Secur. Mobil., 2012
Proceedings of the 2012 Wireless Telecommunications Symposium, 2012
Proceedings of the Legal Knowledge and Information Systems, 2012
2011
Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform.
Int. J. Inf. Technol. Syst. Approach, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
Int. J. Parallel Emergent Distributed Syst., 2010
Special issue: Performance evaluation and optimization of ubiquitous computing and networked systems.
J. Syst. Softw., 2010
Proceedings of the Legal Knowledge and Information Systems, 2010
2009
2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
2007
Mass Customisation through Personalised Brochures: The Role of Emerging Technologies.
Proceedings of the Fifteenth European Conference on Information Systems, 2007
2006
Inf. Secur. Tech. Rep., 2006
Comput. Secur., 2006
Br. J. Educ. Technol., 2006
Ad Hoc Networks, 2006
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006
An auto-Configurable, and, Adaptable, Metric-driven Cluster-head Organisation for Hybrid Multi-hop Routing.
Proceedings of the 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 2006
2005
Int. J. Mob. Commun., 2005
Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
Agent-based Forensic Investigations with an Integrated Framework.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing.
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005
2004
Proceedings of the 11th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2004), 2004
2003
MARIAN: A Framework Using Mobile Agents for Routing in Ad-Hoc Networks.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
Mobile Agents for Routing, Topology Discovery, and Automatic Network Reconfiguration in Ad-Hoc Networks.
Proceedings of the 10th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2003), 2003
2002
Proceedings of the 9th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2002), 2002
2001
Proceedings of the 8th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2001), 2001
Advanced PC architecture.
Addison-Wesley-Longman, ISBN: 978-0-201-39858-8, 2001
2000
Proceedings of the 7th IEEE International Symposium on Engineering of Computer-Based Systems (ECBS 2000), 2000
Proceedings of the 7th IEEE International Symposium on Engineering of Computer-Based Systems (ECBS 2000), 2000
Proceedings of the 7th IEEE International Symposium on Engineering of Computer-Based Systems (ECBS 2000), 2000
Computer busses - design and application.
Arnold, ISBN: 978-0-340-74076-7, 2000
1996
Analysis of electromagnetic wave propagation using 3D finite-difference time-domain methods with parallel processing.
PhD thesis, 1996