William (Bill) Buchanan OBE | |
---|---|
Born | 6 March 1961 |
Nationality | British |
Other names | Bill Buchanan |
Education | PhD, Edinburgh Napier University, 1996 |
Occupation | Professor |
Employer | Edinburgh Napier University |
Known for | |
Children | 3 |
Awards | Officer of the Order of the British Empire |
Honours | OBE |
Website | asecuritysite |
External videos | |
---|---|
"PROF BILL BUCHANAN OBE - BUILDING A NEW WORLD - Inspired Edinburgh", Interview with Bill Buchanan | |
"IISP 2018: Futurist academic research into AI", Keynote talk by Bill Buchanan | |
"BBC News Interview - 21 August 2018", BBC Interview by Bill Buchanan | |
"Sky News Interview on Wannacry", Sky News Interview with Bill Buchanan | |
"ABC Interview on Wannacry", ABC Interview with Bill Buchanan, 13 May 2017 |
William Johnston Buchanan OBE FBCS CEng PFHEA (born 6 March 1961) is a Scottish computer scientist. Buchanan is a professor in the School of Computing, Engineering and the Built Environment.[1] He currently leads the Blockpass ID Lab[2] and the Centre for Cybersecurity, IoT and Cyberphysical[3] at Edinburgh Napier University.[4] In 2017, he was appointed Officer of the Order of the British Empire (OBE) in the 2017 Birthday Honours for services to cyber security.
Buchanan is an enthusiast for cryptography and innovation.[5]
Buchanan teaches Network Security and Applied Cryptography in the School of Computing, Engineering and the Built Environment at Edinburgh Napier University, and his research focus is around digital identity, cryptography and blockchain. This applies into areas of health care[6] and cybersecurity.[7] He is the creator of ASecuritySite,[8] and which hosts a wide range of cryptography applications, including within public key encryption, symmetric key encryption, digital signatures and key exchange methods. ASecuritySite.com was first released on 15 Feb 2013.[9] In December 2023, he received the "Most Innovative Teacher of the Year" award at the Times Higher Education Awards 2023.[10] In Dec 2023, he was appointed to the Bank of England CBDC (Central Bank Digital Currency) Academic Advisory Group (AAG).[11]
Buchanan was awarded an OBE in the Queen's Birthday Honours List in June 2017. He was the first person in the UK to receive an award for services to Cybersecurity.[12]
Early life and career
Buchanan was born in Falkirk, Scotland, in 1961. He attended Victoria Park Primary School[13] in Falkirk and then attended Graeme High School.[14] On leaving school - from 1977 to 1981 - he was an Apprentice Electrician at the ICI Ltd in Grangemouth.[15] He spent 1977 to 1978 at Falkirk Technical College studying Electrical and Electronic Engineering.
Between 1981 and 1986, Buchanan studied for a BEng (Hons) in Communication and Electronic Engineering in the Department of Electrical and Electronic Engineering at Edinburgh Napier University. During this time, he undertook work placements with Racal-MESL and the Royal Observatory[16] in Edinburgh. Then, in 1986, he became a lecturer and initially taught electronics, before moving onto computer engineering, data communications and networking.
From 1989 to 2003, he was a Senior Lecturer in the Department of Electrical and Electronic Engineering, and then as a Reader in the School of Computing from 2003 to 2006. Buchanan was promoted to a professor in 2006.[17] He gained his PhD in 1996 with a thesis entitled, "Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing".[18]
Cryptography
On 21 Dec 2015, Buchanan gave evidence for the Investigatory Powers Bill debate in the House of Commons: "I would say that we live in a very different world from the one that we did. We have built this cyberage within about 40 years, but the infrastructure that we have created is very fragile. We must protect citizens from hackers and so on. We must protect privacy and identity. More and more services are moving towards the provision of both privacy and identity. Individuals need to be assured that they are not being spied on by cybercriminals across the world. They also need to be able to prove their own identity and the identity of what they are connecting to."[19][20]
Research and innovation
Buchanan's current research work focuses on areas of applied cryptography, blockchain, cybersecurity, citizen focused health care and digital identity. He is included in the World's Top 2% Scientists list for 2022,[21] and ranks in the Top 40 most cited research authors in Applied Cryptography.[22]
In Unit of Assessment 11 (Computer Science and Infomatics) within REF 2021, Buchanan led two research impact case studies: "Enabling Sensitive Personal Data to be Shared with Trust using Novel Digital Security Methods",[23] and "Protecting Employees, Children and Sensitive Data using Innovative Approaches to Cyber Security".[24] Both of these impact case studies were graded as 4* (quality that is 'outstanding impacts in terms of their reach and significance' [25]).[26]
On 6 May 2015 he launched The Cyber Academy at the Merchiston Campus of Edinburgh Napier University.[27] He received the Principal's Award for contribution to Knowledge Exchange/Research in 2016 (Innovation of the Year and also Best Contribution to Information Society research theme)[28] and in 2017 (Innovation of the year in Knowledge Exchange). Buchanan's research areas has recently focused on cryptography,[29] cybersecurity and digital identity.[30][31]
Buchanan's focus on patents has mainly focused on work related to spin-out companies, and thus for IP protection: has co-authored a number of patents. These include:
- Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Improvements in or relating to digital forensics", published 2019-05-08, assigned to Fortinet Inc.[32] Related to the Zonefox spin-out.
- Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Digital forensics", issued 2014-11-11.[33] Related to the Zonefox spin-out.
- Stevenson, Ian; Bruce, Ramsay & Buchanan, William Johnston et al., "System and method for management of confidential data", published 2018-10-11, assigned to Edinburgh Napier University.[34] Related to the Cyacomb spin-out.
- Stevenson, Ian; Bruce, Ramsay & Buchanan, William Johnston et al., "Method for identification of digital content", published 2021-06-30, assigned to Cyan Forensics Ltd.[35] Related to the Cyacomb spin-out.
- Uthmani, Omair; Buchanan, William & Lawson, Alistair et al., "Information sharing", published 2015-05-26, assigned to The Court of Edinburgh Napier University.[36] Related to the Symphonic spin-out.
- Buchanan, William Johnston; Lo, Owen Chin Wai & Penrose, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2018-10-11.[37] Related to the Cyacomb spin-out.
- Buchanan, Bill; Mclaren, Peter & Gordon, Russell et al., "Detection of ransomware", issued 2022-09-22[38] Related to the MemCrypt spin-out.
An additional patent related to work with Dr David Lanc and Dr Lu Fan and related to work with Payfont. It is now assigned to Leading Software Ltd:
- Lanc, David; Fan, Lu & Mackinnon, Lachlan et al., "Resilient secret sharing cloud based architecture for data vault", published 2021-04-13, assigned to Leading Software Ltd.[39]
Blockpass ID Lab
Buchanan leads the Blockpass ID Lab (BIL) and which was initially co-funded by Blockpass IDN and Edinburgh Napier University. It is located on the Merchiston Campus and was launched on 26 September 2018.[40] Overall, it was the first research lab in the World to focus on digital identity, and hosts research work in areas on blockchain, digital identity, privacy preserving methods and applied cryptography, with key focus areas of around citizen focused data sharing. The lab has also hosted a number of related research grants, including GLASS[41] and TRUSTEE,[42] along with incubating the True Deploy future spin-out. BIL has generated a wide range of research outputs over the years, including for Threat Intelligence Sharing,[43] Vaccination Certificates and Passports,[44][45] Privacy-preserving passive DNS,[46] and Combat fake content detection.[47]
COVID-19 privacy-aware contact tracing
In April 2020, Chaloner Chute[48] at the DHI defined a research brief for a team of experts from Edinburgh Napier University (Buchanan), the University of Glasgow (Professor Muhammad Imran[49] and Professor Jill Pell[50]), the University of Edinburgh (Dr Claudia Pagliari[51]) and the University of Strathclyde (Dr Sanna Rimpiläinen[52]). This brief involved a review of the usage of contact tracing applications. Buchanan focused on answering the question, "How might the distributed system be architected to be secure and respectful of privacy from the outset?". Overall, each of the experts then reviewed key areas around the usage of contract tracing, and submitted a compiled report answering the key questions, and published as, "Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust."[53] This advised that the UK-proposed method of track and trace had weaknesses, and that Scotland should take an alternative approach.
Buchanan also applied his applied cryptography knowledge to areas of COVID-19 track and trace methods. This included collaborated work with the University of Glasgow on a blockchain-based methods named BeepTrace.[54] Buchanan also worked with teams on privacy-aware COVID-19 passports using the Ethereum platform,[45] reviewed the state-of-the-art in privacy-aware applications for track and trace,[55] implemented privacy aware identity matching.[56]
Blockchain research
Within the Blockpass ID Lab, Buchanan has worked with Dr Nick Pitropakis[57] in the supervision of a PhD students working on permissioned blockchains, such as those related to Hyperledger Fabric. These types of blockchains integrated well with Buchanan's focus on privacy-aware systems and which are citizen focused. With Dr Pavlos Papadopoulos[58] the focus was on privacy-aware systems in areas of DNS and health care:, such as for, " A privacy-preserving healthcare framework using hyperledger fabric",[59] and "Privacy-preserving passive dns".[46]
In the PhD supervision of Dr Will Abramson,[60] the focus was on the self-soveign identity systems using Hyperledger and in data sharing, "PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform".[61] Buchanan advanced work with Hyperledger Fabric within the CyberHunt research project,[62] and worked with Hisham Ali and Dr Jawad Ahmad on new ways of trusted threat sharing in cybersecurity with a "Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform"[43] and "Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers".[63]
In 2017, Buchanan worked with Dr Grzegorz Spyra and Dr Elias Ekonomou on the defining of sticky policies for OOXML (Office Open XML). This used an Identity Based Encryption (IBE) primitive to securely bind an access policy and the document data together. Buchanan also worked on the digital investigations for blockchain-based transactions, including for bitcoin mixing[64] and the investigation of ERC20 tokens.[65] Within work on quantum robust blockchains, Buchanan worked with an international team on quantum robust blockchains,[66] and which uses lattice-based cryptography with polynomials for IBE and aggregate signatures for a consensus. Buchanan worked with Mwarwan Abubakaron areas of blockchain based architectures for IoT[67] and for vaccination certificates.[68]
Quantum computing related
From 2017, Buchanan has worked in the area of post quantum cryptography (PQC) and published a paper entitled, "Will quantum computers be the end of public key encryption?"[69] with Professor Alan Woodward[70] from the University of Surrey. Recent work has included an analysis of the performance of the TLS protocol using Post Quantum Cryptography[71] and in the application of quantum computing methods to Botnet Detection. New work involves applying quantum computing methods into cybersecurity applications, including using, "a hybrid machine learning methods on real quantum computers, with 100 data samples, and also with real-device-based simulations, with 5,000 data samples. It uses HQML (Hybrid Quantum Machine Learning) algorithms applied to the detection of botnet-generated domain names. This includes the features of the character length of the domain, the entropy of the domain name, and the reputation of the domain name."[72]
Digital forensics
Buchanan work on digital forensics has includes the analysis of IoT forensics on devices,[73] in the forensics artefacts left by the Tor browser[74] and for the digital forensics within the IMO call and chat app.[75]
Cryptography and encryption
Buchanan's research work in cryptography and encryption involves its integration into blockchain methods, post quantum cryptography, light-weight cryptography, end-to-end encryption and fundamentals areas around stream ciphers, chaos theory, random number generators and image-based encryption. Buchanan worked with Scott Helme on sampling the top 500 websites within Alexa Top 1 Million sites for industry sectors related to HTTP responses and in the usage of the Content-Security-Policy (CSP).[76] Other related papers focus on improvements to cryptography within telecommunication components for end-to-end data encryption,[77] enhancements to the RC4 stream cipher using a symmetric random function generator,[78] and in the creation of a secure random number generator with immuity and propagation characteristics.[79]
For privacy-aware COVID-19 tracing, Buchanan collaborated on work related to the usage of privacy-aware blockchain methods and applied cryptography.[54][45][80] His work, too, has involved the creation of new methods to detect ransomware. This has included the discovery of encryption keys in memory,[81] and in the usage of entropy detection methods.[82]
Buchanan works with Dr Jawad Ahmad[83] on a range of chaos-based work, and which supports a high degree of randomization from a small perturbance, including one of the first papers to outline the usage of chaos based methods applied to zero knowledge proofs.[84] This paper outlines the concept of using port knocking to secure services, and where cryptographic hashes are through a chaotic process. Along with this, a key area of collaboration involves the encryption of digital images using chaos-based methods, such as with the Mersenne twister random number generator method with DNA genetic encoding,[7][85] using chaos-based confusion and diffusion of image pixels using dynamic substitution,[86] a multi-chaos based compressive sensing encryption technique,[87] a multistage encryption scheme using linear feedback register and chaos-based quantum map,[88] and using a convolutional autoencoder within chaos-based encryption.[89]
In 2017, Buchanan worked with Dr Shancang Li[90] and Dr Rameez Asif[91] on a review of light-weight encryption methods for limited capability devices.[92] Then, in 2019, he was joined by Dr Nilupulee Gunathilake and Asif to define key elements on the implementation, challenges and applications of light-weight cryptography for IoT devices[93] and, in 2020, for recent advances related to IoT security.[94] Buchanan's work has also included the breaking of light-weight cryptography methods through the capture for radio emissions from a device using the PRESENT encryption method.[95]
MPhil and PhD supervision
Buchanan has supervised 37 PhD and MPhil students to successful completion.[96] These include:
- Dr Nikos Migas, "MARIAN: Mobile Agents for Routing in Ad-Hoc Networks", PhD, 2002–2005.[97]
- Dr Jamie Graves, "Forensic verification of operating system activity via novel data, acquisition and analysis techniques", PhD, 2005–2009.[98]
- Dr Zbigniew Kwecka, "Cryptographic privacy-preserving enhancement method for investigative data acquisition", PhD, 2006–2011.[99]
- Dr Nicole van Deursen, "HI-Risk: a socio-technical method to identify and monitor heathcare [sic] information security risks in the information society", PhD, 2009–2014.[100]
- Dr Solomon Uwagbole, "A pattern-driven corpus to predictive analytics in mitigating SQL injection attack", PhD, 2011–2018.[101]
- Dr Phil Penrose, "Forensic analysis of large capacity digital storage devices", PhD, 2013–2017.[102]
- Dr Elo Ukwandu, "RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture", 2014–2019.[103]
- Dr Grzegorz Spyra, "Embedded document security using sticky policies and identity based encryption", PhD, 2013–2019.[104]
- Dr Adrian Smales. "Test-bed and evaluation of a home-based adverse event prediction infrastructure", PhD, 2013–2021.[105]
- Dr Peter Mclaren, "Investigations into decrypting live secure traffic in virtual environments", PhD, 2016–2019.[106]
- Dr Will Abramson, "Identity and identification in an information society: Augmenting formal systems of identification with technological artefacts", PhD, 2018–2022.[107]
- Dr Pavlos Papadopoulos, "Privacy-preserving systems around security, trust and identity", PhD, 2019–2022.[108]
Research projects
Buchanan has undertaken many research and innovation projects over the years, including recent ones of:
- Distributed single sign-on-stack-on e-Governance Paradigm based on a distributed peer-to-peer (P2P) file exchange network for security, transparency, cost effectiveness and trust - GLASS.[109] EU Horizon, Jan 2021-Dec 2023.
- KTP Miracl,[110] Innovate UK, Apr 2023-Oct 2025.
- TruElect,[111] Innovate UK, Dec 2022-Mar 2023.
- TRUSTEE (Trust and Privacy Preserving Computing Platform for Crossborder Federation of Personal Data),[112] EU Horizon, Jul 2022-Dec 2025.
- AI-based privacy-preserving biometric authentication with mass-market smart devices,[113] The Data Lab, Oct 2021-Sept 2024.
- PhD Studentship, CyberHunt,[114] The Research Funding Council of Norway, Feb 2021-Jan 2025.
- PhD Studentship (Homomorphic Encryption),[115] 6G Health Institute GmbH, Oct 2023-Sept 2026.
- MemCrypt (HGSP),[116] Scottish Enterprise, Sep 2020-Mar 2021.
DACAR (Data Capture and Auto Identification Reference)
Buchanan was the principal investigator (PI) for the Edinburgh Napier University work within the EPSRC/TSB (Technology Strategy Board)-funded DACAR project, and which focused on citizen rights to share data within health care.[117] It ran from November 2009 until November 2011 and involved a collaboration between CipherLab, Chelsea and Westminster Hospital,[118] GS1 UK,[119] Imperial College London, and Kodit. A core contribution of the project was the creation of the SPoC[120] (Single Point of Contact) approach to information sharing, and the integration of identity, role and access rights to every part of the capture, storage and consumption of health care data. Its integration within Chelsea and Westminster Hospital was led by Professor Derek Bell.[121]
The project was the first time that Buchanan formally worked with Professor Christoph Thummler,[122] and who, at the time, had a post as a clinician at the Royal Infirmary of Edinburgh and at Edinburgh Napier University.[123] The core research team also involved Dr Owen Lo and Dr Lu Fan.[124] The integration of GS1 UK allowed the integration of emerging RFID (Radio Frequency Identification) standards[125][126] into the identification of medical artifacts, including tracking beds and medical equipment around the hospital.
After this project, Dr Owen Lo continued to work with Buchanan on a number of research projects, and was a co-inventor within the Cyan Forensics spin-out company[127] and which changed its name to Cyacomb.[128]
Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures
From March 2011 to July 2013, Buchanan continued to partner with Professor Christoph Thummler, Dr Owen Lo and Dr Lu Fan, and was the principal investigator (PI) on the ESPRC-funded, "Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures"[129] project. This extended the work from the DACAR project but focused on assisted living, and involved a collaboration with Microsoft and HoIP (Health Over IP). While DACAR had focused on the sharing of health care information around hospitial data, this project extented the core concepts to create a novel governance policy infrastructure using a circle-of-trust relationship for assisted living. This linked to formal, role-based security for primary and secondary health care. New work also included the integration of the SPoC approach with the Microsoft Health Vault.[130]
At the time, the work was known as Cloud4Health,[131] and Buchanan gave an overview of the approach in a submission for a Scotland IS award in May 2012.[132] Overall, the work in this project and DACAR laid the technical foundation for the Symphonic spin-out company from Edinburgh Napier University in 2013. It also the main focus for the 4* rated - quality that is world-leading in terms of originality, significance and rigour - impact case study for UoA 11 in REF 2021 entitled, "Enabling Sensitive Personal Data to be Shared with Trust using Novel Digital Security Methods".[23]
GLASS research project
Buchanan is the principal investigator (PI) for the Edinburgh Napier University work[133] within the EU Horizon funded GLASS project,[134] and which is a new paradigm for sharing or transfer of personal information with the citizen in control. It started in January 2021 and completed in December 2023 (Grant agreement No 959879).[135] The research project includes collaborators from TAGES (Teknoloji Arastirma ve Gelistirme Endustriyel Urunler Bilisim Teknolojileri San. ve Tic. A.S.), Fraunhofer FOKUS, UBITECH Limited, University of Patras, Suite 5, Hellenic Ministry of Digital Governance, and Istanbul Metropolitan Municipality. This has built a citizen focused digital wallet and new models data sharing[136] using Hyperledger Fabric and IPFS (InterPlanetary File System). In 2022, the GLASS project received "Leading Light Innovation" award at the Scottish Cybersecurity Awards.[137]
vSoC (Virtual SOC)
Buchanan has innovated the vSoC teaching and training environment within Edinburgh Napier University, and which is used by students within the cybersecurity and networking-related subjects. The work started within a grant funded by DG Home[138] related to the "Prevention Of and Fight against Crime" theme and was entitled, "DFET (Digital Forensics Evaluation and Training)".[139][140] It was led by Buchanan, and included collaborators of Stefan Institute (JSI), Stockholm University, Police Scotland, and Aconite Internet Solutions. This provided the basic cloud infrastructure for the environment and used a VMWare vSphere virtualised environment that was hosted within the Merchiston Campus at Edinburgh Napier University.
From December 2015 to February 2017, the Advanced HE advanced the work by funding a project entitled, "vSOC - Virtualised Security Operations Centre",[141] and which scaled vSoC into cybersecurity areas. The work continued with the funding of a KTP (Knowledge Transfer Partnership) from Innovate UK and Satisnet Limited and which integrated SIEM tools into the environment.[142] From June 2019 to May 2020, The Data Lab[143] funded integrated of data science and cybersecurity.[144]
Side channel analysis - noise and RF emission
Buchanan's work with Dr Owen Lo[145] and Dr Nilupulee Gunathilake[146] has included an analysis of side channel attacks on the cryptography running on embedded devices using electrical noise generation and radio emissions. From Jan 2017 to Jan 2017, Buchanan and Owen Lo worked with Keysight on research related to "Bare Metal Forensics - Pattern Analysis Heuristics - Data Analysis", and co-funded by The Data Lab.[147] This resulted in a paper entitled, "Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)"[148] and which cracked 128-bit AES encryption on an Arduino Uno from the electrical noise generated from the device. Douglas Carson from Keysight and Lo presented the work live on 21 September 2016 at an event in Edinburgh.[149][150]
From Nov 2016 to Oct 2017, work continued with the support of CENSIS, and which analysed IoT Bluetooth threats related to health care devices in a research project entitled "IoT Hardware Security Test Framework".[151] For this, in Sept 2018, Buchanan defined, “The biggest thing holding back the development of the IoT is security – specifically, concerns about the vulnerabilities of devices, the ease of hacking them, and the consequences of such hacks. In health care, for example, IoT could transform the way we monitor health and manage conditions like asthma. Only if we can improve confidence in IoT security can we realise the potential of smart technology."[152]
Lo, Buchanan and Carson also managed to break the PRESENT block cipher on an embedded device using CPA (Correlation Power Analysis) and electrical noise generation.[153] Gunathilake has since advanced the work in the analysis of radio emission from devices, including the cracking of the PRESENT light-weight encryption method.[154]
Ransomware research projects
Dr Gordon Russell, Dr Thomas Tan and Buchanan were part of Peter McLaren's PhD supervision, and which resulted in a thesis entitled, "Investigations into decrypting live secure traffic in virtual environments".[155] Buchanan then was the principal investigator (PI) for the "MemCrypt" research project and which was funded from Sept 2020 to March 2021 by Scottish Enterprise within its High Growth Spin-out Programme.[156] Dr Owen Lo and McLaren then developed the work on the detection of encryption keys in memory, and scaled it to work with the detection of a range of ransomware families. From April 2020 to July 2020, Buchanan led an Innovate UK CyberASAP[157] grant,[158] and which continued to a second phase from Sept 2020 to Feb 2021.[159] This resulted in a spin-out company in January 2021 with Peter Jaco as CEO, and Peter Mclaren at CTO.[160]
Significant research outputs from research work includes the mining malware command and control traces,[161] the finding ChaCha20 key streams from targeted memory analysis,[162] a patent in the detection of ransomware",[38] the evaluation of live forensic techniques in ransomware attack mitigation.[163] Recent work includes the usage of entropy techniques to detect the presence of ransomware keys and files, including with a differential area analysis fmethod,[164] and in the evaluation of a range of entropy detection methods to discover encrypted content.[82]
Knowledge Transfer Partnership (KTP) with Cànan Ltd
Over 2003/2004, Buchanan worked with Cànan Ltd - who are based at Sabhal Mor Ostaig in Sleat on the Isle of Skye - on a Knowledge Transfer Partnership (KTP) project to advance Gaelic language learning. This support aimed to scale-up of Cànan's print-based content into a multimedia delivery. The KTP Associate was Evan Brown, and his academic supervisor was Buchanan.
The KTP gained a Grade 1 Certificate of Excellence from Innovate UK, and won the KTP Award Winning Partnership of the year in 2004.[165] At the time, Donella Beaton, Ceannard/Chief Executive, Cànan Ltd, outlined, “The KTP programme brought knowledge, partnerships, confidence, publicity, quality staff and a can-do attitude. The grant allowed these aspects to develop, but the results were much greater than a pure financial investment. I would thoroughly endorse the Knowledge Transfer Programme to any organisation who knows what they would like to achieve, but doesn't know how to go about it."[166]
The KTP resulted in BubbleSpeak, an innovative templatebased content system that is simple to use, portable and platform independent. Cànan gained a culture of innovation and access to new technologies, which raised its profile, generated a new lucrative market and embedded a practice of research and development. Buchanan, defined that, "Big companies can afford to have research and development departments but small and medium operations do not have the resources. The companies need the Associates because they do not have the skills inhouse or the access to equipment which we can provide." The success of the KTP allowed Buchanan to develop his own research group named "Distributed Systems and Mobile Agents" (DSMA) within the School of Computing at Edinburgh Napier University.[167]
Health care-related research
Along with cybersecurity and cryptography, Buchanan has a driving passion for improving health care through research methods, and with a special focus on citizen-focused care. This can be traced back to work from March 2011 to July 2013, and where he led work at Edinburgh Napier University in a partnership with Edinburgh Napier University, Microsoft and HoIP. This project was funded by EPSRC and entitled, "Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures".[168] It involved the creation of a novel governance policy infrastructure using a circle-of-trust relationship for assisted living, and with links to formal, role-based security for primary and secondary health care.
Buchanan then teamed up with his PhD student (Adrian Smales), and kick-started the "e-FRAIL - Early detection of FRAilty and Illness" research project and which ran from October 2015 to December 2016 and funded by the Digital Health Institute (DHI).[169] The partnership continued to advance from August 2017 to Feb 2018 with "e-Frail - Phase 2" which added key risk assessments using a Delphi method for understanding of frailty.[170] This led to a collaboration with CM2000[171] on the development of the Advanced Risk Modelling for Early Detection (ARMED) product and which won the 'Innovation of the Year' award at Scottish Knowledge Exchange Awards in 2020.[172]
Alongside the work on frailty, Buchanan led a number of research which integrated digital trust and blockchain into next generation health care systems. This involved leading a research project for the tracking of medical devices within a health care environment though public blockchain methods. The work involved a collaboration with Spiritus within the "Health Blockchain"[173] project and was funded by The Data Lab (August 2017-March 2019).[174] Work continued with the development of a trusted health care infrastructure with "Next Generation Trust Architecture" from March 2018 to February 2020,[175] and "Next Generation Connectivity with Health and Well-being" from October 2018 to July 2021.[176] Both were frunded and funded by the DHI. New research work involves the investigation of 6G and homomorphic encryption methods with privacy-aware health care records.[177]
With his work, he has analysed the scalability of e-Health, in "E-health: Chances and challenges of distributed, service oriented architectures",[178] and within the implementation of a risk model within health care environments.[179] A particular focus has been on the use of blockchain applications,[180] and within vaccination certificates.[181]
After completing his PhD in 2021, Adrian Smales left the research team to join Smplicare as the Chief Innovation Officer.[182]
Policing-related research and engagement
Over the last few years, Buchanan has worked on law enforcement and policing related work, and with a particular focus on information sharing, digital forensics and network security. From Sep 2008 to Oct 2011, Buchanan supervised a SIPR-funded[183] PhD project entitled, "Information Sharing between the Police and their Community Partners".[184] This work investigated improved methods of information sharing between law enforcement agencies, and outlined the principal of the SPoC (Single Point of Contact) for information sharing between the police and their community partners. This work aimed to overcome the barriers that led to a lack of information sharing around Investigations related to the Victoria Climbié murder in 2000.[185] The work was sustained as the Symphonic spin-out and resulting in a related patent entitled, "Information Sharing".[186]
Buchanan has also run training courses for Policy Scotland over a few years, and which focused on EnCase digital forensics and network security. Over 2022–2023, he chaired the Evidence and Scientific Standards working group as part of the "Independent advisory group on new and emerging technologies in policing.",[187] and one of the conclusions was that, "Police practices should be based on scientific evidence about what works best and hence it is important that for any evidence-based pilot developing, industry must engage academia. Academia are keen to support the development, testing and promotion of innovative practice to help build the evidence-based solution and understand what would work best."[188]
Academic spin-outs
Buchanan has led research which has led to three successful spin-out companies: Zonefox,[189] Symphonic[190] and Cyan Forensics.[191] In October 2018, Zonefox was acquired by Fortinet,[192] and in November 2020, Symphonic were acquired by Ping Identity.[193] To highlight this success, in Sept 2023, Edinburgh Napier University was rated in the Top 10 in the UK for spin-outs related to work conducted by Octopus Ventures.[194]
Zonefox
The work of Dr Jamie Graves[195] and Buchanan on a PhD project ("Forensic verification of operating system activity via novel data, acquisition and analysis techniques"[196][197]) led to the incorporation of Inquisitive Systems Limited in 2008.[198] This led to the submission of patents entitled "Improvements in or relating to digital forensics" and "Digital Forensics" in Oct 2008,[199] and Sept 2009,[200] respectively. The "Improvements in or relating to digital forensics" was published for world-wide status in March 2010,[201] and granted in the EU[202] in May 2019. The "Digital Forensics" patent was granted on Nov 2014 for the US.[33]
The patents captured the core research:[203] defining activity footprints as a 'digital DNA' sequence, which can be used with a new matching algorithm (BLAST DNA) to determine the probability of a sequence match to a malicious event, significantly outperforming existing signature-based methods. This proved particularly useful in detecting insider threats such as copying source-code to a USB device. The original patent owner was Edinburgh Napier University, and where the existing EU patent is owned by Fortinet Inc.[202]
After funding from Scottish Enterprise in the Proof of Concept programme[204] from September 2008 to August 2010, the research work was spun-out from Edinburgh Napier University in September 2010, and where Graves was the CEO, and who continued in this post until Zonefox was acquired by Fortinet Inc. The company, in 2013, changed its trading name to Zonefox. On 23 October 2018, Fortinet Inc announced that it had fully acquired Zonefox[205] and that Zonefox's product range would be integrated into the Fortinet Security Fabric offering. Edinburgh Napier University was one of the significant shareholders in the acquisition, along with the co-inventors.
Graves returned to Edinburgh Napier University in Feb 2021 to take up a post "Entrepreneur in Residence" with a Royal Society-funded grant.[206]
Symphonic
For over a decade, Buchanan has run research work related to sharing and integrating the rights of the citizen. It addresses gaps around data governance related to ownership rights, governance, and privacy through the creation of a framework that set out new processes relating to citizen-defined access policies.[207]
The research began in 2008 with a collaboration with Police Scotland, looking at weaknesses around information sharing within law enforcement,[208] and in developed new ways to integrate large-scale integration of rights across interconnected domains. It resulted in the submission of a patent for the US in January 2013,[209] for the World in Jun 2014.[210] The US patent was granted in July 2014.[210]
Other related research led by Buchanan was funded within two EPSRC/Innovate UK funded projects: "Data Capture and Auto Identification Reference" [211](DACAR)[212] and "Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures".[213] This work was then further developed by introducing the concept of data-buckets owned by the citizen, and in the concept of using a SPoC (Single Point of Contact) for sharing information between interconnected domains.[214]
From March 2012 to October 2013, the work was in a project entitled, "sa.FIRE" (Secure Analysis and FIltering Risk Engine)[215] and funded from Scottish Enterprise on their HGSP programme, and where Derick James,[216] Richard Lewis (as a Commercial Champion) and Niall Burns[217] came on board. The company spun out of Edinburgh Napier University in 2014, and received initial investment from Par Equity.[218] Derick James became the CEO and Niall Burns was the CTO. The company eventually dropped the "Trust" part of its name and just traded as Symphonic.
Cyacomb
From 2014 to 2017, Buchanan and Rich Macfarlane[219] supervised Dr Phil Penrose for a PhD. The work was submitted in 2017, and called "Forensic analysis of large capacity digital storage devices".[220] This led to a UK patent application entitled, "Method for identification of digital content" in April 2017.[221] The UK patent was granted in the UK in June 2021, and published as a World patent in October 2018,[37] an EU patent in February 2020,[222] a Canadian patent in October 2018,[223] and a US patent in September 2021.[224]
From March 2015 to January 2016, the work was funded by Scottish Enterprise as part of a Proof of Concept grant.[225] In Jne 2016, Cyan Forensics was first incorporated,[226] and became a spin-out from Edinburgh Napier University. The CEO was Ian Stevenson and the CTO was Bruce Ramsay.[227] The co-inventors of the core technology for the spin-out were Buchanan, Dr Phil Penrose, Rich Macfarlane, Bruce Ramsay and Dr Owen Lo.
In March 2022, Cyan Forensics changed their trading name to Cyacomb.[228] In 2022, Cyacomb were awarded with a Technology Pioneer by World Economic Forum,[229] and an innovation award winner at the GovTech Summit in 2019.[230] The company also received a Cybersecurity award in the same year for "Best Cyber Breakthrough" in 2019 at the Scottish Cyber Awards.[231]
Par Equity led a £5 million Series A funding round in March 2021.[232] In October 2023, Cyacomb received Digital received investment of £3.8million from the Scottish National Investment Bank (SNIB), Par Equity, Mercia Ventures, Scottish Enterprise and private investors, with Jane Reoch, executive director at SNIB outining that, "Cyacomb is at the forefront of tech development in Scotland. They perfectly align with our mission to harness innovation."[233]
MemCrypt
Buchanan supported the creation of the MemCrypt spin-out, and which focuses on the discovery of cryptographic keys in memory (based on the PhD work of Dr Peter McLaren[234]). The team then progressed this work by including triage methods into the discovery of encryption keys within memory.[235][236] Key contributions include being the first to detect the presence of ChaCha20 encryption keys in running memory (one of the most popular encryption methods used in secure communications), and identifying a major vulnerability within tools such as OpenSSL.[237]
The work has since been applied to ransomware detection and recovery.[238] From September 2020 until March 2021, the work received funding from Scottish Enterprise as part of their HGSP grant awards,[116] and, from September 2020 until Feb 2021 from the Innovate UK Cyber ASAP programme.[239] MemCrypt Limited spun out of Edinburgh Napier University in Oct 2020[240] and incorporated in Jun 2021.[241] In November 2021, the research work related to MemCrypt received a Leading Light Innovation award at the Scottish Cybersecurity awards.[242]
Learning and teaching
In 2018, Buchanan became a principal fellow of the Higher Education Academy (PFHEA).[243] He is the creator and sole author of the Asecuritysite.com web site, and which focuses on covering cryptography and various areas of networking and cybersecurity, from both a theoretical and practical approach. Buchanan was also the software creator of the Bright Red Publishing Digital Zone, and which contains Web-based content for many of the subjects included in the Scottish Qualifications Authority (SQA) N5, Higher and Advanced Higher syllabus' in Scotland.[244][243]
He has also created a number of novel learning environments, including vSoC (Virtualised Security Operation Center)[245] and which is a cloud-based infrastructure for cybersecurity learning. Along with this, Buchanan has developed an online Cipher Capture The Flag set of challenges,[246] and Web-based Cisco device simulators (previously known as Networksims ProfSIMs).[247]
Viewpoints on education and knowledge exchange
Buchanan writes on areas of cryptography, cybersecurity and computer science within the blog entiled "ASecuritySite: When Bob Met Alice" [248] and has a YouTube channel containing a range of lectures, tutorials and demonstrations,[249] along with related Apple,[250] Spotify[251] and Audible[252] podcasts.
Teaching awards
Buchanan has received a number of teaching-related awards, including, in 2014, winning the ENSA[253] Student-voted Excellence Awards award for "Most Innovative Tutor."[254] He also won the Best Lecturer/Tutor for Computing in the ENSA Student-voted Excellence Awards in the School of Computing for 2011, 2014, 2015,[255] 2019,[256] 2020[257] and 2023.[258] He and Rich Macfarlane supervised Charley Celicé and who won the Student of the Year award at Edinburgh Napier University in 2015.[259]
In 2016, Buchanan was awarded with the "Cyber Evangelist of the Year" at the first Scottish Cybersecurity awards.[260] At these awards, his previous PhD student - Dr Jamie Graves - received a "Champion of Champions" award for his work in advancing Zonefox.[261]
In December 2023, Buchanan received the "Most Innovative Teacher of the Year" award at the Times Higher Education Awards 2023.[10]
Postgraduate and undergraduate programmes
Buchanan set up the MSc in Advanced Security and Digital Forensics in the School of Computing at Edinburgh Napier University in 2010.[262] It was the first MSc course in the UK to receive full NCSC certification. A core part of the support for distance students has been built around the vSoC teaching infrastructure. Buchanan also created the BEng (Hons) in Cybersecurity and Forensics in the School of Computing, and which was awarded full NCSC accreditation in 2018.[263]
In August 2023, the School of Computing was awarded a Gold award status for its ACE-CSE (Academic Centre of Excellence - Cyber Security Education). Buchanan and Rich Macfarlane are co-directors of the ACE-CSE, where Buchanan is responsible for areas of innovation, research and enterprise.[264]
Bright Red Publishing Digital Zone
Bright Red Publishing[265] is an Edinburgh-based book publisher that focus on textbooks for schools related to N5, Higher and Advanced Higher topics. The first phase of the first between a collaboration between Bright Red Publishing and Buchanan ran from July 2012 to Dec 2012, and was funded by Interface Online.[266][267] This created the Digital Zone[268] and which was an innovative method of converting electronic version of the books into an online format, while provided a novel range of Mathematics and Physics abstactions, such as for formula translation and solution checkers. It was coded in C# and uses a Microsoft ASP.NET infrastructure. The second phase of the collaboration focused on "Innovation and Integrated Learning Environment for Engaging and Ever-changing Educational Content".[269] It involved using Buchanan developing a dynamic challenges in the generation for test questions. This allowed for template questions, and which could be used to generate ever-changing questions. Buchanan and Bright Red Publishing have continued to collaborate, and with 26 N5 books,[270] 20 Higher books,[271] and eight Advanced Higher Books.
Cyber&Data programme
In 2019 Buchanan set up the Data Lab to bring together academic content and practical challenges linking data science with cybersecurity, co-funded the development of on-line training material, and named it "Cyber&Data".[272][273]
Cipher challenges
Since Feb 2013,[274] Buchanan has worked on a range of on-line cipher challenges, and which are free to access and use.[275] The currently supported ciphers within the online challenge include:
- Graphics-based ciphers: Pigpen, semaphore, Templar, Mary's, Dscript, Voynich, three-square cipher, Monk, and Morse.
- Substitution code ciphers: ASCII codes, gold bug, Bacon, Dvorak, Atbash, Rot13, ROT47, tap, Baudot, scrambled, homomorphic, Caeser, gray code, Pollux, Fractional, Greek alphabet, Runic, encode, and Navajo.
- Grid ciphers: ADFGVX, Polybius, Bifid, Straddling, column, SYLLABARY, Porta, columnar transposition, Beaufot, S-box mapping, Delastelle, and Nilist.
- Key-based ciphers: keyword, OTP, Condi, AMSCO, Vigenère, and Beale.
- Maths/arithmetic-based cipher: exponential cipher, Diffie-Hellman, multiplication, LZ coding, Huffman, jump, Affine, XOR, GCD (Great Common Divisor), binary multiplication (modulo 2), binary divide (modulo 2), and RSA.
- Puzzle-based cipher: Sudoku, 3-rail, and NULL.
Along with this, Buchanan developed a range of cipher coders and decoders,[276] and which include the Barbie cipher, Rick Astley, Scytale cipher, Lorem Ipsum Cipher, Delastelle, Citrix CTX1, Lorenz cipher, and Radio cipher (using NATO/Military phonetic alphabet content encoding). The challenges are used within Buchanan's teaching as an introduction to Applied Cryptography.
Cryptography doodles
Buchanan uses a number of teaching style in the teaching of cybersecurity, network security and cryptography. This includes using podcasts,[277] YouTube videos for formal lectures, and practical demonstrations. As part of the teaching of Applied Cryptography and Trust module for an MSc class, he has used a Doodle method of the teaching a range of topics, such as for Cipher Fundamentals,[278] Symmetric Key Encryption,[279] and Hashing methods.[280]
Invited talks and engagements
Over the years Buchanan has presented at many events, and has a reputation for high impact, fun and engaging presentations. This has included live demonstrations of cyber security threats. With a documentary on Cyber Security, broadcast on Monday 8 November 2015, Buchanan and his team set up a fake Web site for hackers to gain access to, as part of the BBC Panorama programme.[281] In 2016, Buchanan was also included in the FutureScot list for the "50 Scottish Tech People Who Are Changing The World".[282]
Laureations for honorary doctorates
On 21 June 2012, Buchanan presented a laureation for Prof John Howie[283] in the award of an honorary doctorate.[284] Also, on 21 June 2012, Buchanan presented a laureation for Steven Cordiner[285] for a Doctor of Technology and outlined, "Steve has been a leading proponent and visionary for optimization within the oil and gas industry, especially in promoting savings in CO2 emissions before it became a world-wide issue."[286]
Innovation events
Buchanan has organised conferences and symposiums which focus on innovation. On 12 January 2023, he organised the, "Symposium on Technology Innovation and Collaboration" at the Merchiston Campus at Edinburgh Napier University.[287] It included invited talks from the spin-outs Buchanan was involved with, including from Bruce Ramsay (Cyacomb),[288] Dr Jamie Graves (Zonefox) and Dr Pavlos Papadopoulos.[289]
The Cyber Academy
Buchanan launched The Cyber Academy at Edinburgh Napier University on 5 May 2015,[290] with a goal of "bringing together industry professionals, law enforcement and academics with a view to combining strengths to combat the growing threat of criminal use of hacking software to steal money, data and intellectual property." Its base was the EU-funded Dynamic Forensics Evaluation and Training (DFET) project,[291] and which developed a cloud-based cybercrime training environments to support authorities, businesses and citizens in the fight against cyber crime.
On 15 January 2019, it hosted the "Innovation in Cyber Conference: Building The Next Great Cybersecurity Company"[292] event on the Merchison Campus at Edinburgh Napier University, and which included talks from Dr Jamie Graves (founder of Zonefox),[293] Federico Charosky (founder of Quorum Cyber),[294] David Stubley (founder of 7Elements)[295] and Susan Brown (founder of Zortrex).[296]
From 4–5 June 2019, The Cyber Academy held its 5th "International Conference on Big Data in Cybersecurity" event.[297] Speakers included Prof Steven Furrnell,[298] and Prof Sokratis Katsikas,[299] and Kate Forbes.[300]
After a break over the COVID-19 pandemic, the Big Data conference returned on 11 May 2023, with the "6th International Conference on Big Data, Cybersecurity and Critical Infrastructure",[301] and was opened by Robert Aldridge (the Rt. Hon. Lord Provost and Lord Lieutenant of the City of Edinburgh).[302] It included talks from Prof Berk Canberk[303] on "Digital Twins in cybersecurity, infrastructure and 6G applications" and a keynote talk from Becky Pinkard.[304] Buchanan gave the endnote talk at the end on "Future Risks of the Cyber Age".
In Jun 2019, it hosted a talk on "The Future of Money" by Andreas M.Antonopoulos.[305] On 4 September 2019, The Cyber Academy hosted the 2nd International Conference on Blockchain, Identity and Cryptography,[306] and which included a keynote talk from Professor Serguei Popov.[307] The last conference to be run by The Cyber Academy that was run before the COVID-19 lock-down was the 2nd Blockchain International Scientific Conference and which was co-hosted by the British Blockchain Association. It was held on 11 March 2020 at the Craiglochart Conference of Edinburgh Napier University.[308]
Another theme of work of The Cyber Academy is around career events for Cybersecurity, and have hosted several events in collaboration with CiiSec.[309] On 23 Nov 2017, the IISP[310] hosted a career event[311] with the support of Buchanan and Rich Macfarlane. Then, in Feb 2020, Amanda Finch,[312] the CEO of CiiSec (which had previously been known as the IISP), opened up the CiiSec careers event at the Merchiston Campus.[313] This collaboration has continued over the years, and, The Cyber Academy hosted CiiSec 2022 on 7 September 2022,[314] and which had an overaching theme of "inspiring the next generation of cybersecurity professionals’".[315] David Ferbrache OBE[316] presenting the opening keynote talk, and Buchanan presented on endnote talk on "The Risks and Opportunities of AI".[317]
Awards and recognition
Buchanan's awards and recent recognition includes:
- In 2003, Finalist for KTP of the Year Award with Seven Layer Communications.[318]
- In 2004, Winner of the KTP of the Year Award and Grade 1 Certificate of Excellence from Innovate UK with Cànan Ltd.[319]
- In 2015, named in the "50 most influential UK higher education professionals on social media".[320]
- In 2015, led a cipher cracking team to win the Universally Challenged competition.[321]
- In 2016, awarded "Cyber Evangelist of the Year" at the first Scottish Cybersecurity awards,[260] along with leading a project that was awarded the best collaborative project with Police Scotland.[322]
- In 2016, gave a keynote talk on Cybersecurity at SISCA DEMOfest 2016.[323]
- In 2016, included in the "The Digital List: 50 people from various areas of Scotland's technology industries who are changing the world".[282]
- In 2017, appointed Officer of the Order of the British Empire (OBE) in the 2017 Birthday Honours for services to cyber security, and was the first person to receive an OBE related to cyber security.[324]
- From 2017 to 2021, appointed Chief Editor of the Journal of Cybersecurity Technology.[325]
- In 2018, received an "Outstanding Contribution to Knowledge Exchange" award at the Scottish Knowledge Exchange awards.[326]
- In 2018, appointed co-chair on Technical Committee for IEEE Systems, Man, and Cybernetics Society (SMC) on Blockchain.[327]
- In 2018, became a member of the IOTA Research Council.[328]
- In 2019, presented a keynote talk at the 5th International Conference on Information Systems Security and Privacy (ICISSP).[329]
- In 2019, awarded an Honorary Professorship from Spoleczna Akademia Nauk.[330]
- In 2019, awarded best Best Lecturer/Tutor in the School of Computing at Edinburgh Napier University within the student-nominated excellence awards.[331]
- From 2020, served as co-Chief Editor of Blockchain in Health Today.[332]
- In 2020, awarded best Best Lecturer/Tutor in the School of Computing at Edinburgh Napier University within the student-nominated excellence awards.[333]
- In 2020, Advanced Risk Modelling for Early Detection (ARMED) product won the 'Innovation of the Year' award at Scottish Knowledge Exchange Awards (with CM200 and Adrian Smales).[172]
- In 2021, presented a keynote talk at the 14th International Conference on Security of Information and Networks.[334]
- In 2021, winner of the Best Paper Award at 14th International Conference on Security of Information and Networks for the paper entitled, "PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching".[335][336]
- In 2022, the EU-funded GLASS project won the Leading Light Innovation Award at the Scottish Cyber Awards,[337] of which he is the principal investigator (PI) for the project.
- In 2022, presented a keynote at talk entitled "The Future of Cryptography, Blockchain and Trust" at International Blockchain Summit Istanbul, 2022.[338]
- In 2022, presented a keynote talk at Cyber Security 2023 in Cardiff.[339]
- In 2023, appointed to the advisory board of the Zero Trust Special Interest Group.[340]
- In 2023, awarded best Best Lecturer/Tutor in the School of Computing at Edinburgh Napier University within the student-nominated excellence awards.[341]
- In 2023, appointed the co-chair for Blockchain & FinTech within IEEE Blockchain Technical Community (BCTC).[342]
- In 2023, presented a keynote a ScotSecure West (Glasgow)[343] and Borderless Cyber (London).[344]
- In 2023, presented a keynote on "The Greatest Threat to the Internet: Quantum Computers" at #RISK in the ExCel, London
References
- ↑ "School of Computing, Engineering & The Built Environment". www.napier.ac.uk. Retrieved 24 June 2023.
- ↑ "Blockpass Identity Lab - Napier University". identity-lab.blockpass.org. Retrieved 18 August 2021.
- ↑ "Centre for Cybersecurity, IoT & Cyberphysical Systems". Napier. Retrieved 24 June 2023.
- ↑ "Bill Buchanan". Napier. Retrieved 2 August 2018.
- ↑ "Professor Opens Up on His Love of Edinburgh, Cryptography and Innovation". Napier. Retrieved 1 August 2023.
- ↑ Stamatellis, Charalampos; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Katsikas, Sokratis; Buchanan, William J. (January 2020). "A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric". Sensors. 20 (22): 6587. arXiv:2011.09260. Bibcode:2020Senso..20.6587S. doi:10.3390/s20226587. ISSN 1424-8220. PMC 7698751. PMID 33218022.
- 1 2 Masood, Fawad; Boulila, Wadii; Ahmad, Jawad; Arshad; Sankar, Syam; Rubaiee, Saeed; Buchanan, William J. (January 2020). "A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos". Remote Sensing. 12 (11): 1893. Bibcode:2020RemS...12.1893M. doi:10.3390/rs12111893. ISSN 2072-4292.
- ↑ "Security and So Many Things". asecuritysite.com. Retrieved 20 August 2023.
- ↑ https://web.archive.org/web/20130215082843/http://asecuritysite.com
- 1 2 "Times Higher Education Awards 2023: winners announced". Times Higher Education (THE). 7 December 2023. Retrieved 8 December 2023.
- ↑ "CBDC Academic Advisory Group". www.bankofengland.co.uk. Retrieved 27 December 2023.
- ↑ "OBE, MBE for University stalwarts". Napier. Retrieved 2 September 2023.
- ↑ "Primary schools - Victoria Primary School | Falkirk Council". www.falkirk.gov.uk. Retrieved 31 July 2023.
- ↑ "Graeme High School Falkirk - Home Page". graemehigh.com. Retrieved 31 July 2023.
- ↑ "History". CalaChem Fine Chemicals. Retrieved 31 July 2023.
- ↑ "Royal Observatory Edinburgh". www.ukri.org. Retrieved 31 July 2023.
- ↑ https://web.archive.org/web/20060517051844/http://www.dcs.napier.ac.uk/~bill/cv_bill.pdf
- ↑ "Research Output". Napier. Retrieved 31 July 2023.
- ↑ House of Commons Investigatory Powers Bill (Dec 2016), retrieved 25 August 2023
- ↑ "Parliamentlive.tv". www.parliamentlive.tv. Retrieved 25 August 2023.
- ↑ Ioannidis, John P. A. (10 October 2022). "September 2022 data-update for "Updated science-wide author databases of standardized citation indicators"". 4. Elsevier BV. doi:10.17632/btchxktzyw.4.
{{cite journal}}
: Cite journal requires|journal=
(help) - ↑ "Profiles". scholar.google.com. Retrieved 2 August 2023.
- 1 2 "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 24 June 2023.
- ↑ "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 24 June 2023.
- ↑ England, Higher Funding Council of. "Guidance on REF 2021 results - REF 2021". Higher Education Funding Council for England. Retrieved 24 June 2023.
- ↑ "Unit of assessment 11: Computer Science and Informatics : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 24 June 2023.
- ↑ McCulloch, Scott (5 May 2015). "Napier University to launch new International Cyber Academy". businessInsider. Retrieved 9 July 2023.
- ↑ "2016 Research Awards -". Retrieved 9 July 2023.
- ↑ "Security and So Many Things". asecuritysite.com. Retrieved 9 July 2023.
- ↑ "Blockpass Identity Lab Furthers Research and Understanding". www.blockpass.org. Retrieved 9 July 2023.
- ↑ "2017 – Research Excellence Awards". Retrieved 9 July 2023.
- ↑ EP 2347366, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Improvements in or relating to digital forensics", published 2019-05-08, assigned to Fortinet Inc.
- 1 2 US8887274B2, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Digital forensics", issued 2014-11-11
- ↑ GB application 2561176, Stevenson, Ian; Bruce, Ramsay & Buchanan, William Johnston et al., "System and method for management of confidential data", published 2018-10-11, assigned to Edinburgh Napier University
- ↑ GB 2561177, Stevenson, Ian; Bruce, Ramsay & Buchanan, William Johnston et al., "Method for identification of digital content", published 2021-06-30, assigned to Cyan Forensics Ltd.
- ↑ US 9043867, Uthmani, Omair; Buchanan, William & Lawson, Alistair et al., "Information sharing", published 2015-05-26, assigned to The Court of Edinburgh Napier University
- 1 2 WO2018185455A1, Buchanan, William Johnston; LO, Owen Chin Wai & PENROSE, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2018-10-11
- 1 2 WO2022195254A1, BUCHANAN, Bill; Mclaren, Peter & Gordon, Russell et al., "Detection of ransomware", issued 2022-09-22
- ↑ US 10979222, Lanc, David; Fan, Lu & Mackinnon, Lachlan et al., "Resilient secret sharing cloud based architecture for data vault", published 2021-04-13, assigned to Leading Software Ltd.
- ↑ "BIL Launch Advances a Future of Self-Sovereign Identity". www.blockpass.org. Retrieved 31 July 2023.
- ↑ "distributed single sign on stack on e governance paradigm based on a distributed 1". Napier. Retrieved 31 July 2023.
- ↑ "trust and privacy preserving computing platform for crossborder federation of personal". Napier. Retrieved 31 July 2023.
- 1 2 Ali, Hisham; Ahmad, Jawad; Jaroucheh, Zakwan; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Lo, Owen; Abramson, Will; Buchanan, William J. (October 2022). "Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform". Entropy. 24 (10): 1379. Bibcode:2022Entrp..24.1379A. doi:10.3390/e24101379. ISSN 1099-4300. PMC 9601302. PMID 37420400.
- ↑ Abubakar, Mwrwan; McCarron, Pádraig; Jaroucheh, Zakwan; Al Dubai, Ahmed; Buchanan, Bill (December 2021). "Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. arXiv:2112.10124. doi:10.1109/SIN54109.2021.9699221. ISBN 978-1-7281-9266-6. S2CID 245334671.
- 1 2 3 Barati, Masoud; Buchanan, William J.; Lo, Owen; Rana, Omer (7 February 2022). "A privacy-preserving distributed platform for COVID-19 vaccine passports". Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion. UCC '21. New York, NY, USA: Association for Computing Machinery. pp. 1–6. doi:10.1145/3492323.3495626. ISBN 978-1-4503-9163-4. S2CID 246635492.
- 1 2 Papadopoulos, Pavlos; Pitropakis, Nikolaos; Buchanan, William J.; Lo, Owen; Katsikas, Sokratis (September 2020). "Privacy-Preserving Passive DNS". Computers. 9 (3): 64. arXiv:2008.06430. doi:10.3390/computers9030064. ISSN 2073-431X.
- ↑ Jaroucheh, Zakwan; Alissa, Mohamad; Buchanan, William J; Liu, Xiaodong (July 2020). "TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies". 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC). pp. 1235–1240. doi:10.1109/COMPSAC48688.2020.00-87. ISBN 978-1-7281-7303-0.
- ↑ "Chaloner Chute". www.dhi-scotland.comhttps. Retrieved 6 August 2023.
- ↑ "Muhammad Imran". ieeexplore.ieee.org. Retrieved 6 August 2023.
- ↑ "Professor Jill Pell". www.ukri.org. Archived from the original on 6 August 2023. Retrieved 6 August 2023.
- ↑ "Claudia Pagliari". The University of Edinburgh. 1 February 2023. Retrieved 6 August 2023.
- ↑ "Sanna Rimpilainen". University of Strathclyde. Retrieved 6 August 2023.
- ↑ Buchanan, William; Imran, Muhammad; Pagliari, Claudia; Pell, Jill; Rimpiläinen, Sanna (14 July 2020). Use of Participatory Apps in Contact Tracing – Options and Implications for Public Health, Privacy and Trust (Report). Glasgow: University of Strathclyde. doi:10.17868/73197.
- 1 2 Xu, Hao; Zhang, Lei; Onireti, Oluwakayode; Fang, Yang; Buchanan, William J.; Imran, Muhammad Ali (March 2021). "BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for COVID-19 Pandemic and Beyond". IEEE Internet of Things Journal. 8 (5): 3915–3929. doi:10.1109/JIOT.2020.3025953. ISSN 2327-4662. PMC 8768969. PMID 37974935. S2CID 218718736.
- ↑ Buchanan, William J.; Imran, Muhammad Ali; Ur-Rehman, Masood; Zhang, Lei; Abbasi, Qammer H.; Chrysoulas, Christos; Haynes, David; Pitropakis, Nikolaos; Papadopoulos, Pavlos (2020). "Review and Critical Analysis of Privacy-Preserving Infection Tracking and Contact Tracing". Frontiers in Communications and Networks. 1. arXiv:2009.05126. doi:10.3389/frcmn.2020.583376. ISSN 2673-530X.
- ↑ Abramson, Will; Buchanan, William J.; Sayeed, Sarwar; Pitropakis, Nikolaos; Lo, Owen (December 2021). "PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. doi:10.1109/SIN54109.2021.9699138. ISBN 978-1-7281-9266-6. S2CID 244908584.
- ↑ "Nikolaos Pitropakis". scholar.google.com. Retrieved 6 August 2023.
- ↑ "privacy preserving systems around security trust and identity". Napier. Retrieved 6 August 2023.
- ↑ Stamatellis, Charalampos; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Katsikas, Sokratis; Buchanan, William J. (January 2020). "A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric". Sensors. 20 (22): 6587. arXiv:2011.09260. Bibcode:2020Senso..20.6587S. doi:10.3390/s20226587. ISSN 1424-8220. PMC 7698751. PMID 33218022.
- ↑ "identity and identification in an information society augmenting formal systems of". Napier. Retrieved 6 August 2023.
- ↑ Abramson, Will; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Buchanan, William J. (1 August 2021). "PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform". Software Impacts. 9: 100101. doi:10.1016/j.simpa.2021.100101. ISSN 2665-9638. S2CID 237621690.
- ↑ CyberHunt. "CyberHunt". CyberHunt. Retrieved 6 August 2023.
- ↑ Ali, Hisham; Papadopoulos, Pavlos; Ahmad, Jawad; Pitropakis, Nikolaos; Jaroucheh, Zakwan; Buchanan, William J. (December 2021). "Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–6. doi:10.1109/SIN54109.2021.9699366. ISBN 978-1-7281-9266-6. S2CID 245334925.
- ↑ Young, Edward Henry; Chrysoulas, Christos; Pitropakis, Nikolaos; Papadopoulos, Pavlos; Buchanan, William J (October 2021). "Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure". 2021 International Conference on Data Analytics for Business and Industry (ICDABI). pp. 650–654. doi:10.1109/ICDABI53623.2021.9655843. ISBN 978-1-6654-1656-6. S2CID 238354054.
- ↑ Dyson, Simon F.; Buchanan, William J.; Bell, Liam (1 March 2020). "Scenario-based creation and digital investigation of ethereum ERC20 tokens". Forensic Science International: Digital Investigation. 32: 200894. doi:10.1016/j.fsidi.2019.200894. ISSN 2666-2817. S2CID 213992224.
- ↑ Saha, Rahul; Kumar, Gulshan; Devgun, Tannishtha; Buchanan, William J.; Thomas, Reji; Alazab, Mamoun; Hoon-Kim, Tai; Rodrigues, Joel J. P. C. (January 2023). "A Blockchain Framework in Post-Quantum Decentralization". IEEE Transactions on Services Computing. 16 (1): 1–12. doi:10.1109/TSC.2021.3116896. ISSN 1939-1374. S2CID 244189706.
- ↑ Abubakar, Mwrwan; Ali, Hisham; Ghaleb, Baraq; Wadhaj, Isam; Buchanan, William J. (2023). "An Overview of Blockchain-Based IoT Architectures and Designs". In Al-Sharafi, Mohammed A.; Al-Emran, Mostafa; Al-Kabi, Mohammed Naji; Shaalan, Khaled (eds.). Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems. Lecture Notes in Networks and Systems. Vol. 584. Cham: Springer International Publishing. pp. 596–605. doi:10.1007/978-3-031-25274-7_52. ISBN 978-3-031-25274-7.
- ↑ Abubakar, Mwrwan; McCarron, Pádraig; Jaroucheh, Zakwan; Al Dubai, Ahmed; Buchanan, Bill (December 2021). "Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. arXiv:2112.10124. doi:10.1109/SIN54109.2021.9699221. ISBN 978-1-7281-9266-6. S2CID 245334671.
- ↑ Buchanan, William; Woodward, Alan (2 January 2017). "Will quantum computers be the end of public key encryption?". Journal of Cyber Security Technology. 1 (1): 1–22. doi:10.1080/23742917.2016.1226650. ISSN 2374-2917. S2CID 125668533.
- ↑ "Alan Woodward". scholar.google.com. Retrieved 7 August 2023.
- ↑ Barton, Jon; Buchanan, William; Pitropakis, Nikolaos; Sayeed, Sarwar; Abramson, Will (2022). "Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device". Proceedings of the 8th International Conference on Information Systems Security and Privacy. pp. 551–561. doi:10.5220/0010903000003120. ISBN 978-989-758-553-1. S2CID 246635203.
- ↑ Buchanan, Bill (10 July 2023). "Standing on the Horizon of One of the Greatest Advancements in Science: The Quantum Computer". ASecuritySite: When Bob Met Alice. Retrieved 1 September 2023.
- ↑ Li, Shancang; Choo, Kim-Kwang Raymond; Sun, Qindong; Buchanan, William J.; Cao, Jiuxin (August 2019). "IoT Forensics: Amazon Echo as a Use Case". IEEE Internet of Things Journal. 6 (4): 6487–6497. doi:10.1109/JIOT.2019.2906946. ISSN 2327-4662. S2CID 149509079.
- ↑ Muir, Matt; Leimich, Petra; Buchanan, William J. (1 June 2019). "A Forensic Audit of the Tor Browser Bundle". Digital Investigation. 29: 118–128. arXiv:1907.10279. doi:10.1016/j.diin.2019.03.009. ISSN 1742-2876.
- ↑ Sudozai, M. A. K.; Saleem, Shahzad; Buchanan, William J.; Habib, Nisar; Zia, Haleemah (1 June 2018). "Forensics study of IMO call and chat app". Digital Investigation. 25: 5–23. doi:10.1016/j.diin.2018.04.006. ISSN 1742-2876. S2CID 49599026.
- ↑ Buchanan, William J.; Woodward, Alan; Helme, Scott (October 2017). "Cryptography across industry sectors". Journal of Cyber Security Technology. 1 (3–4): 145–162. doi:10.1080/23742917.2017.1327221. ISSN 2374-2917. S2CID 113481528.
- ↑ Asif, Rameez; Buchanan, William J. (June 2017). "Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption". 2017 IEEE International Conference on Internet of Things (IThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). pp. 910–916. doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.140. ISBN 978-1-5386-3066-2. S2CID 2590039.
- ↑ Saha, Rahul; Geetha, G.; Kumar, Gulshan; Kim, Tai-Hoon; Buchanan, William J. (2019). "MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features". IEEE Access. 7: 172045–172054. Bibcode:2019IEEEA...7q2045S. doi:10.1109/ACCESS.2019.2956160. ISSN 2169-3536. S2CID 209320638.
- ↑ Saha, Rahul; Geetha, Ganesan; Kumar, Gulshan; Buchanan, William J.; Kim, Tai-hoon (January 2021). "A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions". Applied Sciences. 11 (17): 8073. doi:10.3390/app11178073. ISSN 2076-3417.
- ↑ Abramson, Will; Buchanan, William J.; Sayeed, Sarwar; Pitropakis, Nikolaos; Lo, Owen (December 2021). "PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. doi:10.1109/SIN54109.2021.9699138. ISBN 978-1-7281-9266-6. S2CID 244908584.
- ↑ McLaren, Peter; Buchanan, William J.; Russell, Gordon; Tan, Zhiyuan (1 October 2019). "Deriving ChaCha20 key streams from targeted memory analysis". Journal of Information Security and Applications. 48: 102372. arXiv:1907.11941. doi:10.1016/j.jisa.2019.102372. ISSN 2214-2126. S2CID 198968271.
- 1 2 Davies, Simon R.; Macfarlane, Richard; Buchanan, William J. (October 2022). "Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification". Entropy. 24 (10): 1503. arXiv:2210.13376. Bibcode:2022Entrp..24.1503D. doi:10.3390/e24101503. ISSN 1099-4300. PMC 9601406. PMID 37420524.
- ↑ "Jawad Ahmad". Napier. Retrieved 26 August 2023.
- ↑ Major, Will; Buchanan, William J.; Ahmad, Jawad (1 March 2020). "An authentication protocol based on chaos and zero knowledge proof". Nonlinear Dynamics. 99 (4): 3065–3087. arXiv:2001.07897. doi:10.1007/s11071-020-05463-3. ISSN 1573-269X. S2CID 210859204.
- ↑ Khan, Jan Sher; Boulila, Wadii; Ahmad, Jawad; Rubaiee, Saeed; Rehman, Atique Ur; Alroobaea, Roobaea; Buchanan, William J. (2020). "DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption". IEEE Access. 8: 159732–159744. Bibcode:2020IEEEA...8o9732K. doi:10.1109/ACCESS.2020.3020917. ISSN 2169-3536. S2CID 221715931.
- ↑ Qayyum, Abdullah; Ahmad, Jawad; Boulila, Wadii; Rubaiee, Saeed; Arshad; Masood, Fawad; Khan, Fawad; Buchanan, William J. (2020). "Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution". IEEE Access. 8: 140876–140895. Bibcode:2020IEEEA...8n0876Q. doi:10.1109/ACCESS.2020.3012912. ISSN 2169-3536. S2CID 221036159.
- ↑ Ahmad, Jawad; Tahir, Ahsen; Khan, Jan Sher; Jameel, Atif; Abbasi, Qammer H; Buchanan, William (February 2020). "A Novel Multi-Chaos Based Compressive Sensing Encryption Technique". 2019 International Conference on Advances in the Emerging Computing Technologies (AECT). pp. 1–4. doi:10.1109/AECT47998.2020.9194220. ISBN 978-1-7281-4452-8. S2CID 221717067.
- ↑ Alharbi, Adel R.; Ahmad, Jawad; Arshad, Undefined; Jamal, Sajjad Shaukat; Masood, Fawad; Ghadi, Yazeed Yasin; Pitropakis, Nikolaos; J Buchanan, William (18 April 2022). "A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map". Complexity. 2022: e7047282. doi:10.1155/2022/7047282. ISSN 1076-2787.
- ↑ Ahmed, Fawad; Rehman, Muneeb Ur; Ahmad, Jawad; Khan, Muhammad Shahbaz; Boulila, Wadii; Srivastava, Gautam; Lin, Jerry Chun-Wei; Buchanan, William J. (25 February 2023). "A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder". ACM Transactions on Multimedia Computing, Communications, and Applications. 19 (3s): 128:1–128:21. arXiv:2211.03662. doi:10.1145/3570165. ISSN 1551-6857. S2CID 253258876.
- ↑ "Shancang Li". ieeexplore.ieee.org. Retrieved 7 August 2023.
- ↑ "Rameez Asif". University of East Anglia. Retrieved 7 August 2023.
- ↑ Buchanan, William J.; Li, Shancang; Asif, Rameez (October 2017). "Lightweight cryptography methods". Journal of Cyber Security Technology. 1 (3–4): 187–201. doi:10.1080/23742917.2017.1384917. ISSN 2374-2917. S2CID 67434288.
- ↑ Gunathilake, Nilupulee A.; Buchanan, William J.; Asif, Rameez (April 2019). "Next Generation Lightweight Cryptography for Smart IoT Devices: : Implementation, Challenges and Applications". 2019 IEEE 5th World Forum on Internet of Things (WF-IoT). pp. 707–710. doi:10.1109/WF-IoT.2019.8767250. ISBN 978-1-5386-4980-0. S2CID 198144877.
- ↑ Gunathilake, Nilupulee A.; Al-Dubai, Ahmed; Buchana, William J. (November 2020). "Recent Advances and Trends in Lightweight Cryptography for IoT Security". 2020 16th International Conference on Network and Service Management (CNSM). pp. 1–5. doi:10.23919/CNSM50824.2020.9269083. ISBN 978-3-903176-31-7. S2CID 227277538.
- ↑ Gunathilake, Nilupulee A.; Al-Dubai, Ahmed; Buchanan, William J.; Lo, Owen (January 2022). "Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher". 2022 6th International Conference on Cryptography, Security and Privacy (CSP). pp. 51–55. doi:10.1109/CSP55486.2022.00018. ISBN 978-1-6654-7975-2. S2CID 245424991.
- ↑ "Bill Buchanan". Napier. Retrieved 24 July 2023.
- ↑ "MARIAN Mobile Agents for Routing in AdHoc Networks". Napier. Retrieved 24 July 2023.
- ↑ "Forensic verification of operating system activity via novel data acquisition and analysis". Napier. Retrieved 24 July 2023.
- ↑ "Cryptographic privacypreserving enhancement method for investigative data acquisition". Napier. Retrieved 24 July 2023.
- ↑ "HIRisk a sociotechnical method to identify and monitor heathcare [sic] information security risks in". Napier. Retrieved 24 July 2023.
- ↑ "a pattern driven corpus to predictive analytics in mitigating sql injection attack". Napier. Retrieved 24 July 2023.
- ↑ "forensic analysis of large capacity digital storage devices". Napier. Retrieved 24 July 2023.
- ↑ "rescue evaluation of a fragmented secret share system in distributed cloud architecture". Napier. Retrieved 2 September 2023.
- ↑ "embedded document security using sticky policies and identity based encryption". Napier. Retrieved 24 July 2023.
- ↑ "test bed and evaluation of a home based adverse event prediction infrastructure". Napier. Retrieved 24 July 2023.
- ↑ "investigations into decrypting live secure traffic in virtual environments". Napier. Retrieved 24 July 2023.
- ↑ "identity and identification in an information society augmenting formal systems of". Napier. Retrieved 8 August 2023.
- ↑ "privacy preserving systems around security trust and identity". Napier. Retrieved 24 July 2023.
- ↑ "distributed single sign on stack on e governance paradigm based on a distributed 1". Napier. Retrieved 27 July 2023.
- ↑ "ktp miracl". Napier. Retrieved 27 July 2023.
- ↑ "truelect". Napier. Retrieved 27 July 2023.
- ↑ "trust and privacy preserving computing platform for crossborder federation of personal". Napier. Retrieved 27 July 2023.
- ↑ "ai based privacy preserving biometric authentication with mass market smart devices". Napier. Retrieved 27 July 2023.
- ↑ "cyber hunt". Napier. Retrieved 27 July 2023.
- ↑ "phd studentship homomorphic encryption". Napier. Retrieved 27 July 2023.
- 1 2 "memcrypt hgsp". Napier. Retrieved 27 July 2023.
- ↑ "Data Capture and Auto Identification Reference". napier-repository.worktribe.com. Retrieved 4 August 2023.
- ↑ "Homepage". Chelsea and Westminster Hospital NHS Foundation Trust. Retrieved 4 August 2023.
- ↑ "GS1 UK | The Global Language of Business". www.gs1uk.org. Retrieved 4 August 2023.
- ↑ Fan, L.; Buchanan, W.; Thummler, C.; Lo, O.; Khedim, A.; Uthmani, O.; Lawson, A.; Bell, D. (July 2011). "DACAR Platform for eHealth Services Cloud". 2011 IEEE 4th International Conference on Cloud Computing (PDF). pp. 219–226. doi:10.1109/CLOUD.2011.31. ISBN 978-1-4577-0836-7. S2CID 14062712.
- ↑ "Home - Emeritus Professor Derek Bell". www.imperial.ac.uk. Retrieved 4 August 2023.
- ↑ "Christoph Thuemmler". scholar.google.com. Retrieved 4 August 2023.
- ↑ "Prof Christoph Thuemmler". napier-repository.worktribe.com. doi:10.21825/ewopinpractice.89676. S2CID 264568000. Retrieved 4 August 2023.
- ↑ "Lu Fan". scholar.google.com. Retrieved 4 August 2023.
- ↑ Thuemmler, Christoph; Buchanan, William; Fekri, Amir Hesam; Lawson, Alistair (2009). "Radio frequency identification (RFID) in pervasive healthcare". International Journal of Healthcare Technology and Management. 10 (1/2): 119. doi:10.1504/IJHTM.2009.023731. ISSN 1368-2156.
- ↑ Thuemmler, C.; Buchanan, W.; Kumar, V. (2007). "Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology". International Journal of Healthcare Technology and Management. 8 (5): 571. doi:10.1504/IJHTM.2007.013524. ISSN 1368-2156.
- ↑ "Owen Lo". Napier. Retrieved 4 August 2023.
- ↑ updates (2 March 2022). "Cyan Forensics changes its name to Cyacomb". ScotlandIS. Retrieved 4 August 2023.
- ↑ "scalable and open framework for humandigital trust between informalformal personal". Napier. Retrieved 4 August 2023.
- ↑ Ekonomou, E.; Fan, L.; Buchanan, W.; Thuemmler, C. (November 2011). "An Integrated Cloud-based Healthcare Infrastructure". 2011 IEEE Third International Conference on Cloud Computing Technology and Science. pp. 532–536. doi:10.1109/CloudCom.2011.80. ISBN 978-1-4673-0090-2. S2CID 18718402.
- ↑ Cloud4Health - Outline, retrieved 4 August 2023
- ↑ Cloud4Health - Overview - Scotland IS Video Submission, retrieved 4 August 2023
- ↑ "distributed single sign on stack on e governance paradigm based on a distributed 1". Napier. Retrieved 28 July 2023.
- ↑ "Home". GLASS-H2020. Retrieved 28 July 2023.
- ↑ EU Commission. "SinGLe Sign-on eGovernAnce paradigm based on a distributed file exchange network for Security, transparency, cost effectiveness and truSt".
- ↑ Lo, Owen; Buchanan, William J.; Sayeed, Sarwar; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Chrysoulas, Christos (January 2022). "GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture". Sensors. 22 (6): 2291. arXiv:2203.08781. Bibcode:2022Senso..22.2291L. doi:10.3390/s22062291. ISSN 1424-8220. PMC 8949250. PMID 35336462.
- ↑ Kelly, Ross (24 November 2022). "Winners Announced at 2022 Scottish Cyber Awards". DIGIT. Retrieved 28 July 2023.
- ↑ "Migration and Home Affairs". commission.europa.eu. Retrieved 2 August 2023.
- ↑ "Research Output". Napier. Retrieved 2 August 2023.
- ↑ Buchanan, William J.; Ramsay, Bruce; Macfarlane, Richard; Smales, Adrian; Keane, Eamonn; Callahan, Cormac; Blazic, Borka Jerman; Popov, Oliver (3 September 2015). "Evaluation of the DFET Cloud".
{{cite journal}}
: Cite journal requires|journal=
(help) - ↑ "vSOC Virtualised Security Operations Centre". Napier. Retrieved 2 August 2023.
- ↑ "virtualised security operations centre vsoc ktp". Napier. Retrieved 2 August 2023.
- ↑ "Home". The Data Lab. Retrieved 2 August 2023.
- ↑ "Cyber & Data". asecuritysite.com. Retrieved 2 August 2023.
- ↑ "Owen Lo". scholar.google.com. Retrieved 5 August 2023.
- ↑ "Nilupulee Gunathilake". Napier. Retrieved 5 August 2023.
- ↑ "Bare Metal Forensics Pattern Analysis Heuristics Data Analysis". Napier. Retrieved 5 August 2023.
- ↑ Lo, Owen; Buchanan, William J.; Carson, Douglas (2 April 2017). "Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)". Journal of Cyber Security Technology. 1 (2): 88–107. doi:10.1080/23742917.2016.1231523. ISSN 2374-2917. S2CID 114293257.
- ↑ Practical side-channel attacks on embedded device cryptography: Dr Owen Lo and Doug Carson, retrieved 5 August 2023
- ↑ "International Conference on Cryptography and High Performance Computing". The Cyber Academy. 30 April 2016. Retrieved 5 August 2023.
- ↑ "iot hardware security test framework". Napier. Retrieved 25 August 2023.
- ↑ "Better security on IoT devices". CENSIS. Retrieved 25 August 2023.
- ↑ Lo, Owen; Buchanan, William J.; Carson, Douglas (27 August 2018). "Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device". Proceedings of the 13th International Conference on Availability, Reliability and Security. ARES 2018. New York, NY, USA: Association for Computing Machinery. pp. 1–6. doi:10.1145/3230833.3232801. ISBN 978-1-4503-6448-5. S2CID 51980728.
- ↑ Gunathilake, Nilupulee A.; Al-Dubai, Ahmed; Buchanan, William J.; Lo, Owen (January 2022). "Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher". 2022 6th International Conference on Cryptography, Security and Privacy (CSP). pp. 51–55. doi:10.1109/CSP55486.2022.00018. ISBN 978-1-6654-7975-2. S2CID 245424991.
- ↑ "investigations into decrypting live secure traffic in virtual environments". Napier. Retrieved 5 August 2023.
- ↑ "memcrypt hgsp". Napier. Retrieved 5 August 2023.
- ↑ "CyberASAP - Innovate UK KTN". Retrieved 5 August 2023.
- ↑ "memcrypt". Napier. Retrieved 5 August 2023.
- ↑ "memcrypt cyberasap phase 2". Napier. Retrieved 5 August 2023.
- ↑ "MEMCRYPT LIMITED overview - Find and update company information - GOV.UK". find-and-update.company-information.service.gov.uk. Retrieved 5 August 2023.
- ↑ McLaren, Peter; Russell, Gordon; Buchanan, Bill (July 2017). "Mining malware command and control traces". 2017 Computing Conference. pp. 788–794. doi:10.1109/SAI.2017.8252185. ISBN 978-1-5090-5443-5. S2CID 32469879.
- ↑ McLaren, Peter; Buchanan, William J.; Russell, Gordon; Tan, Zhiyuan (1 October 2019). "Deriving ChaCha20 key streams from targeted memory analysis". Journal of Information Security and Applications. 48: 102372. arXiv:1907.11941. doi:10.1016/j.jisa.2019.102372. ISSN 2214-2126. S2CID 198968271.
- ↑ Davies, Simon R.; Macfarlane, Richard; Buchanan, William J. (1 June 2020). "Evaluation of live forensic techniques in ransomware attack mitigation". Forensic Science International: Digital Investigation. 33: 300979. arXiv:2012.08487. doi:10.1016/j.fsidi.2020.300979. ISSN 2666-2817. S2CID 219769091.
- ↑ Davies, Simon R.; Macfarlane, Richard; Buchanan, William J. (1 September 2021). "Differential area analysis for ransomware attack detection within mixed file datasets". Computers & Security. 108: 102377. arXiv:2106.14418. doi:10.1016/j.cose.2021.102377. ISSN 0167-4048. S2CID 235658473.
- ↑ Canan KTP Award 2004, retrieved 25 August 2023
- ↑ https://asecuritysite.com/public/KTP_Canan_3492.pdf
- ↑ "SOC: researchgroup displayonegroup". Archived from the original on 3 August 2004. Retrieved 25 August 2023.
- ↑ "scalable and open framework for humandigital trust between informalformal personal". Napier. Retrieved 2 August 2023.
- ↑ "Digital Health & Care Innovation Centre". www.dhi-scotland.comhttps. Retrieved 2 August 2023.
- ↑ "e frail phase 2". Napier. Retrieved 2 August 2023.
- ↑ CM2000 ARMED Solution, retrieved 2 August 2023
- 1 2 "Wearable tech scoops two prizes for supporting independent living". Med-Tech Innovation. 11 March 2020. Retrieved 2 August 2023.
- ↑ "Blockchain technology to be used to monitor medical devices". Napier. Retrieved 2 August 2023.
- ↑ "health blockchain". Napier. Retrieved 2 August 2023.
- ↑ "next generation trust architecture". Napier. Retrieved 2 August 2023.
- ↑ "next generation connectivity with health and well being". Napier. Retrieved 2 August 2023.
- ↑ "phd studentship homomorphic encryption". Napier. Retrieved 2 August 2023.
- ↑ Thuemmler, Christoph; Fan, Lu; Buchanan, William; Lo, Owen; Ekonomou, Elias; Khedim, Abou Sofyane (10 January 2012). "E-Health: Chances and Challenges of Distributed, Service oriented Architectures". Journal of Cyber Security and Mobility: 37–52. doi:10.13052/jcsm2245-1439.113. ISSN 2245-4578.
- ↑ van Deursen, Nicole; Buchanan, William J.; Duff, Alistair (1 September 2013). "Monitoring information security risks within health care". Computers & Security. 37: 31–45. doi:10.1016/j.cose.2013.04.005. ISSN 0167-4048.
- ↑ Bell, Liam; Buchanan, William J.; Cameron, Jonathan; Lo, Owen (29 May 2018). "Applications of Blockchain Within Healthcare". Blockchain in Healthcare Today. 1. doi:10.30953/bhty.v1.8. ISSN 2573-8240. S2CID 169773440.
- ↑ Abubakar, Mwrwan; McCarron, Pádraig; Jaroucheh, Zakwan; Al Dubai, Ahmed; Buchanan, Bill (December 2021). "Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. arXiv:2112.10124. doi:10.1109/SIN54109.2021.9699221. ISBN 978-1-7281-9266-6. S2CID 245334671.
- ↑ "SmpliCare". Smplicare.com. Retrieved 2 August 2023.
- ↑ "SIPR – Scottish Institute for Policing Research". Retrieved 16 August 2023.
- ↑ "Information Sharing between the Police and their Community Partners". Napier. Retrieved 16 August 2023.
- ↑ "Novel information sharing syntax for data sharing between police and community partners, using role-based security". S2CID 154114930.
{{cite web}}
: Missing or empty|url=
(help) - ↑ US9043867B2, Uthmani, Omair; Buchanan, William & Lawson, Alistair et al., "Information sharing", issued 2015-05-26
- ↑ "Appendix B". www.gov.scot. Retrieved 16 August 2023.
- ↑ "3. Research evidence and emerging technologies in policing". www.gov.scot. Retrieved 16 August 2023.
- ↑ "University spinout becomes part of the Fortinet family". Napier. Retrieved 7 March 2021.
- ↑ OSullivan, Kevin (22 June 2017). "Prof Bill Buchanan rewarded with OBE for cyber security work". FutureScot. Retrieved 7 March 2021.
- ↑ "Spinout set to revolutionise digital forensics worldwide". Napier. Retrieved 7 March 2021.
- ↑ "Fortinet acquires ZoneFox". Fortinet. Retrieved 7 March 2021.
- ↑ "Ping Identity to Acquire Symphonic Software to Accelerate Dynamic Authorization for Enterprises Pursuing Zero Trust Identity Security". www.pingidentity.com. Retrieved 7 March 2021.
- ↑ "Edinburgh Napier enters UK top 10 for successful spin outs". Napier. Retrieved 6 September 2023.
- ↑ Pete (30 January 2019). "Q&A: Jamie Graves, Founder and Former CEO, ZoneFox". DIGIT. Retrieved 27 July 2023.
- ↑ "Forensic verification of operating system activity via novel data acquisition and analysis". Napier. Retrieved 27 July 2023.
- ↑ Graves, Jamie (31 December 2009). "Forensic verification of operating system activity via novel data, acquisition and analysis techniques".
{{cite journal}}
: Cite journal requires|journal=
(help) - ↑ "ZONEFOX HOLDINGS LIMITED filing history - Find and update company information - GOV.UK". find-and-update.company-information.service.gov.uk. Retrieved 27 July 2023.
- ↑ GB0816556D0, "Improvements in or relating to digital forensics", issued 2008-10-15
- ↑ US8887274B2, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Digital forensics", issued 2014-11-11
- ↑ WO2010029346A1, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Improvements in or relating to digital forensics", issued 2010-03-18
- 1 2 EP2347366B1, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Improvements in or relating to digital forensics", issued 2019-05-08
- ↑ "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 27 July 2023.
- ↑ "DigitalDNA". Napier. Retrieved 27 July 2023.
- ↑ "US takeover for Scottish cyber security firm ZoneFox". BBC News. 23 October 2018. Retrieved 27 July 2023.
- ↑ ronaitken (4 February 2021). "Royal Society fund two Entrepreneur in Residence appointments". The School of Applied Sciences. Retrieved 27 July 2023.
- ↑ "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 27 July 2023.
- ↑ "Information Sharing between the Police and their Community Partners". Napier. Retrieved 27 July 2023.
- ↑ US9043867B2, Uthmani, Omair; Buchanan, William & Lawson, Alistair et al., "Information sharing", issued 2015-05-26
- 1 2 WO2014108678A1, UTHMANI, Omair; Buchanan, William & Lawson, Alistair et al., "Improved information sharing", issued 2014-07-17
- ↑ Fan, L.; Buchanan, W.; Thummler, C.; Lo, O.; Khedim, A.; Uthmani, O.; Lawson, A.; Bell, D. (July 2011). "DACAR Platform for eHealth Services Cloud". 2011 IEEE 4th International Conference on Cloud Computing (PDF). pp. 219–226. doi:10.1109/CLOUD.2011.31. ISBN 978-1-4577-0836-7. S2CID 14062712.
- ↑ "Data Capture and Auto Identification Reference". Napier. Retrieved 27 July 2023.
- ↑ "scalable and open framework for humandigital trust between informalformal personal". Napier. Retrieved 27 July 2023.
- ↑ Fan, Lu; Buchanan, William J.; Lo, Owen; Thuemmler, Christoph; Lawson, Alistair; Uthmani, Omair; Ekonomou, Elias; Khedim, Abou Sofyane (31 December 2012). "SPoC: Protecting Patient Privacy for e-Health Services in the Cloud".
{{cite journal}}
: Cite journal requires|journal=
(help) - ↑ "saFire". Napier. Retrieved 2 August 2023.
- ↑ "Derick James, Symphonic Software". www.sourcesecurity.com. Retrieved 27 July 2023.
- ↑ "Niall Burns | F6S Member Profile". F6S. Retrieved 27 July 2023.
- ↑ "Ping Identity Aquires Symphonic Software to Accelerate Dynamic Authorization for Enterprises Pursuing Zero Trust Identity Security". www.parequity.com. 3 November 2020. Retrieved 27 July 2023.
- ↑ "Rich Macfarlane". Napier. Retrieved 4 August 2023.
- ↑ "forensic analysis of large capacity digital storage devices". Napier. Retrieved 27 July 2023.
- ↑ GB2561177B, Ian, Stevenson; Bruce, Ramsay & William, Johnston Buchanan et al., "Method for identification of digital content", issued 2021-06-30
- ↑ EP3607467A1, Buchanan, William Johnston; LO, Owen Chin Wai & PENROSE, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2020-02-12
- ↑ CA3059013A1, Buchanan, William Johnston; LO, Owen Chin Wai & PENROSE, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2018-10-11
- ↑ US20210294878A1, Buchanan, William Johnston; LO, Owen Chin Wai & PENROSE, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2021-09-23
- ↑ "Fragment Finder". Napier. Retrieved 27 July 2023.
- ↑ "CYACOMB LIMITED filing history - Find and update company information - GOV.UK". find-and-update.company-information.service.gov.uk. Retrieved 27 July 2023.
- ↑ "Team Biographies". Cyacomb. Retrieved 27 July 2023.
- ↑ updates (2 March 2022). "Cyan Forensics changes its name to Cyacomb". ScotlandIS. Retrieved 27 July 2023.
- ↑ "Cyacomb Awarded as Technology Pioneer by World Economic Forum". Cyacomb. Retrieved 27 July 2023.
- ↑ MacRae, Duncan (19 November 2019). "Edinburgh Tech Startup Cyan Forensics Scoops Award at GovTech Summit". DIGIT. Retrieved 27 July 2023.
- ↑ "Double success at the Scottish Cyber Awards". Napier. Retrieved 27 July 2023.
- ↑ "Cyacomb (formerly Cyan Forensics)". www.parequity.com. 30 March 2021. Retrieved 27 July 2023.
- ↑ "Tackling harmful online content with Cyacomb investment | Scottish National Investment Bank". www.thebank.scot. 11 October 2023. Retrieved 16 October 2023.
- ↑ updates (26 May 2021). "Edinburgh Napier spin-out appoints Pete Jaco as CEO to tackle growing ransomware threat". ScotlandIS. Retrieved 25 November 2021.
- ↑ McLaren, Peter; Buchanan, William J.; Russell, Gordon; Tan, Zhiyuan (1 October 2019). "Deriving ChaCha20 key streams from targeted memory analysis". Journal of Information Security and Applications. 48: 102372. arXiv:1907.11941. doi:10.1016/j.jisa.2019.102372. ISSN 2214-2126. S2CID 198968271.
- ↑ McLaren, Peter; Russell, Gordon; Buchanan, William J.; Tan, Zhiyuan (1 June 2019). "Decrypting live SSH traffic in virtual environments". Digital Investigation. 29: 109–117. arXiv:1907.10279. doi:10.1016/j.diin.2019.03.010. ISSN 1742-2876. S2CID 133574611.
- ↑ "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 27 July 2023.
- ↑ "Home". Memcrypt. Retrieved 25 November 2021.
- ↑ "memcrypt cyberasap phase 2". Napier. Retrieved 27 July 2023.
- ↑ "Edinburgh Napier University Spinout Memcrypt to Fight Ransomware". DIGIT. 6 October 2020. Retrieved 27 July 2023.
- ↑ "MEMCRYPT LIMITED filing history - Find and update company information - GOV.UK". find-and-update.company-information.service.gov.uk. Retrieved 27 July 2023.
- ↑ "University spinout honoured at Scottish Cyber Awards 2021". Napier. Retrieved 25 November 2021.
- 1 2 "News Details". staff.napier.ac.uk. Retrieved 9 July 2023.
- ↑ "Minister learns how pupils benefit from business-academic partnership | Interface Knowledge Connection". interface-online.org.uk. 2 May 2017. Retrieved 8 November 2021.
- ↑ "vSOC Virtualised Security Operations Centre". Napier. Retrieved 24 June 2023.
- ↑ "CipherCTF". asecuritysite.com. Retrieved 22 July 2023.
- ↑ "Cisco Simulators". asecuritysite.com. Retrieved 22 July 2023.
- ↑ Buchanan, Bill. "ASecuritySite: When Bob Met Alice". ASecuritySite: When Bob Met Alice. Retrieved 24 June 2023.
- ↑ "Bill Buchanan OBE - YouTube". www.youtube.com. Retrieved 24 June 2023.
- ↑ "ASecuritySite Podcast on Apple Podcasts". Apple Podcasts. 22 July 2023. Retrieved 22 July 2023.
- ↑ "ASecuritySite Podcast". Spotify. Retrieved 22 July 2023.
- ↑ Buchanan, Bill. ASecuritySite Podcast. Audible.
- ↑ "Home". www.napierstudents.com. Retrieved 2 September 2023.
- ↑ "Instagram". www.instagram.com. Retrieved 2 September 2023.
- ↑ "Instagram". www.instagram.com. Retrieved 2 September 2023.
- ↑ "Excellence Awards - The Winners". www.napierstudents.com. Retrieved 2 August 2023.
- ↑ "Excellence Awards - The Winners". www.napierstudents.com. Retrieved 2 August 2023.
- ↑ "Excellence Awards 2023 Nominees". www.napierstudents.com. Retrieved 2 August 2023.
- ↑ "Student and Alumni Achievement Awards". www.napierstudents.com. Retrieved 27 December 2023.
- 1 2 Scottish Cyber Awards 2017 with Prof Bill Buchanan of Napier University, retrieved 28 October 2022
- ↑ "Dr Jamie Graves - Founder and CEO ZoneFox". Infosecurity Magazine. 7 August 2018. Retrieved 2 September 2023.
- ↑ "Advanced Security & Digital Forensics". Napier. Retrieved 2 September 2023.
- ↑ "National Cyber Security Centre certifies course". Napier. Retrieved 2 September 2023.
- ↑ "ENU recognised for gold standard cybersecurity work". Napier. Retrieved 2 September 2023.
- ↑ "Bright Red Publishing Blog". Bright Red Publishing Blog. 17 October 2018. Retrieved 30 July 2023.
- ↑ "Integration of Stimulating and Engaging Education Assessments". Napier. Retrieved 30 July 2023.
- ↑ Online, Interface. "Interface Online | Interface Knowledge Connection | Academia". Interface Online. Retrieved 30 July 2023.
- ↑ "BrightRED DIGITAL ZONE". www.brightredbooks.net. Retrieved 30 July 2023.
- ↑ "innovation and integrated learning environment for engaging and ever changing educational". Napier. Retrieved 30 July 2023.
- ↑ "Bright Red Publishing Home Page". www.brightredbooks.net. Retrieved 30 July 2023.
- ↑ "Bright Red Publishing Home Page". www.brightredbooks.net. Retrieved 30 July 2023.
- ↑ "Home". The Data Lab. Retrieved 8 August 2023.
- ↑ "Cyber & Data". asecuritysite.com. Retrieved 8 August 2023.
- ↑ "Coding Challenges". Archived from the original on 15 February 2013. Retrieved 8 August 2023.
{{cite web}}
: CS1 maint: bot: original URL status unknown (link) - ↑ "Cipher CTF Challenge Generator". asecuritysite.com. Retrieved 8 August 2023.
- ↑ "Ciphers". asecuritysite.com. Retrieved 8 August 2023.
- ↑ "ASecuritySite Podcast on Apple Podcasts". Apple Podcasts. 18 August 2023. Retrieved 20 August 2023.
- ↑ Applied Cryptography and Trust: 1. Cipher Fundamentals, retrieved 20 August 2023
- ↑ Applied Cryptography and Trust: 2. Symmetric Key, retrieved 20 August 2023
- ↑ Applied Cryptography and Trust: 3. Hashing, retrieved 20 August 2023
- ↑ "BBC Panorama".
- 1 2 "The Digital List". FutureScot. 24 February 2016. Retrieved 28 March 2022.
- ↑ "John Howie Discusses CSA Initiatives, Cloud Adoption Issues". cloudsecurityalliance.org. Retrieved 15 August 2023.
- ↑ Honorary Degree for John Howie, retrieved 15 August 2023
- ↑ Forsyth, Ian (27 January 2009). "PI joining project-management giant in multimillion-pound deal". Energy Voice. Retrieved 15 August 2023.
- ↑ Honorary Degree for Steve Cordiner, retrieved 15 August 2023
- ↑ aoifeosullivan (18 January 2023). "Innovation, and Building Bridges Towards the Enterprise Campus". Research Innovation Enterprise. Retrieved 4 September 2023.
- ↑ Symposium for Technology Innovation and Collaboration: Bruce Ramsay, retrieved 4 September 2023
- ↑ Symposium for Technology Innovation and Collaboration: Pavlos Papadopoulos, retrieved 4 September 2023
- ↑ McCulloch, Scott (5 May 2015). "Napier University to launch new International Cyber Academy". businessInsider. Retrieved 4 September 2023.
- ↑ "DFET". The Cyber Academy. 19 May 2015. Retrieved 4 September 2023.
- ↑ "Innovation in Cyber Conference: Building The Next Great Cybersecurity Company". Eventbrite. Retrieved 4 September 2023.
- ↑ "Dr Jamie Graves - Founder and CEO ZoneFox". Infosecurity Magazine. 7 August 2018. Retrieved 4 September 2023.
- ↑ Glicken, Morley D. (2009), "Evidence-Based Practice with Spoiled Children and Cyber-Bullies", Evidence-Based Practice with Emotionally Troubled Children and Adolescents, Elsevier, pp. 283–298, doi:10.1016/b978-0-12-374523-1.00017-3, ISBN 9780123745231, retrieved 4 September 2023
- ↑ "About Us". 7 Elements. Retrieved 4 September 2023.
- ↑ Brown, Susan (12 May 2021). "TeaBot Android banking Trojan targets banks in Europe". Zortrex. Retrieved 4 September 2023.
- ↑ "5th International Conference - Big Data in Cyber Security". Eventbrite. Retrieved 4 September 2023.
- ↑ "People look-up - The University of Nottingham". www.nottingham.ac.uk. Retrieved 4 September 2023.
- ↑ "Sokratis Katsikas - NTNU". www.ntnu.edu. Retrieved 4 September 2023.
- ↑ "5th International Conference Big Data in Cyber Security". The Cyber Academy. 12 May 2019. Retrieved 4 September 2023.
- ↑ "6th Intl. Conference on Big Data, Cybersecurity & Critical Infrastructure". Eventbrite. Retrieved 4 September 2023.
- ↑ "💥 6th International Conference on Big Data, Cybersecurity & Critical Infrastructure officially opened by @BasilatNapier, with a warm welcome to Edinburgh from @LordProvostEdin! #BigData23". X (formerly Twitter). Retrieved 4 September 2023.
- ↑ "Berk Canberk". Napier. Retrieved 4 September 2023.
- ↑ Pritchard, Stephen (21 June 2023). "#InfosecurityEurope Hall of Fame: Becky Pinkard, Managing Director of Global Cyber Operations, Barclays". Infosecurity Magazine. Retrieved 4 September 2023.
- ↑ The Future of Money, Andreas M.Antonopoulos, retrieved 4 September 2023
- ↑ Introduction at Conference on Blockchain, Identity and Cryptography, Bill Buchanan, retrieved 4 September 2023
- ↑ Introduction to IOTA — a feeless cryptocurrency, Serguei Popov, University of Campinas., retrieved 4 September 2023
- ↑ "Privilege to join @billatnapier & @Brit_blockchain for today's international collaborative conference #ISC2020 #innovation #challenges". X (formerly Twitter). Retrieved 4 September 2023.
- ↑ "CIISec | The home of cyber". www.ciisec.org. Retrieved 4 September 2023.
- ↑ "The Institute of Information Security Professionals (IISP), partnered with | Cyber Security Congress". World Cyber Security Congress 2018. 27 March 2018. Retrieved 4 September 2023.
- ↑ "Superb talk taking place by @billatnapier at @EdinburghNapier we think it's the first time @RSprachrohr have turned up at an #IISP event #iispcybercareer". X (formerly Twitter). Retrieved 4 September 2023.
- ↑ "Amanda Finch". cybermagazine.com. 28 September 2021. Retrieved 4 September 2023.
- ↑ "Full house at the Careers Event today with @CIISecHQ and some great announcements towards the end of the day @FinchAmanda @billatnapier @ComputingNapier @rjmacfarlane @sallyatnapier @EdinburghNapier". X (formerly Twitter). Retrieved 4 September 2023.
- ↑ McKee, Graeme (1 September 2022). "CIISec LIVE 2022". Systal Technology Solutions - Global Managed Network & Security. Retrieved 4 September 2023.
- ↑ "CIISec LIVE 2022". ScotlandIS. Retrieved 4 September 2023.
- ↑ "David Ferbrache OBE – Global Head of Cyber Futures – KPMG – AFCEA London – TriCyCIS 2022". Archived from the original on 4 September 2023. Retrieved 4 September 2023.
- ↑ "An absolute honour and a pleasure to have the wonderful @billatnapier presenting at No. CIISecLive2022 - thank you Bill for a sensational session to close off the day!". X (formerly Twitter). Retrieved 4 September 2023.
- ↑ KTP Award 2003 (Seven Layer), retrieved 25 August 2023
- ↑ Canan KTP Award 2004, retrieved 25 August 2023
- ↑ "The 50 most influential UK higher education professionals on social media". Times Higher Education (THE). 7 October 2015. Retrieved 9 July 2023.
- ↑ Journalist, Deadline News (12 March 2015). "Code cracking students best in Britain". Deadline News. Retrieved 28 December 2023.
- ↑ "University dominates Scottish Cyber Awards". Napier. Retrieved 28 October 2022.
- ↑ "SICSA DEMOfest 2016 – Delegate Registration now open!". SICSA - The Scottish Informatics & Computer Science Alliance. 20 September 2016. Retrieved 9 July 2023.
- ↑ "Judy Murray among Scots on honours list". BBC News. 16 June 2017. Retrieved 9 July 2023.
- ↑ Taylor and Francis Online (9 July 2023). "Journal for Cybersecurity Technology". Journal for Cybersecurity Technology. Retrieved 9 July 2023.
- ↑ "Scottish Knowledge Exchange Awards 2018 Winners announced - Innovate UK KTN". 26 February 2018. Retrieved 9 July 2023.
- ↑ ieeesmc (10 July 2018). "New TC Chair and Co-Chairs on Blockchain". IEEE SMC. Retrieved 9 July 2023.
- ↑ "Welcome Bill Buchanan to the IOTA Research Council". IOTA Foundation Blog. 16 November 2018. Retrieved 18 July 2023.
- ↑ ICISSP (9 July 2023). "Keynote Lectures". ICISSP 2019 Keynote Lectures. Retrieved 9 July 2023.
- ↑ Buchanan, William (1 November 2023). "Honorary Professorship from Spoleczna Akademia Auk". www.instagram.com. Retrieved 28 July 2023.
- ↑ "Excellence Awards - The Winners - Edinburgh Napier Students' Association". www.napierstudents.com. Retrieved 18 August 2021.
- ↑ "Editorial Team | Blockchain in Healthcare Today". blockchainhealthcaretoday.com. Retrieved 9 July 2023.
- ↑ "Excellence Awards - The Winners - Edinburgh Napier Students' Association". www.napierstudents.com. Retrieved 18 August 2021.
- ↑ "SINCONF 2021". www.sinconf.org. Retrieved 9 July 2023.
- ↑ "SINFCON 2023 Closing Session" (PDF). SINCONF 2021. 17 December 2021. Retrieved 19 July 2023.
- ↑ Abramson, Will; Buchanan, William J.; Sayeed, Sarwar; Pitropakis, Nikolaos; Lo, Owen (December 2021). "PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. doi:10.1109/SIN54109.2021.9699138. ISBN 978-1-7281-9266-6. S2CID 244908584.
- ↑ aoifeosullivan (28 November 2022). "Triple success for Edinburgh Napier University at Scottish Cyber Awards". Research Innovation Enterprise. Retrieved 8 January 2023.
- ↑ "Im Event - Event & Conference one page WordPress Theme". IEEE Turkey Blockchain Initiative. Retrieved 9 July 2023.
- ↑ "Keynotes & Industry". Cyber Science 2023. Retrieved 9 July 2023.
- ↑ "Professor Bill Buchanan OBE, appointed to new Zero Trust Special Interest Group Advisory Board". Zero Trust SIG. Archived from the original on 18 July 2023. Retrieved 18 July 2023.
- ↑ @napierstudents. "Congratulations to Prof Bill Buchanan, who is the winner of Best Lecturer/Tutor (Computing)". Twitter. Retrieved 29 May 2023.
- ↑ "About - IEEE Blockchain Technical Community". blockchain.ieee.org. Retrieved 9 July 2023.
- ↑ "Cyber Security | Scot-Secure West 2023". scotsecure2021. Retrieved 17 September 2023.
- ↑ "Day Two". borderlesscyber2023.oasis-open.org. Retrieved 17 September 2023.