Home | Design | SFC | Adv. Sec. | Code | Diary | WWW | Essay | Research

Bio

Bill Buchanan is a Professor in the School of Computing at Edinburgh Napier University, and a Fellow of the BCS and the IET. He currently leads the Centre for Distributed Computing, Networks, and Security, and works in the areas of security, next generation user interfaces, Web-based infrastructures, e-Crime, intrusion detection systems, digital forensics, e-Health, mobile computing, agent-based systems, and simulation. Bill has one of the most extensive academic sites in the World, and is involved in many areas of novel research and teaching in computing. He has published over 27 academic books, and over 160 academic publications, along with several awards for excellence in knowledge transfer, and for teaching, such as winning at the I ♥ my Tutor Awards (Student voted), Edinburgh Napier University, 2011, and has supervised many award winning student projects.

Presently he is working with a range of industrial/domain partners, including with the Scottish Police, health care professionals and the FSA. As part of the drive to create a World-leading in-frastructure for security and cybercrime, he leads the Scottish Centre of Excellence for Security and Cybercrime which brings together a wide range of collaborators, including most of the universities in Scotland, the Scottish Police, the public sector, and a range of SMEs and large organisations. Current work includes initiatives on creating an e-Forensics Cloud across Scotland, and in organising a large-scale Symposium to engage a large number of stakeholders within Scotland, in order to focus on creating a World-leading infrastructure.

He has a long track record in commercialisation activities, including being a co-founder of Inquisitive System, which has progressed from PhD work to a university spin-out, though the Scottish Enterprise funded Proof-of-Concept scheme. This spin-out has also involved patenting novel security software in three territories around the World. His current work includes collaboration of TSB Grants with Microsoft plc on a £2million project which aims to improve the care of the elderly using Trusted Cloud-based services, and with Chelsea and Westminster Hospital on a next generation Health Care platform. This also matches upwith other funded projects with the FSA and the Scottish Police. [Youtube lectures][My Twitter Page][My Wikipedia Page]

Outline

An academic is often benchmarked against other academics in other organisations by their publication record, their peer review activities, and their research income generation. Thus my CV is biased towards this. The following gives a summary of the work I am currently involved in. If you wish a fuller account, please contact me, and I'll try and outline some of the other things that I am interested in, and developing. It defines many of my mechanistic details, and does not outline any of my achieved which are not related to publishing. A CV is often an archive and illustrates past achievements, and does not really cover the present, and the future. It's strange in computing that job functions are often selected in terms of a CV, rather that in terms of a portfolio of work.

Name:

William Buchanan, PhD, FBCS, FIET CEng, MCP, BSc (Hons.)

Date of Birth:

6th March, 1961.

WWW page:

[Web Page]

Current Post:

Professor, School of Computing

Email:

w.buchanan@napier.ac.uk   

PDF version:

[Full CV] [Outline]

Telephone:

+44 (0)131 455 2759

Academic diary:

http://www.soc.napier.ac.uk/~bill/diary_current.html

   

Quick guide

MPhil/PhD Examinations

20 (one forthcoming)

MPhil/PhD Completions

12

Published Papers

150

Academic Books

24 (not including translations)

External Examinerships

5 (two current)

Current Post

Professor (Level 2)

Current PhD Supervisions

8

Research Grants (total)

over £4million

 

Employment

2005-Present

Professor, School of Computing, Napier University, Edinburgh.

2003-2005

Reader, School of Computing, Napier University, Edinburgh.

1989-2003

Senior Lecturer, School of Computing, Napier University, Edinburgh.

1996-Present

Series Editor (IT and Computing), Macmillan Press Ltd.

1989-Present

Consultant to several companies including British Gas plc, HMSO, Total and Mobil.

1991-1995

Director, Real-Time Technologies Ltd, Edinburgh.

1989-1990

Software Consultant, ABACUS Simulations Ltd, Glasgow.

1986-1989

Lecturer, Department of Electronics, Napier University, Edinburgh.

1986

Electronic Engineer, Racal-MESL, Edinburgh.

1985

Industrial Training, Royal Observatory, Edinburgh.

1984

Industrial Training, Racal-MESL Ltd, Edinburgh.

1983

Industrial Training, Royal Observatory, Edinburgh.

1977-1981

Apprentice Electrical Engineer, ICI Ltd, Grangemouth.

 

Qualifications

2010

Fellow of the BCS

2007

Cisco Regional Intructor, Network Security

2006

Fellow of IET (previously IEE)

2006

Microsoft XML Web Services (70-320) Certification

2006

Cisco 642-55 Certification, Securing Networks with PIX and ASA

2005

Cisco Regional Intructor, Wireless LANs

2005

Microsoft Certified Professional (MCP)

2001

Member of BCS.

2000 (and 2005)

Cisco Certified Instructor - Semester 1 -4

1996

PhD. Mathematical Modelling.

1993

CEng, MIEE.

1986

BSc (Hons) in Communications and Electronic Engineering. 2:1.

 

 

Funding

The following outlines some of my recent funding

Seven Layer Communications Ltd KTP

£71,140

DigitalDNA Proof-of-Concept

£215,000

Information Sharing between the Police and their Community Partners (Scottish Police)

£30,000

Data Capture and Auto Identification Reference (EPSRC/TSB)

£217,334 (80% FEC)

Callendar Estate Knowledge Transfer

£5,000

Summerhall KTP

£77,459

Digital forensic Toolkit (Scottish Enterprise)

£14,703

Canan KTP

£93,861

Fibrehub Europe Ltd KTP

£60,000

Cisco Local Academy

£10,638

QMAX Research

£23,356

KTP (to be awarded)

£110,806

Scaleable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures (EPSRC/TSB) 

£238,611 (80% FEC)

e-Health Public and Private Cloud (ESPRC)

£69,756

Grant to be awarded

£647,000

FSA PhD Studentship

£30,000

KTP Project (Justfone)

£120,000

KTP Project (Viasystems)

£120,000

Principal Awards

£24,000

Agilent award

£35,000

Symposium in Cybercrime

£10,000

Innovation award (Flexiant)

£5,000

Innovation award (Finance Prediction)

£5,000

Novel Fraud Investigation System (Nov 2011)

£300,000

Novel Informaton Sharing Architecture (Feb 2012)

£320,000

Innovation Voucher (Patient Reminders)

£5,000

Innovation Voucher (Urquart Taylor)

£5,000

Innovation Voucher (CoreBP)

£5,000

Innovation Voucher (Cloud Business)

£5,000

Innovation Voucher (TBA)

£5,000

SIPR Information Sharing Extension

£7000

Book/CD-ROM publications

  1. Buchanan WJ, "C for Electronic Engineering with Applied Software Engineering", Prentice-Hall International, April 1995, ISBN 0-13-342668-8.
  2. Buchanan WJ, "Applied PC Interfacing, Interrupts and Graphics", Addison-Wesley, June 1996, ISBN 0-201-87728-7. [Review]
  3. Buchanan WJ, "Data Communications and Computer Networks", Chapman & Hall, ISBN 0-412-75430-4.
  4. Buchanan WJ, "Microelectronic Systems: Design, Modelling and Test", Arnold, Jan. 1997, ISBN 0-340-67771-6.
  5. Buchanan WJ, "Mastering Global Information Systems", Macmillan, Sept. 1997, ISBN 0-333-68951-8. (and Chinese edition). Translated into several languages, including Chinese (2002).
  6. Buchanan WJ, "Mastering the Internet", Macmillan, Sept. 1997, ISBN 0-333-6926-6. (and Polish edition).
  7. Buchanan WJ, "Advanced Data Communications and Networks", Chapman & Hall, Sept. 1997, ISBN 0-412-80630-4.
  8. Buchanan WJ, "Software Development for Engineers (C++/ Pascal/ Assembly/ Visual Basic/ HTML/ JavaScript and Java)", Arnold, October 1997, ISBN 0-340-70014-9.
  9. Buchanan WJ, "Advanced PC Interfacing, Communications and Windows Programming", Addison-Wesley, Apr. 1998, Nov. 1998. ISBN 0-201-87728-7. Translated into several languages, including Chinese and Japanese editions 2002.
  10. Buchanan WJ, "Handbook of Data Communications and Networks", Kluwer, Jan. 1998, ISBN 0-412-84060-0.
  11. Buchanan WJ, "Mastering Pascal and Delphi", Macmillan, Apr. 1998. ISBN 0-333-73007-0. Top 100 Bestseller on Amazon.co.uk (January 2000). No.1 Pascal book in the UK / No3. for Delphi. [Review] No. 1 Pascal in W.H.Smiths/
  12. Buchanan WJ, "Mastering Java", Macmillan, Apr. 1998, ISBN 0-333-73008-9. [Review 1/ Review 2]
  13. Buchanan WJ, "Software Development", John Wiley & Sons. December 1997. ISBN 0-471-85266-2.
  14. Buchanan WJ, "CD-ROM Handbook of Data Communications & Networks", Kluwer, May 1998. ISBN- 0-412-84060. 2nd edition due out soon.
  15. Buchanan WJ, "Mastering Windows NT, Novell NetWare and UNIX", Macmillan, Apr. 1999. ISBN 0-412-84060. Top 10 Novell NetWare book in the UK.
  16. Buchanan WJ, "Mastering Networks", Macmillan, Apr. 1999. ISBN 0-333-748042. Top 100 Bestseller on Amazon.co.uk (Autumn 1999).
  17. Buchanan WJ, "Computer Busses", November 1999, Arnold, ISBN 0-340-74076. Parts used by Yale University for their Engineering & Applied Science Library display as part of a Tercentennial celebrations.
  18. Buchanan WJ and Wilson A, "Advanced PC Architecture", Addison-Wesley Longman, Spring 2000, ISBN 0-201-39858-3.Tranlated into Chinese edition - Chinese Electric Power Press of Beijing (2003)
  19. Buchanan WJ, "Wiedziec wieceg Internrt", Oct 1999. (Polish edition). ISBN 83-206-1283-7.
  20. Buchanan WJ, "Mastering Computing", ISBN 0333748069, Palgrave. Polish edition [Picture].
  21. Buchanan WJ, "Mastering Delphi", Jan 2003, Macmillan.
  22. Buchanan WJ, "Distributed Systems and Networks", McGraw-Hill, June 2000, ISBN 0-077-09583-9.Translated in Indian by Tata McGraw-Hill (2004).
  23. Buchanan, W. (2010). Introduction to Security and Network Forensics ( ed.). : CRC Press. [Amazon] [Visit home page of book]
  24. Buchanan, W. (2011). Advanced Cloud and Virtualisation ( ed.). : . CRC Press.
 

Academic publishing

  1. Buchanan, W. (2012, June). Innovation in Cloud Environments. Paper presented at Future of Technology, Royal Society of Edinburgh.
  2. Bani Khalaf, M., Al-Dubai, A., Buchanan, W. (2012). A New Efficient Distributed Route Discovery for Wireless Mobile Ad hoc Networks. In: the 11th IEEE International Wireless Telecommunications Symposium. IEEE Communication Society.
  3. Lo, O., Fan, L., Buchanan, W., Thuemmler, C. (2012). Technical Evaluation of an E-Health Platform. IADIS E-Health 2012.
  4. Buchanan, W., Fan, L., Ekonomou, E., Lo, O. (2012). Cloud4Health. Paper presented at Symposium on the Future of e-Health, Edinburgh 
  5. Buchanan, W. (2012, June). Introducing Cloud-based virtualised environments and their use in supporting learning and teaching. Paper presented at Enhancing, extending and empowering student learning within online environments, Edinburgh.
  6. Buchanan, W. (2012). Future Risks – Including The Rise of the Hacktivism. In: National Information Security Conference (NISC).
  7. Buchanan, W. (2012). Education & Training for Future Threats. Paper presented at ITEC 2012, London.
  8. Lo, O., Fan, L., Buchanan, W., Thuemmler, C., Lawson, A. (2012). Towards Simulation of Patient Data for Evaluation of E-Health Platform and Services. Paper presented at 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool.
  9. Buchanan, W., Fan, L., Lo, O., Ekonomou, E. (2012). HOLISTIC HEALTHCARE WITHIN DYNAMIC INFORMATION INFRASTRUCTURES - THE CLOUD BASED eHEALTH PLATFORM. Paper presented at eHealth 2012, Dynamic Earth, Edinburgh
  10. Buchanan, W. (2012). New Threats. Paper presented at Transatlantic Conference 2012, Edinburgh
  11. Lo, O., Fan, L., Buchanan, W., Thuemmler, C., Lawson, A. (2012). Towards Simulation of Patient Data for Evaluation of E-Health Platform and Services. Paper presented at 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool.
  12. Thuemmler, C., Fan, L., Buchanan, W., Lo, O., Ekonomou, E., Khedim, A. (2012). E-Health: Chances and Challenges of Distributed, Service oriented Architectures. Journal of Cyber Security and Mobility, 37(52)
  13. Uwagbole, S., Buchanan, W., Fan, L. (2012). Novel Tracking of Rogue Network Packets Using Danger Theory Approach. 11th European Conference on Information Warfare and Security (ECIW-2012).
  14. Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., Thuemmler, C. (2012, May). Integrating Assisted Living with Primary and Secondary Health Care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing, Edinburgh (invited keynote).
  15. Buchanan, W., Kwecka, Z., Ekonomou, E. (2012). A Privacy Preserving Method using Privacy Enhancing Techniques for Location Based Services. Mobile Networks and Applications, (Security & Privacy in Wireless Networks). 10.1007/s11036-012-0362-6 [Paper]
  16. Buchanan, W., Macfarlane, R., Graves, J., Fan, L., Ekonomou, E., Bose, N. (2012, March). Cloud Forensics. Paper presented at International Seminar on Policing Digital Crime, Netherlands (invited keynote).
  17. Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C. (2012, ). Case Study: Moving Towards an e-health Platform to Store NHS Patient Information in the Cloud. Paper presented at Cloud Computing in the Public Sector: The Way Forward, London (invited keynote).
  18. Buchanan, W. (2012, Feb). Skills for cyber security. Paper presented at Cybercrime and Data Protection, Dynamic Earth, Edinburgh (invited talk - end note speech).
  19. Buchanan, W., Fan, L., Ekonomou, E., Thuemmler, C. (2012). Patient Centric Health Care: An Integrated and Secure, Cloud-based, e-Health Platform. Paper presented at BCS Branch Meeting, University of Edinburgh Informatics Forum (invited talk).
  20. Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C., Lawson, A. (2012). The UK’s eHealth Cloud Project: EHR And The Cloud: Assessing The Benefits And Mitigating The Risks. Paper presented at Arab Health 2012 (Electronic Healthcare Records), Dubai (invited paper).
  21. Fan, L., Buchanan, W., Lo, O., Theummler, C., Lawson, A., Uthmani, O., Ekonomou, E., Khedim, A. (2012). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In: eTELEMED 2012, pp 99-104.
  22. Ekonomou, E., Buchanan, W., Fan, L., Thuemmler, C. (2011). An Integrated Cloud-based Healthcare Infrastructure. In: IEEE CloudCom '11. Athens, Greece: IEEE, pp 532 - 536. [Paper]
  23. Buchanan, W. (2011). How Academic IT Departments Manage Changing IT Environments. VitAL, 5, (1), 26-32.
  24. Buchanan, W., Fan, L., Theummler, C., Lo, O., Ekonomou, E. (2011, Sept). Cloud-based e-Health System. Paper presented at BCS Health Informatics, Edinburgh.
  25. Buchanan, W. (2011, Sept). Creation of Dynamic Environments for Virtualised and Cloud-based Teaching in Digital Forensics and Computer Security. Paper presented at CFET, Canterbury. Invited Keynote speech.
  26. Kwecka, Z., Buchanan, W., Spiers, D.. (2011). Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform. International Journal of Information Technologies and Systems Approach (IJITSA) : Special issue on Privacy and Security Issues in IT, 4(2), 12-31. [Paper]
  27. Fan, L., Buchanan, W., Thuemmler, C., Lo, O., Khedim, A., Uthmani, O., Lawson, A., Bell, D. (2011). DACAR Platform for eHealth Services Cloud, IEEE Cloud 2011. [Paper][Presentation]
  28. Buchanan, W. (2011). How Academic IT Departments Manage Changing IT Environments. VitAL, 5 (1), 26-32. [Link]
  29. Uthmani, O., Buchanan, W., Lawson, A., Scott, R., SCHAFER, B., Fan, L. (2011). Crime Risk Evaluation within Information Sharing between the Police and Community Partners. Information & Communications Technology Law, 20(2), 57 - 81. [Paper]
  30. Scott, R., Uthmani, O., Buchanan, W., Lawson, A. (2011, June). Intelligence Information Sharing between the Police and their Community Partners. Paper presented at Symposium on Security and Cybercrime, Edinburgh Napier University.
  31. Buchanan, W. (2011, June). Next Generation Secure e-Health Platform. Paper presented at BCS ISSG seminar "The Insider Threat", Edinburgh. [Presentation]
  32. Buchanan, W. (2011, June). D-FET – A Community Cloud for Enhancing Skills using Virtualised Environments and Cloud-based Infrastructures. Paper presented at Scottish Higher Education Employability Conference: Strengthening Partnerships with Employers, Heriot-Watt, Edinburgh. [Presentation]
  33. Buchanan, W. (2011, ). Making assessment and feedback fun: feedback before and after assessments. Paper presented at Edinburgh Napier University Staff Conference, Edinburgh Napier University. [Presentation]
  34. Buchanan, W. (2011, May). A next generation Cloud-based health care platform. Paper presented at Innovation in Healthcare, London.
  35. Miehling, M., Buchanan, W., Lawson, A. (2011). Affliate Advertising Fraud and an Investigatory. In: (Ed.) CyberForensics 2011, , () ( ed.). (pp. ). Glasgow: . . (accepted) [Paper]
  36. Macfarlane, R., Buchanan, W., Ekonomou, E., Uthmani, O., Fan, L., Lo, O. (2011). Review of Security Policy Implementations. Computers & Security. (submitted) [paper]
  37. Miehling, M., Buchanan, W., Lawson, A. (2011, August). Detection Framework for the Reduction of Click-through and ID Theft Fraud in Affiliate Marketing. Paper presented at SCONE, Glasgow.
  38. Buchanan, W., Flandrin, F., Macfarlane, R., Graves, J. (2011). A Methodology to Evaluate Rate-Based Intrusion Prevention System against Distributed Denial-of-Service (DDoS). In: (Ed.) Cyberforensics 2011 (accepted) [Paper]
  39. Buchanan, W., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., Bose, N., Ludwiniak, R. (2011). Cloud-based Digital Forensics Evaluation Test (D-FET) Platform. Cyberforensics 2011. (accepted) [paper]
  40. Uthmani, O., Buchanan, W., Lawson, A. (2011, August). Risk Analysis for Criminal Context in Information Sharing Policies. Paper presented at SCONE, Glasgow.
  41. Buchanan, W. (2011). Advanced Cloud and Virtualisation ( ed.). : . CRC Press.
  42. Buchanan, W., Kwecka, Z. (2011). A Novel Privacy Preserving Method for the Location Tracking of Mobile Devices. The Journal of Mobile Communication, Computation and Information: Special Issue on Security (accepted). [Paper]
  43. Buchanan, W., Yampolsky, V., Lawson, A. (2011). Comparison of the Power Consumption Consumption and Carbon Footprint of a Cloud Infrastructure against Standard Desktops. The Computer Journal (submitted).
  44. Buchanan, W. (2011, ). Student Perception of On-line Lectures with a Blended Learning Environment. Paper presented at Edinburgh Napier University Staff Conference, Craiglockhart. [Presentation]
  45. Buchanan, W., Graves, J., Bose, N., Macfarlane, R., Davison, B., Ludwiniak, R. (2011). Performance and Student Perception Evaluation of Cloud-based Virtualised Security and Digital Forensics Labs. HEA ICS Conference. [Paper]
  46. Buchanan, W. (2010). Introduction to Security and Network Forensics ( ed.). : Auerbach Publications. [Amazon]
  47. Buchanan, W. (2010). 3DES Encryption and Decryption in Microsoft .NET. CDCS. [Paper]
  48. Bani Khalaf, M., Al-Dubai, A., Buchanan, W. (2010). A New Adaptive Broadcasting Approach for Mobile Ad hoc Networks. In: (Ed.) Proceedings of 2010 6th Conference on Wireless Advanced (WiAD) . (pp. 1-6). London: IEEE Computer Society. [Paper]
  49. Buchanan, W. (2010). AES Encryption and Decryption in Microsoft .NET. CDCS. [Paper]
  50. Buchanan, W., Thuemmler, C., Fan, L., Lo, O., Khedim, A. (2010, August). Information sharing framework: Next Generation e-Health Cloud. Paper presented at BCS Health Informatics Scotland, Glasgow. [Presentation]
  51. Migas, N., Buchanan, (2010). Ad-hoc Routing Metrics and Applied Weighting for QoS support. International Journal of Parallel, Emergent, and Distributed Systems, 25, (4).
  52. Smith, M., Buchanan, W., Bell, D., Hazelhoff Roelfzema, N. (2010). Analysis of Information Governance and Patient Data Protection within Primary Health Care. International Journal for Quality in Health Care.
  53. Buchanan, W., Thuemmler, C., Fan, L., Lo, O., Khedim, A. (2010, September). An e-Health Cloud. Paper presented at Cloud Computing for the Public Sector, Edinburgh.
  54. Miehling, M., Buchanan, W., Old, L.., Batey, A., Rahman, A. (2010). Analysis of Malicious Affiliate Network Activity as a Test Case for an Investigatory Framework. In: (Ed.) 9th European Conference on Information Warfare and Security . (pp. ). Greece: . [Paper]
  55. Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., , Uthmani, O. (2010). Interagency data exchange protocols as computational data protection law. In: (Ed.) 23rd International Conference on Legal Knowledge and Information Systems . (pp. ). University of Liverpool, 16th-17th December 2010. [Paper]
  56. Buchanan, W. (2010). RC2 Encryption and Decryption in Microsoft .NET. CDCS. [Paper]
  57. Mason, A., Dingle, N., Knottenbelt, W., Bell, D., Buchanan, W., Thuemmler, C. (2010). Modelling infection spread using location tracking. Int. J. Healthcare Technology and Management,, 11, (6), 442-461. [Paper]
  58. Buchanan, W., Uthmani, O. (2010, February). Novel Information Sharing Architecture between the Police and their Community Partners. Paper presented at Scottish Networking Event 2010, Napier University, Edinburgh. [Presentation]
  59. Uthmani, O., Buchanan, W., Lawson, A., Fan, L. (2010). Novel Information Sharing Syntax for Data Sharing Between Police and Community Partners, Using Role-Based Security. Proceedings of the 9th European Conference on Information Warfare and Security , 394-402. [Paper]
  60. Buchanan, W., Graves, J., Bose, N. (2010). Patent: IMPROVEMENTS IN OR RELATING TO DIGITAL FORENSICS ( ed.). : . [Details]
  61. Kwecka, Z., Buchanan, W., Spiers, D. (2010). Privacy-preserving data acquisition protocol. In: (Ed.) IEEE International Conference of Computational Methods in Electrical and Electronics Engineering . (pp. 131 - 136). Listvyanka: IEEE. [Paper]
  62. Buchanan, W., Macfarlane, R., Ludwiniak, R. (2010). Student Perception of On-Line Lectures with a Blended Learning Environment. Paper presented at The 4th International Conference on Cybercrime Forensics Education & Training, Canterbury. . [Paper]
  63. Buchanan, W., Lo, O. (2010). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In: (Ed.) 9th European Conference on Information Warfare and Security . (pp. ). Greece: . [Paper]
  64. Kwecka, Z., Buchanan, W., Spiers, D. (2009). Application and Analysis of Private Matching Schemes Based on Commutative Cryptosystems. In: (Ed.) 8th European Conference on Information Warfare and Security . (pp. ). Lisbon: . [Paper]
  65. Buchanan, W., (Eds.), (2009). International Journal of Healthcare Technology and Management: Special Issue on Patient-Centric Modelling and Enhanced Security in Distributed Healthcare Systems, 10 (1/2), ( ed.). : Inderscience.
  66. Garrigues, C., Migas, N., Buchanan, W., Robles, S. (2009). Protecting mobile agents from external replay attacks. Journal of Systems and Software Journal of Systems and Software, 82, (2), 197-206. [Paper]
  67. Thuemmler, C., Buchanan, W., Fekri, H., Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management , 10, (1-2), 119 - 131.
  68. Migas, N., Buchanan, W. (2008). Ad-hoc Routing Metrics and Applied Weighting for QoS support. In: (Ed.) 22nd IEEE International Parallel & Distributed Processing Symposium . (pp. 1 - 8 ). Miami, FL: IEEE.
  69. Kwecka, Z., Buchanan, W., Saliou, L. (2008). Validation of 1-N OT Algorithms in Privacy-Preserving Investigations. In: (Ed.) 7th European Conference on Information Warfare and Security . (pp. ). [Paper]
  70. Lawson, A., Buchanan, W. (2007, ). Challenge-based Learning Framework for Teaching Programming Skills. Paper presented at HEA-ICS 7th Programming Workshop, University of Kent, Canterbury, 2nd April 2007.
  71. Migas, N., Buchanan, W. (2007). Mass Customisation through Personalised Brochures: the Role of Digital Printing. The 15th European Conference on Information Systems. [Paper]
  72. Saliou, L.., Buchanan, W., Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: Remenyi, D. (Ed.) 6th European Conference on Information Warfare and Security . (pp. 227-235). Shrivenham, UK: Academic Conferences International. [Paper]
  73. Saliou, L., Buchanan, W., , Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: (Ed.) 6th European Conference on Information Warfare and Security . (pp. 227-235). Shrivenham, UK,: . [Paper]
  74. Thuemmler, C., Buchanan, W. (2007). Setting Safety Standards by Designing a Low-budget and Compatible Patient Identification System based on Passive RFID Technology. International Journal of Healthcare Technology and Management (IJHTM), 8, (5), 571-583. [Paper]
  75. Buchanan, W. (2007). The Handbook of Data & Networks Security 1 (1 ed.). : Springer-Verlag New York, Inc. Secaucus, NJ, USA.
  76. Abimbola, A., , Buchanan, W (2006). A Framework to detect novel Computer Viruses via System Calls. In: Merabti, M., Pereira, R., Abuelma'atti, O. (Eds.) 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting . (pp. 308-313). John Moores University, Liverpool, UK: . [Paper]
  77. Buchanan, W., (2006). Analysis of an Agent-based Metric-Driven for Ah-hoc, On-Demand Routing. Journal of Ad-hoc Networks, 4, (2), 146-167. [Paper]
  78. Saliou, L., Buchanan, W., Munoz, J. (2006). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In: Hutchinson, B. (Ed.) 5th European Conference on Information Warfare and Security . (pp. 205-214). Helsinki, Finland: . [Paper]
  79. Abimbola, A., Munoz, J., Buchanan, W. (2006). Enhancing Intrusion Detection via a Active Target Host. In: (Ed.) IEEE ICTe Africa 2006 . (pp. ). Kenya: IEEE Computer Society Press. [Paper]
  80. Abimbola, A., Munoz, J., Buchanan, W. (2006). Investigating False Positive Reduction in HTTP via Procedure Analysis. In: (Ed.) IEEE International Conference on Networking and Services . (pp. 87 - 87). Slicon Valley, CA: IEEE Computer Society Press. [Paper]
  81. Buchanan, W. (2006). Mastering Information Technology (Palgrave Masters Series (Computing)) 1 (1 ed.). : Palgrave.
  82. Abimbola, A., Munoz, J., Buchanan, W. (2006). NetHost-Sensor: Investigating the Capture of End-To-End Encrypted Intrusive Data. Computers & Security, 25, (6), 445-451. [Paper]
  83. Abimbola, A., Munoz, J., Buchanan, W. (2006). NetHost-sensor: Monitoring a target host's application via system calls. Information Security Tech. Report, 11, (4), 166-175. [Paper]
  84. Graves, J., Buchanan, W., Saliou, L., Old, L. (2006). Performance Analysis of Network Based Forensic Systems for In-line and Out-of-line Detection and Logging. In: Hutchinson, B. (Ed.) 5th European Conference on Information Warfare and Security . (pp. 41-50). Helsink, Finland: Academic Conferences International. [Paper]
  85. Buchanan, W., , Saliou, L.(2005). Agent-based Forensic Investigations with an Integrated Framework. In: Hutchinson, W. (Ed.) 4th European Conference of Information Warfare and Security . (pp. 47-52). Glamorgan, United Kingdom: Academic Conferences International. [Paper]
  86. Buchanan, W., Munoz, J., (2005). Critical Analysis and Error Determination of Locating-finding Techniques in GSM. International Journal of Mobile Communications (IJMC), 3, (2), 165-182. [Paper]
  87. Migas, N., Buchanan, W. (2005). Metric Evaluation of Embedded Java-based Proxies on Handheld Devices in Cluster-based Ad-hoc Routing. ECBS '05 Proceedings of the 12th IEEE International Conference and Workshops on Engineering of Computer-Based Systems , 147 - 154. [Paper]
  88. Saliou, L.., Buchanan, W., Munoz, J. (2005). Novel Framework for Automated Security Abstraction, Modelling and Verification. In: Hutchinson, W. (Ed.) 4th European Conference on Information Warfare and Security . (pp. 303-311). Glamorgan, United Kingdom: Academic Conferences International. [Paper]
  89. Buchanan, W., (2004). Agent-based Clustering over Ad-hoc Networks. Expert Update .
  90. Buchanan, W., (2004). Agent-based Systems for Ah-hoc Routing in Wireless Networks. In: (Ed.) BCS Symposium/Colloquium on Mobile and Complex Agent Applications . (pp. ). Napier University, Edinburgh: .
  91. Abimbola, A., Munoz, J., Buchanan, W.Buchanan, W. (2004). Analysis and Detection of Cruising Computer Viruses. 3rd International Conference on Electronic Warfare and Security (EIWC) , .
  92. Raja, K., Buchanan, W., Munoz, J. (2004). Analytical Review of Mobile Phone-based Location-finding. IEE Communication Engineer.
  93. Migas, N., Buchanan, W., (2004). Benchmarking bandwidth and resource consumptions of Java-based proxy PDAs in ad-hoc networks. Expert Update.
  94. Buchanan, W. (2004). Correlation between academic and skills-based tests in computer networks. British Journal of Education Technology (BJET), Volume 37, Number 1, January 2006 , pp. 69-78(10).
  95. Buchanan, W. (2004). Covert Channel Analysis and Detection using Reverse Proxy Servers. 3rd International Conference on Electronic Warfare and Security (EIWC) .
  96. Buchanan, W., Saliou, L. (2004). Enhanced Methods of Coursework Provision of Computing. IEEE International Conference on Information Technology: Research and Education , 111 - 115.
  97. Buchanan, W. (2004). Llamas D, Covert Channel Analysis and Detection using Reverse Proxy Servers. 3rd International Conference on Electronic Warfare and Security (EIWC .
  98. Buchanan, W., Raja, K., (2004). Migration of Location Services from GMS to 3G. 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on , 352 - 358 .
  99. Migas, N., Buchanan, W., (2004). Migration of Mobile Agents in Ad-hoc Wireless Networks. Engineering of Computer-Based Systems, 2004. Proceedings. 11th IEEE International Conference and Workshop on the , .
  100. Buchanan, W. (2004). Network-based Computer Forensics for Misuse Detection. Industrial Management & Data Systems (IMDS) Journal.
  101. Buchanan, W. (2004). Replacing Courseworks with Practical Assessments in Computer Networks. Napier Teaching Fellow’s Journal.
  102. Buchanan, W. (2004). The handbook of data communications and networks 1 (2 ed.). : KLUWER ACADEMIC PUBLISHERS.
  103. Buchanan, W. (2004). Uzytkowanie Komputerow ( ed.). : Wkt (Poland).
  104. Abimbola, A., , Buchanan, W.Buchanan, W. (2004). Viral-Net System Via Autonomous Agent Technology. BCS Symposium/Colloquium on Mobile and Complex Agent Applications , .
  105. Buchanan, W., Raja, K., (2004). We know where you are [Location tracking]. Communications Engineer , 2 , (3), 34 - 39 .
  106. Migas, N., Buchanan, W., (2003). MARIAN: A Framework using Mobile Agents for Routing, Topology Discovery and Automatic Network Reconfiguration in Ad-hoc Networks. IADIS International Conference, WWW/Internet 2003 .
  107. Migas, N., Buchanan, W., (2003). Mobile Agents for Routing, Topology Discovery, and Automatic Network Reconfiguration in Ad-Hoc Networks. IEEE ECBS 2003 , 200 - 206 .
  108. Buchanan, W. (2003). Robust and Flexiable Control: The CAN bus. In: (Ed.) Fieldbus Technology: Industrial Network Standards for Real-Time Distributed Control . (pp. ). : .
  109. Pikoulas, J., Buchanan, W., (2002). An Intelligent Agent Security Intrusion System. Engineering of Computer-Based Systems, 2002. Proceedings. Ninth Annual IEEE International Conference and Workshop on the , 94-99.
  110. Buchanan, W. (2002). Complete Handbook of the Internet ( ed.). : Kluwer Academic Publishers Norwell, MA, USA.
  111. Golam (MPhil), H., H., Buchanan, W., Munoz, J. (2002). Component-based Tools Platform for Network Testing. IEEE ECBS 2003 .
  112. Brown, E.Brown, E., Buchanan, W. (2002). EML in the Support of Minority Languages. LSTN 2002 , .
  113. Buchanan, W. (2002). Mastering Computing ( ed.). : Macmillan Press.
  114. Buchanan, W. (2002). Mastering Delphi Programming ( ed.). : Palgrave Publishers.
  115. Migas, N., Buchanan, W., (2002). Mobile Agetns for Routing, Topology Discovery and Automatic Network Reconfiguration. IEEE ECBS 2002 , .
  116. Lewis, O., , Buchanan, W. (2002). Performance Issues of Variability Design for Embedded System Product Lines. Fraunhofer IESE Technical Report 070.00/E , .
  117. Buchanan, W., Brown, E. (2002). Towards a Reusable and Reconfigurable WWW, System-Level Issues and Approaches in Software Development. IEEE 26th Annual International Computer Software and Applications Conference, , 814 - 815.
  118. Pikoulas, J., Buchanan, W., , Triantafyllopoulos, K. (2001). An Agent Based Bayesian Forecasting Model for Enhanced Network Security. In: (Ed.) Engineering of Computer Based Systems, 2001. ECBS 2001. Proceedings. Eighth Annual IEEE International Conference and Workshop on the (April). (pp. 247 - 254). Washington: IEEE.
  119. Buchanan, W. (2001). PC Interfacing, Communications and Windows Programming (Chinese ed.). : Addison Wesley.
  120. Pikoulas, J., , Buchanan, W. (2000). "Software Agents and Computer Network Security. In: (Ed.) Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the (April). (pp. 211-217).
  121. Buchanan, W., Wilson, A.(2000). Advanced PC Architecture ( ed.). : Addison-Wesley.
  122. Buchanan, W., Scott, A., Mannion, M., Naylor, M., Pikoulas, J.Pikoulas, J. (2000). Agents, Network Security and Network Management. In: (Ed.) Distributed Systems and Networks . (pp. 600-640). : Addison-Wesley.
  123. Buchanan, W. (2000). Computer Busses ( ed.). : Butterworth-Heinemann Newton, MA, USA.
  124. Buchanan, W. (2000). Computer Busses - The Complete Guide ( ed.). : CRC Press, Inc. Boca Raton, FL, USA.
  125. Buchanan, W. (2000). Distributed Systems and Networks ( ed.). : McGraw-Hill.
  126. Buchanan, W., Naylor, M.., Scott, A. (2000). Enhancing network management using mobile agents. In: (Ed.) Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop on the . (pp. 218-226). : .
  127. Scott, A., Buchanan, W. (2000). Truly distributed control systems using fieldbus technology. In: (Ed.) Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the Issue Date: 2000 . (pp. 165-173). Edinburgh , UK : IEEE.
  128. Buchanan, W., Scott, A. (1999). AOI false rejects PCB manufacture. Printed Circuit Fabrication, 22, (10), 34-37.
  129. Scott, A., Buchanan, W. (1999). Excluding inclusions PCB inspection. Journal of Manufacturing Engineer, 78, (4), 154-156.
  130. Buchanan, W. (1999). Handbook of Data Communications and Networks 1 (1 ed.). : Kluwer.
  131. Pearson, B., Buchanan, W. (1999). Intelligent Methods in Industrial Control. In: (Ed.) EPSRC PREP '99 . (pp. ). : .
  132. Buchanan, W. (1999). Java Sockets and Integration with HTTP. Visual Systems Journal .
  133. Buchanan, W. (1999). Mastering Global Information Systems (Chinese ed.). : Bejing Press.
  134. Buchanan, W. (1999). Mastering Microsoft Windows, Novell NetWare and UNIX ( ed.). : Palgrave Publishers.
  135. Buchanan, W. (1999). PC Interfacing, Communications and Windows Programming ( ed.). : Addison-Wesley Longman Ltd. Essex, UK, UK.
  136. Scott, A., Buchanan, W.(1999). Sources and Causes of Tadpoles. PCB Fab , .
  137. Scott, A., Buchanan, W.(1999). Sources of Inclusions in Laminates. IEE Journal in Engineering Manufacture.
  138. Buchanan, W., Scott, A.(1999). Tadpole inclusions in laminate structures PCB AOI. Printed Circuit Fabrication, 22, (11), 58-62.
  139. Buchanan, W. (1999). Wiedziec wieceg Internet ( ed.). : .
  140. Buchanan, W. (1998). Advanced Data Communications and Networks ( ed.). : Kluwer Academic Publishers Norwell, MA, USA.
  141. Buchanan, W. (1998). Advanced PC Interfacing, Communications and Windows Programming ( ed.). : Addison-Wesley.
  142. Buchanan, W. (1998). CD-ROM Handbook of Data Communications & Networks ( ed.). : Kluwer.
  143. Buchanan, W. (1998). Mastering Java ( ed.). : Macmillan Press.
  144. Buchanan, W. (1998). Mastering Pascal and Delphi (2nd ed.). : Macmillan Press.
  145. Buchanan, W., Gupta, N. (1997). A Novel Parallel Processing Synchronisation Method for Observing Electric Fields in and around PCBs. International Journal of Electronics, 82, (1), 61-67.
  146. Buchanan, W. (1997). Applied PC Interfacing, Interrupts and Graphics ( ed.). : Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA.
  147. Buchanan, W. (1997). Mastering Global Information Systems (English ed.). : Macmillan Press.
  148. Buchanan, W. (1997). Mastering the Internet ( ed.). : Palgrave Publishers.
  149. Buchanan, W. (1997). Microelectronic Systems: Design, Modelling and Test ( ed.). : Arnold.
  150. Buchanan, W. (1997). Software Development ( ed.). : Butterworth-Heinemann Newton, MA, USA.
  151. Buchanan, W. (1997). Software Development for Engineers with C, Pascal, C++, Assembly Language, Visual Basic, HTML, Javascript and Java ( ed.). : John Wiley & Sons, Inc. New York, NY, USA.
  152. Buchanan, W. (1997). Wiedziec wiecej Internet ( ed.). : Wkt (Poland).
  153. Buchanan, W. (1996). Data Communications and Computer Networks ( ed.). : Chapman and Hall.
  154. Buchanan, W., Gupta, N.. (1996). Machine independent algorithm for concurrent finite-element problems. In: (Ed.) 3rd International IEEE Conference on Computation in Electromagnetics, 1996, Conf. Publ. No.420, ((Conf. Publ. No.420). (pp. 17-20). London, UK: .
  155. Buchanan, W., Cordiner (MPhil.), S. (1996). Turbocompressor Control using Fuzzy Logic. In: (Ed.) EPSRC Neural Networks Symposium, 1996 (September). (pp. ). University of Edinburgh: .
  156. Buchanan, W. (1995). C for Electronic Engineering with Applied Software Engineering ( ed.). : Prentice-Hall, Inc. Upper Saddle River, NJ, USA.
  157. Buchanan, W., Gupta, N. (1995). Prediction of Electric Fields from Conductors on a PCB by 3D Finite-Difference Time-Domain Method. IEE Engineering, Science and Education Journal, 4, (4), 177-182.
  158. Buchanan, W., Gupta, N. (1995). Prediction of Electric Fields in and around PCBs - 3D Finite-Difference Time-Domain Approach with Parallel Processing. Journal of Advances in Engineering Software .
  159. Buchanan, W., Gupta, N., Arnold, J. (1994). 3D FDTD Method in a Microstrip Antenna's Near-Field Simulation. In: (Ed.) 2nd International Conference on Computation in Electromagnetics, 1994 (April). (pp. ). : .
  160. Buchanan, W., Gupta, N., Arnold, J. (1994). Application of 3D Finite-Difference Time- Domain (FDTD) method to predict radiation from a PCB with high speed pulse propagation. In: (Ed.) 9th International IEE Conference on Electromagnetic Compatibility (August). (pp. 287-291). University of Manchester, UK: IEE.
  161. Buchanan, W., Gupta, N. (1993). Enhancements for the 3D FDTD Method. In: (Ed.) FDTD (Antennas) Section (July). (pp. ). Queen Mary’s and Westfield College: .
  162. Buchanan, W., Gupta, N. (1993). Maxwell's Equations in the 21st Century. IJEEE, 30, (4).
  163. Buchanan, W., Gupta, N. (1993). Parallel Processing Techniques in EMP Propagation using 3D Finite-Difference Time-Domain (FDTD) Method. Journal of Advances in Engineering Software, 18, (3), 149-159.
  164. Buchanan, W., Gupta, N. (1993). Simulation of Electromagnetic Pulse Propagation in Three- Dimensional Finite Difference Time-Domain Method using Parallel Processing Techniques. In: (Ed.) 2nd International Conference on Software for Electrical Engineering Analysis and Design. Electrosoft '93 . (pp. ). Southampton, UK: .
  165. Buchanan, W., Gupta, N. (1993). Simulation of near-field radiation for a Microstrip antenna using the 3D FDTD method. In: (Ed.) NRSC 93 Colloquium (April). (pp. ). University of Leeds: .
  166. Buchanan, W., Gupta, N., Arnold, J. (1993). Simulation of Radiation from a Microstrip Antenna using Three-Dimensional Finite-Difference Time-Domain (FDTD) Method. In: (Ed.) 8th International Conference on Antennas and Propagation, 1993 (April). (pp. 639 - 642). Edinburgh: IEE.
  167. Buchanan, W., Gupta, N. (1992). Computers as Applied to Time-Domain Methods in Electrical Engineering. In: (Ed.) World Conference on Engineering Education, 1992 . (pp. ). University of Portsmouth, UK: .
  168. Buchanan, W., Gupta, N. (1992). Parallel Processing of the Three-Dimensional Finite-Difference Time-Domain Method. In: (Ed.) NRSC (July). (pp. ). University of Bradford: .
  169. Buchanan, W., Gupta, N. (1991). Simulation of three-dimensional finite-difference time-domain method on limited memory systems. In: (Ed.) International Conference on Computation in Electromagnetics . (pp. 75-78). , IEE, Savoy Place, London: IEE.
  170. Buchanan, W. (1988). Microwaves in the laboratory. In: (Ed.) IEE Colloquium on 'Teaching Antennas and Propagation to Undergraduates', 1988, Digest No.84, ((Digest No.84)). (pp. 10-12). London, UK: IEE.
 

 

 

PhD/MPhil Examinations

  1. PhD Examination, Forthcoming [University of Plymouth].
  2. PhD Examination, June 2011 [University of Essex].
  3. PhD Examination, Sept 2010 [UWS].
  4. MPhil Examination, Dec 2007 [Robert Gordon's University].
  5. PN Codes, PhD, Dec 2005.
  6. Combinational Logic Synthesis Based on the Dual Form of Reed-Muller Representation, PhD, May 2005.
  7. ATM Networks, Mobile Networks, PhD, Jan 2005.
  8. PhD, Autumn 2004 [University of Ulster].
  9. PhD Examination (SoE), Napier University, 2004.
  10. PhD Examination (SoC), Napier University, 2004.
  11. PhD Examination, Autumn 2004 [Loughborough University].
  12. Low power design of state machines, Y Xia., March 2003 (PhD).
  13. The Migration Processes of Mobile Agents, P.Braun, 2003 (PhD) [University of Jena].
  14. Case-Based Reasoning and Evolutionary Design, Dominic Job, October 2001 (PhD).
  15. Process Support for Component Factories on the Internet, P. Taylor, 2001 (PhD, Feb 2001).
  16. Speed Improvements to the RSA Encryption Method, H.Wang, November 2000 (MPhil).
  17. Fitness Landscapes and Search in the Evolutionary Design of Digital Circuits, Vesselin Vassilev, 2000 (PhD).
  18. Optimal Testing of Multilevel Logic Circuits, Alexandre Bystrov, 1999 (PhD).  
  19. Adaptive Channel Estimators Suitable for Implementation in a Coherent Digital Receivers Operating in a Mobile Satellite Environment, Andres Lang, 1999 (PhD).
  20. Fuzzy Logic Control of Turbocompressors, Steven Cordiner, 1998 (MPhil).
 

PhD/MPhil Completions

  1. Fuzzy Logic Control of Turbocompressors, Steven Cordiner (MPhil). Director of Studies. Completion: 1998.
  2. Speed Improvements to the RSA Encryption Method, H.Wang (MPhil). Director of Studies. Completion: November 2000.
  3. Performance Issues of Variability Design in Embedded System Application Families, Oliver Lewis, (PhD). Director of Studies. Completion: November 2000.
  4. Intelligent Control of Rotating Machinery, PhD Viva. Director of Studies. Completion: Feb 2001.
  5. Automated Synthesis and Optimisation of Multi-level Logic Circuits, Lingli Wang, 2nd Supervisor. Completion: Jan 2001.
  6. Agent-based Intrusion Detection using the Baysian Method, J.Pikoulas, Director of Studies. Completion: April 2003.
  7. Component-based Network Test Tools Platform for Network Design and Maintenance, H.Golam. Director of Studies. Completion: June 2003.
  8. Mobile Agent Routing over Ad-hoc Networks, N.Migas, Director of Studies. Completion: Nov 2005.
  9. NetHost-Sensor:Enhancing Intrusion Detection via An Active Target Host, A.Abimbola, 2nd Supervisor. Completion: Sept 2006.
  10. Digital Forensics Framework, Director of Studies, 2008. Protected by patents.
  11. Performance Evaluation of Security, Director of Studies, 2009.
  12. Cryptographic Privacy Enhancement Method for Investigative Data Acquisition (PhD). Director of Studies, 2011.
 

External Examinerships

1

Robert Gordons University, Aberdeen (started Aug 1997 - completed Aug 2001).

BSc (Hons)

2

Paisley University, Paisley (started 1998 - complete 2003).

BSc

3

University of Central Lancashire (started 1999 - Completed 2003).

MSc

4

Staffordshire University (2004-2008).

BSc (Hons)

5

University of Sunderland

MSc Security

6

University College, Dublin (2011 - current).

BEng in Digital Media Engineering

 

Research funding and awards

  • EPSRC Award, Trusted Services, Jan 2011 (part of £2 million grant).
  • TSB/EPSRC Award, Information Infrastructure Protection: Managing complexity, risk and resilience, Nov 2009. £280,000 (part of £1.6 million grant). [Link]
  • US Patent: 61/116681 (with Jamie Graves), Oct 2009. DNA Digital Fingerprinting Framework.
  • UK Patent: 0816556.5 (with Jamie Graves), Sept 2008. DNA Digital Fingerprinting Framework.
  • Proof-of-Concept, 2008-2010, £200,000. Digital DNA, Two year project.
  • SIPR (Scottish Institute for Policing Research) funded PhD studentship, 2008, £30,000.
  • FSA-funded PhD studentship, 2008, £30,000.
  • KTP (Knowledge Transfer Partnership), Summerhall, 2007. £60,000.
  • KTP with Fibrehub Europe Ltd. June 2003. Development of Voice/Video over IP systems, especially related to delivery to mobile devices. £60,000.
  • KTP with Seven Layer Communications Limited, South Queensferry. KTP Programme No. 2966. Development of high-speed configurable networking test equipment. Winning Programme, KTP Programme Awards 2003. £60,000 Winning Programme, KTP Programme Awards 2003. [Evening News - Award] [Video]
  • KTP with Justfone. Java development for mobile computing using GSM. £120,000.
  • KTP with Canan. June 2001. Development of a multimedia system for minority languages, such as Scots and Irish Gaelic. Awarded Certificate of Excellence (Grade 1), Jan 2004 [Gael - Scotsman] Winning Programme, KTP Programme Awards 2004. £60,000. Gaelic learning WWW site. Awarded Certificate of Excellence (Grade 1), Jan 2004 [Gael - Scotsman] Winning Programme, KTP Programme Awards 2004. [Video][Article]
  • 3-year, EPSRC-funded CASE award in Intelligent Control of Large-Scale Systems. This involves PI Ltd, and involves intelligently controlling industrial equipment that can not be controlled by conventional methods. £60,000.
  • Teaching Company Scheme with Viasystems, North Tyneside , £120,000.
  • Nomination, I ♥ my Tutor Awards (Student voted), Edinburgh Napier University, 2010.
  • Winner, I ♥ my Tutor Awards (Student voted), Edinburgh Napier University, 2011 (Nominated in two classes: Innovation and I ♥ my Tutor) [Details]
  • To be confirmed, £300,000.
 
 

Peer activities

1

Involved in the Department of Electrical and Electronic Engineering submission for RAE 1996 (which was graded as a 3b).

2

Series Editor for the successful IT and Computing series at Macmillan.

3

Executive committee member, IEEE Computer Committee on Electronic Computer Based Systems.

4

Research Senior, Computational Intelligence and Learning, University of Limerick, Aug. 2000.

5

Chair of the IEEE Conference in Electronic Computer Based Systems, Napier University, April 2000. [Pictures]

6

External Assessor, Computer Science Quinquennial Field Review, Anglia Polytechnic University, April 2001.

7

Programme Committee Member, Generative and Component-based Software Enginering Conference.

8

External Assessor, Periodic Review and Validation of BSc/MSc Programme, Department of Computing, University of Central Lancashire, March 2002.

9

KTP Award for Excellence, 2003 [Link], with Seven Layer Communications.
[Video of award]

10

Chair, Forthcoming BCS/SGAI Seminar on Mobile Agents, June 2004.

11

Area Editor, Journal of Ad-hoc Networks.

12

External Examiner, Stafford University. 2004-x.

13

KTP Certificate of Excellence for Canan KTP, 2004.

14

Program Committee Member, IEEE Conference in ECBS.

15

Program Committee Member, International Workshop on Agents and Autonomic Computing and Grid Enabled Virtual Organizations (AAC-GEVO’2004).

16

Chair of the forthcoming BCS Colloquium on Mobile Agents, Napier University, July 2004.

17

External Assessor, University of Westminster, April 2004.

18

Invited Paper, 5th International Conference on 3G Mobile Communications Technology, October 2004.

19

.NET C#/Windows Training, Agilent, 2004.

 

Articles in the press

 
  1. Is this the end of the internet café?, Scotsman, 15 Oct 2004 [Link]
  2. Partnership skills translate into a Gael force, Evening News 29 Apr 2004 [Link]
  3. Firm favourites for success, Evening News 29 Apr 2004 [Link]
  4. Award Winner, KTP [Link]
  5. Agents take the load (again), BCS E-Commerce and E-Business, 2001 [Link]
  6. Agents take the load, Leading Edge, BCS, 2000 [Link]
  7. Cybercafes, The Scotsman, 15 October 2004 [Link]
  8. Napier win is easy as KTP after partnership, Evening News, 3 Dec 2004 [Link]
  9. Napier 'spy' software set to fight terrorism, Evening News, 6 Dec 2004 [Link]
  10. Voice-over-IP, The Herald, 28 Dec 2005 [Link]
  11. Still running to keep up, Insider, 5 Dec 2005 [Link]
  12. All for one, The Glasgow Herald, 5 April 2007 [Link]
  13. Rise in Online cons, The Scotsman, 27 April 2007 [Link]
  14. Mobile Phone, Sunday Post, 6 May 2007 [Link]
  15. Web Expert Returns [Link]
  16. Ethical Hacking Course [Link]
  17. Smartphone Infection Tracking [Link]
  18. Is your phone at risk. BBC News 12 Nov 2010 [Link]
  19. Microsoft chief back at seat of learning [Link]
  20. Digital Fingerprint [Link]
  21. Digital Fingerprinting funding, Compute Scotland [Link]
  22. Future care Nov 2010 [Link]
  23. GPS Tracking [Link]
  24. Prevents Infection [Link]
  25. Patient Privacy, Nexxus Scotland [Link]
  26. GPS [Link]
  27. Cybercrime [Link]
  28. Steve's Award, Evening News [Link]
  29. Smart phones, Computing[Link]
  30. Smart phones, Electronics Weekly [Link]
  31. Smart phones [Link]
  32. Smart phones [Link]
  33. Smart phones [Link]
  34. Smart phones [Link]
  35. Smart phone, Evening News [Link]
  36. Expert warns of 'growing threat' from cyber crime, The Herald [Link]
  37. NHS tests cloud-based health platform, Financial Times [Link]
  38. Chelsea and Westminster to pilot shared online records, The Guardian [Link]
  39. Chelsea and Westminster Hospital uses SOA to trial patient records in private cloud, Computer Weekly [Link]
  40. Hospital prepares to test use of "cloud" technology for sharing patient records, BMJ [Link]
  41. Westminster & Chelsea Hospital pioneers cloud initiative, CloudPro [Link]
  42. NHS up in the clouds with Flexiant & Edinburgh Napier, ScotlandIS [Link]
  43. Cloud trials for NHS records, Compute Scotland [Link]
  44. NHS pilots putting patient health records in the cloud, Wired [Link]
  45. Cyber interview [Link]

Some video streams:

  1. Interview related to Gary McKinnon [Watch Video]
  2. A next generation cloud-based healthcare platform, Innovation In Health, May 2011 [Watch Video]
  3. BBC Newsnight Scotland, 27 July 2011 [Watch Video]
  4. Scottish Parliment, 20 Sept 2011 [Watch Video]

Some student thesis'

  1. 2011 - Cryptographic Privacy Enhancement Method for Investigative Data Acquisition [PDF] PhD
  2. 2010 - Performance Evaluation of Virtualization with Cloud Computing PDF] MSc
  3. 2010 - Botnet Analysis and Detection [ PDF] Hons
  4. 2010 - An Evaluation of the Power Consumption and Carbon Footprint of a Cloud Infrastructure [PDF] MSc
  5. 2010 - A COMPARATIVE STUDY OF IN-BAND AND OUT-OF-BAND VOIP PROTOCOLS IN LAYER 3 AND LAYER 2.5 ENVIRONMENTS [PDF] MSc
  6. 2010 - Bonets [ PDF]
  7. 2010 - Rate based IPS for DDoS [PDF]
  8. 2010 - Windows Encyption [PDF]
  9. 2009 - Framework for Network IDS Evaluation [PDF]
  10. 2009 - AN INTEGRATED FIREWALL POLICY VALIDATION TOOL [PDF]
  11. 2009 - Enhanced Event Time-Lining for Digital Forensic Systems [ PDF [Appendix]]
  12. 2009 - Mitigation of DDoS [PDF]
  13. 2009 - Mobile Out-of-Band Authentication [PDF]
  14. 2009 - Firewall Analysis [PDF]

    ... more.

Patent

Some of my music

  1. Solitary Man [MP3]
  2. Cortez [MP3]
  3. Down by the River [MP3]
  4. Silver Machine [MP3]
  5. All Along the Watchtower [MP3] [With Words]
  6. I Wanna Be Your Man [MP3]
  7. Novacaine [MP3]
  8. Wild Rose [MP3] [With Words]
  9. Street Spirit [MP3]
  10. Bad Moon [MP3]
  11. Daytripper [MP3]
  12. Ticket to Ride [MP3]
  13. Jolene [MP3]
  14. Ziggy [MP3]
  15. Sonic [MP3]
  16. Wild World [MP3]
  17. Light My Fire [MP3]
  18. Give a Little Bit [MP3]
  19. You Were Always on My Mind [MP3]
  20. Starman [MP3]
  21. More Than A Feeling [MP3] [With Words]
  22. It ain't me Babe [MP3]
  23. Driveby [MP3] [With Words]
  24. All I Really Wanna Do [MP3] [With Words]
  25. Solider [MP3]
  26. Holidays in the Sun [MP3]
  27. Nothing Else Matters [MP3]
  28. Hurt [MP3]
  29. I'm the Ocean [MP3]
  30. Lucy in the Sky [MP3]
  31. Ace Of Spades [MP3]
  32. Days that used to be [MP3]
  33. Don't Think Twice [MP3]
  34. Mellow My Mind [MP3]
  35. Setup [MP3][Alt version]
  36. Words [MP3]
  37. Say Hello [MP3]
  38. Cocaine [MP3]
  39. Forever Young [MP3]
  40. Blind Willie McTell [MP3]
  41. Keep on Rockin' [MP3]
  42. Hard Rain [MP3]
  43. The Passenger [MP3]
  44. Loosing [MP3]
  45. Danger Bird [MP3] [Alt]
  46. House [MP3]
  47. Novacaine [MP3]
  48. Cowgirl in the Sand [MP3]
  49. Times Are a Changing [MP3]
  50. Knocking [MP3]
  51. Caroline [MP3]
  52. Rolling Stone [MP3]
  53. I Want You [MP3]
  54. The Great Divide [MP3]
  55. Billie Joe [MP3]
  56. Hey Ho [MP3]
  57. Blind Willie McTell [MP3]
  58. I Fought the Law [MP3]
  59. Song for Europe [MP3]
  60. The Loner [MP3]
  61. Ohio [MP3]
  62. Watchtower [MP3]
  63. Not Dark Yet [MP3]
  64. Knocking on Heaven's Door [MP3]
 
 Home | Design | CNDS | Adv. Sec. | Code | Diary | WWW | Essay | Research