Bill Buchanan (computer scientist)

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

William (Bill) Buchanan
OBE FBCS CEng FIET PFHEA
Bill Image Award.jpg
Bill Buchanan
Born 6 March 1961
Falkirk
Nationality British
Occupation Professor
Employer Edinburgh Napier University
Known for Computer Security
Computer Forensics
Cloud Computing
Home town Edinburgh
Awards Commander of the Order of the British Empire
Website asecuritysite.com

William Buchanan OBE FBCS CEng FIET PFHEA (born 6 March 1961) is a Scottish computer scientist. Buchanan was born in Falkirk, Scotland in 1961. He currently leads the Centre for Distributed Computing and Security at Edinburgh Napier University, the Blockpass Identity Lab[1] and The Cyber Academy.[2] He has published 28 academic books, including The Handbook of the Internet, the Handbook of Data Communications and Networks, a wide range of academic papers[3] and has recently published a book on cryptography.[4]

Buchanan was appointed Officer of the Order of the British Empire (OBE) in the 2017 Birthday Honours for services to cyber security, and was the first person to receive an OBE related to cyber security.[5][6] In 2018, he received an "Outstanding Contribution to Knowledge Exchange" award at the Scottish Knowledge Exchange awards.[7] In April 2018, he setup an Advanced Blockchain Identity Laboratory at the Merchiston Campus of Edinburgh Napier University, and in partnership with Blockpass [1]. The research lab was funded with an initial co-investment of over £600,000 and for a period of three years[8].

Research[edit]

Buchanan is a Professor in the School of Computing and The Cyber Academy[9] at Edinburgh Napier University, and a Fellow of the British Computer Society and the Institution of Engineering and Technology. He currently leads the Centre for Distributed Computing, Networks, and Security, and works in the areas of cryptography, security, next generation user interfaces, Web-based infrastructures, e-Crime, intrusion detection systems, digital forensics, e-Health, mobile computing, agent-based systems, and simulation. Buchanan is a Co-chair of the IEEE Technical Committee for Blockchain and part of the Advisory Board as Regional Advisor for Scotland within the British Blockchain Association.[10] He is the Editor-in-Chief for the Journal of Cyber Security Technology[11] and is on the editorial board of the Blockchain in Healthcare Today (BHTY) journal.[12]

Buchanan has three spin-out companies which are based on research work at Edinburgh Napier University. This includes ZoneFox,[13] Symphonic Software[14] and Cyan Forensics,[15] who are all based in Edinburgh. He is a co-author of several patents, including for Contributions to Digital Forensics,[16] the Modelling of Trust Relationships [17] and Resilient secret sharing cloud based architecture for data vault.[18]

Buchanan's patents include:

  • Improvements in or relating to digital forensics. US8887274B2 (Granted)[19]. EP2347366A1 (Application). GB0816556D0 (Granted). WO2010029346A1 (Application).
  • Information sharing. US9043867B2 (Granted)[20], GB201514172D0 (Granted), WO2014108678A1 (Application).
  • Resilient secret sharing cloud based architecture for data vault. US20170005797A1 (Application)[21], EP3317998A1 (Application), WO2017001870A1 (Application).

He received the Principal's Award for contribution to Knowledge Exchange/Research in 2106 (Innovation of the Year and also Best Contribution to Information Society research theme)[22] and in 2017 (Innovation of the year in Knowledge Exchange)[23].

Public Engagement and Teaching[edit]

Buchanan has been involved in a wide range of public engagement events. From 16 December 2013 to 19 December 2013 he was one of the presenters within the Christmas Cyber lecture which was delivered to Schools across Scotland, in Glasgow, Edinburgh, Dundee and Aberdeen. Over 3,000 pupils attended the presentation, and it built on the previous year, for which Buchanan was one of the co-creators of the event, along with Ian Ferguson (Abertay), SICSA, Police Scotland and the Scottish Government.[24] In 2015, he was included in the Jisc Top 50 Social Media Influencers in Higher Education.[25] Buchanan also presents the IET Christmas lectures in Scotland including presentations in 2015 in Edinburgh, Glasgow, Dundee and Inverness.[26] Buchanan has an academic web site related to the teaching of security. His work within education includes being the Web architecture and implementer of the Bright Red Publishing Digital Zone,[27] which covers the Scottish N5 Curriculum related to the Curriculum for Excellence.[28]

Buchanan was a winner at the Teaching Excellence Awards at Edinburgh Napier University in 2011 (Tutor of the Year), 2104 (Most Innovative Tutor), and 2015 (Best Tutor in Engineering, Computing and Creative Industries). He has successfully supervised 17 PhD students, and has been an examiner for 26 PhD and 3 MPhil examinations. In 2018, for his commitment to leadership in teaching, he was awarded a Principal Fellowship of the Higher Education Academy (PFHEA)[29].

Buchanan has been an external examiner at a number of UK universities of undergraduate and postgraduate programmes including: Robert Gordons University (1997 - 2001); Paisley University (1998 - 2003); University of Central Lancashire (1999 - 2003); Staffordshire University (2004 - 2007); University of Sunderland (2007 –2011); Dublin College University, Dublin (2011 - 2014); and Royal Holloway, University of London (2014 - 2017).

Media Events[edit]

On 26 November 2013, Buchanan was interviewed on BBC News related to Scottish Independence on news related to the White Paper published by the SNP.[30] In September 2013, Buchanan ran a course for Police Scotland on Digital Investigations, which was covered by a range of media outlets, including STV.TV and BBC Scotland GMS. On 25 November 2013 he gave an interview live on BBC News related to the SNP White Paper on Scottish Independence. With a documentary on Cyber Security, broadcast on Monday 8 November 2015, Buchanan and his team set up a fake Web site for hackers to gain access to, as part of the BBC Panorama programme.[31]

He appeared on BBC Scotland Brainwaves on Cybercrime [32] and on Newsnight on 16 Jan 2015 in a debate over the UK Government clamping down on encryption.[33] Within the WannaCry ransomware attack around 13 May 2017, Buchanan was interviewed by a number of media outlets, including Sky News[34] and ABC News.[35] On 23 August 2017, he has interviewed by Inspired Edinburgh and outlined "Building a New World".[36] On 13 October 2017, Buchanan presented an invited talk at Scotchain 17 at the RBS Gogarburn Campus[37] and in June 2018 he gave an invited presentation at the Crypto Valley Conference on Blockchain Technology in Zug, Switzerland[38].

On 20 September 2011, he gave evidence to the Justice Committee at the Scottish Parliament on the Offensive Behaviour at Football and Threatening Communications Bill and he appeared on Newsnight Scotland as part of a debate on Cybercrime.[39] He has supported the Institute of Information Security Professionals in a number of activities, including presenting within an IISP session at CRESTCON 2018.[40][41]

Innovation and enterprise[edit]

On 6 May 2015 he launched The Cyber Academy at the Merchiston Campus of Edinburgh Napier University.[42] He was named on one of the Top 100 people for Technology in Scotland for 2012,[43] 2013, 2014,[44] 2015,[45] and 2016. In Feb 2016, he was included in the FutureScot "Top 50 Scottish Tech People Who Are Changing The World".[46] Buchanan, along with Dr Lu Fan and Payfont, were involved in the team which were awarded the "Innovation of the Year" at the Scottish Knowledge Exchange awards held in Edinburgh on 24 Feb 2016.[47] The work integrates Shamir's secret share methods in order to create a secure and robust Cloud infrastructure. In December 2016, he was awarded the Scottish Cyber Evangelist of the Year award, along with an award related to a collaboration with Police Scotland.[48] This collaboration related to work on the vSoC (Virtual Security Operations Centre) project, and which has led to the launch of training environment for Security Analysts and named SOCLAB[49].

On 11 April 2018, Buchanan and Vassilis Manoussos (Project Manager in The Cyber Academy), along with Satisnet, launched SOCLAB on the Merchiston Campus at Edinburgh Napier University. This lab integrates state-of-the-art Cyber Security tools, such as IBM QRadar, HPE Arcsight and Splunk, into a Security Operation Centre (SOC) training environment.[50] The work resulted from the EU-funded DFET project, and which was led by Buchanan, and included partners from Jozef Stefan Institute (Slovenia), and the University of Stockholm (Sweden).[51] This then led to the award of an Higher Education Academy grant to develop a virtualised training facility for Cyber Security.

Selected recent publications[edit]

  1. Sudozai, M.A.K; Saleem, Shahzad; Buchanan, William J; Habib, Nisar; Zia, Haleemah (2018). "Forensics study of IMO call and chat app". Digital Investigation. doi:10.1016/j.diin.2018.04.006. 
  2. Agyepong, Enoch, William J. Buchanan, and Kevin Jones. "DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN." Computer Science & Information Technology: 13.
  3. Bell, L., Buchanan, W., Cameron, J., & Lo, O. (2018). Applications of Blockchain Within Healthcare. Blockchain in Healthcare Today, 1. https://doi.org/https://doi.org/10.30953/bhty.v1.8.
  4. Asif, R., Haithem, M., & Buchanan, W. J. (2018, July). Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network. In Photonic Networks and Devices (pp. NeTh2F-3). Optical Society of America. https://doi.org/10.1364/NETWORKS.2018.NeTh2F.3
  5. Murnion, Shane; Buchanan, William J; Smales, Adrian; Russell, Gordon (2018). "Machine learning and semantic analysis of in-game chat for cyberbullying". Computers & Security. 76: 197. doi:10.1016/j.cose.2018.02.016. 
  6. Buchanan, William J; Li, Shancang; Asif, Rameez (2018). "Lightweight cryptography methods". Journal of Cyber Security Technology. 1 (3–4): 187. doi:10.1080/23742917.2017.1384917. 
  7. Lo, Owen; Buchanan, William J; Griffiths, Paul; MacFarlane, Richard (2018). "Distance Measurement Methods for Improved Insider Threat Detection". Security and Communication Networks. 2018: 1. doi:10.1155/2018/5906368. 
  8. Tweneboah-Koduah, Samuel; Buchanan, William J (2018). "Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study". The Computer Journal. doi:10.1093/comjnl/bxy002. 
  9. Buchanan, William J; Helme, Scott; Woodward, Alan (2018). "Analysis of the adoption of security headers in HTTP". IET Information Security. 12 (2): 118. doi:10.1049/iet-ifs.2016.0621. 
  10. GDPR: ground zero for a more trusted, secure internet, The Conversation, May 2018[52].
  11. The Bank of England is planning a bitcoin-style virtual currency – but could it really replace cash?, The Conversation, January 2018[53].
  12. Buchanan, Bill; Naseem, Naqvi. "Building the Future of EU: Moving forward with International Collaboration on Blockchain." The JBBA 1.1 (2018): 3579.
  13. Buchanan, William J; Chiale, Simone; MacFarlane, Richard (2017). "A methodology for the security evaluation within third-party Android Marketplaces". Digital Investigation. 23: 88. doi:10.1016/j.diin.2017.10.002. 
  14. P. McLaren, G. Russell and B. Buchanan, "Mining malware command and control traces," 2017 Computing Conference, London, 2017, pp. 788-794. doi:10.1109/SAI.2017.8252185[54].
  15. R. Asif and W. J. Buchanan, "Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption," 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, 2017, pp. 910-916. doi: 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.140[55].
  16. Spyra, G., Buchanan, W. J., & Ekonomou, E. (2017). Sticky policies approach within cloud computing. Computers & Security, 70, 366-375.
  17. Asif, R., & Buchanan, W. J. (2017). Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017.
  18. Spyra G, Buchanan W, Blockchain and Git repositories for Sticky Policies protected OOXML, FTC 2017 – IEEE Sponsored Future Technologies Conference 2017, November 2017.
  19. Uwagbole, S., Buchanan, W. J. & Fan, L. (2017, September). An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. Seventh IEEE International Conference on Emerging Security Technologies - EST 2017, Canterbury, UK.
  20. Buchanan, W., Woodward, a., Helme, s. (2017). Cryptography across industry sectors. Journal of Cyber Security Technology.
  21. Buchanan, W., Thuemmler, C., Spyra, G., Smales, A., & Prajapati, B. (2017). Towards Trust and Governance in Integrated Health and Social Care Platforms. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (pp. 219–231). Springer International Publishing.
  22. Moradpoor, N., Clavie, B., Buchanan, W. (2017). Machine Learning Techniques for the Detection and Classification of Phishing Emails. In: IEEE Technically Sponsored Computing Conference 2017. London: IEEE.
  23. Saleem, K., Tan, Z., & Buchanan, W. (2017). Security for Cyber-Physical Systems in Healthcare. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (pp. 233–251). Springer International Publishing.
  24. Spyra, g., Buchanan, W., Ekonomou, E. (2017). Applied Machine Learning Predictive Analytics to SQL Injection Attack Detection and Prevention. In: 3RD IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT). IEEE.
  25. Lo, O., Buchanan, W., carson, d. (2017). Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). Journal of Cyber Security Technology, 1(2), 88-107.
  26. Uwagbole, S., Buchanan, W., Fan, L. (2017). ECCWS 2016 - Proceedings of the 15th European Conference on Cyber Warfare and Security. In: ECCWS 2016 - Proceedings of the 15th European Conference on Cyber Warfare and Security. Munich, Germany.
  27. Buchanan, Bill. Cryptography. River Publishers, 2017.
  28. The next cyberattack could come from sound waves, The Conversation, March 2017[56].
  29. Is your computer secretly mining bitcoin alternatives? A guide to ‘cryptojacking’, The Conversation, December 2017[57].
  30. Sieklik, B., Macfarlane, R., & Buchanan, W. J. (2016). Evaluation of TFTP DDoS amplification attack. computers & security, 57, 67-92.
  31. Lanc D, Fan L, Mackinnon L, Buchanan W. (2016), RESILIENT SECRET SHARING CLOUD BASED ARCHITECTURE FOR DATA VAULT, United States Patent Application 20170005797.
  32. Buchanan, W., Deursen, N. (2016). HI-risk: A Method to Analyse Health Information Risk Intelligence. In: IEEE 15th International Conference on e-Health Networking, Applications & Services. Munich, Germany: IEEE.
  33. Leimich, P., Harrison, J., & Buchanan, W. J. (2016). A RAM triage methodology for Hadoop HDFS forensics. Digital Investigation, 18, 96-109.
  34. Li, S., Romdhani, I., Buchanan, W. (2016). Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications: Recent Development on Security and Privacy in Modern Communication Environments, S0, 32-36.
  35. Lo, O., Buchanan, W., carson, d. (2016). Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). Journal of Cyber Security Technology.
  36. Molla, R., Romdhani, I., Buchanan, W. (2016). 3LS-Authenticate: an e-Commerce Challenge-Response Mobile Application. In: 13th ACS/IEEE International Conference on Computer Systems and Applications. Agadir, Morocco: IEEE.
  37. Spyra, g., Buchanan, W., Ekonomou, E. (2016). Protecting Documents with Sticky Policies and Identity-Based Encryption. In: TC 2016 - Future Technologies Conference 2016 6–7 December 2016 |. San Francisco, United States: IEEE.
  38. Spyra, g., Buchanan, W., Ekonomou, E. (2016). Sticky policy enabled authenticated OOXML. In: IEEE SAI Computing Conference.
  39. Tan, Z., Saleem, K., Buchanan, W. (2016). Security for Cyber-Physical Systems in Healthcare. In: Health 4.0: How Industry 4.0 and Virtualization are Revolutionizing Healthcare.
  40. Uwagbole, S., Buchanan, W., Fan, L. (2016). Applied Web Traffic Analysis for Numerical Encoding of SQL Injection Attack Features. In: ECCWS-2016. Munich, Germany.
  41. Uwagbole, S., Buchanan, W., Fan, L. (2016). ECCWS 2016 - Proceedings of the 15th European Conference on Cyber Warfare and Security. In: ECCWS 2016 - Proceedings of the 15th European Conference on Cyber Warfare and Security. Munich, Germany.
  42. Uwagbole, S., Buchanan, W., Fan, L. (2016). Numerical Encoding to Tame SQL Injection Attacks. In: 2ND IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT). Istanbul, Turkey: IEEE.
  43. Woodward, a., Buchanan, W. (2016). Will quantum computers be the end of public key encryption?. Journal of Cyber Security Technology.
  44. Buchanan, W., If two countries waged cyber war on each another, here’s what to expect, August 2016[58].
  45. Buchanan, W., Ukwandu, E., van Deursen (Hazelhoff Roelfze), N., Fan, L., Russell, G., Lo, O., Thuemmler, C. (2015). Secret Shares to Protect Health Records in Cloud-based Infrastructures. In: Proceedings of the IEEE 17th International Conference on E-health Networking, Application and Services (HealthCom). (pp. 669 – 672). Boston, MA: IEEE.
  46. Buchanan, W., Ukwandu, E., Fan, L., Russell, G., Lo, O. (2015). The Future Internet: A World of Secret Shares. Future Internet 2015, 7, 445-464.
  47. Penrose, P., Buchanan, W., Macfarlane, R. (2015). Fast contraband detection in large capacity disk drives. Digital Investigator, (March 2015), S22–S29.
  48. Ukwandu, E., Buchanan, W., Fan, L., Russell, G., Lo, O. (2015). RESCUE: Resilient Secret Sharing Cloud-based Architecture. In: 2015 IEEE International Conference on Recent Advances of Trust, Security and Privacy. Helsinki, Finland: IEEE Computer Society.
  49. If you seek to ‘switch off’ encryption, you may as well switch off the whole internet, The Conversation, January 2015[59].
  50. It’s not just Facebook that goes down: the cloud isn’t as robust as we think, The Conversation, September 2015[60].
  51. When amateurs do the job of a professional, the result is smart grids secured by dumb crypto, The Conversation, May 2015.
  52. What the Investigatory Powers Bill will mean for you and your internet use, The Conversation, November 2015[61].
  53. Apple and Starbucks could have avoided being hacked if they’d taken this simple step, The Conversation, May 2015[62].
  54. Ashley Madison breach reveals the rise of the moralist hacker, The Conversation, July 2015[63].
  55. Oracle vs Google case threatens foundations of software design, The Conversation, June 2015[64].
  56. Buchanan, W., Fan, L., Uthmani, O., Lawson, A. (2014). Information sharing. US 13/739,074, US: US.
  57. Kwecka, Z., Buchanan, W., SCHAFER, B. (2014). "I am Spartacus" – Privacy Enhancing technologies and Privacy as a public good. Artificial Intelligence and Law, 22(2), 113-139.
  58. Molla, R., Romdhani, I., Buchanan, W., Fadel, Etimad Y. (2014). Mobile User Authentication System for E-commerce Applications. In: International Conference on Advanced Networking, Distributed Systems and Applications 2014. IEEE.
  59. Spyra, G., Buchanan, W., Cruickshank, P., Ekonomou, E. (2014). CLOUD-BASED IDENTITY AND IDENTITY META-DATA: SECURE AND CONTROL OWN DATA IN GLOBALIZATION ERA. International Journal of Reliable and Quality E-Healthcare (IJRQEH), 3(1), 49-66.
  60. Flandrin, F., Buchanan, W., Macfarlane, R., Ramsay, B., & Smales, A. (2014, September). Evaluating digital forensic tools (DFTs). In 7th International Conference: Cybercrime Forensics Education & Training (pp. 1-16).
  61. How the love of one teenager brought Tweetdeck to its knees, June 2014, The Conversation[65].
  62. Condemn Facebook snooping if you will, but we are all part of a great big online experiment, The Conversation, July 2014[66].
  63. You don’t need a fast car to rob a bank any more, just malware, The Conversation, July 2014[67].
  64. Getting into your hotel room after a night on the town? There could be an app for that, The Conversation, August 2014[68].
  65. Syrian Electronic Army’s attack on Reuters makes a mockery of cyber-security (again), The Conversation, June 2014[69].
  66. 33 years after creating the PC, IBM leaves it behind in favour of the cloud, The Conversation, August 2014[70].
  67. iWorm hack shows Macs are vulnerable too, The Conversation, October 2014[71].
  68. When the ATM runs Windows, how safe is your money?, The Conversation, October 2014[72].
  69. Buchanan, W., How the love of one teenager brought Tweetdeck to its knees, June 2014, The Conversation[73].
  70. Media shock stories about GameOver Zeus are not helpful, June 2014, The Conversation[74].
  71. Heartbleed bug: insider trading may have taken place as shares slid ahead of breaking story, April 2014, The Conversation[75].
  72. Buchanan, W., Kwecka, Z., Ekonomou, E. (2013). A Novel Privacy Preserving Method for the Location Tracking of Mobile Devices. The Journal of Mobile Communication, Computation and Information: Special Issue on Security, 18, 728–737.
  73. Buchanan, W., Fan, L., Uthmani, O., SCHAFER, B. (2013). Interagency Data exchange, Privacy protection and Governance Architecture for Information Sharing across Domains. Artificial Intelligence and Law.
  74. Buchanan, W., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., varga, j., anderson, c. (2013). Modelling of Integrated Trust, Governance and Access safi.re: Information Sharing Architecture. Communications in Computer and Information Science, 182, 91-101 .
  75. Penrose, P., Macfarlane, R., Buchanan, W. (2013). Approaches to the Classification Of High Entropy File Fragments. Digital Investigator, 10(4), 372–384.
  76. Thuemmler, C., Mival, O., Benyon, D., Buchanan, W., Paulin, A., Barros, M. (2013). Norms and Standards in Modular Medical Architectures. In: 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom) (IEEE Healthcom 2013). (pp. 382 – 387). Lisbon, Portugal.
  77. Thuemmler, C., Mival, O., Benyon, D., Buchanan, W. (2013). Norms and standards in modular medical architectures. In: Proceedings IEEE 15th International Conference on e-Health Networking, Applications & Services.
  78. van Deursen (Hazelhoff Roelfze, N., Buchanan, W., Duff, A. (2013). Monitoring information security risks within health care. Computers and Security, 37, 31-45.
  79. Bani Khalaf, M., Al-Dubai, A., Buchanan, W. (2012). A New Efficient Distributed Route Discovery for Wireless Mobile Ad hoc Networks. In: the 11th IEEE International Wireless Telecommunications Symposium. (pp. 1–6). IEEE Communication Society.
  80. Fan, L., Buchanan, W., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., Ekonomou, E., Khedim, A. (2012). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In: eTELEMED 2012. (pp. 99–104).
  81. Macfarlane, R., Buchanan, W., Ekonomou, E., Uthmani, O., Fan, L., Lo, O. (2012). Review of Security Policy Implementations. Computers & Security, 31(2), 253-271.
  82. Thuemmler, C., Fan, L., Buchanan, W., Lo, O., Ekonomou, E., Khedim, A. (2012). E-Health: Chances and Challenges of Distributed, Service oriented Architectures. Journal of Cyber Security and Mobility, 37(52).
  83. Uwagbole, S., Buchanan, W., Fan, L. (2012). Novel Tracking of Rogue Network Packets Using Danger Theory Approach. 11th European Conference on Information Warfare and Security (ECIW-2012).
  84. Buchanan, W., Flandrin, F., Macfarlane, R., Graves, J. (2011). A Methodology to Evaluate Rate-Based Intrusion Prevention System against Distributed Denial-of-Service (DDoS). In: Cyberforensics 2011.
  85. Buchanan, W. (2011, May). A next generation Cloud-based health care platform. Paper presented at Innovation in Healthcare, London.
  86. Buchanan, W., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., Bose, N., Ludwiniak, R. (2011). Cloud-based Digital Forensics Evaluation Test (D-FET) Platform. Cyberforensics 2011.
  87. Buchanan, W. B., Flandrin, F., Macfarlane, R., & Graves, J. (2011). A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). Cyberforensics 2011.
  88. Buchanan, W., Fan, L., Thuemmler, C., Lo, O., Ekonomou, E. (2011, Sept). Cloud-based e-Health System. Paper presented at BCS Health Informatics, Edinburgh.
  89. Buchanan, W. (2011, Sept). Creation of Dynamic Environments for Virtualised and Cloud-based Teaching in Digital Forensics and Computer Security. Paper presented at CFET, Canterbury.
  90. Buchanan, W., Macfarlane, R. (2011, June). D-FET – A Community Cloud for Enhancing Skills using Virtualised Environments and Cloud-based Infrastructures. Paper presented at Scottish Higher Education Employability Conference: Strengthening Partnerships with Employers, Heriot-Watt, Edinburgh.
  91. Buchanan, W. (2011). How Academic IT Departments Manage Changing IT Environments. VitAL, 5 (1), 26-32.
  92. Buchanan, W. (2011). Introduction to Security and Network Forensics. Auerbach Publications.
  93. Buchanan, W. (2011). Making assessment and feedback fun: feedback before and after assessments. Paper presented at Edinburgh Napier University Staff Conference, Edinburgh Napier University.
  94. Buchanan, W. (2011, June). Next Generation Secure e-Health Platform. Paper presented at BCS ISSG seminar "The Insider Threat", Edinburgh.
  95. Buchanan, W., Graves, J., Bose, N., Macfarlane, R., Davison, B., Ludwiniak, R. (2011). Performance and Student Perception Evaluation of Cloud-based Virtualised Security and Digital Forensics Labs. HEA ICS Conference.
  96. Buchanan, W. (2011). Student Perception of On-line Lectures with a Blended Learning Environment. Paper presented at Edinburgh Napier University Staff Conference, Craiglockhart.
  97. Ekonomou, E., Buchanan, W., Fan, L., Thuemmler, C. (2011). An Integrated Cloud-based Healthcare Infrastructure. In: IEEE CloudCom '11. (pp. 532 – 536). Athens, Greece: IEEE.
  98. Fan, L., Buchanan, W., Thuemmler, C., Lo, O., Khedim, A., Uthmani, O., Lawson, A., Bell, D. (2011). DACAR Platform for eHealth Services Cloud. IEEE 4th International Conference on Cloud Computing, 219-226.
  99. Kwecka, Z., Buchanan, W., Spiers, D. (2011). Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform. International Journal of Information Technologies and Systems Approach (IJITSA) : Special issue on Privacy and Security Issues in IT, 4(2), 12-31.
  100. Kwecka, Z., Buchanan, W. (2011). Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform. In: Association, I. (Ed.) Cyber Crime: Concepts, Methodologies, Tools and Applications. Information Resources Management Associa (Author).
  101. Miehling, M., Buchanan, W., Lawson, A. (2011). Affiliate Advertising Fraud and an Investigatory Fraud Framework. In: CyberForensics 2011. Glasgow.
  102. Miehling, M., Buchanan, W., Lawson, A. (2011, August). Detection Framework for the Reduction of Click-through and ID Theft Fraud in Affiliate Marketing. Paper presented at SCONE, Glasgow.
  103. Scott, R., Uthmani, O., Buchanan, W., Lawson, A. (2011, June). Intelligence Information Sharing between the Police and their Community Partners. Paper presented at Symposium on Security and Cybercrime, Edinburgh Napier University.
  104. Uthmani, O., Buchanan, W., Lawson, A., Scott, R., SCHAFER, B., Fan, L. (2011). Crime Risk Evaluation within Information Sharing between the Police and Community Partners. Information & Communications Technology Law, 20(2), 57 - 81.
  105. Uthmani, O., Buchanan, W., Lawson, A., Scott, R., SCHAFER, B., Fan, L., Uthmani, S. (2011). Crime Risk Evaluation within Information Sharing between the Police and Community Partners. Information & Communications Technology Law, 20(2), 57-81.
  106. Uthmani, O., Buchanan, W., Lawson, A. (2011, August). Risk Analysis for Criminal Context in Information Sharing Policies. Paper presented at SCONE, Glasgow.
  107. Bani Khalaf, M., Al-Dubai, A., Buchanan, W. (2010). A New Adaptive Broadcasting Approach for Mobile Ad hoc Networks. In: Proceedings of 2010 6th Conference on Wireless Advanced (WiAD) . (pp. 1 – 6). London: IEEE Computer Society.
  108. Buchanan, W., Thuemmler, C., Fan, L., Lo, O., Khedim, A. (2010, September). An e-Health Cloud. Paper presented at Cloud Computing for the Public Sector, Edinburgh.
  109. Buchanan, W. (2010). Data Communications and Computer Networks. Springer.
  110. Buchanan, W., Thuemmler, C., Fan, L., Lo, O., Khedim, A. (2010, August). Information sharing framework: Next Generation e-Health Cloud. Paper presented at BCS Health Informatics Scotland, Glasgow.
  111. Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Thuemmler, C., Uthmani, O. (2010). Interagency data exchange protocols as computational data protection law. Paper presented at Legal Knowledge and Information Systems.
  112. Buchanan, W., Thuemmler, C. (2010). Modelling Infection Spread Using Location Tracking. International Journal of Healthcare Technology and Management (IJHTM), 11(6).
  113. Buchanan, W., Uthmani, O. (2010, February). Novel Information Sharing Architecture between the Police and their Community Partners. Paper presented at Scottish Networking Event 2010, Napier University, Edinburgh.
  114. Buchanan, W., Uthmani, O. (2010, Feb). Novel Information Sharing Architecture between the Police and their Community Partners. Paper presented at SCONE, Edinburgh Napier University.
  115. Buchanan, W., Graves, J., Bose, N. (2010). Patent: IMPROVEMENTS IN OR RELATING TO DIGITAL FORENSICS.
  116. Buchanan, W., Macfarlane, R., Ludwiniak, R. (2010). Student Perception of On-Line Lectures with a Blended Learning Environment. Paper presented at The 4th International Conference on Cybercrime Forensics Education & Training, Canterbury.
  117. Kwecka, Z., Buchanan, W., Spiers, D. (2010). Privacy-preserving data acquisition protocol. In: IEEE International Conference of Computational Methods in Electrical and Electronics Engineering. (pp. 131 – 136). Listvyanka: IEEE.
  118. Lo, O., Graves, J., Buchanan, W. (2010). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In: 9th European Conference on Information Warfare and Security. (pp. 190–200). Greece.
  119. Mason, A., Dingle, N., Knottenbelt, W., Bell, D., Buchanan, W., Thuemmler, C. (2010). Modelling infection spread using location tracking. Int. J. Healthcare Technology and Management, 11(6), 442-461.
  120. Miehling, M., Buchanan, W., Old, L.J., Batey, A., Rahman, A. (2010). Analysis of Malicious Affiliate Network Activity as a Test Case for an Investigatory Framework. In: 9th European Conference on Information Warfare and Security. Greece.
  121. Migas, N., Buchanan, W. (2010). Ad-hoc Routing Metrics and Applied Weighting for QoS support. International Journal of Parallel, Emergent, and Distributed Systems, 25(4), 293 - 314.
  122. Thuemmler, C., Buchanan, W. (2010). Review of coding for success implementation.
  123. Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C. (2010). Novel Information Sharing Syntax for Data Sharing between Police and Community Partners, using Role-based Security. In: 9th European Conference on Information Warfare and Security. (pp. 394–402). Greece.
  124. Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C., Fan, L. (2010). Novel Information Sharing Syntax for Data Sharing Between Police and Community Partners, Using Role-Based Security. Proceedings of the 9th European Conference on Information Warfare and Security, 394-402.
  125. Buchanan, W., Thuemmler, C. (Eds.) (2009). International Journal of Healthcare Technology and Management: Special Issue on Patient-Centric Modelling and Enhanced Security in Distributed Healthcare Systems, 10 (1/2). Inderscience.
  126. Garrigues, C., Migas, N., Buchanan, W., Robles, S. (2009). Protecting mobile agents from external replay attacks. Journal of Systems and Software Journal of Systems and Software, 82(2), 197-206.
  127. Kwecka, Z., Buchanan, W., Spiers, D. (2009). Application and Analysis of Private Matching Schemes Based on Commutative Cryptosystems. In: 8th European Conference on Information Warfare and Security. Lisbon.
  128. Thuemmler, C., Buchanan, W., Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management (IJHTM), 119-131.
  129. Thuemmler, C., Buchanan, W., Fekri, H., Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management, 10(1-2), 119 - 131.
  130. Kwecka, Z., Buchanan, W., Saliou, L. (2008). Validation of 1-N OT Algorithms in Privacy-Preserving Investigations. In: 7th European Conference on Information Warfare and Security.
  131. Migas, N., Buchanan, W. (2008). Ad-hoc Routing Metrics and Applied Weighting for QoS support. In: 22nd IEEE International Parallel & Distributed Processing Symposium. (pp. 1 – 8 ). Miami, FL: IEEE.
  132. Buchanan, W. (2007). The Handbook of Data & Networks Security 1 (1 ed.). Springer-Verlag New York, Inc. Secaucus, NJ, USA.
  133. Lawson, A., Buchanan, W. (2007). Challenge-based Learning Framework for Teaching Programming Skills. Paper presented at HEA-ICS 7th Programming Workshop, University of Kent, Canterbury, 2 April 2007.
  134. Migas, N., Constantia, A., Buchanan, W. (2007). Mass Customisation through Personalised Brochures: the Role of Digital Printing. The 15th European Conference on Information Systems.
  135. Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: Remenyi, D. (Ed.) 6th European Conference on Information Warfare and Security. (pp. 227–235). Shrivenham, UK: Academic Conferences International.
  136. Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: 6th European Conference on Information Warfare and Security. (pp. 227–235). Shrivenham, UK,.
  137. Thuemmler, C., Buchanan, W. (2007). Setting Safety Standards by Designing a Low-budget and Compatible Patient Identification System based on Passive RFID Technology. International Journal of Healthcare Technology and Management (IJHTM), 8(5), 571-583.
  138. Abimbola, A., Munoz, J., Buchanan, W. (2006). A Framework to detect novel Computer Viruses via System Calls. In: Merabti, M., Pereira, R., Abuelma'atti, O. (Eds.) 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting. (pp. 308–313). John Moores University, Liverpool, UK: PGNet.
  139. Abimbola, A., Munoz, J., Buchanan, W. (2006). Enhancing Intrusion Detection via an Active Target Host. In: IEEE ICTe Africa 2006. Kenya: IEEE Computer Society Press. Abimbola, A., Munoz, J., Buchanan, W. (2006). Investigating False Positive Reduction in HTTP via Procedure Analysis. In: IEEE International Conference on Networking and Services. (pp. 87 – 87). Slicon Valley, CA: IEEE Computer Society Press.
  140. Abimbola, A., Munoz, J., Buchanan, W. (2006). NetHost-Sensor: Investigating the Capture of End-To-End Encrypted Intrusive Data. Computers & Security, 25(6), 445-451.
  141. Abimbola, A., Munoz, J., Buchanan, W. (2006). NetHost-sensor: Monitoring a target host's application via system calls. Information Security Tech. Report, 11(4), 166-175.
  142. Buchanan, W., Migas, N., McArtney, K. (2006). Analysis of an Agent-based Metric-Driven for Ah-hoc, On-Demand Routing. Journal of Ad-hoc Networks, 4(2), 146-167.
  143. Buchanan, W. (2006). Mastering Information Technology (Palgrave Masters Series (Computing)) 1 (1 ed.). Palgrave.
  144. Graves, J., Buchanan, W., Saliou, L., Old, L.J. (2006). Performance Analysis of Network Based Forensic Systems for In-line and Out-of-line Detection and Logging. In: Hutchinson, B. (Ed.) 5th European Conference on Information Warfare and Security. (pp. 41–50). Helsink, Finland: Academic Conferences International.
  145. Migas, N., Buchanan, W. (2006). An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing. In: Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International Symposium and Workshop on . (pp. 8–22). IEEE Computer Society.
  146. Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2006). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In: Hutchinson, B. (Ed.) 5th European Conference on Information Warfare and Security. (pp. 205–214). Helsinki, Finland.
  147. Buchanan, W., Graves, J., Saliou, L., Migas, N. (2005). Agent-based Forensic Investigations with an Integrated Framework. In: Hutchinson, W. (Ed.) 4th European Conference of Information Warfare and Security. (pp. 47–52). Glamorgan, United Kingdom: Academic Conferences International.
  148. Buchanan, W., Munoz, J., Raja, K. (2005). Critical Analysis and Error Determination of Locating-finding Techniques in GSM. International Journal of Mobile Communications (IJMC), 3(2), 165-182.
  149. Migas, N., Buchanan, W. (2005). Metric Evaluation of Embedded Java-based Proxies on Handheld Devices in Cluster-based Ad-hoc Routing. ECBS '05 Proceedings of the 12th IEEE International Conference and Workshops on Engineering of Computer-Based Systems, 147 - 154.
  150. Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2005). Novel Framework for Automated Security Abstraction, Modelling and Verification. In: Hutchinson, W. (Ed.) 4th European Conference on Information Warfare and Security. (pp. 303–311). Glamorgan, United Kingdom: Academic Conferences International.
  151. Abimbola, A., Munoz, J., Buchanan, W. (2004). Analysis and Detection of Cruising Computer Viruses. 3rd International Conference on Electronic Warfare and Security (EIWC).
  152. Abimbola, A., Munoz, J., Buchanan, W. (2004). Viral-Net System Via Autonomous Agent Technology. BCS Symposium/Colloquium on Mobile and Complex Agent Applications.
  153. Buchanan, W., McArtney, K., Migas, N. (2004). Agent-based Clustering over Ad-hoc Networks. Expert Update.
  154. Buchanan, W., Migas, N., McArtney, K. (2004). Agent-based Systems for Ah-hoc Routing in Wireless Networks. In: BCS Symposium/Colloquium on Mobile and Complex Agent Applications. Napier University, Edinburgh.
  155. Buchanan, W., Raja, K., Munoz, J. (2004). Analysis and migration of location-finding methods for GSM and 3G networks. 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference, 352 - 358.
  156. Buchanan, W. (2004). Correlation between academic and skills-based tests in computer networks. British Journal of Education Technology (BJET), 37(1), 69-78.
  157. Buchanan, W. (2004). Covert Channel Analysis and Detection using Reverse Proxy Servers. 3rd International Conference on Electronic Warfare and Security (EIWC).
  158. Buchanan, W., Llamas, D. (2004). Covert Channel Analysis and Detection using Reverse Proxy Servers. 3rd International Conference on Electronic Warfare and Security (EIWC.
  159. Buchanan, W., Saliou, L. (2004). Enhanced Methods of Coursework Provision of Computing. IEEE International Conference on Information Technology: Research and Education, 111 - 115.
  160. Buchanan, W. (2004). Network-based Computer Forensics for Misuse Detection. Industrial Management & Data Systems (IMDS) Journal.
  161. Buchanan, W. (2004). Replacing Courseworks with Practical Assessments in Computer Networks. Napier Teaching Fellow’s Journal.
  162. Buchanan, W. (2004). The handbook of data communications and networks 1 (2 ed.). Springer.
  163. Buchanan, W. (2004). Uzytkowanie Komputerow. Wkt (Poland).
  164. Buchanan, W., Raja, K., Munoz, J. (2004). We know where you are [Location tracking]. Communications Engineer, 2 (3), 34 - 39 .
  165. Migas, N., Buchanan, W., McArtney, K. (2004). Benchmarking bandwidth and resource consumptions of Java-based proxy PDAs in ad-hoc networks. Expert Update.
  166. Migas, N., Buchanan, W., McArtney, K. (2004). Migration of Mobile Agents in Ad-hoc Wireless Networks. Engineering of Computer-Based Systems, 2004. Proceedings. 11th IEEE International Conference and Workshop, 530 - 535.
  167. Raja, K., Buchanan, W., Munoz, J. (2004). Analytical Review of Mobile Phone-based Location-finding. IEE Communication Engineer, 2(3), 34-39.
  168. Buchanan, W. (2003). Some Studies on the CAN Specification. In: Mahalik, N. (Ed.) Fieldbus Technology: Industrial Network Standards for Real-Time Distributed Control. (pp. 516–532). Springer.
  169. Migas, N., Buchanan, W., McArtney, K. (2003). MARIAN: A Framework using Mobile Agents for Routing, Topology Discovery and Automatic Network Reconfiguration in Ad-hoc Networks. IADIS International Conference, WWW/Internet 2003, 1129-1134.
  170. Migas, N., Buchanan, W., McArtney, K. (2003). Mobile Agents for Routing, Topology Discovery, and Automatic Network Reconfiguration in Ad-Hoc Networks. IEEE ECBS 2003, 200 - 206 .
  171. Brown, E., Buchanan, W. (2002). EML in the Support of Minority Languages. LSTN 2002, 106-107.
  172. Buchanan, W. (2002). Complete Handbook of the Internet. Kluwer Academic Publishers Norwell, MA, USA.
  173. Buchanan, W. (2002). Mastering Computing. Macmillan Press.
  174. Buchanan, W. (2002). Mastering Delphi Programming. Palgrave Publishers.
  175. Buchanan, W., Brown, E. (2002). Towards a Reusable and Reconfigurable WWW, System-Level Issues and Approaches in Software Development. IEEE 26th Annual International Computer Software and Applications Conference, 814 - 815.
  176. Golam, H., Buchanan, W. (2002). Component-based Tools Platform for Network Testing. 9th IEEE Conference in ECBS.
  177. Golam, H., Buchanan, W., Munoz, J. (2002). Component-based Tools Platform for Network Testing. IEEE ECBS 2003.
  178. Lewis, O., Mannion, M., Buchanan, W. (2002). Performance Issues of Variability Design for Embedded System Product Lines. Fraunhofer IESE Technical Report 070.00/E.
  179. Migas, N., Buchanan, W., McArtney, K. (2002). Mobile Agents for Routing, Topology Discovery and Automatic Network Reconfiguration. IEEE ECBS 2002.
  180. Pikoulas, J., Buchanan, W., Mannion, M. (2002). An Intelligent Agent Security Intrusion System. Engineering of Computer-Based Systems, 2002. Proceedings. Ninth Annual IEEE International Conference and Workshop on the, 94 - 99.
  181. Buchanan, W. (2001). Computer busses. Butterworth-Heinemann Newton, MA, USA.
  182. Buchanan, W. (2001). PC Interfacing, Communications and Windows Programming (Chinese ed.). Addison Wesley.
  183. Pikoulas, J., Buchanan, W., Mannion, M., Triantafyllopoulos, K. (2001). An Agent Based Bayesian Forecasting Model for Enhanced Network Security. In: Engineering of Computer Based Systems, 2001. ECBS 2001. Proceedings. Eighth Annual IEEE International Conference and Workshop on the (April ed.). (pp. 247 – 254). Washington: IEEE.
  184. Buchanan, W., Wilson, A. (2000). Advanced PC Architecture. Addison-Wesley.
  185. Buchanan, W., Scott, A., Mannion, M., Naylor, M., Pikoulas, J. (2000). Agents, Network Security and Network Management. In: Distributed Systems and Networks. (pp. 600–640). Addison-Wesley.
  186. Buchanan, W. (2000). Compression Techniques for Real-Time Signals. Computer Bulletin (BCS), 2(1), 32.
  187. Buchanan, W. (2000). Computer Busses. Butterworth-Heinemann Newton, MA, USA.
  188. Buchanan, W. (2000). Distributed Systems and Networks. McGraw-Hill.
  189. Buchanan, W., Naylor, M., Scott, A. (2000). Enhancing network management using mobile agents. In: Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop on the . (pp. 218–226).
  190. Buchanan, W., Scott, A., Mannion, M., Naylor, M., Pikoulas, J. (2000). Mobile Agents. Computer Bulletin.
  191. Buchanan, W., Naylor, M., Scott, A. (2000). Mobile Agents with Enhanced Network Management. In: 7th IEEE Conference on electronic Computer Based Systems (April ed.). (pp. 218–226).
  192. Lewis, O., Mannion, M., Buchanan, W. (2000). Performance Issues of Variability Design for Embedded System Product Lines. In: 22nd International Conference on Software Engineering, ICSE 2000 (June ed.). Limerick.
  193. Pikoulas, J., Mannion, M., Buchanan, W. (2000). Software Agents and Computer Network Security. In: Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop on the (April ed.). (pp. 211–217). IEEE.
  194. Scott, A., Buchanan, W. (2000). Investigation, Analysis and Determination of Inclusions in High-Tolerance Board Design. Journal of the Institute of Circuit Technology, 26(2), 7-9.
  195. Scott, A., Buchanan, W. (2000). Truly distributed control systems using fieldbus technology. In: Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop on the Issue Date: 2000. (pp. 165–173). Edinburgh, UK : IEEE.
  196. Buchanan, W., Scott, A. (1999). AOI false rejects PCB manufacture. Printed Circuit Fabrication, 22(10), 34-37.
  197. Buchanan, W. (1999). Handbook of Data Communications and Networks 1 (1 ed.). Kluwer.
  198. Buchanan, W. (1999). Java Sockets and Integration with HTTP. Visual Systems Journal.
  199. Buchanan, W. (1999). Mastering Global Information Systems (Chinese ed.). Beijing Press.
  200. Buchanan, W. (1999). Mastering Microsoft Windows, Novell NetWare and UNIX. Palgrave Publishers.
  201. Buchanan, W. (1999). Mastering Networks. Macmillan Press.
  202. Buchanan, W. (1999). Mastering Windows NT, Novell NetWare and UNIX. Macmillan Press.
  203. Buchanan, W. (1999). PC Interfacing, Communications and Windows Programming. Addison-Wesley Longman Ltd. Essex, UK, UK.
  204. Buchanan, W., Scott, A. (1999). Tadpole inclusions in laminate structures PCB AOI. Printed Circuit Fabrication, 22(11), 58-62.
  205. Buchanan, W. (1999). Wiedziec wieceg Internet.
  206. Pearson, B., Buchanan, W. (1999). Intelligent Methods in Industrial Control. In: EPSRC PREP '99.
  207. Scott, A., Buchanan, W. (1999). Excluding inclusions PCB inspection. Journal of Manufacturing Engineer, 78(4), 154-156.
  208. Scott, A., Buchanan, W. (1999). Sources and Causes of Tadpoles. PCB Fab.
  209. Scott, A., Buchanan, W. (1999). Sources of Inclusions in Laminates. IEE Journal in Engineering Manufacture.
  210. Buchanan, W. (1998). Advanced Data Communications and Networks. Kluwer Academic Publishers Norwell, MA, USA.
  211. Buchanan, W. (1998). Advanced PC Interfacing, Communications and Windows Programming. Addison-Wesley.
  212. Buchanan, W. (1998). CD-ROM Handbook of Data Communications & Networks. Kluwer.
  213. Buchanan, W. (1998). Mastering Java. Macmillan Press.
  214. Buchanan, W. (1998). Mastering Pascal and Delphi (2nd ed.). Macmillan Press.
  215. Buchanan, W., Gupta, N.K. (1997). A Novel Parallel Processing Synchronisation Method for Observing Electric Fields in and around PCBs. International Journal of Electronics, 82(1), 61-67.
  216. Buchanan, W. (1997). Applied PC Interfacing, Interrupts and Graphics. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA.
  217. Buchanan, W. (1997). Mastering Global Information Systems (English ed.). Macmillan Press.
  218. Buchanan, W. (1997). Mastering the Internet. Palgrave Publishers.
  219. Buchanan, W. (1997). Microelectronic Systems: Design, Modelling and Test. Arnold.
  220. Buchanan, W. (1997). Software Development. Butterworth-Heinemann Newton, MA, USA.
  221. Buchanan, W. (1997). Software Development for Engineers with C, Pascal, C++, Assembly Language, Visual Basic, HTML, Javascript and Java. John Wiley & Sons, Inc. New York, NY, USA.
  222. Buchanan, W. (1997). Wiedziec wiecej Internet. Wkt (Poland).
  223. Buchanan, W. (1996). Analysis of Electromagnetic Wave Propagation using 3D Finite-Difference Time-Domain Methods with Parallel Processing (PhD). Edinburgh Napier University.
  224. Buchanan, W. (1996). Applied Data Communications and Networks. Springer.
  225. Buchanan, W., Gupta, N.K. (1996). Machine independent algorithm for concurrent finite-element problems. In: 3rd International IEEE Conference on Computation in Electromagnetics, 1996, Conf. Publ. No.420 (Conf. Publ. No.420 ed.). (pp. 17–20). London, UK.
  226. Buchanan, W., Cordiner, S. (1996). Turbocompressor Control using Fuzzy Logic. In: EPSRC Neural Networks Symposium, 1996 (September ed.). University of Edinburgh.
  227. Buchanan, W. (1995). C for Electronic Engineering with Applied Software Engineering. Prentice-Hall, Inc. Upper Saddle River, NJ, USA.
  228. Buchanan, W., Gupta, N.K. (1995). Prediction of Electric Fields from Conductors on a PCB by 3D Finite-Difference Time-Domain Method. IEE Engineering, Science and Education Journal, 4(4), 177-182.
  229. Buchanan, W., Gupta, N.K. (1995). Prediction of Electric Fields in and around PCBs - 3D Finite-Difference Time-Domain Approach with Parallel Processing. Journal of Advances in Engineering Software, 23(2), 111-114 .
  230. Buchanan, W., Gupta, N.K., Arnold, J.M. (1994). 3D FDTD Method in a Microstrip Antenna's Near-Field Simulation. In: 2nd International Conference on Computation in Electromagnetics, 1994 (April ed.).
  231. Buchanan, W., Gupta, N.K., Arnold, J.M. (1994). Application of 3D finite-difference time-domain (FDTD) method to predict radiation from a PCB with high speed pulse propagation. In: 9th International IEE Conference on Electromagnetic Compatibility (August ed.). (pp. 287–291). University of Manchester, UK: IEE.
  232. Buchanan, W., Gupta, N.K. (1993). Enhancements for the 3D FDTD Method. In: FDTD (Antennas) Section (July ed.). Queen Mary’s and Westfield College.
  233. Buchanan, W., Gupta, N.K. (1993). Maxwell's Equations in the 21st Century. IJEEE, 30(4).
  234. Buchanan, W., Gupta, N.K. (1993). Parallel Processing Techniques in EMP Propagation using 3D Finite-Difference Time-Domain (FDTD) Method. Journal of Advances in Engineering Software, 18(3), 149-159.
  235. Buchanan, W., Gupta, N.K. (1993). Simulation of Electromagnetic Pulse Propagation in Three- Dimensional Finite Difference Time-Domain Method using Parallel Processing Techniques. In: 2nd International Conference on Software for Electrical Engineering Analysis and Design. Electrosoft '93. Southampton, UK.
  236. Buchanan, W., Gupta, N.K. (1993). Simulation of near-field radiation for a Microstrip antenna using the 3D FDTD method. In: NRSC 93 Colloquium (April ed.). University of Leeds.
  237. Buchanan, W., Gupta, N.K., Arnold, J.M. (1993). Simulation of Radiation from a Microstrip Antenna using Three-Dimensional Finite-Difference Time-Domain (FDTD) Method. In: 8th International Conference on Antennas and Propagation, 1993 (April ed.). (pp. 639 – 642). Edinburgh: IEE.
  238. Buchanan, W., Gupta, N.K. (1992). Computers as Applied to Time-Domain Methods in Electrical Engineering. In: World Conference on Engineering Education, 1992. University of Portsmouth, UK.
  239. Buchanan, W., Gupta, N.K. (1992). Parallel Processing of the Three-Dimensional Finite-Difference Time-Domain Method. In: NRSC (July ed.). University of Bradford.
  240. Buchanan, W., Gupta, N.K. (1991). Simulation of three-dimensional finite-difference time-domain method on limited memory systems. In: International Conference on Computation in Electromagnetics. (pp. 75–78). , IEE, Savoy Place, London: IEE.
  241. Buchanan, W. (1988). Microwaves in the laboratory. In: IEE Colloquium on 'Teaching Antennas and Propagation to Undergraduates', 1988, Digest No.84 ((Digest No.84) ed.). (pp. 10–12). . London, UK: IEE.

Teaching[edit]

Buchanan teaches on a number of computing areas including:

  • Computer Security[76]
  • Cisco Simulators[77]
  • Web-based Cisco Simulators[78]
  • Digital Investigator[79]

References[edit]

  1. ^ GmbH, finanzen.net. "Blockpass Partners with Edinburgh Napier University to Build the World's First Advanced Blockchain Identity Laboratory | Markets Insider". markets.businessinsider.com. Retrieved 2018-07-13. 
  2. ^ "The Cyber Academy". 
  3. ^ "Papers". 
  4. ^ Buchanan, William J. (2017-09-01). Cryptography. S.l.: River Publishers. ASIN 8793379102. ISBN 9788793379107. 
  5. ^ "No. 61962". The London Gazette (Supplement). 17 June 2017. p. B10. 
  6. ^ "Judy Murray among Scots on honours list". BBC News. 2017-06-16. Retrieved 2017-06-17. 
  7. ^ "Scottish Knowledge Exchange Awards 2018 winners announced | Interface Knowledge Connection". www.interface-online.org.uk. Retrieved 2018-03-11. 
  8. ^ "Building the World's first Advanced Blockchain Identity Laboratory". Napier. Retrieved 2018-04-27. 
  9. ^ "thecyberacademy.org". thecyberacademy.org. Retrieved 2017-09-14. 
  10. ^ Association, British Blockchain (2017-11-16). "Prof. Bill Buchanan OBE PhD joins the Advisory Board as Regional Advisor for Scotland". Medium. Retrieved 2018-06-05. 
  11. ^ "Journal of Cyber Security Technology". 
  12. ^ "Editorial Team | Blockchain in Healthcare Today". blockchainhealthcaretoday.com. Retrieved 2018-06-08. 
  13. ^ "Zonefox". 
  14. ^ "Symphonic Software". 
  15. ^ "Cyan Forensics". 
  16. ^ "Improvements in or relating to digital forensics". 
  17. ^ "Information Sharing". 
  18. ^ "Resilient secret sharing cloud based architecture for data vault". 
  19. ^ [patents.google.com/patent/US8887274B2/ "Google patent"] Check |url= value (help). 
  20. ^ [patents.google.com/patent/US20140201804A1/ "Google patent"] Check |url= value (help). 
  21. ^ [patents.google.com/patent/US20170005797A1 "Google patent"] Check |url= value (help). 
  22. ^ "2016 Research Awards -". Retrieved 2018-06-28. 
  23. ^ "-". Retrieved 2018-06-28. 
  24. ^ "Xmas Cyber Lectures 2013". Archived from the original on 7 January 2014. 
  25. ^ "JISCTop50". 
  26. ^ "IETXmas2015". 
  27. ^ "Bright Red Books Digital Zone". Bright Red Digital Zone. 
  28. ^ "Digital Zone". 
  29. ^ "News Details". staff.napier.ac.uk. Retrieved 2018-06-23. 
  30. ^ "Scottish Independence debate". 
  31. ^ "BBC Panorama". 
  32. ^ "Cybercrime". 
  33. ^ "UK Encryption debate". 
  34. ^ Bill Buchanan (2017-05-13), Sky News Interview (13 May 2017) on Ransomware, retrieved 2017-08-31 
  35. ^ Bill Buchanan (2017-05-13), ABC Interview on Ransomware (13 May 2017), retrieved 2017-08-31 
  36. ^ Inspired Edinburgh (2017-08-23), Prof Bill Buchanan OBE - Building A New World | Inspired Edinburgh, retrieved 2017-08-31 
  37. ^ "Scotchain 17". 
  38. ^ Crypto Valley (2018-07-06), 2018 Crypto Valley Conference: Day 2 - William Buchanan - Napier University, retrieved 2018-07-13 
  39. ^ "Cybercrime". 
  40. ^ IISP (2018-05-29), IISP Congress 2018: Professor Bill Buchanan OBE - Futurist academic research into AI, retrieved 2018-06-08 
  41. ^ IISP (2018-05-29), IISP Congress 2018: Professor Bill Buchanan OBE Interview, retrieved 2018-06-08 
  42. ^ "Edinburgh Napier University launches International Cyber Academy". 
  43. ^ "Tech 100 2012". Archived from the original on 1 October 2013. 
  44. ^ "Tech 100 2014". 
  45. ^ "Tech 100 2015". 
  46. ^ "FutureScot". 
  47. ^ "Innovation of the Year (2016)". .
  48. ^ "Scottish Cyber Awards". 
  49. ^ Satisnet Ltd (2018-05-22), Satisnet and Edinburgh Napier SOCLAB Launch, retrieved 2018-05-23 
  50. ^ Satisnet Ltd (2018-05-22), Satisnet and Edinburgh Napier SOCLAB Launch, retrieved 2018-06-22 
  51. ^ "DFET". www.d-fet.eu. Retrieved 2018-06-22. 
  52. ^ Buchanan, Bill. "GDPR: ground zero for a more trusted, secure internet". The Conversation. Retrieved 2018-06-01. 
  53. ^ Buchanan, Bill. "The Bank of England is planning a bitcoin-style virtual currency – but could it really replace cash?". The Conversation. Retrieved 2018-06-01. 
  54. ^ "Mining malware command and control traces - IEEE Conference Publication". ieeexplore.ieee.org. Retrieved 2018-07-05. 
  55. ^ "Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption - IEEE Conference Publication". ieeexplore.ieee.org. Retrieved 2018-07-05. 
  56. ^ Buchanan, Bill. "The next cyberattack could come from sound waves". The Conversation. Retrieved 2018-06-01. 
  57. ^ Buchanan, Bill. "Is your computer secretly mining bitcoin alternatives? A guide to 'cryptojacking'". The Conversation. Retrieved 2018-06-01. 
  58. ^ Buchanan, Bill. "If two countries waged cyber war on each another, here's what to expect". The Conversation. Retrieved 2018-06-01. 
  59. ^ Buchanan, Bill. "If you seek to 'switch off' encryption, you may as well switch off the whole internet". The Conversation. Retrieved 2018-06-01. 
  60. ^ Buchanan, Bill. "It's not just Facebook that goes down: the cloud isn't as robust as we think". The Conversation. Retrieved 2018-06-01. 
  61. ^ Buchanan, Bill. "What the Investigatory Powers Bill will mean for you and your internet use". The Conversation. Retrieved 2018-06-01. 
  62. ^ Buchanan, Bill. "Apple and Starbucks could have avoided being hacked if they'd taken this simple step". The Conversation. Retrieved 2018-06-01. 
  63. ^ Buchanan, Bill. "Ashley Madison breach reveals the rise of the moralist hacker". The Conversation. Retrieved 2018-06-01. 
  64. ^ Buchanan, Bill. "Oracle vs Google case threatens foundations of software design". The Conversation. Retrieved 2018-06-01. 
  65. ^ Buchanan, Bill. "How the love of one teenager brought Tweetdeck to its knees". The Conversation. Retrieved 2018-06-01. 
  66. ^ Buchanan, Bill. "Condemn Facebook snooping if you will, but we are all part of a great big online experiment". The Conversation. Retrieved 2018-06-01. 
  67. ^ Buchanan, Bill. "You don't need a fast car to rob a bank any more, just malware". The Conversation. Retrieved 2018-06-01. 
  68. ^ Buchanan, Bill. "Getting into your hotel room after a night on the town? There could be an app for that". The Conversation. Retrieved 2018-06-01. 
  69. ^ Buchanan, Bill. "Syrian Electronic Army's attack on Reuters makes a mockery of cyber-security (again)". The Conversation. Retrieved 2018-06-01. 
  70. ^ Buchanan, Bill. "33 years after creating the PC, IBM leaves it behind in favour of the cloud". The Conversation. Retrieved 2018-06-01. 
  71. ^ Buchanan, Bill. "iWorm hack shows Macs are vulnerable too". The Conversation. Retrieved 2018-06-01. 
  72. ^ Buchanan, Bill. "When the ATM runs Windows, how safe is your money?". The Conversation. Retrieved 2018-06-01. 
  73. ^ Buchanan, Bill. "How the love of one teenager brought Tweetdeck to its knees". The Conversation. Retrieved 2018-06-05. 
  74. ^ Buchanan, Bill. "Media shock stories about GameOver Zeus are not helpful". The Conversation. Retrieved 2018-06-22. 
  75. ^ Buchanan, Bill. "Heartbleed bug: insider trading may have taken place as shares slid ahead of breaking story". The Conversation. Retrieved 2018-06-22. 
  76. ^ "Security Examples". 
  77. ^ "Networksims". 
  78. ^ "Profsims". 
  79. ^ "Digital Investigation".