Home | Design | SFC | Adv. Sec. | Code | Diary | WWW | Essay | Research

Bio

Bill Buchanan is a Professor in the School of Computing at Edinburgh Napier University, and a Fellow of the BCS and the IET. He currently leads the Centre for Distributed Computing, Networks, and Security, and works in the areas of security, next generation user interfaces, Web-based infrastructures, e-Crime, intrusion detection systems, digital forensics, e-Health, mobile computing, agent-based systems, and simulation. Bill has one of the most extensive academic sites in the World, and is involved in many areas of novel research and teaching in computing. He has published over 27 academic books, and over 160 academic publications, along with several awards for excellence in knowledge transfer, and for teaching, such as winning at the I ♥ my Tutor Awards (Student voted), Edinburgh Napier University, 2011, and has supervised many award winning student projects.

Presently he is working with a range of industrial/domain partners, including with the Scottish Police, health care professionals and the FSA. As part of the drive to create a World-leading in-frastructure for security and cybercrime, he leads the Scottish Centre of Excellence for Security and Cybercrime which brings together a wide range of collaborators, including most of the universities in Scotland, the Scottish Police, the public sector, and a range of SMEs and large organisations. Current work includes initiatives on creating an e-Forensics Cloud across Scotland, and in organising a large-scale Symposium to engage a large number of stakeholders within Scotland, in order to focus on creating a World-leading infrastructure.

He has a long track record in commercialisation activities, including being a co-founder of Inquisitive System, which has progressed from PhD work to a university spin-out, though the Scottish Enterprise funded Proof-of-Concept scheme. This spin-out has also involved patenting novel security software in three territories around the World. His current work includes collaboration of TSB Grants with Microsoft plc on a £2million project which aims to improve the care of the elderly using Trusted Cloud-based services, and with Chelsea and Westminster Hospital on a next generation Health Care platform. This also matches upwith other funded projects with the FSA and the Scottish Police. [Youtube lectures][My Research Page][My Twitter Page][My Wikipedia Page]

Outline

An academic is often benchmarked against other academics in other organisations by their publication record, their peer review activities, and their research income generation. Thus my CV is biased towards this. The following gives a summary of the work I am currently involved in. If you wish a fuller account, please contact me, and I'll try and outline some of the other things that I am interested in, and developing. It defines many of my mechanistic details, and does not outline any of my achieved which are not related to publishing. A CV is often an archive and illustrates past achievements, and does not really cover the present, and the future. It's strange in computing that job functions are often selected in terms of a CV, rather that in terms of a portfolio of work.

Name:

William Buchanan, PhD, FBCS, FIET CEng, MCP, BSc (Hons.)

Date of Birth:

6th March, 1961.

WWW page:

[Web Page]

Current Post:

Professor, School of Computing

Email:

w.buchanan@napier.ac.uk   

PDF version:

[Full CV] [Outline]

Telephone:

+44 (0)131 455 2759

Academic diary:

http://www.soc.napier.ac.uk/~bill/diary_current.html

   

Quick guide

MPhil/PhD Examinations

20 (one forthcoming)

MPhil/PhD Completions

12

Published Papers

150

Academic Books

24 (not including translations)

External Examinerships

5 (two current)

Current Post

Professor (Level 2)

Current PhD Supervisions

8

Research Grants (total)

over £4million

 

Employment

2005-Present

Professor, School of Computing, Napier University, Edinburgh.

2003-2005

Reader, School of Computing, Napier University, Edinburgh.

1989-2003

Senior Lecturer, School of Computing, Napier University, Edinburgh.

1996-Present

Series Editor (IT and Computing), Macmillan Press Ltd.

1989-Present

Consultant to several companies including British Gas plc, HMSO, Total and Mobil.

1991-1995

Director, Real-Time Technologies Ltd, Edinburgh.

1989-1990

Software Consultant, ABACUS Simulations Ltd, Glasgow.

1986-1989

Lecturer, Department of Electronics, Napier University, Edinburgh.

1986

Electronic Engineer, Racal-MESL, Edinburgh.

1985

Industrial Training, Royal Observatory, Edinburgh.

1984

Industrial Training, Racal-MESL Ltd, Edinburgh.

1983

Industrial Training, Royal Observatory, Edinburgh.

1977-1981

Apprentice Electrical Engineer, ICI Ltd, Grangemouth.

 

Qualifications

2010

Fellow of the BCS

2007

Cisco Regional Intructor, Network Security

2006

Fellow of IET (previously IEE)

2006

Microsoft XML Web Services (70-320) Certification

2006

Cisco 642-55 Certification, Securing Networks with PIX and ASA

2005

Cisco Regional Intructor, Wireless LANs

2005

Microsoft Certified Professional (MCP)

2001

Member of BCS.

2000 (and 2005)

Cisco Certified Instructor - Semester 1 -4

1996

PhD. Mathematical Modelling.

1993

CEng, MIEE.

1986

BSc (Hons) in Communications and Electronic Engineering. 2:1.

 

 

Funding

The following outlines some of my recent funding

Seven Layer Communications Ltd KTP

£71,140

DigitalDNA Proof-of-Concept

£215,000

Information Sharing between the Police and their Community Partners (Scottish Police)

£30,000

Data Capture and Auto Identification Reference (EPSRC/TSB)

£217,334 (80% FEC)

Callendar Estate Knowledge Transfer

£5,000

Summerhall KTP

£77,459

Digital forensic Toolkit (Scottish Enterprise)

£14,703

Canan KTP

£93,861

Fibrehub Europe Ltd KTP

£60,000

Cisco Local Academy

£10,638

QMAX Research

£23,356

KTP (to be awarded)

£110,806

Scaleable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures (EPSRC/TSB) 

£238,611 (80% FEC)

e-Health Public and Private Cloud (ESPRC)

£69,756

Grant to be awarded

£647,000

FSA PhD Studentship

£30,000

KTP Project (Justfone)

£120,000

KTP Project (Viasystems)

£120,000

Principal Awards

£24,000

Agilent award

£35,000

Symposium in Cybercrime

£10,000

Innovation award (Flexiant)

£5,000

Innovation award (Finance Prediction)

£5,000

Novel Fraud Investigation System (Nov 2011)

£300,000

Novel Informaton Sharing Architecture (Feb 2012)

£320,000

Innovation Voucher (Patient Reminders)

£5,000

Innovation Voucher (Urquart Taylor)

£5,000

Innovation Voucher (CoreBP)

£5,000

Innovation Voucher (Cloud Business)

£5,000

Innovation Voucher (TBA)

£5,000

SIPR Information Sharing Extension

£7000

Book/CD-ROM publications

  1. Buchanan WJ, "C for Electronic Engineering with Applied Software Engineering", Prentice-Hall International, April 1995, ISBN 0-13-342668-8.
  2. Buchanan WJ, "Applied PC Interfacing, Interrupts and Graphics", Addison-Wesley, June 1996, ISBN 0-201-87728-7. [Review]
  3. Buchanan WJ, "Data Communications and Computer Networks", Chapman & Hall, ISBN 0-412-75430-4.
  4. Buchanan WJ, "Microelectronic Systems: Design, Modelling and Test", Arnold, Jan. 1997, ISBN 0-340-67771-6.
  5. Buchanan WJ, "Mastering Global Information Systems", Macmillan, Sept. 1997, ISBN 0-333-68951-8. (and Chinese edition). Translated into several languages, including Chinese (2002).
  6. Buchanan WJ, "Mastering the Internet", Macmillan, Sept. 1997, ISBN 0-333-6926-6. (and Polish edition).
  7. Buchanan WJ, "Advanced Data Communications and Networks", Chapman & Hall, Sept. 1997, ISBN 0-412-80630-4.
  8. Buchanan WJ, "Software Development for Engineers (C++/ Pascal/ Assembly/ Visual Basic/ HTML/ JavaScript and Java)", Arnold, October 1997, ISBN 0-340-70014-9.
  9. Buchanan WJ, "Advanced PC Interfacing, Communications and Windows Programming", Addison-Wesley, Apr. 1998, Nov. 1998. ISBN 0-201-87728-7. Translated into several languages, including Chinese and Japanese editions 2002.
  10. Buchanan WJ, "Handbook of Data Communications and Networks", Kluwer, Jan. 1998, ISBN 0-412-84060-0.
  11. Buchanan WJ, "Mastering Pascal and Delphi", Macmillan, Apr. 1998. ISBN 0-333-73007-0. Top 100 Bestseller on Amazon.co.uk (January 2000). No.1 Pascal book in the UK / No3. for Delphi. [Review] No. 1 Pascal in W.H.Smiths/
  12. Buchanan WJ, "Mastering Java", Macmillan, Apr. 1998, ISBN 0-333-73008-9. [Review 1/ Review 2]
  13. Buchanan WJ, "Software Development", John Wiley & Sons. December 1997. ISBN 0-471-85266-2.
  14. Buchanan WJ, "CD-ROM Handbook of Data Communications & Networks", Kluwer, May 1998. ISBN- 0-412-84060. 2nd edition due out soon.
  15. Buchanan WJ, "Mastering Windows NT, Novell NetWare and UNIX", Macmillan, Apr. 1999. ISBN 0-412-84060. Top 10 Novell NetWare book in the UK.
  16. Buchanan WJ, "Mastering Networks", Macmillan, Apr. 1999. ISBN 0-333-748042. Top 100 Bestseller on Amazon.co.uk (Autumn 1999).
  17. Buchanan WJ, "Computer Busses", November 1999, Arnold, ISBN 0-340-74076. Parts used by Yale University for their Engineering & Applied Science Library display as part of a Tercentennial celebrations.
  18. Buchanan WJ and Wilson A, "Advanced PC Architecture", Addison-Wesley Longman, Spring 2000, ISBN 0-201-39858-3.Tranlated into Chinese edition - Chinese Electric Power Press of Beijing (2003)
  19. Buchanan WJ, "Wiedziec wieceg Internrt", Oct 1999. (Polish edition). ISBN 83-206-1283-7.
  20. Buchanan WJ, "Mastering Computing", ISBN 0333748069, Palgrave. Polish edition [Picture].
  21. Buchanan WJ, "Mastering Delphi", Jan 2003, Macmillan.
  22. Buchanan WJ, "Distributed Systems and Networks", McGraw-Hill, June 2000, ISBN 0-077-09583-9.Translated in Indian by Tata McGraw-Hill (2004).
  23. Buchanan, W. (2010). Introduction to Security and Network Forensics ( ed.). : CRC Press. [Amazon] [Visit home page of book]
  24. Buchanan, W. (2011). Advanced Cloud and Virtualisation ( ed.). : . CRC Press.
 

Academic publishing

2014

Buchanan, W., Smales, A. (2014, Feb). The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working, Edinburgh.

Kwecka, Z., Buchanan, W., SCHAFER, B. (2014). "I am Spartacus" – Privacy Enhancing technologies and Privacy as a public good. Artificial Intelligence and Law.

Molla, R., Romdhani, I., Buchanan, W., Fadel, Etimad Y. (2014, June). Mobile User Authentication System for E-commerce Applications. Paper presented at International Conference on Advanced Networking, Distributed Systems and Applications, Algeria.

2013

Buchanan, W., Kwecka, Z., Ekonomou, E. (2013). A Novel Privacy Preserving Method for the Location Tracking of Mobile Devices. The Journal of Mobile Communication, Computation and Information: Special Issue on Security, 18, 728–737.

Buchanan, W., Burns, N., Lo, O., Lewis, R., Uthmani, O., Fan, L. (2013, April). A Scaleable and Trusted e-Health eco-System: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013, European Commission, Brussels.

Buchanan, W. (2013). Building a New Nation: Risk, Goverance and Trust. Paper presented at Cyber Security 2013, Edinburgh.

Buchanan, W., Smales, A. (2013, Sept). Cyber Risk and Opportunities in the Cloud. Paper presented at Cloud Security Congress 2013, Edinburgh.

Buchanan, W., Smales, A. (2013). e-Health in the Cloud. Paper presented at Future of e-Health, Hollyrood, Edinburgh.

Buchanan, W., Macfarlane, R., Clayton, J. (2013). Experimental Evaluation of Disk Sector Hash Comparison for Forensic Triage using a Bloom Filter. In: CyberForensics 2013.

Buchanan, W., Fan, L., Uthmani, O., SCHAFER, B. (2013). Interagency Data exchange, Privacy protection and Governance Architecture for Information Sharing across Domains. Artificial Intelligence and Law.

Buchanan, W., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., varga, j., anderson, c. (2013). Modelling of Integrated Trust, Governance and Access safi.re: Information Sharing Architecture. Communications in Computer and Information Science, 182, 91-101 .

Buchanan, W., Smales, A. (2013). Public Perceptions in Health Care Security. Paper presented at Health Informatics 2013, Heriot-Watt, Edinburgh.

Buchanan, W. (2013, March). The Challenges of Big Data: Future Risks, Governance and Trust. Paper presented at The Future of Cyber Security 2013, London, UK.

Buchanan, W., Smales, A. (2013). UK Citizen Attitudes on the Access to Electronic Health Records. Not Submitted.

Buchanan, W., Burns, N., Lo, O., Uthmani, O., varga, j., Lawson, A., anderson, c. (2013). Who Would You Trust To Identify You In Accessing Your Health Record?. Communications in Computer and Information Science.

Kwecka, Z., Buchanan, W., SCHAFER, B. (2013). Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?. In: INFORMATIK 2013. (pp. 2134-2148 ). Köllen Druck+Verlag.

Lo, O., Fan, L., Buchanan, W., Thuemmler, C. (2013). Conducting Performance Evaluation of an e-Health Platform. In: Issa, T., Isaías, P., Kommers, P. (Eds.) Information Systems and Technology for Organizations in a Networked Society. (pp. 295-315). Hershey, PA.: IGI Global Publishing.

Penrose, P., Macfarlane, R., Buchanan, W. (2013). Approaches to the Classification Of High Entropy File Fragments. Digital Investigator, 10(4), 372–384.

Thuemmler, C., Mival, O., Benyon, D., Buchanan, W., Paulin, A., Barros, M. (2013). Norms and Standards in Modular Medical Architectures. In: 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom) (IEEE Healthcom 2013). (pp. 382 - 387). Lisbon, Portugal.

Uthmani, O., Buchanan, W., Fan, L., Lawson, A. (2013). A Novel Information Sharing Model using Binary Decision Diagrams for Redundancy, Shadowing, Generalisation and Correlation. Not submitted.

Uthmani, O., Buchanan, W., Fan, L., Lawson, A. (2013). Evaluation of Binary Decision Diagrams for Redundancy, Shadowing, Generalisation and Correlation in an Information Sharing Model. Not submitted.

van Deursen (Hazelhoff Roelfze, N., Buchanan, W., Duff, A. (2013). Monitoring information security risks within health care. Computers and Security, 37, 31-45.

2012

Bani Khalaf, M., Al-Dubai, A., Buchanan, W. (2012). A New Efficient Distributed Route Discovery for Wireless Mobile Ad hoc Networks. In: the 11th IEEE International Wireless Telecommunications Symposium. (pp. 1-6). IEEE Communication Society.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C. (2012). Case Study: Moving Towards an e-health Platform to Store NHS Patient Information in the Cloud . Paper presented at Cloud Computing in the Public Sector: The Way Forward, London.

Buchanan, W., Macfarlane, R., Graves, J., Fan, L., Ekonomou, E., Bose, N. (2012). Cloud Forensics. In: .

Buchanan, W., Fan, L., Ekonomou, E., Lo, O. (2012). Cloud4Health. Paper presented at Symposium on the Future of e-Health, Edinburgh.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Scott, R., Thuemmler, C., Uthmani, O. (2012). Computational data protection law: trusting each other offline and online. Frontiers in Artificial Intelligence and Applications, Volume 250: Legal Knowledge and Information Systems, 31 - 40.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Scott, R., Thuemmler, C., Uthmani, O. (2012). Computational data protection law: trusting each other offline and online. . Legal Knowledge and Information Systems, 250, 31-40.

Buchanan, W. (2012). Education & Training for Future Threats. Paper presented at ITEC 2012, London.

Buchanan, W. (2012). Future Risks – Including The Rise of the Hacktivism. In: National Information Security Conference (NISC).

Buchanan, W. (2012). Hashing Functions in Microsoft .NET.

Buchanan, W., Fan, L., Lo, O., Ekonomou, E. (2012). HOLISTIC HEALTHCARE WITHIN DYNAMIC INFORMATION INFRASTRUCTURES - THE CLOUD BASED eHEALTH PLATFORM. Paper presented at eHealth 2012, Dynamic Earth, Edinburgh.

Buchanan, W., Lewis, R., Fan, L., Uthmani, O. (2012, June). Information Sharing Around Child Protection. Paper presented at Information Sharing in the Public Sector, Edinburgh.

Buchanan, W. (2012, June). Innovation in Cloud Environments. Paper presented at Future of Technology, Royal Society of Edinburgh.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., Thuemmler, C. (2012, May). Integrating Assisted Living with Primary and Secondary Health Care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing, Edinburgh.

Buchanan, W. (2012, June). Introducing Cloud-based virtualised environments and their use in supporting learning and teaching. Paper presented at Enhancing, extending and empowering student learning within online environments, Edinburgh.

Buchanan, W. (2012). New Threats. Paper presented at Transatlantic Conference 2012, Edinburgh.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C. (2012). Patient Centric Health Care: An Integrated and Secure, Cloud-based, e-Health Platform. Paper presented at BCS Branch Meeting, University of Edinburgh Informatics Forum.

Buchanan, W. (2012). Plugging the Gaps. ITNOW, 54(4), 36-37(2).

Buchanan, W. (2012, Feb). Skills for cyber security. Paper presented at Cybercrime and Data Protection, Dynamic Earth, Edinburgh.

Buchanan, W., Fan, L., Ekonomou, E., Lo, O., Thuemmler, C., Lawson, A. (2012). The UK’s eHealth Cloud Project: EHR And The Cloud: Assessing The Benefits And Mitigating The Risks. Paper presented at Arab Health 2012 (Electronic Healthcare Records), Dubai.

Buchanan, W. (2012). Towards a New Health and Social Care Information Sharing Architecture.

Buchanan, W. (2012). Training the Next Generation. Paper presented at Digital Security and Cybercrime Staff Skills Shortage: Addressing the Issues, Edinburgh.

Fan, L., Buchanan, W., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., Ekonomou, E., Khedim, A. (2012). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In: eTELEMED 2012. (pp. 99-104).

Flandrin, F., Buchanan, W., Macfarlane, R. (2012). A Platform for Digital Forensics Evaluation (D-FET).

Lo, O., Fan, L., Buchanan, W., Thuemmler, C. (2012). Technical Evaluation of an E-Health Platform. IADIS E-Health 2012, 21-28.

Lo, O., Fan, L., Buchanan, W., Thuemmler, C., Lawson, A. (2012). Towards Simulation of Patient Data for Evaluation of E-Health Platform and Services. In: PGNET 2012. (pp. 160-165).

Macfarlane, R., Buchanan, W., Ekonomou, E., Uthmani, O., Fan, L., Lo, O. (2012). Review of Security Policy Implementations. Computers & Security, 31(2), 253-271.

Thuemmler, C., Fan, L., Buchanan, W., Lo, O., Ekonomou, E., Khedim, A. (2012). E-Health: Chances and Challenges of Distributed, Service oriented Architectures. Journal of Cyber Security and Mobility, 37(52).

Uwagbole, S., Buchanan, W., Fan, L. (2012). Novel Tracking of Rogue Network Packets Using Danger Theory Approach. 11th European Conference on Information Warfare and Security (ECIW-2012).

2011

Buchanan, W., Flandrin, F., Macfarlane, R., Graves, J. (2011). A Methodology to Evaluate Rate-Based Intrusion Prevention System against Distributed Denial-of-Service (DDoS). In: Cyberforensics 2011.

Buchanan, W. (2011, May). A next generation Cloud-based health care platform. Paper presented at Innovation in Healthcare, London.

Buchanan, W. (2011). Advanced Cloud and Virtualisation. CRC Press.

Buchanan, W., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., Bose, N., Ludwiniak, R. (2011). Cloud-based Digital Forensics Evaluation Test (D-FET) Platform. Cyberforensics 2011.

Buchanan, W., Fan, L., Thuemmler, C., Lo, O., Ekonomou, E. (2011, Sept). Cloud-based e-Health System. Paper presented at BCS Health Informatics, Edinburgh.

Buchanan, W. (2011, Sept). Creation of Dynamic Environments for Virtualised and Cloud-based Teaching in Digital Forensics and Computer Security. Paper presented at CFET, Canterbury.

Buchanan, W., Macfarlane, R. (2011, June). D-FET – A Community Cloud for Enhancing Skills using Virtualised Environments and Cloud-based Infrastructures. Paper presented at Scottish Higher Education Employability Conference: Strengthening Partnerships with Employers, Heriot-Watt, Edinburgh.

Buchanan, W. (2011). Evidence to the Justice Committee at the Scottish Parliament . Scottish Executive.

Buchanan, W. (2011). How Academic IT Departments Manage Changing IT Environments. VitAL, 5 (1), 26-32.

Buchanan, W. (2011). Introduction to Security and Network Forensics. Auerbach Publications.

Buchanan, W. (2011). Making assessment and feedback fun: feedback before and after assessments. Paper presented at Edinburgh Napier University Staff Conference, Edinburgh Napier University.

Buchanan, W. (2011, June). Next Generation Secure e-Health Platform. Paper presented at BCS ISSG seminar "The Insider Threat", Edinburgh.

Buchanan, W., Graves, J., Bose, N., Macfarlane, R., Davison, B., Ludwiniak, R. (2011). Performance and Student Perception Evaluation of Cloud-based Virtualised Security and Digital Forensics Labs. HEA ICS Conference.

Buchanan, W. (2011). Student Perception of On-line Lectures with a Blended Learning Environment. Paper presented at Edinburgh Napier University Staff Conference, Craiglockhart.

Ekonomou, E., Buchanan, W., Fan, L., Thuemmler, C. (2011). An Integrated Cloud-based Healthcare Infrastructure. In: IEEE CloudCom '11. (pp. 532 - 536). Athens, Greece: IEEE.

Fan, L., Buchanan, W., Thuemmler, C., Lo, O., Khedim, A., Uthmani, O., Lawson, A., Bell, D. (2011). DACAR Platform for eHealth Services Cloud. IEEE 4th International Conference on Cloud Computing, 219-226.

Kwecka, Z., Buchanan, W., Spiers, D. (2011). Minimising Collateral Damage: Privacy-Preserving Investigative Data Acquisition Platform. International Journal of Information Technologies and Systems Approach (IJITSA) : Special issue on Privacy and Security Issues in IT, 4(2), 12-31.

Miehling, M., Buchanan, W., Lawson, A. (2011). Affliate Advertising Fraud and an Investigatory Fraud Framework. In: CyberForensics 2011. Glasgow.

Miehling, M., Buchanan, W., Lawson, A. (2011, Auguest). Detection Framework for the Reduction of Click-through and ID Theft Fraud in Affiliate Marketing. Paper presented at SCONE, Glasgow.

Scott, R., Uthmani, O., Buchanan, W., Lawson, A. (2011, June). Intelligence Information Sharing between the Police and their Community Partners. Paper presented at Symposium on Security and Cybercrime, Edinburgh Napier University.

Uthmani, O., Buchanan, W., Lawson, A., Scott, R., SCHAFER, B., Fan, L. (2011). Crime Risk Evaluation within Information Sharing between the Police and Community Partners. Information & Communications Technology Law, 20(2), 57 - 81.

Uthmani, O., Buchanan, W., Lawson, A., Scott, R., SCHAFER, B., Fan, L., Uthmani, S. (2011). Crime Risk Evaluation within Information Sharing between the Police and Community Partners. Information & Communications Technology Law, 20(2), 57-81.

Uthmani, O., Buchanan, W., Lawson, A. (2011, August). Risk Analysis for Criminal Context in Information Sharing Policies. Paper presented at SCONE, Glasgow.

2010

Bani Khalaf, M., Al-Dubai, A., Buchanan, W. (2010). A New Adaptive Broadcasting Approach for Mobile Ad hoc Networks. In: Proceedings of 2010 6th Conference on Wireless Advanced (WiAD) . (pp. 1 - 6 ). London: IEEE Computer Society.

Buchanan, W. (2010). 3DES Encryption and Decryption in Microsoft .NET. CDCS.

Buchanan, W. (2010). AES Encryption and Decryption in Microsoft .NET. CDCS.

Buchanan, W., Thuemmler, C., Fan, L., Lo, O., Khedim, A. (2010, September). An e-Health Cloud. Paper presented at Cloud Computing for the Public Sector, Edinburgh.

Buchanan, W. (2010). Data Communications and Computer Networks. Springer.

Buchanan, W., Thuemmler, C., Fan, L., Lo, O., Khedim, A. (2010, August). Information sharing framework: Next Generation e-Health Cloud. Paper presented at BCS Health Informatics Scotland, Glasgow.

Buchanan, W., Fan, L., Lawson, A., SCHAFER, B., Thuemmler, C., Uthmani, O. (2010). Interagency data exchange protocols as computational data protection law. Paper presented at Legal Knowledge and Information Systems, .

Buchanan, W., Thuemmler, C. (2010). Modelling Infection Spread Using Location Tracking. International Journal of Healthcare Technology and Management (IJHTM), 11(6).

Buchanan, W., Uthmani, O. (2010, February). Novel Information Sharing Architecture between the Police and their Community Partners. Paper presented at Scottish Networking Event 2010, Napier University, Edinburgh.

Buchanan, W., Uthmani, O. (2010, Feb). Novel Information Sharing Architecture between the Police and their Community Partners. Paper presented at SCONE, Edinburgh Napier University.

Buchanan, W., Graves, J., Bose, N. (2010). Patent: IMPROVEMENTS IN OR RELATING TO DIGITAL FORENSICS.

Buchanan, W. (2010). RC2 Encryption and Decryption in Microsoft .NET. CDCS.

Buchanan, W., Macfarlane, R., Ludwiniak, R. (2010). Student Perception of On-Line Lectures with a Blended Learning Environment. Paper presented at The 4th International Conference on Cybercrime Forensics Education & Training, Canterbury.

Kwecka, Z., Buchanan, W., Spiers, D. (2010). Privacy-preserving data acquisition protocol. In: IEEE International Conference of Computational Methods in Electrical and Electronics Engineering. (pp. 131 - 136). Listvyanka: IEEE.

Lo, O., Graves, J., Buchanan, W. (2010). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In: 9th European Conference on Information Warfare and Security. (pp. 190-200). Greece.

Mason, A., Dingle, N., Knottenbelt, W., Bell, D., Buchanan, W., Thuemmler, C. (2010). Modelling infection spread using location tracking. Int. J. Healthcare Technology and Management,, 11(6), 442-461.

Miehling, M., Buchanan, W., Old, L.J., Batey, A., Rahman, A. (2010). Analysis of Malicious Affiliate Network Activity as a Test Case for an Investigatory Framework. In: 9th European Conference on Information Warfare and Security. Greece.

Migas, N., Buchanan, W. (2010). Ad-hoc Routing Metrics and Applied Weighting for QoS support. International Journal of Parallel, Emergent, and Distributed Systems, 25(4), 293 - 314.

Smith, M., Buchanan, W., Thuemmler, C., Bell, D., van Deursen (Hazelhoff Roelfze, N. (2010). Analysis of Information Governance and Patient Data Protection within Primary Health Care. International Journal for Quality in Health Care .

Thuemmler, C., Buchanan, W. (2010). Review of coding for success implementation.

Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C. (2010). Novel Information Sharing Syntax for Data Sharing between Police and Community Partners, using Role-based Security. In: 9th European Conference on Information Warfare and Security. (pp. 394-402). Greece.

Uthmani, O., Buchanan, W., Lawson, A., Thuemmler, C., Fan, L. (2010). Novel Information Sharing Syntax for Data Sharing Between Police and Community Partners, Using Role-Based Security. Proceedings of the 9th European Conference on Information Warfare and Security, 394-402.

2009

Buchanan, W., Thuemmler, C. (Eds.) (2009). International Journal of Healthcare Technology and Management: Special Issue on Patient-Centric Modelling and Enhanced Security in Distributed Healthcare Systems, 10 (1/2). Inderscience.

Garrigues, C., Migas, N., Buchanan, W., Robles, S. (2009). Protecting mobile agents from external replay attacks. Journal of Systems and Software Journal of Systems and Software, 82(2), 197-206.

Kwecka, Z., Buchanan, W., Spiers, D. (2009). Application and Analysis of Private Matching Schemes Based on Commutative Cryptosystems. In: 8th European Conference on Information Warfare and Security. Lisbon.

Thuemmler, C., Buchanan, W., Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management (IJHTM), 119-131.

Thuemmler, C., Buchanan, W., Fekri, H., Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management , 10(1-2), 119 - 131.

2008

Kwecka, Z., Buchanan, W., Saliou, L. (2008). Validation of 1-N OT Algorithms in Privacy-Preserving Investigations. In: 7th European Conference on Information Warfare and Security.

Migas, N., Buchanan, W. (2008). Ad-hoc Routing Metrics and Applied Weighting for QoS support. In: 22nd IEEE International Parallel & Distributed Processing Symposium. (pp. 1 - 8 ). Miami, FL: IEEE.

2007

Buchanan, W. (2007). The Handbook of Data & Networks Security 1 (1 ed.). Springer-Verlag New York, Inc. Secaucus, NJ, USA.

Lawson, A., Buchanan, W. (2007). Challenge-based Learning Framework for Teaching Programming Skills. Paper presented at HEA-ICS 7th Programming Workshop, University of Kent, Canterbury, 2nd April 2007, .

Migas, N., Constantia, A., Buchanan, W. (2007). Mass Customisation through Personalised Brochures: the Role of Digital Printing. The 15th European Conference on Information Systems.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: Remenyi, D. (Ed.) 6th European Conference on Information Warfare and Security. (pp. 227-235). Shrivenham, UK: Academic Conferences International.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall. In: 6th European Conference on Information Warfare and Security. (pp. 227-235). Shrivenham, UK,.

Thuemmler, C., Buchanan, W. (2007). Setting Safety Standards by Designing a Low-budget and Compatible Patient Identification System based on Passive RFID Technology. International Journal of Healthcare Technology and Management (IJHTM), 8(5), 571-583.

2006

Abimbola, A., Munoz, J., Buchanan, W. (2006). A Framework to detect novel Computer Viruses via System Calls. In: Merabti, M., Pereira, R., Abuelma'atti, O. (Eds.) 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting. (pp. 308-313). John Moores University, Liverpool, UK: PGNet.

Abimbola, A., Munoz, J., Buchanan, W. (2006). Enhancing Intrusion Detection via a Active Target Host. In: IEEE ICTe Africa 2006. Kenya: IEEE Computer Society Press.

Abimbola, A., Munoz, J., Buchanan, W. (2006). Investigating False Positive Reduction in HTTP via Procedure Analysis. In: IEEE International Conference on Networking and Services. (pp. 87 - 87). Slicon Valley, CA: IEEE Computer Society Press.

Abimbola, A., Munoz, J., Buchanan, W. (2006). NetHost-Sensor: Investigating the Capture of End-To-End Encrypted Intrusive Data. Computers & Security, 25(6), 445-451.

Abimbola, A., Munoz, J., Buchanan, W. (2006). NetHost-sensor: Monitoring a target host's application via system calls. Information Security Tech. Report, 11(4), 166-175.

Buchanan, W., Migas, N., McArtney, K. (2006). Analysis of an Agent-based Metric-Driven for Ah-hoc, On-Demand Routing. Journal of Ad-hoc Networks, 4(2), 146-167.

Buchanan, W. (2006). Mastering Information Technology (Palgrave Masters Series (Computing)) 1 (1 ed.). Palgrave.

Graves, J., Buchanan, W., Saliou, L., Old, L.J. (2006). Performance Analysis of Network Based Forensic Systems for In-line and Out-of-line Detection and Logging. In: Hutchinson, B. (Ed.) 5th European Conference on Information Warfare and Security. (pp. 41-50). Helsink, Finland: Academic Conferences International.

Migas, N., Buchanan, W. (2006). An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing. In: Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International Symposium and Workshop on . (pp. 8-22). IEEE Computer Society.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2006). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In: Hutchinson, B. (Ed.) 5th European Conference on Information Warfare and Security. (pp. 205-214). Helsinki, Finland.

2005

Buchanan, W., Graves, J., Saliou, L., Migas, N. (2005). Agent-based Forensic Investigations with an Integrated Framework. In: Hutchinson, W. (Ed.) 4th European Conference of Information Warfare and Security. (pp. 47-52). Glamorgan, United Kingdom: Academic Conferences International.

Buchanan, W., Munoz, J., Raja, K. (2005). Critical Analysis and Error Determination of Locating-finding Techniques in GSM. International Journal of Mobile Communications (IJMC), 3(2), 165-182.

Migas, N., Buchanan, W. (2005). Metric Evaluation of Embedded Java-based Proxies on Handheld Devices in Cluster-based Ad-hoc Routing. ECBS '05 Proceedings of the 12th IEEE International Conference and Workshops on Engineering of Computer-Based Systems , 147 - 154.

Saliou, L., Buchanan, W., Graves, J., Munoz, J. (2005). Novel Framework for Automated Security Abstraction, Modelling and Verification. In: Hutchinson, W. (Ed.) 4th European Conference on Information Warfare and Security. (pp. 303-311). Glamorgan, United Kingdom: Academic Conferences International.

2004

Abimbola, A., Munoz, J., Buchanan, W. (2004). Analysis and Detection of Cruising Computer Viruses. 3rd International Conference on Electronic Warfare and Security (EIWC).

Abimbola, A., Munoz, J., Buchanan, W. (2004). Viral-Net System Via Autonomous Agent Technology. BCS Symposium/Colloquium on Mobile and Complex Agent Applications.

Buchanan, W., McArtney, K., Migas, N. (2004). Agent-based Clustering over Ad-hoc Networks. Expert Update.

Buchanan, W., Migas, N., McArtney, K. (2004). Agent-based Systems for Ah-hoc Routing in Wireless Networks. In: BCS Symposium/Colloquium on Mobile and Complex Agent Applications. Napier University, Edinburgh.

Buchanan, W., Raja, K., Munoz, J. (2004). Analysis and migration of location-finding methods for GSM and 3G networks. 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on , 352 - 358 .

Buchanan, W. (2004). Correlation between academic and skills-based tests in computer networks. British Journal of Education Technology (BJET), 37(1), 69-78.

Buchanan, W. (2004). Covert Channel Analysis and Detection using Reverse Proxy Servers. 3rd International Conference on Electronic Warfare and Security (EIWC).

Buchanan, W., Llamas, D. (2004). Covert Channel Analysis and Detection using Reverse Proxy Servers. 3rd International Conference on Electronic Warfare and Security (EIWC.

Buchanan, W., Saliou, L. (2004). Enhanced Methods of Coursework Provision of Computing. IEEE International Conference on Information Technology: Research and Education, 111 - 115.

Buchanan, W. (2004). Network-based Computer Forensics for Misuse Detection. Industrial Management & Data Systems (IMDS) Journal.

Buchanan, W. (2004). Replacing Courseworks with Practical Assessments in Computer Networks. Napier Teaching Fellow’s Journal.

Buchanan, W. (2004). The handbook of data communications and networks 1 (2 ed.). Springer.

Buchanan, W. (2004). Uzytkowanie Komputerow. Wkt (Poland).

Buchanan, W., Raja, K., Munoz, J. (2004). We know where you are [Location tracking]. Communications Engineer , 2 (3), 34 - 39 .

Migas, N., Buchanan, W., McArtney, K. (2004). Benchmarking bandwidth and resource consumptions of Java-based proxy PDAs in ad-hoc networks. Expert Update.

Migas, N., Buchanan, W., McArtney, K. (2004). Migration of Mobile Agents in Ad-hoc Wireless Networks. Engineering of Computer-Based Systems, 2004. Proceedings. 11th IEEE International Conference and Workshop on the , 530 - 535.

Raja, K., Buchanan, W., Munoz, J. (2004). Analytical Review of Mobile Phone-based Location-finding. IEE Communication Engineer, 2(3), 34-39 .

2003

Buchanan, W. (2003). Some Studies on the CAN Specification. In: Mahalik, N. (Ed.) Fieldbus Technology: Industrial Network Standards for Real-Time Distributed Control. (pp. 516-532). Springer.

Migas, N., Buchanan, W., McArtney, K. (2003). MARIAN: A Framework using Mobile Agents for Routing, Topology Discovery and Automatic Network Reconfiguration in Ad-hoc Networks. IADIS International Conference, WWW/Internet 2003, 1129-1134.

Migas, N., Buchanan, W., McArtney, K. (2003). Mobile Agents for Routing, Topology Discovery, and Automatic Network Reconfiguration in Ad-Hoc Networks. IEEE ECBS 2003, 200 - 206 .

2002

Brown, E., Buchanan, W. (2002). EML in the Support of Minority Languages. LSTN 2002, 106-107.

Buchanan, W. (2002). Complete Handbook of the Internet. Kluwer Academic Publishers Norwell, MA, USA.

Buchanan, W. (2002). Mastering Computing. Macmillan Press.

Buchanan, W. (2002). Mastering Delphi Programming. Palgrave Publishers.

Buchanan, W., Brown, E. (2002). Towards a Reusable and Reconfigurable WWW, System-Level Issues and Approaches in Software Development. IEEE 26th Annual International Computer Software and Applications Conference,, 814 - 815.

Golam, H., Buchanan, W. (2002). Component-based Tools Platform for Network Testing. 9th IEEE Conference in ECBS.

Golam, H., Buchanan, W., Munoz, J. (2002). Component-based Tools Platform for Network Testing. IEEE ECBS 2003.

Lewis, O., Mannion, M., Buchanan, W. (2002). Performance Issues of Variability Design for Embedded System Product Lines. Fraunhofer IESE Technical Report 070.00/E.

Migas, N., Buchanan, W., McArtney, K. (2002). Mobile Agetns for Routing, Topology Discovery and Automatic Network Reconfiguration. IEEE ECBS 2002.

Pikoulas, J., Buchanan, W., Mannion, M. (2002). An Intelligent Agent Security Intrusion System. Engineering of Computer-Based Systems, 2002. Proceedings. Ninth Annual IEEE International Conference and Workshop on the , 94 - 99 .

2001

Buchanan, W. (2001). Computer busses. Butterworth-Heinemann Newton, MA, USA..

Buchanan, W. (2001). PC Interfacing, Communications and Windows Programming (Chinese ed.). Addison Wesley.

Pikoulas, J., Buchanan, W., Mannion, M., Triantafyllopoulos, K. (2001). An Agent Based Bayesian Forecasting Model for Enhanced Network Security. In: Engineering of Computer Based Systems, 2001. ECBS 2001. Proceedings. Eighth Annual IEEE International Conference and Workshop on the (April ed.). (pp. 247 - 254). Washington: IEEE.

2000

Buchanan, W., Wilson, A. (2000). Advanced PC Architecture. Addison-Wesley.

Buchanan, W., Scott, A., Mannion, M., Naylor, M., Pikoulas, J. (2000). Agents, Network Security and Network Management. In: Distributed Systems and Networks. (pp. 600-640). Addison-Wesley.

Buchanan, W. (2000). Compression Techniques for Real-Time Signals. Computer Bulletin (BCS), 2(1), 32.

Buchanan, W. (2000). Computer Busses. Butterworth-Heinemann Newton, MA, USA.

Buchanan, W. (2000). Distributed Systems and Networks. McGraw-Hill.

Buchanan, W., Naylor, M., Scott, A. (2000). Enhancing network management using mobile agents. In: Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop on the . (pp. 218-226).

Buchanan, W., Scott, A., Mannion, M., Naylor, M., Pikoulas, J. (2000). Mobile Agents. Computer Bulletin.

Buchanan, W., Naylor, M., Scott, A. (2000). Mobile Agents with Enhanced Network Management. In: 7th IEEE Conference on electronic Computer Based Systems (April ed.). (pp. 218-226).

Lewis, O., Mannion, M., Buchanan, W. (2000). Performance Issues of Variability Design for Embedded System Product Lines. In: 22nd International Conference on Software Engineering, ICSE 2000 (June ed.). Limerick.

Pikoulas, J., Mannion, M., Buchanan, W. (2000). Software Agents and Computer Network Security. In: Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the (April ed.). (pp. 211-217). IEEE.

Scott, A., Buchanan, W. (2000). Investigation, Analysis and Determination of Inclusions in High-Tolerance Board Design. Journal of the Institute of Circuit Technology, 26(2), 7-9.

Scott, A., Buchanan, W. (2000). Truly distributed control systems using fieldbus technology. In: Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the Issue Date: 2000. (pp. 165-173). Edinburgh , UK : IEEE.

1999

Buchanan, W., Scott, A. (1999). AOI false rejects PCB manufacture. Printed Circuit Fabrication, 22(10), 34-37.

Buchanan, W. (1999). Handbook of Data Communications and Networks 1 (1 ed.). Kluwer.

Buchanan, W. (1999). Java Sockets and Integration with HTTP. Visual Systems Journal.

Buchanan, W. (1999). Mastering Global Information Systems (Chinese ed.). Bejing Press.

Buchanan, W. (1999). Mastering Microsoft Windows, Novell NetWare and UNIX. Palgrave Publishers.

Buchanan, W. (1999). Mastering Networks. Macmillan Press.

Buchanan, W. (1999). Mastering Windows NT, Novell NetWare and UNIX. Macmillan Press.

Buchanan, W. (1999). PC Interfacing, Communications and Windows Programming. Addison-Wesley Longman Ltd. Essex, UK, UK.

Buchanan, W., Scott, A. (1999). Tadpole inclusions in laminate structures PCB AOI. Printed Circuit Fabrication, 22(11), 58-62.

Buchanan, W. (1999). Wiedziec wieceg Internet.

Pearson, B., Buchanan, W. (1999). Intelligent Methods in Industrial Control. In: EPSRC PREP '99.

Scott, A., Buchanan, W. (1999). Excluding inclusions PCB inspection. Journal of Manufacturing Engineer, 78(4), 154-156.

Scott, A., Buchanan, W. (1999). Sources and Causes of Tadpoles. PCB Fab.

Scott, A., Buchanan, W. (1999). Sources of Inclusions in Laminates. IEE Journal in Engineering Manufacture.

1998

Buchanan, W. (1998). Advanced Data Communications and Networks. Kluwer Academic Publishers Norwell, MA, USA.

Buchanan, W. (1998). Advanced PC Interfacing, Communications and Windows Programming. Addison-Wesley.

Buchanan, W. (1998). CD-ROM Handbook of Data Communications & Networks. Kluwer.

Buchanan, W. (1998). Mastering Java. Macmillan Press.

Buchanan, W. (1998). Mastering Pascal and Delphi (2nd ed.). Macmillan Press.

1997

Buchanan, W., Gupta, N.K. (1997). A Novel Parallel Processing Synchronisation Method for Observing Electric Fields in and around PCBs. International Journal of Electronics, 82(1), 61-67.

Buchanan, W. (1997). Applied PC Interfacing, Interrupts and Graphics. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA.

Buchanan, W. (1997). Mastering Global Information Systems (English ed.). Macmillan Press.

Buchanan, W. (1997). Mastering the Internet. Macmillan Press.

Buchanan, W. (1997). Mastering the Internet. Palgrave Publishers.

Buchanan, W. (1997). Microelectronic Systems: Design, Modelling and Test. Arnold.

Buchanan, W. (1997). Software Development. Butterworth-Heinemann Newton, MA, USA.

Buchanan, W. (1997). Software Development for Engineers with C, Pascal, C++, Assembly Language, Visual Basic, HTML, Javascript and Java. John Wiley & Sons, Inc. New York, NY, USA.

Buchanan, W. (1997). Wiedziec wiecej Internet. Wkt (Poland).

1996

Buchanan, W. (1996). Analysis of Electromagnetic Wave Propogation using 3D Finite-Difference Time-Domain Methods with Parallel Processing (PhD). Edinburgh Napier University.

Buchanan, W. (1996). Applied Data Communications and Networks. Springer.

Buchanan, W., Gupta, N.K. (1996). Machine independent algorithm for concurrent finite-element problems. In: 3rd International IEEE Conference on Computation in Electromagnetics, 1996, Conf. Publ. No.420 (Conf. Publ. No.420 ed.). (pp. 17-20). London, UK.

Buchanan, W., Cordiner, S. (1996). Turbocompressor Control using Fuzzy Logic. In: EPSRC Neural Networks Symposium, 1996 (September ed.). University of Edinburgh.

1995

Buchanan, W. (1995). C for Electronic Engineering with Applied Software Engineering. Prentice-Hall, Inc. Upper Saddle River, NJ, USA.

Buchanan, W., Gupta, N.K. (1995). Prediction of Electric Fields from Conductors on a PCB by 3D Finite-Difference Time-Domain Method. IEE Engineering, Science and Education Journal, 4(4), 177-182.

Buchanan, W., Gupta, N.K. (1995). Prediction of Electric Fields in and around PCBs - 3D Finite-Difference Time-Domain Approach with Parallel Processing. Journal of Advances in Engineering Software, 23(2), 111-114 .

1994

Buchanan, W., Gupta, N.K., Arnold, J.M. (1994). 3D FDTD Method in a Microstrip Antenna's Near-Field Simulation. In: 2nd International Conference on Computation in Electromagnetics, 1994 (April ed.).

Buchanan, W., Gupta, N.K., Arnold, J.M. (1994). Application of 3D finite-difference time-domain (FDTD) method to predict radiation from a PCB with high speed pulse propagation. In: 9th International IEE Conference on Electromagnetic Compatibility (August ed.). (pp. 287-291). University of Manchester, UK: IEE.

1993

Buchanan, W., Gupta, N.K. (1993). Enhancements for the 3D FDTD Method. In: FDTD (Antennas) Section (July ed.). Queen Mary’s and Westfield College.

Buchanan, W., Gupta, N.K. (1993). Maxwell's Equations in the 21st Century. IJEEE, 30(4).

Buchanan, W., Gupta, N.K. (1993). Parallel Processing Techniques in EMP Propagation using 3D Finite-Difference Time-Domain (FDTD) Method. Journal of Advances in Engineering Software, 18(3), 149-159.

Buchanan, W., Gupta, N.K. (1993). Simulation of Electromagnetic Pulse Propagation in Three- Dimensional Finite Difference Time-Domain Method using Parallel Processing Techniques. In: 2nd International Conference on Software for Electrical Engineering Analysis and Design. Electrosoft '93. Southampton, UK.

Buchanan, W., Gupta, N.K. (1993). Simulation of near-field radiation for a Microstrip antenna using the 3D FDTD method. In: NRSC 93 Colloquium (April ed.). University of Leeds.

Buchanan, W., Gupta, N.K., Arnold, J.M. (1993). Simulation of Radiation from a Microstrip Antenna using Three-Dimensional Finite-Difference Time-Domain (FDTD) Method. In: 8th International Conference on Antennas and Propagation, 1993 (April ed.). (pp. 639 - 642). Edinburgh: IEE.

1992

Buchanan, W., Gupta, N.K. (1992). Computers as Applied to Time-Domain Methods in Electrical Engineering. In: World Conference on Engineering Education, 1992. University of Portsmouth, UK.

Buchanan, W., Gupta, N.K. (1992). Parallel Processing of the Three-Dimensional Finite-Difference Time-Domain Method. In: NRSC (July ed.). University of Bradford.

1991

Buchanan, W., Gupta, N.K. (1991). Simulation of three-dimensional finite-difference time-domain method on limited memory systems. In: International Conference on Computation in Electromagnetics. (pp. 75-78). , IEE, Savoy Place, London: IEE.

1988

Buchanan, W. (1988). Microwaves in the laboratory. In: IEE Colloquium on 'Teaching Antennas and Propagation to Undergraduates', 1988, Digest No.84 ((Digest No.84) ed.). (pp. 10-12). . London, UK: IEE.

 

 

 

PhD/MPhil Examinations

  1. PhD Examination, 2014 (Forthcoming) [Dublin City University].
  2. PhD Examination, 2014 (Forthcoming) [John Moores University].
  3. PhD Examination, 2013 [University of Plymouth].
  4. PhD Examination, June 2011 [University of Essex].
  5. PhD Examination, Sept 2010 [UWS].
  6. MPhil Examination, Dec 2007 [Robert Gordon's University].
  7. PN Codes, PhD, Dec 2005.
  8. Combinational Logic Synthesis Based on the Dual Form of Reed-Muller Representation, PhD, May 2005.
  9. ATM Networks, Mobile Networks, PhD, Jan 2005.
  10. PhD, Autumn 2004 [University of Ulster].
  11. PhD Examination (SoE), Napier University, 2004.
  12. PhD Examination (SoC), Napier University, 2004.
  13. PhD Examination, Autumn 2004 [Loughborough University].
  14. Low power design of state machines, Y Xia., March 2003 (PhD).
  15. The Migration Processes of Mobile Agents, P.Braun, 2003 (PhD) [University of Jena].
  16. Case-Based Reasoning and Evolutionary Design, Dominic Job, October 2001 (PhD).
  17. Process Support for Component Factories on the Internet, P. Taylor, 2001 (PhD, Feb 2001).
  18. Speed Improvements to the RSA Encryption Method, H.Wang, November 2000 (MPhil).
  19. Fitness Landscapes and Search in the Evolutionary Design of Digital Circuits, Vesselin Vassilev, 2000 (PhD).
  20. Optimal Testing of Multilevel Logic Circuits, Alexandre Bystrov, 1999 (PhD).  
  21. Adaptive Channel Estimators Suitable for Implementation in a Coherent Digital Receivers Operating in a Mobile Satellite Environment, Andres Lang, 1999 (PhD).
  22. Fuzzy Logic Control of Turbocompressors, Steven Cordiner, 1998 (MPhil).
 

PhD/MPhil Completions

  1. Fuzzy Logic Control of Turbocompressors, Steven Cordiner (MPhil). Director of Studies. Completion: 1998.
  2. Speed Improvements to the RSA Encryption Method, H.Wang (MPhil). Director of Studies. Completion: November 2000.
  3. Performance Issues of Variability Design in Embedded System Application Families, Oliver Lewis, (PhD). Director of Studies. Completion: November 2000.
  4. Intelligent Control of Rotating Machinery, PhD Viva. Director of Studies. Completion: Feb 2001.
  5. Automated Synthesis and Optimisation of Multi-level Logic Circuits, Lingli Wang, 2nd Supervisor. Completion: Jan 2001.
  6. Agent-based Intrusion Detection using the Baysian Method, J.Pikoulas, Director of Studies. Completion: April 2003.
  7. Component-based Network Test Tools Platform for Network Design and Maintenance, H.Golam. Director of Studies. Completion: June 2003.
  8. Mobile Agent Routing over Ad-hoc Networks, N.Migas, Director of Studies. Completion: Nov 2005.
  9. NetHost-Sensor:Enhancing Intrusion Detection via An Active Target Host, A.Abimbola, 2nd Supervisor. Completion: Sept 2006.
  10. Digital Forensics Framework, Director of Studies, 2008. Protected by patents.
  11. Performance Evaluation of Security, Director of Studies, 2009.
  12. Cryptographic Privacy Enhancement Method for Investigative Data Acquisition (PhD). Director of Studies, 2011.
 

External Examinerships

1

Robert Gordons University, Aberdeen (started Aug 1997 - completed Aug 2001).

BSc (Hons)

2

Paisley University, Paisley (started 1998 - complete 2003).

BSc

3

University of Central Lancashire (started 1999 - Completed 2003).

MSc

4

Staffordshire University (2004-2008).

BSc (Hons)

5

University of Sunderland

MSc Security

6

University College, Dublin (2011 - current).

BEng in Digital Media Engineering

7

Royal Holloway, University of London

MSc in Information Security

 

Research funding and awards

  • DFET, EU Grant, 500K Euros.
  • EPSRC Award, Trusted Services, Jan 2011 (part of £2 million grant).
  • TSB/EPSRC Award, Information Infrastructure Protection: Managing complexity, risk and resilience, Nov 2009. £280,000 (part of £1.6 million grant). [Link]
  • US Patent: 61/116681 (with Jamie Graves), Oct 2009. DNA Digital Fingerprinting Framework.
  • UK Patent: 0816556.5 (with Jamie Graves), Sept 2008. DNA Digital Fingerprinting Framework.
  • Proof-of-Concept, 2008-2010, £200,000. Digital DNA, Two year project.
  • SIPR (Scottish Institute for Policing Research) funded PhD studentship, 2008, £30,000.
  • FSA-funded PhD studentship, 2008, £30,000.
  • KTP (Knowledge Transfer Partnership), Summerhall, 2007. £60,000.
  • KTP with Fibrehub Europe Ltd. June 2003. Development of Voice/Video over IP systems, especially related to delivery to mobile devices. £60,000.
  • KTP with Seven Layer Communications Limited, South Queensferry. KTP Programme No. 2966. Development of high-speed configurable networking test equipment. Winning Programme, KTP Programme Awards 2003. £60,000 Winning Programme, KTP Programme Awards 2003. [Evening News - Award] [Video]
  • KTP with Justfone. Java development for mobile computing using GSM. £120,000.
  • KTP with Canan. June 2001. Development of a multimedia system for minority languages, such as Scots and Irish Gaelic. Awarded Certificate of Excellence (Grade 1), Jan 2004 [Gael - Scotsman] Winning Programme, KTP Programme Awards 2004. £60,000. Gaelic learning WWW site. Awarded Certificate of Excellence (Grade 1), Jan 2004 [Gael - Scotsman] Winning Programme, KTP Programme Awards 2004. [Video][Article]
  • 3-year, EPSRC-funded CASE award in Intelligent Control of Large-Scale Systems. This involves PI Ltd, and involves intelligently controlling industrial equipment that can not be controlled by conventional methods. £60,000.
  • Teaching Company Scheme with Viasystems, North Tyneside , £120,000.
  • Nomination, I ♥ my Tutor Awards (Student voted), Edinburgh Napier University, 2010.
  • Winner, I ♥ my Tutor Awards (Student voted), Edinburgh Napier University, 2011 (Nominated in two classes: Innovation and I ♥ my Tutor) [Details]
  • To be confirmed, £300,000.
 
 

Peer activities

1

Involved in the Department of Electrical and Electronic Engineering submission for RAE 1996 (which was graded as a 3b).

2

Series Editor for the successful IT and Computing series at Macmillan.

3

Executive committee member, IEEE Computer Committee on Electronic Computer Based Systems.

4

Research Senior, Computational Intelligence and Learning, University of Limerick, Aug. 2000.

5

Chair of the IEEE Conference in Electronic Computer Based Systems, Napier University, April 2000. [Pictures]

6

External Assessor, Computer Science Quinquennial Field Review, Anglia Polytechnic University, April 2001.

7

Programme Committee Member, Generative and Component-based Software Enginering Conference.

8

External Assessor, Periodic Review and Validation of BSc/MSc Programme, Department of Computing, University of Central Lancashire, March 2002.

9

KTP Award for Excellence, 2003 [Link], with Seven Layer Communications.
[Video of award]

10

Chair, Forthcoming BCS/SGAI Seminar on Mobile Agents, June 2004.

11

Area Editor, Journal of Ad-hoc Networks.

12

External Examiner, Stafford University. 2004-x.

13

KTP Certificate of Excellence for Canan KTP, 2004.

14

Program Committee Member, IEEE Conference in ECBS.

15

Program Committee Member, International Workshop on Agents and Autonomic Computing and Grid Enabled Virtual Organizations (AAC-GEVO’2004).

16

Chair of the forthcoming BCS Colloquium on Mobile Agents, Napier University, July 2004.

17

External Assessor, University of Westminster, April 2004.

18

Invited Paper, 5th International Conference on 3G Mobile Communications Technology, October 2004.

19

.NET C#/Windows Training, Agilent, 2004.

 

Articles in the press

 
  1. Is this the end of the internet café?, Scotsman, 15 Oct 2004 [Link]
  2. Partnership skills translate into a Gael force, Evening News 29 Apr 2004 [Link]
  3. Firm favourites for success, Evening News 29 Apr 2004 [Link]
  4. Award Winner, KTP [Link]
  5. Agents take the load (again), BCS E-Commerce and E-Business, 2001 [Link]
  6. Agents take the load, Leading Edge, BCS, 2000 [Link]
  7. Cybercafes, The Scotsman, 15 October 2004 [Link]
  8. Napier win is easy as KTP after partnership, Evening News, 3 Dec 2004 [Link]
  9. Napier 'spy' software set to fight terrorism, Evening News, 6 Dec 2004 [Link]
  10. Voice-over-IP, The Herald, 28 Dec 2005 [Link]
  11. Still running to keep up, Insider, 5 Dec 2005 [Link]
  12. All for one, The Glasgow Herald, 5 April 2007 [Link]
  13. Rise in Online cons, The Scotsman, 27 April 2007 [Link]
  14. Mobile Phone, Sunday Post, 6 May 2007 [Link]
  15. Web Expert Returns [Link]
  16. Ethical Hacking Course [Link]
  17. Smartphone Infection Tracking [Link]
  18. Is your phone at risk. BBC News 12 Nov 2010 [Link]
  19. Microsoft chief back at seat of learning [Link]
  20. Digital Fingerprint [Link]
  21. Digital Fingerprinting funding, Compute Scotland [Link]
  22. Future care Nov 2010 [Link]
  23. GPS Tracking [Link]
  24. Prevents Infection [Link]
  25. Patient Privacy, Nexxus Scotland [Link]
  26. GPS [Link]
  27. Cybercrime [Link]
  28. Steve's Award, Evening News [Link]
  29. Smart phones, Computing[Link]
  30. Smart phones, Electronics Weekly [Link]
  31. Smart phones [Link]
  32. Smart phones [Link]
  33. Smart phones [Link]
  34. Smart phones [Link]
  35. Smart phone, Evening News [Link]
  36. Expert warns of 'growing threat' from cyber crime, The Herald [Link]
  37. NHS tests cloud-based health platform, Financial Times [Link]
  38. Chelsea and Westminster to pilot shared online records, The Guardian [Link]
  39. Chelsea and Westminster Hospital uses SOA to trial patient records in private cloud, Computer Weekly [Link]
  40. Hospital prepares to test use of "cloud" technology for sharing patient records, BMJ [Link]
  41. Westminster & Chelsea Hospital pioneers cloud initiative, CloudPro [Link]
  42. NHS up in the clouds with Flexiant & Edinburgh Napier, ScotlandIS [Link]
  43. Cloud trials for NHS records, Compute Scotland [Link]
  44. NHS pilots putting patient health records in the cloud, Wired [Link]
  45. Cyber interview [Link]

Some video streams:

  1. Interview related to Gary McKinnon [Watch Video]
  2. A next generation cloud-based healthcare platform, Innovation In Health, May 2011 [Watch Video]
  3. BBC Newsnight Scotland, 27 July 2011 [Watch Video]
  4. Scottish Parliment, 20 Sept 2011 [Watch Video]

Some student thesis'

  1. 2011 - Cryptographic Privacy Enhancement Method for Investigative Data Acquisition [PDF] PhD
  2. 2010 - Performance Evaluation of Virtualization with Cloud Computing PDF] MSc
  3. 2010 - Botnet Analysis and Detection [ PDF] Hons
  4. 2010 - An Evaluation of the Power Consumption and Carbon Footprint of a Cloud Infrastructure [PDF] MSc
  5. 2010 - A COMPARATIVE STUDY OF IN-BAND AND OUT-OF-BAND VOIP PROTOCOLS IN LAYER 3 AND LAYER 2.5 ENVIRONMENTS [PDF] MSc
  6. 2010 - Bonets [ PDF]
  7. 2010 - Rate based IPS for DDoS [PDF]
  8. 2010 - Windows Encyption [PDF]
  9. 2009 - Framework for Network IDS Evaluation [PDF]
  10. 2009 - AN INTEGRATED FIREWALL POLICY VALIDATION TOOL [PDF]
  11. 2009 - Enhanced Event Time-Lining for Digital Forensic Systems [ PDF [Appendix]]
  12. 2009 - Mitigation of DDoS [PDF]
  13. 2009 - Mobile Out-of-Band Authentication [PDF]
  14. 2009 - Firewall Analysis [PDF]

    ... more.

Patent

 

 
 Home | Design | CNDS | Adv. Sec. | Code | Diary | WWW | Essay | Research