Bill Buchanan
Edinburgh Napier University
H-index: 41
Europe-United Kingdom
Top articles of Bill Buchanan
Application of Randomness for Security and Privacy in Multi-Party Computation
IEEE Transactions on Dependable and Secure Computing
2024/3/27
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems
arXiv preprint arXiv:2403.17571
2024/3/26
Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks
IEEE Access
2024/3/18
Review of Generative AI Methods in Cybersecurity
arXiv preprint arXiv:2403.08701
2024/3/13
Anonymised Fixed-Ring Identification Using Decentralised Identifiers
arXiv preprint arXiv:2403.05271
2024/3/8
TIPS: Threat Sharing Information Platform for Enhanced Security
arXiv preprint arXiv:2403.05210
2024/3/8
DID: RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity
arXiv e-prints
2024/3
SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT
IEEE Access
2024/3/1
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant
International Journal of Information Security
2024/2
Stabilized quantum-enhanced SIEM architecture and speed-up through Hoeffding tree algorithms enable quantum cybersecurity analytics in botnet detection
Scientific Reports
2024/1/19
Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) using Bilinear Group Accumulators in Batch Mode
arXiv preprint arXiv:2401.07691
2024/1/15
RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations
arXiv preprint arXiv:2401.04707
2024/1/9
Method for reducing false-positives for identification of digital content
2024/1/4
Attacking Windows Hello for Business: Is It What We Were Promised?
Cryptography
2023/2/14
Towards the creation of the future fish farm
arXiv preprint arXiv:2301.01618
2023/1/2
Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations
2023/11/6
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis
2023/11/6
Scalable Multi-domain Trust Infrastructures for Segmented Networks
2023/11/6
PermutEx: Feature-Extraction-Based Permutation--A New Diffusion Scheme for Image Encryption Algorithms
arXiv preprint arXiv:2311.02795
2023/11/5
A Review of the Non-Fungible Tokens (NFT): Challenges and Opportunities
2023/10/23