Bill Buchanan (computer scientist)

William Johnston Buchanan OBE FBCS CEng PFHEA (born 6 March 1961) is a Scottish computer scientist. Buchanan is a professor in the School of Computing, Engineering and the Built Environment.[1] He currently leads the Blockpass ID Lab[2] and the Centre for Cybersecurity, IoT and Cyberphysical[3] at Edinburgh Napier University.[4] In 2017, he was appointed Officer of the Order of the British Empire (OBE) in the 2017 Birthday Honours for services to cyber security.

William (Bill) Buchanan

OBE
Born6 March 1961
NationalityBritish
Other namesBill Buchanan
EducationPhD, Edinburgh Napier University, 1996
OccupationProfessor
EmployerEdinburgh Napier University
Known for
Children3
AwardsOfficer of the Order of the British Empire
HonoursOBE
Websiteasecuritysite.com
External video
video icon "PROF BILL BUCHANAN OBE - BUILDING A NEW WORLD - Inspired Edinburgh", Interview with Bill Buchanan
video icon "IISP 2018: Futurist academic research into AI", Keynote talk by Bill Buchanan
video icon "BBC News Interview - 21 August 2018", BBC Interview by Bill Buchanan
video icon "Sky News Interview on Wannacry", Sky News Interview with Bill Buchanan
video icon "ABC Interview on Wannacry", ABC Interview with Bill Buchanan, 13 May 2017

Along with the love of the City of Edinburgh, Buchanan has deep passion for cryptography and innovation[5] and is quoted with a tagline of, "A Serial Innovator. An Old World Breaker. A New World Creator."[6] Over the years, he has presented a strong viewpoint on the risks of AI and a Big Brother world.[7] Buchanan also shows a great passion for enterprise and education in Scotland, "For a small country, Scotland has a beating heart of innovation and enterprise. The country is known around the world for its inventors and enterprising spirit. But, at the core of this, is a commitment to education at all levels, and in breaking down the barriers in the access to education."[8]

Buchanan teaches Network Security and Applied Cryptography in the School of Computing, Engineering and the Built Environment at Edinburgh Napier University, and his research focus is around digital identity, cryptography and blockchain. This applies into areas of health care[9] and cybersecurity.[10] He is the sole author and creator of ASecuritySite,[11] and which hosts a wide range of cryptography applications, including within public key encryption, symmetric key encryption, digital signatures and key exchange methods. ASecuritySite.com was first released on 15 Feb 2013.

Buchanan was awarded an OBE in the Queen's Birthday Honours List in June 2017. He was the first person in the UK to received an award for services to Cybersecurity.[12] On receiving it he outlined, "The award of an OBE is recognition for not just my own work but that of the Cyber Academy, and for the role my university, my School and the city has played in supporting that work. We have never had any barriers placed in our way, and have always received the required support, and the freedom, to develop our vision", and "We hope our work can continue to provide both economic and social impacts, and that cyber security can point the way to building new infrastructures which respect the rights of individuals while also protecting our societies."[12]

In January 2018, Buchanan decided to receive his OBE[13] in his home city,[14] and received this from Queen Elizabeth II at Hollyrood Palace in July 2018.[15]

Love of Edinburgh

Buchanan has never hid his love of his home city of Edinburgh, "I stepped foot in Edinburgh many decades ago and immediately fell in love with the place. That first sight of the city will never leave me, and I still adore the way it holds its head high.[16]" In April 2018, he presented alongside Richard Demarco in an event entitled, "Building a World-leading City in Arts & Science" and which discussed and debated the future of Edinburgh.[17]

In August 2017, Buchanan was interviewed by Elliot Reeves within the "Inspired Edinburgh" series of talks with famous Edinburgh citizens.[18] Within the talk he outlined the career route that he took in his early life and in following his father and grandfather into electrical engineering, and how he fell in love with the city the first moment he saw it.[19]

In an interview with Convention Edinburgh, Buchanan outlined, "Edinburgh is one of the most wonderful cities in the world, and I adore living and working here. Our students, too, often love being here, and appreciate the beauty and culture around them. As a city it is cultured and achingly beautiful, along with being one of the most educated cities in the whole world."[20]

On receiving a student-voted award for best lecturer for 2020 in the School of Computing at Edinburgh Napier University, Buchanan outlined, "I am very lucky. I live and work in the most beautiful city in the world, and in the most beautiful country on the planet. I research and teach the subject that I adore (cryptography). I work in a university that has supported our work ... with every single heartbeat. But most of all I get to teach and learn from our amazing students."[21]

In the August/September 2023 edition of Business Commerce (Economy & Resilience) that was published by the Edinburgh Chamber of Commerce,[22] within an article entitled, "Edinburgh’s Path to a Tech-Driven Future", Buchanan focused on his home city with, "I adored this city from the second I saw it, and I still adore it. It has helped us in every possible way, and I believe our research and innovation have the best opportunities possible to be help it thrive. It is a city of collaboration, enterprise and partnership, and can truly take its place on a world stage and support the innovators of our future. We must retain and attract the best possible talent from around the world, and make the city their home."

Early life and career

Buchanan was born in Falkirk, Scotland in 1961. He attended Victoria Park Primary School[23] in Falkirk and then attended Graeme High School.[24] On leaving school - from 1977 to 1981 - he was an Apprentice Electrician at the ICI Ltd in Grangemouth.[25] He spent 1977 to 1978 at Falkirk Technical College studying Electrical and Electronic Engineering.

Between 1981 and 1986, Buchanan studied for a BEng (Hons) in Communication and Electronic Engineering in the Department of Electrical and Electronic Engineering at Edinburgh Napier University. During this time, he undertook work placements with Racal-MESL and the Royal Observatory[26] in Edinburgh. Then, in 1986, he took up a post of a Lecturer and initially taught electronics, before moving onto computer engineering, data communications and networking. Buchanan's first research paper was published in 1988 and entitled, "Microwaves in the laboratory" and presented at the IEE Colloquium on Teaching Antennas and Propagation to Undergraduates.[27]

From 1989 to 2003, he has a Senior Lecturer in the Department of Electrical and Electronic Engineering, and then as a Reader in the School of Computing from 2003 to 2006. Buchanan was promoted to a Professor in 2006. He gained his PhD in 1996 with a thesis entitled, "Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing".[28] The work implemented 3D Finite-Difference Time-Domain (FDTD) methods to simulate structures in the time-domain using a direct form of Maxwell's curl equations.

Viewpoints on Digital Trust and Coding

Buchanan has continually warned against the risks of cyber attacks on critical infrastructure, and, in Sept 2015, outlined, "So the Cloud we have created, and which we are all dependent on, and where we link to services over the Internet, is not as robust as we think it is. The Internet too is not quite as distributed as it was designed to be, and we still rely on key physical locations for data and for networked connections. Any problems in these, can cause the whole infrastructure to fall like dominos."[29]

Buchanan has expressed a great love of coding over the years, and has highlighted his love of using Golang as a language to implement cryptography, "Hand on heart. I love coding. I always have. I don't want to teach it, but I love to create things with it. At my core, I am a C coder. It is ingrained in me. I suppose the first programming language you learn will always stay with you."[30]

Integration of the citizen within a future Internet

He has also expressed strong viewpoints on the lack of digital trust on the Internet, and in the need to integrate cryptography into future systems. On joining the IOTA Research Council in 2018,[31] he outlined that, "I believe that we live in a digital world that was created in the 20th Century. We thus need to build a more trusted world, and put the rights of the citizen at the centre of this world. This new world will respect privacy, consent and ownership, and we should be able to trust every single transaction",[32] and also looked to the future in that, "We are now in a phase of rapid rebuilding, and very few areas of our lives will remain untouched. I think this will be one of the most significant eras in the whole of human existence, and will be a time that builds the foundations of our future. Being involved in a research council leadership role in IOTA will provide me with the opportunity to inform the future, making decisions which will help build a solid foundation for our next generation".[32]

In a podcast in 2022,[33] Buchanan outlined the importance building a soild foundation of the Internet with, "The future of the Internet is to build on a foundation of mathematics. We've built the Internet on sand." In 2023, on joining a Zero Trust Special Interest Group,[34] it is outlined that Buchanan is, "a firm believer in fairness, justice, and freedom. He has a deep passion for everything related to cryptography, digital trust and digital identity, and in building a more trusted, secure and resilient digital world, and with a focus on the rights of citizens to privacy".[35]

Buchanan's involvement in the EU funded GLASS[36] and TRUSTEE[37] projects have provided a recent avenue for the development of the enhanced rights of citizen the sharing of data.

Citizen integration into digital health care

His viewpoints on the poor state of the digital integration of citizens have been clear over the years, and he has made many statements related to this, including, "The NHS, itself, has tried to transform itself in the past, but the results have often been poor, and it still struggles with integrating the citizen in a meaningful digital way. While always leading clinically, the NHS has never really produced true leaders in digitization, and still sees the digital integration of the citizen as a bridge too far. Apart from the disastrous Connecting For Health programme, there has never really been a core opportunity to build the digital integration of the citizen at scale, or, probably more important, the incentive for the citizen to actually engage with the digitization programme."[38]

Buchanan has also outlined the ack of a strong digital foundation within the NHS in UK, "And, so, recently, I went to register for a GP and was handed a piece of paper and told to find a pen and write down all my details. In virtually every interaction with the NHS, I have had to do this, and perhaps, one day, I will have all my medical details stored on a digital wallet on my phone, and where the GP just scans them in. Once I filled in it, it then went into a black hole — and where I hoped that a human would eventually make sense of my scribbles."[39] This, he outlines, is a lack of a plan for a data architecture and citizen identity, "There’s no vision, no blueprint, no Estonian X-Road, no Finnish engagement plan, and no debate or critical analysis. Without any real digital identity system, we build on sand."[40]

Post Quantum Cryptography

Buchanan has expressed strong viewpoints on the move from existing public key methods towards PQC (Post Quantum Cryptography) techniques, and outlines, "And, so, we are moving into one of the greatest changes that we ever see on the Internet, and where we will translate from our existing public key infrastructures towards Post Quantum Cryptography (PQC) methods.",[41] along with outlining the advantages of using Quantum Computers, "For the first time, we will be able to compute with light particles and move away from our traditional Von Neumann architecture. In a decade or so, perhaps, our silicon-based chips will feel like the vacuum tubes of the past — clunky, inefficient, and slow. And, the whole concept of pushing electrons down npn transistor junctions for computation may feel like we are racing on a skateboard against a Jumbo Jet at top speed."[42] and "We have a problem in cybersecurity… and it’s a big problem. Everything that uses our public key methods, needs to be removed within an era of quantum computers. This includes checking the identity of the server that you are connecting to, and in the proof of your identity within online systems. The digital signatures that we produce for cryptocurrencies will also break. So we must start to migrate our systems over the next few years, and create as little disruption as possible."[43]

Cryptography

Buchanan is documented as a passioniate believer in the power of cryptography in building a more trusted digital world, "I believe that we live in a digital world that was created in the 20th Century. We thus need to build a more trusted world, and put the rights of the citizen at the centre of this world. This new world will respect privacy, consent and ownership, and we should be able to trust every single transaction."[6]

In Nov 2014, on the debate around the Investigatory Powers Bill, he outlined the tensions between the rights to privacy and the rights of society to protect itself with, "This tension between law enforcement and the right to privacy remains unresolved. The FBI currently see the status quo, where major tech companies are persuaded or brow-beaten into cooperating with police and security agencies under the PATRIOT Act, as necessary to pursue criminals and terrorists. In the UK the Regulation of Investigatory Powers Act 2000 (RIPA) defines what information of citizens that law enforcement can access, with the support of a warrant."[44]

On 21 Dec 2015, Buchanan gave evidence for the Investigatory Powers Bill debate in the House of Commons, at which he outlined, "I would say that we live in a very different world from the one that we did. We have built this cyberage within about 40 years, but the infrastructure that we have created is very fragile. We must protect citizens from hackers and so on. We must protect privacy and identity. More and more services are moving towards the provision of both privacy and identity. Individuals need to be assured that they are not being spied on by cybercriminals across the world. They also need to be able to prove their own identity and the identity of what they are connecting to."[45][46] In July 2023, he was one of the 68 signatories on an open letter related to the UK's Online Safety Bill.[47]

In Sept 2023, Buchanan reached 2,000 articles on Medium.com related to areas of cybersecurity and cryptography.[48]

Research and Innovation

Buchanan's current research work focuses on areas of applied cryptography, blockchain, cybersecurity, citizen focused health care and digital identity. He is included in the World's Top 2% Scientists list for 2022,[49] and ranks in the Top 40 most cited research authors in Applied Cryptography.[50] Buchanan's leadership in research has led to a number of successful spin-out companies from Edinburgh Napier University. This is highlighted by Edinburgh Napier University being included in the Top 10 for spin-outs for universities in the UK within 2023.[51]

In Unit of Assessment 11 (Computer Science and Infomatics) within REF 2021, Buchanan led two research impact case studies: "Enabling Sensitive Personal Data to be Shared with Trust using Novel Digital Security Methods",[52] and "Protecting Employees, Children and Sensitive Data using Innovative Approaches to Cyber Security".[53] Both of these impact case studies were graded as 4* (quality that is 'outstanding impacts in terms of their reach and significance' [54]).[55]

On 6 May 2015 he launched The Cyber Academy at the Merchiston Campus of Edinburgh Napier University.[56] He received the Principal's Award for contribution to Knowledge Exchange/Research in 2016 (Innovation of the Year and also Best Contribution to Information Society research theme)[57] and in 2017 (Innovation of the year in Knowledge Exchange). Buchanan's research areas has recently focused on cryptography,[58] cybersecurity and digital identity.[59][60]

Buchanan's focus on patents has mainly focused on work related to spin-out companies, and thus for IP protection: has co-authored a number of patents. These include:

  • Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Improvements in or relating to digital forensics", published 2019-05-08, assigned to Fortinet Inc.[61] Related to the Zonefox spin-out.
  • Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Digital forensics", issued 2014-11-11.[62] Related to the Zonefox spin-out.
  • Stevenson, Ian; Bruce, Ramsay & Buchanan, William Johnston et al., "System and method for management of confidential data", published 2018-10-11, assigned to Edinburgh Napier University.[63] Related to the Cyacomb spin-out.
  • Stevenson, Ian; Bruce, Ramsay & Buchanan, William Johnston et al., "Method for identification of digital content", published 2021-06-30, assigned to Cyan Forensics Ltd.[64] Related to the Cyacomb spin-out.
  • Uthmani, Omair; Buchanan, William & Lawson, Alistair et al., "Information sharing", published 2015-05-26, assigned to The Court of Edinburgh Napier University.[65] Related to the Symphonic spin-out.
  • Buchanan, William Johnston; Lo, Owen Chin Wai & Penrose, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2018-10-11.[66] Related to the Cyacomb spin-out.
  • Buchanan, Bill; Mclaren, Peter & Gordon, Russell et al., "Detection of ransomware", issued 2022-09-22[67] Related to the MemCrypt spin-out.

An additional patent related to work with Dr David Lanc and Dr Lu Fan and related to work with Payfont. It is now assigned to Leading Software Ltd:

  • Lanc, David; Fan, Lu & Mackinnon, Lachlan et al., "Resilient secret sharing cloud based architecture for data vault", published 2021-04-13, assigned to Leading Software Ltd.[68]

Blockpass ID Lab

Buchanan leads the Blockpass ID Lab (BIL) and which was initially co-funded by Blockpass IDN and Edinburgh Napier University. It is located on the Merchiston Campus and was launched on 26 September 2018.[69] Overall, it was the first research lab in the World to focus on digital identity, and hosts research work in areas on blockchain, digital identity, privacy preserving methods and applied cryptography, with key focus areas of around citizen focused data sharing. The lab has also hosted a number of related research grants, including GLASS[70] and TRUSTEE,[71] along with incubating the True Deploy future spin-out. BIL has generated a wide range of research outputs over the years, including for Threat Intelligence Sharing,[72] Vaccination Certificates and Passports,[73][74] Privacy-preserving passive DNS,[75] and Combat fake content detection.[76]

COVID-19 privacy-aware contact tracing

In April 2020, Chaloner Chute[77] at the DHI defined a research brief for a team of experts from Edinburgh Napier University (Buchanan), the University of Glasgow (Professor Muhammad Imran[78] and Professor Jill Pell[79]), the University of Edinburgh (Dr Claudia Pagliari[80]) and the University of Strathclyde (Dr Sanna Rimpiläinen[81]). This brief involved a review of the usage of contact tracing applications. Buchanan focused on answering the question, "How might the distributed system be architected to be secure and respectful of privacy from the outset?". Overall, each of the experts then reviewed key areas around the usage of contract tracing, and submitted a compiled report answering the key questions, and published as, "Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust."[82] This advised that the UK-proposed method of track and trace had weaknesses, and that Scotland should take an alternative approach.

Buchanan also applied his applied cryptography knowledge to areas of COVID-19 track and trace methods. This included collaborated work with the University of Glasgow on a blockchain-based methods named BeepTrace.[83] Buchanan also worked with teams on privacy-aware COVID-19 passports using the Ethereum platform,[74] reviewed the state-of-the-art in privacy-aware applications for track and trace,[84] implemented privacy aware identity matching.[85]

Blockchain research

Within the Blockpass ID Lab, Buchanan has worked with Dr Nick Pitropakis[86] in the supervision of a PhD students working on permissioned blockchains, such as those related to Hyperledger Fabric. These types of blockchains integrated well with Buchanan's focus on privacy-aware systems and which are citizen focused. With Dr Pavlos Papadopoulos[87] the focus was on privacy-aware systems in areas of DNS and health care:, such as for, " A privacy-preserving healthcare framework using hyperledger fabric",[88] and "Privacy-preserving passive dns".[75]

In the PhD supervision of Dr Will Abramson,[89] the focus was on the self-soveign identity systems using Hyperledger and in data sharing, "PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform".[90] Buchanan advanced work with Hyperledger Fabric within the CyberHunt research project,[91] and worked with Hisham Ali and Dr Jawad Ahmad on new ways of trusted threat sharing in cybersecurity with a "Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform"[72] and "Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers".[92]

In 2017, Buchanan worked with Dr Grzegorz Spyra and Dr Elias Ekonomou on the defining of sticky policies for OOXML (Office Open XML). This used an Identity Based Encryption (IBE) primitive to securely bind an access policy and the document data together. Buchanan also worked on the digital investigations for blockchain-based transactions, including for bitcoin mixing[93] and the investigation of ERC20 tokens.[94] Within work on quantum robust blockchains, Buchanan worked with an international team on quantum robust blockchains,[95] and which uses lattice-based cryptography with polynomials for IBE and aggregate signatures for a consensus. Buchanan worked with Mwarwan Abubakaron areas of blockchain based architectures for IoT[96] and for vaccination certificates.[97]

From 2017, Buchanan has worked in the area of post quantum cryptography (PQC) and published a paper entitled, "Will quantum computers be the end of public key encryption?"[98] with Professor Alan Woodward[99] from the University of Surrey. Recent work has included an analysis of the performance of the TLS protocol using Post Quantum Cryptography[100] and in the application of quantum computing methods to Botnet Detection. New work involves applying quantum computing methods into cybersecurity applications, including using, "a hybrid machine learning methods on real quantum computers, with 100 data samples, and also with real-device-based simulations, with 5,000 data samples. It uses HQML (Hybrid Quantum Machine Learning) algorithms applied to the detection of botnet-generated domain names. This includes the features of the character length of the domain, the entropy of the domain name, and the reputation of the domain name."[101]

Digital Forensics

Buchanan work on digital forensics has includes the analysis of IoT forensics on devices,[102] in the forensics artefacts left by the Tor browser[103] and for the digital forensics within the IMO call and chat app.[104]

Cryptography and Encryption

Buchanan's research work in cryptography and encryption involves its integration into blockchain methods, post quantum cryptography, light-weight cryptography, end-to-end encryption and fundamentals areas around stream ciphers, chaos theory, random number generators and image-based encryption. Buchanan worked with Scott Helme on samplying the Top 500 Websites within Alexa Top 1 Million sites for industry sectors related to HTTP responses and in the usage of the Content-Security-Policy (CSP).[105] Other related papers focus on improvements to cryptography within telecommunication components for end-to-end data encryption,[106] enhancements to the RC4 stream cipher using a symmetric random function generator,[107] and in the creation of a secure random number generator with immuity and propagation characteristics.[108]

For privacy-aware COVID-19 tracing, Buchanan collaborated on work related to the usage of privacy-aware blockchain methods and applied cryptography.[83][74][109] His work, too, has involved the creation of new methods to detect ransomware. This has included the discovery of encryption keys in memory,[110] and in the usage of entropy detection methods.[111]

Buchanan works with Dr Jawad Ahmad[112] on a range of chaos-based work, and which supports a high degree of randomization from a small perturbance, including one of the first papers to outline the usage of chaos based methods applied to zero knowledge proofs.[113] This paper outlines the concept of using port knocking to secure services, and where cryptographic hashes are through a chaotic process. Along with this, a key area of collaboration involves the encryption of digital images using chaos-based methods, such as with the Mersenne twister random number generator method with DNA genetic encoding,[10][114] using chaos-based confusion and diffusion of image pixels using dynamic substitution,[115] a multi-chaos based compressive sensing encryption technique,[116] a multistage encryption scheme using linear feedback register and chaos-based quantum map,[117] and using a convolutional autoencoder within chaos-based encryption.[118]

In 2017, Buchanan worked with Dr Shancang Li[119] and Dr Rameez Asif[120] on a review of light-weight encryption methods for limited capability devices.[121] Then, in 2019, he was joined by Dr Nilupulee Gunathilake and Asif to define key elements on the implementation, challenges and applications of light-weight cryptography for IoT devices[122] and, in 2020, for recent advances related to IoT security.[123] Buchanan's work has also included the breaking of light-weight cryptography methods through the capture for radio emissions from a device using the PRESENT encryption method.[124]

MPhil and PhD supervision

Buchanan has supervised 37 PhD and MPhil students to successful completion.[125] These include:

  • Dr Nikos Migas, "MARIAN: Mobile Agents for Routing in Ad-Hoc Networks", PhD, 2002–2005.[126]
  • Dr Jamie Graves, "Forensic verification of operating system activity via novel data, acquisition and analysis techniques", PhD, 2005–2009.[127]
  • Dr Zbigniew Kwecka, "Cryptographic privacy-preserving enhancement method for investigative data acquisition", PhD, 2006–2011.[128]
  • Dr Nicole van Deursen, "HI-Risk: a socio-technical method to identify and monitor heathcare information security risks in the information society", PhD, 2009–2014.[129]
  • Dr Solomon Uwagbole, "A pattern-driven corpus to predictive analytics in mitigating SQL injection attack", PhD, 2011–2018.[130]
  • Dr Phil Penrose, "Forensic analysis of large capacity digital storage devices", PhD, 2013–2017.[131]
  • Dr Elo Ukwandu, "RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture", 2014–2019.[132]
  • Dr Grzegorz Spyra, "Embedded document security using sticky policies and identity based encryption", PhD, 2013–2019.[133]
  • Dr Adrian Smales. "Test-bed and evaluation of a home-based adverse event prediction infrastructure", PhD, 2013–2021.[134]
  • Dr Peter Mclaren, "Investigations into decrypting live secure traffic in virtual environments", PhD, 2016–2019.[135]
  • Dr Will Abramson, "Identity and identification in an information society: Augmenting formal systems of identification with technological artefacts", PhD, 2018–2022.[136]
  • Dr Pavlos Papadopoulos, "Privacy-preserving systems around security, trust and identity", PhD, 2019–2022.[137]

Research projects

Buchanan has undertaken many research and innovation projects over the years, including recent ones of:

  • Distributed single sign-on-stack-on e-Governance Paradigm based on a distributed peer-to-peer (P2P) file exchange network for security, transparency, cost effectiveness and trust - GLASS.[138] EU Horizon, Jan 2021-Dec 2023.
  • KTP Miracl,[139] Innovate UK, Apr 2023-Oct 2025.
  • TruElect,[140] Innovate UK, Dec 2022-Mar 2023.
  • TRUSTEE (Trust and Privacy Preserving Computing Platform for Crossborder Federation of Personal Data),[141] EU Horizon, Jul 2022-Dec 2025.
  • AI-based privacy-preserving biometric authentication with mass-market smart devices,[142] The Data Lab, Oct 2021-Sept 2024.
  • PhD Studentship, CyberHunt,[143] The Research Funding Council of Norway, Feb 2021-Jan 2025.
  • PhD Studentship (Homomorphic Encryption),[144] 6G Health Institute GmbH, Oct 2023-Sept 2026.
  • MemCrypt (HGSP),[145] Scottish Enterprise, Sep 2020-Mar 2021.

DACAR (Data Capture and Auto Identification Reference)

Buchanan was the Principal Investigator (PI) for the Edinburgh Napier University work within the EPSRC/TSB (Technology Strategy Board)-funded DACAR project, and which focused on citizen rights to share data within heath care.[146] It ran from November 2009 until November 2011 and involved a collaboration between CipherLab, Chelsea and Westminster Hospital,[147] GS1 UK,[148] Imperial College London, and Kodit. A core contribution of the project was the creation of the SPoC[149] (Single Point of Contact) approach to information sharing, and the integration of identity, role and access rights to every part of the capture, storage and consumption of health care data. Its integration within Chelsea and Westminster Hospital was led by Professor Derek Bell.[150]

The project was the first time that Buchanan formally worked with Professor Christoph Thummler,[151] and who, at the time, had a post as a clinician at the Royal Infirmary of Edinburgh and at Edinburgh Napier University.[152] The core research team also involved Dr Owen Lo and Dr Lu Fan.[153] The integration of GS1 UK allowed the integration of emerging RFID (Radio Frequency Identification) standards[154][155] into the identification of medical artifacts, including tracking beds and medical equipment around the hospital.

After this project, Dr Owen Lo continued to work with Buchanan on a number of research projects, and was a co-inventor within the Cyan Forensics spin-out company[156] and which changed its name to Cyacomb.[157]

Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures

From March 2011 to July 2013, Buchanan continued to partner with Professor Christoph Thummler, Dr Owen Lo and Dr Lu Fan, and was the Principal Investigator (PI) on the ESPRC-funded, "Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures"[158] project. This extended the work from the DACAR project but focused on assisted living, and involved a collaboration with Microsoft and HoIP (Health Over IP). While DACAR had focused on the sharing of health care information around hospitial data, this project extented the core concepts to create a novel governance policy infrastructure using a circle-of-trust relationship for assisted living. This linked to formal, role-based security for primary and secondary health care. New work also included the integration of the SPoC approach with the Microsoft Health Vault.[159]

At the time, the work was known as Cloud4Health,[160] and Buchanan gave an overview of the approach in a submission for a Scotland IS award in May 2012.[161] Overall, the work in this project and DACAR laid the technical foundation for the Symphonic spin-out company from Edinburgh Napier University in 2013. It also the main focuse for the 4* rated - quality that is world-leading in terms of originality, significance and rigour - impact case study for UoA 11 in REF 2021 entitled, "Enabling Sensitive Personal Data to be Shared with Trust using Novel Digital Security Methods".[52]

GLASS research project

Buchanan is the Principal Investigator (PI) for the Edinburgh Napier University work[162] within the EU Horizon funded GLASS project,[163] and which is a new paradigm for sharing or transfer of personal information with the citizen in control. It started in January 2021 and completed in December 2023 (Grant agreement No 959879).[164] The research project includes collaborators from TAGES (Teknoloji Arastirma ve Gelistirme Endustriyel Urunler Bilisim Teknolojileri San. ve Tic. A.S.), Fraunhofer FOKUS, UBITECH Limited, University of Patras, Suite 5, Hellenic Ministry of Digital Governance, and Istanbul Metropolitan Municipality. This has built a citizen focused digital wallet and new models data sharing[165] using Hyperledger Fabric and IPFS (InterPlanetary File System). In 2022, the GLASS project received "Leading Light Innovation" award at the Scottish Cybersecurity Awards.[166]

vSoC (Virtual SOC)

Buchanan has innovated the vSoC teaching and training environment within Edinburgh Napier University, and which is used by students within the cybersecurity and networking-related subjects. The work started within a grant funded by DG Home[167] related to the "Prevention Of and Fight against Crime" theme and was entitled, "DFET (Digital Forensics Evaluation and Training)".[168][169] It was led by Buchanan, and included collaborators of Stefan Institute (JSI), Stockholm University, Police Scotland, and Aconite Internet Solutions. This provided the basic cloud infrastructure for the environment and used a VMWare vSphere virtualised environment that was hosted within the Merchiston Campus at Edinburgh Napier University.

From December 2015 to February 2017, the Advanced HE advanced the work by funding a project entitled, "vSOC - Virtualised Security Operations Centre",[170] and which scaled vSoC into cybersecurity areas. The work continued with the funding of a KTP (Knowledge Transfer Partnership) from Innovate UK and Satisnet Limited and which integrated SIEM tools into the environment.[171] From June 2019 to May 2020, The Data Lab[172] funded integrated of data science and cybersecurity.[173] In Sept 2023, the vSoC infrastructure was short-listed for "Technological or Digital Innovation of the Year" at the Times Higher Education awards 2023.[174]

Side Channel Analysis - Noise and RF Emission

Buchanan's work with Dr Owen Lo[175] and Dr Nilupulee Gunathilake[176] has included an analysis of side channel attacks on the cryptography running on embedded devices using electrical noise generation and radio emissions. From Jan 2017 to Jan 2017, Buchanan and Owen Lo worked with Keysight on research related to "Bare Metal Forensics - Pattern Analysis Heuristics - Data Analysis", and co-funded by The Data Lab.[177] This resulted in a paper entitled, "Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)"[178] and which cracked 128-bit AES encryption on an Arduino Uno from the electrical noise generated from the device. Douglas Carson from Keysight and Lo presented the work live on 21 September 2016 at an event in Edinburgh.[179][180]

From Nov 2016 to Oct 2017, work continued with the support of CENSIS, and which analysed IoT Bluetooth threats related to health care devices in a research project entitled "IoT Hardware Security Test Framework".[181] For this, in Sept 2018, Buchanan defined, “The biggest thing holding back the development of the IoT is security – specifically, concerns about the vulnerabilities of devices, the ease of hacking them, and the consequences of such hacks. In health care, for example, IoT could transform the way we monitor health and manage conditions like asthma. Only if we can improve confidence in IoT security can we realise the potential of smart technology."[182]

Lo, Buchanan and Carson also managed to break the PRESENT block cipher on an embedded device using CPA (Correlation Power Analysis) and electrical noise generation.[183] Gunathilake has since advanced the work in the analysis of radio emission from devices, including the cracking of the PRESENT light-weight encryption method.[184]

Ransomware research projects

Dr Gordon Russell, Dr Thomas Tan and Buchanan were part of Peter McLaren's PhD supervision, and which resulted in a thesis entitled, "Investigations into decrypting live secure traffic in virtual environments".[185] Buchanan then was the Principal Investigator (PI) for the "MemCrypt" research project and which was funded from Sept 2020 to March 2021 by Scottish Enterrprise within its High Growth Spin-out Programme.[186] Dr Owen Lo and McLaren then developed the work on the detection of encryption keys in memory, and scaled it to work with the detection of a range of ransomware families. From April 2020 to July 2020, Buchanan led an Innovate UK CyberASAP[187] grant,[188] and which continued to a second phase from Sept 2020 to Feb 2021.[189] This resulted in a spin-out company in January 2021 with Peter Jaco as CEO, and Peter Mclaren at CTO.[190]

Significant research outputs from research work includes the mining malware command and control traces,[191] the finding ChaCha20 key streams from targeted memory analysis,[192] a patent in the detection of ransomware",[67] the evaluation of live forensic techniques in ransomware attack mitigation.[193] Recent work includes the usage of entropy techniques to detect the presence of ransomware keys and files, including with a differential area analysis fmethod,[194] and in the evaluation of a range of entropy detection methods to discover encrypted content.[111]

Knowledge Transfer Partnership (KTP) with Cànan Ltd

Over 2003/2004, Buchanan worked with Cànan Ltd - who are based at Sabhal Mor Ostaig in Sleat on the Isle of Skye - on a Knowledge Transfer Partnership (KTP) project to advance Gaelic language learning. This support aimed to scale-up of Cànan's print-based content into a multimedia delivery. The KTP Associate was Evan Brown, and his academic supervisor was Buchanan.

The KTP gained a Grade 1 Certificate of Excellence from Innovate UK, and won the KTP Award Winning Partnership of the year in 2004.[195] At the time, Donella Beaton, Ceannard/Chief Executive, Cànan Ltd, outlined, “The KTP programme brought knowledge, partnerships, confidence, publicity, quality staff and a can-do attitude. The grant allowed these aspects to develop, but the results were much greater than a pure financial investment. I would thoroughly endorse the Knowledge Transfer Programme to any organisation who knows what they would like to achieve, but doesn't know how to go about it." Donella Beaton went on to become the Vice Principal for Economic Development at Robert Gordon's University.[196]

The KTP resulted in BubbleSpeak, an innovative templatebased content system that is simple to use, portable and platform independent. Cànan gained a culture of innovation and access to new technologies, which raised its profile, generated a new lucrative market and embedded a practice of research and development. Buchanan, defined that, "Big companies can afford to have research and development departments but small and medium operations do not have the resources. The companies need the Associates because they do not have the skills inhouse or the access to equipment which we can provide." The success of the KTP allowed Buchanan to develop his own research group named "Distributed Systems and Mobile Agents" (DSMA) within the School of Computing at Edinburgh Napier University.[197]

Along with cybersecurity and cryptography, Buchanan has a driving passion for improving health care through research methods, and with a special focus on citizen-focused care. This can be traced back to work from March 2011 to July 2013, and where he led work at Edinburgh Napier University in a partnership with Edinburgh Napier University, Microsoft and HoIP. This project was funded by EPSRC and entitled, "Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures".[198] It involved the creation of a novel governance policy infrastructure using a circle-of-trust relationship for assisted living, and with links to formal, role-based security for primary and secondary health care.

Buchanan then teamed up with his PhD student (Adrian Smales), and kick-started the "e-FRAIL - Early detection of FRAilty and Illness" research project and which ran from October 2015 to December 2016 and funded by the Digital Health Institute (DHI).[199] The partnership continued to advance from August 2017 to Feb 2018 with "e-Frail - Phase 2" which added key risk assessments using a Delphi method for understanding of frailty.[200] This led to a collaboration with CM2000[201] on the development of the Advanced Risk Modelling for Early Detection (ARMED) product and which won the 'Innovation of the Year' award at Scottish Knowledge Exchange Awards in 2020.[202]

Alongside the work on frailty, Buchanan led a number of research which integrated digital trust and blockchain into next generation health care systems. This involved leading a research project for the tracking of medical devices within a health care environment though public blockchain methods. The work involved a collaboration with Spiritus within the "Health Blockchain"[203] project and was funded by The Data Lab (August 2017-March 2019).[204] Work continued with the development of a trusted health care infrastructure with "Next Generation Trust Architecture" from March 2018 to February 2020,[205] and "Next Generation Connectivity with Health and Well-being" from October 2018 to July 2021.[206] Both were frunded and funded by the DHI. New research work involves the investigation of 6G and homomorphic encryption methods with privacy-aware health care records.[207]

With his work, he has analysed the scalability of e-Health, in "E-health: Chances and challenges of distributed, service oriented architectures",[208] and within the implementation of a risk model within health care environments.[209] A particular focus has been on the use of blockchain applications,[210] and within vaccination certificates.[211]

After completing his PhD in 2021, Adrian Smales left the research team to join Smplicare as the Chief Innovation Officer.[212]

Over the last few years, Buchanan has worked on law enforcement and policing related work, and with a particular focus on information sharing, digital forensics and network security. From Sep 2008 to Oct 2011, Buchanan supervised a SIPR-funded[213] PhD project entitled, "Information Sharing between the Police and their Community Partners".[214] This work investigated improved methods of information sharing between law enforcement agencies, and outlined the principal of the SPoC (Single Point of Contact) for information sharing between the police and their community partners. This work aimed to overcome the barriers that led to a lack of information sharing around Investigations related to the Victoria Climbié murder in 2000.[215] The work was sustained as the Symphonic spin-out and resulting in a related patent entitled, "Information Sharing".[216]

Buchanan has also run training courses for Policy Scotland over a few years, and which focused on EnCase digital forensics and network security. Over 2022–2023, he chaired the Evidence and Scientific Standards working group as part of the "Independent advisory group on new and emerging technologies in policing.",[217] and one of the conclusions was that, "Police practices should be based on scientific evidence about what works best and hence it is important that for any evidence-based pilot developing, industry must engage academia. Academia are keen to support the development, testing and promotion of innovative practice to help build the evidence-based solution and understand what would work best."[218]

Academic spin-outs

Buchanan has led research which has led to three successful spin-out companies: Zonefox,[219] Symphonic[220] and Cyan Forensics.[221] In October 2018, Zonefox was acquired by Fortinet,[222] and in November 2020, Symphonic were acquired by Ping Identity.[223] To highlight this success, in Sept 2023, Edinburgh Napier University was rated in the Top 10 in the UK for spin-outs related to work conducted by Octopus Ventures.[224]

Zonefox

The work of Dr Jamie Graves[225] and Buchanan on a PhD project ("Forensic verification of operating system activity via novel data, acquisition and analysis techniques"[226][227]) led to the incorporation of Inquisitive Systems Limited in 2008.[228] This led to the submission of patents entitled "Improvements in or relating to digital forensics" and "Digital Forensics" in Oct 2008,[229] and Sept 2009,[230] respectively. The "Improvements in or relating to digital forensics" was published for world-wide status in March 2010,[231] and granted in the EU[232] in May 2019. The "Digital Forensics" patent was granted on Nov 2014 for the US.[62]

The patents captured the core research:[233] defining activity footprints as a 'digital DNA' sequence, which can be used with a new matching algorithm (BLAST DNA) to determine the probability of a sequence match to a malicious event, significantly outperforming existing signature-based methods. This proved particularly useful in detecting insider threats such as copying source-code to a USB device. The original patent owner was Edinburgh Napier University, and where the existing EU patent is owned by Fortinet Inc.[232]

After funding from Scottish Enterprise in the Proof of Concept programme[234] from September 2008 to August 2010, the research work was spun-out from Edinburgh Napier University in September 2010, and where Graves was the CEO, and who continued in this post until Zonefox was acquired by Fortinet Inc. The company, in 2013, changed its trading name to Zonefox. On 23 October 2018, Fortinet Inc announced that it had fully acquired Zonefox[235] and that Zonefox's product range would be integrated into the Fortinet Security Fabric offering. Edinburgh Napier University was one of the significant shareholders in the acquisition, along with the co-inventors.

Graves returned to Edinburgh Napier University in Feb 2021 to take up a post "Entrepreneur in Residence" with a Royal Society-funded grant.[236]

Symphonic

For over a decade, Buchanan has run research work related to sharing and integrating the rights of the citizen. It addresses gaps around data governance related to ownership rights, governance, and privacy through the creation of a framework that set out new processes relating to citizen-defined access policies.[237] A major output of the work was the Symphonic Trust spin-out, and which was acquired by Ping Identity in 2020.[238]

The research began in 2008 with a collaboration with Police Scotland, looking at weaknesses around information sharing within law enforcement,[239] and in developed new ways to integrate large-scale integration of rights across interconnected domains. It resulted in the submission of a patent for the US in January 2013,[240] for the World in Jun 2014.[241] The US patent was granted in July 2014.[241]

Other related research led by Buchanan was funded within two EPSRC/Innovate UK funded projects: "Data Capture and Auto Identification Reference" [242](DACAR)[243] and "Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures".[244] This work was then further developed by introducing the concept of data-buckets owned by the citizen, and in the concept of using a SPoC (Single Point of Contact) for sharing information between interconnected domains.[245]

From March 2012 to October 2013, the work was in a project entitled, "sa.FIRE" (Secure Analysis and FIltering Risk Engine)[246] and funded from Scottish Enterprise on their HGSP programme, and where Derick James,[247] Richard Lewis (as a Commercial Champion) and Niall Burns[248] came on board. The company spun out of Edinburgh Napier University in 2014, and received initial investment from Par Equity.[249] Derick James became the CEO and Niall Burns was the CTO. The company eventually dropped the "Trust" part of its name and just traded as Symphonic. On 2 November 2020, it announced that Symphonic had been acquired by Ping Identity[250] for $32 million.[251] Edinburgh Napier University was one of the significant shareholders in the acquisition, along with the co-inventors (Buchanan, Dr Lu Fan, Alistair Lawson and Dr Omair Uthmani).

Cyacomb

From 2014 to 2017, Buchanan and Rich Macfarlane[252] supervised Dr Phil Penrose for a PhD. The work was submitted in 2017, and entitled "Forensic analysis of large capacity digital storage devices".[253] This core work led to a UK patent application entitled, "Method for identification of digital content" in April 2017.[254] The UK patent was granted in the UK in June 2021, and published as a World patent in October 2018,[66] an EU patent in February 2020,[255] a Canadian patent in October 2018,[256] and a US patent in September 2021.[257]

From March 2015 to January 2016, the work was funded by Scottish Enterprise as part of a Proof of Concept grant.[258] In Jne 2016, Cyan Forensics was first incorporated,[259] and became a spin-out from Edinburgh Napier University. The CEO was Ian Stevenson and the CTO was Bruce Ramsay.[260] The co-inventors of the core technology for the spin-out were Buchanan, Dr Phil Penrose, Rich Macfarlane, Bruce Ramsay and Dr Owen Lo.

In March 2022, Cyan Forensics changed their trading name to Cyacomb.[261] In 2022, Cyacomb were awarded with a Technology Pioneer by World Economic Forum,[262] and an innovation award winner at the GovTech Summit in 2019.[263] The company also received a Cybersecurity award in the same year for "Best Cyber Breakthrough" in 2019 at the Scottish Cyber Awards.[264]

Par Equity led a £5 million Series A funding round in March 2021.[265]

In 2022, Ian Stevenson, the CEO of Cyacomb, wrote an open letter to the Secretary of State for Digital, Culture Media and Sport related to the uses of encrypted messaging in the UK with the comment of "To pass the Online Safety Bill in a form that does not allow for the possibility of secure, privacy protecting CSAM detection solutions now or in the future would be to miss a crucial opportunity to do enormous good".[266] In October 2023, Cyacomb received Digital received investment of £3.8million from the Scottish National Investment Bank (SNIB), Par Equity, Mercia Ventures, Scottish Enterprise and private investors, with Jane Reoch, Executive Director at SNIB outining that, "Cyacomb is at the forefront of tech development in Scotland. They perfectly align with our mission to harness innovation."[267]

MemCrypt

Buchanan supported the creation of the MemCrypt spin-out, and which focuses on the discovery of cryptographic keys in memory (based on the PhD work of Dr Peter McLaren[268]). The team then progressed this work by including triage methods into the discovery of encryption keys within memory.[269][270] Key contributions include being the first to detect the presence of ChaCha20 encryption keys in running memory (one of the most popular encryption methods used in secure communications), and identifying a major vulnerability within tools such as OpenSSL.[271]

The work has since been applied to ransomware detection and recovery.[272] From September 2020 until March 2021, the work received funding from Scottish Enterprise as part of their HGSP grant awards,[145] and, from September 2020 until Feb 2021 from the Innovate UK Cyber ASAP programme.[273] MemCrypt Limited spun out of Edinburgh Napier University in Oct 2020[274] and incorporated in Jun 2021.[275] In November 2021, the research work related to MemCrypt received a Leading Light Innovation award at the Scottish Cybersecurity awards.[276]

Learning and Teaching

In 2018, Buchanan became a Principal Fellow of the Higher Education Academy (PFHEA).[277] He is the creator and sole author of the Asecuritysite.com web site, and which focuses on covering cryptography and various areas of networking and cybersecurity, from both a theoretical and practical approach. Buchanan was also the software creator of the Bright Red Publishing Digital Zone, and which contains Web-based content for many of the subjects included in the Scottish Qualifications Authority (SQA) N5, Higher and Advanced Higher syllabus' in Scotland.[278][277]

He has also created a number of novel learning environments, including vSoC (Virtualised Security Operation Center)[279] and which is a cloud-based infrastructure for cybersecurity learning. Along with this, Buchanan has developed an online Cipher Capture The Flag set of challenges,[280] and Web-based Cisco device simulators (previously known as Networksims ProfSIMs).[281]

Viewpoints on education and knowledge exchange

Buchanan writes on areas of cryptography, cybersecurity and computer science within the blog entiled "ASecuritySite: When Bob Met Alice" [282] and has a YouTube channel containing a range of lectures, tutorials and demonstrations,[283] along with related Apple,[284] Spotify[285] and Audible[286] podcasts.

Over the years, Buchanan has shown a particular passion for education and knowledge exchange, "We live on a small planet, but education and research binds people together with a common drive to improve things. People with talent can achieve their full potential, and education opens up so many doors that many close. It gives people the confidence to take ownership of their lives."[287] and on continually learning throughout our lives, "You should never sit back on what you currently know, and you force yourself into new areas. At times, especially when there is virtually no knowledge around, you feel like you are free falling, but you catch yourself and find yourself leading rather than following."[287]

Teaching awards

Buchanan has received a number of teaching-related awards, including, in 2014, winning the ENSA[288] Student-voted Excellence Awards award for "Most Innovative Tutor."[289] He also won the Best Lecturer/Tutor for Computing in the ENSA Student-voted Excellence Awards in the School of Computing for 2011, 2014, 2015,[290] 2019,[291] 2020[292] and 2023.[293]

In 2016, Buchanan was awarded with the "Cyber Evangelist of the Year" at the first Scottish Cybersecurity awards.[294] At these awards, his previous PhD student - Dr Jamie Graves - received a "Champion of Champions" award for his work in advancing Zonefox.[295]

In Sept 2023, Buchanan was short-listed for "Most Innovative Teacher of the Year" at the Times Higher Education awards 2023.[174]

Postgraduate and undergraduate programmes

Buchanan created the MSc in Advanced Security and Digital Forensics in the School of Computing at Edinburgh Napier University in 2010, and which now integrates students from around the world.[296] It was the first MSc course in the UK to receive full NCSC certification. A core part of the support for distance students has been built around the vSoC teaching infrastructure. Buchanan also created the BEng (Hons) in Cybersecurity and Forensics in the School of Computing, and which was awarded full NCSC accreditation in 2018.[297]

In November 2019, Rich Macfarlane - the programme leader for the MSc in the Advanced Security and Digital Forensics programme - picked up the award for "Best Cyber Education Programme" in the Scottish Cyber Awards.[298]

In August 2023, the School of Computing was awarded a Gold award status for its ACE-CSE (Academic Centre of Excellence - Cyber Security Education). Buchanan and Macfarlane are co-directors of the ACE-CSE, where Buchanan is responsible for areas of innovation, research and enterprise and outlined, "We have increasingly strived to integrate our research in order to improve our teaching, and enterprise and innovation are core pillars of this."[299]

Bright Red Publishing Digital Zone

Bright Red Publishing[300] is an Edinburgh-based book publisher that focus on textbooks for schools related to N5, Higher and Advanced Higher topics. The first phase of the first between a collaboration between Bright Red Publishing and Buchanan ran from July 2012 to Dec 2012, and was funded by Interface Online.[301][302] This created the Digital Zone[303] and which was an innovative method of converting electronic version of the books into an online format, while provided a novel range of Mathematics and Physics abstactions, such as for formula translation and solution checkers. It was coded in C# and uses a Microsoft ASP.NET infrastructure. The second phase of the collaboration focused on "Innovation and Integrated Learning Environment for Engaging and Ever-changing Educational Content".[304] It involved using Buchanan developing a dynamic challenges in the generation for test questions. This allowed for template questions, and which could be used to generate ever-changing questions. Buchanan and Bright Red Publishing have continued to collaborate, and with 26 N5 books,[305] 20 Higher books,[306] and eight Advanced Higher Books. All of the code produced for the Digital Zone was written by Buchanan.

Cyber&Data

Data plays an ever-increasing role in cybersecurity - whether it is to protect against attackers or in investigating incidents. There is thus an increasing requirement to gather data within organisations, and also to detect threats through open source intelligence. Cybersecurity professionals are thus increasingly required to understand complex data sets and make sense of them. This might be to detect standard attack mechanisms or find 'a need-in-a-haystack'. Buchanan saw the potential of bringing together academic content and practical challenges which fused data science with cybersecurity, and, so, in 2019, The Data Lab[307] co-funded the development of on-line training material, and named it "Cyber&Data".[308]

The Cyber&Data programme aims to bring together the cybersecurity and data science disciplines, and thus to understand how to best gather, analyse and report on cybersecurity-related data. At its core is the conversion of data from many different sources and in many different formats into useful infrastructure, and to provide a solid foundation in the core data sources. In order to give hands-on experience, the Cyber&Data programme uses widely used tools, such as Wireshark[309] (for deep network packet analysis) and Snort[310] (for IDS - Intrusion Detection System).

Buchanan released the content in August 2020, and included five main units of Fundamentals, Data Capture and Analysis, Data Science and Cyber, Data Applications and Machine Learning, and Cyber Applications. A key element of the work is the integration of Splunk[311] analytics, and which is a tool often used by SOC (Security Operations Centre) Analysts. As part of this, Buchanan used the Buttercup games scenario[312] to provide practical hands-on experience in using SPL[313] (Search Processing Language) for the analysis of cybersecurity data from system logs.[314] The content is used within a number of modules within the School of Computing, Engineering and the Build Environment at Edinburgh Napier University, and is freely available to others. Buchanan has been quoted with, "As much as possible, education should be free to access".[315]

Cipher challenges

Since Feb 2013,[316] Buchanan has worked on a range of on-line cipher challenges, and which are free to access and use.[317] The currently supported ciphers within the online challenge include:

  • Graphics-based ciphers: Pigpen, semaphore, Templar, Mary's, Dscript, Voynich, three-square cipher, Monk, and Morse.
  • Substitution code ciphers: ASCII codes, gold bug, Bacon, Dvorak, Atbash, Rot13, ROT47, tap, Baudot, scrambled, homomorphic, Caeser, gray code, Pollux, Fractional, Greek alphabet, Runic, encode, and Navajo.
  • Grid ciphers: ADFGVX, Polybius, Bifid, Straddling, column, SYLLABARY, Porta, columnar transposition, Beaufot, S-box mapping, Delastelle, and Nilist.
  • Key-based ciphers: keyword, OTP, Condi, AMSCO, Vigenère, and Beale.
  • Maths/arithmetic-based cipher: exponential cipher, Diffie-Hellman, multiplication, LZ coding, Huffman, jump, Affine, XOR, GCD (Great Common Divisor), binary multiplication (modulo 2), binary divide (modulo 2), and RSA.
  • Puzzle-based cipher: Sudoku, 3-rail, and NULL.

Along with this, Buchanan developed a range of cipher coders and decoders,[318] and which include the Barbie cipher, Rick Astley, Scytale cipher, Lorem Ipsum Cipher, Delastelle, Citrix CTX1, Lorenz cipher, and Radio cipher (using NATO/Military phonetic alphabet content encoding). The challenges are used within Buchanan's teaching as an introduction to Applied Cryptography.

Cryptography Doodles

Buchanan uses a number of teaching style in the teaching of cybersecurity, network security and cryptography. This includes using podcasts,[319] YouTube videos for formal lectures, and practical demonstrations. As part of the teaching of Applied Cryptography and Trust module for an MSc class, he has used a Doodle method of the teaching a range of topics, such as for Cipher Fundamentals,[320] Symmetric Key Encryption,[321] and Hashing methods.[322]

NetworkSims and Cisco simulators

From August 2007, Buchanan setup and ran the NetworkSims.com site, and which delivered a Microsoft Windows-based set of simulators which mimicked Cisco devices for routers, switches, PIX/ASA firewall and an Aironet. These were written in C#, and, in April 2013, he ported these over to Web version and integrated with ASecuritySite.com. These simulators run using a Web console and have challenges for routing, switching, security, wireless and voice for Cisco devices.[323]

Invited Talks and Engagements

Over the years Buchanan has presented at many events, and has a reputation for high impact, fun and engaging presentations. This has included live demonstrations of cyber security threats. With a documentary on Cyber Security, broadcast on Monday 8 November 2015, Buchanan and his team set up a fake Web site for hackers to gain access to, as part of the BBC Panorama programme.[324] In 2016, Buchanan was also included in the FutureScot list for the "50 Scottish Tech People Who Are Changing The World".[325]

Laureations for Honorary Doctorates

On 21 June 2012, Buchanan presented a laureation for Prof John Howie[326] in the award of an Honorary Doctorate and outlined, "Over the years, John has become a world-leading expert and visionary in computer security. He has worked at the highest level in his field within Microsoft's Redwood headquarters, and now heads a world-leading security alliance on cloud-based systems."[327] Also, on 21 June 2012, Buchanan presented a laureation for Steven Cordiner[328] for a Doctor of Technology and outlined, "Steve has been a leading proponent and visionary for optimization within the oil and gas industry, especially in promoting savings in CO2 emissions before it became a world-wide issue."[329]

On 5 July 2016, Buchanan presented a laureation for Dr David Lanc[330] for a Doctor of Enterprise, and outlined, "Prior to entrepreneurial life, David was responsible for leading significant aspects of the successful RBS-NatWest integration. He also led the merger integration of Scottish Widows and Lloyds TSB, and the strategy for the merged business."[331]

Innovation events

Buchanan has organised many conferences and symposiums which focus on innovation. On 12 January 2023, he organised the, "Symposium on Technology Innovation and Collaboration" at the Merchiston Campus at Edinburgh Napier University.[332] It included invited talks from the spin-outs Buchanan was involved with, including from Bruce Ramsay (Cyacomb),[333] Dr Jamie Graves (Zonefox) and Dr Pavlos Papadopoulos.[334] The endnote talk was given by Professor Mark Logan and who outlined, "The Future of Innovation in Scotland".[335]

Invited talks

Examples of recent invited presentations include:

  • Apr 2017, presented an invited for Sidney Michaelson Memorial Lecture at the Edinburgh Science Festival.[336]
  • Oct 2017, presented an invited talk at Scotchain 17[337] at the RBS Gogarburn Campus.
  • May 2018, presented "Futurist academic research into AI" at IISP Congress 2018 in London.[338]
  • Dec 2018, presented at FutureScot 2018 on innovation.[339]
  • Jun 2018, presented at the Crypto Valley Conference[340] on Blockchain Technology in Zug, Switzerland.
  • Jun 2019, presented on "Creating a more trusted, secure and citizen-focused world" at Cybersecurity (Public Sector) 2019.[341]
  • Oct 2019, presented an invited talk at Interrupt 19 at West Lothian College.[342]
  • Nov 2019, presented an invited talk on "The Risks of Cybersecurity" at Digit Expo 2019 in the Edinburgh International Conference Centre.[343]
  • Nov 2019, presented an invited talk on ransomware at the FutureScot's Cyber Security Conference.[344]
  • Jun 2020, presented in the "Security and Resilience at the Heart of Transformation" session at Digital Scotland 2020.[345]
  • Mar 2021, presented "Innovation in Cybersecurity" at Scot-Secure Virtual Summit.[346]
  • Nov 2021, presented, "Cybersecurity Threats", at Digital Scotland 2021.[347]
  • Feb 2022, presented on "Building a more trusted digital world" at FutureScot Annual Conference.[348]
  • Feb 2023, presented in "The future of cybersecurity: Offering citizens a safer digital world, from digital signing, to quantum, AI defence and the blockchain" session at FutureScot Cybersecurity 2023.[349]

He regularly presents in the media, including with a podcast on the BBC World Service entitled, "Will we ever run out of cloud storage?".[350]

World-leaders in Cryptography

Buchanan's passion for cryptography is evident from his social media presence, teaching and research. He has a deep interest in understanding the motivations and the lives of those who have led the way in cryptography. This passion has been integrated with his teaching through a series of talks entitled, "World-leaders in Cryptography":

  • Martin Hellman. Martin (Marty) Hellman - ACM Turing Award winner in 2015 - has appeared twice in this series, and who oulined his work as one of the co-creators of public key encryption, and on his work alongside Whitfield Diffie in the creation of the widely used Diffie-Hellman method. Buchanan first interviewed Hellman on 23 March 2022,[351] and then in interview on 10 March 2023,[352] Hellman outlined an event in 1984 where Adi Shamir broke the Merkle-Hellman public key encryption method at a live Rump session at a conference.[353] In the interview, Martin outlined the first Cryto War related to the DES encryption method, "So Whit and I wrote a letter to the National Bureau of Standards (NBS) as was then called now NIST - the National Institute of Standards and Technology - saying hey you know we should increase the key size because it was cheap to do that ... and they answered all our other objections, but not that one and after about six months we realized that it wasn't a bug it was a feature.", and on attracting Ralph Merkle to Stanford, "But no one at Berkeley appreciated him, so I said to him why don't you come down to Stanford, and do your PhD when you finish your masters with me. Ralph said he can't afford it and I pointed out to him that I could give him a research assistantship that would pay as much money to him as he was getting as a teaching assistant at Berkeley."
  • Len Adleman. On 2 Apr 2021, Buchanan interviewed another Turing Prize Award winner - Len Adleman.[354] In this interview he outlined how Martin Gardner's opened up the world to the RSA method,[355] with "so his influence on my life was tremendous and this is true of you know virtually every mathematician and computer scientist of my generation. In fact he went public with the RSA system with an article he wrote - but he had influenced my life way before that because he introduced Conway's Game of Life." Then, on an interview on 1 April 2023, Adleman outlined how an school teacher teaching Hamlet had influenced him in his early years, "I think she revealed for me, that there was more to the world than was superficially available, and that there were somehow deeper things."[356] and outlined his PhD work with his supervisior (Manuel Blum). In meeting, Ron Rivest and Adi Shamir, here outlined, "I ended up my first job at MIT as a mathematics professor and there I encountered two other people one who had come the same year I came: Adi Shamir, and Ron Rivest. It was a lovely place and a lovely experience, and we were buddies and did a lot of research together.", and "One day I walked into Ron's office and he held up this manuscript and said, 'did you see this thing by these guys at Stanford - Marty Hellman and Whitfield Diffie'."
  • Neal Koblitz. In Feb 2023, Buchanan interviewed Neal I. Koblitz[357] - the co-inventor of Elliptic Curve Cryptography (ECC) and Professor of Mathematics at the University of Washington. Within this interview,[358] Neal outlined how the work of Hendrick Lenstra showed how elliptic curves could be factoring large integers and attacking RSA, and it was this work his motivated him to co-invent Elliptic Curve Cryptography (ECC).
  • Tahir ElGamal. Another key inventor within public key encryption was Tahir ElGamal[359] - the creator of the ElGamal encryption and signature method. Buchanan interview him on 27 October 2022,[360] and outlined that his PhD supervisor (Martin Hellman) told him, "here are 12 problems that are not solvable at the current time, go investigate them". What shone through was Tahir's passion for maths and cryptography, "When I was five years old, I actually took the Cairo telephone book and did a complete statistical analysis on the numbers - and you know that Cairo is not a small city."[360] And, for his thoughts on Marty Hellman (this PhD supervisor and mentor), "Marty is a gentleman, not just an incredibly good professor".
  • Bruce Schneier. Buchanan has outlined that he got into cryptography by reading the work of Bruce Schneier, "In my career, there was a time before I read Secrets & Lies[361] … and there was a time after I had read it. It completely changed my focus. In fact, no other author (apart from George Orwell) has had an effect on my thoughts on the future world. Overall, Bruce showed me a vision of the most trusted world, and made public key encryption interesting. For this, I saw how cryptography could be used to rebuild our flawed digital world. I now teach and research cryptography, and I love the subject. And so, I thank Bruce for taking me away from network switches and routers and showing me the beauty of a subject that you learn something new every single day."[362] Bruce Schneier presented, "Privacy. Trust and the Future" at the Craiglockhart Campus at Edinburgh on 19 Jun, 2019, and which was hosted by Buchanan.[363] He has since been interview by Buchanan on 8 June 2020,[364] 27 Feb 2021,[365] and 24 Feb 2023.[366] In the interview in June 2020, Schneier outlined, "I take hard things and explain them in terms that regular people can understand ... I am a translator. I'm an explainer". Then, in Feb 2023, Schneier outlined, "So I'm a big fan of personal AI agents. To me this is where ChatGPT has real value. You know I can train a large language model on me or other AI agents can. I train an agent on my stuff. I mean right now these are being owned by big companies and they're not being trained for your interest. So it's Google, it's Microsoft, it's Open AI."
  • Toben P Pedersen. In an interview in April 2023,[367] Torben P Pedersen[368] - the inventor of the Pedersen commitment - outlined, "At the time, there was also inefficient commitments, that had the property of being unconditionally hiding, and I thought it would be nice to have a verifiable secret share where you don't have to rely on any computational assumptions, in order to be sure that your secret is not revealed when you do a secret share".[367]
  • Jean-Philippe (JP) Aumasson. On 11 February 2023, Buchanan interviewed Jean-Philippe (JP) Aumasson[369] (co-inventor of the BLAKE hashing method)[370] and who outlined his viewpoints on the importance of lightweight cryptography with, "it's funny because everybody focused on the post-quantum contest because it's super interesting - at least - crazy constructions and heated debates between a number of people, but people forgot that there was another competition for lightweight crypto."
  • Professor Keith Martin[371] (from Royal Holloway, University of London) - on 3 July 2020,[372].
  • Nick Sullivan[373] - the Head of Research at Cloudflare - on 1 May 2020.[374]

The Cyber Academy

Buchanan launched The Cyber Academy at Edinburgh Napier University on 5 May 2015,[375] with a goal of "bringing together industry professionals, law enforcement and academics with a view to combining strengths to combat the growing threat of criminal use of hacking software to steal money, data and intellectual property." Its base was the EU-funded Dynamic Forensics Evaluation and Training (DFET) project,[376] and which developed a cloud-based cybercrime training environments to support authorities, businesses and citizens in the fight against cyber crime. For this, Buchanan outlined, "“The demand for graduates in this area increases by the day, and the Cyber Academy will strive for excellence in teaching, professional practice and research. It is an area which requires many different skillsets to work together, and we believe the academy will achieve this." Vassilis took on the role of the manager of The Cyber Academy. Vassilis (Basil) Manoussous[377] was recruited as the Manager of The Cyber Academy on 25 August 2017.[378]

Along with running courses for law enforcement professionals, a core part of The Cyber Academy has been running conferences in areas of innovation, cybersecurity and health care.

On 15 January 2019, it hosted the "Innovation in Cyber Conference: Building The Next Great Cybersecurity Company"[379] event on the Merchison Campus at Edinburgh Napier University, and which included talks from Dr Jamie Graves (founder of Zonefox),[380] Federico Charosky (founder of Quorum Cyber),[381] David Stubley (founder of 7Elements)[382] and Susan Brown (founder of Zortrex).[383]

From 4–5 June 2019, The Cyber Academy held their 5th "International Conference on Big Data in Cybersecurity" event.[384] Speakers included Prof Steven Furrnell,[385] and Prof Sokratis Katsikas,[386] and Kate Forbes.[387] At the event, Eamonn Keane[388] - a continual contributor to the work of The Cyber Academy - presented a talk on "Take The Mask of Cyber Security," and outlined which outlined his work as Head of Innovation and Cyber at the SBRC.

After a break over the COVID-19 pandemic, the Big Data conference returned on 11 May 2023, with the "6th International Conference on Big Data, Cybersecurity and Critical Infrastructure",[389] and was opened by Robert Aldridge (the Rt. Hon. Lord Provost and Lord Lieutenant of the City of Edinburgh).[390] It included talks from Prof Berk Canberk[391] on "Digital Twins in cybersecurity, infrastructure and 6G applications" and a keynote talk from Becky Pinkard.[392] Buchanan gave the endnote talk at the end on "Future Risks of the Cyber Age".

In Jun 2019, it hosted a talk on "The Future of Money" by Andreas M.Antonopoulos.[393] On 4 September 2019, The Cyber Academy hosted the 2nd International Conference on Blockchain, Identity and Cryptography,[394] and which included a keynote talk from Professor Serguei Popov.[395] The last conference to be run by The Cyber Academy that was run before the COVID-19 lock-down was the 2nd Blockchain International Scientific Conference and which was co-hosted by the British Blockchain Association. It was held on 11 March 2020 at the Craiglochart Conference of Edinburgh Napier University.[396]

Another theme of work of The Cyber Academy is around career's events for Cybersecurity, and have hosted several events in collaboration with CiiSec.[397] On 23 Nov 2017, the IISP[398] hosted a career event[399] with the support of Buchanan and Rich Macfarlane. Then, in Feb 2020, Amanda Finch,[400] the CEO of CiiSec (which had previously been known as the IISP), opened up the CiiSec careers event at the Merchiston Campus.[401] This collaboration has continued over the years, and, The Cyber Academy hosted CiiSec 2022 on 7 September 2022,[402] and which had an overaching theme of "inspiring the next generation of cybersecurity professionals’".[403] David Ferbrache OBE[404] presenting the opening keynote talk, and Buchanan presented on endnote talk on "The Risks and Opportunities of AI".[405]

On 2 March 2023, The Cyber Academy hosted an event of "Cybersecurity, AI & Trails of Evidence: The Fun, The Scary, and The Future", of which Manoussous presented work related to OSINT method, and Buchanan presented live hacks on a range of devices and outlined the rise of AI and the risks related to cybersecurity.[406]

Engagement and Keynote Talks

Buchanan has been involved with public engagement in areas of cybersecurity, AI and cryptography for many years. He has generally expressed strong viewpoints on the weaknesses in the security of IoT devices (especially for toys, cars, pet feeders and domestic devices), and on risks around the slide into a Big Brother world and on the rise of the machines (AI and machine learning).

In 2012, Buchanan co-created the Scottish Cybersecurity lectures for schools with the University of Abertay, and hosted the first conference at the Craiglockhart Campus at Edinburgh Napier University.[407] This has run every year since, and, in 2022, included talks from Dia Banerji[408] and Gary Ennis.[409]

In Dec 2015, Buchanan toured around Scotland with the IET Xmas Lecture for schools on the Internet of Everything.[410] This included Dundee (1 Dec 2015), Dundee (4 Dec 2015 at Gardyne Theatre). Glasgow (at iMax Theatre, Glasgow Science Centre)[411] and Edinburgh (11 Dec 2015 at Craiglockhart Campus, Edinburgh Napier University) As part of these talks, Buchanan hosted Kevin Warwick (Professor of Cybernetics at Reading University) and who presented remotely through a robot at the event. The talk included live demonstrations on the hacking of toys,[412] kettles and electrical plug-sockets, along with flying drones.

In Apr 2017, Buchanan gave a talk on "The Future of Cyber Security, Data and AI: Big Brother or a Brave New World?" at the Sidney Michaelson Memorial Lecture at the Edinburgh Science Festival.[336] It was hosted by Sharon Moore,[413] and where Buchanan contrasted the vision of the rise of machine outlined in the 1927 film of Metropolis (directed by Fritz Lang) with society's increasing worship of the Internet. After being introduced by Moore, Buchanan stunned the audience by appearing with a Guy Fawkes mask, and pointed to the audience and danced to a backdrop of Kraftwerk.[414] In fact, Kraftwerk appear in many of Buchanan's public engagement talks, and are used to illustrate a future world that is dominated by machines (AI).

At DigitExpo 2019 - held in the EICC in Edinburgh - Buchanan outlined why he used video footage from Metropoulos with, "I stood on the stage for over five minutes in silence and used Fritz Lang’s movie to paint a picture of a bleak future."[415]

In 2023, Buchanan presented at an event hosted by at, "Cybersecurity, AI & Trails of Evidence: The Fun, The Scary, and The Future", and demonstrated hacks on cars, toys and the risk of AI.[416] Again, in the talk Buchanan outlined the rise of AI and machine learning, including with intelligent cars and toys.

On 12 Sept 2023, Buchanan presented the key elements of the GLASS digital wallet at a keynote talk with the Borderless Security conference in Royal Holloway, University of London, entitled "GLASS: Citizen Digital Wallet and Borderless Security". It outlined Buchanan's passion for the freedom of movement and in citizen-focused design methods for privacy and cybersecurity, and how a digital wallet (GLASS) with distributed Apps (dApps) could further support this. Then, on 14 Sept 2023, he presented a keynote talk at ScotSecure West[417] in Glasgow on "The Threats and Opportunities of Quantum Computing". This was Buchanan's first public lecture on quantum computing and he outlined how he was worried about giving the talk, and opened with a quote from Victoria Holt, "Never regret. If it's good, it's wonderful. If it's bad, it's experience,"[418] for which he outlined to the audience that if the talk didn't go well, it would have been 'an experience' for him and the audience. In the talk, he defined how quantum computers could crack public key encryption, and outlined the NIST-defined Post Quantum Cryptography methods of CRYSTALS-Kyber for key exchange/public key encrytion, and CRYSTALS-Dilithium FALCON and SPHINCS+ for digital signatures.[419]

As part of the FinTech Scotland Festival, on 26 Sept 2023, Buchanan presented to a closed audience of the RBS-NatWest Conference Suite[420] and then on 28 Sept 2023, presented to another closed auidence at Lloyds Bank main office on The Mound, Edinburgh.[420] Both presentations outlined the opportunities of quantum computers, but also the threats they bring in breaking existing public key encryption methods. Buchanan is quoted as giving away "Bob and Alice" mugs as a prize at the event, of which he has since outlined, "A few people have said to me, 'You could sell those Bob and Alice mugs online', but that will never, ever, ever happen, as they reflect the specialness of someone doing great work and excelling at that point in time. They are a small gift of thanks for being part of a shared learning experience. And, some say I should charge for ASecuritySite.com, but that will never happen either, as education should be free to access, and open to all. So, never take your education for granted - it is the most wonderful thing you can do in your life - and never stop learning. Go be a great teacher or a mentor to others, and reward them with your kindness and thanks in doing great work. Give back what others have given to you."[421]

Awards and recognition

Buchanan's awards and recent recognition includes:

  • In 2003, Finalist for KTP of the Year Award with Seven Layer Communications.[422]
  • In 2004, Winner of the KTP of the Year Award and Grade 1 Certificate of Excellence from Innovate UK with Cànan Ltd.[423]
  • In 2015, named in the "50 most influential UK higher education professionals on social media".[424]
  • In 2016, awarded "Cyber Evangelist of the Year" at the first Scottish Cybersecurity awards,[294] along with leading a project that was awarded the best collaborative project with Police Scotland.[425]
  • In 2016, gave a keynote talk on Cybersecurity at SISCA DEMOfest 2016.[426]
  • In 2016, included in the "The Digital List: 50 people from various areas of Scotland's technology industries who are changing the world".[427]
  • In 2017, appointed Officer of the Order of the British Empire (OBE) in the 2017 Birthday Honours for services to cyber security, and was the first person to receive an OBE related to cyber security.[428]
  • From 2017 to 2021, appointed Chief Editor of the Journal of Cybersecurity Technology.[429]
  • In 2018, received an "Outstanding Contribution to Knowledge Exchange" award at the Scottish Knowledge Exchange awards.[430]
  • In 2018, appointed co-chair on Technical Committee for IEEE Systems, Man, and Cybernetics Society (SMC) on Blockchain.[431]
  • In 2018, became a member of the IOTA Research Council.[432]
  • In 2019, presented a keynote talk at the 5th International Conference on Information Systems Security and Privacy (ICISSP).[433]
  • In 2019, awarded an Honorary Professorship from Spoleczna Akademia Nauk.[434]
  • In 2019, awarded best Best Lecturer/Tutor in the School of Computing at Edinburgh Napier University within the student-nominated excellence awards.[435]
  • From 2020, served as co-Chief Editor of Blockchain in Health Today.[436]
  • In 2020, awarded best Best Lecturer/Tutor in the School of Computing at Edinburgh Napier University within the student-nominated excellence awards.[437]
  • In 2020, Advanced Risk Modelling for Early Detection (ARMED) product won the 'Innovation of the Year' award at Scottish Knowledge Exchange Awards (with CM200 and Adrian Smales).[202]
  • In 2021, presented a keynote talk at the 14th International Conference on Security of Information and Networks.[438]
  • In 2021, winner of the Best Paper Award at 14th International Conference on Security of Information and Networks for the paper entitled, "PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching".[439][440]
  • In 2022, the EU-funded GLASS project won the Leading Light Innovation Award at the Scottish Cyber Awards,[441] of which he is the Principal Investigator (PI) for the project.
  • In 2022, presented a keynote at talk entitled "The Future of Cryptography, Blockchain and Trust" at International Blockchain Summit Istanbul, 2022.[442]
  • In 2022, presented a keynote talk at Cyber Security 2023 in Cardiff.[443]
  • In 2023, appointed to the advisory board of the Zero Trust Special Interest Group.[444]
  • In 2023, awarded best Best Lecturer/Tutor in the School of Computing at Edinburgh Napier University within the student-nominated excellence awards.[445]
  • In 2023, appointed the co-chair for Blockchain & FinTech within IEEE Blockchain Technical Community (BCTC).[446]
  • In 2023, presented a keynote a ScotSecure West (Glasgow)[447] and Borderless Cyber (London).[448]

References

  1. "School of Computing, Engineering & The Built Environment". www.napier.ac.uk. Retrieved 24 June 2023.
  2. "Blockpass Identity Lab - Napier University". identity-lab.blockpass.org. Retrieved 18 August 2021.
  3. "Centre for Cybersecurity, IoT & Cyberphysical Systems". Napier. Retrieved 24 June 2023.
  4. "Bill Buchanan". Napier. Retrieved 2 August 2018.
  5. "Professor Opens Up on His Love of Edinburgh, Cryptography and Innovation". Napier. Retrieved 1 August 2023.
  6. "Welcome Bill Buchanan to the IOTA Research Council". IOTA Foundation Blog. 16 November 2018. Retrieved 1 August 2023.
  7. "The Cyber Academy Presents ... Brave New World or Big Brother?". www.linkedin.com. Retrieved 26 August 2023.
  8. OBE, Prof Bill Buchanan (8 October 2022). "Scotland's Enterprising and Innovative Tech Future". ASecuritySite: When Bob Met Alice. Retrieved 1 September 2023.
  9. Stamatellis, Charalampos; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Katsikas, Sokratis; Buchanan, William J. (January 2020). "A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric". Sensors. 20 (22): 6587. arXiv:2011.09260. Bibcode:2020Senso..20.6587S. doi:10.3390/s20226587. ISSN 1424-8220. PMC 7698751. PMID 33218022.
  10. Masood, Fawad; Boulila, Wadii; Ahmad, Jawad; Arshad; Sankar, Syam; Rubaiee, Saeed; Buchanan, William J. (January 2020). "A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos". Remote Sensing. 12 (11): 1893. Bibcode:2020RemS...12.1893M. doi:10.3390/rs12111893. ISSN 2072-4292.
  11. "Security and So Many Things". asecuritysite.com. Retrieved 20 August 2023.
  12. "OBE, MBE for University stalwarts". Napier. Retrieved 2 September 2023.
  13. "OBE awarded to Buchanan". Instagram. Retrieved 1 August 2023.
  14. "@billatnapier". Twitter. Retrieved 1 August 2023.
  15. "Instagram". www.instagram.com. Retrieved 2 September 2023.
  16. OBE, Prof Bill Buchanan (15 August 2023). "Edinburgh — This Magestic City: 'The mix old and modern, tradition and innovation was intoxicating'". ASecuritySite: When Bob Met Alice. Retrieved 15 August 2023.
  17. "Buchanan & Demarco: Building a World-leading City in Arts & Science: 30-Apr-18". www.linkedin.com. Retrieved 1 August 2023.
  18. "INSPIRED EDINBURGH HOME OF POWERFUL CONVERSATIONS - YouTube". www.youtube.com. Retrieved 1 August 2023.
  19. "Professor Bill Buchanan OBE - Building A New World". INSPIRED EDINBURGH. 23 August 2017. Retrieved 1 August 2023.
  20. "Interview with Bill Buchanan - Tech Sector - Key Sectors - MIE-MakeItEdinburgh - Why Edinburgh? - Meeting Edinburgh". www.meetingedinburgh.com. Retrieved 7 August 2023.
  21. Best Lecturer/Tutor (School of Computing) 2020, Edinburgh Napier University, retrieved 6 August 2023
  22. Commerce, Edinburgh Chamber of. "Edinburgh Chamber of Commerce: Inspiring Connections". Edinburgh Chamber of Commerce. Retrieved 21 August 2023.
  23. "Primary schools - Victoria Primary School | Falkirk Council". www.falkirk.gov.uk. Retrieved 31 July 2023.
  24. "Graeme High School Falkirk - Home Page". graemehigh.com. Retrieved 31 July 2023.
  25. "History". CalaChem Fine Chemicals. Retrieved 31 July 2023.
  26. "Royal Observatory Edinburgh". www.ukri.org. Retrieved 31 July 2023.
  27. "Microwaves in the laboratory". ieeexplore.ieee.org. Retrieved 15 October 2023.
  28. "Research Output". Napier. Retrieved 31 July 2023.
  29. Buchanan, Bill. "The Risks of the Cyber Age". The Scotsman.
  30. "Prof Bill Buchanan OBE on LinkedIn: Hand on heart. I love coding. I always have. I don't want to teach it, but… | 22 comments". www.linkedin.com. Retrieved 6 September 2023.
  31. "Research Council". www.iota.org. Retrieved 19 August 2023.
  32. "Welcome Bill Buchanan to the IOTA Research Council". IOTA Foundation Blog. 16 November 2018. Retrieved 19 August 2023.
  33. "Talking with Tech Leaders on Apple Podcasts". Apple Podcasts. 7 August 2023. Retrieved 19 August 2023.
  34. "Zero Trust SIG". Zero Trust SIG. Retrieved 19 August 2023.
  35. "Advisory Board". Zero Trust SIG. Retrieved 19 August 2023.
  36. "distributed single sign on stack on e governance paradigm based on a distributed 1". Napier. Retrieved 19 August 2023.
  37. "trust and privacy preserving computing platform for crossborder federation of personal". Napier. Retrieved 19 August 2023.
  38. OBE, Prof Bill Buchanan (20 March 2021). "The Immunisation Programme — A Lost Opportunity in Proper Digital Citizen Integration in Health?". ASecuritySite: When Bob Met Alice. Retrieved 31 August 2023.
  39. OBE, Prof Bill Buchanan (15 August 2023). "A Vision For The NHS: A Citizen Wallet". ASecuritySite: When Bob Met Alice. Retrieved 2 September 2023.
  40. OBE, Prof Bill Buchanan (31 August 2023). "Digital Citizen Interaction with Health Care?". ASecuritySite: When Bob Met Alice. Retrieved 31 August 2023.
  41. OBE, Prof Bill Buchanan (29 August 2023). "PQC Gets A Tombstone Notice". ASecuritySite: When Bob Met Alice. Retrieved 30 August 2023.
  42. OBE, Prof Bill Buchanan (10 July 2023). "Standing on the Horizon of One of the Greatest Advancements in Science: The Quantum Computer". ASecuritySite: When Bob Met Alice. Retrieved 30 August 2023.
  43. OBE, Prof Bill Buchanan (11 January 2022). "The End Game For a Post Quantum Computer Era … Isogenies?". ASecuritySite: When Bob Met Alice. Retrieved 1 September 2023.
  44. Buchanan, Bill (5 November 2014). "Better locks to secure our data are the inevitable result of too many prying eyes". The Conversation. Retrieved 25 August 2023.
  45. House of Commons Investigatory Powers Bill (Dec 2016), retrieved 25 August 2023
  46. "Parliamentlive.tv". www.parliamentlive.tv. Retrieved 25 August 2023.
  47. Lomas, Natasha (5 July 2023). "Security researchers latest to blast UK's Online Safety Bill as encryption risk". TechCrunch. Retrieved 1 August 2023.
  48. OBE, Prof Bill Buchanan (17 September 2023). "My 2,000th Blog Post on Medium". ASecuritySite: When Bob Met Alice. Retrieved 17 September 2023.
  49. Ioannidis, John P. A. (10 October 2022). "September 2022 data-update for "Updated science-wide author databases of standardized citation indicators"". 4. Elsevier BV. doi:10.17632/btchxktzyw.4. {{cite journal}}: Cite journal requires |journal= (help)
  50. "Profiles". scholar.google.com. Retrieved 2 August 2023.
  51. O'Sullivan, Kevin (6 September 2023). "Two Scottish universities feature in UK top 10 for spinout companies". FutureScot. Retrieved 17 September 2023.
  52. "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 24 June 2023.
  53. "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 24 June 2023.
  54. England, Higher Funding Council of. "Guidance on REF 2021 results - REF 2021". Higher Education Funding Council for England. Retrieved 24 June 2023.
  55. "Unit of assessment 11: Computer Science and Informatics : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 24 June 2023.
  56. McCulloch, Scott (5 May 2015). "Napier University to launch new International Cyber Academy". businessInsider. Retrieved 9 July 2023.
  57. "2016 Research Awards -". Retrieved 9 July 2023.
  58. "Security and So Many Things". asecuritysite.com. Retrieved 9 July 2023.
  59. "Blockpass Identity Lab Furthers Research and Understanding". www.blockpass.org. Retrieved 9 July 2023.
  60. "2017 – Research Excellence Awards". Retrieved 9 July 2023.
  61. EP 2347366, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Improvements in or relating to digital forensics", published 2019-05-08, assigned to Fortinet Inc.
  62. US8887274B2, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Digital forensics", issued 2014-11-11
  63. GB application 2561176, Stevenson, Ian; Bruce, Ramsay & Buchanan, William Johnston et al., "System and method for management of confidential data", published 2018-10-11, assigned to Edinburgh Napier University
  64. GB 2561177, Stevenson, Ian; Bruce, Ramsay & Buchanan, William Johnston et al., "Method for identification of digital content", published 2021-06-30, assigned to Cyan Forensics Ltd.
  65. US 9043867, Uthmani, Omair; Buchanan, William & Lawson, Alistair et al., "Information sharing", published 2015-05-26, assigned to The Court of Edinburgh Napier University
  66. WO2018185455A1, Buchanan, William Johnston; LO, Owen Chin Wai & PENROSE, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2018-10-11
  67. WO2022195254A1, BUCHANAN, Bill; Mclaren, Peter & Gordon, Russell et al., "Detection of ransomware", issued 2022-09-22
  68. US 10979222, Lanc, David; Fan, Lu & Mackinnon, Lachlan et al., "Resilient secret sharing cloud based architecture for data vault", published 2021-04-13, assigned to Leading Software Ltd.
  69. "BIL Launch Advances a Future of Self-Sovereign Identity". www.blockpass.org. Retrieved 31 July 2023.
  70. "distributed single sign on stack on e governance paradigm based on a distributed 1". Napier. Retrieved 31 July 2023.
  71. "trust and privacy preserving computing platform for crossborder federation of personal". Napier. Retrieved 31 July 2023.
  72. Ali, Hisham; Ahmad, Jawad; Jaroucheh, Zakwan; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Lo, Owen; Abramson, Will; Buchanan, William J. (October 2022). "Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform". Entropy. 24 (10): 1379. Bibcode:2022Entrp..24.1379A. doi:10.3390/e24101379. ISSN 1099-4300. PMC 9601302. PMID 37420400.
  73. Abubakar, Mwrwan; McCarron, Pádraig; Jaroucheh, Zakwan; Al Dubai, Ahmed; Buchanan, Bill (December 2021). "Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. arXiv:2112.10124. doi:10.1109/SIN54109.2021.9699221. ISBN 978-1-7281-9266-6. S2CID 245334671.
  74. Barati, Masoud; Buchanan, William J.; Lo, Owen; Rana, Omer (7 February 2022). "A privacy-preserving distributed platform for COVID-19 vaccine passports". Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion. UCC '21. New York, NY, USA: Association for Computing Machinery. pp. 1–6. doi:10.1145/3492323.3495626. ISBN 978-1-4503-9163-4. S2CID 246635492.
  75. Papadopoulos, Pavlos; Pitropakis, Nikolaos; Buchanan, William J.; Lo, Owen; Katsikas, Sokratis (September 2020). "Privacy-Preserving Passive DNS". Computers. 9 (3): 64. doi:10.3390/computers9030064. ISSN 2073-431X.
  76. Jaroucheh, Zakwan; Alissa, Mohamad; Buchanan, William J; Liu, Xiaodong (July 2020). "TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies". 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC). pp. 1235–1240. doi:10.1109/COMPSAC48688.2020.00-87. ISBN 978-1-7281-7303-0.
  77. "Chaloner Chute". www.dhi-scotland.comhttps. Retrieved 6 August 2023.
  78. "Muhammad Imran". ieeexplore.ieee.org. Retrieved 6 August 2023.
  79. "Professor Jill Pell". www.ukri.org. Archived from the original on 6 August 2023. Retrieved 6 August 2023.
  80. "Claudia Pagliari". The University of Edinburgh. 1 February 2023. Retrieved 6 August 2023.
  81. "Sanna Rimpilainen". University of Strathclyde. Retrieved 6 August 2023.
  82. Buchanan, William; Imran, Muhammad; Pagliari, Claudia; Pell, Jill; Rimpiläinen, Sanna (14 July 2020). Use of Participatory Apps in Contact Tracing – Options and Implications for Public Health, Privacy and Trust (Report). Glasgow: University of Strathclyde. doi:10.17868/73197.
  83. Xu, Hao; Zhang, Lei; Onireti, Oluwakayode; Fang, Yang; Buchanan, William J.; Imran, Muhammad Ali (March 2021). "BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for COVID-19 Pandemic and Beyond". IEEE Internet of Things Journal. 8 (5): 3915–3929. doi:10.1109/JIOT.2020.3025953. ISSN 2327-4662. S2CID 218718736.
  84. Buchanan, William J.; Imran, Muhammad Ali; Ur-Rehman, Masood; Zhang, Lei; Abbasi, Qammer H.; Chrysoulas, Christos; Haynes, David; Pitropakis, Nikolaos; Papadopoulos, Pavlos (2020). "Review and Critical Analysis of Privacy-Preserving Infection Tracking and Contact Tracing". Frontiers in Communications and Networks. 1. doi:10.3389/frcmn.2020.583376. ISSN 2673-530X.
  85. Abramson, Will; Buchanan, William J.; Sayeed, Sarwar; Pitropakis, Nikolaos; Lo, Owen (December 2021). "PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. doi:10.1109/SIN54109.2021.9699138. ISBN 978-1-7281-9266-6. S2CID 244908584.
  86. "Nikolaos Pitropakis". scholar.google.com. Retrieved 6 August 2023.
  87. "privacy preserving systems around security trust and identity". Napier. Retrieved 6 August 2023.
  88. Stamatellis, Charalampos; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Katsikas, Sokratis; Buchanan, William J. (January 2020). "A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric". Sensors. 20 (22): 6587. arXiv:2011.09260. Bibcode:2020Senso..20.6587S. doi:10.3390/s20226587. ISSN 1424-8220. PMC 7698751. PMID 33218022.
  89. "identity and identification in an information society augmenting formal systems of". Napier. Retrieved 6 August 2023.
  90. Abramson, Will; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Buchanan, William J. (1 August 2021). "PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform". Software Impacts. 9: 100101. doi:10.1016/j.simpa.2021.100101. ISSN 2665-9638. S2CID 237621690.
  91. CyberHunt. "CyberHunt". CyberHunt. Retrieved 6 August 2023.
  92. Ali, Hisham; Papadopoulos, Pavlos; Ahmad, Jawad; Pitropakis, Nikolaos; Jaroucheh, Zakwan; Buchanan, William J. (December 2021). "Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–6. doi:10.1109/SIN54109.2021.9699366. ISBN 978-1-7281-9266-6. S2CID 245334925.
  93. Young, Edward Henry; Chrysoulas, Christos; Pitropakis, Nikolaos; Papadopoulos, Pavlos; Buchanan, William J (October 2021). "Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure". 2021 International Conference on Data Analytics for Business and Industry (ICDABI). pp. 650–654. doi:10.1109/ICDABI53623.2021.9655843. ISBN 978-1-6654-1656-6. S2CID 238354054.
  94. Dyson, Simon F.; Buchanan, William J.; Bell, Liam (1 March 2020). "Scenario-based creation and digital investigation of ethereum ERC20 tokens". Forensic Science International: Digital Investigation. 32: 200894. doi:10.1016/j.fsidi.2019.200894. ISSN 2666-2817. S2CID 213992224.
  95. Saha, Rahul; Kumar, Gulshan; Devgun, Tannishtha; Buchanan, William J.; Thomas, Reji; Alazab, Mamoun; Hoon-Kim, Tai; Rodrigues, Joel J. P. C. (January 2023). "A Blockchain Framework in Post-Quantum Decentralization". IEEE Transactions on Services Computing. 16 (1): 1–12. doi:10.1109/TSC.2021.3116896. ISSN 1939-1374. S2CID 244189706.
  96. Abubakar, Mwrwan; Ali, Hisham; Ghaleb, Baraq; Wadhaj, Isam; Buchanan, William J. (2023). "An Overview of Blockchain-Based IoT Architectures and Designs". In Al-Sharafi, Mohammed A.; Al-Emran, Mostafa; Al-Kabi, Mohammed Naji; Shaalan, Khaled (eds.). Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems. Lecture Notes in Networks and Systems. Vol. 584. Cham: Springer International Publishing. pp. 596–605. doi:10.1007/978-3-031-25274-7_52. ISBN 978-3-031-25274-7.
  97. Abubakar, Mwrwan; McCarron, Pádraig; Jaroucheh, Zakwan; Al Dubai, Ahmed; Buchanan, Bill (December 2021). "Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. doi:10.1109/SIN54109.2021.9699221. ISBN 978-1-7281-9266-6.
  98. Buchanan, William; Woodward, Alan (2 January 2017). "Will quantum computers be the end of public key encryption?". Journal of Cyber Security Technology. 1 (1): 1–22. doi:10.1080/23742917.2016.1226650. ISSN 2374-2917. S2CID 125668533.
  99. "Alan Woodward". scholar.google.com. Retrieved 7 August 2023.
  100. Barton, Jon; Buchanan, William; Pitropakis, Nikolaos; Sayeed, Sarwar; Abramson, Will (2022). Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. pp. 551–561. doi:10.5220/0010903000003120. ISBN 978-989-758-553-1. S2CID 246635203. Retrieved 7 August 2023 via semanticscholar.org.
  101. Buchanan, Bill (10 July 2023). "Standing on the Horizon of One of the Greatest Advancements in Science: The Quantum Computer". ASecuritySite: When Bob Met Alice. Retrieved 1 September 2023.
  102. Li, Shancang; Choo, Kim-Kwang Raymond; Sun, Qindong; Buchanan, William J.; Cao, Jiuxin (August 2019). "IoT Forensics: Amazon Echo as a Use Case". IEEE Internet of Things Journal. 6 (4): 6487–6497. doi:10.1109/JIOT.2019.2906946. ISSN 2327-4662. S2CID 149509079.
  103. Muir, Matt; Leimich, Petra; Buchanan, William J. (1 June 2019). "A Forensic Audit of the Tor Browser Bundle". Digital Investigation. 29: 118–128. doi:10.1016/j.diin.2019.03.009. ISSN 1742-2876.
  104. Sudozai, M. A. K.; Saleem, Shahzad; Buchanan, William J.; Habib, Nisar; Zia, Haleemah (1 June 2018). "Forensics study of IMO call and chat app". Digital Investigation. 25: 5–23. doi:10.1016/j.diin.2018.04.006. ISSN 1742-2876. S2CID 49599026.
  105. Buchanan, William J.; Woodward, Alan; Helme, Scott (October 2017). "Cryptography across industry sectors". Journal of Cyber Security Technology. 1 (3–4): 145–162. doi:10.1080/23742917.2017.1327221. ISSN 2374-2917. S2CID 113481528.
  106. Asif, Rameez; Buchanan, William J. (June 2017). "Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption". 2017 IEEE International Conference on Internet of Things (IThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). pp. 910–916. doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.140. ISBN 978-1-5386-3066-2. S2CID 2590039.
  107. Saha, Rahul; Geetha, G.; Kumar, Gulshan; Kim, Tai-Hoon; Buchanan, William J. (2019). "MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features". IEEE Access. 7: 172045–172054. doi:10.1109/ACCESS.2019.2956160. ISSN 2169-3536. S2CID 209320638.
  108. Saha, Rahul; Geetha, Ganesan; Kumar, Gulshan; Buchanan, William J.; Kim, Tai-hoon (January 2021). "A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions". Applied Sciences. 11 (17): 8073. doi:10.3390/app11178073. ISSN 2076-3417.
  109. Abramson, Will; Buchanan, William J.; Sayeed, Sarwar; Pitropakis, Nikolaos; Lo, Owen (December 2021). "PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. doi:10.1109/SIN54109.2021.9699138. ISBN 978-1-7281-9266-6. S2CID 244908584.
  110. McLaren, Peter; Buchanan, William J.; Russell, Gordon; Tan, Zhiyuan (1 October 2019). "Deriving ChaCha20 key streams from targeted memory analysis". Journal of Information Security and Applications. 48: 102372. doi:10.1016/j.jisa.2019.102372. ISSN 2214-2126. S2CID 198968271.
  111. Davies, Simon R.; Macfarlane, Richard; Buchanan, William J. (October 2022). "Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification". Entropy. 24 (10): 1503. arXiv:2210.13376. Bibcode:2022Entrp..24.1503D. doi:10.3390/e24101503. ISSN 1099-4300. PMC 9601406. PMID 37420524.
  112. "Jawad Ahmad". Napier. Retrieved 26 August 2023.
  113. Major, Will; Buchanan, William J.; Ahmad, Jawad (1 March 2020). "An authentication protocol based on chaos and zero knowledge proof". Nonlinear Dynamics. 99 (4): 3065–3087. doi:10.1007/s11071-020-05463-3. ISSN 1573-269X. S2CID 210859204.
  114. Khan, Jan Sher; Boulila, Wadii; Ahmad, Jawad; Rubaiee, Saeed; Rehman, Atique Ur; Alroobaea, Roobaea; Buchanan, William J. (2020). "DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption". IEEE Access. 8: 159732–159744. doi:10.1109/ACCESS.2020.3020917. ISSN 2169-3536. S2CID 221715931.
  115. Qayyum, Abdullah; Ahmad, Jawad; Boulila, Wadii; Rubaiee, Saeed; Arshad; Masood, Fawad; Khan, Fawad; Buchanan, William J. (2020). "Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution". IEEE Access. 8: 140876–140895. doi:10.1109/ACCESS.2020.3012912. ISSN 2169-3536. S2CID 221036159.
  116. Ahmad, Jawad; Tahir, Ahsen; Khan, Jan Sher; Jameel, Atif; Abbasi, Qammer H; Buchanan, William (February 2020). "A Novel Multi-Chaos Based Compressive Sensing Encryption Technique". 2019 International Conference on Advances in the Emerging Computing Technologies (AECT). pp. 1–4. doi:10.1109/AECT47998.2020.9194220. ISBN 978-1-7281-4452-8. S2CID 221717067.
  117. Alharbi, Adel R.; Ahmad, Jawad; Arshad, Undefined; Jamal, Sajjad Shaukat; Masood, Fawad; Ghadi, Yazeed Yasin; Pitropakis, Nikolaos; J Buchanan, William (18 April 2022). "A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map". Complexity. 2022: e7047282. doi:10.1155/2022/7047282. ISSN 1076-2787.
  118. Ahmed, Fawad; Rehman, Muneeb Ur; Ahmad, Jawad; Khan, Muhammad Shahbaz; Boulila, Wadii; Srivastava, Gautam; Lin, Jerry Chun-Wei; Buchanan, William J. (25 February 2023). "A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder". ACM Transactions on Multimedia Computing, Communications, and Applications. 19 (3s): 128:1–128:21. doi:10.1145/3570165. ISSN 1551-6857. S2CID 253258876.
  119. "Shancang Li". ieeexplore.ieee.org. Retrieved 7 August 2023.
  120. "Rameez Asif". University of East Anglia. Retrieved 7 August 2023.
  121. Buchanan, William J.; Li, Shancang; Asif, Rameez (October 2017). "Lightweight cryptography methods". Journal of Cyber Security Technology. 1 (3–4): 187–201. doi:10.1080/23742917.2017.1384917. ISSN 2374-2917. S2CID 67434288.
  122. Gunathilake, Nilupulee A.; Buchanan, William J.; Asif, Rameez (April 2019). "Next Generation Lightweight Cryptography for Smart IoT Devices: : Implementation, Challenges and Applications". 2019 IEEE 5th World Forum on Internet of Things (WF-IoT). pp. 707–710. doi:10.1109/WF-IoT.2019.8767250. ISBN 978-1-5386-4980-0. S2CID 198144877.
  123. Gunathilake, Nilupulee A.; Al-Dubai, Ahmed; Buchana, William J. (November 2020). "Recent Advances and Trends in Lightweight Cryptography for IoT Security". 2020 16th International Conference on Network and Service Management (CNSM). pp. 1–5. doi:10.23919/CNSM50824.2020.9269083. ISBN 978-3-903176-31-7. S2CID 227277538.
  124. Gunathilake, Nilupulee A.; Al-Dubai, Ahmed; Buchanan, William J.; Lo, Owen (January 2022). "Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher". 2022 6th International Conference on Cryptography, Security and Privacy (CSP). pp. 51–55. doi:10.1109/CSP55486.2022.00018. ISBN 978-1-6654-7975-2. S2CID 245424991.
  125. "Bill Buchanan". Napier. Retrieved 24 July 2023.
  126. "MARIAN Mobile Agents for Routing in AdHoc Networks". Napier. Retrieved 24 July 2023.
  127. "Forensic verification of operating system activity via novel data acquisition and analysis". Napier. Retrieved 24 July 2023.
  128. "Cryptographic privacypreserving enhancement method for investigative data acquisition". Napier. Retrieved 24 July 2023.
  129. "HIRisk a sociotechnical method to identify and monitor heathcare information security risks in". Napier. Retrieved 24 July 2023.
  130. "a pattern driven corpus to predictive analytics in mitigating sql injection attack". Napier. Retrieved 24 July 2023.
  131. "forensic analysis of large capacity digital storage devices". Napier. Retrieved 24 July 2023.
  132. "rescue evaluation of a fragmented secret share system in distributed cloud architecture". Napier. Retrieved 2 September 2023.
  133. "embedded document security using sticky policies and identity based encryption". Napier. Retrieved 24 July 2023.
  134. "test bed and evaluation of a home based adverse event prediction infrastructure". Napier. Retrieved 24 July 2023.
  135. "investigations into decrypting live secure traffic in virtual environments". Napier. Retrieved 24 July 2023.
  136. "identity and identification in an information society augmenting formal systems of". Napier. Retrieved 8 August 2023.
  137. "privacy preserving systems around security trust and identity". Napier. Retrieved 24 July 2023.
  138. "distributed single sign on stack on e governance paradigm based on a distributed 1". Napier. Retrieved 27 July 2023.
  139. "ktp miracl". Napier. Retrieved 27 July 2023.
  140. "truelect". Napier. Retrieved 27 July 2023.
  141. "trust and privacy preserving computing platform for crossborder federation of personal". Napier. Retrieved 27 July 2023.
  142. "ai based privacy preserving biometric authentication with mass market smart devices". Napier. Retrieved 27 July 2023.
  143. "cyber hunt". Napier. Retrieved 27 July 2023.
  144. "phd studentship homomorphic encryption". Napier. Retrieved 27 July 2023.
  145. "memcrypt hgsp". Napier. Retrieved 27 July 2023.
  146. "Data Capture and Auto Identification Reference". napier-repository.worktribe.com. Retrieved 4 August 2023.
  147. "Homepage". Chelsea and Westminster Hospital NHS Foundation Trust. Retrieved 4 August 2023.
  148. "GS1 UK | The Global Language of Business". www.gs1uk.org. Retrieved 4 August 2023.
  149. Fan, L.; Buchanan, W.; Thummler, C.; Lo, O.; Khedim, A.; Uthmani, O.; Lawson, A.; Bell, D. (July 2011). "DACAR Platform for eHealth Services Cloud". 2011 IEEE 4th International Conference on Cloud Computing (PDF). pp. 219–226. doi:10.1109/CLOUD.2011.31. ISBN 978-1-4577-0836-7. S2CID 14062712.
  150. "Home - Emeritus Professor Derek Bell". www.imperial.ac.uk. Retrieved 4 August 2023.
  151. "Christoph Thuemmler". scholar.google.com. Retrieved 4 August 2023.
  152. "Prof Christoph Thuemmler". napier-repository.worktribe.com. Retrieved 4 August 2023.
  153. "Lu Fan". scholar.google.com. Retrieved 4 August 2023.
  154. Thuemmler, Christoph; Buchanan, William; Fekri, Amir Hesam; Lawson, Alistair (2009). "Radio frequency identification (RFID) in pervasive healthcare". International Journal of Healthcare Technology and Management. 10 (1/2): 119. doi:10.1504/IJHTM.2009.023731. ISSN 1368-2156.
  155. Thuemmler, C.; Buchanan, W.; Kumar, V. (2007). "Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology". International Journal of Healthcare Technology and Management. 8 (5): 571. doi:10.1504/IJHTM.2007.013524. ISSN 1368-2156.
  156. "Owen Lo". Napier. Retrieved 4 August 2023.
  157. updates (2 March 2022). "Cyan Forensics changes its name to Cyacomb". ScotlandIS. Retrieved 4 August 2023.
  158. "scalable and open framework for humandigital trust between informalformal personal". Napier. Retrieved 4 August 2023.
  159. Ekonomou, E.; Fan, L.; Buchanan, W.; Thuemmler, C. (November 2011). "An Integrated Cloud-based Healthcare Infrastructure". 2011 IEEE Third International Conference on Cloud Computing Technology and Science. pp. 532–536. doi:10.1109/CloudCom.2011.80. ISBN 978-1-4673-0090-2. S2CID 18718402.
  160. Cloud4Health - Outline, retrieved 4 August 2023
  161. Cloud4Health - Overview - Scotland IS Video Submission, retrieved 4 August 2023
  162. "distributed single sign on stack on e governance paradigm based on a distributed 1". Napier. Retrieved 28 July 2023.
  163. "Home". GLASS-H2020. Retrieved 28 July 2023.
  164. EU Commission. "SinGLe Sign-on eGovernAnce paradigm based on a distributed file exchange network for Security, transparency, cost effectiveness and truSt".
  165. Lo, Owen; Buchanan, William J.; Sayeed, Sarwar; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Chrysoulas, Christos (January 2022). "GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture". Sensors. 22 (6): 2291. arXiv:2203.08781. Bibcode:2022Senso..22.2291L. doi:10.3390/s22062291. ISSN 1424-8220. PMC 8949250. PMID 35336462.
  166. Kelly, Ross (24 November 2022). "Winners Announced at 2022 Scottish Cyber Awards". DIGIT. Retrieved 28 July 2023.
  167. "Migration and Home Affairs". commission.europa.eu. Retrieved 2 August 2023.
  168. "Research Output". Napier. Retrieved 2 August 2023.
  169. Buchanan, William J.; Ramsay, Bruce; Macfarlane, Richard; Smales, Adrian; Keane, Eamonn; Callahan, Cormac; Blazic, Borka Jerman; Popov, Oliver (3 September 2015). "Evaluation of the DFET Cloud". {{cite journal}}: Cite journal requires |journal= (help)
  170. "vSOC Virtualised Security Operations Centre". Napier. Retrieved 2 August 2023.
  171. "virtualised security operations centre vsoc ktp". Napier. Retrieved 2 August 2023.
  172. "Home". The Data Lab. Retrieved 2 August 2023.
  173. "Cyber & Data". asecuritysite.com. Retrieved 2 August 2023.
  174. reporters, T. H. E. (7 September 2023). "Times Higher Education Awards 2023: shortlist announced". Times Higher Education (THE). Retrieved 17 September 2023.
  175. "Owen Lo". scholar.google.com. Retrieved 5 August 2023.
  176. "Nilupulee Gunathilake". Napier. Retrieved 5 August 2023.
  177. "Bare Metal Forensics Pattern Analysis Heuristics Data Analysis". Napier. Retrieved 5 August 2023.
  178. Lo, Owen; Buchanan, William J.; Carson, Douglas (2 April 2017). "Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)". Journal of Cyber Security Technology. 1 (2): 88–107. doi:10.1080/23742917.2016.1231523. ISSN 2374-2917. S2CID 114293257.
  179. Practical side-channel attacks on embedded device cryptography: Dr Owen Lo and Doug Carson, retrieved 5 August 2023
  180. "International Conference on Cryptography and High Performance Computing". The Cyber Academy. 30 April 2016. Retrieved 5 August 2023.
  181. "iot hardware security test framework". Napier. Retrieved 25 August 2023.
  182. "Better security on IoT devices". CENSIS. Retrieved 25 August 2023.
  183. Lo, Owen; Buchanan, William J.; Carson, Douglas (27 August 2018). "Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device". Proceedings of the 13th International Conference on Availability, Reliability and Security. ARES 2018. New York, NY, USA: Association for Computing Machinery. pp. 1–6. doi:10.1145/3230833.3232801. ISBN 978-1-4503-6448-5. S2CID 51980728.
  184. Gunathilake, Nilupulee A.; Al-Dubai, Ahmed; Buchanan, William J.; Lo, Owen (January 2022). "Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher". 2022 6th International Conference on Cryptography, Security and Privacy (CSP). pp. 51–55. doi:10.1109/CSP55486.2022.00018. ISBN 978-1-6654-7975-2. S2CID 245424991.
  185. "investigations into decrypting live secure traffic in virtual environments". Napier. Retrieved 5 August 2023.
  186. "memcrypt hgsp". Napier. Retrieved 5 August 2023.
  187. "CyberASAP - Innovate UK KTN". Retrieved 5 August 2023.
  188. "memcrypt". Napier. Retrieved 5 August 2023.
  189. "memcrypt cyberasap phase 2". Napier. Retrieved 5 August 2023.
  190. "MEMCRYPT LIMITED overview - Find and update company information - GOV.UK". find-and-update.company-information.service.gov.uk. Retrieved 5 August 2023.
  191. McLaren, Peter; Russell, Gordon; Buchanan, Bill (July 2017). "Mining malware command and control traces". 2017 Computing Conference. pp. 788–794. doi:10.1109/SAI.2017.8252185. ISBN 978-1-5090-5443-5. S2CID 32469879.
  192. McLaren, Peter; Buchanan, William J.; Russell, Gordon; Tan, Zhiyuan (1 October 2019). "Deriving ChaCha20 key streams from targeted memory analysis". Journal of Information Security and Applications. 48: 102372. doi:10.1016/j.jisa.2019.102372. ISSN 2214-2126.
  193. Davies, Simon R.; Macfarlane, Richard; Buchanan, William J. (1 June 2020). "Evaluation of live forensic techniques in ransomware attack mitigation". Forensic Science International: Digital Investigation. 33: 300979. doi:10.1016/j.fsidi.2020.300979. ISSN 2666-2817. S2CID 219769091.
  194. Davies, Simon R.; Macfarlane, Richard; Buchanan, William J. (1 September 2021). "Differential area analysis for ransomware attack detection within mixed file datasets". Computers & Security. 108: 102377. doi:10.1016/j.cose.2021.102377. ISSN 0167-4048. S2CID 235658473.
  195. Canan KTP Award 2004, retrieved 25 August 2023
  196. "Donella Beaton | Executive Members | RGU". www.rgu.ac.uk. Retrieved 25 August 2023.
  197. "SOC: researchgroup displayonegroup". Archived from the original on 3 August 2004. Retrieved 25 August 2023.
  198. "scalable and open framework for humandigital trust between informalformal personal". Napier. Retrieved 2 August 2023.
  199. "Digital Health & Care Innovation Centre". www.dhi-scotland.comhttps. Retrieved 2 August 2023.
  200. "e frail phase 2". Napier. Retrieved 2 August 2023.
  201. CM2000 ARMED Solution, retrieved 2 August 2023
  202. "Wearable tech scoops two prizes for supporting independent living". Med-Tech Innovation. 11 March 2020. Retrieved 2 August 2023.
  203. "Blockchain technology to be used to monitor medical devices". Napier. Retrieved 2 August 2023.
  204. "health blockchain". Napier. Retrieved 2 August 2023.
  205. "next generation trust architecture". Napier. Retrieved 2 August 2023.
  206. "next generation connectivity with health and well being". Napier. Retrieved 2 August 2023.
  207. "phd studentship homomorphic encryption". Napier. Retrieved 2 August 2023.
  208. Thuemmler, Christoph; Fan, Lu; Buchanan, William; Lo, Owen; Ekonomou, Elias; Khedim, Abou Sofyane (10 January 2012). "E-Health: Chances and Challenges of Distributed, Service oriented Architectures". Journal of Cyber Security and Mobility: 37–52. doi:10.13052/jcsm2245-1439.113. ISSN 2245-4578.
  209. van Deursen, Nicole; Buchanan, William J.; Duff, Alistair (1 September 2013). "Monitoring information security risks within health care". Computers & Security. 37: 31–45. doi:10.1016/j.cose.2013.04.005. ISSN 0167-4048.
  210. Bell, Liam; Buchanan, William J.; Cameron, Jonathan; Lo, Owen (29 May 2018). "Applications of Blockchain Within Healthcare". Blockchain in Healthcare Today. 1. doi:10.30953/bhty.v1.8. ISSN 2573-8240. S2CID 169773440.
  211. Abubakar, Mwrwan; McCarron, Pádraig; Jaroucheh, Zakwan; Al Dubai, Ahmed; Buchanan, Bill (December 2021). "Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. arXiv:2112.10124. doi:10.1109/SIN54109.2021.9699221. ISBN 978-1-7281-9266-6. S2CID 245334671.
  212. "SmpliCare". Smplicare.com. Retrieved 2 August 2023.
  213. "SIPR – Scottish Institute for Policing Research". Retrieved 16 August 2023.
  214. "Information Sharing between the Police and their Community Partners". Napier. Retrieved 16 August 2023.
  215. "Novel information sharing syntax for data sharing between police and community partners, using role-based security". S2CID 154114930. {{cite web}}: Missing or empty |url= (help)
  216. US9043867B2, Uthmani, Omair; Buchanan, William & Lawson, Alistair et al., "Information sharing", issued 2015-05-26
  217. "Appendix B". www.gov.scot. Retrieved 16 August 2023.
  218. "3. Research evidence and emerging technologies in policing". www.gov.scot. Retrieved 16 August 2023.
  219. "University spinout becomes part of the Fortinet family". Napier. Retrieved 7 March 2021.
  220. OSullivan, Kevin (22 June 2017). "Prof Bill Buchanan rewarded with OBE for cyber security work". FutureScot. Retrieved 7 March 2021.
  221. "Spinout set to revolutionise digital forensics worldwide". Napier. Retrieved 7 March 2021.
  222. "Fortinet acquires ZoneFox". Fortinet. Retrieved 7 March 2021.
  223. "Ping Identity to Acquire Symphonic Software to Accelerate Dynamic Authorization for Enterprises Pursuing Zero Trust Identity Security". www.pingidentity.com. Retrieved 7 March 2021.
  224. "Edinburgh Napier enters UK top 10 for successful spin outs". Napier. Retrieved 6 September 2023.
  225. Pete (30 January 2019). "Q&A: Jamie Graves, Founder and Former CEO, ZoneFox". DIGIT. Retrieved 27 July 2023.
  226. "Forensic verification of operating system activity via novel data acquisition and analysis". Napier. Retrieved 27 July 2023.
  227. Graves, Jamie (31 December 2009). "Forensic verification of operating system activity via novel data, acquisition and analysis techniques". {{cite journal}}: Cite journal requires |journal= (help)
  228. "ZONEFOX HOLDINGS LIMITED filing history - Find and update company information - GOV.UK". find-and-update.company-information.service.gov.uk. Retrieved 27 July 2023.
  229. GB0816556D0, "Improvements in or relating to digital forensics", issued 2008-10-15
  230. US8887274B2, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Digital forensics", issued 2014-11-11
  231. WO2010029346A1, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Improvements in or relating to digital forensics", issued 2010-03-18
  232. EP2347366B1, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Improvements in or relating to digital forensics", issued 2019-05-08
  233. "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 27 July 2023.
  234. "DigitalDNA". Napier. Retrieved 27 July 2023.
  235. "US takeover for Scottish cyber security firm ZoneFox". BBC News. 23 October 2018. Retrieved 27 July 2023.
  236. ronaitken (4 February 2021). "Royal Society fund two Entrepreneur in Residence appointments". The School of Applied Sciences. Retrieved 27 July 2023.
  237. "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 27 July 2023.
  238. Raywood, Dan (2 November 2020). "Ping Identity Acquires Symphonic to Boost API and Data Security Offering". Infosecurity Magazine. Retrieved 27 July 2023.
  239. "Information Sharing between the Police and their Community Partners". Napier. Retrieved 27 July 2023.
  240. US9043867B2, Uthmani, Omair; Buchanan, William & Lawson, Alistair et al., "Information sharing", issued 2015-05-26
  241. WO2014108678A1, UTHMANI, Omair; Buchanan, William & Lawson, Alistair et al., "Improved information sharing", issued 2014-07-17
  242. Fan, L.; Buchanan, W.; Thummler, C.; Lo, O.; Khedim, A.; Uthmani, O.; Lawson, A.; Bell, D. (July 2011). "DACAR Platform for eHealth Services Cloud". 2011 IEEE 4th International Conference on Cloud Computing (PDF). pp. 219–226. doi:10.1109/CLOUD.2011.31. ISBN 978-1-4577-0836-7. S2CID 14062712.
  243. "Data Capture and Auto Identification Reference". Napier. Retrieved 27 July 2023.
  244. "scalable and open framework for humandigital trust between informalformal personal". Napier. Retrieved 27 July 2023.
  245. Fan, Lu; Buchanan, William J.; Lo, Owen; Thuemmler, Christoph; Lawson, Alistair; Uthmani, Omair; Ekonomou, Elias; Khedim, Abou Sofyane (31 December 2012). "SPoC: Protecting Patient Privacy for e-Health Services in the Cloud". {{cite journal}}: Cite journal requires |journal= (help)
  246. "saFire". Napier. Retrieved 2 August 2023.
  247. "Derick James, Symphonic Software". www.sourcesecurity.com. Retrieved 27 July 2023.
  248. "Niall Burns | F6S Member Profile". F6S. Retrieved 27 July 2023.
  249. "Ping Identity Aquires Symphonic Software to Accelerate Dynamic Authorization for Enterprises Pursuing Zero Trust Identity Security". www.parequity.com. 3 November 2020. Retrieved 27 July 2023.
  250. updates (4 November 2020). "Ping Identity to Acquires Symphonic Software". ScotlandIS. Retrieved 27 July 2023.
  251. MarketScreener (2 November 2020). "Ping Identity Holding Corp. acquired Symphonic Software for $32 million". www.marketscreener.com. Retrieved 27 July 2023.
  252. "Rich Macfarlane". Napier. Retrieved 4 August 2023.
  253. "forensic analysis of large capacity digital storage devices". Napier. Retrieved 27 July 2023.
  254. GB2561177B, Ian, Stevenson; Bruce, Ramsay & William, Johnston Buchanan et al., "Method for identification of digital content", issued 2021-06-30
  255. EP3607467A1, Buchanan, William Johnston; LO, Owen Chin Wai & PENROSE, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2020-02-12
  256. CA3059013A1, Buchanan, William Johnston; LO, Owen Chin Wai & PENROSE, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2018-10-11
  257. US20210294878A1, Buchanan, William Johnston; LO, Owen Chin Wai & PENROSE, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2021-09-23
  258. "Fragment Finder". Napier. Retrieved 27 July 2023.
  259. "CYACOMB LIMITED filing history - Find and update company information - GOV.UK". find-and-update.company-information.service.gov.uk. Retrieved 27 July 2023.
  260. "Team Biographies". Cyacomb. Retrieved 27 July 2023.
  261. updates (2 March 2022). "Cyan Forensics changes its name to Cyacomb". ScotlandIS. Retrieved 27 July 2023.
  262. "Cyacomb Awarded as Technology Pioneer by World Economic Forum". Cyacomb. Retrieved 27 July 2023.
  263. MacRae, Duncan (19 November 2019). "Edinburgh Tech Startup Cyan Forensics Scoops Award at GovTech Summit". DIGIT. Retrieved 27 July 2023.
  264. "Double success at the Scottish Cyber Awards". Napier. Retrieved 27 July 2023.
  265. "Cyacomb (formerly Cyan Forensics)". www.parequity.com. 30 March 2021. Retrieved 27 July 2023.
  266. "Cyacomb Open Letter to the Secretary of State for Digital, Culture Media and Sport". Cyacomb. Retrieved 27 July 2023.
  267. "Tackling harmful online content with Cyacomb investment | Scottish National Investment Bank". www.thebank.scot. 11 October 2023. Retrieved 16 October 2023.
  268. updates (26 May 2021). "Edinburgh Napier spin-out appoints Pete Jaco as CEO to tackle growing ransomware threat". ScotlandIS. Retrieved 25 November 2021.
  269. McLaren, Peter; Buchanan, William J.; Russell, Gordon; Tan, Zhiyuan (1 October 2019). "Deriving ChaCha20 key streams from targeted memory analysis". Journal of Information Security and Applications. 48: 102372. doi:10.1016/j.jisa.2019.102372. ISSN 2214-2126. S2CID 198968271.
  270. McLaren, Peter; Russell, Gordon; Buchanan, William J.; Tan, Zhiyuan (1 June 2019). "Decrypting live SSH traffic in virtual environments". Digital Investigation. 29: 109–117. doi:10.1016/j.diin.2019.03.010. ISSN 1742-2876. S2CID 133574611.
  271. "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 27 July 2023.
  272. "Home". Memcrypt. Retrieved 25 November 2021.
  273. "memcrypt cyberasap phase 2". Napier. Retrieved 27 July 2023.
  274. "Edinburgh Napier University Spinout Memcrypt to Fight Ransomware". DIGIT. 6 October 2020. Retrieved 27 July 2023.
  275. "MEMCRYPT LIMITED filing history - Find and update company information - GOV.UK". find-and-update.company-information.service.gov.uk. Retrieved 27 July 2023.
  276. "University spinout honoured at Scottish Cyber Awards 2021". Napier. Retrieved 25 November 2021.
  277. "News Details". staff.napier.ac.uk. Retrieved 9 July 2023.
  278. "Minister learns how pupils benefit from business-academic partnership | Interface Knowledge Connection". interface-online.org.uk. 2 May 2017. Retrieved 8 November 2021.
  279. "vSOC Virtualised Security Operations Centre". Napier. Retrieved 24 June 2023.
  280. "CipherCTF". asecuritysite.com. Retrieved 22 July 2023.
  281. "Cisco Simulators". asecuritysite.com. Retrieved 22 July 2023.
  282. Buchanan, Bill. "ASecuritySite: When Bob Met Alice". ASecuritySite: When Bob Met Alice. Retrieved 24 June 2023.
  283. "Bill Buchanan OBE - YouTube". www.youtube.com. Retrieved 24 June 2023.
  284. "ASecuritySite Podcast on Apple Podcasts". Apple Podcasts. 22 July 2023. Retrieved 22 July 2023.
  285. "ASecuritySite Podcast". Spotify. Retrieved 22 July 2023.
  286. Buchanan, Bill. ASecuritySite Podcast. Audible.
  287. OBE, Prof Bill Buchanan (31 March 2019). "My Tip To Early Career Researchers: Teach Well, Take Risks, and Love What You Do". ASecuritySite: When Bob Met Alice. Retrieved 2 September 2023.
  288. "Home". www.napierstudents.com. Retrieved 2 September 2023.
  289. "Instagram". www.instagram.com. Retrieved 2 September 2023.
  290. "Instagram". www.instagram.com. Retrieved 2 September 2023.
  291. "Excellence Awards - The Winners". www.napierstudents.com. Retrieved 2 August 2023.
  292. "Excellence Awards - The Winners". www.napierstudents.com. Retrieved 2 August 2023.
  293. "Excellence Awards 2023 Nominees". www.napierstudents.com. Retrieved 2 August 2023.
  294. Scottish Cyber Awards 2017 with Prof Bill Buchanan of Napier University, retrieved 28 October 2022
  295. "Dr Jamie Graves - Founder and CEO ZoneFox". Infosecurity Magazine. 7 August 2018. Retrieved 2 September 2023.
  296. "Advanced Security & Digital Forensics". Napier. Retrieved 2 September 2023.
  297. "National Cyber Security Centre certifies course". Napier. Retrieved 2 September 2023.
  298. "MSc Advanced Security and Digital Forensics course reaches 10 year milestone". Napier. Retrieved 2 September 2023.
  299. "ENU recognised for gold standard cybersecurity work". Napier. Retrieved 2 September 2023.
  300. "Bright Red Publishing Blog". Bright Red Publishing Blog. 17 October 2018. Retrieved 30 July 2023.
  301. "Integration of Stimulating and Engaging Education Assessments". Napier. Retrieved 30 July 2023.
  302. Online, Interface. "Interface Online | Interface Knowledge Connection | Academia". Interface Online. Retrieved 30 July 2023.
  303. "BrightRED DIGITAL ZONE". www.brightredbooks.net. Retrieved 30 July 2023.
  304. "innovation and integrated learning environment for engaging and ever changing educational". Napier. Retrieved 30 July 2023.
  305. "Bright Red Publishing Home Page". www.brightredbooks.net. Retrieved 30 July 2023.
  306. "Bright Red Publishing Home Page". www.brightredbooks.net. Retrieved 30 July 2023.
  307. "Home". The Data Lab. Retrieved 8 August 2023.
  308. "Cyber & Data". asecuritysite.com. Retrieved 8 August 2023.
  309. "Wireshark · Go Deep". Wireshark. Retrieved 8 August 2023. {{cite web}}: Check |url= value (help)
  310. "Snort - Network Intrusion Detection & Prevention System". www.snort.org. Retrieved 8 August 2023.
  311. "Splunk | The Key to Enterprise Resilience". Splunk. Retrieved 8 August 2023.
  312. "Buttercup Games – Level 1: The Premise". Splunk-Blogs. Retrieved 8 August 2023.
  313. "Exploring Splunk: Search Processing Language (SPL) Primer and Cookbook". Splunk. Retrieved 8 August 2023.
  314. "Cyber&Data: Splunk". asecuritysite.com. Retrieved 8 August 2023.
  315. "I keep getting asked by companies to sponsor the site and for advertisers to put adverts on it, but you won't find a single advert on the site ... and still free to access and use. As much as possible, education should be free to access. Go learn 'crypto'..." Twitter. Retrieved 8 August 2023.
  316. "Coding Challenges". Archived from the original on 15 February 2013. Retrieved 8 August 2023.{{cite web}}: CS1 maint: bot: original URL status unknown (link)
  317. "Cipher CTF Challenge Generator". asecuritysite.com. Retrieved 8 August 2023.
  318. "Ciphers". asecuritysite.com. Retrieved 8 August 2023.
  319. "ASecuritySite Podcast on Apple Podcasts". Apple Podcasts. 18 August 2023. Retrieved 20 August 2023.
  320. Applied Cryptography and Trust: 1. Cipher Fundamentals, retrieved 20 August 2023
  321. Applied Cryptography and Trust: 2. Symmetric Key, retrieved 20 August 2023
  322. Applied Cryptography and Trust: 3. Hashing, retrieved 20 August 2023
  323. "Cisco Simulators". asecuritysite.com. Retrieved 20 August 2023.
  324. "BBC Panorama".
  325. "The Digital List". FutureScot. 24 February 2016. Retrieved 28 March 2022.
  326. "John Howie Discusses CSA Initiatives, Cloud Adoption Issues". cloudsecurityalliance.org. Retrieved 15 August 2023.
  327. Honorary Degree for John Howie, retrieved 15 August 2023
  328. Forsyth, Ian (27 January 2009). "PI joining project-management giant in multimillion-pound deal". Energy Voice. Retrieved 15 August 2023.
  329. Honorary Degree for Steve Cordiner, retrieved 15 August 2023
  330. Dorsey, Kristy (29 January 2018). "Founder of former data security firm Payfont launches new venture". businessInsider. Retrieved 15 August 2023.
  331. "Laureation for David Lanc". www.linkedin.com. Retrieved 15 August 2023.
  332. aoifeosullivan (18 January 2023). "Innovation, and Building Bridges Towards the Enterprise Campus". Research Innovation Enterprise. Retrieved 4 September 2023.
  333. Symposium for Technology Innovation and Collaboration: Bruce Ramsay, retrieved 4 September 2023
  334. Symposium for Technology Innovation and Collaboration: Pavlos Papadopoulos, retrieved 4 September 2023
  335. Symposium of Technology Innovation and Collaboration: Mark Logan, retrieved 4 September 2023
  336. "@asmales". Twitter. Retrieved 18 July 2023.
  337. MBN Solutions: ScotChain17 - Towards Truly Smart Cities and Communities, retrieved 9 July 2023
  338. IISP Congress 2018: Professor Bill Buchanan OBE - Futurist academic research into AI, retrieved 6 August 2023
  339. "@TheresaSwayne". Twitter. Retrieved 18 July 2023.
  340. 2018 Crypto Valley Conference: Day 2 - William Buchanan - Napier University, retrieved 9 July 2023
  341. "Agenda: Cyber Security Scotland 2019". canongate.swoogo.com. Retrieved 18 July 2023.
  342. Interrupt19: Bill Buchanan OBE PhD FBCS, retrieved 5 August 2023
  343. "@simonianrobb". Twitter. Retrieved 18 July 2023.
  344. "FutureScot's Cyber Security Conference, 28 November. Can Scotland become a world leader in public sector cyber resilience? Part 1 of a great list of speakers at this year's conference Sign up today..." Twitter. Retrieved 26 August 2023.
  345. "Digital Scotland 2020 - Virtual Event - 01 Dec 20". canongate.swoogo.com. Retrieved 18 July 2023.
  346. Kelly, Ross (10 March 2021). "Scot-Secure 2021 Virtual Summit | Just Two Weeks to Go!". DIGIT. Retrieved 6 August 2023.
  347. "DigitalScotland 2021". FutureScot. Retrieved 6 August 2023.
  348. "@Futurescot_News". Twitter. Retrieved 18 July 2023.
  349. "Cyber Security 2023". FutureScot. Retrieved 18 July 2023.
  350. "BBC World Service - The Inquiry, Will we ever run out of cloud storage?". BBC. Retrieved 9 July 2023.
  351. Interview with Marty Hellman: Guest Talk for Applied Cryptography Class, retrieved 3 September 2023
  352. World-leaders in Cryptography: Martin Hellman, retrieved 3 August 2023
  353. World-leaders in Cryptography: Len Adleman, retrieved 3 August 2023
  354. Len Adleman Talks With Edinburgh Napier University Applied Crypto Students, retrieved 3 September 2023
  355. "Mathematical Games, August 1977". Scientific American. doi:10.1038/scientificamerican0877-120. Retrieved 3 August 2023.
  356. World-leaders in Cryptography: Len Adleman, retrieved 3 September 2023
  357. "Neal I. Koblitz | Department of Mathematics | University of Washington". math.washington.edu. Retrieved 3 August 2023.
  358. An Interview With Neal Koblitz (part of World-leaders in Cryptography series), retrieved 3 August 2023
  359. testsiteadmin (27 September 2019). "Taher Elgamal, 2019". The Marconi Society. Retrieved 3 August 2023.
  360. World-leaders in Cryptography: Taher ElGamal, retrieved 3 August 2023
  361. "Schneier on Security: : Secrets & Lies". www.schneier.com. Retrieved 3 September 2023.
  362. "Prof Bill Buchanan OBE on LinkedIn: World Leaders in Cryptography: Bruce Schneier | 11 comments". www.linkedin.com. Retrieved 3 September 2023.
  363. Bruce Schneier: Privacy. Trust and the Future (Edinburgh Napier University), retrieved 3 September 2023
  364. An Interview with Bruce Schneier, retrieved 3 September 2023
  365. Bruce Schneier Talks With Edinburgh Napier University Applied Crypto Students, retrieved 3 September 2023
  366. An Interview with Bruce Schneier (part of World-leaders in Cryptography series), retrieved 3 September 2023
  367. World Leaders in Cryptography: Torben P Pedersen, retrieved 3 August 2023
  368. Concordium (10 June 2020). "From the Pedersen Commitment to Concordium". Concordium. Retrieved 3 August 2023.
  369. "Jean-Philippe Aumasson". www.aumasson.jp. Retrieved 3 August 2023.
  370. World-leaders in Cryptography: Jean-Philippe (JP) Aumasson, retrieved 3 August 2023
  371. "Keith's Electronic Domicile". www.isg.rhul.ac.uk. Retrieved 3 August 2023.
  372. World Leaders in Cryptography: Professor Keith Martin, retrieved 3 August 2023
  373. "Cloudflare Research". research.cloudflare.com. Retrieved 3 August 2023.
  374. World-leaders in Cryptography: Nick Sullivan, retrieved 3 August 2023
  375. McCulloch, Scott (5 May 2015). "Napier University to launch new International Cyber Academy". businessInsider. Retrieved 4 September 2023.
  376. "DFET". The Cyber Academy. 19 May 2015. Retrieved 4 September 2023.
  377. "Basil Manoussos". Napier. Retrieved 4 September 2023.
  378. "Meet Basil". www.linkedin.com. Retrieved 4 September 2023.
  379. "Innovation in Cyber Conference: Building The Next Great Cybersecurity Company". Eventbrite. Retrieved 4 September 2023.
  380. "Dr Jamie Graves - Founder and CEO ZoneFox". Infosecurity Magazine. 7 August 2018. Retrieved 4 September 2023.
  381. Glicken, Morley D. (2009), "Evidence-Based Practice with Spoiled Children and Cyber-Bullies", Evidence-Based Practice with Emotionally Troubled Children and Adolescents, Elsevier, pp. 283–298, doi:10.1016/b978-0-12-374523-1.00017-3, ISBN 9780123745231, retrieved 4 September 2023
  382. "About Us". 7 Elements. Retrieved 4 September 2023.
  383. Brown, Susan (12 May 2021). "TeaBot Android banking Trojan targets banks in Europe". Zortrex. Retrieved 4 September 2023.
  384. "5th International Conference - Big Data in Cyber Security". Eventbrite. Retrieved 4 September 2023.
  385. "People look-up - The University of Nottingham". www.nottingham.ac.uk. Retrieved 4 September 2023.
  386. "Sokratis Katsikas - NTNU". www.ntnu.edu. Retrieved 4 September 2023.
  387. "5th International Conference Big Data in Cyber Security". The Cyber Academy. 12 May 2019. Retrieved 4 September 2023.
  388. Adams, Dominique (24 October 2019). "Interview: Eamonn Keane, Head of Cyber & Innovation at SBRC". DIGIT. Retrieved 4 September 2023.
  389. "6th Intl. Conference on Big Data, Cybersecurity & Critical Infrastructure". Eventbrite. Retrieved 4 September 2023.
  390. "💥 6th International Conference on Big Data, Cybersecurity & Critical Infrastructure officially opened by @BasilatNapier, with a warm welcome to Edinburgh from @LordProvostEdin! #BigData23". X (formerly Twitter). Retrieved 4 September 2023.
  391. "Berk Canberk". Napier. Retrieved 4 September 2023.
  392. Pritchard, Stephen (21 June 2023). "#InfosecurityEurope Hall of Fame: Becky Pinkard, Managing Director of Global Cyber Operations, Barclays". Infosecurity Magazine. Retrieved 4 September 2023.
  393. The Future of Money, Andreas M.Antonopoulos, retrieved 4 September 2023
  394. Introduction at Conference on Blockchain, Identity and Cryptography, Bill Buchanan, retrieved 4 September 2023
  395. Introduction to IOTA — a feeless cryptocurrency, Serguei Popov, University of Campinas., retrieved 4 September 2023
  396. "Privilege to join @billatnapier & @Brit_blockchain for today's international collaborative conference #ISC2020 #innovation #challenges". X (formerly Twitter). Retrieved 4 September 2023.
  397. "CIISec | The home of cyber". www.ciisec.org. Retrieved 4 September 2023.
  398. "The Institute of Information Security Professionals (IISP), partnered with | Cyber Security Congress". World Cyber Security Congress 2018. 27 March 2018. Retrieved 4 September 2023.
  399. "Superb talk taking place by @billatnapier at @EdinburghNapier we think it's the first time @RSprachrohr have turned up at an #IISP event #iispcybercareer". X (formerly Twitter). Retrieved 4 September 2023.
  400. "Amanda Finch". cybermagazine.com. 28 September 2021. Retrieved 4 September 2023.
  401. "Full house at the Careers Event today with @CIISecHQ and some great announcements towards the end of the day @FinchAmanda @billatnapier @ComputingNapier @rjmacfarlane @sallyatnapier @EdinburghNapier". X (formerly Twitter). Retrieved 4 September 2023.
  402. McKee, Graeme (1 September 2022). "CIISec LIVE 2022". Systal Technology Solutions - Global Managed Network & Security. Retrieved 4 September 2023.
  403. "CIISec LIVE 2022". ScotlandIS. Retrieved 4 September 2023.
  404. "David Ferbrache OBE – Global Head of Cyber Futures – KPMG – AFCEA London – TriCyCIS 2022". Retrieved 4 September 2023.
  405. "An absolute honour and a pleasure to have the wonderful @billatnapier presenting at #CIISecLive2022 - thank you Bill for a sensational session to close off the day!". X (formerly Twitter). Retrieved 4 September 2023.
  406. "Cybersecurity, AI & Trails of Evidence: The Fun, The Scary, and The Future". Eventbrite. Retrieved 4 September 2023.
  407. "Edinburgh Napier University Institute of Informatics and Digital Innovation (IIDI) Tech Events: Christmas Cyber Lecture for Schools - Open Tech Calendar". opentechcalendar.co.uk. Retrieved 26 August 2023.
  408. "Interview with Dia Banerji, UK Ambassador at WiD". Women in Identity. Retrieved 26 August 2023.
  409. "Gary Ennis, Managing Director, NSDesign Ltd". Holyrood Website. 3 October 2019. Retrieved 26 August 2023.
  410. "IET Christmas Lectures – The Internet of Everything!". The Cyber Academy. 2 July 2015. Retrieved 26 August 2023.
  411. "@billatnapier @asmales @AabyDK @charleycelice all at the IET Xmas Lecture! Theatre packed and kids already have fun". Twitter. Retrieved 26 August 2023.
  412. IET Xmas Lectures Snippet - Introduction to Cayla 2, retrieved 26 August 2023
  413. "Profile: Sharon Moore | BCS". www.bcs.org. Retrieved 26 August 2023.
  414. The Future of AI, Cyber Security and Data, retrieved 26 August 2023
  415. OBE, Prof Bill Buchanan (26 August 2023). "Slaves to the Machine? Kraftwerk, Metropolis and Fritz Lang". ASecuritySite: When Bob Met Alice. Retrieved 2 September 2023.
  416. "Cybersecurity, AI & Trails of Evidence: The Fun, The Scary, and The Future". Eventbrite. Retrieved 26 August 2023.
  417. "Cyber Security | Scot-Secure West Summit". scotsecure2021. Retrieved 26 September 2023.
  418. "A quote by Victoria Holt". www.goodreads.com. Retrieved 26 September 2023.
  419. "NIST Announces First Four Quantum-Resistant Cryptographic Algorithms". NIST. 5 July 2022.
  420. OBE, Prof Bill Buchanan (30 September 2023). "Don't Settle ." ASecuritySite: When Bob Met Alice. Retrieved 3 October 2023.
  421. "Prof Bill Buchanan OBE on LinkedIn: A few people have said to me, "You could sell those Bob and Alice mugs…". www.linkedin.com. Retrieved 3 October 2023.
  422. KTP Award 2003 (Seven Layer), retrieved 25 August 2023
  423. Canan KTP Award 2004, retrieved 25 August 2023
  424. "The 50 most influential UK higher education professionals on social media". Times Higher Education (THE). 7 October 2015. Retrieved 9 July 2023.
  425. "University dominates Scottish Cyber Awards". Napier. Retrieved 28 October 2022.
  426. "SICSA DEMOfest 2016 – Delegate Registration now open!". SICSA - The Scottish Informatics & Computer Science Alliance. 20 September 2016. Retrieved 9 July 2023.
  427. O'Sullivan, Kevin (24 February 2016). "The Digital List". FutureScot. Retrieved 9 July 2023.
  428. "Judy Murray among Scots on honours list". BBC News. 16 June 2017. Retrieved 9 July 2023.
  429. Taylor and Francis Online (9 July 2023). "Journal for Cybersecurity Technology". Journal for Cybersecurity Technology. Retrieved 9 July 2023.
  430. "Scottish Knowledge Exchange Awards 2018 Winners announced - Innovate UK KTN". 26 February 2018. Retrieved 9 July 2023.
  431. ieeesmc (10 July 2018). "New TC Chair and Co-Chairs on Blockchain". IEEE SMC. Retrieved 9 July 2023.
  432. "Welcome Bill Buchanan to the IOTA Research Council". IOTA Foundation Blog. 16 November 2018. Retrieved 18 July 2023.
  433. ICISSP (9 July 2023). "Keynote Lectures". ICISSP 2019 Keynote Lectures. Retrieved 9 July 2023.
  434. Buchanan, William (1 November 2023). "Honorary Professorship from Spoleczna Akademia Auk". www.instagram.com. Retrieved 28 July 2023.
  435. "Excellence Awards - The Winners - Edinburgh Napier Students' Association". www.napierstudents.com. Retrieved 18 August 2021.
  436. "Editorial Team | Blockchain in Healthcare Today". blockchainhealthcaretoday.com. Retrieved 9 July 2023.
  437. "Excellence Awards - The Winners - Edinburgh Napier Students' Association". www.napierstudents.com. Retrieved 18 August 2021.
  438. "SINCONF 2021". www.sinconf.org. Retrieved 9 July 2023.
  439. "SINFCON 2023 Closing Session" (PDF). SINCONF 2021. 17 December 2021. Retrieved 19 July 2023.
  440. Abramson, Will; Buchanan, William J.; Sayeed, Sarwar; Pitropakis, Nikolaos; Lo, Owen (December 2021). "PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. doi:10.1109/SIN54109.2021.9699138. ISBN 978-1-7281-9266-6. S2CID 244908584.
  441. aoifeosullivan (28 November 2022). "Triple success for Edinburgh Napier University at Scottish Cyber Awards". Research Innovation Enterprise. Retrieved 8 January 2023.
  442. "Im Event - Event & Conference one page WordPress Theme". IEEE Turkey Blockchain Initiative. Retrieved 9 July 2023.
  443. "Keynotes & Industry". Cyber Science 2023. Retrieved 9 July 2023.
  444. "Professor Bill Buchanan OBE, appointed to new Zero Trust Special Interest Group Advisory Board". Zero Trust SIG. Archived from the original on 18 July 2023. Retrieved 18 July 2023.
  445. @napierstudents. "Congratulations to Prof Bill Buchanan, who is the winner of Best Lecturer/Tutor (Computing)". Twitter. Retrieved 29 May 2023.
  446. "About - IEEE Blockchain Technical Community". blockchain.ieee.org. Retrieved 9 July 2023.
  447. "Cyber Security | Scot-Secure West 2023". scotsecure2021. Retrieved 17 September 2023.
  448. "Day Two". borderlesscyber2023.oasis-open.org. Retrieved 17 September 2023.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.