Bill Buchanan
Bill Buchanan
Professor of Cryptography, Edinburgh Napier University
Verified email at - Homepage
Cited by
Cited by
Intelligent optimisation techniques: genetic algorithms, tabu search, simulated annealing and neural networks
D Pham, D Karaboga
Springer Science & Business Media, 2012
B Buchanan
Handbook of Data Communications and Networks, 530-544, 1999
DACAR platform for eHealth services cloud
L Fan, W Buchanan, C Thummler, O Lo, A Khedim, O Uthmani, A Lawson, ...
2011 ieee 4th international conference on cloud computing, 219-226, 2011
Lightweight cryptography methods
WJ Buchanan, S Li, R Asif
Journal of Cyber Security Technology 1 (3-4), 187-201, 2017
Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks
N Migas, WJ Buchanan, KA McARTNEY
10th IEEE International Conference and Workshop on the Engineering of†…, 2003
Design issues for peer-to-peer massively multiplayer online games
L Fan, P Trinder, H Taylor
International Journal of Advanced Media and Communication 4 (2), 108-125, 2010
Understanding political variables
W Buchanan
Pearson College Division, 1988
Monitoring information security risks within health care
N Van Deursen, WJ Buchanan, A Duff
computers & security 37, 31-45, 2013
IoT forensics: Amazon echo as a use case
S Li, KKR Choo, Q Sun, WJ Buchanan, J Cao
IEEE Internet of Things Journal 6 (4), 6487-6497, 2019
Beeptrace: Blockchain-enabled privacy-preserving contact tracing for covid-19 pandemic and beyond
H Xu, L Zhang, O Onireti, Y Fang, WJ Buchanan, MA Imran
IEEE Internet of Things Journal 8 (5), 3915-3929, 2020
Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)
O Lo, WJ Buchanan, D Carson
Journal of Cyber Security Technology 1 (2), 88-107, 2017
Hierarchical network management: a scalable and dynamic mobile agent-based approach. volume 38
N Migas, WJ Buchanan, KA Mc Aartney
April 8, 693-711, 2002
Applied machine learning predictive analytics to SQL injection attack detection and prevention
SO Uwagbole, WJ Buchanan, L Fan
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM†…, 2017
An integrated cloud-based healthcare infrastructure
E Ekonomou, L Fan, W Buchanan, C Thuemmler
2011 IEEE Third International Conference on Cloud Computing Technology and†…, 2011
Microcomputer instruction for the learning disabled
G Schiffman, D Tobin, B Buchanan, G Paras
Journal of Learning Disabilities 15 (9), 557-559, 1982
An intelligent agent security intrusion system
J Pikoulas, W Buchanan, M Mannion, K Triantafyllopoulos
Proceedings Ninth Annual IEEE International Conference and Workshop on the†…, 2002
Applications of blockchain within healthcare
L Bell, WJ Buchanan, J Cameron, O Lo
Blockchain in healthcare today, 2018
Enhancing network management using mobile agents
WJ Buchanan, M Naylor, AV Scott
Proceedings Seventh IEEE International Conference and Workshop on the†…, 2000
Machine learning and semantic analysis of in-game chat for cyberbullying
S Murnion, WJ Buchanan, A Smales, G Russell
Computers & Security 76, 197-213, 2018
Evaluation of TFTP DDoS amplification attack
B Sieklik, R Macfarlane, WJ Buchanan
computers & security 57, 67-92, 2016
The system can't perform the operation now. Try again later.
Articles 1–20