Bill Buchanan
Bill Buchanan
Professor of Cryptography, Edinburgh Napier University
Verified email at - Homepage
Cited by
Cited by
Intelligent optimisation techniques: genetic algorithms, tabu search, simulated annealing and neural networks
D Pham, D Karaboga
Springer Science & Business Media, 2012
DACAR platform for eHealth services cloud
L Fan, W Buchanan, C Thummler, O Lo, A Khedim, O Uthmani, A Lawson, ...
2011 IEEE 4th International Conference on Cloud Computing, 219-226, 2011
Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks
N Migas, WJ Buchanan, KA McARTNEY
10th IEEE International Conference and Workshop on the Engineering of …, 2003
Design issues for peer-to-peer massively multiplayer online games
L Fan, P Trinder, H Taylor
International Journal of Advanced Media and Communication 4 (2), 108-125, 2010
Monitoring information security risks within health care
N Van Deursen, WJ Buchanan, A Duff
computers & security 37, 31-45, 2013
Hierarchical network management: a scalable and dynamic mobile agent-based approach. volume 38
N Migas, WJ Buchanan, KA Mc Aartney
April 8, 693-711, 2002
Lightweight cryptography methods
WJ Buchanan, S Li, R Asif
Journal of Cyber Security Technology 1 (3-4), 187-201, 2017
Understanding political variables
W Buchanan
Pearson College Division, 1988
An integrated cloud-based healthcare infrastructure
E Ekonomou, L Fan, W Buchanan, C Thuemmler
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
An intelligent agent security intrusion system
J Pikoulas, W Buchanan, M Mannion, K Triantafyllopoulos
Proceedings Ninth Annual IEEE International Conference and Workshop on the …, 2002
IoT forensics: Amazon echo as a use case
S Li, KKR Choo, Q Sun, WJ Buchanan, J Cao
IEEE Internet of Things Journal 6 (4), 6487-6497, 2019
Enhancing network management using mobile agents
WJ Buchanan, M Naylor, AV Scott
Proceedings Seventh IEEE International Conference and Workshop on the …, 2000
Applied machine learning predictive analytics to SQL injection attack detection and prevention
SO Uwagbole, WJ Buchanan, L Fan
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)
O Lo, WJ Buchanan, D Carson
Journal of Cyber Security Technology 1 (2), 88-107, 2017
Evaluation of TFTP DDoS amplification attack
B Sieklik, R Macfarlane, WJ Buchanan
computers & security 57, 67-92, 2016
The Handbook of Data Communications and Networks: Volume 1. Volume 2
B Buchanan
Springer Science & Business Media, 2010
Computer busses
W Buchanan
Elsevier, 2000
Truly distributed control systems using fieldbus technology
AV Scott, WJ Buchanan
Proceedings Seventh IEEE International Conference and Workshop on the …, 2000
Applications of blockchain within healthcare
L Bell, WJ Buchanan, J Cameron, O Lo
Blockchain in healthcare today 1 (8), 2018
The migration process of mobile agents: implementation, classification, and optimization
P Braun
Thüringer Universitäts-und Landesbibliothek Jena, 2003
The system can't perform the operation now. Try again later.
Articles 1–20