Bill Buchanan
Bill Buchanan
Professor of Computer Science, Edinburgh Napier University
Verified email at - Homepage
TitleCited byYear
Intelligent optimisation techniques: genetic algorithms, tabu search, simulated annealing and neural networks
D Pham, D Karaboga
Springer Science & Business Media, 2012
WJ Buchanan
Mastering Networks, 71-87, 1999
DACAR platform for eHealth services cloud
L Fan, W Buchanan, C Thummler, O Lo, A Khedim, O Uthmani, A Lawson, ...
2011 IEEE 4th International Conference on Cloud Computing, 219-226, 2011
Design issues for peer-to-peer massively multiplayer online games
L Fan, P Trinder, H Taylor
International Journal of Advanced Media and Communication 4 (2), 108-125, 2010
Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks
N Migas, WJ Buchanan, KA McARTNEY
10th IEEE International Conference and Workshop on the Engineering of …, 2003
Understanding political variables
W Buchanan
Longman, 1988
Hierarchical network management: a scalable and dynamic mobile agent-based approach. volume 38
N Migas, WJ Buchanan, KA Mc Aartney
April 8, 693-711, 2002
Monitoring information security risks within health care
N Van Deursen, WJ Buchanan, A Duff
computers & security 37, 31-45, 2013
An intelligent agent security intrusion system
J Pikoulas, W Buchanan, M Mannion, K Triantafyllopoulos
Proceedings Ninth Annual IEEE International Conference and Workshop on the …, 2002
An integrated cloud-based healthcare infrastructure
E Ekonomou, L Fan, W Buchanan, C Thuemmler
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
Enhancing network management using mobile agents
WJ Buchanan, M Naylor, AV Scott
Proceedings Seventh IEEE International Conference and Workshop on the …, 2000
The migration process of mobile agents: implementation, classification, and optimization
P Braun
Thüringer Universitäts-und Landesbibliothek Jena, 2003
The Handbook of Data Communications and Networks: Volume 1
B Buchanan
Springer Science & Business Media, 2010
Protecting mobile agents from external replay attacks.
N Migas, WJ Buchanan
Journal of Systems and Software Journal of Systems and Software 82 (2), 197-206, 2009
Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology
C Thuemmler, W Buchanan, V Kumar
International journal of healthcare technology and management 8 (5), 571-583, 2007
Applied machine learning predictive analytics to SQL injection attack detection and prevention
SO Uwagbole, WJ Buchanan, L Fan
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
Evaluation of TFTP DDoS amplification attack
B Sieklik, R Macfarlane, WJ Buchanan
computers & security 57, 67-92, 2016
Computer busses
B Buchanan
CRC Press, 2000
Radio frequency identification (RFID) in pervasive healthcare
C Thuemmler, W Buchanan, AH Fekri, A Lawson
International Journal of Healthcare Technology and Management 10 (1-2), 119-131, 2009
PC 接口通信与 Windows 编程
W Buchanan
北京: 中国电力出版社, 2001
The system can't perform the operation now. Try again later.
Articles 1–20