Search Results for author: William J. Buchanan

Found 7 papers, 3 papers with code

Forensic Science International: Digital Investigation

no code implementations15 Dec 2020 Simon R. Davies, Richard Macfarlane, William J. Buchanan

The resulting generated timelines provided a excellent way to visualise the behaviour of the ransomware and the encryption key management practices it employed, and from a forensic investigation and possible mitigation point of view, when the encryption keys are in memory.

Cryptography and Security E.3; K.6.5

A Distributed Trust Framework for Privacy-Preserving Machine Learning

1 code implementation3 Jun 2020 Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan

Privacy-preserving techniques distribute computation in order to ensure that data remains in the control of the owner while learning takes place.

BIG-bench Machine Learning Data Poisoning +3

Fast Probabilistic Consensus with Weighted Votes

no code implementations1 Jun 2020 Sebastian Müller, Andreas Penzkofer, Bartosz Kuśmierz, Darcy Camargo, William J. Buchanan

The fast probabilistic consensus (FPC) is a voting consensus protocol that is robust and efficient in Byzantine infrastructure.

Distributed, Parallel, and Cluster Computing

Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

1 code implementation13 May 2020 Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan

Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate.

Descriptive

Cannot find the paper you are looking for? You can Submit a new open access paper.