Bill Buchanan
Bill Buchanan
Professor of Computer Science, Edinburgh Napier University
Verified email at - Homepage
Cited by
Cited by
Intelligent optimisation techniques: genetic algorithms, tabu search, simulated annealing and neural networks
D Pham, D Karaboga
Springer Science & Business Media, 2012
WJ Buchanan
Mastering Networks, 71-87, 1999
DACAR platform for eHealth services cloud
L Fan, W Buchanan, C Thummler, O Lo, A Khedim, O Uthmani, A Lawson, ...
2011 IEEE 4th International Conference on Cloud Computing, 219-226, 2011
Design issues for peer-to-peer massively multiplayer online games
L Fan, P Trinder, H Taylor
International Journal of Advanced Media and Communication 4 (2), 108-125, 2010
Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks
N Migas, WJ Buchanan, KA McARTNEY
10th IEEE International Conference and Workshop on the Engineering of …, 2003
Hierarchical network management: a scalable and dynamic mobile agent-based approach. volume 38
N Migas, WJ Buchanan, KA Mc Aartney
April 8, 693-711, 2002
Understanding political variables
W Buchanan
Longman, 1988
Monitoring information security risks within health care
N Van Deursen, WJ Buchanan, A Duff
computers & security 37, 31-45, 2013
An integrated cloud-based healthcare infrastructure
E Ekonomou, L Fan, W Buchanan, C Thuemmler
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
An intelligent agent security intrusion system
J Pikoulas, W Buchanan, M Mannion, K Triantafyllopoulos
Proceedings Ninth Annual IEEE International Conference and Workshop on the …, 2002
Enhancing network management using mobile agents
WJ Buchanan, M Naylor, AV Scott
Proceedings Seventh IEEE International Conference and Workshop on the …, 2000
Lightweight cryptography methods
WJ Buchanan, S Li, R Asif
Journal of Cyber Security Technology 1 (3-4), 187-201, 2017
Evaluation of TFTP DDoS amplification attack
B Sieklik, R Macfarlane, WJ Buchanan
computers & security 57, 67-92, 2016
IoT forensics: Amazon echo as a use case
S Li, KKR Choo, Q Sun, WJ Buchanan, J Cao
IEEE Internet of Things Journal 6 (4), 6487-6497, 2019
Applied machine learning predictive analytics to SQL injection attack detection and prevention
SO Uwagbole, WJ Buchanan, L Fan
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)
O Lo, WJ Buchanan, D Carson
Journal of Cyber Security Technology 1 (2), 88-107, 2017
The Handbook of Data Communications and Networks: Volume 1. Volume 2
B Buchanan
Springer Science & Business Media, 2010
The migration process of mobile agents: implementation, classification, and optimization
P Braun
Thüringer Universitäts-und Landesbibliothek Jena, 2003
Truly distributed control systems using fieldbus technology
AV Scott, WJ Buchanan
Proceedings Seventh IEEE International Conference and Workshop on the …, 2000
Protecting mobile agents from external replay attacks.
N Migas, WJ Buchanan
Journal of Systems and Software Journal of Systems and Software 82 (2), 197-206, 2009
The system can't perform the operation now. Try again later.
Articles 1–20