Bill Buchanan
Bill Buchanan
Professor of Computer Science, Edinburgh Napier University
Verified email at napier.ac.uk - Homepage
Title
Cited by
Cited by
Year
Intelligent optimisation techniques: genetic algorithms, tabu search, simulated annealing and neural networks
D Pham, D Karaboga
Springer Science & Business Media, 2012
1765*2012
FDDI
WJ Buchanan
Mastering Networks, 71-87, 1999
1471999
DACAR platform for eHealth services cloud
L Fan, W Buchanan, C Thummler, O Lo, A Khedim, O Uthmani, A Lawson, ...
2011 IEEE 4th International Conference on Cloud Computing, 219-226, 2011
902011
Design issues for peer-to-peer massively multiplayer online games
L Fan, P Trinder, H Taylor
International Journal of Advanced Media and Communication 4 (2), 108-125, 2010
762010
Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks
N Migas, WJ Buchanan, KA McARTNEY
10th IEEE International Conference and Workshop on the Engineering of …, 2003
762003
Hierarchical network management: a scalable and dynamic mobile agent-based approach. volume 38
N Migas, WJ Buchanan, KA Mc Aartney
April 8, 693-711, 2002
56*2002
Understanding political variables
W Buchanan
Longman, 1988
561988
Monitoring information security risks within health care
N Van Deursen, WJ Buchanan, A Duff
computers & security 37, 31-45, 2013
552013
An integrated cloud-based healthcare infrastructure
E Ekonomou, L Fan, W Buchanan, C Thuemmler
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
532011
An intelligent agent security intrusion system
J Pikoulas, W Buchanan, M Mannion, K Triantafyllopoulos
Proceedings Ninth Annual IEEE International Conference and Workshop on the …, 2002
472002
Enhancing network management using mobile agents
WJ Buchanan, M Naylor, AV Scott
Proceedings Seventh IEEE International Conference and Workshop on the …, 2000
412000
Lightweight cryptography methods
WJ Buchanan, S Li, R Asif
Journal of Cyber Security Technology 1 (3-4), 187-201, 2017
342017
Evaluation of TFTP DDoS amplification attack
B Sieklik, R Macfarlane, WJ Buchanan
computers & security 57, 67-92, 2016
342016
IoT forensics: Amazon echo as a use case
S Li, KKR Choo, Q Sun, WJ Buchanan, J Cao
IEEE Internet of Things Journal 6 (4), 6487-6497, 2019
332019
Applied machine learning predictive analytics to SQL injection attack detection and prevention
SO Uwagbole, WJ Buchanan, L Fan
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
332017
Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)
O Lo, WJ Buchanan, D Carson
Journal of Cyber Security Technology 1 (2), 88-107, 2017
322017
The Handbook of Data Communications and Networks: Volume 1. Volume 2
B Buchanan
Springer Science & Business Media, 2010
322010
The migration process of mobile agents: implementation, classification, and optimization
P Braun
Thüringer Universitäts-und Landesbibliothek Jena, 2003
302003
Truly distributed control systems using fieldbus technology
AV Scott, WJ Buchanan
Proceedings Seventh IEEE International Conference and Workshop on the …, 2000
292000
Protecting mobile agents from external replay attacks.
N Migas, WJ Buchanan
Journal of Systems and Software Journal of Systems and Software 82 (2), 197-206, 2009
28*2009
The system can't perform the operation now. Try again later.
Articles 1–20