Distance measurement methods for improved insider threat detection O Lo, WJ Buchanan, P Griffiths, R Macfarlane Security and Communication Networks 2018, 1-18, 2018 | 65 | 2018 |
Evaluation of TFTP DDoS amplification attack B Sieklik, R Macfarlane, WJ Buchanan computers & security 57, 67-92, 2016 | 50 | 2016 |
Approaches to the classification of high entropy file fragments P Penrose, R Macfarlane, WJ Buchanan Digital Investigation 10 (4), 372-384, 2013 | 44 | 2013 |
Evaluation of live forensic techniques in ransomware attack mitigation SR Davies, R Macfarlane, WJ Buchanan Forensic Science International: Digital Investigation 33, 300979, 2020 | 41 | 2020 |
Differential area analysis for ransomware attack detection within mixed file datasets SR Davies, R Macfarlane, WJ Buchanan Computers & Security 108, 102377, 2021 | 34 | 2021 |
Evaluating Digital Forensic Tools (DFTs). F Flandrin, WJ Buchanan, R Macfarlane, B Ramsay, A Smales | 27 | 2014 |
A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). WJ Buchanan, F Flandrin, R Macfarlane, J Graves | 27 | 2011 |
A methodology for the security evaluation within third-party Android Marketplaces WJ Buchanan, S Chiale, R Macfarlane Digital Investigation 23, 88-98, 2017 | 23 | 2017 |
Formal security policy implementations in network firewalls R Macfarlane, W Buchanan, E Ekonomou, O Uthmani, L Fan, O Lo Computers & Security 31 (2), 253-270, 2012 | 19 | 2012 |
NapierOne: A modern mixed file data set alternative to Govdocs1 SR Davies, R Macfarlane, WJ Buchanan Forensic Science International: Digital Investigation 40, 301330, 2022 | 18 | 2022 |
Identifying vulnerabilities using internet-wide scanning data J O'Hare, R Macfarlane, O Lo 2019 IEEE 12th International Conference on Global Security, Safety and …, 2019 | 18 | 2019 |
Fast contraband detection in large capacity disk drives P Penrose, WJ Buchanan, R Macfarlane Digital Investigation 12, S22-S29, 2015 | 17 | 2015 |
Security issues of a publicly accessible cloud computing infrastructure G Russell, R Macfarlane 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 10 | 2012 |
Comparison of entropy calculation methods for ransomware encrypted file identification SR Davies, R Macfarlane, WJ Buchanan Entropy 24 (10), 1503, 2022 | 9 | 2022 |
Student perception of on-line lectures within a blended learning environment for computing students B Buchanan, R MacFarlane, R Ludwiniak | 7 | 2011 |
Review of current ransomware detection techniques SR Davies, R Macfarlane, WJ Buchanan Proc. of the 7 th International Conference on Engineering and Emerging …, 2022 | 6 | 2022 |
Towards identifying human actions, intent, and severity of apt attacks applying deception techniques-an experiment J Chacon, S McKeown, R Macfarlane 2020 International Conference on Cyber Security and Protection of Digital …, 2020 | 6 | 2020 |
Evaluation of live forensic techniques, towards Salsa20-Based cryptographic ransomware mitigation LF de Loaysa Babiano, R Macfarlane, SR Davies Forensic Science International: Digital Investigation 46, 301572, 2023 | 5 | 2023 |
Majority voting ransomware detection system SR Davies, R Macfarlane, WJ Buchanan Journal of Information Security 14 (4), 2023 | 5 | 2023 |
Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. WJ Buchanan, J Graves, N Bose, R Macfarlane, B Davison, R Ludwiniak | 5 | 2011 |