Distance measurement methods for improved insider threat detection O Lo, WJ Buchanan, P Griffiths, R Macfarlane Security and Communication Networks 2018, 1-18, 2018 | 45 | 2018 |
Evaluation of TFTP DDoS amplification attack B Sieklik, R Macfarlane, WJ Buchanan computers & security 57, 67-92, 2016 | 45 | 2016 |
Approaches to the classification of high entropy file fragments P Penrose, R Macfarlane, WJ Buchanan Digital Investigation 10 (4), 372-384, 2013 | 33 | 2013 |
Evaluating Digital Forensic Tools (DFTs). F Flandrin, WJ Buchanan, R Macfarlane, B Ramsay, A Smales | 24 | 2014 |
A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). WJ Buchanan, F Flandrin, R Macfarlane, J Graves | 24 | 2011 |
Evaluation of live forensic techniques in ransomware attack mitigation SR Davies, R Macfarlane, WJ Buchanan Forensic Science International: Digital Investigation 33, 300979, 2020 | 19 | 2020 |
A methodology for the security evaluation within third-party Android Marketplaces WJ Buchanan, S Chiale, R Macfarlane Digital Investigation 23, 88-98, 2017 | 18 | 2017 |
Formal security policy implementations in network firewalls R Macfarlane, W Buchanan, E Ekonomou, O Uthmani, L Fan, O Lo Computers & Security 31 (2), 253-270, 2012 | 18 | 2012 |
Fast contraband detection in large capacity disk drives P Penrose, WJ Buchanan, R Macfarlane Digital Investigation 12, S22-S29, 2015 | 14 | 2015 |
Identifying vulnerabilities using internet-wide scanning data J O'Hare, R Macfarlane, O Lo 2019 IEEE 12th International Conference on Global Security, Safety and …, 2019 | 11 | 2019 |
Differential area analysis for ransomware attack detection within mixed file datasets SR Davies, R Macfarlane, WJ Buchanan Computers & Security 108, 102377, 2021 | 9 | 2021 |
Security Issues of a Publicly Accessible Cloud Computing Infrastructure G Russell, R Macfarlane 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 9 | 2012 |
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques-An Experiment J Chacon, S McKeown, R Macfarlane 2020 International Conference on Cyber Security and Protection of Digital …, 2020 | 6 | 2020 |
Student perception of on-line lectures within a blended learning environment for computing students B Buchanan, R MacFarlane, R Ludwiniak | 6 | 2011 |
NapierOne: A modern mixed file data set alternative to Govdocs1 SR Davies, R Macfarlane, WJ Buchanan Forensic Science International: Digital Investigation 40, 301330, 2022 | 5 | 2022 |
Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. WJ Buchanan, J Graves, N Bose, R Macfarlane, B Davison, R Ludwiniak | 5 | 2011 |
Student perception of on-line lectures with a blended learning environment. WJ Buchanan, R MacFarlane, R Ludwiniak | 4 | 2010 |
An integrated firewall policy validation tool R Macfarlane | 3 | 2009 |
Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction I Lowe, WJ Buchanan, RJ Macfarlane, O Lo arXiv preprint arXiv:2002.05126, 2020 | 2 | 2020 |
Privacy parameter variation using RAPPOR on a malware dataset P Aaby, JM De Acuna, R Macfarlane, WJ Buchanan 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 2 | 2018 |