default search action
Qi Shi 0001
Person information
- affiliation: Liverpool John Moores University, Liverpool, UK
Other persons with the same name
- Qi Shi — disambiguation page
- Qi Shi 0002 — Harbin Institute of Technology, Harbin, China
- Qi Shi 0003 — University of Southampton, UK (and 1 more)
- Qi Shi 0004 — Shanghai University, School of Information and Communication Engineering, China
- Qi Shi 0005 — McMaster University, Hamilton, ON, Canada
- Qi Shi 0006 — Donghua University, Shanghai, China
- Qi Shi 0007 — Tokyo University of Technology, Tokyo, Japan
- Qi Shi 0008 — University of Texas at Arlington, Fort Worth, TX, USA
- Qi Shi 0009 — Michigan Technological University, Houghton, MI, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j54]Alessandro Raschellà, Max Hashem Eiza, Michael Mackay, Qi Shi, Matthew Banton:
A Trust-Based Cooperative System for Efficient Wi-Fi Radio Access Networks. IEEE Access 11: 136136-136149 (2023) - [j53]Ruqayah Al-Ani, Thar Baker, Bo Zhou, Qi Shi:
Privacy and safety improvement of VANET data via a safety-related privacy scheme. Int. J. Inf. Sec. 22(4): 763-783 (2023) - [c82]Max Hashem Eiza, Alessandro Raschellà, Michael Mackay, Qi Shi, Faycal Bouhafs:
Towards Trusted and Accountable Win-Win SDWN Platform for Trading Wi-Fi Network Access. CCNC 2023: 1-6 - 2022
- [j52]Lampis Alevizos, Max Hashem Eiza, Ta Vinh Thong, Qi Shi, Janet C. Read:
Blockchain-Enabled Intrusion Detection and Prevention System of APTs Within Zero Trust Architecture. IEEE Access 10: 89270-89288 (2022) - [j51]Anuoluwapo A. Adewuyi, Hui Cheng, Qi Shi, Jiannong Cao, Xingwei Wang, Bo Zhou:
SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things. IEEE Internet Things J. 9(5): 3298-3312 (2022) - 2021
- [j50]Ghulam Mohi Ud Din, Angelos K. Marnerides, Qi Shi, Chelsea Dobbins, Áine MacDermott:
Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems. IEEE Trans. Emerg. Top. Comput. Intell. 5(6): 860-870 (2021) - [j49]Alessandro Raschellà, Omar Aldhaibani, Sara Pizzi, Michael Mackay, Faycal Bouhafs, Giuseppe Araniti, Qi Shi, M. Carmen Lucas-Estan:
A Centralized Win-Win Cooperative Framework for Wi-Fi and 5G Radio Access Networks. Wirel. Commun. Mob. Comput. 2021: 5515271:1-5515271:11 (2021) - 2020
- [j48]Hanaa Nafea, Kashif Kifayat, Qi Shi, Kashif Naseer Qureshi, Bob Askwith:
Efficient Non-Linear Covert Channel Detection in TCP Data Streams. IEEE Access 8: 1680-1690 (2020) - [j47]Ayesha Naureen, Ning Zhang, Steve B. Furber, Qi Shi:
A GPS-Less Localization and Mobility Modelling (LMM) System for Wildlife Tracking. IEEE Access 8: 102709-102732 (2020) - [j46]Alessandro Raschellà, Faycal Bouhafs, Michael Mackay, Qi Shi, Jorge Ortín, José Ramón Gállego, María Canales:
A dynamic access point allocation algorithm for dense wireless LANs using potential game. Comput. Networks 167 (2020) - [j45]Áine MacDermott, Thar Baker, Paul Buck, Farkhund Iqbal, Qi Shi:
The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics. Int. J. Digit. Crime Forensics 12(1): 1-13 (2020) - [j44]Pin Shen Teh, Ning Zhang, Syh-Yuan Tan, Qi Shi, Wee-How Khoh, Raheel Nawaz:
Strengthen user authentication on mobile devices by using user's touch dynamics pattern. J. Ambient Intell. Humaniz. Comput. 11(10): 4019-4039 (2020) - [j43]Faycal Bouhafs, Mirghiasaldin Seyedebrahimi, Alessandro Raschellà, Michael Mackay, Qi Shi:
Per-Flow Radio Resource Management to Mitigate Interference in Dense IEEE 802.11 Wireless LANs. IEEE Trans. Mob. Comput. 19(5): 1170-1183 (2020) - [c81]Faycal Bouhafs, Frank T. H. den Hartog, Alessandro Raschellà, Michael Mackay, Qi Shi, Sinan Sinanovic:
Realizing Physical Layer Security in Large Wireless Networks using Spectrum Programmability. GLOBECOM (Workshops) 2020: 1-6 - [c80]Matthew Banton, Nathan Shone, William Hurst, Qi Shi:
Intrusion Detection Using Extremely Limited Data Based on SDN. IEEE Conf. on Intelligent Systems 2020: 304-309 - [c79]Áine MacDermott, John Carr, Qi Shi, Mohd Rizuan Baharon, Gyu Myoung Lee:
Privacy Preserving Issues in the Dynamic Internet of Things (IoT). ISNCC 2020: 1-6 - [c78]Ruqayah Al-Ani, Bo Zhou, Qi Shi, Thar Baker, Mohamed Abdlhamed:
Adjusted Location Privacy Scheme for VANET Safety Applications. NOMS 2020: 1-4
2010 – 2019
- 2019
- [j42]Deepak G. C., Faycal Bouhafs, Alessandro Raschellà, Michael Mackay, Qi Shi:
Radio resource management framework for energy-efficient communications in the Internet of Things. Trans. Emerg. Telecommun. Technol. 30(12) (2019) - [j41]Anuoluwapo A. Adewuyi, Hui Cheng, Qi Shi, Jiannong Cao, Áine MacDermott, Xingwei Wang:
CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things. IEEE Internet Things J. 6(3): 5432-5445 (2019) - [j40]Ruqayah R. Al-Dahhan, Qi Shi, Gyu Myoung Lee, Kashif Kifayat:
Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption. Sensors 19(7): 1695 (2019) - [j39]Upul Jayasinghe, Gyu Myoung Lee, Tai-Won Um, Qi Shi:
Machine Learning Based Trust Computational Model for IoT Services. IEEE Trans. Sustain. Comput. 4(1): 39-52 (2019) - [j38]Mahmoud Hashem Eiza, Qi Shi, Angelos K. Marnerides, Thomas J. Owens, Qiang Ni:
Efficient, Secure, and Privacy-Preserving PMIPv6 Protocol for V2G Networks. IEEE Trans. Veh. Technol. 68(1): 19-33 (2019) - [c77]Frank T. H. den Hartog, Faycal Bouhafs, Qi Shi:
Toward secure trading of unlicensed spectrum in cyber-physical systems. CCNC 2019: 1-4 - [c76]Áine MacDermott, Phillip Kendrick, Ibrahim Idowu, Mal Ashall, Qi Shi:
Securing Things in the Healthcare Internet of Things. GIoTS 2019: 1-6 - [c75]Matthew Banton, Nathan Shone, William Hurst, Qi Shi:
A Fresh Look at Combining Logs and Network Data to Detect Anomalous Activity. ICT-DM 2019: 1-6 - [c74]Pin Shen Teh, Ning Zhang, Syh-Yuan Tan, Qi Shi, Raheel Nawaz, Wee-How Khoh:
Sensing Your Touch: Strengthen User Authentication via Touch Dynamic Biometrics. ICTC 2019: 289-294 - [c73]Nguyen Viet Hung, Pham Ngoc Dung, Nguyen Ngoc Tran, Vu Dinh Phai, Qi Shi:
Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network. KSE 2019: 1-5 - [c72]Vu Dinh Phai, Nathan Shone, Phan Huy Dung, Qi Shi, Nguyen Viet Hung, Nguyen Ngoc Tran:
Behaviour-aware Malware Classification: Dynamic Feature Selection. KSE 2019: 1-5 - 2018
- [j37]Kemedi Moara-Nkwe, Qi Shi, Gyu Myoung Lee, Mahmoud Hashem Eiza:
A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks. IEEE Access 6: 11374-11387 (2018) - [j36]Bo Zhou, Quan Zhang, Qi Shi, Qiang Yang, Po Yang, Yinyan Yu:
Measuring web service security in the era of Internet of Things. Comput. Electr. Eng. 66: 305-315 (2018) - [j35]Faycal Bouhafs, Michael Mackay, Alessandro Raschellà, Qi Shi, Frank T. H. den Hartog, Jose Saldana, Ruben Munilla, José Ruíz-Mas, Julián Fernández-Navajas, Jose Almodovar, Niels L. M. van Adrichem:
Wi-5: A Programming Architecture for Unlicensed Frequency Bands. IEEE Commun. Mag. 56(12): 178-185 (2018) - [j34]Paul R. McWhirter, Kashif Kifayat, Qi Shi, Bob Askwith:
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel. J. Inf. Secur. Appl. 40: 199-216 (2018) - [j33]Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Thar Baker, Qi Shi, Brett Lempereur:
Security policy monitoring of BPMN-based service compositions. J. Softw. Evol. Process. 30(9) (2018) - [j32]Bo Zhou, Curtis L. Maines, Stephen Tang, Qi Shi, Po Yang, Qiang Yang, Jun Qi:
A 3-D Security Modeling Platform for Social IoT Environments. IEEE Trans. Comput. Soc. Syst. 5(4): 1174-1188 (2018) - [j31]Nathan Shone, Nguyen Ngoc Tran, Vu Dinh Phai, Qi Shi:
A Deep Learning Approach to Network Intrusion Detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1): 41-50 (2018) - [c71]Ruqayah Al-Ani, Bo Zhou, Qi Shi, Ali M. Sagheer:
A Survey on Secure Safety Applications in VANET. HPCC/SmartCity/DSS 2018: 1485-1490 - [c70]Alessandro Raschellà, Faycal Bouhafs, Michael Mackay, Qi Shi, Jorge Ortín, José Ramón Gállego, María Canales:
AP selection algorithm based on a potential game for large IEEE 802.11 WLANs. NOMS 2018: 1-7 - [c69]Áine MacDermott, Thar Baker, Qi Shi:
Iot Forensics: Challenges for the Ioa Era. NTMS 2018: 1-5 - [c68]Ruqayah R. Al-Dahhan, Qi Shi, Gyu Myoung Lee, Kashif Kifayat:
Revocable, Decentralized Multi-Authority Access Control System. UCC Companion 2018: 220-225 - [p9]Bo Zhou, Curtis L. Maines, Stephen Tang, Qi Shi:
A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 339-366 - 2017
- [j30]Achim D. Brucker, Bo Zhou, Francesco Malmignati, Qi Shi, Madjid Merabti:
Modelling, validating, and ranking of secure service compositions. Softw. Pract. Exp. 47(12): 1923-1943 (2017) - [j29]Alessandro Raschellà, Faycal Bouhafs, Mirghiasaldin Seyedebrahimi, Michael Mackay, Qi Shi:
Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks. IEEE Trans. Netw. Serv. Manag. 14(2): 441-455 (2017) - [c67]Curtis L. Maines, Bo Zhou, Stephen Tang, Qi Shi:
Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Languages. DeSE 2017: 71-76 - [c66]Áine MacDermott, Qi Shi, Kashif Kifayat:
Distributed Attack Prevention Using Dempster-Shafer Theory of Evidence. ICIC (3) 2017: 203-212 - [c65]A. A. Thulnoon, Brett Lempereur, Qi Shi, Dhiya Al-Jumeily:
Using aspect oriented programming to enforce privacy preserving communication in distributed systems. ICC 2017: 192:1-192:8 - [c64]Mirghiasaldin Seyedebrahimi, Faycal Bouhafs, Alessandro Raschellà, Michael Mackay, Qi Shi:
Fine-Grained Radio Resource Management to Control Interference in Dense Wi-Fi Networks. WCNC 2017: 1-6 - 2016
- [j28]Bashar Ahmed Alohali, Kashif Kifayat, Qi Shi, William Hurst:
Group Authentication Scheme for Neighbourhood Area Networks (NANs) in Smart Grids. J. Sens. Actuator Networks 5(2): 9 (2016) - [j27]Mahmoud Hashem Eiza, Qiang Ni, Qi Shi:
Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks. IEEE Trans. Veh. Technol. 65(10): 7868-7881 (2016) - [c63]Mirghiasaldin Seyedebrahimi, Alessandro Raschellà, Faycal Bouhafs, Michael Mackay, Qi Shi, Mahmoud Hashem Eiza:
A centralised Wi-Fi management framework for D2D communications in dense Wi-Fi networks. CSCN 2016: 269-274 - [c62]Curtis L. Maines, Bo Zhou, Stephen Tang, Qi Shi:
Adding a Third Dimension to BPMN as a Means of Representing Cyber Security Requirements. DeSE 2016: 105-110 - [c61]Mirghiasaldin Seyedebrahimi, Faycal Bouhafs, Alessandro Raschellà, Michael Mackay, Qi Shi:
SDN-based channel assignment algorithm for interference management in dense Wi-Fi networks. EuCNC 2016: 128-132 - [c60]Mahmoud Hashem Eiza, Qi Shi, Angelos K. Marnerides, Thomas J. Owens:
Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks. ICC 2016: 1-6 - [c59]Alessandro Raschellà, Faycal Bouhafs, Mirghiasaldin Seyedebrahimi, Michael Mackay, Qi Shi:
A centralized framework for smart access point selection based on the Fittingness Factor. ICT 2016: 1-5 - [c58]Mohamed Abdlhamed, Kashif Kifayat, Qi Shi, William Hurst:
A System for Intrusion Prediction in Cloud Computing. ICC 2016 2016: 35:1-35:9 - [c57]Bashar Ahmed Alohali, Kashif Kifayat, Qi Shi, William Hurst:
Replay Attack Impact on Advanced Metering Infrastructure (AMI). SmartGIFT 2016: 52-59 - [c56]Bo Zhou, Qi Shi, Po Yang:
A Survey on Quantitative Evaluation of Web Service Security. Trustcom/BigDataSE/ISPA 2016: 715-721 - [c55]William Hurst, Nathan Shone, Qi Shi:
Critical Infrastructure Testbed for Cyber-Security Training and Research. UKAIS 2016: 23 - 2015
- [j26]Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat:
Hosting critical infrastructure services in the cloud environment considerations. Int. J. Crit. Infrastructures 11(4): 365-381 (2015) - [j25]Qi Shi, Ning Zhang, Madjid Merabti:
Fair signature exchange via delegation on ubiquitous networks. J. Comput. Syst. Sci. 81(4): 615-631 (2015) - [j24]Mahmoud Hashem Eiza, Thomas J. Owens, Qiang Ni, Qi Shi:
Situation-Aware QoS Routing Algorithm for Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 64(12): 5520-5535 (2015) - [c54]Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones:
A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing. CIT/IUCC/DASC/PICom 2015: 618-625 - [c53]Younis A. Younis, Kashif Kifayat, Qi Shi, Bob Askwith:
A New Prime and Probe Cache Side-Channel Attack for Cloud Computing. CIT/IUCC/DASC/PICom 2015: 1718-1724 - [c52]Nathan Shone, Chelsea Dobbins, William Hurst, Qi Shi:
Digital Memories Based Mobile User Authentication for IoT. CIT/IUCC/DASC/PICom 2015: 1796-1802 - [c51]Áine MacDermott, Qi Shi, Kashif Kifayat:
Detecting Intrusions in Federated Cloud Environments Using Security as a Service. DeSE 2015: 91-96 - [c50]Paul Buck, Qi Shi, Áine MacDermott:
A Selective Regression Testing Approach for Composite Web Services. DeSE 2015: 97-101 - 2014
- [c49]Áine MacDermott, William Hurst, Qi Shi, Madjid Merabti:
Simulating Critical Infrastructure Cascading Failure. UKSim 2014: 324-329 - [p8]David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Extending AOP Principles for the Description of Network Security Patterns. Cyberpatterns 2014: 73-84 - [p7]Bo Zhou, David Llewellyn-Jones, David J. Lamb, Muhammad Asim, Qi Shi, Madjid Merabti:
A Heuristic Approach for Secure Service Composition Adaptation. Cyberpatterns 2014: 97-105 - [p6]Muhammad Asim, Bo Zhou, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Dynamic Monitoring of Composed Services. Cyberpatterns 2014: 235-245 - [p5]Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services. Secure and Trustworthy Service Composition 2014: 121-135 - [p4]Brett Lempereur, Dhouha Ayed, Muhammad Asim, Madjid Merabti, Qi Shi:
Monitoring Threats to Composite Services within the Aniketos Run-Time Framework. Secure and Trustworthy Service Composition 2014: 173-191 - [p3]Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Brett Lempereur, Qi Shi:
Security Policy Monitoring of Composite Services. Secure and Trustworthy Service Composition 2014: 192-202 - 2013
- [j23]Qi Shi, Ning Zhang, Madjid Merabti, Kashif Kifayat:
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks. J. Parallel Distributed Comput. 73(2): 235-249 (2013) - [j22]Kashif Kifayat, Madjid Merabti, Qi Shi, Sohail Abbas:
Component-based security system (COMSEC) with QoS for wireless sensor networks. Secur. Commun. Networks 6(4): 461-472 (2013) - [c48]Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti:
Prototype for design-time secure and trustworthy service composition. CCNC 2013: 847-848 - [c47]Nathan Shone, Qi Shi, Madjid Merabti, Kashif Kifayat:
Misbehaviour monitoring on system-of-systems components. CRiSIS 2013: 1-6 - [c46]Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat:
Considering an elastic scaling model for cloud Security. ICITST 2013: 150-155 - [c45]Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones, Madjid Merabti:
Secure rendering process in cloud computing. PST 2013: 82-87 - [c44]Muhammad Asim, David Llewellyn-Jones, Brett Lempereur, Bo Zhou, Qi Shi, Madjid Merabti:
Event Driven Monitoring of Composite Services. SocialCom 2013: 550-557 - [c43]Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
A Framework for Secure Service Composition. SocialCom 2013: 647-652 - [c42]Nathan Shone, Qi Shi, Madjid Merabti, Kashif Kifayat:
Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems. UIC/ATC 2013: 438-443 - 2012
- [j21]Brett Lempereur, Madjid Merabti, Qi Shi:
Pypette: A Platform for the Evaluation of Live Digital Forensics. Int. J. Digit. Crime Forensics 4(4): 31-46 (2012) - [j20]Qi Shi, Ning Zhang, David Llewellyn-Jones:
Efficient autonomous signature exchange on ubiquitous networks. J. Netw. Comput. Appl. 35(6): 1793-1806 (2012) - [c41]Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti, David J. Lamb:
A Compose Language-Based Framework for Secure Service Composition. CyberSecurity 2012: 195-202 - [c40]Michael Kennedy, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
A framework for measuring security of services in ubiquitous computing environments. PerCom Workshops 2012: 112-117 - [c39]Laura Pla Beltran, Madjid Merabti, Qi Shi:
Multiplayer Game Technology to Manage Critical Infrastructure Protection. TrustCom 2012: 549-556 - [c38]Robert Hegarty, Madjid Merabti, Qi Shi, Robert Askwith:
Scalable Distributed Signature Detection. WDFIA 2012: 27-37 - [c37]Brett Lempereur, Madjid Merabti, Qi Shi:
Pypette: A Framework for the Evaluation of Live Digital Forensic Acquisition Techniques. WDFIA 2012: 87-96 - 2011
- [j19]Qi Shi, Ning Zhang, Madjid Merabti:
Fair exchange of valuable information: A generalised framework. J. Comput. Syst. Sci. 77(2): 348-371 (2011) - [j18]Qi Shi, Ning Zhang, Madjid Merabti, Robert Askwith:
Achieving autonomous fair exchange in ubiquitous network settings. J. Netw. Comput. Appl. 34(2): 653-667 (2011) - [c36]Brett Lempereur, Madjid Merabti, Qi Shi:
Information Flow Monitoring: Model, Policy, and Analysis. DeSE 2011: 227-232 - [c35]Abdullahi Arabo, Mike Kennedy, Qi Shi, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Identity management in System-of-Systems Crisis Management situation. SoSE 2011: 37-42 - [c34]Robert Hegarty, Madjid Merabti, Qi Shi, Robert Askwith:
A Signature Detection Scheme for Distributed Storage. WDFIA 2011: 122-132 - 2010
- [j17]Kashif Kifayat, Madjid Merabti, Qi Shi:
Future security challenges in cloud computing. Int. J. Multim. Intell. Secur. 1(4): 428-442 (2010) - [c33]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Dynamic Device Configuration in Ubiquitous Environments. ICGS3 2010: 263-273 - [c32]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Data Mishandling and Profile Building in Ubiquitous Environments. SocialCom/PASSAT 2010: 1056-1063 - [c31]Bo Zhou, Oliver Drew, Abdullahi Arabo, David Llewellyn-Jones, Kashif Kifayat, Madjid Merabti, Qi Shi, Rachel Craddock, Adrian Waller, Glyn Jones:
System-of-systems boundary check in a public event scenario. SoSE 2010: 1-8 - [p2]Bo Zhou, Qi Shi, Madjid Merabti:
A Novel Intrusion Detection System for Smart Space. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 307-333 - [p1]Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Security in Wireless Sensor Networks. Handbook of Information and Communication Security 2010: 513-552
2000 – 2009
- 2009
- [j16]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Context-Aware Identity Management in Pervasive Ad-hoc Environments. Int. J. Adv. Pervasive Ubiquitous Comput. 1(4): 29-42 (2009) - [c30]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets). AINA Workshops 2009: 588-594 - 2008
- [j15]Bo Zhou, Qi Shi, Madjid Merabti:
Balancing intrusion detection resources in ubiquitous computing networks. Comput. Commun. 31(15): 3643-3653 (2008) - 2007
- [j14]Ning Zhang, Li Yao, Aleksandra Nenadic, Jay Chin, Carole A. Goble, Alan L. Rector, David W. Chadwick, Sassa Otenko, Qi Shi:
Achieving fine-grained access control in virtual organizations. Concurr. Comput. Pract. Exp. 19(9): 1333-1352 (2007) - [c29]Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. IAS 2007: 44-49 - [c28]Bo Zhou, Qi Shi, Madjid Merabti:
Towards Energy-Efficient Intrusion Detection in Pervasive Computing. ICC 2007: 1417-1422 - 2006
- [j13]Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith:
Practical and efficient fair document exchange over networks. J. Netw. Comput. Appl. 29(1): 46-61 (2006) - [c27]Bo Zhou, Qi Shi, Madjid Merabti:
A framework for intrusion detection in heterogeneous environments. CCNC 2006: 1244-1248 - [c26]Bo Zhou, Qi Shi, Madjid Merabti:
Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. COMPSAC (2) 2006: 203-208 - [c25]Bo Zhou, Qi Shi, Madjid Merabti:
Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. ICCSA (4) 2006: 352-359 - 2005
- [j12]Aleksandra Nenadic, Ning Zhang, Qi Shi:
RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery. J. Comput. Secur. 13(5): 757-777 (2005) - [j11]John Haggerty, Qi Shi, Madjid Merabti:
Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking. IEEE J. Sel. Areas Commun. 23(10): 1994-2002 (2005) - [j10]Ning Zhang, Qi Shi, Madjid Merabti:
Revocation of privacy-enhanced public-key certificates. J. Syst. Softw. 75(1-2): 205-214 (2005) - [c24]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
Buffer Overrun Prevention Through Component Composition Analysis. COMPSAC (1) 2005: 156-163 - [c23]Aleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble:
DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery. EEE 2005: 94-99 - [c22]Ning Zhang, Alan L. Rector, Iain E. Buchan, Qi Shi, Dipak Kalra, Jeremy Rogers, Carole A. Goble, Steve Walker, David Ingram, Peter D. Singleton:
A Linkable Identity Privacy Algorithm for HealthGrid. HealthGrid 2005: 234-245 - [c21]Aleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble:
Certified E-Mail Delivery with DSA Receipts. IPDPS 2005 - [c20]John Haggerty, Qi Shi, Madjid Merabti:
Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. SEC 2005: 327-342 - [c19]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation. SecureComm 2005: 243-248 - [c18]Ning Zhang, Li Yao, Jay Chin, Aleksandra Nenadic, A. McNab, Alan L. Rector, Carole A. Goble, Qi Shi:
Plugging a Scalable Authentication Framework into Shibboleth. WETICE 2005: 271-276 - 2004
- [j9]Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith:
Autonomous mobile agent based fair exchange. Comput. Networks 46(6): 751-770 (2004) - [j8]Ning Zhang, Qi Shi, Madjid Merabti:
A unified approach to a fair document exchange system. J. Syst. Softw. 72(1): 83-96 (2004) - [c17]John Haggerty, Tom Berry, Qi Shi, Madjid Merabti:
DiDDeM: a system for early detection of TCP SYN flood attacks. GLOBECOM 2004: 2037-2042 - [c16]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
A security framework for executables in a ubiquitous computing environment. GLOBECOM 2004: 2158-2163 - [c15]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. ITCC (1) 2004: 112-117 - 2003
- [j7]Ning Zhang, Qi Shi, Madjid Merabti:
An efficient protocol for anonymous and fair document exchange. Comput. Networks 41(1): 19-28 (2003) - [j6]Bob Askwith, Madjid Merabti, Qi Shi:
MNPA: A basis for privacy-enhanced QoS in mobile networks. Microprocess. Microsystems 27(2): 93-100 (2003) - [c14]Abiola Abimbola, Qi Shi, Madjid Merabti:
NetHost-Sensor: A Novel Concept in Intrusion Detection Systems. ISCC 2003: 232-237 - 2002
- [c13]John Haggerty, Qi Shi, Madjid Merabti:
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. ACSAC 2002: 413-422 - [c12]John Haggerty, Qi Shi, Madjid Merabti:
The Threat From Within -An Analysis of Attacks on anInternal Network. SEC 2002: 133-146 - 2001
- [c11]D. W. Gresty, Qi Shi, Madjid Merabti:
Requirements for a General Framework for Response to Distributed Denial-of-Service. ACSAC 2001: 422-429 - 2000
- [j5]Madjid Merabti, Qi Shi, Rolf Oppliger:
Advanced security techniques for network protection. Comput. Commun. 23(17): 1581-1583 (2000) - [j4]Bob Askwith, Madjid Merabti, Qi Shi:
MNPA: a mobile network privacy architecture. Comput. Commun. 23(18): 1777-1788 (2000)
1990 – 1999
- 1999
- [j3]Ning Zhang, Qi Shi, Madjid Merabti:
A Flexible Approach to Secure and Fair Document Exchange. Comput. J. 42(7): 569-581 (1999) - 1998
- [j2]Qi Shi, Ning Zhang:
An effective model for composition of secure systems. J. Syst. Softw. 43(3): 233-244 (1998) - 1997
- [c10]Bob Askwith, Madjid Merabti, Qi Shi, K. Whiteley:
Achieving User Privacy in Mobile Networks. ACSAC 1997: 108- - 1996
- [j1]Ning Zhang, Qi Shi:
Achieving Non-Repudiation of Receipt. Comput. J. 39(10): 844-853 (1996) - [c9]Ning Zhang, Qi Shi:
Security Issues in an EDI Environment. ACSAC 1996: 129-136 - [c8]Qi Shi, Ning Zhang:
Applying Composable Security Properties to Assessment of Information Systems. COMPSAC 1996: 118-123 - [c7]Qi Shi, Ning Zhang:
A general approach to secure components composition. HASE 1996: 263-286 - 1995
- [c6]Qi Shi, Ning Zhang:
A General Approach to Evaluation of Secure Systems. COMPSAC 1995: 396-401 - 1994
- [c5]Qi Shi, John A. McDermid, Ning Zhang:
On analysis of secure information systems: a case study. COMPSAC 1994: 364-369 - 1993
- [c4]Qi Shi, John A. McDermid, Jonathan D. Moffett:
Applying noninterference to composition of systems: a more practical approach. ACSAC 1993: 210-220 - [c3]Qi Shi, John A. McDermid:
Constructing Secure Distributed Systems Using Components. SRDS 1993: 143-152 - 1992
- [c2]John A. McDermid, Qi Shi:
Secure composition of systems. ACSAC 1992: 112-122 - 1991
- [c1]John A. McDermid, Qi Shi:
A Formal Model of Security Dependency for Analysis and Testing of Secure Systems. CSFW 1991: 188-200
Coauthor Index
aka: Bob Askwith
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint