Liverpool Skyline

Department of Computer Science

Dr Bo Zhou

Dr Bo Zhou

Telephone: 0151 231 2122

Biography

Dr Bo Zhou is a Senior Lecturer at the Department of Computer Science, Liverpool John Moores University. He has a long track record in network security, having worked in both academia and industry. Dr Zhou studied telecommunications at Northeastern University, China and Queen Mary University of London in the UK, before completing a PhD in Network Security at Liverpool John Moores University. Dr Zhou is widely published in network security and his research interests include intrusion detection systems, secure component composition, security visulisation, Digital Rights management, driving behavior identification, and group routing optimisation.

Languages

English
Chinese (Mandarin)
Russian

Degrees

2007, Liverpool John Moores University, Liverpool, United Kingdom, PhD - SUIDS: A Resource-Efficient Intrusion Detection System for Ubiquitous Computing Environments
2003, Queen Mary University of London, London, United Kingdom, MSc - Telecommunications
2002, Northeastern University, shenyang, China, BSc - Telecommunications

Academic appointments

Senior lecturer, Department of Computer Science, Liverpool John Moores University, 2013 - present

Publications

Conference publication

Koh S, Zhou B, Yang P, Yang Z, Fang H, Feng J. 2018. Reinforcement Learning for Vehicle Route Optimization in SUMO The 16th IEEE Conference on Smart City

Lee GM, Zhou B. 2018. Strengthening the Blockchain-based Internet of Value with Trust IEEE International Conference on Communications (ICC)

Lee GM, Zhou . 2017. From Personal Experience to Global Reputation for Trust Evaluation in the Social Internet of Things IEEE GLOBECOM 2017

Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA) :715-721 >DOI >Link

Maines C, Zhou B, Tang SOT, Shi Q. 2016. Adding a Third Dimension to BPMN as a means of Representing Cyber Security Requirements 9th International Conference on Developments in e-Systems Engineering (DESE2016)

Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16)

Asim M, Zarzosa S, Shi Q, Zhou B. 2015. A Policy Specification Language for Composite Services The Fifth International Conference on Advanced Collaborative Networks, Systems and Applications

Brumfitt H, askwith R, Zhou B. 2015. Protecting Future Personal Computing: Challenging Traditional Network Security Models 13th IEEE International Conference on Dependable, Autonomic and Secure Computing

Koh SS, Zhou B. 2015. BPMN Security Extensions for Healthcare Process The 13th IEEE International Conference on Pervasive Intelligence and Computing, BPMN Extension for Security Requirement in Healthcare Process

Brumfitt H, askwith R, Zhou B. 2015. Lightweight Forensics Application: Lightweight Approach to Securing Mobile Devices The 15th IEEE International Conference on Computer and Information Technology, First International Workshop on Internet of Things: Smart Objects, Cloud and Applications

Maines C, Llewellyn-Jones D, Tang S, Zhou B. 2015. A Cyber Security Ontology for BPMN-Security Extensions 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015)

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The Aniketos Service Composition Framework: Analysing and ranking of secure services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :121-135

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The aniketos service composition framework: Analysing and ranking of secure services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :121-135

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2013. A Framework for Secure Service Composition 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), ASE/IEEE International Conference on Social Computing (SocialCom) :647-652 >DOI >Link

Asim M, Llewellyn-Jones D, Lempereur B, Zhou B, Shi Q, Merabti M. 2013. Event Driven Monitoring of Composite Services 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), ASE/IEEE International Conference on Social Computing (SocialCom) :550-557 >DOI >Link

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2013. A compose language-based framework for secure service composition Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012, :195-202 >DOI

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M. 2013. Prototype for Design-time Secure and Trustworthy Service Composition 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 10th IEEE Consumer Communications and Networking Conference (CCNC) :847-848 >Link

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. A Compose Language-based Framework for Secure Service Composition ASE International Conference on Cyber Security (CyberSecurity 2012), Washington DC, USA, :14-16

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. Secure Service Composition Adaptation Based on Simulated Annealing Proceedings of the Layered Assurance Workshop (LAW) 2012, Annual Computer Security Applications Conference - ACSAC 28, Layered Assurance Workshop :49-55

Zhou B, Shi Q, Merabti M. 2007. Towards energy-efficient intrusion detection in pervasive computing 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, IEEE International Conference on Communications (ICC 2007) :1417-1422 >DOI >Link

Zhou B, Shi Q, Merabti M. 2006. A Framework for Intrusion Detection in Heterogeneous Environments 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 3rd IEEE Consumer Communications and Networking Conference :1244-1248 >Link

Zhou B, Shi Q, Merabti M. 2006. Intrusion detection in pervasive networks based on a chi-square statistic test 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 30th Annual International Computer Software and Applications Conference :203-+ >Link

Zhou B, Shi Q, Merabti M. 2006. Real-time intrusion detection in ubiquitous networks with a string-based approach Gavrilova M, Gervasi O, Kumar V, Tan CJK, Taniar D, Lagana A, Mun Y, Choo H. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, International Conference on Computational Science and Its Applications (ICCSA 2006) 3983 :352-359 >Link

Zhou B, Shi Q, Merabti M. 2005. A novel service-oriented and user-centric intrusion detection system for ubiquitous networks Hamza MH. Proceedings of the IASTED International Conference on Communication, Network, and Information Security, IASTED International Conference on Communication, Network, and Information Security :76-81 >Link

Zhou B, Al-Ani R, Shi Q, Sagheer A. A Survey on Secure Safety Applications in VANET The 16th IEEE Conference on Smart City

Brown J, Gao R, Ji Z, Chen J, Wu J, Zhang J, Zhou B, Shi Q, Crawford J, Zhang W. A low-power and high-speed True Random Number Generator using generated RTN 2018 Symposia on VLSI Technology and Circuits >Link

Koh SS, Zhou B, Yang P, Yang Z. Study of Group Route Optimization for IoT enabled Urban Transportation Network IEEE CPSCom/GreenCom/iThings/SmartData

Maines CL, Zhou B, Tang S, Shi Q. Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Language Developments in eSystems Engineering

Koh SS, Zhou B, Yang P, Yang Z. A Survey on Urban Traffic Optimisation for Sustainable and Resilient Transportation Network Ninth International Conference on Developments in e-Systems Engineering - DeSE2016,

Zhou B, Llewellyn-Jones D, Lamb DJ, Asim M, Shi Q, Merabti M. A Heuristic Approach for Secure Service Composition Adaptation First International Workshop on Cyberpatterns

Journal article

Yang P, Qi J, Hanneghan M, Tang S, Zhou B. 2018. A Hybrid Hierarchical Framework for Gym Physical Activity Recognition and Measurement Using Wearable Sensors IEEE Internet of Things, >DOI

Zhou B, Zhang Q, Shi Q, Yang Q, Yang P, Yu Y. 2017. Measuring Web Service Security in the Era of Internet of Things Computers and Electrical Engineering, >DOI

Brucker A, Zhou B, Malmignati F, Shi Q, Merabti M. 2017. Modelling, Validating, and Ranking of Secure Service Compositions Software: Practice and Experience,

Zhang Q, Xu Z, Zhou B. 2015. Group consensus measurement in MADM with multiple preference formats Journal of Decision Systems, 24 :146-158 >DOI

Asim M, Zhou B, Llewellyn-Jones D, Shi Q, Merabti M. 2014. Dynamic monitoring of composed services 9783319044477 :235-245 >DOI

Su M, Li F, Tang Z, Yu Y, Zhou B. 2014. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application SCIENTIFIC WORLD JOURNAL, >DOI >Link

Zhou B, Drew O, Arabo A, Llewellyn-Jones D, Kifayat K, Merabti M, Shi Q, Craddock R, Waller A, Jones G. 2010. System-of-systems boundary check in a public event scenario 2010 5th International Conference on System of Systems Engineering, SoSE 2010, >DOI

Zhou B, Shi Q, Merabti M. 2008. Balancing intrusion detection resources in ubiquitous computing networks COMPUTER COMMUNICATIONS, 31 :3643-3653 >DOI >Link

Zhou B, Maines CL, Tang SOT, Shi Q, Yang P, Yang Q, Qi J. A 3D Security Modelling Platform for Social IoT Environments IEEE Transactions on Computational Social Systems,

Zhang Q, Xu Z, Zhou B. Group Consensus Measurement in MADM with Multiple Preference Formats Journal of Decision Systems,

Yang Q, Jiang L, Hao W, Zhou B, Yang P, Lv Z. PMU Placement in Electric Transmission Networks for Reliable State Estimation against False Data Injection Attacks IEEE Internet of Things Journal,

Song C, Sang J, Zhou B. A High Security Buyer-Seller Watermark Protocol based on Iris Biometric Recent Advances in Electrical & Electronic Engineering, 9 :124-131 >DOI

Chapters

Zhou B, Llewellyn-Jones D, Lamb D, Asim M, Shi Q, Merabti M. 2014. A Heuristic Approach for Secure Service Composition Adaptation Cyberpatterns >DOI

Brucker A, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The Aniketos Service Composition Framework Brucker A, Dalpiaz F, Giorgini P, Meland P, Rios E. Secure and Trustworthy Service Composition 8900 :121-135 Springer International Publishing 978-3-319-13517-5 >DOI

Zhou B, Maines CL, Tang SOT, Shi Q. A Framework for the Visualisation of Cyber Security Requirements and its Application in BPMN Guide to Vulnerability Analysis for Computer Networks and Systems :339-366 Springer 9783319926230

Engagement & Impact

Award:

Best Paper Award - System-of-Systems Boundary Check in a Public Event Scenario. 5th International Conference on Systems of Systems Engineering (SoSE 2010).

Fellowships:

Early Career Researcher Fellowship, Liverpool John Moores University

Research Grants Awarded:

Department for Culture, Media & Sport, Modelling Security Requirements for Businesses in 3D, Grant value (£): 50000

Teaching qualification:

Fellow of Higher Education Academy (FHEA)