Liverpool Skyline

Department of Computer Science

Dr Bo Zhou

Dr Bo Zhou

Telephone: 0151 231 2122

website
ORCID

Biography

Dr Bo Zhou is a Reader in Network Security at the Department of Computer Science, Liverpool John Moores University. He has a long track record in Network Security, having worked in both academia and industry. Dr Zhou studied Telecommunications at Northeastern University in China and Queen Mary, University of London in the UK, before completing a PhD in Network Security at Liverpool John Moores University. Dr Zhou’s research interests include Network Security, Security Visulisation, Hardware Security, Intelligent Transportation Systems, and Machine Learning.

Languages

English
Chinese (Mandarin)
Russian

Degrees

2007, Liverpool John Moores University, Liverpool, United Kingdom, PhD - SUIDS: A Resource-Efficient Intrusion Detection System for Ubiquitous Computing Environments
2003, Queen Mary University of London, London, United Kingdom, MSc - Telecommunications
2002, Northeastern University, shenyang, China, BSc - Telecommunications

Academic appointments

Reader in Network Security, Department of Computer Science, Liverpool John Moores University, 2019 - present
Senior Lecturer, Department of Computer Science, Liverpool John Moores University, 2013 - 2019

Publications

Journal article

Yang P, Qi J, Hanneghan M, Tang S, Zhou B. 2019. A Hybrid Hierarchical Framework for Gym Physical Activity Recognition and Measurement Using Wearable Sensors IEEE Internet of Things, 6 :1384-1393 DOI Author Url Publisher Url Public Url

Su M, Zhou B, Fu A, Yu Y, Zhang G. 2019. PRTA: a Proxy Re-encryption based Trusted Authorization Scheme for Nodes on CloudIoT Information Sciences, DOI Publisher Url Public Url

Zhou B, Maines CL, Tang SOT, Shi Q, Yang P, Yang Q, Qi J. 2018. A 3D Security Modelling Platform for Social IoT Environments IEEE Transactions on Computational Social Systems, 5 :1174-1188 DOI Public Url

Yang Q, Jiang L, Hao W, Zhou B, Yang P, Lv Z. 2017. PMU Placement in Electric Transmission Networks for Reliable State Estimation against False Data Injection Attacks IEEE Internet of Things Journal, 4 :1978-1986 DOI Author Url Publisher Url Public Url

Brucker A, Zhou B, Malmignati F, Shi Q, Merabti M. 2017. Modelling, Validating, and Ranking of Secure Service Compositions Software: Practice and Experience, 47 :1923-1943 DOI Author Url Publisher Url Public Url

Zhou B, Zhang Q, Shi Q, Yang Q, Yang P, Yu Y. 2017. Measuring Web Service Security in the Era of Internet of Things Computers and Electrical Engineering, DOI Author Url Public Url

Zhang Q, Xu Z, Zhou B. 2015. Group consensus measurement in MADM with multiple preference formats Journal of Decision Systems, 24 :146-158 DOI Public Url

Asim M, Zhou B, Llewellyn-Jones D, Shi Q, Merabti M. 2014. Dynamic monitoring of composed services 9783319044477 :235-245 DOI

Su M, Li F, Tang Z, Yu Y, Zhou B. 2014. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application SCIENTIFIC WORLD JOURNAL, DOI Author Url

Zhou B, Drew O, Arabo A, Llewellyn-Jones D, Kifayat K, Merabti M, Shi Q, Craddock R, Waller A, Jones G. 2010. System-of-systems boundary check in a public event scenario 2010 5th International Conference on System of Systems Engineering, SoSE 2010, DOI

Zhou B, Shi Q, Merabti M. 2008. Balancing intrusion detection resources in ubiquitous computing networks COMPUTER COMMUNICATIONS, 31 :3643-3653 DOI Author Url

Zhang Q, Xu Z, Zhou B. Group Consensus Measurement in MADM with Multiple Preference Formats Journal of Decision Systems, DOI

Song C, Sang J, Zhou B. A High Security Buyer-Seller Watermark Protocol based on Iris Biometric Recent Advances in Electrical & Electronic Engineering, 9 :124-131 DOI Public Url

Conference publication

Koh S, Zhou B, Yang P, Yang Z, Fang H, Feng J. 2018. Reinforcement Learning for Vehicle Route Optimization in SUMO The 16th IEEE Conference on Smart City DOI Author Url Public Url

Lee GM, Zhou B. 2018. Strengthening the Blockchain-based Internet of Value with Trust IEEE International Conference on Communications (ICC) DOI Public Url

Lee GM, Zhou . 2017. From Personal Experience to Global Reputation for Trust Evaluation in the Social Internet of Things IEEE GLOBECOM 2017 DOI Author Url Public Url

Maines C, Zhou B, Tang SOT, Shi Q. 2016. Adding a Third Dimension to BPMN as a means of Representing Cyber Security Requirements 9th International Conference on Developments in e-Systems Engineering (DESE2016) DOI Author Url

Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16) DOI Public Url

Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA) :715-721 DOI Author Url

Maines C, Llewellyn-Jones D, Tang S, Zhou B. 2015. A Cyber Security Ontology for BPMN-Security Extensions 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015) DOI Author Url

Brumfitt H, askwith R, Zhou B. 2015. Lightweight Forensics Application: Lightweight Approach to Securing Mobile Devices The 15th IEEE International Conference on Computer and Information Technology, First International Workshop on Internet of Things: Smart Objects, Cloud and Applications DOI Author Url Public Url

Koh SS, Zhou B. 2015. BPMN Security Extensions for Healthcare Process The 13th IEEE International Conference on Pervasive Intelligence and Computing, BPMN Extension for Security Requirement in Healthcare Process DOI Author Url Public Url

Brumfitt H, askwith R, Zhou B. 2015. Protecting Future Personal Computing: Challenging Traditional Network Security Models 13th IEEE International Conference on Dependable, Autonomic and Secure Computing DOI Author Url Public Url

Asim M, Zarzosa S, Shi Q, Zhou B. 2015. A Policy Specification Language for Composite Services The Fifth International Conference on Advanced Collaborative Networks, Systems and Applications Public Url

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The Aniketos Service Composition Framework: Analysing and ranking of secure services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :121-135

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M. 2013. Prototype for Design-time Secure and Trustworthy Service Composition 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 10th IEEE Consumer Communications and Networking Conference (CCNC) :847-848 DOI Author Url

Asim M, Llewellyn-Jones D, Lempereur B, Zhou B, Shi Q, Merabti M. 2013. Event Driven Monitoring of Composite Services 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), ASE/IEEE International Conference on Social Computing (SocialCom) :550-557 DOI Author Url

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2013. A Framework for Secure Service Composition 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), ASE/IEEE International Conference on Social Computing (SocialCom) :647-652 DOI Author Url

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. Secure Service Composition Adaptation Based on Simulated Annealing Proceedings of the Layered Assurance Workshop (LAW) 2012, Annual Computer Security Applications Conference - ACSAC 28, Layered Assurance Workshop :49-55

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. A compose language-based framework for secure service composition Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012, :195-202 DOI Author Url

Zhou B, Shi Q, Merabti M. 2007. Towards energy-efficient intrusion detection in pervasive computing 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, IEEE International Conference on Communications (ICC 2007) :1417-1422 DOI Author Url

Zhou B, Shi Q, Merabti M. 2006. A Framework for Intrusion Detection in Heterogeneous Environments 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 3rd IEEE Consumer Communications and Networking Conference :1244-1248 DOI Author Url

Zhou B, Shi Q, Merabti M. 2006. Intrusion detection in pervasive networks based on a chi-square statistic test 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 30th Annual International Computer Software and Applications Conference :203-+ DOI Author Url

Zhou B, Shi Q, Merabti M. 2006. Real-time intrusion detection in ubiquitous networks with a string-based approach Gavrilova M, Gervasi O, Kumar V, Tan CJK, Taniar D, Lagana A, Mun Y, Choo H. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, International Conference on Computational Science and Its Applications (ICCSA 2006) 3983 :352-359 DOI Author Url

Zhou B, Shi Q, Merabti M. 2005. A novel service-oriented and user-centric intrusion detection system for ubiquitous networks Hamza MH. Proceedings of the IASTED International Conference on Communication, Network, and Information Security, IASTED International Conference on Communication, Network, and Information Security :76-81 Author Url

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. The aniketos service composition framework: Analysing and ranking of secure services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :121-135

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. A Compose Language-based Framework for Secure Service Composition ASE International Conference on Cyber Security (CyberSecurity 2012), Washington DC, USA, :14-16

Zhou B, Llewellyn-Jones D, Lamb DJ, Asim M, Shi Q, Merabti M. A Heuristic Approach for Secure Service Composition Adaptation First International Workshop on Cyberpatterns DOI

Koh SS, Zhou B, Yang P, Yang Z. A Survey on Urban Traffic Optimisation for Sustainable and Resilient Transportation Network Ninth International Conference on Developments in e-Systems Engineering - DeSE2016, DOI Author Url Public Url

Maines CL, Zhou B, Tang S, Shi Q. Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Language Developments in eSystems Engineering DOI Author Url Public Url

Koh SS, Zhou B, Yang P, Yang Z. Study of Group Route Optimization for IoT enabled Urban Transportation Network IEEE CPSCom/GreenCom/iThings/SmartData DOI Author Url Public Url

Brown J, Gao R, Ji Z, Chen J, Wu J, Zhang J, Zhou B, Shi Q, Crawford J, Zhang W. A low-power and high-speed True Random Number Generator using generated RTN 2018 Symposia on VLSI Technology and Circuits DOI Author Url Public Url

Zhou B, Al-Ani R, Shi Q, Sagheer A. A Survey on Secure Safety Applications in VANET The 16th IEEE Conference on Smart City DOI Author Url Public Url

Chapters

Brucker A, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The Aniketos Service Composition Framework Brucker A, Dalpiaz F, Giorgini P, Meland P, Rios E. Secure and Trustworthy Service Composition 8900 :121-135 Springer International Publishing 978-3-319-13517-5 DOI Publisher Url

Zhou B, Llewellyn-Jones D, Lamb D, Asim M, Shi Q, Merabti M. 2014. A Heuristic Approach for Secure Service Composition Adaptation Cyberpatterns DOI

Zhou B, Maines CL, Tang SOT, Shi Q. A Framework for the Visualisation of Cyber Security Requirements and its Application in BPMN Guide to Vulnerability Analysis for Computer Networks and Systems :339-366 Springer 9783319926230 Public Url

Engagement & Impact

Teaching qualification:

Fellow of Higher Education Academy (FHEA). 2016

Award:

Best Paper Award - System-of-Systems Boundary Check in a Public Event Scenario. 5th International Conference on Systems of Systems Engineering (SoSE 2010).. 2010

Research Grants Awarded:

Department for Culture, Media & Sport, Modelling Security Requirements for Businesses in 3D, Grant value (£): 50000.

Fellowships:

Early Career Researcher Fellowship, Liverpool John Moores University.