Liverpool Skyline

Department of Computer Science

Dr Bo Zhou

Dr Bo Zhou

Telephone: 0151 231 2122

Biography

Dr Bo Zhou is a Senior Lecturer at the Department of Computer Science, Liverpool John Moores University. He has a long track record in network security, having worked in both academia and industry. Dr Zhou studied telecommunications at Northeastern University, China and Queen Mary University of London in the UK, before completing a PhD in Network Security at Liverpool John Moores University. Dr Zhou is widely published in network security and his research interests include intrusion detection systems, secure component composition, security visulisation, Digital Rights management, driving behavior identification, and group routing optimisation.

Languages

English
Chinese (Mandarin)
Russian

Degrees

2007, Liverpool John Moores University, Liverpool, United Kingdom, PhD - SUIDS: A Resource-Efficient Intrusion Detection System for Ubiquitous Computing Environments
2003, Queen Mary University of London, London, United Kingdom, MSc - Telecommunications
2002, Northeastern University, shenyang, China, BSc - Telecommunications

Publications

Journal Articles

Yang Q, Jiang L, Hao W, Zhou B, Yang P, Lv Z. 2017. PMU Placement in Electric Transmission Networks for Reliable State Estimation Against False Data Injection Attacks IEEE INTERNET OF THINGS JOURNAL, 4 :1978-1986 >DOI >Link

Zhou B, Zhang Q, Shi Q, Yang Q, Yang P, Yu Y. 2017. Measuring web service security in the era of Internet of Things Computers and Electrical Engineering, >DOI

Brucker AD, Zhou B, Malmignati F, Shi Q, Merabti M. 2017. Modelling, validating, and ranking of secure service compositions SOFTWARE-PRACTICE & EXPERIENCE, 47 :1923-1943 >DOI >Link

Song C, Sang J, Zhou B. 2016. A High Security Buyer-Seller Watermark Protocol based on Iris Biometric Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering), 9 :124-131 >DOI

Zhang Q, Xu Z, Zhou B. 2015. Group consensus measurement in MADM with multiple preference formats Journal of Decision Systems, >DOI

Zhang Q, Xu Z, Zhou B. 2015. Group consensus measurement in MADM with multiple preference formats Journal of Decision Systems, 24 :146-158 >DOI

Asim M, Zhou B, Llewellyn-Jones D, Shi Q, Merabti M. 2014. Dynamic monitoring of composed services 9783319044477 :235-245 >DOI

Su M, Li F, Tang Z, Yu Y, Zhou B. 2014. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application SCIENTIFIC WORLD JOURNAL, >DOI >Link

Zhou B, Drew O, Arabo A, Llewellyn-Jones D, Kifayat K, Merabti M, Shi Q, Craddock R, Waller A, Jones G. 2010. System-of-systems boundary check in a public event scenario 2010 5th International Conference on System of Systems Engineering, SoSE 2010, >DOI

Zhou B, Shi Q, Merabti M. 2008. Balancing intrusion detection resources in ubiquitous computing networks COMPUTER COMMUNICATIONS, 31 :3643-3653 >DOI >Link

Conference Publication (journal proceedings)

Lee GM, Zhou . 2017. From Personal Experience to Global Reputation for Trust Evaluation in the Social Internet of Things IEEE GLOBECOM 2017

Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA) :715-721 >DOI >Link

Sang KS, Zhou B, Yang P, Yang Z. 2016. A Survey on Urban Traffic Optimisation for Sustainable and Resilient Transportation Network Aljumeily D, Hussain A, Tawfik H, Hamdan H, Dawson T, Hind J. 2016 9TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2016), 9th International Conference on Developments in eSystems Engineering (DeSE) :233-238 >DOI >Link

Maines CL, Zhou B, Tang S, Shi Q. 2016. Adding a Third Dimension to BPMN as a means of Representing Cyber Security Requirements Aljumeily D, Hussain A, Tawfik H, Hamdan H, Dawson T, Hind J. 2016 9TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2016), 9th International Conference on Developments in eSystems Engineering (DeSE) :105-110 >DOI >Link

Zhou B, Shi Q, Yang P. 2016. A survey on quantitative evaluation of web service security Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, :715-721 >DOI

Asim M, Zarzosa S, Shi Q, Zhou B. 2015. A Policy Specification Language for Composite Services The Fifth International Conference on Advanced Collaborative Networks, Systems and Applications

Brumfitt HA, Askwith R, Zhou B. 2015. Protecting Future Personal Computing: Challenging Traditional Network Security Models Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :1773-1780 >DOI >Link

Sang KS, Zhou B. 2015. BPMN Security Extensions for Healthcare Process Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :2344-2349 >DOI >Link

Brumfitt HA, Askwith B, Zhou B. 2015. Lightweight Forensics Application: Lightweight Approach to Securing Mobile Devices Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :795-800 >DOI >Link

Maines CL, Llewellyn-Jones D, Tang S, Zhou B. 2015. A cyber security ontology for BPMN-security extensions Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :1757-1764 >DOI >Link

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The Aniketos Service Composition Framework: Analysing and ranking of secure services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :121-135

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The aniketos service composition framework: Analysing and ranking of secure services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :121-135

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2013. A Framework for Secure Service Composition 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), ASE/IEEE International Conference on Social Computing (SocialCom) :647-652 >DOI >Link

Asim M, Llewellyn-Jones D, Lempereur B, Zhou B, Shi Q, Merabti M. 2013. Event Driven Monitoring of Composite Services 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), ASE/IEEE International Conference on Social Computing (SocialCom) :550-557 >DOI >Link

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2013. A compose language-based framework for secure service composition Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012, :195-202 >DOI

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M. 2013. Prototype for Design-time Secure and Trustworthy Service Composition 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 10th IEEE Consumer Communications and Networking Conference (CCNC) :847-848 >Link

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. A Compose Language-based Framework for Secure Service Composition ASE International Conference on Cyber Security (CyberSecurity 2012), Washington DC, USA, :14-16

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. Secure Service Composition Adaptation Based on Simulated Annealing Proceedings of the Layered Assurance Workshop (LAW) 2012, Annual Computer Security Applications Conference - ACSAC 28, Layered Assurance Workshop :49-55

Zhou B, Shi Q, Merabti M. 2007. Towards energy-efficient intrusion detection in pervasive computing 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, IEEE International Conference on Communications (ICC 2007) :1417-1422 >DOI >Link

Zhou B, Shi Q, Merabti M. 2006. A Framework for Intrusion Detection in Heterogeneous Environments 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 3rd IEEE Consumer Communications and Networking Conference :1244-1248 >Link

Zhou B, Shi Q, Merabti M. 2006. Intrusion detection in pervasive networks based on a chi-square statistic test 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 30th Annual International Computer Software and Applications Conference :203-+ >Link

Zhou B, Shi Q, Merabti M. 2006. Real-time intrusion detection in ubiquitous networks with a string-based approach Gavrilova M, Gervasi O, Kumar V, Tan CJK, Taniar D, Lagana A, Mun Y, Choo H. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, International Conference on Computational Science and Its Applications (ICCSA 2006) 3983 :352-359 >Link

Zhou B, Shi Q, Merabti M. 2005. A novel service-oriented and user-centric intrusion detection system for ubiquitous networks Hamza MH. Proceedings of the IASTED International Conference on Communication, Network, and Information Security, IASTED International Conference on Communication, Network, and Information Security :76-81 >Link

Koh SS, Zhou B, Yang P, Yang Z. Study of Group Route Optimization for IoT enabled Urban Transportation Network IEEE CPSCom/GreenCom/iThings/SmartData

Maines CL, Zhou B, Tang S, Shi Q. Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Language Developments in eSystems Engineering

Zhou B, Llewellyn-Jones D, Lamb DJ, Asim M, Shi Q, Merabti M. A Heuristic Approach for Secure Service Composition Adaptation First International Workshop on Cyberpatterns

Chapters

Zhou B, Llewellyn-Jones D, Lamb D, Asim M, Shi Q, Merabti M. 2014. A Heuristic Approach for Secure Service Composition Adaptation Cyberpatterns >DOI

Brucker A, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The Aniketos Service Composition Framework Brucker A, Dalpiaz F, Giorgini P, Meland P, Rios E. Secure and Trustworthy Service Composition 8900 :121-135 Springer International Publishing 978-3-319-13517-5 >DOI

Engagement & Impact

Award:

Award title: Best Paper Award - System-of-Systems Boundary Check in a Public Event Scenario. 5th International Conference on Systems of Systems Engineering (SoSE 2010).

Fellowships:

Fellowship title: Early Career Researcher Fellowship, Organisation: Liverpool John Moores University

Research Grants Awarded:

Department for Culture, Media & Sport, Modelling Security Requirements for Businesses in 3D, Grant value (£): 50000

Teaching qualification:

Title of qualification gained: Fellow of Higher Education Academy (FHEA)