Liverpool Skyline

Department of Computer Science

Dr Bob Askwith

Dr Bob Askwith

Telephone: 0151 231 2320

twitter
LinkedIn

Publications

Conference publication

Brumfitt H, askwith R, Zhou B. 2015. Protecting Future Personal Computing: Challenging Traditional Network Security Models 13th IEEE International Conference on Dependable, Autonomic and Secure Computing

Brumfitt H, askwith R, Zhou B. 2015. Lightweight Forensics Application: Lightweight Approach to Securing Mobile Devices The 15th IEEE International Conference on Computer and Information Technology, First International Workshop on Internet of Things: Smart Objects, Cloud and Applications

Granby BR, Askwith RJ, Marnerides AK. 2015. SDN-PANDA: Software-Defined Network Platform for ANomaly Detection Applications 23rd IEEE International Conference on Network Protocols (ICNP'15) >DOI

Khan MZ, Merabti M, Askwith B, Bouhafs F. 2012. A Zone-Based Hierarchical Framework and Clustering Scheme for Energy-Efficient Wireless Sensor Networks 2012 IFIP WIRELESS DAYS (WD), IFIP Wireless Days (WD) >Link

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2009. Trusted Digital Rights Management in Peer-to-Peer Communities AlJumeily D, Nagar AK, Tawfik H, Hussain A, Lisboa P. 2009 SECOND INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2009), 2nd International Conference on Developments in eSystems Engineering :207-215 >DOI >Link

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. Buffer Overrun Prevention Through Component Composition Analysis

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation

Journal article

Muhammad A, Fergus P, Merabti M, Askwith B. 2010. Peer-to-peer overlay gateway services for home automation and management 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, :880-886 >DOI

Taylor MJ, Gresty D, Askwith R. 2001. Knowledge for network support INFORMATION AND SOFTWARE TECHNOLOGY, 43 :469-475 >DOI >Link

McWhirter P, Kifayat K, Shi Q, Askwith R. SQL Injection Attack Classification through the Feature Extraction of SQL Query strings using a Gap-Weighted String Subsequence Kernel Journal of Information Security and Applications,

Lee GM. Toward a Trust Evaluation Mechanism for in the Social Internet of Things Sensors,

Patent

Zhou B, Merabti M, Shi Q, Askwith B, Llewellyn-Jones D. 2007. System-of-Systems Security in a Public Event Scenario

Merabti M, Shi Q, Askwith B, Llewellyn-Jones D. Secure Component Composition for Personal Ubiquitous Computing: Project Summary

Merabti M, Shi Q, Askwith B, Llewellyn-Jones D. MATTS Technical Manual