Liverpool Skyline

Department of Computer Science

Dr Kashif Kifayat

Dr Kashif Kifayat

Telephone: 0151 231 2379

Publications

Conference publication

Mac Dermott AM, Shi Q, Kifayat K. 2017. Distributed attack prevention using Dempster-Shafer theory of evidence Huang DS., Hussain A., Han K., Gromiha M. (eds) Intelligent Computing Methodologies., International Conference on Intelligent Computing (ICIC 2017) Lecture Notes in Computer Science, vol 10363. :203-212 >DOI

Alohali B, Kifayat K, Shi Q, Hurst W. 2017. Replay attack impact on advanced metering infrastructure (AMI) Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 175 :52-59 >DOI

Abdlhamed M, Kifayat K, Shi Q, Hurst W. 2016. A system for intrusion prediction in cloud computing ACM International Conference Proceeding Series, 22-23-March-2016 >DOI

Alohali B, Kifayat K, Shi Q. 2016. Impact of Topology on Service Availability in a Smart Grid Advanced Metering Infrastructure The Eighth International Conference on Emerging Networks and Systems Intelligence

Younis AY, Kifayat K, Merabti M. 2015. A Novel Evaluation Criteria to Cloud Based Access Control Models Ismail L. 2015 11TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 11th International Conference on Innovations in Information Technology (IIT) :68-73 >Link

MacDermott A, Shi Q, Kifayat K. 2015. Detecting Intrusions in Federated Cloud Environments Using Security as a Service Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :91-96 >DOI >Link

Lever KE, Kifayat K, Merabti M. 2015. Identifying Interdependencies Using Attack Graph Generation Methods Ismail L. 2015 11TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 11th International Conference on Innovations in Information Technology (IIT) :80-85 >Link

Lever KE, MacDermott A, Kifayat K. 2015. Evaluating Interdependencies and Cascading Failures Using Distributed Attack Graph Generation Methods for Critical Infrastructure Defence Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :47-52 >DOI >Link

Younis YA, Kifayat K, Shi Q, Askwith B. 2015. A New Prime and Probe Cache Side-Channel Attack for Cloud Computing Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :1719-1725 >DOI >Link

MacDermott A, Shi Q, Kifayat K. 2015. Collaborative Intrusion Detection in a Federated Cloud Environment Using the Dempster-Shafer Theory of Evidence Abouzakhar N. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 14th European Conference on Cyber Warfare and Security (ECCWS) :195-203 >Link

Alohali B, Merabti M, Kifayat K. 2014. A Cloud of Things (CoT) based Security for Home Area Network (HAN) in the Smart Grid 2014 EIGHTH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPS, SERVICES AND TECHNOLOGIES (NGMAST), 8th International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST) :326-330 >DOI >Link

Younis Y, Kifayat K, Merabti M. 2014. Cache Side-Channel Attacks in Cloud Computing EndicottPopovsky B. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2nd International Conference on Cloud Security Management (ICCSM) :138-146 >Link

MacDermott A, Shi Q, Merabti M, Kifayat K. 2013. Protecting critical infrastructure services in the cloud environment European Conference on Information Warfare and Security, ECCWS, :336-343

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Securing complex system-of-systems compositions European Conference on Information Warfare and Security, ECCWS, 12th European Conference on Cyber Warfare and Security ECCWS-2013 :370-379

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, IEEE 10th International Conference on Ubiquitous Intelligence and Computing (UIC) / IEEE 10th International Conference on Autonomic and Trusted Computing (ATC) :438-443 >DOI >Link

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Detecting Behavioural Anomalies in System-of-Systems Components Proceedings of 14th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2013), 14th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2013)

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Misbehaviour monitoring on system-of-systems components International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013, :1-6 >DOI

Shone N, Shi Q, Merabti M, Kifayat K. 2012. Securing a System-of-Systems From Component Misbehaviour Proceedings of the 13th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2012), 13th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2012)

Arabo A, Kennedy M, Shi Q, Merabti M, Llewellyn-Jones D, Kifayat K. 2011. Identity management in System-of-Systems Crisis Management situation Proceedings of 2011 6th International Conference on System of Systems Engineering: SoSE in Cloud Computing, Smart Grid, and Cyber Security, SoSE 2011, :37-42 >DOI

Shone N, Shi Q, Merabti M, Kifayat K. 2011. System-of-Systems Monitoring: A Survey Proceedings of 12th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2011), 12th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2011)

Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. 2010. Group-based key management for mobile sensor networks 33rd IEEE Sarnoff Symposium 2010, Conference Proceedings, >DOI

Fergus P, Kifayat K, Cooper S, Merabti M, El Rhalibi A. 2009. A framework for physical health improvement using wireless sensor networks and gaming 2009 3rd International Conference on Pervasive Computing Technologies for Healthcare - Pervasive Health 2009, PCTHealth 2009, >DOI

Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. 2009. An Efficient Multi-Parameter Group Leader Selection Scheme for Wireless Sensor Networks 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, International Conference on Network and Service Security :110-114 >Link

Kifayat K, Merabti M, Qi S, Llewellyn-Jones D. 2007. Dynamic group-based key establishment for large-scale wireless sensor networks First International Conference on Communications and Networking in China, ChinaCom '06, >DOI

Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. Applying Secure Data Aggregation Techniques for a Structure and Density Independent Group Based Key Management Protocol

Chapters

Abdlhamed M, Kifayat K, Shi Q, Hurst W. 2017. Intrusion prediction systems Studies in Computational Intelligence 691 :155-174 >DOI

Alohali B, Kifayat K, Shi Q, Hurst W. 2016. A key management scheme for secure communications based on smart grid requirements (KMS-CL-SG) Security Solutions and Applied Cryptography in Smart Grid Communications :242-265 9781522518310 >DOI

Kifayat K, Baker T, Mackay MI, shi Q, Merabti M. Real Time Risk Management in Cloud Computation Security Engineering for Cloud Computing: Approaches and Tools >DOI

Journal article

Lever KE, Kifayat K. 2016. Risk assessment and attack graph generation for collaborative infrastructures: A survey International Journal of Critical Computer-Based Systems, 6 :204-228 >DOI

Lever KE, Kifayat K. 2016. The challenge of quantifying and modelling risk elements within collaborative infrastructures International Journal of Risk Assessment and Management, 19 :167-193 >DOI

MacDermott Á, Shi Q, Merabti M, Kifayat K. 2015. Hosting critical infrastructure services in the cloud environment considerations International Journal of Critical Infrastructures, 11 :365-381 >DOI

Alohali B, Kifayat K, Shi Q, Hurst W. 2015. A Survey on Cryptography Key Management Schemes for Smart Grid Journal of Computer Sciences and Applications, Science and Education, 3 :27-39 >DOI

Mac Dermott AM, Shi Q, Kifayat K. 2014. An elastic scaling method for cloud security The Journal of Internet Technology and Secured Transactions (JITST), 3 :254-262 >DOI

Kifayat K, Younis AY, Merabti MADJID. 2014. An access control model for cloud computing Journal of Information Security and Applications, 19 >Link

Shi Q, Zhang N, Merabti M, Kifayat K. 2013. Resource-efficient authentic key establishment in heterogeneous wireless sensor networks JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 73 :235-249 >DOI >Link

Kifayat K, Merabti M, Shi Q, Abbas S. 2013. Component-based security system (COMSEC) with QoS for wireless sensor networks SECURITY AND COMMUNICATION NETWORKS, 6 :461-472 >DOI >Link

Kifayat K, Fergus P, Cooper S, Merabti M. 2010. Body area networks for movement analysis in physiotherapy treatments 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, :866-872 >DOI

Zhou B, Drew O, Arabo A, Llewellyn-Jones D, Kifayat K, Merabti M, Shi Q, Craddock R, Waller A, Jones G. 2010. System-of-systems boundary check in a public event scenario 2010 5th International Conference on System of Systems Engineering, SoSE 2010, >DOI

Kifayat K, Merabti M, Shi Q, Liewellyn-Jones D. 2007. Application independent dynamic group-based key establishment for large-scale wireless sensor networks CHINA COMMUNICATIONS, 4 :14-27 >Link

McWhirter P, Kifayat K, Shi Q, Askwith R. SQL Injection Attack Classification through the Feature Extraction of SQL Query strings using a Gap-Weighted String Subsequence Kernel Journal of Information Security and Applications,

Taylor MJ, baskett M, Allen M, francis H, kifayat K. Animation as an aid to support the teaching of cyber security concepts Innovations in Education and Teaching International,

Mac Dermott AM, Shi Q, Kifayat K. Collaborative Intrusion Detection in Federated Cloud Environments Journal of Computer Sciences and Applications, 3 :10-20 >DOI

Alohali B, Kifayat K, Shi Q, Hurst W. Group Authentication Scheme for Neighbourhood Area Networks(NANs) In Smart Grids Journal of Sensor and Actuator Networks,

Abbas S, Merabti M, Llewellyn-Jones D. A Lightweight Sybil Attack Detection in MANETs Piuri V. IEEE Systems Journal,