Liverpool Skyline

Department of Computer Science

Dr Kashif Kifayat

Dr Kashif Kifayat

Telephone: 0151 231 2379

Publications

Chapters

Abdlhamed M, Kifayat K, Shi Q, Hurst W. 2017. Intrusion prediction systems Studies in Computational Intelligence 691 :155-174 >DOI

Alohali B, Kifayat K, Shi Q, Hurst W. 2016. A key management scheme for secure communications based on smart grid requirements (KMS-CL-SG) Security Solutions and Applied Cryptography in Smart Grid Communications :242-265 9781522518310 >DOI

Kifayat K, Shamsa TB, Mackay M, Merabti M, Shi Q. 2012. Real time risk management in cloud computation Security Engineering for Cloud Computing: Approaches and Tools :123-145 9781466621251 >DOI

Conference Publication (journal proceedings)

Alohali B, Kifayat K, Shi Q, Hurst W. 2017. Replay attack impact on advanced metering infrastructure (AMI) Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 175 :52-59 >DOI

Abdlhamed M, Kifayat K, Shi Q, Hurst W. 2016. A system for intrusion prediction in cloud computing ACM International Conference Proceeding Series, 22-23-March-2016 >DOI

Alohali B, Kifayat K, Shi Q. 2016. Impact of Topology on Service Availability in a Smart Grid Advanced Metering Infrastructure The Eighth International Conference on Emerging Networks and Systems Intelligence

Lever KE, Kifayat K, Merabti M. 2015. Identifying Interdependencies Using Attack Graph Generation Methods Ismail L. 2015 11TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 11th International Conference on Innovations in Information Technology (IIT) :80-85 >Link

Lever KE, MacDermott A, Kifayat K. 2015. Evaluating Interdependencies and Cascading Failures Using Distributed Attack Graph Generation Methods for Critical Infrastructure Defence Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :47-52 >DOI >Link

Younis YA, Kifayat K, Shi Q, Askwith B. 2015. A New Prime and Probe Cache Side-Channel Attack for Cloud Computing Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :1719-1725 >DOI >Link

MacDermott A, Shi Q, Kifayat K. 2015. Collaborative Intrusion Detection in a Federated Cloud Environment Using the Dempster-Shafer Theory of Evidence Abouzakhar N. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 14th European Conference on Cyber Warfare and Security (ECCWS) :195-203 >Link

Alohali B, Merabti M, Kifayat K. 2014. A Cloud of Things (CoT) based Security for Home Area Network (HAN) in the Smart Grid 2014 EIGHTH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPS, SERVICES AND TECHNOLOGIES (NGMAST), 8th International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST) :326-330 >DOI >Link

Younis Y, Kifayat K, Merabti M. 2014. Cache Side-Channel Attacks in Cloud Computing EndicottPopovsky B. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2nd International Conference on Cloud Security Management (ICCSM) :138-146 >Link

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Securing complex system-of-systems compositions European Conference on Information Warfare and Security, ECCWS, :370-379

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, IEEE 10th International Conference on Ubiquitous Intelligence and Computing (UIC) / IEEE 10th International Conference on Autonomic and Trusted Computing (ATC) :438-443 >DOI >Link

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Detecting Behavioural Anomalies in System-of-Systems Components Proceedings of 14th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2013), 14th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2013)

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Misbehaviour Monitoring on System-of-Systems Components Crispo B, Sandhu R, CuppensBoulahia N, Conti M, Lanet JL. 2013 INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS), 8th International Conference on Risks and Security of Internet and Systems (CRiSIS) >Link

Shone N, Shi Q, Merabti M, Kifayat K. 2012. Securing a System-of-Systems From Component Misbehaviour Proceedings of the 13th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2012), 13th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2012)

Arabo A, Kennedy M, Shi Q, Merabti M, Llewellyn-Jones D, Kifayat K. 2011. Identity management in System-of-Systems Crisis Management situation Proceedings of 2011 6th International Conference on System of Systems Engineering: SoSE in Cloud Computing, Smart Grid, and Cyber Security, SoSE 2011, :37-42 >DOI

Shone N, Shi Q, Merabti M, Kifayat K. 2011. System-of-Systems Monitoring: A Survey Proceedings of 12th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2011), 12th Annual Postgraduate Symposium on Convergence of Telecommunications Networking and Broadcasting (PGNet 2011)

Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. 2010. Group-based key management for mobile sensor networks 33rd IEEE Sarnoff Symposium 2010, Conference Proceedings, >DOI

Fergus P, Kifayat K, Cooper S, Merabti M, El Rhalibi A. 2009. A framework for physical health improvement using wireless sensor networks and gaming 2009 3rd International Conference on Pervasive Computing Technologies for Healthcare - Pervasive Health 2009, PCTHealth 2009, >DOI

Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. 2009. An Efficient Multi-Parameter Group Leader Selection Scheme for Wireless Sensor Networks 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, International Conference on Network and Service Security :110-114 >Link

Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. 2007. Applying secure data aggregation techniques for a structure and density independent group based key management protocol Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security, :44-49 >DOI

Kifayat K, Merabti M, Qi S, Llewellyn-Jones D. 2007. Dynamic group-based key establishment for large-scale wireless sensor networks First International Conference on Communications and Networking in China, ChinaCom '06, >DOI

Journal Articles

Lever KE, Kifayat K. 2016. Risk assessment and attack graph generation for collaborative infrastructures: A survey International Journal of Critical Computer-Based Systems, 6 :204-228 >DOI

Lever KE, Kifayat K. 2016. The challenge of quantifying and modelling risk elements within collaborative infrastructures International Journal of Risk Assessment and Management, 19 :167-193 >DOI

Alohali B, Kifayat K, Shi Q, Hurst W. 2016. Group Authentication Scheme for Neighbourhood Area Networks (NANs) in Smart Grids Journal of Sensor and Actuator Networks, 5 :9-9 >DOI

Alohali B, Kifayat K, Shi Q, Hurst W. 2015. A Survey on Cryptography Key Management Schemes for Smart Grid Journal of Computer Sciences and Applications, Science and Education, 3 :27-39 >DOI

Kifayat K, Younis AY, Merabti MADJID. 2014. An access control model for cloud computing Journal of Information Security and Applications, 19 >Link

Shi Q, Zhang N, Merabti M, Kifayat K. 2013. Resource-efficient authentic key establishment in heterogeneous wireless sensor networks JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 73 :235-249 >DOI >Link

Kifayat K, Merabti M, Shi Q, Abbas S. 2013. Component-based security system (COMSEC) with QoS for wireless sensor networks SECURITY AND COMMUNICATION NETWORKS, 6 :461-472 >DOI >Link

Kifayat K, Fergus P, Cooper S, Merabti M. 2010. Body area networks for movement analysis in physiotherapy treatments 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, :866-872 >DOI

Zhou B, Drew O, Arabo A, Llewellyn-Jones D, Kifayat K, Merabti M, Shi Q, Craddock R, Waller A, Jones G. 2010. System-of-systems boundary check in a public event scenario 2010 5th International Conference on System of Systems Engineering, SoSE 2010, >DOI

Kifayat K, Merabti M, Shi Q, Liewellyn-Jones D. 2007. Application independent dynamic group-based key establishment for large-scale wireless sensor networks CHINA COMMUNICATIONS, 4 :14-27 >Link

Abbas S, Merabti M, Llewellyn-Jones D. A Lightweight Sybil Attack Detection in MANETs Piuri V. IEEE Systems Journal,