Liverpool Skyline

Department of Computer Science

Prof Qi Shi

Prof Qi Shi

Telephone: 0151 231 2272

Biography

Current Position:

Qi Shi is a Professor in Computer Security, and Director of the PROTECT Research Centre for Critical Infrastructure Computer Technology & Protection.

Research Interests:

Qi Shi’s research is centred on the increasingly important theme of ubiquitous/distributed computing security and privacy with the long-term goal of developing general frameworks for the intelligent provision of security and privacy protection to various applications. Specifically, his main research interests include the following areas:

· System-of-systems security: Develop a software framework for the automated security monitoring, evaluation and control of a system of systems in ubiquitous and cloud computing settings at runtime.

· E-commerce security: Produce methods for privacy enhanced public-key certification and cryptographic protocols for the security and privacy protection of electronic transactions conducted over the Internet.

· Intrusion and denial-of-service detection: Design cost-effective solutions to the early detection and prevention of intrusion and denial-of-service attacks within the network routing infrastructure and in ubiquitous computing environments.

· Sensor network security: Develop resource-efficient algorithms, mechanisms and protocols for key establishment and secure communication among sensor nodes.

· Cloud computing security: Investigate efficient ways for data processing in cloud environments while protecting their security and privacy against unauthorized access.

· Identity management: Devise efficient and lightweight approaches to user-centric and situation-aware identity management for the privacy protection of mobile ad-hoc networks.

· Computer forensics: Propose more effective methods for targeted data collection, uniform data representation, forensic analysis and result visualisation.

Research Publications:

Qi Shi has published over 180 research papers in international journals and conference proceedings.

Research Projects:

Qi Shi is involved in the supervision of a number of research projects in the above research areas. For example, he is one of the investigators of a large EU FP7 project, ANIKETOS, which involves 17 partners in 10 EU countries with a total grant of €9.6 million, for the development of secure and trustworthy composite services.

Research Students:

Qi Shi is supervising a number of international and home research students working in some research areas listed above. He also welcomes prospective research students with interests in the above research areas or others to apply for studies here. Applications can be submitted online at http://www.ljmu.ac.uk/pgapplication/114150.htm.

Other Academic Activities:

Qi Shi is a member of editorial boards and a paper reviewer for a number of international journals and a member or chair of program committees for many international conferences. Qi also serves as an external research degree examiner, taught course examiner and a member of several advisory committees.

Publications

Conference publication

Raschellà A, Bouhafs F, Mackay M, Shi Q, Ortín J, Gállego JR, Canales M. 2018. AP selection algorithm based on a potential game for large IEEE 802.11 WLANs IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, :1-7 >DOI

Mac Dermott AM, Shamsa TB, Shi Q. 2018. IoT Forensics: Challenges For The IoA Era 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS) :1-5 >DOI

Thulnoon AA, Lempereur B, Shi Q, Al-Jumeily D. 2017. Using aspect oriented programming to enforce privacy preserving communication in distributed systems ACM International Conference Proceeding Series, >DOI

Mac Dermott AM, Shi Q, Kifayat K. 2017. Distributed attack prevention using Dempster-Shafer theory of evidence Huang DS., Hussain A., Han K., Gromiha M. (eds) Intelligent Computing Methodologies., International Conference on Intelligent Computing (ICIC 2017) Lecture Notes in Computer Science, vol 10363. :203-212 >DOI

Alohali B, Kifayat K, Shi Q, Hurst W. 2017. Replay attack impact on advanced metering infrastructure (AMI) Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 175 :52-59 >DOI

Abdlhamed M, Kifayat K, Shi Q, Hurst W. 2016. A system for intrusion prediction in cloud computing ACM International Conference Proceeding Series, 22-23-March-2016 >DOI

Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA) :715-721 >DOI >Link

Seyedebrahimi M, Raschella A, Bouhafs F, Mackay M, Shi Q, Eiza MH. 2016. A Centralised Wi-Fi Management Framework for D2D Communications in Dense Wi-Fi Networks 2016 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), IEEE Conference on Standards for Communications and Networking (CSCN) >Link

Seyedebrahimi M, Bouhafs F, Raschella A, Mackay M, Shi Q. 2016. SDN-Based Channel Assignment Algorithm for Interference Management in Dense Wi-Fi Networks 2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), European Conference on Networks and Communications (EuCNC) :128-132 >Link

Raschella A, Bouhafs F, Seyedebrahimi M, Mackay M, Shi Q. 2016. A Centralized Framework for Smart Access Point Selection based on the Fittingness Factor 2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 23rd International Conference on Telecommunications (ICT) >DOI >Link

Alohali B, Kifayat K, Shi Q. 2016. Impact of Topology on Service Availability in a Smart Grid Advanced Metering Infrastructure The Eighth International Conference on Emerging Networks and Systems Intelligence

Hurst W, Shone N, Shi Q, Bazli B. 2016. MICRO-CI: A Testbed for Cyber-Security Research he Eighth International Conference on Emerging Networks and Systems Intelligence

Maines C, Zhou B, Tang SOT, Shi Q. 2016. Adding a Third Dimension to BPMN as a means of Representing Cyber Security Requirements 9th International Conference on Developments in e-Systems Engineering (DESE2016)

Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16)

Hashem Eiza M, Shi QI, Marnerides AK, Owens T. 2016. Secure and Privacy-Aware Proxy Mobile IPv6 Protocol for Vehicle-to-Grid Networks IEEE International Conference on Communications (ICC)

Shone N, Dobbins C, Hurst W, Shi Q. 2016. Digital Memories Based Mobile User Authentication for IoT 015 IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15) :1796-1802 >DOI

MacDermott A, Shi Q, Kifayat K. 2015. Detecting Intrusions in Federated Cloud Environments Using Security as a Service Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :91-96 >DOI >Link

Buck P, Shi Q, MacDermott A. 2015. A Selective Regression Testing Approach for Composite Web Services Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :97-101 >DOI >Link

Younis YA, Kifayat K, Shi Q, Askwith B. 2015. A New Prime and Probe Cache Side-Channel Attack for Cloud Computing Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :1719-1725 >DOI >Link

Baharon MR, Shi Q, Llewellyn-Jones D. 2015. A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :618-625 >DOI >Link

Asim M, Zarzosa S, Shi Q, Zhou B. 2015. A Policy Specification Language for Composite Services The Fifth International Conference on Advanced Collaborative Networks, Systems and Applications

MacDermott A, Shi Q, Kifayat K. 2015. Collaborative Intrusion Detection in a Federated Cloud Environment Using the Dempster-Shafer Theory of Evidence Abouzakhar N. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 14th European Conference on Cyber Warfare and Security (ECCWS) :195-203 >Link

MacDermott A, Hurst W, Shi Q, Merabti M. 2014. Simulating Critical Infrastructure Cascading Failure AlDabass D, Orsoni A, Cant R, Yunus J, Ibrahim Z, Saad I. 2014 UKSIM-AMSS 16TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 16th UKSim-AMSS International Conference on Computer Modelling and Simulation (UKSim) :324-329 >DOI >Link

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The Aniketos Service Composition Framework: Analysing and ranking of secure services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :121-135

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The aniketos service composition framework: Analysing and ranking of secure services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :121-135

Asim M, Lempereur B, Shi Q, Yautsiukhin A, Brucker AD. 2014. Security policy monitoring of composite services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :192-202

MacDermott A, Shi Q, Merabti M, Kifayat K. 2013. Protecting critical infrastructure services in the cloud environment European Conference on Information Warfare and Security, ECCWS, :336-343

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Securing complex system-of-systems compositions European Conference on Information Warfare and Security, ECCWS, 12th European Conference on Cyber Warfare and Security ECCWS-2013 :370-379

Baharon MR, Shi Q, Llewellyn-Jones D, Merabti M. 2013. Efficient and secure remote data storing and processing European Conference on Information Warfare and Security, ECCWS, :397-401

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2013. A Framework for Secure Service Composition 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), ASE/IEEE International Conference on Social Computing (SocialCom) :647-652 >DOI >Link

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Misbehaviour monitoring on system-of-systems components International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013, :1-6 >DOI

MacDermott A, Shi Q, Merabti M, Kifiyat K. 2013. Considering an Elastic Scaling Model for Cloud Security 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 8th International Conference for Internet Technology and Secured Transactions (ICITST) :150-155 >Link

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, IEEE 10th International Conference on Ubiquitous Intelligence and Computing (UIC) / IEEE 10th International Conference on Autonomic and Trusted Computing (ATC) :438-443 >DOI >Link

Baharon MR, Shi Q, Llewellyn-Jones D, Merabti M. 2013. Secure Rendering Process in Cloud Computing CastellaRoca J, GarciaAlfaro J, Jensen CD, Onut IV, Torra V, DomingoFerrer J, Ghorbani AA, Manjon JA, Stakhanova N, Zhang J. 2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 11th Annual International Conference on Privacy, Security and Trust (PST) :82-87 >Link

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M. 2013. Prototype for Design-time Secure and Trustworthy Service Composition 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 10th IEEE Consumer Communications and Networking Conference (CCNC) :847-848 >Link

Asim M, Llewellyn-Jones D, Lempereur B, Zhou B, Shi Q, Merabti M. 2013. Event Driven Monitoring of Composite Services 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), ASE/IEEE International Conference on Social Computing (SocialCom) :550-557 >DOI >Link

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2013. A compose language-based framework for secure service composition Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012, :195-202 >DOI

Kennedy M, Llewellyn-Jones D, Shi Q, Merabti M. 2012. A framework for measuring security of services in ubiquitous computing environments 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012, :112-117 >DOI

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. A Compose Language-based Framework for Secure Service Composition ASE International Conference on Cyber Security (CyberSecurity 2012), Washington DC, USA, :14-16

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. Secure Service Composition Adaptation Based on Simulated Annealing Proceedings of the Layered Assurance Workshop (LAW) 2012, Annual Computer Security Applications Conference - ACSAC 28, Layered Assurance Workshop :49-55

Lempereur B, Merabti M, Shi Q. 2011. Information flow monitoring: Model, policy, and analysis Proceedings - 4th International Conference on Developments in eSystems Engineering, DeSE 2011, :227-232 >DOI

Arabo A, Kennedy M, Shi Q, Merabti M, Llewellyn-Jones D, Kifayat K. 2011. Identity management in System-of-Systems Crisis Management situation Proceedings of 2011 6th International Conference on System of Systems Engineering: SoSE in Cloud Computing, Smart Grid, and Cyber Security, SoSE 2011, :37-42 >DOI

Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. 2010. Group-based key management for mobile sensor networks 33rd IEEE Sarnoff Symposium 2010, Conference Proceedings, >DOI

Arabo A, Shi Q, Merabti M. 2010. Dynamic Device Configuration in Ubiquitous Environments DeMagalhaes ST, Jahankhani H, Hessami AG. GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, 6th International Conference on Global Security, Safety and Sustainability (ICGS3) 92 :263-273 >Link

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2009. Trusted Digital Rights Management in Peer-to-Peer Communities AlJumeily D, Nagar AK, Tawfik H, Hussain A, Lisboa P. 2009 SECOND INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2009), 2nd International Conference on Developments in eSystems Engineering :207-215 >DOI >Link

Drew O, Shi Q, Merabti M. 2009. Policy Translation and Reconciliation Techniques for the System-of-Systems Domain Jahankhani H, Hessami AG, Hsu F. GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, PROCEEDINGS, 5th International Conference on Global Security, Safety and Sustainability (ICGS3 2009) 45 :183-190 >Link

Arabo A, Shi Q, Merabti M. 2009. Towards a Context-Aware Identity Management in Mobile Ad-hoc Networks (IMMANets) 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 23rd International Conference on Advanced Information Networking and Applications Workshops :588-594 >DOI >Link

Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. 2009. An Efficient Multi-Parameter Group Leader Selection Scheme for Wireless Sensor Networks 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, International Conference on Network and Service Security :110-114 >Link

Zhang N, Yao L, Nenadic A, Chin J, Goble C, Rector A, Chadwick D, Otenko S, Shi Q. 2007. Achieving fine-grained access control in virtual organizations Concurrency Computation Practice and Experience, 19 :1333-1352 >DOI

Zhang N, Yao L, Nenadic A, Chin J, Goble C, Rector A, Chadwick D, Otenko S, Shi Q. 2007. Achieving fine-grained access control in virtual organizations CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2nd International Workshop on Emerging Technologies for Next-Generation GRID (ETNGRID 2005) 19 :1333-1352 >DOI >Link

Zhou B, Shi Q, Merabti M. 2007. Towards energy-efficient intrusion detection in pervasive computing 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, IEEE International Conference on Communications (ICC 2007) :1417-1422 >DOI >Link

Haggerty J, Shi Q, Fergus P, Merabti M. 2006. Data authentication and trust within distributed intrusion detection system inter-component communications Blyth A. EC2ND 2005, PROCEEDINGS, 1st European Conference on Computer Network Defence (EC2ND) :197-+ >DOI >Link

Zhou B, Shi Q, Merabti M. 2006. Real-time intrusion detection in ubiquitous networks with a string-based approach Gavrilova M, Gervasi O, Kumar V, Tan CJK, Taniar D, Lagana A, Mun Y, Choo H. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, International Conference on Computational Science and Its Applications (ICCSA 2006) 3983 :352-359 >Link

Zhou B, Shi Q, Merabti M. 2006. Intrusion detection in pervasive networks based on a chi-square statistic test 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 30th Annual International Computer Software and Applications Conference :203-+ >Link

Zhou B, Shi Q, Merabti M. 2006. A Framework for Intrusion Detection in Heterogeneous Environments 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 3rd IEEE Consumer Communications and Networking Conference :1244-1248 >Link

Zhang N, Rector A, Buchan I, Shi Q, Kalra D, Rogers J, Goble C, Walker S, Ingram D, Singleton P. 2005. A linkable identity privacy algorithm for healthgrid Studies in Health Technology and Informatics, 112 :234-245

Zhang N, Yao L, Chin J, Shi Q, Nenadic A, McNab A, Rector A, Goble C. 2005. Plugging a scalable authentication framework into Shibboleth Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE, 2005 :271-276 >DOI

Haggerty J, Shi Q, Merabti M. 2005. Statistical signatures for early detection of flooding denial-of-service attacks Sasaki R, Qing S, Okamoto E, Yoshiura H. SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 20th International Information Security Conference 181 :327-341 >Link

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2005. Short paper: Harnessing emergent ubiquitous computing properties to prevent malicious code propagation FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks :243-245 >DOI >Link

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2005. Buffer overrun prevention through component composition analysis Proceedings of the 29th Annual International Computer Software and Applications Conference, 29th Annual International Computer Software and Applications Conference :156-163 >Link

Zhou B, Shi Q, Merabti M. 2005. A novel service-oriented and user-centric intrusion detection system for ubiquitous networks Hamza MH. Proceedings of the IASTED International Conference on Communication, Network, and Information Security, IASTED International Conference on Communication, Network, and Information Security :76-81 >Link

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2004. An extensible framework for practical secure component composition in a ubiquitous computing environment Srimani PK. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, International Conference on Information Technology - Coding and Computing :112-117 >DOI >Link

Haggerty J, Berry T, Shi Q, Merabti M. 2004. DiDDeM: A system for early detection of TCP SYN flood attacks GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, IEEE Global Telecommunications Conference (GLOBECOM 04) :2037-2042 >Link

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2004. A security framework for executables in a ubiquitous computing environment GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, IEEE Global Telecommunications Conference (GLOBECOM 04) :2158-2163 >Link

Abimbola A, Shi Q, Merabti M. 2003. NetHost-sensor: A novel concept in intrusion detection systems Bilof R. EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 8th IEEE International Symposium on Computers and Communication (ISCC 2003) :232-237 >DOI >Link

Haggerty J, Shi Q, Merabti M. 2002. Beyond the perimeter: the need for early detection of denial of service attacks 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 18th Annual Computer Security Applications Conference :413-422 >DOI >Link

Haggerty J, Shi Q, Merabti M. 2002. The threat from within - An analysis of attacks on an internal network Ghonaimy MA, ElHadidi MT, Aslan HK. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 17th International Conference on Information Security 86 :133-145 >Link

Askwith B, Shi Q, Merabti M. 2002. Secure Component Composition for Networked Appliances Merabti M, Askwith B. 5TH IEEE INTERNATIONAL WORKSHOP ON NETWORKED APPLIANCES, PROCEEDINGS, 5th IEEE International Workshop on Networked Appliances :29-34 >Link

Gresty DW, Shi Q, Merabti M. 2001. Requirements for a general framework for response to distributed denial-of-service 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 17th Annual Computer Security Applications Conference :422-429 >DOI >Link

Al-Dahhan R, Shi Q, Lee GM, Kifayat K. Access Privilege Elevation and Revocation in Collusion-Resistant Cloud Access Control 2018 IEEE Second World Conference on Smart Trends in Systems, Security and Sustainability

Al-Dahhan RR, Shi Q, Lee GM, Kifayat K. Revocable, Decentralized Multi-authority Access Control System 11th IEEE/ACM International Conference on Utility and Cloud Computing

Hartog FD, Bouhafs F, Shi Q. Toward secure trading of unlicensed spectrum in cyber-physical systems 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)

Zhou B, Al-Ani R, Shi Q, Sagheer A. A Survey on Secure Safety Applications in VANET The 16th IEEE Conference on Smart City

Brown J, Gao R, Ji Z, Chen J, Wu J, Zhang J, Zhou B, Shi Q, Crawford J, Zhang W. A low-power and high-speed True Random Number Generator using generated RTN 2018 Symposia on VLSI Technology and Circuits >Link

Vu Dinh P, Tran Nguyen N, Shone N, Mac Dermott A, Shi Q. Deep Learning Combined with De-noising Data for Network Intrusion Detection Intelligent and Evolutionary Systems (IES 2017)

Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. Applying Secure Data Aggregation Techniques for a Structure and Density Independent Group Based Key Management Protocol

Maines CL, Zhou B, Tang S, Shi Q. Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Language Developments in eSystems Engineering

Seyedebrahimi M, Bouhafs F, Raschella A, Mackay M, Shi Q. Fine-Grained Radio Resource Management to Control Interference in Dense Wi-Fi Networks

Journal article

Moara-Nkwe K, Shi Q, Lee G, EIZA M. 2018. A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks IEEE Access, 6 :11374-11387 >DOI

Asim M, Yautsiukhin A, Brucker A, Baker T, Shi Q, Lempereur B. 2018. Security Policy Monitoring of BPMN-based Service Compositions Journal of Software: Evolution and Process, >DOI

Zhou B, Zhang Q, Shi Q, Yang Q, Yang P, Yu Y. 2017. Measuring Web Service Security in the Era of Internet of Things Computers and Electrical Engineering, >DOI

Brucker A, Zhou B, Malmignati F, Shi Q, Merabti M. 2017. Modelling, Validating, and Ranking of Secure Service Compositions Software: Practice and Experience,

Hurst W, Shone N, Shi Q, Bazli B. 2017. Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research International Journal On Advances in Security, 10 :114-125

Raschella A, Bouhafs F, Seyedebrahimi M, Mackay M, Shi Q. 2017. Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks IEEE Transactions on Network and Service Management, 14 >DOI

Hashem Eiza M, Ni Q, Shi QI. 2016. Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G Enabled Vehicular Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, >DOI

MacDermott Á, Shi Q, Merabti M, Kifayat K. 2015. Hosting critical infrastructure services in the cloud environment considerations International Journal of Critical Infrastructures, 11 :365-381 >DOI

Alohali B, Kifayat K, Shi Q, Hurst W. 2015. A Survey on Cryptography Key Management Schemes for Smart Grid Journal of Computer Sciences and Applications, Science and Education, 3 :27-39 >DOI

Hashem Eiza M, Owens T, Ni Q, Shi Q. 2015. Situation-Aware QoS Routing Algorithm for Vehicular Ad hoc Networks IEEE Transactions on Vehicular Technology, 64 :5520-5535 >DOI

Mac Dermott AM, Shi Q, Kifayat K. 2014. An elastic scaling method for cloud security The Journal of Internet Technology and Secured Transactions (JITST), 3 :254-262 >DOI

Lempereur B, Ayed D, Asim M, Merabti M, Shi Q. 2014. Monitoring threats to composite services within the aniketos run-time framework Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :173-191

Asim M, Yautsiukhin A, Brucker AD, Lempereur B, Shi Q. 2014. Security policy monitoring of composite services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :192-202

Asim M, Zhou B, Llewellyn-Jones D, Shi Q, Merabti M. 2014. Dynamic monitoring of composed services 9783319044477 :235-245 >DOI

Lempereur B, Asim M, Merabti M, Shi Q, Ayed D. 2014. Monitoring threats to composite services within the aniketos run-time framework Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :173-191

Lempereur B, Merabti M, Shi Q. 2013. A platform for the evaluation of live digital forensics :123-137 >DOI

Shi Q, Zhang N, Merabti M, Kifayat K. 2013. Resource-efficient authentic key establishment in heterogeneous wireless sensor networks JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 73 :235-249 >DOI >Link

Kifayat K, Merabti M, Shi Q, Abbas S. 2013. Component-based security system (COMSEC) with QoS for wireless sensor networks SECURITY AND COMMUNICATION NETWORKS, 6 :461-472 >DOI >Link

Lempereur B, Merabti M, Shi Q. 2012. Pypette: A platform for the evaluation of live digital forensics International Journal of Digital Crime and Forensics, 4 :31-46 >DOI

Shi Q, Zhang N, Llewellyn-Jones D. 2012. Efficient autonomous signature exchange on ubiquitous networks JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 35 :1793-1806 >DOI >Link

Shi Q, Zhang N, Merabti M. 2011. Fair exchange of valuable information: A generalised framework JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 77 :348-371 >DOI >Link

Shi Q, Zhang N, Merabti M, Askwith R. 2011. Achieving autonomous fair exchange in ubiquitous network settings JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 34 :653-667 >DOI >Link

Zhou B, Drew O, Arabo A, Llewellyn-Jones D, Kifayat K, Merabti M, Shi Q, Craddock R, Waller A, Jones G. 2010. System-of-systems boundary check in a public event scenario 2010 5th International Conference on System of Systems Engineering, SoSE 2010, >DOI

Zhou B, Shi Q, Merabti M. 2008. Balancing intrusion detection resources in ubiquitous computing networks COMPUTER COMMUNICATIONS, 31 :3643-3653 >DOI >Link

Kifayat K, Merabti M, Shi Q, Liewellyn-Jones D. 2007. Application independent dynamic group-based key establishment for large-scale wireless sensor networks CHINA COMMUNICATIONS, 4 :14-27 >Link

Zhang N, Shi Q, Merabti M, Askwith R. 2006. Practical and efficient fair document exchange over networks JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 29 :46-61 >DOI >Link

Zhang N, Shi Q, Merabti M. 2005. Revocation of privacy-enhanced public-key certificates JOURNAL OF SYSTEMS AND SOFTWARE, 75 :205-214 >DOI >Link

Zhang N, Shi Q, Nenadic A, Merabti M, Askwith R. 2005. Efficient fair digital-signature exchange based on misbehaviour penalisation IEE PROCEEDINGS-COMMUNICATIONS, 152 :257-261 >DOI >Link

Haggerty J, Shi Q, Merabti M. 2005. Early detection and prevention of denial-of-service attacks: A novel mechanism with propagated traced-back attack blocking IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 23 :1994-2002 >DOI >Link

Zhang N, Shi Q, Merabti M. 2004. A unified approach to a fair document exchange system JOURNAL OF SYSTEMS AND SOFTWARE, 72 :83-96 >DOI >Link

Zhang N, Shi Q, Merabti M, Askwith R. 2004. Autonomous mobile agent based fair exchange COMPUTER NETWORKS, 46 :751-770 >DOI >Link

Shi Q, Zhang N, Merabti M. 2003. Signature-based approach to fair document exchange IEE PROCEEDINGS-COMMUNICATIONS, 150 :21-27 >DOI >Link

Askwith B, Merabti M, Shi Q. 2003. MNPA: A basis for privacy-enhanced QoS in mobile networks MICROPROCESSORS AND MICROSYSTEMS, 27 :93-100 >DOI >Link

Zhang N, Shi Q, Merabti M. 2003. An efficient protocol for anonymous and fair document exchange COMPUTER NETWORKS, 41 :19-28 >DOI >Link

Zhang N, Shi Q, Merabti M. 2000. Anonymous public-key certificates for anonymous and fair document exchange IEE PROCEEDINGS-COMMUNICATIONS, 147 :345-350 >DOI >Link

Askwith B, Merabti M, Shi Q. 2000. MNPA: a mobile network privacy architecture COMPUTER COMMUNICATIONS, 23 :1777-1788 >DOI >Link

Merabti M, Shi Q, Oppliger R. 2000. Advanced security techniques for network protection COMPUTER COMMUNICATIONS, 23 :1581-1583 >DOI >Link

Zhang N, Shi Q, Merabti M. 1999. A flexible approach to secure and fair document exchange COMPUTER JOURNAL, 42 :569-581 >DOI >Link

Shi Q, Zhang N. 1998. An effective model for composition of secure systems JOURNAL OF SYSTEMS AND SOFTWARE, 43 :233-244 >DOI >Link

Zhang N, Shi Q. 1996. Achieving non-repudiation of receipt COMPUTER JOURNAL, 39 :844-853 >DOI >Link

Eiza MH, Shi Q, Marnerides AK, Owens T, Ni Q. Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks IEEE Transactions on Vehicular Technology,

Bouhafs F, Mackay M, Raschellà A, Shi Q, den Hartog F, Saldana J, Munilla R, Ruiz-Mas J, Fernández-Navajas J, Almodovar J, van Adrichem N. Wi-5: A Programming Architecture for Unlicensed Frequency Bands IEEE Communications Magazine,

Zhou B, Maines CL, Tang SOT, Shi Q, Yang P, Yang Q, Qi J. A 3D Security Modelling Platform for Social IoT Environments IEEE Transactions on Computational Social Systems,

Mac Dermott AM, Shamsa TB, Buck P, Iqbal F, Shi Q. The Internet of Things: Challenges and considerations for cybercrime investigations and digital forensics International Journal of Digital Crime and Forensics (IJDCF),

Lee GM, Shi Q. Machine Learning based Trust Computational Model for IoT Services IEEE Transactions on Sustainable Computing,

McWhirter P, Kifayat K, Shi Q, Askwith R. SQL Injection Attack Classification through the Feature Extraction of SQL Query strings using a Gap-Weighted String Subsequence Kernel Journal of Information Security and Applications,

Shone N, Tran Nguyen N, Vu Dinh P, Shi Q. A Deep Learning Approach to Network Intrusion Detection IEEE Transactions on Emerging Topics in Computational Intelligence, 2 >DOI

Mac Dermott AM, Shi Q, Kifayat K. Collaborative Intrusion Detection in Federated Cloud Environments Journal of Computer Sciences and Applications, 3 :10-20 >DOI

Alohali B, Kifayat K, Shi Q, Hurst W. Group Authentication Scheme for Neighbourhood Area Networks(NANs) In Smart Grids Journal of Sensor and Actuator Networks,

Hashem Eiza M, Owens T, Ni Q, Shi Q. Situation-Aware QoS Routing Algorithm for Vehicular Ad hoc Networks IEEE Transactions on Vehicular Technology,

Shi Q, Zhang N, Merabti M. Fair signature exchange via delegation on ubiquitous networks Segal M. Journal of Computer and System Sciences, >DOI

Chapters

Abdlhamed M, Kifayat K, Shi Q, Hurst W. 2017. Intrusion prediction systems Studies in Computational Intelligence 691 :155-174 >DOI

Alohali B, Kifayat K, Shi Q, Hurst W. 2016. A key management scheme for secure communications based on smart grid requirements (KMS-CL-SG) Security Solutions and Applied Cryptography in Smart Grid Communications :242-265 9781522518310 >DOI

Llewellyn-Jones D, Shi Q, Merabti M. 2014. Extending aop principles for the description of network security patterns Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns 9783319044477 :73-84 9783319044477 >DOI

Zhou B, Llewellyn-Jones D, Lamb D, Asim M, Shi Q, Merabti M. 2014. A Heuristic Approach for Secure Service Composition Adaptation Cyberpatterns >DOI

Brucker A, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The Aniketos Service Composition Framework Brucker A, Dalpiaz F, Giorgini P, Meland P, Rios E. Secure and Trustworthy Service Composition 8900 :121-135 Springer International Publishing 978-3-319-13517-5 >DOI

Zhou B, Maines CL, Tang SOT, Shi Q. A Framework for the Visualisation of Cyber Security Requirements and its Application in BPMN Guide to Vulnerability Analysis for Computer Networks and Systems :339-366 Springer 9783319926230

Kifayat K, Baker T, Mackay MI, shi Q, Merabti M. Real Time Risk Management in Cloud Computation Security Engineering for Cloud Computing: Approaches and Tools >DOI

Editorial/letter to the editor

Jung H-J, Shang F, El-Alfy E-SM, Shi Q, Yeun CY, Leung C. 2017. Editorial note: Smart Computing with Innovative Multimedia Technologies and Applications MULTIMEDIA TOOLS AND APPLICATIONS, 76 :5785-5786 >DOI >Link