Liverpool Skyline

Department of Computer Science

Prof Qi Shi

Prof Qi Shi

Telephone: 0151 231 2272

Biography

Current Position:

Qi Shi is a Professor in Computer Security, and Director of the PROTECT Research Centre for Critical Infrastructure Computer Technology & Protection.

Research Interests:

Qi Shi’s research is centred on the increasingly important theme of ubiquitous/distributed computing security and privacy with the long-term goal of developing general frameworks for the intelligent provision of security and privacy protection to various applications. Specifically, his main research interests include the following areas:

· System-of-systems security: Develop a software framework for the automated security monitoring, evaluation and control of a system of systems in ubiquitous and cloud computing settings at runtime.

· E-commerce security: Produce methods for privacy enhanced public-key certification and cryptographic protocols for the security and privacy protection of electronic transactions conducted over the Internet.

· Intrusion and denial-of-service detection: Design cost-effective solutions to the early detection and prevention of intrusion and denial-of-service attacks within the network routing infrastructure and in ubiquitous computing environments.

· Sensor network security: Develop resource-efficient algorithms, mechanisms and protocols for key establishment and secure communication among sensor nodes.

· Cloud computing security: Investigate efficient ways for data processing in cloud environments while protecting their security and privacy against unauthorized access.

· Identity management: Devise efficient and lightweight approaches to user-centric and situation-aware identity management for the privacy protection of mobile ad-hoc networks.

· Computer forensics: Propose more effective methods for targeted data collection, uniform data representation, forensic analysis and result visualisation.

Research Publications:

Qi Shi has published over 180 research papers in international journals and conference proceedings.

Research Projects:

Qi Shi is involved in the supervision of a number of research projects in the above research areas. For example, he is one of the investigators of a large EU FP7 project, ANIKETOS, which involves 17 partners in 10 EU countries with a total grant of €9.6 million, for the development of secure and trustworthy composite services.

Research Students:

Qi Shi is supervising a number of international and home research students working in some research areas listed above. He also welcomes prospective research students with interests in the above research areas or others to apply for studies here. Applications can be submitted online at http://www.ljmu.ac.uk/pgapplication/114150.htm.

Other Academic Activities:

Qi Shi is a member of editorial boards and a paper reviewer for a number of international journals and a member or chair of program committees for many international conferences. Qi also serves as an external research degree examiner, taught course examiner and a member of several advisory committees.

Publications

Chapters

Abdlhamed M, Kifayat K, Shi Q, Hurst W. 2017. Intrusion prediction systems Studies in Computational Intelligence 691 :155-174 >DOI

Alohali B, Kifayat K, Shi Q, Hurst W. 2016. A key management scheme for secure communications based on smart grid requirements (KMS-CL-SG) Security Solutions and Applied Cryptography in Smart Grid Communications :242-265 9781522518310 >DOI

Llewellyn-Jones D, Shi Q, Merabti M. 2014. Extending aop principles for the description of network security patterns Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns 9783319044477 :73-84 9783319044477 >DOI

Zhou B, Llewellyn-Jones D, Lamb D, Asim M, Shi Q, Merabti M. 2014. A Heuristic Approach for Secure Service Composition Adaptation Cyberpatterns >DOI

Brucker A, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The Aniketos Service Composition Framework Brucker A, Dalpiaz F, Giorgini P, Meland P, Rios E. Secure and Trustworthy Service Composition 8900 :121-135 Springer International Publishing 978-3-319-13517-5 >DOI

Kifayat K, Shamsa TB, Mackay M, Merabti M, Shi Q. 2012. Real time risk management in cloud computation Security Engineering for Cloud Computing: Approaches and Tools :123-145 9781466621251 >DOI

Conference Publication (journal proceedings)

MacDermott Á, Shi Q, Kifayat K. 2017. Distributed attack prevention using dempster-shafer theory of evidence Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10363 LNAI :203-212 >DOI

Alohali B, Kifayat K, Shi Q, Hurst W. 2017. Replay attack impact on advanced metering infrastructure (AMI) Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 175 :52-59 >DOI

Seyedebrahimi M, Bouhafs F, Raschella A, Mackay M, Shi Q. 2017. Fine-Grained Radio Resource Management to Control Interference in Dense Wi-Fi Networks 2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), IEEE Wireless Communications and Networking Conference (WCNC) >Link

Abdlhamed M, Kifayat K, Shi Q, Hurst W. 2016. A system for intrusion prediction in cloud computing ACM International Conference Proceeding Series, 22-23-March-2016 >DOI

Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA) :715-721 >DOI >Link

Seyedebrahimi M, Raschella A, Bouhafs F, Mackay M, Shi Q, Eiza MH. 2016. A Centralised Wi-Fi Management Framework for D2D Communications in Dense Wi-Fi Networks 2016 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), IEEE Conference on Standards for Communications and Networking (CSCN) >Link

Seyedebrahimi M, Bouhafs F, Raschella A, Mackay M, Shi Q. 2016. SDN-Based Channel Assignment Algorithm for Interference Management in Dense Wi-Fi Networks 2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), European Conference on Networks and Communications (EuCNC) :128-132 >Link

Raschella A, Bouhafs F, Seyedebrahimi M, Mackay M, Shi Q. 2016. A Centralized Framework for Smart Access Point Selection based on the Fittingness Factor 2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 23rd International Conference on Telecommunications (ICT) >DOI >Link

Alohali B, Kifayat K, Shi Q. 2016. Impact of Topology on Service Availability in a Smart Grid Advanced Metering Infrastructure The Eighth International Conference on Emerging Networks and Systems Intelligence

Hurst W, Shone N, Shi Q, Bazli B. 2016. MICRO-CI: A Testbed for Cyber-Security Research he Eighth International Conference on Emerging Networks and Systems Intelligence

Maines CL, Zhou B, Tang S, Shi Q. 2016. Adding a Third Dimension to BPMN as a means of Representing Cyber Security Requirements Aljumeily D, Hussain A, Tawfik H, Hamdan H, Dawson T, Hind J. 2016 9TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2016), 9th International Conference on Developments in eSystems Engineering (DeSE) :105-110 >DOI >Link

Zhou B, Shi Q, Yang P. 2016. A survey on quantitative evaluation of web service security Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, :715-721 >DOI

Eiza MH, Shi Q, Marnerides A, Owens T. 2016. Secure and Privacy-Aware Proxy Mobile IPv6 Protocol for Vehicle-to-Grid Networks 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), IEEE International Conference on Communications (ICC) >Link

MacDermott A, Shi Q, Kifayat K. 2015. Detecting Intrusions in Federated Cloud Environments Using Security as a Service Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :91-96 >DOI >Link

Buck P, Shi Q, MacDermott A. 2015. A Selective Regression Testing Approach for Composite Web Services Jumelly DA, Hussain A, Tawfik H, MacDermott A, Lempereur B. PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, International Conference on Developments in eSystems Engineering (DeSE) :97-101 >DOI >Link

Younis YA, Kifayat K, Shi Q, Askwith B. 2015. A New Prime and Probe Cache Side-Channel Attack for Cloud Computing Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :1719-1725 >DOI >Link

Baharon MR, Shi Q, Llewellyn-Jones D. 2015. A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :618-625 >DOI >Link

Asim M, Zarzosa S, Shi Q, Zhou B. 2015. A Policy Specification Language for Composite Services The Fifth International Conference on Advanced Collaborative Networks, Systems and Applications

MacDermott A, Shi Q, Kifayat K. 2015. Collaborative Intrusion Detection in a Federated Cloud Environment Using the Dempster-Shafer Theory of Evidence Abouzakhar N. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 14th European Conference on Cyber Warfare and Security (ECCWS) :195-203 >Link

Shone N, Dobbins C, Hurst W, Shi Q. 2015. Digital Memories Based Mobile User Authentication for IoT Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :1797-1803 >DOI >Link

MacDermott A, Hurst W, Shi Q, Merabti M. 2014. Simulating Critical Infrastructure Cascading Failure AlDabass D, Orsoni A, Cant R, Yunus J, Ibrahim Z, Saad I. 2014 UKSIM-AMSS 16TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 16th UKSim-AMSS International Conference on Computer Modelling and Simulation (UKSim) :324-329 >DOI >Link

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The Aniketos Service Composition Framework: Analysing and ranking of secure services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :121-135

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The aniketos service composition framework: Analysing and ranking of secure services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :121-135

Asim M, Lempereur B, Shi Q, Yautsiukhin A, Brucker AD. 2014. Security policy monitoring of composite services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :192-202

MacDermott A, Shi Q, Merabti M, Kifayat K. 2013. Protecting critical infrastructure services in the cloud environment European Conference on Information Warfare and Security, ECCWS, :336-343

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Securing complex system-of-systems compositions European Conference on Information Warfare and Security, ECCWS, :370-379

Baharon MR, Shi Q, Llewellyn-Jones D, Merabti M. 2013. Efficient and secure remote data storing and processing European Conference on Information Warfare and Security, ECCWS, :397-401

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2013. A Framework for Secure Service Composition 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), ASE/IEEE International Conference on Social Computing (SocialCom) :647-652 >DOI >Link

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Misbehaviour Monitoring on System-of-Systems Components Crispo B, Sandhu R, CuppensBoulahia N, Conti M, Lanet JL. 2013 INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS), 8th International Conference on Risks and Security of Internet and Systems (CRiSIS) >Link

MacDermott A, Shi Q, Merabti M, Kifiyat K. 2013. Considering an Elastic Scaling Model for Cloud Security 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 8th International Conference for Internet Technology and Secured Transactions (ICITST) :150-155 >Link

Shone N, Shi Q, Merabti M, Kifayat K. 2013. Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, IEEE 10th International Conference on Ubiquitous Intelligence and Computing (UIC) / IEEE 10th International Conference on Autonomic and Trusted Computing (ATC) :438-443 >DOI >Link

Baharon MR, Shi Q, Llewellyn-Jones D, Merabti M. 2013. Secure Rendering Process in Cloud Computing CastellaRoca J, GarciaAlfaro J, Jensen CD, Onut IV, Torra V, DomingoFerrer J, Ghorbani AA, Manjon JA, Stakhanova N, Zhang J. 2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 11th Annual International Conference on Privacy, Security and Trust (PST) :82-87 >Link

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M. 2013. Prototype for Design-time Secure and Trustworthy Service Composition 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 10th IEEE Consumer Communications and Networking Conference (CCNC) :847-848 >Link

Asim M, Llewellyn-Jones D, Lempereur B, Zhou B, Shi Q, Merabti M. 2013. Event Driven Monitoring of Composite Services 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), ASE/IEEE International Conference on Social Computing (SocialCom) :550-557 >DOI >Link

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2013. A compose language-based framework for secure service composition Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012, :195-202 >DOI

Kennedy M, Llewellyn-Jones D, Shi Q, Merabti M. 2012. A framework for measuring security of services in ubiquitous computing environments 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012, :112-117 >DOI

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. A Compose Language-based Framework for Secure Service Composition ASE International Conference on Cyber Security (CyberSecurity 2012), Washington DC, USA, :14-16

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. Secure Service Composition Adaptation Based on Simulated Annealing Proceedings of the Layered Assurance Workshop (LAW) 2012, Annual Computer Security Applications Conference - ACSAC 28, Layered Assurance Workshop :49-55

Lempereur B, Merabti M, Shi Q. 2011. Information flow monitoring: Model, policy, and analysis Proceedings - 4th International Conference on Developments in eSystems Engineering, DeSE 2011, :227-232 >DOI

Arabo A, Kennedy M, Shi Q, Merabti M, Llewellyn-Jones D, Kifayat K. 2011. Identity management in System-of-Systems Crisis Management situation Proceedings of 2011 6th International Conference on System of Systems Engineering: SoSE in Cloud Computing, Smart Grid, and Cyber Security, SoSE 2011, :37-42 >DOI

Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. 2010. Group-based key management for mobile sensor networks 33rd IEEE Sarnoff Symposium 2010, Conference Proceedings, >DOI

Arabo A, Shi Q, Merabti M. 2010. Dynamic Device Configuration in Ubiquitous Environments DeMagalhaes ST, Jahankhani H, Hessami AG. GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, 6th International Conference on Global Security, Safety and Sustainability (ICGS3) 92 :263-273 >Link

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2009. Trusted Digital Rights Management in Peer-to-Peer Communities AlJumeily D, Nagar AK, Tawfik H, Hussain A, Lisboa P. 2009 SECOND INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2009), 2nd International Conference on Developments in eSystems Engineering :207-215 >DOI >Link

Drew O, Shi Q, Merabti M. 2009. Policy Translation and Reconciliation Techniques for the System-of-Systems Domain Jahankhani H, Hessami AG, Hsu F. GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, PROCEEDINGS, 5th International Conference on Global Security, Safety and Sustainability (ICGS3 2009) 45 :183-190 >Link

Arabo A, Shi Q, Merabti M. 2009. Towards a Context-Aware Identity Management in Mobile Ad-hoc Networks (IMMANets) 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 23rd International Conference on Advanced Information Networking and Applications Workshops :588-594 >DOI >Link

Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. 2009. An Efficient Multi-Parameter Group Leader Selection Scheme for Wireless Sensor Networks 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, International Conference on Network and Service Security :110-114 >Link

Zhang N, Yao L, Nenadic A, Chin J, Goble C, Rector A, Chadwick D, Otenko S, Shi Q. 2007. Achieving fine-grained access control in virtual organizations Concurrency Computation Practice and Experience, 19 :1333-1352 >DOI

Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. 2007. Applying secure data aggregation techniques for a structure and density independent group based key management protocol Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security, :44-49 >DOI

Zhang N, Yao L, Nenadic A, Chin J, Goble C, Rector A, Chadwick D, Otenko S, Shi Q. 2007. Achieving fine-grained access control in virtual organizations CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2nd International Workshop on Emerging Technologies for Next-Generation GRID (ETNGRID 2005) 19 :1333-1352 >DOI >Link

Zhou B, Shi Q, Merabti M. 2007. Towards energy-efficient intrusion detection in pervasive computing 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, IEEE International Conference on Communications (ICC 2007) :1417-1422 >DOI >Link

Haggerty J, Shi Q, Fergus P, Merabti M. 2006. Data authentication and trust within distributed intrusion detection system inter-component communications Blyth A. EC2ND 2005, PROCEEDINGS, 1st European Conference on Computer Network Defence (EC2ND) :197-+ >DOI >Link

Zhou B, Shi Q, Merabti M. 2006. Real-time intrusion detection in ubiquitous networks with a string-based approach Gavrilova M, Gervasi O, Kumar V, Tan CJK, Taniar D, Lagana A, Mun Y, Choo H. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, International Conference on Computational Science and Its Applications (ICCSA 2006) 3983 :352-359 >Link

Zhou B, Shi Q, Merabti M. 2006. Intrusion detection in pervasive networks based on a chi-square statistic test 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 30th Annual International Computer Software and Applications Conference :203-+ >Link

Zhou B, Shi Q, Merabti M. 2006. A Framework for Intrusion Detection in Heterogeneous Environments 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 3rd IEEE Consumer Communications and Networking Conference :1244-1248 >Link

Zhang N, Rector A, Buchan I, Shi Q, Kalra D, Rogers J, Goble C, Walker S, Ingram D, Singleton P. 2005. A linkable identity privacy algorithm for healthgrid Studies in Health Technology and Informatics, 112 :234-245

Zhang N, Yao L, Chin J, Shi Q, Nenadic A, McNab A, Rector A, Goble C. 2005. Plugging a scalable authentication framework into Shibboleth Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE, 2005 :271-276 >DOI

Haggerty J, Shi Q, Merabti M. 2005. Statistical signatures for early detection of flooding denial-of-service attacks Sasaki R, Qing S, Okamoto E, Yoshiura H. SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 20th International Information Security Conference 181 :327-341 >Link

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2005. Short paper: Harnessing emergent ubiquitous computing properties to prevent malicious code propagation FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks :243-245 >DOI >Link

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2005. Buffer overrun prevention through component composition analysis Proceedings of the 29th Annual International Computer Software and Applications Conference, 29th Annual International Computer Software and Applications Conference :156-163 >Link

Zhou B, Shi Q, Merabti M. 2005. A novel service-oriented and user-centric intrusion detection system for ubiquitous networks Hamza MH. Proceedings of the IASTED International Conference on Communication, Network, and Information Security, IASTED International Conference on Communication, Network, and Information Security :76-81 >Link

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2004. An extensible framework for practical secure component composition in a ubiquitous computing environment Srimani PK. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, International Conference on Information Technology - Coding and Computing :112-117 >DOI >Link

Haggerty J, Berry T, Shi Q, Merabti M. 2004. DiDDeM: A system for early detection of TCP SYN flood attacks GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, IEEE Global Telecommunications Conference (GLOBECOM 04) :2037-2042 >Link

Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2004. A security framework for executables in a ubiquitous computing environment GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, IEEE Global Telecommunications Conference (GLOBECOM 04) :2158-2163 >Link

Abimbola A, Shi Q, Merabti M. 2003. NetHost-sensor: A novel concept in intrusion detection systems Bilof R. EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 8th IEEE International Symposium on Computers and Communication (ISCC 2003) :232-237 >DOI >Link

Haggerty J, Shi Q, Merabti M. 2002. Beyond the perimeter: the need for early detection of denial of service attacks 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 18th Annual Computer Security Applications Conference :413-422 >DOI >Link

Haggerty J, Shi Q, Merabti M. 2002. The threat from within - An analysis of attacks on an internal network Ghonaimy MA, ElHadidi MT, Aslan HK. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 17th International Conference on Information Security 86 :133-145 >Link

Askwith B, Shi Q, Merabti M. 2002. Secure Component Composition for Networked Appliances Merabti M, Askwith B. 5TH IEEE INTERNATIONAL WORKSHOP ON NETWORKED APPLIANCES, PROCEEDINGS, 5th IEEE International Workshop on Networked Appliances :29-34 >Link

Gresty DW, Shi Q, Merabti M. 2001. Requirements for a general framework for response to distributed denial-of-service 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 17th Annual Computer Security Applications Conference :422-429 >DOI >Link

Mac Dermott AM, Shamsa T, Shi Q. IoT Forensics: Challenges For The IoA Era 2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS)

Maines CL, Zhou B, Tang S, Shi Q. Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Language Developments in eSystems Engineering

Journal Articles

Zhou B, Zhang Q, Shi Q, Yang Q, Yang P, Yu Y. 2017. Measuring web service security in the era of Internet of Things Computers and Electrical Engineering, >DOI

Brucker AD, Zhou B, Malmignati F, Shi Q, Merabti M. 2017. Modelling, validating, and ranking of secure service compositions SOFTWARE-PRACTICE & EXPERIENCE, 47 :1923-1943 >DOI >Link

Raschella A, Bouhafs F, Seyedebrahimi M, Mackay M, Shi Q. 2017. Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 14 :441-455 >DOI >Link

Alohali B, Kifayat K, Shi Q, Hurst W. 2016. Group Authentication Scheme for Neighbourhood Area Networks (NANs) in Smart Grids Journal of Sensor and Actuator Networks, 5 :9-9 >DOI

Eiza MH, Ni Q, Shi Q. 2016. Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 65 :7868-7881 >DOI >Link

MacDermott Á, Shi Q, Merabti M, Kifayat K. 2015. Hosting critical infrastructure services in the cloud environment considerations International Journal of Critical Infrastructures, 11 :365-381 >DOI

Alohali B, Kifayat K, Shi Q, Hurst W. 2015. A Survey on Cryptography Key Management Schemes for Smart Grid Journal of Computer Sciences and Applications, Science and Education, 3 :27-39 >DOI

Hashem Eiza M, Owens T, Qiang Ni , Qi Shi . 2015. Situation-Aware QoS Routing Algorithm for Vehicular Ad Hoc Networks IEEE Transactions on Vehicular Technology, 64 :5520-5535 >DOI

Eiza MH, Owens T, Ni Q, Shi Q. 2015. Situation-Aware QoS Routing Algorithm for Vehicular Ad Hoc Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 64 :5520-5535 >DOI >Link

Shi Q, Zhang N, Merabti M. 2015. Fair signature exchange via delegation on ubiquitous networks JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 81 :615-631 >DOI >Link

MacDermott Á, Shi Q, Merabti M, Kifayat K. 2014. An Elastic Scaling Method for Cloud Security Journal of Internet Technology and Secured Transaction, 3 :254-262 >DOI

Lempereur B, Ayed D, Asim M, Merabti M, Shi Q. 2014. Monitoring threats to composite services within the aniketos run-time framework Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :173-191

Asim M, Yautsiukhin A, Brucker AD, Lempereur B, Shi Q. 2014. Security policy monitoring of composite services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :192-202

Asim M, Zhou B, Llewellyn-Jones D, Shi Q, Merabti M. 2014. Dynamic monitoring of composed services 9783319044477 :235-245 >DOI

Lempereur B, Asim M, Merabti M, Shi Q, Ayed D. 2014. Monitoring threats to composite services within the aniketos run-time framework Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :173-191

Lempereur B, Merabti M, Shi Q. 2013. A platform for the evaluation of live digital forensics :123-137 >DOI

Shi Q, Zhang N, Merabti M, Kifayat K. 2013. Resource-efficient authentic key establishment in heterogeneous wireless sensor networks JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 73 :235-249 >DOI >Link

Kifayat K, Merabti M, Shi Q, Abbas S. 2013. Component-based security system (COMSEC) with QoS for wireless sensor networks SECURITY AND COMMUNICATION NETWORKS, 6 :461-472 >DOI >Link

Lempereur B, Merabti M, Shi Q. 2012. Pypette: A platform for the evaluation of live digital forensics International Journal of Digital Crime and Forensics, 4 :31-46 >DOI

Shi Q, Zhang N, Llewellyn-Jones D. 2012. Efficient autonomous signature exchange on ubiquitous networks JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 35 :1793-1806 >DOI >Link

Shi Q, Zhang N, Merabti M. 2011. Fair exchange of valuable information: A generalised framework JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 77 :348-371 >DOI >Link

Shi Q, Zhang N, Merabti M, Askwith R. 2011. Achieving autonomous fair exchange in ubiquitous network settings JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 34 :653-667 >DOI >Link

Zhou B, Drew O, Arabo A, Llewellyn-Jones D, Kifayat K, Merabti M, Shi Q, Craddock R, Waller A, Jones G. 2010. System-of-systems boundary check in a public event scenario 2010 5th International Conference on System of Systems Engineering, SoSE 2010, >DOI

Zhou B, Shi Q, Merabti M. 2008. Balancing intrusion detection resources in ubiquitous computing networks COMPUTER COMMUNICATIONS, 31 :3643-3653 >DOI >Link

Kifayat K, Merabti M, Shi Q, Liewellyn-Jones D. 2007. Application independent dynamic group-based key establishment for large-scale wireless sensor networks CHINA COMMUNICATIONS, 4 :14-27 >Link

Zhang N, Shi Q, Merabti M, Askwith R. 2006. Practical and efficient fair document exchange over networks JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 29 :46-61 >DOI >Link

Zhang N, Shi Q, Merabti M. 2005. Revocation of privacy-enhanced public-key certificates JOURNAL OF SYSTEMS AND SOFTWARE, 75 :205-214 >DOI >Link

Zhang N, Shi Q, Nenadic A, Merabti M, Askwith R. 2005. Efficient fair digital-signature exchange based on misbehaviour penalisation IEE PROCEEDINGS-COMMUNICATIONS, 152 :257-261 >DOI >Link

Haggerty J, Shi Q, Merabti M. 2005. Early detection and prevention of denial-of-service attacks: A novel mechanism with propagated traced-back attack blocking IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 23 :1994-2002 >DOI >Link

Zhang N, Shi Q, Merabti M. 2004. A unified approach to a fair document exchange system JOURNAL OF SYSTEMS AND SOFTWARE, 72 :83-96 >DOI >Link

Zhang N, Shi Q, Merabti M, Askwith R. 2004. Autonomous mobile agent based fair exchange COMPUTER NETWORKS, 46 :751-770 >DOI >Link

Shi Q, Zhang N, Merabti M. 2003. Signature-based approach to fair document exchange IEE PROCEEDINGS-COMMUNICATIONS, 150 :21-27 >DOI >Link

Askwith B, Merabti M, Shi Q. 2003. MNPA: A basis for privacy-enhanced QoS in mobile networks MICROPROCESSORS AND MICROSYSTEMS, 27 :93-100 >DOI >Link

Zhang N, Shi Q, Merabti M. 2003. An efficient protocol for anonymous and fair document exchange COMPUTER NETWORKS, 41 :19-28 >DOI >Link

Zhang N, Shi Q, Merabti M. 2000. Anonymous public-key certificates for anonymous and fair document exchange IEE PROCEEDINGS-COMMUNICATIONS, 147 :345-350 >DOI >Link

Askwith B, Merabti M, Shi Q. 2000. MNPA: a mobile network privacy architecture COMPUTER COMMUNICATIONS, 23 :1777-1788 >DOI >Link

Merabti M, Shi Q, Oppliger R. 2000. Advanced security techniques for network protection COMPUTER COMMUNICATIONS, 23 :1581-1583 >DOI >Link

Zhang N, Shi Q, Merabti M. 1999. A flexible approach to secure and fair document exchange COMPUTER JOURNAL, 42 :569-581 >DOI >Link

Shi Q, Zhang N. 1998. An effective model for composition of secure systems JOURNAL OF SYSTEMS AND SOFTWARE, 43 :233-244 >DOI >Link

Zhang N, Shi Q. 1996. Achieving non-repudiation of receipt COMPUTER JOURNAL, 39 :844-853 >DOI >Link

Asim M, Yautsiukhin A, Brucker A, Baker T, Shi Q, Lempereur B. Security Policy Monitoring of BPMN-based Service Compositions Journal of Software: Evolution and Process,

Shone N, Tran Nguyen N, Vu Dinh P, Shi Q. A Deep Learning Approach to Network Intrusion Detection IEEE Transactions on Emerging Topics in Computational Intelligence,

Mac Dermott AM, Shi Q, Kifayat K. Collaborative Intrusion Detection in Federated Cloud Environments Journal of Computer Sciences and Applications, 3 :10-20 >DOI

Hurst W, Shone N, Shi Q, Bazli B. Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research International Journal On Advances in Security, 10

Editorials and letter to the editor

Jung H-J, Shang F, El-Alfy E-SM, Shi Q, Yeun CY, Leung C. 2017. Editorial note: Smart Computing with Innovative Multimedia Technologies and Applications MULTIMEDIA TOOLS AND APPLICATIONS, 76 :5785-5786 >DOI >Link