Dr Bob Askwith
School of Computer Science and Mathematics

Email address: R.J.Askwith@ljmu.ac.uk
Telephone: 0151 231 2320
Degrees
2000, Liverpool John Moores University, United Kingdom, PhD, Network Security
1996, Liverpool John Moores University, United Kingdom, BSc (Hons) Software Engineering
Academic appointments
Subject Leader, Computing and Mathematical Sciences, Liverpool John Moores University, 2013 - present
Principal Lecturer, Computing and Mathematical Sciences, Liverpool John Moores University, 2009 - 2013
Lecturer, Computing and Mathematical Sciences, Liverpool John Moores University, 1999 - 2009
Journal article
Nafea H, Kifayat K, Shi Q, Qureshi KN, Askwith RJ. 2019. Efficient Non-Linear Covert Channel Detection in TCP Data Streams IEEE Access, 8 :1680-1690 DOI Author Url Publisher Url Public Url
McWhirter P, Kifayat K, Shi Q, Askwith R. 2018. SQL Injection Attack Classification through the Feature Extraction of SQL Query strings using a Gap-Weighted String Subsequence Kernel Journal of Information Security and Applications, 40 :199-216 DOI Author Url Public Url
Lee GM. 2017. Toward a Trust Evaluation Mechanism for in the Social Internet of Things Sensors, 17 DOI Author Url Public Url
Muhammad A, Fergus P, Merabti M, Askwith B. 2010. Peer-to-peer overlay gateway services for home automation and management 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, :880-886 DOI
Taylor MJ, Gresty D, Askwith R. 2001. Knowledge for network support INFORMATION AND SOFTWARE TECHNOLOGY, 43 :469-475 DOI Author Url
Conference publication
Granby BR, Askwith RJ, Marnerides AK. 2015. SDN-PANDA: Software-Defined Network Platform for ANomaly Detection Applications 23rd IEEE International Conference on Network Protocols (ICNP'15) DOI Author Url Public Url
Brumfitt H, askwith R, Zhou B. 2015. Lightweight Forensics Application: Lightweight Approach to Securing Mobile Devices The 15th IEEE International Conference on Computer and Information Technology, First International Workshop on Internet of Things: Smart Objects, Cloud and Applications DOI Author Url Public Url
Brumfitt H, askwith R, Zhou B. 2015. Protecting Future Personal Computing: Challenging Traditional Network Security Models 13th IEEE International Conference on Dependable, Autonomic and Secure Computing DOI Author Url Public Url
Khan MZ, Merabti M, Askwith B, Bouhafs F. 2012. A Zone-Based Hierarchical Framework and Clustering Scheme for Energy-Efficient Wireless Sensor Networks 2012 IFIP WIRELESS DAYS (WD), IFIP Wireless Days (WD) DOI Author Url
Khan MZ, Askwith B, Bouhafs F, Asim M. 2011. Limitations of simulation tools for large-scale wireless sensor networks Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, :820-825 DOI
Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2009. Trusted Digital Rights Management in Peer-to-Peer Communities AlJumeily D, Nagar AK, Tawfik H, Hussain A, Lisboa P. 2009 SECOND INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2009), 2nd International Conference on Developments in eSystems Engineering :207-215 DOI Author Url
Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation DOI Author Url
Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. Buffer Overrun Prevention Through Component Composition Analysis DOI Author Url
Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment DOI Author Url
Patent
Zhou B, Merabti M, Shi Q, Askwith B, Llewellyn-Jones D. 2007. System-of-Systems Security in a Public Event Scenario
Merabti M, Shi Q, Askwith B, Llewellyn-Jones D. Secure Component Composition for Personal Ubiquitous Computing: Project Summary
Merabti M, Shi Q, Askwith B, Llewellyn-Jones D. MATTS Technical Manual