Dr Bob Askwith
School of Computer Science and Mathematics

Email address: R.J.Askwith@ljmu.ac.uk
Telephone: 0151 231 2320
Degrees
2000, Liverpool John Moores University, United Kingdom, PhD, Network Security
1996, Liverpool John Moores University, United Kingdom, BSc (Hons) Software Engineering
Academic appointments
Subject Leader, Computing and Mathematical Sciences, Liverpool John Moores University, 2013 - present
Principal Lecturer, Computing and Mathematical Sciences, Liverpool John Moores University, 2009 - 2013
Lecturer, Computing and Mathematical Sciences, Liverpool John Moores University, 1999 - 2009
Journal article
Nafea H, Kifayat K, Shi Q, Qureshi KN, Askwith RJ. 2019. Efficient Non-Linear Covert Channel Detection in TCP Data Streams IEEE Access, 8 :1680-1690 DOI Author Url Publisher Url Public Url
Kifayat K, Shi Q, Askwith RJ, McWhirter PR. 2018. SQL Injection Attack Classification through the Feature Extraction of SQL Query strings using a Gap-Weighted String Subsequence Kernel Journal of Information Security and Applications, 40 :199-216 DOI Author Url Publisher Url Public Url
Lee GM, Truong NB, Lee H, Askwith RJ. 2017. Toward a Trust Evaluation Mechanism for in the Social Internet of Things Sensors, 17 DOI Author Url Publisher Url Public Url
Shi Q, Zhang N, Merabti M, Askwith R. 2011. Achieving autonomous fair exchange in ubiquitous network settings JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 34 :653-667 DOI Author Url Publisher Url
Muhammad A, Fergus P, Merabti M, Askwith B. 2010. Peer-to-peer overlay gateway services for home automation and management 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, :880-886 DOI Publisher Url
Zhang N, Shi Q, Merabti M, Askwith R. 2006. Practical and efficient fair document exchange over networks JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 29 :46-61 DOI Author Url Publisher Url
Zhang N, Shi Q, Nenadic A, Merabti M, Askwith R. 2005. Efficient fair digital-signature exchange based on misbehaviour penalisation IEE PROCEEDINGS-COMMUNICATIONS, 152 :257-261 DOI Author Url Publisher Url
Bakht H, Merabti M, Askwith B. 2005. Home networking: The role of mobile ad hoc network in future home networking environments IFIP Advances in Information and Communication Technology, 178 :311-322
Zhang N, Shi Q, Merabti M, Askwith R. 2004. Autonomous mobile agent based fair exchange COMPUTER NETWORKS, 46 :751-770 DOI Author Url Publisher Url
Askwith B, Merabti M, Shi Q. 2003. MNPA: A basis for privacy-enhanced QoS in mobile networks MICROPROCESSORS AND MICROSYSTEMS, 27 :93-100 DOI Author Url Publisher Url
Merabti M, Askwith B. 2002. Foreword Proceedings - 5th IEEE International Workshop on Networked Appliances, IWNA 2002, DOI Publisher Url
Taylor MJ, Gresty D, Askwith R. 2001. Knowledge for network support INFORMATION AND SOFTWARE TECHNOLOGY, 43 :469-475 DOI Author Url Publisher Url
Askwith B, Merabti M, Shi Q. 2000. MNPA: a mobile network privacy architecture COMPUTER COMMUNICATIONS, 23 :1777-1788 DOI Author Url Publisher Url
Conference publication
Granby BR, Askwith RJ, Marnerides AK. 2015. SDN-PANDA: Software-Defined Network Platform for ANomaly Detection Applications 2015 IEEE 23rd International Conference on Network Protocols (ICNP), 23rd IEEE International Conference on Network Protocols (ICNP'15) :463-466 DOI Author Url Publisher Url Public Url
Brumfitt H, Askwith RJ, Zhou B. 2015. Protecting Future Personal Computing: Challenging Traditional Network Security Models 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing :1772-1779 DOI Author Url Publisher Url Public Url
Brumfitt H, Askwith RJ, Zhou B. 2015. Lightweight Forensics Application: Lightweight Approach to Securing Mobile Devices 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), The 15th IEEE International Conference on Computer and Information Technology :795-800 DOI Author Url Publisher Url Public Url
Younis YA, Kifayat K, Shi Q, Askwith B. 2015. A New Prime and Probe Cache Side-Channel Attack for Cloud Computing Wu YL, Min GY, Georgalas N, Hu J, Atzori L, Jin XL, Jarvis S, Liu L, Calvo RA. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, IEEE International Conference on Computer and Information :1719-1725 DOI Author Url Publisher Url
Khan MZ, Merabti M, Askwith B, Bouhafs F. 2012. A Zone-Based Hierarchical Framework and Clustering Scheme for Energy-Efficient Wireless Sensor Networks 2012 IFIP WIRELESS DAYS (WD), IFIP Wireless Days (WD) DOI Author Url Publisher Url
Khan MZ, Askwith B, Bouhafs F, Asim M. 2011. Limitations of simulation tools for large-scale wireless sensor networks Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, :820-825 DOI Publisher Url
Muhammad A, Arabo A, Merabti M, Shi Q, Askwith B. 2010. A secure gateway service for accessing networked appliances Proceedings - 5th International Conference on Systems and Networks Communications, ICSNC 2010, :183-188 DOI Publisher Url
Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2009. Trusted Digital Rights Management in Peer-to-Peer Communities AlJumeily D, Nagar AK, Tawfik H, Hussain A, Lisboa P. 2009 SECOND INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2009), 2nd International Conference on Developments in eSystems Engineering :207-215 DOI Author Url Publisher Url
Muhammad A, Merabti M, Askwith B. 2009. E-System: Package Delivery Framework AlJumeily D, Nagar AK, Tawfik H, Hussain A, Lisboa P. 2009 SECOND INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2009), 2nd International Conference on Developments in eSystems Engineering :196-201 DOI Author Url Publisher Url
Fahad T, Djenouri D, Askwith R. 2007. On detecting packets droppers in MANET: A novel low cost approach Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security, :56-61 DOI Publisher Url
Fahad T, Djenouri D, Askwith R, Merabti M. 2007. A new low cost Sessions-based Misbehaviour Detection Protocol (SMDP) for MANET Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07, 2 :882-887 DOI Publisher Url
Javed H, Merabti M, Askwith B. 2007. A persistent storage middleware service for wireless sensor networks 2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, IEEE Wireless Communications and Networking Conference :2492-2496 DOI Author Url Publisher Url
Askwith B, Merabti M, Mingkhwan A. 2005. Mobility and appliance networks - a new mobility model IFIP Advances in Information and Communication Technology, 169 :237-247 DOI Publisher Url
Al-Hajeri S, Merabti M, Askwith B. 2003. Analysis of IPSec services Proceedings of the IASTED International Conference on Wireless and Optical Communications, 3 :326-331
Mingkhwan A, Abuelma'Atti O, Merabti M, Askwith B. 2003. Multi hop communication in global wireless framework IEEE Wireless Communications and Networking Conference, WCNC, 2 :1011-1016 DOI Publisher Url
Askwith B, Shi Q, Merabti M. 2002. Secure Component Composition for Networked Appliances Merabti M, Askwith B. 5TH IEEE INTERNATIONAL WORKSHOP ON NETWORKED APPLIANCES, PROCEEDINGS, 5th IEEE International Workshop on Networked Appliances :29-34 DOI Author Url Publisher Url
Abuelma'atti O, Merabti M, Askwith B. 2002. A wireless networked appliances MAC bridge Proceedings - 5th IEEE International Workshop on Networked Appliances, IWNA 2002, :96-101 DOI Publisher Url
Mingkhwan A, Merabti M, Askwith B. 2002. Global wireless framework one world wireless devices Proceedings - 5th IEEE International Workshop on Networked Appliances, IWNA 2002, :145-150 DOI Publisher Url
Mingkhwan A, Merabti M, Askwith B. 2002. IPMSA: Integrated personal mobility services architecture IEEE International Conference on Communications, 4 :2019-2023
Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation DOI Author Url Publisher Url
Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. Buffer Overrun Prevention Through Component Composition Analysis DOI Author Url Publisher Url
Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment DOI Author Url Publisher Url
Patent
Zhou B, Merabti M, Shi Q, Askwith B, Llewellyn-Jones D. 2007. System-of-Systems Security in a Public Event Scenario
Merabti M, Shi Q, Askwith B, Llewellyn-Jones D. Secure Component Composition for Personal Ubiquitous Computing: Project Summary
Merabti M, Shi Q, Askwith B, Llewellyn-Jones D. MATTS Technical Manual
Thesis/Dissertation
Askwith RJ. An architecture for user privacy in mobile networks Public Url