Bo Zhou

Orcid: 0000-0002-7824-3673

Affiliations:
  • Liverpool John Moores University, UK


According to our database1, Bo Zhou authored at least 42 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Privacy and safety improvement of VANET data via a safety-related privacy scheme.
Int. J. Inf. Sec., 2023

2022
SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things.
IEEE Internet Things J., 2022

2021
Efficient Security Algorithm for Power-Constrained IoT Devices.
IEEE Internet Things J., 2021

Investigation on the Implementation of Stateful Minority Logic for Future In-Memory Computing.
IEEE Access, 2021

2020
PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT.
Inf. Sci., 2020

Real-time deep reinforcement learning based vehicle navigation.
Appl. Soft Comput., 2020

Adjusted Location Privacy Scheme for VANET Safety Applications.
Proceedings of the NOMS 2020, 2020

2019
A Hybrid Hierarchical Framework for Gym Physical Activity Recognition and Measurement Using Wearable Sensors.
IEEE Internet Things J., 2019

2018
A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

A 3-D Security Modeling Platform for Social IoT Environments.
IEEE Trans. Comput. Soc. Syst., 2018

Measuring web service security in the era of Internet of Things.
Comput. Electr. Eng., 2018

Strengthening the Blockchain-Based Internet of Value with Trust.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Reinforcement Learning for Vehicle Route Optimization in SUMO.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

A Survey on Secure Safety Applications in VANET.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
Modelling, validating, and ranking of secure service compositions.
Softw. Pract. Exp., 2017

PMU Placement in Electric Transmission Networks for Reliable State Estimation Against False Data Injection Attacks.
IEEE Internet Things J., 2017

Study of Group Route Optimization for IoT Enabled Urban Transportation Network.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

From Personal Experience to Global Reputation for Trust Evaluation in the Social Internet of Things.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Languages.
Proceedings of the 10th International Conference on Developments in eSystems Engineering, 2017

2016
A Survey on Quantitative Evaluation of Web Service Security.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Survey on Urban Traffic Optimisation for Sustainable and Resilient Transportation Network.
Proceedings of the 9th International Conference on Developments in eSystems Engineering, 2016

Adding a Third Dimension to BPMN as a Means of Representing Cyber Security Requirements.
Proceedings of the 9th International Conference on Developments in eSystems Engineering, 2016

2015
Group consensus measurement in MADM with multiple preference formats.
J. Decis. Syst., 2015

BPMN Security Extensions for Healthcare Process.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

A Cyber Security Ontology for BPMN-Security Extensions.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Protecting Future Personal Computing: Challenging Traditional Network Security Models.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Lightweight Forensics Application: Lightweight Approach to Securing Mobile Devices.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

A Heuristic Approach for Secure Service Composition Adaptation.
Proceedings of the Cyberpatterns, 2014

Dynamic Monitoring of Composed Services.
Proceedings of the Cyberpatterns, 2014

2013
A Framework for Secure Service Composition.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Event Driven Monitoring of Composite Services.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Prototype for design-time secure and trustworthy service composition.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
A Compose Language-Based Framework for Secure Service Composition.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2010
A Novel Intrusion Detection System for Smart Space.
Proceedings of the Handbook of Research on Computational Forensics, 2010

System-of-systems boundary check in a public event scenario.
Proceedings of the 5th International Conference on System of Systems Engineering, 2010

2008
Balancing intrusion detection resources in ubiquitous computing networks.
Comput. Commun., 2008

2007
SUIDS : a resource-efficient intrusion detection system for ubiquitous computing environments.
PhD thesis, 2007

Towards Energy-Efficient Intrusion Detection in Pervasive Computing.
Proceedings of IEEE International Conference on Communications, 2007

2006
Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach.
Proceedings of the Computational Science and Its Applications, 2006

Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

A framework for intrusion detection in heterogeneous environments.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006


  Loading...