Bo Zhou

According to our database1, Bo Zhou authored at least 24 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
A Hybrid Hierarchical Framework for Gym Physical Activity Recognition and Measurement Using Wearable Sensors.
IEEE Internet of Things Journal, 2019

2018
A 3-D Security Modeling Platform for Social IoT Environments.
IEEE Trans. Comput. Social Systems, 2018

Measuring web service security in the era of Internet of Things.
Computers & Electrical Engineering, 2018

2017
Modelling, validating, and ranking of secure service compositions.
Softw., Pract. Exper., 2017

PMU Placement in Electric Transmission Networks for Reliable State Estimation Against False Data Injection Attacks.
IEEE Internet of Things Journal, 2017

Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Languages.
Proceedings of the 10th International Conference on Developments in eSystems Engineering, 2017

2016
A Survey on Quantitative Evaluation of Web Service Security.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
A Cyber Security Ontology for BPMN-Security Extensions.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Protecting Future Personal Computing: Challenging Traditional Network Security Models.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Lightweight Forensics Application: Lightweight Approach to Securing Mobile Devices.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

A Heuristic Approach for Secure Service Composition Adaptation.
Proceedings of the Cyberpatterns, 2014

Dynamic Monitoring of Composed Services.
Proceedings of the Cyberpatterns, 2014

2013
A Framework for Secure Service Composition.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Event Driven Monitoring of Composite Services.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Prototype for design-time secure and trustworthy service composition.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
A Compose Language-Based Framework for Secure Service Composition.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2010
A Novel Intrusion Detection System for Smart Space.
Proceedings of the Handbook of Research on Computational Forensics, 2010

System-of-systems boundary check in a public event scenario.
Proceedings of the 5th International Conference on System of Systems Engineering, 2010

2008
Balancing intrusion detection resources in ubiquitous computing networks.
Computer Communications, 2008

2007
SUIDS : a resource-efficient intrusion detection system for ubiquitous computing environments.
PhD thesis, 2007

Towards Energy-Efficient Intrusion Detection in Pervasive Computing.
Proceedings of IEEE International Conference on Communications, 2007

2006
Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach.
Proceedings of the Computational Science and Its Applications, 2006

Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006


  Loading...