Qi Shi

Orcid: 0000-0002-3766-7808

Affiliations:
  • Liverpool John Moores University, Liverpool, UK


According to our database1, Qi Shi authored at least 145 papers between 1991 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Privacy and safety improvement of VANET data via a safety-related privacy scheme.
Int. J. Inf. Sec., 2023

A Trust-Based Cooperative System for Efficient Wi-Fi Radio Access Networks.
IEEE Access, 2023

Towards Trusted and Accountable Win-Win SDWN Platform for Trading Wi-Fi Network Access.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things.
IEEE Internet Things J., 2022

Blockchain-Enabled Intrusion Detection and Prevention System of APTs Within Zero Trust Architecture.
IEEE Access, 2022

2021
A Centralized Win-Win Cooperative Framework for Wi-Fi and 5G Radio Access Networks.
Wirel. Commun. Mob. Comput., 2021

Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

2020
Per-Flow Radio Resource Management to Mitigate Interference in Dense IEEE 802.11 Wireless LANs.
IEEE Trans. Mob. Comput., 2020

Strengthen user authentication on mobile devices by using user's touch dynamics pattern.
J. Ambient Intell. Humaniz. Comput., 2020

The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics.
Int. J. Digit. Crime Forensics, 2020

A dynamic access point allocation algorithm for dense wireless LANs using potential game.
Comput. Networks, 2020

A GPS-Less Localization and Mobility Modelling (LMM) System for Wildlife Tracking.
IEEE Access, 2020

Efficient Non-Linear Covert Channel Detection in TCP Data Streams.
IEEE Access, 2020

Adjusted Location Privacy Scheme for VANET Safety Applications.
Proceedings of the NOMS 2020, 2020

Privacy Preserving Issues in the Dynamic Internet of Things (IoT).
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Intrusion Detection Using Extremely Limited Data Based on SDN.
Proceedings of the 10th IEEE International Conference on Intelligent Systems, 2020

Realizing Physical Layer Security in Large Wireless Networks using Spectrum Programmability.
Proceedings of the IEEE Globecom Workshops, 2020

2019
Efficient, Secure, and Privacy-Preserving PMIPv6 Protocol for V2G Networks.
IEEE Trans. Veh. Technol., 2019

Machine Learning Based Trust Computational Model for IoT Services.
IEEE Trans. Sustain. Comput., 2019

Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption.
Sensors, 2019

CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things.
IEEE Internet Things J., 2019

Radio resource management framework for energy-efficient communications in the Internet of Things.
Trans. Emerg. Telecommun. Technol., 2019

Behaviour-aware Malware Classification: Dynamic Feature Selection.
Proceedings of the 11th International Conference on Knowledge and Systems Engineering, 2019

Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network.
Proceedings of the 11th International Conference on Knowledge and Systems Engineering, 2019

Sensing Your Touch: Strengthen User Authentication via Touch Dynamic Biometrics.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

A Fresh Look at Combining Logs and Network Data to Detect Anomalous Activity.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019

Securing Things in the Healthcare Internet of Things.
Proceedings of the 2019 Global IoT Summit, 2019

Toward secure trading of unlicensed spectrum in cyber-physical systems.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

A Deep Learning Approach to Network Intrusion Detection.
IEEE Trans. Emerg. Top. Comput. Intell., 2018

A 3-D Security Modeling Platform for Social IoT Environments.
IEEE Trans. Comput. Soc. Syst., 2018

Security policy monitoring of BPMN-based service compositions.
J. Softw. Evol. Process., 2018

SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel.
J. Inf. Secur. Appl., 2018

Wi-5: A Programming Architecture for Unlicensed Frequency Bands.
IEEE Commun. Mag., 2018

Measuring web service security in the era of Internet of Things.
Comput. Electr. Eng., 2018

A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks.
IEEE Access, 2018

Revocable, Decentralized Multi-Authority Access Control System.
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018

Iot Forensics: Challenges for the Ioa Era.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

AP selection algorithm based on a potential game for large IEEE 802.11 WLANs.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

A Survey on Secure Safety Applications in VANET.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks.
IEEE Trans. Netw. Serv. Manag., 2017

Modelling, validating, and ranking of secure service compositions.
Softw. Pract. Exp., 2017

Fine-Grained Radio Resource Management to Control Interference in Dense Wi-Fi Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Using aspect oriented programming to enforce privacy preserving communication in distributed systems.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Distributed Attack Prevention Using Dempster-Shafer Theory of Evidence.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Languages.
Proceedings of the 10th International Conference on Developments in eSystems Engineering, 2017

2016
Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks.
IEEE Trans. Veh. Technol., 2016

Group Authentication Scheme for Neighbourhood Area Networks (NANs) in Smart Grids.
J. Sens. Actuator Networks, 2016

Critical Infrastructure Testbed for Cyber-Security Training and Research.
Proceedings of the UKAIS 2016, 2016

A Survey on Quantitative Evaluation of Web Service Security.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Replay Attack Impact on Advanced Metering Infrastructure (AMI).
Proceedings of the Smart Grid Inspired Future Technologies, 2016

A System for Intrusion Prediction in Cloud Computing.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

A centralized framework for smart access point selection based on the Fittingness Factor.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

SDN-based channel assignment algorithm for interference management in dense Wi-Fi networks.
Proceedings of the European Conference on Networks and Communications, 2016

Adding a Third Dimension to BPMN as a Means of Representing Cyber Security Requirements.
Proceedings of the 9th International Conference on Developments in eSystems Engineering, 2016

A centralised Wi-Fi management framework for D2D communications in dense Wi-Fi networks.
Proceedings of the 2016 IEEE Conference on Standards for Communications and Networking, 2016

2015
Situation-Aware QoS Routing Algorithm for Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2015

Fair signature exchange via delegation on ubiquitous networks.
J. Comput. Syst. Sci., 2015

Hosting critical infrastructure services in the cloud environment considerations.
Int. J. Crit. Infrastructures, 2015

Detecting Intrusions in Federated Cloud Environments Using Security as a Service.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015

A Selective Regression Testing Approach for Composite Web Services.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015

A New Prime and Probe Cache Side-Channel Attack for Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Digital Memories Based Mobile User Authentication for IoT.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Monitoring Threats to Composite Services within the Aniketos Run-Time Framework.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Security Policy Monitoring of Composite Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Simulating Critical Infrastructure Cascading Failure.
Proceedings of the UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, 2014

A Heuristic Approach for Secure Service Composition Adaptation.
Proceedings of the Cyberpatterns, 2014

Extending AOP Principles for the Description of Network Security Patterns.
Proceedings of the Cyberpatterns, 2014

Dynamic Monitoring of Composed Services.
Proceedings of the Cyberpatterns, 2014

2013
Component-based security system (COMSEC) with QoS for wireless sensor networks.
Secur. Commun. Networks, 2013

Resource-efficient authentic key establishment in heterogeneous wireless sensor networks.
J. Parallel Distributed Comput., 2013

Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

A Framework for Secure Service Composition.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Event Driven Monitoring of Composite Services.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Secure rendering process in cloud computing.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Considering an elastic scaling model for cloud Security.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Misbehaviour monitoring on system-of-systems components.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Prototype for design-time secure and trustworthy service composition.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Efficient autonomous signature exchange on ubiquitous networks.
J. Netw. Comput. Appl., 2012

Pypette: A Platform for the Evaluation of Live Digital Forensics.
Int. J. Digit. Crime Forensics, 2012

Pypette: A Framework for the Evaluation of Live Digital Forensic Acquisition Techniques.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012

Scalable Distributed Signature Detection.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012

Multiplayer Game Technology to Manage Critical Infrastructure Protection.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A framework for measuring security of services in ubiquitous computing environments.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

A Compose Language-Based Framework for Secure Service Composition.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
Achieving autonomous fair exchange in ubiquitous network settings.
J. Netw. Comput. Appl., 2011

Fair exchange of valuable information: A generalised framework.
J. Comput. Syst. Sci., 2011

A Signature Detection Scheme for Distributed Storage.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011

Identity management in System-of-Systems Crisis Management situation.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

Information Flow Monitoring: Model, Policy, and Analysis.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

2010
Security in Wireless Sensor Networks.
Proceedings of the Handbook of Information and Communication Security, 2010

A Novel Intrusion Detection System for Smart Space.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Future security challenges in cloud computing.
Int. J. Multim. Intell. Secur., 2010

System-of-systems boundary check in a public event scenario.
Proceedings of the 5th International Conference on System of Systems Engineering, 2010

Data Mishandling and Profile Building in Ubiquitous Environments.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Dynamic Device Configuration in Ubiquitous Environments.
Proceedings of the Global Security, Safety, and Sustainability, 2010

2009
Context-Aware Identity Management in Pervasive Ad-hoc Environments.
Int. J. Adv. Pervasive Ubiquitous Comput., 2009

Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets).
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Balancing intrusion detection resources in ubiquitous computing networks.
Comput. Commun., 2008

2007
Achieving fine-grained access control in virtual organizations.
Concurr. Comput. Pract. Exp., 2007

Towards Energy-Efficient Intrusion Detection in Pervasive Computing.
Proceedings of IEEE International Conference on Communications, 2007

Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Practical and efficient fair document exchange over networks.
J. Netw. Comput. Appl., 2006

Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach.
Proceedings of the Computational Science and Its Applications, 2006

Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

A framework for intrusion detection in heterogeneous environments.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
Revocation of privacy-enhanced public-key certificates.
J. Syst. Softw., 2005

Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking.
IEEE J. Sel. Areas Commun., 2005

RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery.
J. Comput. Secur., 2005

Plugging a Scalable Authentication Framework into Shibboleth.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Certified E-Mail Delivery with DSA Receipts.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A Linkable Identity Privacy Algorithm for HealthGrid.
Proceedings of the From Grid to Healthgrid, 2005

DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Buffer Overrun Prevention Through Component Composition Analysis.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
A unified approach to a fair document exchange system.
J. Syst. Softw., 2004

Autonomous mobile agent based fair exchange.
Comput. Networks, 2004

An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A security framework for executables in a ubiquitous computing environment.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

DiDDeM: a system for early detection of TCP SYN flood attacks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
MNPA: A basis for privacy-enhanced QoS in mobile networks.
Microprocess. Microsystems, 2003

An efficient protocol for anonymous and fair document exchange.
Comput. Networks, 2003

NetHost-Sensor: A Novel Concept in Intrusion Detection Systems.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

2002
The Threat From Within -An Analysis of Attacks on anInternal Network.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Requirements for a General Framework for Response to Distributed Denial-of-Service.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Advanced security techniques for network protection.
Comput. Commun., 2000

MNPA: a mobile network privacy architecture.
Comput. Commun., 2000

1999
A Flexible Approach to Secure and Fair Document Exchange.
Comput. J., 1999

1998
An effective model for composition of secure systems.
J. Syst. Softw., 1998

1997
Achieving User Privacy in Mobile Networks.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
Achieving Non-Repudiation of Receipt.
Comput. J., 1996

A general approach to secure components composition.
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996

Applying Composable Security Properties to Assessment of Information Systems.
Proceedings of the COMPSAC '96, 1996

Security Issues in an EDI Environment.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

1995
A General Approach to Evaluation of Secure Systems.
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995

1994
On analysis of secure information systems: a case study.
Proceedings of the Eighteenth Annual International Computer Software and Applications Conference, 1994

1993
Constructing Secure Distributed Systems Using Components.
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993

Applying noninterference to composition of systems: a more practical approach.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1992
Secure composition of systems.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992

1991
A Formal Model of Security Dependency for Analysis and Testing of Secure Systems.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991


  Loading...