Qi Shi

According to our database1, Qi Shi authored at least 137 papers between 1991 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A dynamic access point allocation algorithm for dense wireless LANs using potential game.
Comput. Networks, 2020

Efficient Non-Linear Covert Channel Detection in TCP Data Streams.
IEEE Access, 2020

2019
Efficient, Secure, and Privacy-Preserving PMIPv6 Protocol for V2G Networks.
IEEE Trans. Vehicular Technology, 2019

Machine Learning Based Trust Computational Model for IoT Services.
T-SUSC, 2019

Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption.
Sensors, 2019

Coupling Ocean Currents and Waves with Wind Stress over the Gulf Stream.
Remote Sensing, 2019

CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things.
IEEE Internet of Things Journal, 2019

Radio resource management framework for energy-efficient communications in the Internet of Things.
Trans. Emerging Telecommunications Technologies, 2019

Behaviour-aware Malware Classification: Dynamic Feature Selection.
Proceedings of the 11th International Conference on Knowledge and Systems Engineering, 2019

Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network.
Proceedings of the 11th International Conference on Knowledge and Systems Engineering, 2019

Channel Estimation for WiFi Prototype Systems with Super-Resolution Image Recovery.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Securing Things in the Healthcare Internet of Things.
Proceedings of the 2019 Global IoT Summit, 2019

Toward secure trading of unlicensed spectrum in cyber-physical systems.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

A Deep Learning Approach to Network Intrusion Detection.
IEEE Trans. Emerging Topics in Comput. Intellig., 2018

A 3-D Security Modeling Platform for Social IoT Environments.
IEEE Trans. Comput. Social Systems, 2018

Security policy monitoring of BPMN-based service compositions.
Journal of Software: Evolution and Process, 2018

SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel.
J. Inf. Sec. Appl., 2018

An Improved Fully Homomorphic Encryption Scheme for Cloud Computing.
IJCNIS, 2018

Wi-5: A Programming Architecture for Unlicensed Frequency Bands.
IEEE Communications Magazine, 2018

Measuring web service security in the era of Internet of Things.
Comput. Electr. Eng., 2018

A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks.
IEEE Access, 2018

Revocable, Decentralized Multi-Authority Access Control System.
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018

Iot Forensics: Challenges for the Ioa Era.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

AP selection algorithm based on a potential game for large IEEE 802.11 WLANs.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Validation of Two-Way Coupled Air-Sea Model Stress and Currents Through Remotely Sensed Winds and SST.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

A Survey on Secure Safety Applications in VANET.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks.
IEEE Trans. Network and Service Management, 2017

Modelling, validating, and ranking of secure service compositions.
Softw., Pract. Exper., 2017

Accurate van der Waals force field for gas adsorption in porous materials.
Journal of Computational Chemistry, 2017

Fine-Grained Radio Resource Management to Control Interference in Dense Wi-Fi Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Using aspect oriented programming to enforce privacy preserving communication in distributed systems.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Distributed Attack Prevention Using Dempster-Shafer Theory of Evidence.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Languages.
Proceedings of the 10th International Conference on Developments in eSystems Engineering, 2017

2016
Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks.
IEEE Trans. Vehicular Technology, 2016

Group Authentication Scheme for Neighbourhood Area Networks (NANs) in Smart Grids.
J. Sensor and Actuator Networks, 2016

Rhythmic Oscillations of Excitatory Bursting Hodkin-Huxley Neuronal Network with Synaptic Learning.
Comp. Int. and Neurosc., 2016

Critical Infrastructure Testbed for Cyber-Security Training and Research.
Proceedings of the UKAIS 2016, 2016

A Survey on Quantitative Evaluation of Web Service Security.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Replay Attack Impact on Advanced Metering Infrastructure (AMI).
Proceedings of the Smart Grid Inspired Future Technologies, 2016

A System for Intrusion Prediction in Cloud Computing.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

A centralized framework for smart access point selection based on the Fittingness Factor.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

SDN-based channel assignment algorithm for interference management in dense Wi-Fi networks.
Proceedings of the European Conference on Networks and Communications, 2016

A centralised Wi-Fi management framework for D2D communications in dense Wi-Fi networks.
Proceedings of the 2016 IEEE Conference on Standards for Communications and Networking, 2016

2015
Situation-Aware QoS Routing Algorithm for Vehicular Ad Hoc Networks.
IEEE Trans. Vehicular Technology, 2015

Polar Codes for Multiple Descriptions.
IEEE Trans. Information Theory, 2015

Fair signature exchange via delegation on ubiquitous networks.
J. Comput. Syst. Sci., 2015

Motion Control of a Wheeled Inverted Pendulum Using Equivalent-Input-Disturbance Approach.
JACIII, 2015

Hosting critical infrastructure services in the cloud environment considerations.
IJCIS, 2015

Burst synchronization of inhibitory spiking neuronal networks.
Proceedings of the 11th International Conference on Natural Computation, 2015

A New Prime and Probe Cache Side-Channel Attack for Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Digital Memories Based Mobile User Authentication for IoT.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Monitoring Threats to Composite Services within the Aniketos Run-Time Framework.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Security Policy Monitoring of Composite Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Compensation of Stribeck-Type Nonlinear Friction in Positioning Control Using Equivalent-Input-Disturbance Approach.
JACIII, 2014

Simulating Critical Infrastructure Cascading Failure.
Proceedings of the UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, 2014

A Heuristic Approach for Secure Service Composition Adaptation.
Proceedings of the Cyberpatterns, 2014

Extending AOP Principles for the Description of Network Security Patterns.
Proceedings of the Cyberpatterns, 2014

Dynamic Monitoring of Composed Services.
Proceedings of the Cyberpatterns, 2014

2013
Component-based security system (COMSEC) with QoS for wireless sensor networks.
Security and Communication Networks, 2013

Resource-efficient authentic key establishment in heterogeneous wireless sensor networks.
J. Parallel Distrib. Comput., 2013

Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

A Framework for Secure Service Composition.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Event Driven Monitoring of Composite Services.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Secure rendering process in cloud computing.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Considering an elastic scaling model for cloud Security.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Misbehaviour monitoring on system-of-systems components.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Prototype for design-time secure and trustworthy service composition.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Efficient autonomous signature exchange on ubiquitous networks.
J. Network and Computer Applications, 2012

Pypette: A Platform for the Evaluation of Live Digital Forensics.
IJDCF, 2012

Pypette: A Framework for the Evaluation of Live Digital Forensic Acquisition Techniques.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012

Scalable Distributed Signature Detection.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012

Multiplayer Game Technology to Manage Critical Infrastructure Protection.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A framework for measuring security of services in ubiquitous computing environments.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Two-dimensional contract theory in Cognitive Radio networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A Compose Language-Based Framework for Secure Service Composition.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
Achieving autonomous fair exchange in ubiquitous network settings.
J. Network and Computer Applications, 2011

Fair exchange of valuable information: A generalised framework.
J. Comput. Syst. Sci., 2011

A Signature Detection Scheme for Distributed Storage.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011

Identity management in System-of-Systems Crisis Management situation.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

Information Flow Monitoring: Model, Policy, and Analysis.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

2010
Security in Wireless Sensor Networks.
Proceedings of the Handbook of Information and Communication Security, 2010

A Novel Intrusion Detection System for Smart Space.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Future security challenges in cloud computing.
IJMIS, 2010

System-of-systems boundary check in a public event scenario.
Proceedings of the 5th International Conference on System of Systems Engineering, 2010

Data Mishandling and Profile Building in Ubiquitous Environments.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Dynamic Device Configuration in Ubiquitous Environments.
Proceedings of the Global Security, Safety, and Sustainability, 2010

2009
Context-Aware Identity Management in Pervasive Ad-hoc Environments.
IJAPUC, 2009

Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets).
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Balancing intrusion detection resources in ubiquitous computing networks.
Computer Communications, 2008

2007
Achieving fine-grained access control in virtual organizations.
Concurrency and Computation: Practice and Experience, 2007

Towards Energy-Efficient Intrusion Detection in Pervasive Computing.
Proceedings of IEEE International Conference on Communications, 2007

Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Practical and efficient fair document exchange over networks.
J. Network and Computer Applications, 2006

Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach.
Proceedings of the Computational Science and Its Applications, 2006

Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

2005
Revocation of privacy-enhanced public-key certificates.
Journal of Systems and Software, 2005

Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking.
IEEE Journal on Selected Areas in Communications, 2005

RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery.
Journal of Computer Security, 2005

Plugging a Scalable Authentication Framework into Shibboleth.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Certified E-Mail Delivery with DSA Receipts.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A Linkable Identity Privacy Algorithm for HealthGrid.
Proceedings of the From Grid to Healthgrid, 2005

DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Buffer Overrun Prevention Through Component Composition Analysis.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
A unified approach to a fair document exchange system.
Journal of Systems and Software, 2004

Autonomous mobile agent based fair exchange.
Comput. Networks, 2004

An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A security framework for executables in a ubiquitous computing environment.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

DiDDeM: a system for early detection of TCP SYN flood attacks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
MNPA: A basis for privacy-enhanced QoS in mobile networks.
Microprocessors and Microsystems, 2003

An efficient protocol for anonymous and fair document exchange.
Comput. Networks, 2003

NetHost-Sensor: A Novel Concept in Intrusion Detection Systems.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

2002
The Threat From Within -An Analysis of Attacks on anInternal Network.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Requirements for a General Framework for Response to Distributed Denial-of-Service.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
The centralized formulation for complete dynamic modelling of robots.
J. Field Robotics, 2000

Advanced security techniques for network protection.
Computer Communications, 2000

MNPA: a mobile network privacy architecture.
Computer Communications, 2000

1999
A Flexible Approach to Secure and Fair Document Exchange.
Comput. J., 1999

1998
An effective model for composition of secure systems.
Journal of Systems and Software, 1998

1997
Achieving User Privacy in Mobile Networks.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
Achieving Non-Repudiation of Receipt.
Comput. J., 1996

Contact localization using force/torque measurements.
Proceedings of the 1996 IEEE International Conference on Robotics and Automation, 1996

A general approach to secure components composition.
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996

Applying Composable Security Properties to Assessment of Information Systems.
Proceedings of the COMPSAC '96, 1996

Security Issues in an EDI Environment.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

1995
A General Approach to Evaluation of Secure Systems.
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995

1994
On analysis of secure information systems: a case study.
Proceedings of the Eighteenth Annual International Computer Software and Applications Conference, 1994

1993
Constructing Secure Distributed Systems Using Components.
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993

Applying noninterference to composition of systems: a more practical approach.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1992
Secure composition of systems.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992

1991
A Formal Model of Security Dependency for Analysis and Testing of Secure Systems.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991


  Loading...