default search action
Qi Shi 0001
Person information
- affiliation: Liverpool John Moores University, Liverpool, UK
Other persons with the same name
- Qi Shi — disambiguation page
- Qi Shi 0002 — Harbin Institute of Technology, Harbin, China
- Qi Shi 0003 — University of Southampton, UK (and 1 more)
- Qi Shi 0004 — Shanghai University, School of Information and Communication Engineering, China
- Qi Shi 0005 — McMaster University, Hamilton, ON, Canada
- Qi Shi 0006 — Donghua University, Shanghai, China
- Qi Shi 0007 — Tokyo University of Technology, Tokyo, Japan
- Qi Shi 0008 — University of Texas at Arlington, Fort Worth, TX, USA
- Qi Shi 0009 — Michigan Technological University, Houghton, MI, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j54]Alessandro Raschellà, Max Hashem Eiza, Michael Mackay, Qi Shi, Matthew Banton:
A Trust-Based Cooperative System for Efficient Wi-Fi Radio Access Networks. IEEE Access 11: 136136-136149 (2023) - [j53]Ruqayah Al-Ani, Thar Baker, Bo Zhou, Qi Shi:
Privacy and safety improvement of VANET data via a safety-related privacy scheme. Int. J. Inf. Sec. 22(4): 763-783 (2023) - [c82]Max Hashem Eiza, Alessandro Raschellà, Michael Mackay, Qi Shi, Faycal Bouhafs:
Towards Trusted and Accountable Win-Win SDWN Platform for Trading Wi-Fi Network Access. CCNC 2023: 1-6 - 2022
- [j52]Lampis Alevizos, Max Hashem Eiza, Ta Vinh Thong, Qi Shi, Janet C. Read:
Blockchain-Enabled Intrusion Detection and Prevention System of APTs Within Zero Trust Architecture. IEEE Access 10: 89270-89288 (2022) - [j51]Anuoluwapo A. Adewuyi, Hui Cheng, Qi Shi, Jiannong Cao, Xingwei Wang, Bo Zhou:
SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things. IEEE Internet Things J. 9(5): 3298-3312 (2022) - 2021
- [j50]Ghulam Mohi Ud Din, Angelos K. Marnerides, Qi Shi, Chelsea Dobbins, Áine MacDermott:
Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems. IEEE Trans. Emerg. Top. Comput. Intell. 5(6): 860-870 (2021) - [j49]Alessandro Raschellà, Omar Aldhaibani, Sara Pizzi, Michael Mackay, Faycal Bouhafs, Giuseppe Araniti, Qi Shi, M. Carmen Lucas-Estan:
A Centralized Win-Win Cooperative Framework for Wi-Fi and 5G Radio Access Networks. Wirel. Commun. Mob. Comput. 2021: 5515271:1-5515271:11 (2021) - 2020
- [j48]Hanaa Nafea, Kashif Kifayat, Qi Shi, Kashif Naseer Qureshi, Bob Askwith:
Efficient Non-Linear Covert Channel Detection in TCP Data Streams. IEEE Access 8: 1680-1690 (2020) - [j47]Ayesha Naureen, Ning Zhang, Steve B. Furber, Qi Shi:
A GPS-Less Localization and Mobility Modelling (LMM) System for Wildlife Tracking. IEEE Access 8: 102709-102732 (2020) - [j46]Alessandro Raschellà, Faycal Bouhafs, Michael Mackay, Qi Shi, Jorge Ortín, José Ramón Gállego, María Canales:
A dynamic access point allocation algorithm for dense wireless LANs using potential game. Comput. Networks 167 (2020) - [j45]Áine MacDermott, Thar Baker, Paul Buck, Farkhund Iqbal, Qi Shi:
The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics. Int. J. Digit. Crime Forensics 12(1): 1-13 (2020) - [j44]Pin Shen Teh, Ning Zhang, Syh-Yuan Tan, Qi Shi, Wee-How Khoh, Raheel Nawaz:
Strengthen user authentication on mobile devices by using user's touch dynamics pattern. J. Ambient Intell. Humaniz. Comput. 11(10): 4019-4039 (2020) - [j43]Faycal Bouhafs, Mirghiasaldin Seyedebrahimi, Alessandro Raschellà, Michael Mackay, Qi Shi:
Per-Flow Radio Resource Management to Mitigate Interference in Dense IEEE 802.11 Wireless LANs. IEEE Trans. Mob. Comput. 19(5): 1170-1183 (2020) - [c81]Faycal Bouhafs, Frank T. H. den Hartog, Alessandro Raschellà, Michael Mackay, Qi Shi, Sinan Sinanovic:
Realizing Physical Layer Security in Large Wireless Networks using Spectrum Programmability. GLOBECOM (Workshops) 2020: 1-6 - [c80]Matthew Banton, Nathan Shone, William Hurst, Qi Shi:
Intrusion Detection Using Extremely Limited Data Based on SDN. IEEE Conf. on Intelligent Systems 2020: 304-309 - [c79]Áine MacDermott, John Carr, Qi Shi, Mohd Rizuan Baharon, Gyu Myoung Lee:
Privacy Preserving Issues in the Dynamic Internet of Things (IoT). ISNCC 2020: 1-6 - [c78]Ruqayah Al-Ani, Bo Zhou, Qi Shi, Thar Baker, Mohamed Abdlhamed:
Adjusted Location Privacy Scheme for VANET Safety Applications. NOMS 2020: 1-4
2010 – 2019
- 2019
- [j42]Deepak G. C., Faycal Bouhafs, Alessandro Raschellà, Michael Mackay, Qi Shi:
Radio resource management framework for energy-efficient communications in the Internet of Things. Trans. Emerg. Telecommun. Technol. 30(12) (2019) - [j41]Anuoluwapo A. Adewuyi, Hui Cheng, Qi Shi, Jiannong Cao, Áine MacDermott, Xingwei Wang:
CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things. IEEE Internet Things J. 6(3): 5432-5445 (2019) - [j40]Ruqayah R. Al-Dahhan, Qi Shi, Gyu Myoung Lee, Kashif Kifayat:
Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption. Sensors 19(7): 1695 (2019) - [j39]Upul Jayasinghe, Gyu Myoung Lee, Tai-Won Um, Qi Shi:
Machine Learning Based Trust Computational Model for IoT Services. IEEE Trans. Sustain. Comput. 4(1): 39-52 (2019) - [j38]Mahmoud Hashem Eiza, Qi Shi, Angelos K. Marnerides, Thomas J. Owens, Qiang Ni:
Efficient, Secure, and Privacy-Preserving PMIPv6 Protocol for V2G Networks. IEEE Trans. Veh. Technol. 68(1): 19-33 (2019) - [c77]Frank T. H. den Hartog, Faycal Bouhafs, Qi Shi:
Toward secure trading of unlicensed spectrum in cyber-physical systems. CCNC 2019: 1-4 - [c76]Áine MacDermott, Phillip Kendrick, Ibrahim Idowu, Mal Ashall, Qi Shi:
Securing Things in the Healthcare Internet of Things. GIoTS 2019: 1-6 - [c75]Matthew Banton, Nathan Shone, William Hurst, Qi Shi:
A Fresh Look at Combining Logs and Network Data to Detect Anomalous Activity. ICT-DM 2019: 1-6 - [c74]Pin Shen Teh, Ning Zhang, Syh-Yuan Tan, Qi Shi, Raheel Nawaz, Wee-How Khoh:
Sensing Your Touch: Strengthen User Authentication via Touch Dynamic Biometrics. ICTC 2019: 289-294 - [c73]Nguyen Viet Hung, Pham Ngoc Dung, Nguyen Ngoc Tran, Vu Dinh Phai, Qi Shi:
Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network. KSE 2019: 1-5 - [c72]Vu Dinh Phai, Nathan Shone, Phan Huy Dung, Qi Shi, Nguyen Viet Hung, Nguyen Ngoc Tran:
Behaviour-aware Malware Classification: Dynamic Feature Selection. KSE 2019: 1-5 - 2018
- [j37]Kemedi Moara-Nkwe, Qi Shi, Gyu Myoung Lee, Mahmoud Hashem Eiza:
A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks. IEEE Access 6: 11374-11387 (2018) - [j36]Bo Zhou, Quan Zhang, Qi Shi, Qiang Yang, Po Yang, Yinyan Yu:
Measuring web service security in the era of Internet of Things. Comput. Electr. Eng. 66: 305-315 (2018) - [j35]Faycal Bouhafs, Michael Mackay, Alessandro Raschellà, Qi Shi, Frank T. H. den Hartog, Jose Saldana, Ruben Munilla, José Ruíz-Mas, Julián Fernández-Navajas, Jose Almodovar, Niels L. M. van Adrichem:
Wi-5: A Programming Architecture for Unlicensed Frequency Bands. IEEE Commun. Mag. 56(12): 178-185 (2018) - [j34]Paul R. McWhirter, Kashif Kifayat, Qi Shi, Bob Askwith:
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel. J. Inf. Secur. Appl. 40: 199-216 (2018) - [j33]Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Thar Baker, Qi Shi, Brett Lempereur:
Security policy monitoring of BPMN-based service compositions. J. Softw. Evol. Process. 30(9) (2018) - [j32]Bo Zhou, Curtis L. Maines, Stephen Tang, Qi Shi, Po Yang, Qiang Yang, Jun Qi:
A 3-D Security Modeling Platform for Social IoT Environments. IEEE Trans. Comput. Soc. Syst. 5(4): 1174-1188 (2018) - [j31]Nathan Shone, Nguyen Ngoc Tran, Vu Dinh Phai, Qi Shi:
A Deep Learning Approach to Network Intrusion Detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1): 41-50 (2018) - [c71]Ruqayah Al-Ani, Bo Zhou, Qi Shi, Ali M. Sagheer:
A Survey on Secure Safety Applications in VANET. HPCC/SmartCity/DSS 2018: 1485-1490 - [c70]Alessandro Raschellà, Faycal Bouhafs, Michael Mackay, Qi Shi, Jorge Ortín, José Ramón Gállego, María Canales:
AP selection algorithm based on a potential game for large IEEE 802.11 WLANs. NOMS 2018: 1-7 - [c69]Áine MacDermott, Thar Baker, Qi Shi:
Iot Forensics: Challenges for the Ioa Era. NTMS 2018: 1-5 - [c68]Ruqayah R. Al-Dahhan, Qi Shi, Gyu Myoung Lee, Kashif Kifayat:
Revocable, Decentralized Multi-Authority Access Control System. UCC Companion 2018: 220-225 - [p9]Bo Zhou, Curtis L. Maines, Stephen Tang, Qi Shi:
A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 339-366 - 2017
- [j30]Achim D. Brucker, Bo Zhou, Francesco Malmignati, Qi Shi, Madjid Merabti:
Modelling, validating, and ranking of secure service compositions. Softw. Pract. Exp. 47(12): 1923-1943 (2017) - [j29]Alessandro Raschellà, Faycal Bouhafs, Mirghiasaldin Seyedebrahimi, Michael Mackay, Qi Shi:
Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks. IEEE Trans. Netw. Serv. Manag. 14(2): 441-455 (2017) - [c67]Curtis L. Maines, Bo Zhou, Stephen Tang, Qi Shi:
Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Languages. DeSE 2017: 71-76 - [c66]Áine MacDermott, Qi Shi, Kashif Kifayat:
Distributed Attack Prevention Using Dempster-Shafer Theory of Evidence. ICIC (3) 2017: 203-212 - [c65]A. A. Thulnoon, Brett Lempereur, Qi Shi, Dhiya Al-Jumeily:
Using aspect oriented programming to enforce privacy preserving communication in distributed systems. ICC 2017: 192:1-192:8 - [c64]Mirghiasaldin Seyedebrahimi, Faycal Bouhafs, Alessandro Raschellà, Michael Mackay, Qi Shi:
Fine-Grained Radio Resource Management to Control Interference in Dense Wi-Fi Networks. WCNC 2017: 1-6 - 2016
- [j28]Bashar Ahmed Alohali, Kashif Kifayat, Qi Shi, William Hurst:
Group Authentication Scheme for Neighbourhood Area Networks (NANs) in Smart Grids. J. Sens. Actuator Networks 5(2): 9 (2016) - [j27]Mahmoud Hashem Eiza, Qiang Ni, Qi Shi:
Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks. IEEE Trans. Veh. Technol. 65(10): 7868-7881 (2016) - [c63]Mirghiasaldin Seyedebrahimi, Alessandro Raschellà, Faycal Bouhafs, Michael Mackay, Qi Shi, Mahmoud Hashem Eiza:
A centralised Wi-Fi management framework for D2D communications in dense Wi-Fi networks. CSCN 2016: 269-274 - [c62]Curtis L. Maines, Bo Zhou, Stephen Tang, Qi Shi:
Adding a Third Dimension to BPMN as a Means of Representing Cyber Security Requirements. DeSE 2016: 105-110 - [c61]Mirghiasaldin Seyedebrahimi, Faycal Bouhafs, Alessandro Raschellà, Michael Mackay, Qi Shi:
SDN-based channel assignment algorithm for interference management in dense Wi-Fi networks. EuCNC 2016: 128-132 - [c60]Mahmoud Hashem Eiza, Qi Shi, Angelos K. Marnerides, Thomas J. Owens:
Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks. ICC 2016: 1-6 - [c59]Alessandro Raschellà, Faycal Bouhafs, Mirghiasaldin Seyedebrahimi, Michael Mackay, Qi Shi:
A centralized framework for smart access point selection based on the Fittingness Factor. ICT 2016: 1-5 - [c58]Mohamed Abdlhamed, Kashif Kifayat, Qi Shi, William Hurst:
A System for Intrusion Prediction in Cloud Computing. ICC 2016 2016: 35:1-35:9 - [c57]Bashar Ahmed Alohali, Kashif Kifayat, Qi Shi, William Hurst:
Replay Attack Impact on Advanced Metering Infrastructure (AMI). SmartGIFT 2016: 52-59 - [c56]Bo Zhou, Qi Shi, Po Yang:
A Survey on Quantitative Evaluation of Web Service Security. Trustcom/BigDataSE/ISPA 2016: 715-721 - [c55]William Hurst, Nathan Shone, Qi Shi:
Critical Infrastructure Testbed for Cyber-Security Training and Research. UKAIS 2016: 23 - 2015
- [j26]Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat:
Hosting critical infrastructure services in the cloud environment considerations. Int. J. Crit. Infrastructures 11(4): 365-381 (2015) - [j25]Qi Shi, Ning Zhang, Madjid Merabti:
Fair signature exchange via delegation on ubiquitous networks. J. Comput. Syst. Sci. 81(4): 615-631 (2015) - [j24]Mahmoud Hashem Eiza, Thomas J. Owens, Qiang Ni, Qi Shi:
Situation-Aware QoS Routing Algorithm for Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 64(12): 5520-5535 (2015) - [c54]Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones:
A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing. CIT/IUCC/DASC/PICom 2015: 618-625 - [c53]Younis A. Younis, Kashif Kifayat, Qi Shi, Bob Askwith:
A New Prime and Probe Cache Side-Channel Attack for Cloud Computing. CIT/IUCC/DASC/PICom 2015: 1718-1724 - [c52]Nathan Shone, Chelsea Dobbins, William Hurst, Qi Shi:
Digital Memories Based Mobile User Authentication for IoT. CIT/IUCC/DASC/PICom 2015: 1796-1802 - [c51]Áine MacDermott, Qi Shi, Kashif Kifayat:
Detecting Intrusions in Federated Cloud Environments Using Security as a Service. DeSE 2015: 91-96 - [c50]Paul Buck, Qi Shi, Áine MacDermott:
A Selective Regression Testing Approach for Composite Web Services. DeSE 2015: 97-101 - 2014
- [c49]Áine MacDermott, William Hurst, Qi Shi, Madjid Merabti:
Simulating Critical Infrastructure Cascading Failure. UKSim 2014: 324-329 - [p8]David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Extending AOP Principles for the Description of Network Security Patterns. Cyberpatterns 2014: 73-84 - [p7]Bo Zhou, David Llewellyn-Jones, David J. Lamb, Muhammad Asim, Qi Shi, Madjid Merabti:
A Heuristic Approach for Secure Service Composition Adaptation. Cyberpatterns 2014: 97-105 - [p6]Muhammad Asim, Bo Zhou, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Dynamic Monitoring of Composed Services. Cyberpatterns 2014: 235-245 - [p5]Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services. Secure and Trustworthy Service Composition 2014: 121-135 - [p4]Brett Lempereur, Dhouha Ayed, Muhammad Asim, Madjid Merabti, Qi Shi:
Monitoring Threats to Composite Services within the Aniketos Run-Time Framework. Secure and Trustworthy Service Composition 2014: 173-191 - [p3]Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Brett Lempereur, Qi Shi:
Security Policy Monitoring of Composite Services. Secure and Trustworthy Service Composition 2014: 192-202 - 2013
- [j23]Qi Shi, Ning Zhang, Madjid Merabti, Kashif Kifayat:
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks. J. Parallel Distributed Comput. 73(2): 235-249 (2013) - [j22]Kashif Kifayat, Madjid Merabti, Qi Shi, Sohail Abbas:
Component-based security system (COMSEC) with QoS for wireless sensor networks. Secur. Commun. Networks 6(4): 461-472 (2013) - [c48]Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti:
Prototype for design-time secure and trustworthy service composition. CCNC 2013: 847-848 - [c47]Nathan Shone, Qi Shi, Madjid Merabti, Kashif Kifayat:
Misbehaviour monitoring on system-of-systems components. CRiSIS 2013: 1-6 - [c46]Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat:
Considering an elastic scaling model for cloud Security. ICITST 2013: 150-155 - [c45]Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones, Madjid Merabti:
Secure rendering process in cloud computing. PST 2013: 82-87 - [c44]Muhammad Asim, David Llewellyn-Jones, Brett Lempereur, Bo Zhou, Qi Shi, Madjid Merabti:
Event Driven Monitoring of Composite Services. SocialCom 2013: 550-557 - [c43]Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
A Framework for Secure Service Composition. SocialCom 2013: 647-652 - [c42]Nathan Shone, Qi Shi, Madjid Merabti, Kashif Kifayat:
Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems. UIC/ATC 2013: 438-443 - 2012
- [j21]Brett Lempereur, Madjid Merabti, Qi Shi:
Pypette: A Platform for the Evaluation of Live Digital Forensics. Int. J. Digit. Crime Forensics 4(4): 31-46 (2012) - [j20]Qi Shi, Ning Zhang, David Llewellyn-Jones:
Efficient autonomous signature exchange on ubiquitous networks. J. Netw. Comput. Appl. 35(6): 1793-1806 (2012) - [c41]Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti, David J. Lamb:
A Compose Language-Based Framework for Secure Service Composition. CyberSecurity 2012: 195-202 - [c40]Michael Kennedy, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
A framework for measuring security of services in ubiquitous computing environments. PerCom Workshops 2012: 112-117 - [c39]Laura Pla Beltran, Madjid Merabti, Qi Shi:
Multiplayer Game Technology to Manage Critical Infrastructure Protection. TrustCom 2012: 549-556 - [c38]Robert Hegarty, Madjid Merabti, Qi Shi, Robert Askwith:
Scalable Distributed Signature Detection. WDFIA 2012: 27-37 - [c37]Brett Lempereur, Madjid Merabti, Qi Shi:
Pypette: A Framework for the Evaluation of Live Digital Forensic Acquisition Techniques. WDFIA 2012: 87-96 - 2011
- [j19]Qi Shi, Ning Zhang, Madjid Merabti:
Fair exchange of valuable information: A generalised framework. J. Comput. Syst. Sci. 77(2): 348-371 (2011) - [j18]Qi Shi, Ning Zhang, Madjid Merabti, Robert Askwith:
Achieving autonomous fair exchange in ubiquitous network settings. J. Netw. Comput. Appl. 34(2): 653-667 (2011) - [c36]Brett Lempereur, Madjid Merabti, Qi Shi:
Information Flow Monitoring: Model, Policy, and Analysis. DeSE 2011: 227-232 - [c35]Abdullahi Arabo, Mike Kennedy, Qi Shi, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Identity management in System-of-Systems Crisis Management situation. SoSE 2011: 37-42 - [c34]Robert Hegarty, Madjid Merabti, Qi Shi, Robert Askwith:
A Signature Detection Scheme for Distributed Storage. WDFIA 2011: 122-132 - 2010
- [j17]Kashif Kifayat, Madjid Merabti, Qi Shi:
Future security challenges in cloud computing. Int. J. Multim. Intell. Secur. 1(4): 428-442 (2010) - [c33]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Dynamic Device Configuration in Ubiquitous Environments. ICGS3 2010: 263-273 - [c32]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Data Mishandling and Profile Building in Ubiquitous Environments. SocialCom/PASSAT 2010: 1056-1063 - [c31]Bo Zhou, Oliver Drew, Abdullahi Arabo, David Llewellyn-Jones, Kashif Kifayat, Madjid Merabti, Qi Shi, Rachel Craddock, Adrian Waller, Glyn Jones:
System-of-systems boundary check in a public event scenario. SoSE 2010: 1-8 - [p2]Bo Zhou, Qi Shi, Madjid Merabti:
A Novel Intrusion Detection System for Smart Space. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 307-333 - [p1]Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Security in Wireless Sensor Networks. Handbook of Information and Communication Security 2010: 513-552
2000 – 2009
- 2009
- [j16]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Context-Aware Identity Management in Pervasive Ad-hoc Environments. Int. J. Adv. Pervasive Ubiquitous Comput. 1(4): 29-42 (2009) - [c30]Abdullahi Arabo, Qi Shi, Madjid Merabti:
Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets). AINA Workshops 2009: 588-594 - 2008
- [j15]Bo Zhou, Qi Shi, Madjid Merabti:
Balancing intrusion detection resources in ubiquitous computing networks. Comput. Commun. 31(15): 3643-3653 (2008) - 2007
- [j14]Ning Zhang, Li Yao, Aleksandra Nenadic, Jay Chin, Carole A. Goble, Alan L. Rector, David W. Chadwick, Sassa Otenko, Qi Shi:
Achieving fine-grained access control in virtual organizations. Concurr. Comput. Pract. Exp. 19(9): 1333-1352 (2007) - [c29]Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. IAS 2007: 44-49 - [c28]Bo Zhou, Qi Shi, Madjid Merabti:
Towards Energy-Efficient Intrusion Detection in Pervasive Computing. ICC 2007: 1417-1422 - 2006
- [j13]Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith:
Practical and efficient fair document exchange over networks. J. Netw. Comput. Appl. 29(1): 46-61 (2006) - [c27]Bo Zhou, Qi Shi, Madjid Merabti:
A framework for intrusion detection in heterogeneous environments. CCNC 2006: 1244-1248 - [c26]Bo Zhou, Qi Shi, Madjid Merabti:
Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. COMPSAC (2) 2006: 203-208 - [c25]Bo Zhou, Qi Shi, Madjid Merabti:
Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. ICCSA (4) 2006: 352-359 - 2005
- [j12]Aleksandra Nenadic, Ning Zhang, Qi Shi:
RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery. J. Comput. Secur. 13(5): 757-777 (2005) - [j11]