Qi Shi
Orcid: 0000-0002-3766-7808Affiliations:
- Liverpool John Moores University, Liverpool, UK
According to our database1,
Qi Shi
authored at least 146 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Secure semi-automated GDPR compliance service with restrictive fine-grained access control.
Secur. Priv., 2024
2023
Int. J. Inf. Sec., 2023
IEEE Access, 2023
Towards Trusted and Accountable Win-Win SDWN Platform for Trading Wi-Fi Network Access.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
2022
SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things.
IEEE Internet Things J., 2022
Blockchain-Enabled Intrusion Detection and Prevention System of APTs Within Zero Trust Architecture.
IEEE Access, 2022
2021
Wirel. Commun. Mob. Comput., 2021
Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2021
2020
Per-Flow Radio Resource Management to Mitigate Interference in Dense IEEE 802.11 Wireless LANs.
IEEE Trans. Mob. Comput., 2020
Strengthen user authentication on mobile devices by using user's touch dynamics pattern.
J. Ambient Intell. Humaniz. Comput., 2020
The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics.
Int. J. Digit. Crime Forensics, 2020
A dynamic access point allocation algorithm for dense wireless LANs using potential game.
Comput. Networks, 2020
IEEE Access, 2020
Proceedings of the NOMS 2020, 2020
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Proceedings of the 10th IEEE International Conference on Intelligent Systems, 2020
Realizing Physical Layer Security in Large Wireless Networks using Spectrum Programmability.
Proceedings of the IEEE Globecom Workshops, 2020
2019
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Sustain. Comput., 2019
CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things.
IEEE Internet Things J., 2019
Radio resource management framework for energy-efficient communications in the Internet of Things.
Trans. Emerg. Telecommun. Technol., 2019
Proceedings of the 11th International Conference on Knowledge and Systems Engineering, 2019
Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network.
Proceedings of the 11th International Conference on Knowledge and Systems Engineering, 2019
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019
Proceedings of the 2019 Global IoT Summit, 2019
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019
2018
A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
IEEE Trans. Emerg. Top. Comput. Intell., 2018
IEEE Trans. Comput. Soc. Syst., 2018
J. Softw. Evol. Process., 2018
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel.
J. Inf. Secur. Appl., 2018
IEEE Commun. Mag., 2018
Comput. Electr. Eng., 2018
A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks.
IEEE Access, 2018
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
2017
Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks.
IEEE Trans. Netw. Serv. Manag., 2017
Softw. Pract. Exp., 2017
Fine-Grained Radio Resource Management to Control Interference in Dense Wi-Fi Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
Using aspect oriented programming to enforce privacy preserving communication in distributed systems.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017
Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Languages.
Proceedings of the 10th International Conference on Developments in eSystems Engineering, 2017
2016
Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks.
IEEE Trans. Veh. Technol., 2016
J. Sens. Actuator Networks, 2016
Proceedings of the UKAIS 2016, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Smart Grid Inspired Future Technologies, 2016
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016
A centralized framework for smart access point selection based on the Fittingness Factor.
Proceedings of the 23rd International Conference on Telecommunications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
SDN-based channel assignment algorithm for interference management in dense Wi-Fi networks.
Proceedings of the European Conference on Networks and Communications, 2016
Adding a Third Dimension to BPMN as a Means of Representing Cyber Security Requirements.
Proceedings of the 9th International Conference on Developments in eSystems Engineering, 2016
A centralised Wi-Fi management framework for D2D communications in dense Wi-Fi networks.
Proceedings of the 2016 IEEE Conference on Standards for Communications and Networking, 2016
2015
IEEE Trans. Veh. Technol., 2015
J. Comput. Syst. Sci., 2015
Int. J. Crit. Infrastructures, 2015
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014
The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014
Proceedings of the UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, 2014
Proceedings of the Cyberpatterns, 2014
Proceedings of the Cyberpatterns, 2014
2013
Secur. Commun. Networks, 2013
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks.
J. Parallel Distributed Comput., 2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013
2012
J. Netw. Comput. Appl., 2012
Int. J. Digit. Crime Forensics, 2012
Pypette: A Framework for the Evaluation of Live Digital Forensic Acquisition Techniques.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
2011
J. Netw. Comput. Appl., 2011
J. Comput. Syst. Sci., 2011
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011
Proceedings of the 6th International Conference on System of Systems Engineering, 2011
Proceedings of the 2011 Developments in E-systems Engineering, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
Proceedings of the Handbook of Research on Computational Forensics, 2010
Proceedings of the 5th International Conference on System of Systems Engineering, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Global Security, Safety, and Sustainability, 2010
2009
Int. J. Adv. Pervasive Ubiquitous Comput., 2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Comput. Commun., 2008
2007
Concurr. Comput. Pract. Exp., 2007
Proceedings of IEEE International Conference on Communications, 2007
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
J. Netw. Comput. Appl., 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006
2005
Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking.
IEEE J. Sel. Areas Commun., 2005
RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery.
J. Comput. Secur., 2005
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005
Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
Proceedings of the From Grid to Healthgrid, 2005
DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
2004
An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
Microprocess. Microsystems, 2003
Comput. Networks, 2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
2002
The Threat From Within -An Analysis of Attacks on anInternal Network.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
1999
1998
1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
1996
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996
Proceedings of the COMPSAC '96, 1996
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
1995
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995
1994
Proceedings of the Eighteenth Annual International Computer Software and Applications Conference, 1994
1993
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993
1992
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992
1991
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991