Prof Qi Shi
School of Computer Science and Mathematics
Faculty of Engineering and Technology
Email: Q.Shi@ljmu.ac.uk
Telephone: 0151 231 2272
Current Position:
Qi Shi is a Professor in Computer Security, and Director of the PROTECT Research Centre for Critical Infrastructure Computer Technology & Protection.
Research Interests:
Qi Shi’s research is centred on the increasingly important theme of ubiquitous/distributed computing security and privacy with the long-term goal of developing general frameworks for the intelligent provision of security and privacy protection to various applications. Specifically, his main research interests include the following areas:
· System-of-systems security: Develop a software framework for the automated security monitoring, evaluation and control of a system of systems in ubiquitous and cloud computing settings at runtime.
· E-commerce security: Produce methods for privacy enhanced public-key certification and cryptographic protocols for the security and privacy protection of electronic transactions conducted over the Internet.
· Intrusion and denial-of-service detection: Design cost-effective solutions to the early detection and prevention of intrusion and denial-of-service attacks within the network routing infrastructure and in ubiquitous computing environments.
· Sensor network security: Develop resource-efficient algorithms, mechanisms and protocols for key establishment and secure communication among sensor nodes.
· Cloud computing security: Investigate efficient ways for data processing in cloud environments while protecting their security and privacy against unauthorized access.
· Identity management: Devise efficient and lightweight approaches to user-centric and situation-aware identity management for the privacy protection of mobile ad-hoc networks.
· Computer forensics: Propose more effective methods for targeted data collection, uniform data representation, forensic analysis and result visualisation.
Research Publications:
Qi Shi has published over 250 research papers in international journals and conference proceedings.
Research Projects:
Qi Shi is involved in the supervision of a number of research projects in the above research areas. For example, he is one of the investigators of a large EU FP7 project, ANIKETOS, which involves 17 partners in 10 EU countries with a total grant of €9.6 million, for the development of secure and trustworthy composite services.
Research Students:
Qi Shi is supervising a number of international and home research students working in some research areas listed above. He also welcomes prospective research students with interests in the above research areas or others to apply for studies here. Applications can be submitted online at http://www.ljmu.ac.uk/pgapplication/114150.htm.
Other Academic Activities:
Qi Shi is a member of editorial boards and a paper reviewer for a number of international journals and a member or chair of program committees for many international conferences. Qi also serves as an external research degree examiner, taught course examiner and a member of several advisory committees.
Journal article
Hashem Eiza M, Thong Ta V, Shi Q, Cao Y. 2024. Secure Semi-Automated GDPR Compliance Service with Restrictive Fine-grained Access Control Security and Privacy, DOI Publisher Url Public Url
Raschella A, Hashem Eiza M, MacKay M, Shi Q, Banton M. 2023. A Trust-based Cooperative System for Efficient Wi-Fi Radio Access Networks Banton M. IEEE Access, DOI Publisher Url Public Url
Al-Ani R, Shamsa TB, Zhou B, Shi Q. 2023. Privacy and Safety Improvement of VANET Data via a Safety-related Privacy Scheme International Journal of Information Security, DOI Publisher Url Public Url
Alevizos L, Eiza MH, Ta VT, Shi Q, Read J. 2022. Blockchain-enabled Intrusion Detection and Prevention System of APTs within Zero Trust Architecture IEEE Access, 10 :89270-89288 DOI Publisher Url Public Url
Raschella A, Aldhaibani OA, Pizzi S, MacKay M, Bouhafs F, Araniti G, Shi Q, Lucas-Estañ MDC. 2021. A Centralized Win-Win Cooperative Framework for Wi-Fi and 5G Radio Access Networks Wireless Communications and Mobile Computing, 2021 DOI Author Url Publisher Url Public Url
Adewuyi AA, Cheng H, Shi Q, Cao J, Wang X, Zhou B. 2021. SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things IEEE Internet of Things Journal, DOI Author Url Publisher Url Public Url
Mohi-Ud-din G, Marnerides A, Shi Q, Dobbins C, MacDermott AM. 2020. Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems IEEE Transactions on Emerging Topics in Computational Intelligence, 5 :860-870 DOI Author Url Publisher Url Public Url
Naureen A, Zhang N, Furber S, Shi Q. 2020. A GPS-Less Localization and Mobility Modelling (LMM) System for Wildlife Tracking IEEE Access, 8 :102709-102732 DOI Author Url Publisher Url Public Url
Nafea H, Kifayat K, Shi Q, Qureshi KN, Askwith RJ. 2019. Efficient Non-Linear Covert Channel Detection in TCP Data Streams IEEE Access, 8 :1680-1690 DOI Author Url Publisher Url Public Url
Teh PS, Zhang N, Tan SY, Shi Q, Khoh WH, Nawaz R. 2019. Strengthen user authentication on mobile devices by using user’s touch dynamics pattern Journal of Ambient Intelligence and Humanized Computing, DOI Author Url Publisher Url Public Url
Raschella A, Bouhafs F, MacKay M, Shi Q, Ortín J, Gállego JR, Canales M. 2019. A Dynamic Access Point Allocation Algorithm for Dense Wireless LANs Using Potential Game Computer Networks, DOI Author Url Publisher Url Public Url
G C D, Bouhafs F, Raschella A, MacKay M, Shi Q. 2019. Radio Resource Management Framework for Energy-Efficient Communications in the Internet-of-Things Transactions on Emerging Telecommunications Technologies, 30 DOI Author Url Publisher Url Public Url
Mac Dermott AM, Baker T, Buck P, Iqbal F, Shi Q. 2019. The Internet of Things: Challenges and considerations for cybercrime investigations and digital forensics International Journal of Digital Crime and Forensics (IJDCF), 12 DOI Publisher Url Public Url
Al-Dahhan R, Shi Q, Lee G, Kifayat K. 2019. Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption Sensors, 19 DOI Author Url Publisher Url Public Url
Bouhafs F, Seyedebrahimi M, Raschella A, MacKay M, Shi Q. 2019. Per-Flow Radio Resource Management to Mitigate Interference in Dense IEEE 802.11 Wireless LANs IEEE Transactions on Mobile Computing, DOI Author Url Publisher Url Public Url
Adewuyi AA, Cheng H, Shi Q, Cao J, MacDermott Á, Wang X. 2019. CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things IEEE Internet of Things Journal, DOI Author Url Publisher Url Public Url
Zhou B, Maines CL, Tang SOT, Shi Q, Yang P, Yang Q, Qi J. 2018. A 3D Security Modelling Platform for Social IoT Environments IEEE Transactions on Computational Social Systems, 5 :1174-1188 DOI Author Url Publisher Url Public Url
Bouhafs F, MacKay M, Raschella A, Shi Q, den Hartog F, Saldana J, Munilla R, Ruiz-Mas J, Fernández-Navajas J, Almodovar J, van Adrichem N. 2018. Wi-5: A Programming Architecture for Unlicensed Frequency Bands IEEE Communications Magazine, 56 :178-185 DOI Author Url Publisher Url Public Url
Eiza MH, Shi Q, Marnerides AK, Owens T, Ni Q. 2018. Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks IEEE Transactions on Vehicular Technology, DOI Author Url Publisher Url Public Url
Jayasinghe U, Lee GM, Um TW, Shi Q. 2018. Machine Learning based Trust Computational Model for IoT Services IEEE Transactions on Sustainable Computing, 4 :39-52 DOI Author Url Publisher Url Public Url
Asim M, Yautsiukhin A, Brucker A, Baker T, Shi Q, Lempereur B. 2018. Security Policy Monitoring of BPMN-based Service Compositions Journal of Software: Evolution and Process, DOI Author Url Publisher Url Public Url
Moara-Nkwe K, Shi Q, Lee GM, Eiza MH. 2018. A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks IEEE Access, 6 :11374-11387 DOI Author Url Publisher Url Public Url
Shone N, Tran Nguyen N, Vu Dinh P, Shi Q. 2018. A Deep Learning Approach to Network Intrusion Detection IEEE Transactions on Emerging Topics in Computational Intelligence, 2 DOI Author Url Publisher Url Public Url
Baharon MR, Shi Q, Abdollah MF, Yassin SMWMSMM, Idris A. 2018. An improved fully homomorphic encryption scheme for cloud computing International Journal of Communication Networks and Information Security, 10 :502-508 DOI Publisher Url
Brucker A, Zhou B, Malmignati F, Shi Q, Merabti M. 2017. Modelling, Validating, and Ranking of Secure Service Compositions Software: Practice and Experience, DOI Author Url Publisher Url Public Url
Zhou B, Zhang Q, Shi Q, Yang Q, Yang P, Yu Y. 2017. Measuring Web Service Security in the Era of Internet of Things Computers and Electrical Engineering, DOI Author Url Publisher Url Public Url
Raschella A, Bouhafs F, Seyedebrahimi M, MacKay M, Shi Q. 2017. Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks IEEE Transactions on Network and Service Management, 14 :441-455 DOI Author Url Publisher Url Public Url
Hashem Eiza M, Ni Q, Shi Q. 2016. Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G Enabled Vehicular Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, DOI Author Url Publisher Url Public Url
Topham L, Kifayat K, Younis Y, Shi Q, Askwith B. 2016. Cyber Security Teaching and Learning Laboratories: A Survey Information & Security: An International Journal, 35 :51-80 DOI Publisher Url
Hashem Eiza M, Owens T, Ni Q, Shi Q. 2015. Situation-Aware QoS Routing Algorithm for Vehicular Ad hoc Networks IEEE Transactions on Vehicular Technology, DOI Author Url Publisher Url Public Url
Shi Q, Zhang N, Merabti M. 2014. Fair signature exchange via delegation on ubiquitous networks Segal M. Journal of Computer and System Sciences, 81 :615-631 DOI Author Url Publisher Url Public Url
Kifayat K, Merabti M, Shi Q, Abbas S. 2013. Component-based security system (COMSEC) with QoS for wireless sensor networks SECURITY AND COMMUNICATION NETWORKS, 6 :461-472 DOI Author Url Publisher Url
Shi Q, Zhang N, Merabti M, Kifayat K. 2013. Resource-efficient authentic key establishment in heterogeneous wireless sensor networks JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 73 :235-249 DOI Author Url Publisher Url
Baharon MR, Shi Q, Llewellyn-Jones D, Merabti M. 2013. Secure Remote Data Processing in Cloud Computing International Journal of Computer Theory and Engineering, :920-923 DOI Publisher Url
Shi Q, Zhang N, Llewellyn-Jones D. 2012. Efficient autonomous signature exchange on ubiquitous networks JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 35 :1793-1806 DOI Author Url Publisher Url
Lempereur B, Merabti M, Shi Q. 2012. Pypette: A platform for the evaluation of live digital forensics International Journal of Digital Crime and Forensics, 4 :31-46 DOI Publisher Url
Shi Q, Zhang N, Merabti M, Askwith R. 2011. Achieving autonomous fair exchange in ubiquitous network settings JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 34 :653-667 DOI Author Url Publisher Url
Shi Q, Zhang N, Merabti M. 2011. Fair exchange of valuable information: A generalised framework JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 77 :348-371 DOI Author Url Publisher Url
Kifayat K, Merabti M, Shi Q. 2010. Future security challenges in cloud computing International Journal of Multimedia Intelligence and Security, 1 :428-428 DOI Publisher Url
Zhou B, Shi Q, Merabti M. 2008. Balancing intrusion detection resources in ubiquitous computing networks COMPUTER COMMUNICATIONS, 31 :3643-3653 DOI Author Url Publisher Url
Zhang N, Shi Q, Merabti M, Askwith R. 2006. Practical and efficient fair document exchange over networks JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 29 :46-61 DOI Author Url Publisher Url
Nenadić A, Zhang N, Shi Q. 2005. RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery Bella G, Ryan P. Journal of Computer Security, 13 :757-777 DOI Publisher Url
Haggerty J, Shi Q, Merabti M. 2005. Early detection and prevention of denial-of-service attacks: A novel mechanism with propagated traced-back attack blocking IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 23 :1994-2002 DOI Author Url Publisher Url
Zhang N, Shi Q, Nenadic A, Merabti M, Askwith R. 2005. Efficient fair digital-signature exchange based on misbehaviour penalisation IEE PROCEEDINGS-COMMUNICATIONS, 152 :257-261 DOI Author Url Publisher Url
Zhang N, Shi Q, Merabti M. 2005. Revocation of privacy-enhanced public-key certificates JOURNAL OF SYSTEMS AND SOFTWARE, 75 :205-214 DOI Author Url Publisher Url
Zhang N, Shi Q, Merabti M, Askwith R. 2004. Autonomous mobile agent based fair exchange COMPUTER NETWORKS, 46 :751-770 DOI Author Url Publisher Url
Zhang N, Shi Q, Merabti M. 2004. A unified approach to a fair document exchange system JOURNAL OF SYSTEMS AND SOFTWARE, 72 :83-96 DOI Author Url Publisher Url
Askwith B, Merabti M, Shi Q. 2003. MNPA: A basis for privacy-enhanced QoS in mobile networks MICROPROCESSORS AND MICROSYSTEMS, 27 :93-100 DOI Author Url Publisher Url
Shi Q, Zhang N, Merabti M. 2003. Signature-based approach to fair document exchange IEE PROCEEDINGS-COMMUNICATIONS, 150 :21-27 DOI Author Url Publisher Url
Zhang N, Shi Q, Merabti M. 2003. An efficient protocol for anonymous and fair document exchange COMPUTER NETWORKS, 41 :19-28 DOI Author Url Publisher Url
Abimbola A, Gresty D, Shi Q. 2002. SubSeven’s Honey Pot Program Network Security, 2002 :10-14 DOI Publisher Url
Askwith B, Merabti M, Shi Q. 2000. MNPA: a mobile network privacy architecture COMPUTER COMMUNICATIONS, 23 :1777-1788 DOI Author Url Publisher Url
Zhang N, Shi Q, Merabti M. 2000. Anonymous public-key certificates for anonymous and fair document exchange IEE PROCEEDINGS-COMMUNICATIONS, 147 :345-350 DOI Author Url Publisher Url
Merabti M, Shi Q, Oppliger R. 2000. Advanced security techniques for network protection COMPUTER COMMUNICATIONS, 23 :1581-1583 DOI Author Url Publisher Url
Zhang N, Shi Q, Merabti M. 1999. A flexible approach to secure and fair document exchange COMPUTER JOURNAL, 42 :569-581 DOI Author Url Publisher Url
Shi Q, Zhang N. 1998. An effective model for composition of secure systems JOURNAL OF SYSTEMS AND SOFTWARE, 43 :233-244 DOI Author Url Publisher Url
Zhang N, Shi Q. 1996. Achieving non-repudiation of receipt COMPUTER JOURNAL, 39 :844-853 DOI Author Url Publisher Url
Conference publication
Hashem Eiza M, Raschella A, MacKay M, Shi Q, Bouhafs F. 2023. Towards Trusted and Accountable Win-Win SDWN Platform for Trading Wi-Fi Network Access 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), IEEE Consumer Communications and Networking Conference (CCNC) DOI Publisher Url Public Url
Younis YA, Kifayat K, Shi Q, Matthews E, Griffiths G, Lambertse R. 2020. Teaching cryptography using CYPHER (InteraCtive CrYPtograpHic Protocol TEaching and LeaRning) ACM International Conference Proceeding Series, DOI Publisher Url
Bouhafs F, den Hartog F, Raschella A, Mackay M, Shi Q, Sinanovic S. 2020. Realizing Physical Layer Security in Large Wireless Networks using Spectrum Programmability 2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), IEEE Global Communications Conference (GLOBECOM) on Advanced Technology for 5G Plus DOI Author Url Publisher Url
Seyedebrahimi M, Bouhafs F, Raschella A, MacKay M, Shi Q. 2017. Fine-Grained Radio Resource Management to Control Interference in Dense Wi-Fi Networks IEEE Wireless Communications and Networking Conference (WCNC), IEEE Wireless Communications and Networking Conference (WCNC) DOI Author Url Publisher Url Public Url
Seyedebrahimi M, Raschella A, Bouhafs F, MacKay M, Shi Q, Eiza MH. 2016. A Centralised Wi-Fi Management Framework for D2D Communications in Dense Wi-Fi Networks 2016 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), IEEE Conference on Standards for Communications and Networking (CSCN) DOI Author Url Publisher Url Public Url
Seyedebrahimi M, Bouhafs F, Raschella A, MacKay M, Shi Q. 2016. SDN-Based Channel Assignment Algorithm for Interference Management in Dense Wi-Fi Networks 2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), European Conference on Networks and Communications (EuCNC) DOI Author Url Publisher Url Public Url
Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications DOI Publisher Url Public Url
Hashem Eiza M, Shi Q, Marnerides A, Owens T. 2016. Secure and Privacy-Aware Proxy Mobile IPv6 Protocol for Vehicle-to-Grid Networks 2016 IEEE International Conference on Communications (ICC), IEEE International Conference on Communications :1-6 DOI Author Url Publisher Url Public Url
Abdlhamed M, Kifayat K, Shi Q, Hurst W. 2016. A system for intrusion prediction in cloud computing ACM International Conference Proceeding Series, 22-23-March-2016 DOI Publisher Url
Shone N, Dobbins C, Hurst W, Shi Q. 2015. Digital Memories Based Mobile User Authentication for IoT 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15) :1796-1802 DOI Author Url Publisher Url Public Url
MacDermott A, Qi Shi , Merabti M, Kifiyat K. 2013. Considering an elastic scaling model for cloud Security 2013 IEEE Third International Conference on Information Science and Technology (ICIST), 2013 IEEE Third International Conference on Information Science and Technology (ICIST) :150-155 DOI Publisher Url
Shone N, Shi Q, Merabti M, Kifayat K. 2013. Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, IEEE 10th International Conference on Ubiquitous Intelligence and Computing (UIC) / IEEE 10th International Conference on Autonomic and Trusted Computing (ATC) :438-443 DOI Author Url Publisher Url
Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M. 2013. Prototype for Design-time Secure and Trustworthy Service Composition 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 10th IEEE Consumer Communications and Networking Conference (CCNC) :847-848 DOI Author Url Publisher Url
Beltran LP, Merabti M, Shi Q. 2012. Multiplayer game technology to manage critical infrastructure protection Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, :549-556 DOI Publisher Url
Kifayat K, Merabti M, Shi Q. 2011. Assets protection in crisis management operations using body area sensor networks Proceedings - International Conference on Computer Networks and Information Technology, :153-157 DOI Publisher Url
Muhammad A, Arabo A, Merabti M, Shi Q, Askwith B. 2010. A secure gateway service for accessing networked appliances Proceedings - 5th International Conference on Systems and Networks Communications, ICSNC 2010, :183-188 DOI Publisher Url
Arabo A, Shi Q, Merabti M. 2010. Data mishandling and profile building in ubiquitous environments Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust, :1056-1063 DOI Publisher Url
Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. 2007. Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol Third International Symposium on Information Assurance and Security, Third International Symposium on Information Assurance and Security :44-49 DOI Publisher Url
Braynov S, Núñez M, Wurman PR, Bravetti M, Cavalli A, Cuartero F, Dignum F, Greenwald A, Hampe F, Hexmoor H, Jurca R, Maamar Z, Miller K, Pousttchi K, Rao HR, Rodríguez I, Rubio F, Shi Q, Zhang N. 2005. Editorial track on E-commerce technologies Proceedings of the ACM Symposium on Applied Computing, 1 :789-790 DOI Publisher Url
Nenadić A, Zhang N, Shi Q, Goble C. 2005. DSA-based verifiable and recoverable encryption of signatures and its application in certified E-goods delivery Proceedings - 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE-05, :94-99 DOI Publisher Url
Nenadić A, Zhang N, Shi Q, Goble C. 2005. Certified E-mail delivery with DSA receipts Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005, 2005 DOI Publisher Url
Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2004. A security framework for executables in a ubiquitous computing environment GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, IEEE Global Telecommunications Conference (GLOBECOM 04) :2158-2163 DOI Author Url Publisher Url
Zhang N, Shi Q. 1996. Security issues in an EDI environment Proceedings - Annual Computer Security Applications Conference, ACSAC, :129-136 DOI Publisher Url
Shi Q, McDermid JA. 1993. Constructing secure distributed systems using components :143-151 DOI Publisher Url
Shi Q, McDermid JA, Moffett JD. 1993. Developing secure systems in a modular way COMPASS - Proceedings of the Annual Conference on Computer Assurance, :111-121 DOI Publisher Url
Shi Q, McDermid JA, Moffett JD. 1993. Applying noninterference to composition of systems: A more practical approach Proceedings - Annual Computer Security Applications Conference, ACSAC, :210-220 DOI Publisher Url
McDermid JA, Shi Q. 1992. Secure composition of systems Proceedings - Annual Computer Security Applications Conference, ACSAC, Part F146266 :112-122 DOI Publisher Url
McDermid JA, Shi Q. 1992. A formal approach for security evaluation COMPASS 1992 - Proceedings of the 7th Annual Conference on Computer Assurance, :47-55 DOI Publisher Url
McDermid JA, Shi Q. 1991. A formal model of security dependency for analysis and testing of secure systems Proceedings of the Computer Security Foundations Workshop, :188-200 DOI Publisher Url
Arabo A, Shi Q, Merabti M. Context-Aware Identity Management in Pervasive Ad-hoc Environments The 4th International Workshop on Ubiquitous Computing DOI Publisher Url
Chapters
Hashem Eiza M, Shi Q. 2017. Social Evolving Graph-Based Connectivity Model for Vehicular Social Networks Vehicular Social Networks CRC Press DOI Publisher Url
Kifayat K, Merabti M, Shi Q, Llewellyn-Jones D. 2010. Security in Wireless Sensor Networks Handbook of Information and Communication Security :513-552 Springer Berlin Heidelberg 9783642041167 DOI Publisher Url
Zhou B, Shi Q, Merabti M. 2010. A Novel Intrusion Detection System for Smart Space Advances in Digital Crime, Forensics, and Cyber Terrorism :307-333 IGI Global 9781605668369 DOI Publisher Url
Llewellyn‐Jones D, Merabti M, Shi Q, Askwith B, Reilly D. 2006. Improving Interoperation Security through Instrumentation and Analysis: A Framework and Case Study :225-236 Wiley 9781905209613 DOI Publisher Url
Zhang N, Shi Q. 1997. How to support secure electronic contract signing :253-264 DOI Publisher Url
Shi Q, Thang N. 1995. Experience in Application of Composable Security Properties IFIP Advances in Information and Communication Technology :223-236 Springer US 9781504129107 DOI Publisher Url