2008 |
36 | EE | Bo Zhou,
Qi Shi,
Madjid Merabti:
Balancing intrusion detection resources in ubiquitous computing networks.
Computer Communications 31(15): 3643-3653 (2008) |
2007 |
35 | EE | Kashif Kifayat,
Madjid Merabti,
Qi Shi,
David Llewellyn-Jones:
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol.
IAS 2007: 44-49 |
34 | EE | Bo Zhou,
Qi Shi,
Madjid Merabti:
Towards Energy-Efficient Intrusion Detection in Pervasive Computing.
ICC 2007: 1417-1422 |
33 | EE | Ning Zhang,
Li Yao,
Aleksandra Nenadic,
Jay Chin,
Carole A. Goble,
Alan L. Rector,
David W. Chadwick,
Sassa Otenko,
Qi Shi:
Achieving fine-grained access control in virtual organizations.
Concurrency and Computation: Practice and Experience 19(9): 1333-1352 (2007) |
2006 |
32 | EE | Bo Zhou,
Qi Shi,
Madjid Merabti:
Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test.
COMPSAC (2) 2006: 203-208 |
31 | EE | Bo Zhou,
Qi Shi,
Madjid Merabti:
Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach.
ICCSA (4) 2006: 352-359 |
30 | EE | Ning Zhang,
Qi Shi,
Madjid Merabti,
Robert Askwith:
Practical and efficient fair document exchange over networks.
J. Network and Computer Applications 29(1): 46-61 (2006) |
2005 |
29 | EE | David Llewellyn-Jones,
Madjid Merabti,
Qi Shi,
Bob Askwith:
Buffer Overrun Prevention Through Component Composition Analysis.
COMPSAC (1) 2005: 156-163 |
28 | EE | Aleksandra Nenadic,
Ning Zhang,
Qi Shi,
Carole A. Goble:
DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery.
EEE 2005: 94-99 |
27 | EE | Aleksandra Nenadic,
Ning Zhang,
Qi Shi,
Carole A. Goble:
Certified E-Mail Delivery with DSA Receipts.
IPDPS 2005 |
26 | | John Haggerty,
Qi Shi,
Madjid Merabti:
Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks.
SEC 2005: 327-342 |
25 | EE | Ning Zhang,
Li Yao,
Jay Chin,
Aleksandra Nenadic,
A. McNab,
Alan L. Rector,
Carole A. Goble,
Qi Shi:
Plugging a Scalable Authentication Framework into Shibboleth.
WETICE 2005: 271-276 |
24 | EE | John Haggerty,
Qi Shi,
Madjid Merabti:
Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking.
IEEE Journal on Selected Areas in Communications 23(10): 1994-2002 (2005) |
23 | EE | Aleksandra Nenadic,
Ning Zhang,
Qi Shi:
RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery.
Journal of Computer Security 13(5): 757-777 (2005) |
22 | EE | Ning Zhang,
Qi Shi,
Madjid Merabti:
Revocation of privacy-enhanced public-key certificates.
Journal of Systems and Software 75(1-2): 205-214 (2005) |
2004 |
21 | EE | David Llewellyn-Jones,
Madjid Merabti,
Qi Shi,
Bob Askwith:
An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment.
ITCC (1) 2004: 112-117 |
20 | EE | Ning Zhang,
Qi Shi,
Madjid Merabti,
Robert Askwith:
Autonomous mobile agent based fair exchange.
Computer Networks 46(6): 751-770 (2004) |
19 | EE | Ning Zhang,
Qi Shi,
Madjid Merabti:
A unified approach to a fair document exchange system.
Journal of Systems and Software 72(1): 83-96 (2004) |
2003 |
18 | EE | Abiola Abimbola,
Qi Shi,
Madjid Merabti:
NetHost-Sensor: A Novel Concept in Intrusion Detection Systems.
ISCC 2003: 232-237 |
17 | EE | Ning Zhang,
Qi Shi,
Madjid Merabti:
An efficient protocol for anonymous and fair document exchange.
Computer Networks 41(1): 19-28 (2003) |
16 | EE | Bob Askwith,
Madjid Merabti,
Qi Shi:
MNPA: A basis for privacy-enhanced QoS in mobile networks.
Microprocessors and Microsystems 27(2): 93-100 (2003) |
2002 |
15 | EE | John Haggerty,
Qi Shi,
Madjid Merabti:
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks.
ACSAC 2002: 413-422 |
14 | | John Haggerty,
Qi Shi,
Madjid Merabti:
The Threat From Within -An Analysis of Attacks on anInternal Network.
SEC 2002: 133-146 |
2001 |
13 | EE | D. W. Gresty,
Qi Shi,
Madjid Merabti:
Requirements for a General Framework for Response to Distributed Denial-of-Service.
ACSAC 2001: 422-432 |
2000 |
12 | EE | Madjid Merabti,
Qi Shi,
Rolf Oppliger:
Advanced security techniques for network protection.
Computer Communications 23(17): 1581-1583 (2000) |
11 | EE | Bob Askwith,
Madjid Merabti,
Qi Shi:
MNPA: a mobile network privacy architecture.
Computer Communications 23(18): 1777-1788 (2000) |
1999 |
10 | | Ning Zhang,
Qi Shi,
Madjid Merabti:
A Flexible Approach to Secure and Fair Document Exchange.
Comput. J. 42(7): 569-581 (1999) |
1998 |
9 | EE | Qi Shi,
Ning Zhang:
An effective model for composition of secure systems.
Journal of Systems and Software 43(3): 233-244 (1998) |
1997 |
8 | EE | Bob Askwith,
Madjid Merabti,
Qi Shi,
K. Whiteley:
Achieving User Privacy in Mobile Networks.
ACSAC 1997: 108- |
1996 |
7 | EE | Ning Zhang,
Qi Shi:
Security Issues in an EDI Environment.
ACSAC 1996: 129-137 |
6 | EE | Qi Shi,
Ning Zhang:
Applying Composable Security Properties to Assessment of Information Systems.
COMPSAC 1996: 118-123 |
5 | EE | Qi Shi,
Ning Zhang:
A general approach to secure components composition.
HASE 1996: 263-286 |
4 | | Ning Zhang,
Qi Shi:
Achieving Non-Repudiation of Receipt.
Comput. J. 39(10): 844-853 (1996) |
1995 |
3 | EE | Qi Shi,
Ning Zhang:
A General Approach to Evaluation of Secure Systems.
COMPSAC 1995: 396-401 |
1993 |
2 | | Qi Shi,
John A. McDermid:
Constructing Secure Distributed Systems Using Components.
SRDS 1993: 143-152 |
1991 |
1 | | John A. McDermid,
Qi Shi:
A Formal Model of Security Dependency for Analysis and Testing of Secure Systems.
CSFW 1991: 188-200 |