


default search action
Qi Shi 0001
- > Home > Persons > Qi Shi 0001
Publications
- 2020
- [j48]Hanaa Nafea
, Kashif Kifayat
, Qi Shi
, Kashif Naseer Qureshi
, Bob Askwith:
Efficient Non-Linear Covert Channel Detection in TCP Data Streams. IEEE Access 8: 1680-1690 (2020) - 2019
- [j40]Ruqayah R. Al-Dahhan
, Qi Shi
, Gyu Myoung Lee
, Kashif Kifayat
:
Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption. Sensors 19(7): 1695 (2019) - 2018
- [j34]Paul R. McWhirter
, Kashif Kifayat
, Qi Shi, Bob Askwith:
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel. J. Inf. Secur. Appl. 40: 199-216 (2018) - [c68]Ruqayah R. Al-Dahhan
, Qi Shi, Gyu Myoung Lee, Kashif Kifayat
:
Revocable, Decentralized Multi-Authority Access Control System. UCC Companion 2018: 220-225 - 2017
- [c66]Áine MacDermott
, Qi Shi, Kashif Kifayat
:
Distributed Attack Prevention Using Dempster-Shafer Theory of Evidence. ICIC (3) 2017: 203-212 - 2016
- [j28]Bashar Ahmed Alohali
, Kashif Kifayat
, Qi Shi, William Hurst
:
Group Authentication Scheme for Neighbourhood Area Networks (NANs) in Smart Grids. J. Sens. Actuator Networks 5(2): 9 (2016) - [c58]Mohamed Abdlhamed, Kashif Kifayat
, Qi Shi
, William Hurst
:
A System for Intrusion Prediction in Cloud Computing. ICC 2016 2016: 35:1-35:9 - [c57]Bashar Ahmed Alohali, Kashif Kifayat
, Qi Shi, William Hurst
:
Replay Attack Impact on Advanced Metering Infrastructure (AMI). SmartGIFT 2016: 52-59 - 2015
- [j26]Áine MacDermott
, Qi Shi, Madjid Merabti, Kashif Kifayat
:
Hosting critical infrastructure services in the cloud environment considerations. Int. J. Crit. Infrastructures 11(4): 365-381 (2015) - [c53]Younis A. Younis
, Kashif Kifayat
, Qi Shi, Bob Askwith:
A New Prime and Probe Cache Side-Channel Attack for Cloud Computing. CIT/IUCC/DASC/PICom 2015: 1718-1724 - [c51]Áine MacDermott
, Qi Shi, Kashif Kifayat
:
Detecting Intrusions in Federated Cloud Environments Using Security as a Service. DeSE 2015: 91-96 - 2013
- [j23]Qi Shi
, Ning Zhang, Madjid Merabti, Kashif Kifayat
:
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks. J. Parallel Distributed Comput. 73(2): 235-249 (2013) - [j22]Kashif Kifayat
, Madjid Merabti, Qi Shi
, Sohail Abbas
:
Component-based security system (COMSEC) with QoS for wireless sensor networks. Secur. Commun. Networks 6(4): 461-472 (2013) - [c47]Nathan Shone, Qi Shi, Madjid Merabti, Kashif Kifayat
:
Misbehaviour monitoring on system-of-systems components. CRiSIS 2013: 1-6 - [c46]Áine MacDermott
, Qi Shi, Madjid Merabti, Kashif Kifayat:
Considering an elastic scaling model for cloud Security. ICITST 2013: 150-155 - [c42]Nathan Shone, Qi Shi
, Madjid Merabti, Kashif Kifayat
:
Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems. UIC/ATC 2013: 438-443 - 2011
- [c35]Abdullahi Arabo, Mike Kennedy, Qi Shi, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat
:
Identity management in System-of-Systems Crisis Management situation. SoSE 2011: 37-42 - 2010
- [j17]Kashif Kifayat, Madjid Merabti, Qi Shi
:
Future security challenges in cloud computing. Int. J. Multim. Intell. Secur. 1(4): 428-442 (2010) - [c31]Bo Zhou, Oliver Drew, Abdullahi Arabo, David Llewellyn-Jones, Kashif Kifayat
, Madjid Merabti, Qi Shi, Rachel Craddock, Adrian Waller, Glyn Jones:
System-of-systems boundary check in a public event scenario. SoSE 2010: 1-8 - [p1]Kashif Kifayat, Madjid Merabti, Qi Shi
, David Llewellyn-Jones:
Security in Wireless Sensor Networks. Handbook of Information and Communication Security 2010: 513-552 - 2007
- [c29]Kashif Kifayat
, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. IAS 2007: 44-49

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-08-13 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint