Noor Shirazi

Research Associate, PhD student

Research Overview

I am working as a research associate in the School of Computing and Communications at InfoLab21. My current research focuses on resilience in Critical Infrastructures (CI). More specifically, I am interested in anomaly based challenge detection techniques in elastic cloud deployment scenarios and also situation aware information infrastructures by adding global contextual infromaton. My interests include security and resilience of computer networks and networked systems. Before coming to Lancaster, I have worked as infromation security professional. This involved develop and applying IT security strategies, penetration testing, vulnerability assessment, malware analysis and incident handling.

Big Data and Natural Language Processing for Analysing Railway Safety
Syeda, K.N., Shirazi, S.N.U.H., Naqvi, S.A.A., Parkinson, H.J., Bamford, G. 11/2017 In: Innovative Applications of Big Data in the Railway Industry. IGI Global Publishing ISBN: 9781522531760. Electronic ISBN: 9781522531777.
Chapter

The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective
Shirazi, S.N.U.H., Gouglidis, A., Farshad, A., Hutchison, D. 15/08/2017 In: IEEE Journal on Selected Areas in Communications. 10 p.
Journal article

Towards policy refinement for resilience management in cloud
Shirazi, S.N.U.H., Simpson, S., Syeda, K.N., Mauthe, A.U., Hutchison, D. 13/09/2016 In: 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM). IEEE p. 260-266. 7 p. ISBN: 9781467390248. Electronic ISBN: 9781467390231.
Conference contribution

A Multi-commodity network flow model for cloud service environments
Stephanakis, I.M., Shirazi, S.N.U.H., Gouglidis, A., Hutchison, D. 19/08/2016 In: Engineering Applications of Neural Networks. Cham : Springer p. 186-197. 12 p. ISBN: 9783319441870. Electronic ISBN: 9783319441887.
Conference contribution

Evaluation of Anomaly Detection Techniques for SCADA Communication Resilience
Shirazi, S.N.U.H., Gouglidis, A., Syeda, K.N., Simpson, S., Mauthe, A.U., Stephanakis, I.M., Hutchison, D. 16/08/2016 In: Resilience Week (RWS), 2016. IEEE p. 140-145. 6 p. ISBN: 9781509020034. Electronic ISBN: 9781509020027.
Conference contribution

Anomaly detection in the cloud using data density
Shirazi, S.N.U.H., Simpson, S., Gouglidis, A., Mauthe, A.U., Hutchison, D. 27/06/2016 In: Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on. IEEE p. 616-623. 8 p. ISBN: 9781509026203. Electronic ISBN: 9781509026197.
Conference contribution

Towards resilience metrics for future cloud applications
Novak, M., Shirazi, S.N.U.H., Hudic, A., Hecht, T., Tauber, M., Hutchison, D., Maksuti, S., Bicaku, A. 23/04/2016 In: Proceedings of the 6th International Conference on Cloud Computing and Services Science. SCITEPRESS – Science and Technology Publications p. 295-301. 7 p. ISBN: 9789897581823.
Conference contribution

Malware detection in cloud computing infrastructures
Watson, M., Shirazi, S.N.U.H., Marnerides, A., Mauthe, A.U., Hutchison, D. 03/2016 In: IEEE Transactions on Dependable and Secure Computing. 13, 2, p. 192-205. 14 p.
Journal article

A Multi-Level Approach to Resilience of Critical Infrastructures and Services
Gouglidis, A., Shirazi, S.N.U.H., Simpson, S., Smith, P., Hutchison, D. 2016
Conference paper

A framework for resilience management in the cloud
Shirazi, S.N.U.H., Simpson, S., Oechsner, S., Mauthe, A.U., Hutchison, D. 4/03/2015 In: Elektrotechnik und Informationstechnik. 132, 2, p. 122-132. 11 p.
Journal article

Anomaly detection in secure cloud environments using a Self-Organizing Feature Map (SOFM) model For clustering sets of R-ordered vector-structured features
Shirazi, S.N.U.H., Stephanakis, I.M., Chochliouros , I.P. ., Sfakianakis, E. 2015 In: EANN '15. ACM 9 p. ISBN: 9781450335805.
Conference contribution

Assessing the impact of intra-cloud live migration on anomaly detection
Shirazi, S.N.U.H., Simpson, S., Marnerides, A., Watson, M., Mauthe, A., Hutchison, D. 10/2014 In: Proceedings of 3rd IEEE International Conference on Cloud Networking, IEEE CloudNet 2014. IEEE p. 52-57. 6 p.
Paper

Attack pattern recognition through correlating cyber situational awareness in computer networks
Shirazi, S.N.U.H., Schaeffer-Filho, A., Hutchison, D. 1/03/2014 In: Cyberpatterns. Cham : Springer International Publishing p. 125-134. 10 p. ISBN: 9783319044460. Electronic ISBN: 9783319044477.
Chapter

Towards a distributed, self-organising approach to malware detection in cloud computing
Watson, M.R., Shirazi, S.N.U.H., Marnerides, A.K., Mauthe, A., Hutchison, D. 2014 In: Self-organizing systems . Berlin : Springer Verlag p. 182-185. 4 p.
Paper

Malware analysis in cloud computing: network and system characteristics
Marnerides, A., Watson, M., Shirazi, S.N.U.H., Mauthe, A., Hutchison, D. 12/2013 In: Globecom Workshops (GC Wkshps), 2013 IEEE. Piscataway, N.J. : IEEE p. 482-487. 6 p.
Paper

A multilevel approach towards challenge detection in cloud computing
Shirazi, S.N.U.H., Watson, M., Marnerides, A., Mauthe, A., Hutchison, D. 07/2013 In: Cyberpatterns 2013 . Oxford : Oxford Brookes University p. 103-107. 5 p.
Paper

Service level agreement monitoring for resilience in computer networks
Shirazi, S.N.U.H., Schaeffer-Filho, A., Hutchison, D. 2012 In: 13th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting. Liverpool : Liverpool John Moores University 5 p.
Paper

Evading virus detection using code obfuscation
Murad, K., Shirazi, S.N., Bin Zikria, Y., Ikram, N. 2010 In: Future Generation Information Technology. Springer p. 394-401. 8 p.
Paper

MPLS unleashed: remedy using IPSEC over MPLS VPN
Shirazi, S.N., Asim, M., Irfan, M., Ikram, N. 2010 In: Information Security and Assurance. Berlin : Springer-Verlag p. 241-248. 8 p. ISBN: 9783642133640. Electronic ISBN: 9783642133657.
Conference contribution

Secure messaging and real time media streaming using enterprise PKI and ECC based certificates
Ashraf, S., Shirazi, S.N., Nadeem, M.A., Ikram, N. 2010 In: Computational Technologies in Electrical and Electronics Engineering (SIBIRCON), 2010 IEEE Region 8 International Conference on. IEEE p. 159-161. 3 p.
Paper

Securing GSM voice through scrambling
Naeem, I.A., Rauf, U., Ahmad, S.F., Shirazi, S.N. 2010 In: Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010. IEEE p. 156-158. 3 p.
Paper