Journal papers:
Zeng, W.. “A methodology for cost-benefit analysis of information security technologies”. Journal of Concurrency and Computation Practice and Experience, October 2018.
Zeng, W., Koutny, M., Watson, P. and Germanos, V. “Formal verification of secure information flow in cloud computing”. In special issue on security and privacy in cloud computing, Journal of Information Security and Applications, Volume 27-28, April – May 2016, Pages: 103-116.
Zeng, W. and van Moorsel, A. “Quantitative evaluation of Enterprise DRM technology”. In Journal Electronic Notes in Theoretical Computer Science (ENTCS), Volume 275, September 2011, Pages: 159-174.
Conference/Workshop papers:
Zeng, W., Koutny, M. and Watson, P. “Opacity in Internet of Things with cloud computing”. In 8th IEEE International Conference on Service-Oriented Computing and Application (SOCA), 2015.
Zeng, W., Koutny, M. and Watson, P. “Verifying secure information flow in federated clouds”. In 6th IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2014.
Zeng, W., Koutny, M. and van Moorsel, A. “Performance modelling and evaluation of enterprise information security technologies”. In 14th IEEE International Conference on Computer and Information Technology (CIT), 2014.
Zeng, W., Koutny, M. and Watson, P. “A flow sensitive security model for cloud computing systems”. In Engineering Dependable Systems of Systems (EDSoS), 2014.
Zeng, W. and Koutny, M. “Data resources in dynamic environments”. In 8th IEEE Theoretical Aspects of Software Engineer (TASE), 2014.
Zeng, W., Liu, K. and Koutny, M. “Cost-benefit analysis of Digital Rights Management products using stochastic models”. In 46th Annual Simulation Symposium (ANSS), 2013.
Zeng, W. and Liu, K. “Sensitivity analysis of loss of corporate efficiency and productivity associated with Enterprise DRM technology”. In 7th IEEE International Conference on Availability, Reliability and Security (ARES), 2012.
Technical reports:
Zeng, W., Koutny, M. and Watson, P. “Opacity in Internet of Things with cloud computing”. In Newcastle University, school technical report CS-TR-1481, September 2015.
Zeng, W. and Koutny, M. “A flow sensitive security model for cloud computing systems”. In Newcastle University, school technical report: CS-TR-1387, June 2013.
Zeng, W. and van Moorsel, A. “Quantitative evaluation of Enterprise DRM technology”. In Newcastle University, school technical report: CS-TR-1238, March 2011.
Zeng, W., S. Parkin, and van Moorsel, A. “Digital rights management”. In Newcastle University, school technical report: CS-TR-1223, October 2010.