default search action
Ben Soh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Ziyad Almudayni, Ben Soh, Alice S. Li:
IMBA: IoT-Mist Bat-Inspired Algorithm for Optimising Resource Allocation in IoT Networks. Future Internet 16(3): 93 (2024) - [j32]Hamad Almaghrabi, Ben Soh, Alice S. Li:
Using ML to Predict User Satisfaction with ICT Technology for Educational Institution Administration. Inf. 15(4): 218 (2024) - [j31]Hind A. Al-Ghuraybi, Mohammed A. Alzain, Ben Soh:
Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems. Multim. Tools Appl. 83(12): 35629-35672 (2024) - [j30]Hind A. Al-Ghuraybi, Mohammed A. Alzain, Ben Soh:
Ensuring authentication in Medical Cyber-Physical Systems: A comprehensive literature review of blockchain technology integration with machine learning. Multim. Tools Appl. 83(12): 35673-35707 (2024) - 2023
- [j29]Vyas O'Neill, Ben Soh:
An Aspect-Oriented Approach to Time-Constrained Strategies in Smart City IoT Applications. Algorithms 16(10): 454 (2023) - [j28]Vyas O'Neill, Ben Soh:
Spot Market Cloud Orchestration Using Task-Based Redundancy and Dynamic Costing. Future Internet 15(9): 288 (2023) - [j27]Afrah Alanazi, Alice S. Li, Ben Soh:
Effects on Saudi Female Student Learning Experiences in a Programming Subject Using Mobile Devices: An Empirical Study. Int. J. Interact. Mob. Technol. 17(13): 44-58 (2023) - [j26]Ziyad Almudayni, Ben Soh, Alice S. Li:
Enhancing Energy Efficiency and Fast Decision Making for Medical Sensors in Healthcare Systems: An Overview and Novel Proposal. Sensors 23(16): 7286 (2023) - 2022
- [c68]Vyas O'Neill, Ben Soh:
Applying Aspect-Oriented Design Methodology to Manage Time-Validity of Information in Internet-of-Things Systems. AIIoT 2022: 749-752 - 2021
- [j25]Halima E. Samra, Alice S. Li, Ben Soh, Mohammed A. Alzain:
Review of Contemporary Database Design and Implication for Big Data. Int. J. Smart Educ. Urban Soc. 12(4): 1-11 (2021) - [c67]Ziyad Almudayni, Ben Soh, Alice S. Li:
A Comprehensive Study on the Energy Efficiency of IoT from Four Angles: Clustering and Routing in WSNs, Smart Grid, Fog Computing and MQTT & CoAP Application Protocols. IoTaaS 2021: 54-70 - [c66]Ziyad Almudayni, Ben Soh, Alice S. Li:
Energy Inefficacy in IoT Networks: Causes, Solutions and Enabling Techniques. IoTaaS 2021: 110-120 - [c65]Hamad Almaghrabi, Alice S. Li, Ben Soh:
IiCE: A Proposed System Based on IoTaaS to Study Administrative Efficiency in Primary Schools. IoTaaS 2021: 121-138 - 2020
- [j24]Osama S. Faragallah, Ashraf Afifi, Walid El Shafai, Hala S. El-sayed, Ensherah A. Naeem, Mohammed A. Alzain, Jehad F. Al-Amri, Ben Soh, Fathi E. Abd El-Samie:
Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications. IEEE Access 8: 42491-42503 (2020) - [j23]Osama S. Faragallah, Mohammed A. Alzain, Hala S. El-sayed, Jehad F. Al-Amri, Walid El Shafai, Ashraf Afifi, Ensherah A. Naeem, Ben Soh:
Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multim. Tools Appl. 79(3-4): 2495-2519 (2020) - [j22]Ahmed Alamer, Ben Soh, David E. Brumbaugh:
MICKEY 2.0.85: A Secure and Lighter MICKEY 2.0 Cipher Variant with Improved Power Consumption for Smaller Devices in the IoT. Symmetry 12(1): 32 (2020)
2010 – 2019
- 2019
- [j21]Osama S. Faragallah, Mohammed A. Alzain, Hala S. El-sayed, Jehad F. Al-Amri, Walid El Shafai, Ashraf Afifi, Ensherah A. Naeem, Ben Soh:
Block-Based Optical Color Image Encryption Based on Double Random Phase Encoding. IEEE Access 7: 4184-4194 (2019) - [j20]Ahmed Alamer, Ben Soh, Ahmed Alahmadi, David E. Brumbaugh:
Prototype Device With Lightweight Protocol for Secure RFID Communication Without Reliable Connectivity. IEEE Access 7: 168337-168356 (2019) - [j19]May A. Alotaibi, Mohammed A. Alzain, Ben Soh, Mehedi Masud, Jehad F. Al-Amri:
Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection. Int. J. Commun. Networks Inf. Secur. 11(3) (2019) - [j18]Suleiman Ali Alsaif, Alice S. Li, Ben Soh, Mohammed A. Alzain, Mehedi Masud:
From Learning Management Systems to a Social Learning Environment: A Comparative Review and the Implications. Int. J. Smart Educ. Urban Soc. 10(1): 1-18 (2019) - [i6]Ahmed Alamer, Ben Soh:
A new neural-network-based model for measuring the strength of a pseudorandom binary sequence. CoRR abs/1910.04195 (2019) - 2017
- [j17]Dalal Hanna, Prakash Veeraraghavan, Ben Soh:
SDMw: Secure Dynamic Middleware for Defeating Port and OS Scanning. Future Internet 9(4): 67 (2017) - [j16]Halima E. Samra, Alice S. Li, Ben Soh, Mohammed Abdullatif Alzain:
A Cloud-Based Architecture for Interactive E-Training. Int. J. Knowl. Soc. Res. 8(1): 67-78 (2017) - 2016
- [j15]Mohammed Abdullatif Alzain, Alice S. Li, Ben Soh, Mehedi Masud:
Byzantine Fault-Tolerant Architecture in Cloud Data Management. Int. J. Knowl. Soc. Res. 7(3): 86-98 (2016) - [c64]Halima E. Samra, Ben Soh, Mohammed A. Alzain:
A Conceptual Model for an Intelligent Simulation-Based Learning Management System Using a Data Mining Agent in Clinical Skills Education. ES 2016: 81-88 - 2015
- [j14]Mohammed Abdullatif Alzain, Alice S. Li, Ben Soh, Eric Pardede:
Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes. Int. J. Cloud Appl. Comput. 5(3): 35-52 (2015) - 2014
- [j13]Ahmed Alahmadi, Ben Soh, Azmat Ullah:
Improving e-Health Services and System Requirements by Modelling the Health Environment. J. Softw. 9(5): 1189-1201 (2014) - [c63]Mohammed Abdullatif Alzain, Ben Soh, Eric Pardede:
Evaluation of multi-cloud computing TMR-based model using a cloud simulator. FSKD 2014: 6-11 - [c62]Ahmed Alahmadi, Ben Soh, Azmat Ullah:
Automated Health Business Process Modelling and Analysis for E-Health System Requirements Elicitation. PACIS 2014: 213 - 2013
- [j12]Rajashree Nair, Ben Soh, Naveen K. Chilamkurti, Jong Hyuk Park:
Structure-free message aggregation and routing in traffic information system (SMART). J. Netw. Comput. Appl. 36(3): 974-980 (2013) - [j11]Mohammed A. Alzain, Ben Soh, Eric Pardede:
A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds. J. Softw. 8(5): 1068-1078 (2013) - [c61]Mohammed A. Alzain, Ben Soh, Eric Pardede:
A Byzantine Fault Tolerance Model for a Multi-cloud Computing. CSE 2013: 130-137 - [c60]Ahmed Alahmadi, Ben Soh, Saleh Alghamdi:
A hybrid history based weighted voting algorithm for smart mobile e-health monitoring systems. ISSNIP 2013: 402-407 - 2012
- [j10]Mohammed Abdullatif Alzain, Ben Soh, Eric Pardede:
A new model to ensure security in cloud computing services. J. Serv. Sci. Res. 4(1): 49-70 (2012) - [c59]Mohammed A. Alzain, Ben Soh, Eric Pardede:
A New approach using redundancy technique to improve security in cloud computing. CyberSec 2012: 230-235 - [c58]Mohammed Abdullatif Alzain, Eric Pardede, Ben Soh, James A. Thom:
Cloud Computing Security: From Single to Multi-clouds. HICSS 2012: 5490-5499 - [c57]Ahmed Alahmadi, Ben Soh:
A hybrid history based weighted voting algorithm for ultra-critical systems. ISCIT 2012: 1122-1127 - 2011
- [j9]Naveen K. Chilamkurti, Ben Soh, Tai-Hoon Kim:
Special issue on security and privacy in wireless systems. Secur. Commun. Networks 4(7): 727-728 (2011) - [c56]Mohammed Abdullatif Alzain, Ben Soh, Eric Pardede:
MCDB: Using Multi-clouds to Ensure Security in Cloud Computing. DASC 2011: 784-791 - [c55]Hien Phan, Ben Soh, Man Nguyen:
A Parallelism Extended Approach for the Enumeration of Orthogonal Arrays. ICA3PP (1) 2011: 481-493 - 2010
- [c54]Amitabh Saxena, Ben Soh:
A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks. Communications and Multimedia Security 2010: 4-15 - [c53]Raghu Sunnadkal, Ben Soh, Hien Phan:
A Four-Stage Design Approach Towards Securing a Vehicular Ad Hoc Networks Architecture. DELTA 2010: 177-182 - [c52]Zwikamu Dubani, Ben Soh, Chris Seeling:
A Novel Design Framework for Business Process Modelling in Automotive Industry. DELTA 2010: 250-255 - [c51]Hien Phan, Ben Soh, Man Nguyen:
A Step-by-Step Extending Parallelism Approach for Enumeration of Combinatorial Objects. ICA3PP (1) 2010: 463-475
2000 – 2009
- 2009
- [j8]Amitabh Saxena, Ben Soh:
A cryptographic primitive based on hidden-order groups. J. Math. Cryptol. 3(2): 89-132 (2009) - 2008
- [j7]Amitabh Saxena, Ben Soh:
One-Way Signature Chaining: a new paradigm for group cryptosystems. Int. J. Inf. Comput. Secur. 2(3): 268-296 (2008) - 2007
- [c50]Saqib Ali, Torab Torabi, Ben Soh:
Rule component specification for business process deployment. DEXA Workshops 2007: 595-599 - [c49]Joel Sing, Ben Soh:
Improving Congestion Window Growth in Large Bandwidth Delay Product Networks. ICON 2007: 382-387 - [c48]Joel Sing, Ben Soh:
Improving TCP Performance: Identifying Corruption Based Packet Loss. ICON 2007: 400-405 - [c47]Rakesh Kumar, Naveen K. Chilamkurti, Ben Soh:
A Comparative Study of Different Sensors for Smart Car Park Management. IPC 2007: 499-502 - 2006
- [j6]Naveen K. Chilamkurti, Ben Soh:
A new TCP-friendly prioritized video multicast protocol using SPLIT protocol. Comput. Commun. 29(8): 1110-1120 (2006) - [j5]Umair Hassan, Ben Soh:
Fault-tolerant performance checking application for distributed computing and supply chain networks. J. Comput. Methods Sci. Eng. 6(5-6): 217-228 (2006) - [j4]Saqib Ali, Ben Soh, Torab Torabi:
A novel approach toward integration of rules into business processes using an agent-oriented framework. IEEE Trans. Ind. Informatics 2(3): 145-154 (2006) - [c46]Omar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon, Ben Soh:
Predicting the Dynamic Nature of Risk. AICCSA 2006: 500-507 - [c45]Omar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon, Ben Soh:
Context and Time Based Riskiness Assessment for Decision Making. AICT/ICIW 2006: 104 - [c44]Omar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon, Ben Soh:
Context and Time Dependent Risk Based Decision Making. AINA (1) 2006: 585-590 - [c43]Amitabh Saxena, Ben Soh:
Pairing Based Cryptography For Distributed And Grid Computing. ICC 2006: 2335-2339 - [c42]Jun Lai, Ben Soh, Chai Fei:
A Web Page Ranking Method by Analyzing Hyperlink Structure and K-Elements. ICCSA (4) 2006: 179-186 - [c41]Tony de Souza-Daw, Naveen K. Chilamkurti, Ben Soh:
An integration of H.264 based Error Concealment technique and the SPLIT layer protocol. ICN/ICONS/MCL 2006: 106 - [c40]Amit Sood, Naveen K. Chilamkurti, Ben Soh:
Analysis of Error Resilience in H.264 Video Using Slice Interleaving Technique. ICOIN 2006: 912-921 - [c39]Joel Sing, Ben Soh:
TCP New Vegas: Performance Evaluation and Validation. ISCC 2006: 541-546 - [c38]Lokesh D. Pathak, Ben Soh:
Incorporating Data Mining Tools into a New Hybrid-IDS to Detect Known and Unknown Attacks. UIC 2006: 826-834 - [i5]Amitabh Saxena, Ben Soh:
A New Cryptosystem Based On Hidden Order Groups. CoRR abs/cs/0605003 (2006) - [i4]Amitabh Saxena, Ben Soh:
A New Cryptosystem Based On Hidden Order Groups. IACR Cryptol. ePrint Arch. 2006: 178 (2006) - 2005
- [c37]Amitabh Saxena, Ben Soh:
Authenticating Mobile Agent Platforms Using Signature Chaining Without Trusted Third Parties. EEE 2005: 282-285 - [c36]Umair Hassan, Ben Soh:
Web Service Intelligent Agent Structuring for Supply Chain Management (SCM). EEE 2005: 329-332 - [c35]Amitabh Saxena, Ben Soh, Dimitri Zantidis:
A Digital Cash Protocol Based on Additive Zero Knowledge. ICCSA (3) 2005: 672-680 - [c34]Omar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon, Ben Soh:
Risk in Trusted Decentralized Communications. ICDE Workshops 2005: 1198 - [c33]Jun Lai, Ben Soh:
CRANAI: A New Search Model Reinforced by Combining a Ranking Algorithm with Author Inputs. ICEBE 2005: 340-345 - [c32]Saqib Ali, Ben Soh, Torab Torabi:
Design and Implementation of a Model for Business Rules Automation. ICITA (1) 2005: 40-45 - [c31]Saqib Ali, Ben Soh, Torab Torabi:
A New Adaptive Business Model for E-Commerce. ICITA (1) 2005: 99-102 - [c30]Naveen K. Chilamkurti, Ben Soh:
Multimedia Multicast Using SPLIT and Layered FEC. ICITA (2) 2005: 393-396 - [c29]Amitabh Saxena, Ben Soh:
Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet. ICITA (2) 2005: 460-464 - [c28]Jun Lai, Ben Soh:
Personalized Web Search Results with Profile Comparisons. ICITA (1) 2005: 573-576 - [c27]Joel Sing, Ben Soh:
A Critical Analysis of Multilayer IP Security Protocol. ICITA (2) 2005: 683-688 - [c26]Joel Sing, Ben Soh:
On the Use of Snoop with Geostationary Satellite Links. ICITA (2) 2005: 689-694 - [c25]Naveen K. Chilamkurti, Ben Soh:
Simulation of Video Multicasting over SPLIT Protocol. IMSA 2005: 331-336 - [c24]Amitabh Saxena, Ben Soh:
A novel method for authenticating mobile agents with one-way signature chaining. ISADS 2005: 187-193 - [c23]Jun Lai, Ben Soh:
Turning Mass Media to Your Media: Intelligent Search with Customized Results. KES (2) 2005: 887-893 - [c22]Joel Sing, Ben Soh:
TCP New Vegas: Improving the Performance of TCP Vegas Over High Latency Links. NCA 2005: 73-82 - [i3]Amitabh Saxena, Ben Soh:
An Authentication Protocol For Mobile Agents Using Bilinear Pairings. IACR Cryptol. ePrint Arch. 2005: 272 (2005) - [i2]Amitabh Saxena, Ben Soh:
One-Way Signature Chaining - A New Paradigm For Group Cryptosystems. IACR Cryptol. ePrint Arch. 2005: 335 (2005) - [i1]Amitabh Saxena, Serguey Priymak, Ben Soh:
Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings. IACR Cryptol. ePrint Arch. 2005: 343 (2005) - 2004
- [c21]Kon Papazis, Naveen K. Chilamkurti, Ben Soh:
A New Receiver-Based Layered-Rate Estimator Algorithm for Fair Bandwidth Distribution. COMPSAC 2004: 560-565 - [c20]Jun Lai, Ben Soh:
Using Element and Document Profile for Information Clustering. EEE 2004: 503-506 - [c19]Kon Papazis, Naveen K. Chilamkurti, Ben Soh:
A New Adaptive Layered Multicast Protocol. HSNMC 2004: 381-389 - [c18]Ben Soh, Daniel Bonello:
A New Reduction Method of Intrusion Detection False Alerts Using SNORT. ICETE (2) 2004: 46-53 - [c17]Ben Soh, Luke Sledziona:
Internet Security: Public-Key Infrastractures and Certification Systems. ICETE (2) 2004: 93-106 - [c16]Naveen K. Chilamkurti, Ben Soh, Sri Vijaya Gutala:
Performance Analysis of a Split-Layer Multicast Mechanism with H.26L Video Coding Scheme. ICETE (3) 2004: 181-186 - [c15]Jun Lai, Ben Soh, Mao Lin Huang:
A New Word-Intersection Clustering Method for Information Filtering. ICETE (1) 2004: 241-244 - [c14]Ben Soh, Aaron Joy:
Optimal Analysis of a Hybrid Authentication System: Web Security versus System Performance. ICETE (2) 2004: 281-286 - [c13]Joel Sing, Ben Soh:
TCP performance over geostationary satellite links: problems and solutions. ICON 2004: 14-18 - [c12]Naveen K. Chilamkurti, Ben Soh:
A simulation study on a layered video multicast algorithm. IPCCC 2004: 265-269 - [c11]Naveen K. Chilamkurti, Ben Soh, A. Aitham:
SPLIT: A priority based TCP-friendly video protocol. ISCC 2004: 828-833 - 2003
- [c10]L. Augusto Sanabria, Ben Soh, Tharam S. Dillon, L. Chang:
Genetic algorithms in stochastic optimisation. IEEE Congress on Evolutionary Computation 2003: 815-822 - [c9]Jun Lai, Ben Soh:
Design and Implementation of an Efficient B2C Online Platform. International Conference on Internet Computing 2003: 160-166 - [c8]Jun Lai, Ben Soh:
Web Security Solutions: Current Development and Future Trend. International Conference on Internet Computing 2003: 181-187 - [c7]Amitabh Saxena, Ben Soh:
A new paradigm for group cryptosystems using quick keys. ICON 2003: 385-389 - [c6]Amitabh Saxena, Ben Soh:
Contributory approaches to centralized key agreement in dynamic peer groups. ICON 2003: 397-402 - [c5]Simon C. Brennan, Naveen K. Chilamkurti, Ben Soh:
Split-Layer Video Multicast Protocol: A New Receiver-Based Rate-Adaptation Protocol. NCA 2003: 105-112 - [c4]Ben Soh, Aaron Joy:
A Novel Web Security Evaluation Model for a One-Time-Password System. Web Intelligence 2003: 413-416 - 2002
- [c3]Naveen K. Chilamkurti, Ben Soh:
A simulation study on multicast congestion control algorithms with multimedia traffic. GLOBECOM 2002: 1779-1783 - [c2]Aaron Joy, Ben Soh:
A Proposed Secure TCP Connection-oriented Model for E-Commerce Systems. IMSA 2002: 68-73
1990 – 1999
- 1997
- [j3]Ben Soh, Tharam S. Dillon:
System intrusion processes: a simulation model. Comput. Secur. 16(1): 71-79 (1997) - 1995
- [j2]Ben Soh, Tharam S. Dillon, Phil County:
Quantitative Risk Assessment of Computer Virus Attacks on Computer Networks. Comput. Networks ISDN Syst. 27(10): 1447-1456 (1995) - [j1]Ben Soh, Tharam S. Dillon:
Setting optimal intrusion-detection thresholds. Comput. Secur. 14(7): 621-631 (1995) - 1991
- [c1]Ben Soh, Tharam S. Dillon:
On Modelling and Analysis of Latency Problem in Fault-Tolerant Systems. Fault-Tolerant Computing Systems 1991: 217-228
Coauthor Index
aka: Mohammed A. Alzain
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-29 20:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint