Ben Soh
Orcid: 0000-0002-9519-886X
According to our database1,
Ben Soh
authored at least 105 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Ensuring authentication in Medical Cyber-Physical Systems: A comprehensive literature review of blockchain technology integration with machine learning.
Multim. Tools Appl., April, 2024
Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems.
Multim. Tools Appl., April, 2024
Using ML to Predict User Satisfaction with ICT Technology for Educational Institution Administration.
Inf., April, 2024
IMBA: IoT-Mist Bat-Inspired Algorithm for Optimising Resource Allocation in IoT Networks.
Future Internet, March, 2024
2023
Enhancing Energy Efficiency and Fast Decision Making for Medical Sensors in Healthcare Systems: An Overview and Novel Proposal.
Sensors, August, 2023
Effects on Saudi Female Student Learning Experiences in a Programming Subject Using Mobile Devices: An Empirical Study.
Int. J. Interact. Mob. Technol., July, 2023
Future Internet, 2023
An Aspect-Oriented Approach to Time-Constrained Strategies in Smart City IoT Applications.
Algorithms, 2023
2022
Applying Aspect-Oriented Design Methodology to Manage Time-Validity of Information in Internet-of-Things Systems.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022
2021
Int. J. Smart Educ. Urban Soc., 2021
Proceedings of the IoT as a Service - 7th EAI International Conference, 2021
A Comprehensive Study on the Energy Efficiency of IoT from Four Angles: Clustering and Routing in WSNs, Smart Grid, Fog Computing and MQTT & CoAP Application Protocols.
Proceedings of the IoT as a Service - 7th EAI International Conference, 2021
IiCE: A Proposed System Based on IoTaaS to Study Administrative Efficiency in Primary Schools.
Proceedings of the IoT as a Service - 7th EAI International Conference, 2021
2020
MICKEY 2.0.85: A Secure and Lighter MICKEY 2.0 Cipher Variant with Improved Power Consumption for Smaller Devices in the IoT.
Symmetry, 2020
Multim. Tools Appl., 2020
Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications.
IEEE Access, 2020
2019
From Learning Management Systems to a Social Learning Environment: A Comparative Review and the Implications.
Int. J. Smart Educ. Urban Soc., 2019
Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection.
Int. J. Commun. Networks Inf. Secur., 2019
A new neural-network-based model for measuring the strength of a pseudorandom binary sequence.
CoRR, 2019
IEEE Access, 2019
Prototype Device With Lightweight Protocol for Secure RFID Communication Without Reliable Connectivity.
IEEE Access, 2019
2017
Int. J. Knowl. Soc. Res., 2017
Future Internet, 2017
2016
Int. J. Knowl. Soc. Res., 2016
A Conceptual Model for an Intelligent Simulation-Based Learning Management System Using a Data Mining Agent in Clinical Skills Education.
Proceedings of the 4th International Conference on Enterprise Systems, 2016
2015
Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes.
Int. J. Cloud Appl. Comput., 2015
2014
Improving e-Health Services and System Requirements by Modelling the Health Environment.
J. Softw., 2014
Automated Health Business Process Modelling and Analysis for E-Health System Requirements Elicitation.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
2013
J. Softw., 2013
Structure-free message aggregation and routing in traffic information system (SMART).
J. Netw. Comput. Appl., 2013
A hybrid history based weighted voting algorithm for smart mobile e-health monitoring systems.
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
2012
Proceedings of the International Symposium on Communications and Information Technologies, 2012
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
2011
Secur. Commun. Networks, 2011
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
2010
A Step-by-Step Extending Parallelism Approach for Enumeration of Combinatorial Objects.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010
A Four-Stage Design Approach Towards Securing a Vehicular Ad Hoc Networks Architecture.
Proceedings of the Fifth IEEE International Symposium on Electronic Design, 2010
Proceedings of the Fifth IEEE International Symposium on Electronic Design, 2010
Proceedings of the Communications and Multimedia Security, 2010
2009
2008
Int. J. Inf. Comput. Secur., 2008
2007
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007
Proceedings of the 15th IEEE International Conference on Networks, 2007
Proceedings of the 15th IEEE International Conference on Networks, 2007
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007
2006
A novel approach toward integration of rules into business processes using an agent-oriented framework.
IEEE Trans. Ind. Informatics, 2006
Fault-tolerant performance checking application for distributed computing and supply chain networks.
J. Comput. Methods Sci. Eng., 2006
Comput. Commun., 2006
Incorporating Data Mining Tools into a New Hybrid-IDS to Detect Known and Unknown Attacks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
Proceedings of the Information Networking, 2006
An integration of H.264 based Error Concealment technique and the SPLIT layer protocol.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the 2005 International Symposium on Autonomous Decentralized Systems, 2005
Simulation of Video Multicasting over SPLIT Protocol.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
CRANAI: A New Search Model Reinforced by Combining a Ranking Algorithm with Author Inputs.
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005
Proceedings of the Computational Science and Its Applications, 2005
Authenticating Mobile Agent Platforms Using Signature Chaining Without Trusted Third Parties.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
2004
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
Proceedings of the 12th IEEE International Conference on Networks, 2004
Internet Security: Public-Key Infrastractures and Certification Systems.
Proceedings of the ICETE 2004, 2004
Optimal Analysis of a Hybrid Authentication System: Web Security versus System Performance.
Proceedings of the ICETE 2004, 2004
A New Reduction Method of Intrusion Detection False Alerts Using SNORT.
Proceedings of the ICETE 2004, 2004
A New Word-Intersection Clustering Method for Information Filtering.
Proceedings of the ICETE 2004, 2004
Performance Analysis of a Split-Layer Multicast Mechanism with H.26L Video Coding Scheme.
Proceedings of the ICETE 2004, 2004
Proceedings of the High Speed Networks and Multimedia Communications, 2004
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004
A New Receiver-Based Layered-Rate Estimator Algorithm for Fair Bandwidth Distribution.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
2003
Proceedings of the 2003 IEEE / WIC International Conference on Web Intelligence, 2003
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Web Security Solutions: Current Development and Future Trend.
Proceedings of the International Conference on Internet Computing, 2003
Design and Implementation of an Efficient B2C Online Platform.
Proceedings of the International Conference on Internet Computing, 2003
Proceedings of the IEEE Congress on Evolutionary Computation, 2003
2002
A Proposed Secure TCP Connection-oriented Model for E-Commerce Systems.
Proceedings of the Internet and Multimedia Systems and Applications, 2002
A simulation study on multicast congestion control algorithms with multimedia traffic.
Proceedings of the Global Telecommunications Conference, 2002
1997
1995
Comput. Networks ISDN Syst., 1995
1991
Proceedings of the Fault-Tolerant Computing Systems, Tests, Diagnosis, 1991