Benjamin Aziz
Orcid: 0000-0001-5089-2025
According to our database1,
Benjamin Aziz
authored at least 103 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
SN Comput. Sci., June, 2024
SN Comput. Sci., January, 2024
Intell. Decis. Technol., 2024
An Extended Method for Transmitting Secret Messages in Textual Documents Based on Paragraph Resizing.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the Artificial Intelligence Applications and Innovations, 2024
2023
Detecting the Manipulation of Text Structure in Text Steganography Using Machine Learning.
Proceedings of the 19th International Conference on Web Information Systems and Technologies, 2023
Proceedings of the 14th International Conference on Information, 2023
Proceedings of the Advances in Information Systems, Artificial Intelligence and Knowledge Management, 2023
2022
An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks.
Array, 2022
Proceedings of the 18th International Conference on Web Information Systems and Technologies, 2022
A Novel Method for Embedding and Extracting Secret Messages in Textual Documents based on Paragraph Resizing.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Excommunication: Transforming π-Calculus Specifications to Remove Internal Communication.
Proceedings of the Formal Methods: Foundations and Applications - 25th Brazilian Symposium, 2022
Springer, ISBN: 978-3-030-91152-2, 2022
2021
A process algebraic mutation framework with application to a vehicle charging protocol.
Veh. Commun., 2021
A Note on the Problem of Semantic Interpretation Agreement in Steganographic Communications.
J. Internet Serv. Inf. Secur., 2021
2020
Cyber security incidents analysis and classification in a case study of Korean enterprises.
Knowl. Inf. Syst., 2020
IEEE Internet Things J., 2020
Comput. Networks, 2020
Towards Consensus-Based Group Decision Making for Co-Owned Data Sharing in Online Social Networks.
IEEE Access, 2020
Proceedings of the 16th International Conference on Web Information Systems and Technologies, 2020
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Application of Extended IOWA Operator for Making Group Decision on Co-owned Contents in Online Social Networks (OSNs).
Proceedings of the 10th IEEE International Conference on Intelligent Systems, 2020
Proceedings of the 15th International Conference on Software Technologies, 2020
2019
Software-defined networks: A walkthrough guide from occurrence To data plane fault tolerance.
PeerJ Prepr., 2019
Internet Things, 2019
Advantages of Having Users' Trust and Reputation Values on Data Sharing Process in Online Social Networks.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019
Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security.
Proceedings of the 2019 International Conference on Networked Systems, 2019
Predicting CyberSecurity Incidents using Machine Learning Algorithms: A Case Study of Korean SMEs.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Evaluating the Quantity of Incident-Related Information in an Open Cyber Security Dataset.
Proceedings of the Business Information Systems Workshops, 2019
Proceedings of the Business Information Systems - 22nd International Conference, 2019
2018
Comput. Stand. Interfaces, 2018
Ann. des Télécommunications, 2018
Proceedings of the 2018 Imperial College Computing Student Workshop, 2018
Proceedings of the 2018 Imperial College Computing Student Workshop, 2018
2017
IEEE Access, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 2nd International Conference on Internet of Things, 2017
Proceedings of the 2nd International Conference on Internet of Things, 2017
Virtual topology partitioning towards an efficient failure recovery of software defined networks.
Proceedings of the 2017 International Conference on Machine Learning and Cybernetics, 2017
2016
Int. J. Secur. Softw. Eng., 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Check Your Blind Spot: A New Cyber-Security Metric for Measuring Incident Response Readiness.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016
Proceedings of the Posters and Demos Session of the 17th International Middleware Conference, 2016
Proceedings of the Genetic Programming - 19th European Conference, 2016
Proceedings of the 2016 International Conference on Collaboration Technologies and Systems, 2016
Proceedings of the 2016 Cloudification of the Internet of Things, 2016
2015
Proceedings of the Internet of Things. IoT Infrastructures, 2015
Proceedings of the Third Workshop on Services and Applications over Linked APIs and Data co-located with the 12th Extended Semantic Web Conference (ESWC 2015), 2015
Proceedings of the Advances in Conceptual Modeling, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
Digit. Investig., 2014
Comput. Informatics, 2014
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014
Proceedings of the 2014 International Workshop on Secure Internet of Things, 2014
Proceedings of the SECRYPT 2014, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Int. J. Digit. Crime Forensics, 2013
Proceedings of the Software Engineering Research, 2013
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013
Proceedings of the Advances in Digital Forensics IX, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Scalable Comput. Pract. Exp., 2012
Application of formal analysis to enhancing trust in a complex grid-based operating system.
Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems, 2012
2011
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
2010
Secur. Commun. Networks, 2010
Management of Security Policies in Virtual Organisations.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Integrated Formal Methods - 8th International Conference, 2010
Proceedings of the ARES 2010, 2010
2009
Proceedings of the Third International Conference on Emerging Security Information, 2009
From Goal-Oriented Requirements to Event-B Specifications.
Proceedings of the First NASA Formal Methods Symposium, 2009
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
2008
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
Proceedings of the Trust, 2008
Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach.
Proceedings of the Towards a Service-Based Internet, 2008
Reputation Management in Grid-based Virtual Organisations.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Abstract State Machines, B and Z, First International Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Int. J. Found. Comput. Sci., 2007
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007
2006
J. High Speed Networks, 2006
Proceedings of the Algebraic Methodology and Software Technology, 2006
2005
J. Log. Algebraic Methods Program., 2005
Proceedings of the Third International Workshop on Software Verification and Validation, 2005
Proceedings of the Theoretical Computer Science, 9th Italian Conference, 2005
Proceedings of the Data and Applications Security XIX, 2005
2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
2003
Proceedings of the International Workshop on Software Verification and Validation, 2003
Proceedings of the Advances in Computing Science, 2003
2001
Proceedings of the 5th Irish Workshop on Formal Methods, 2001
2000
Proceedings of the International Symposium on Distributed Objects and Applications, 2000