The SCEAS System
Navigation Menu

Search the dblp DataBase


Ben Soh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Omar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon, Ben C. Soh
    Context and Time Based Riskiness Assessment for Decision Making. [Citation Graph (0, 0)][DBLP]
    AICT/ICIW, 2006, pp:104- [Conf]
  2. Omar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon, Ben Soh
    Context and Time Dependent Risk Based Decision Making. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:585-590 [Conf]
  3. Kon Papazis, Naveen K. Chilamkurti, Ben Soh
    A New Receiver-Based Layered-Rate Estimator Algorithm for Fair Bandwidth Distribution. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2004, pp:560-565 [Conf]
  4. Jun Lai, Ben Soh
    Using Element and Document Profile for Information Clustering. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:503-506 [Conf]
  5. Umair Hassan, Ben Soh
    Web Service Intelligent Agent Structuring for Supply Chain Management (SCM). [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:329-332 [Conf]
  6. Amitabh Saxena, Ben Soh
    Authenticating Mobile Agent Platforms Using Signature Chaining Without Trusted Third Parties. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:282-285 [Conf]
  7. Kon Papazis, Naveen K. Chilamkurti, Ben Soh
    A New Adaptive Layered Multicast Protocol. [Citation Graph (0, 0)][DBLP]
    HSNMC, 2004, pp:381-389 [Conf]
  8. Jun Lai, Ben Soh
    Design and Implementation of an Efficient B2C Online Platform. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2003, pp:160-166 [Conf]
  9. Jun Lai, Ben Soh
    Web Security Solutions: Current Development and Future Trend. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2003, pp:181-187 [Conf]
  10. Jun Lai, Ben Soh, Chai Fei
    A Web Page Ranking Method by Analyzing Hyperlink Structure and K-Elements. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:179-186 [Conf]
  11. Amitabh Saxena, Ben Soh, Dimitri Zantidis
    A Digital Cash Protocol Based on Additive Zero Knowledge. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:672-680 [Conf]
  12. Omar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon, Ben Soh
    Risk in Trusted Decentralized Communications. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2005, pp:1198- [Conf]
  13. Jun Lai, Ben Soh
    CRANAI: A New Search Model Reinforced by Combining a Ranking Algorithm with Author Inputs. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2005, pp:340-345 [Conf]
  14. Jun Lai, Ben Soh, Mao Lin Huang
    A New Word-Intersection Clustering Method for Information Filtering. [Citation Graph (0, 0)][DBLP]
    ICETE (1), 2004, pp:241-244 [Conf]
  15. Naveen K. Chilamkurti, Ben Soh, Sri Vijaya Gutala
    Performance Analysis of a Split-Layer Multicast Mechanism with H.26L Video Coding Scheme. [Citation Graph (0, 0)][DBLP]
    ICETE (3), 2004, pp:181-186 [Conf]
  16. Ben Soh, Daniel Bonello
    A New Reduction Method of Intrusion Detection False Alerts Using SNORT. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:46-53 [Conf]
  17. Ben Soh, Aaron Joy
    Optimal Analysis of a Hybrid Authentication System: Web Security versus System Performance. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:281-286 [Conf]
  18. Ben Soh, Luke Sledziona
    Internet Security: Public-Key Infrastractures and Certification Systems. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:93-106 [Conf]
  19. Ben Soh, Tharam S. Dillon
    On Modelling and Analysis of Latency Problem in Fault-Tolerant Systems. [Citation Graph (0, 0)][DBLP]
    Fault-Tolerant Computing Systems, 1991, pp:217-228 [Conf]
  20. Tony de Souza-Daw, Naveen K. Chilamkurti, Ben Soh
    An integration of H.264 based Error Concealment technique and the SPLIT layer protocol. [Citation Graph (0, 0)][DBLP]
    ICN/ICONS/MCL, 2006, pp:106- [Conf]
  21. Amit Sood, Naveen K. Chilamkurti, Ben Soh
    Analysis of Error Resilience in H.264 Video Using Slice Interleaving Technique. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2006, pp:912-921 [Conf]
  22. Naveen K. Chilamkurti, Ben Soh
    Simulation of Video Multicasting over SPLIT Protocol. [Citation Graph (0, 0)][DBLP]
    IMSA, 2005, pp:331-336 [Conf]
  23. Aaron Joy, Ben Soh
    A Proposed Secure TCP Connection-oriented Model for E-Commerce Systems. [Citation Graph (0, 0)][DBLP]
    IMSA, 2002, pp:68-73 [Conf]
  24. Naveen K. Chilamkurti, Ben Soh, A. Aitham
    SPLIT: A priority based TCP-friendly video protocol. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:828-833 [Conf]
  25. Joel Sing, Ben Soh
    TCP New Vegas: Performance Evaluation and Validation. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:541-546 [Conf]
  26. Jun Lai, Ben Soh
    Turning Mass Media to Your Media: Intelligent Search with Customized Results. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:887-893 [Conf]
  27. Simon C. Brennan, Naveen K. Chilamkurti, Ben Soh
    Split-Layer Video Multicast Protocol: A New Receiver-Based Rate-Adaptation Protocol. [Citation Graph (0, 0)][DBLP]
    NCA, 2003, pp:105-112 [Conf]
  28. Joel Sing, Ben Soh
    TCP New Vegas: Improving the Performance of TCP Vegas Over High Latency Links. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:73-82 [Conf]
  29. Lokesh D. Pathak, Ben Soh
    Incorporating Data Mining Tools into a New Hybrid-IDS to Detect Known and Unknown Attacks. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:826-834 [Conf]
  30. Ben Soh, Aaron Joy
    A Novel Web Security Evaluation Model for a One-Time-Password System. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2003, pp:413-416 [Conf]
  31. Saqib Ali, Ben Soh, Torab Torabi
    A New Adaptive Business Model for E-Commerce. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:99-102 [Conf]
  32. Saqib Ali, Ben Soh, Torab Torabi
    Design and Implementation of a Model for Business Rules Automation. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:40-45 [Conf]
  33. Jun Lai, Ben Soh
    Personalized Web Search Results with Profile Comparisons. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:573-576 [Conf]
  34. Amitabh Saxena, Ben Soh
    Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:460-464 [Conf]
  35. Joel Sing, Ben Soh
    On the Use of Snoop with Geostationary Satellite Links. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:689-694 [Conf]
  36. Joel Sing, Ben Soh
    A Critical Analysis of Multilayer IP Security Protocol. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:683-688 [Conf]
  37. Naveen K. Chilamkurti, Ben Soh
    Multimedia Multicast Using SPLIT and Layered FEC. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:393-396 [Conf]
  38. Ben Soh, Tharam S. Dillon, Phil County
    Quantitative Risk Assessment of Computer Virus Attacks on Computer Networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1995, v:27, n:10, pp:1447-1456 [Journal]
  39. Naveen K. Chilamkurti, Ben Soh
    A new TCP-friendly prioritized video multicast protocol using SPLIT protocol. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:8, pp:1110-1120 [Journal]
  40. Ben Soh, Tharam S. Dillon
    Setting optimal intrusion-detection thresholds. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:7, pp:621-631 [Journal]
  41. Ben Soh, Tharam S. Dillon
    System intrusion processes: a simulation model. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:1, pp:71-79 [Journal]
  42. Saqib Ali, Torab Torabi, Ben Soh
    Rule component specification for business process deployment. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:595-599 [Conf]
  43. Amitabh Saxena, Ben Soh
    A New Cryptosystem Based On Hidden Order Groups [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  44. Predicting the Dynamic Nature of Risk. [Citation Graph (, )][DBLP]

  45. A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks. [Citation Graph (, )][DBLP]

  46. A Novel Design Framework for Business Process Modelling in Automotive Industry. [Citation Graph (, )][DBLP]

  47. A Four-Stage Design Approach Towards Securing a Vehicular Ad Hoc Networks Architecture. [Citation Graph (, )][DBLP]

  48. A Step-by-Step Extending Parallelism Approach for Enumeration of Combinatorial Objects. [Citation Graph (, )][DBLP]

  49. Improving Congestion Window Growth in Large Bandwidth Delay Product Networks. [Citation Graph (, )][DBLP]

  50. Improving TCP Performance: Identifying Corruption Based Packet Loss. [Citation Graph (, )][DBLP]

  51. A Comparative Study of Different Sensors for Smart Car Park Management. [Citation Graph (, )][DBLP]

Search in 0.008secs, Finished in 0.009secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002