Benjamin Aziz

Orcid: 0000-0001-5089-2025

According to our database1, Benjamin Aziz authored at least 100 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cyber Incidents Risk Assessments Using Feature Analysis.
SN Comput. Sci., January, 2024

2023
Detecting the Manipulation of Text Structure in Text Steganography Using Machine Learning.
Proceedings of the 19th International Conference on Web Information Systems and Technologies, 2023

A Study on Human Perception of Document Paragraph Layout.
Proceedings of the 14th International Conference on Information, 2023

Epistemology for Cyber Security: A Controlled Natural Language Approach.
Proceedings of the Advances in Information Systems, Artificial Intelligence and Knowledge Management, 2023

2022
An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks.
Array, 2022

Using Feature Analysis to Guide Risk Calculations of Cyber Incidents.
Proceedings of the 18th International Conference on Web Information Systems and Technologies, 2022

A Novel Method for Embedding and Extracting Secret Messages in Textual Documents based on Paragraph Resizing.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Excommunication: Transforming π-Calculus Specifications to Remove Internal Communication.
Proceedings of the Formal Methods: Foundations and Applications - 25th Brazilian Symposium, 2022

Formal Analysis by Abstract Interpretation - Case Studies in Modern Protocols
Springer, ISBN: 978-3-030-91152-2, 2022

2021
A process algebraic mutation framework with application to a vehicle charging protocol.
Veh. Commun., 2021

A Note on the Problem of Semantic Interpretation Agreement in Steganographic Communications.
J. Internet Serv. Inf. Secur., 2021

The LeWiS Method: Target Variable Estimation using Cyber Security Intelligence.
Proceedings of the 17th International Conference on Web Information Systems and Technologies, 2021

2020
Cyber security incidents analysis and classification in a case study of Korean enterprises.
Knowl. Inf. Syst., 2020

Modeling and Analyzing an Industry 4.0 Communication Protocol.
IEEE Internet Things J., 2020

Smart routing: Towards proactive fault handling of software-defined networks.
Comput. Networks, 2020

Towards Consensus-Based Group Decision Making for Co-Owned Data Sharing in Online Social Networks.
IEEE Access, 2020

SMS Spam Identification and Risk Assessment Evaluations.
Proceedings of the 16th International Conference on Web Information Systems and Technologies, 2020

Automated Detection of Racial Microaggressions using Machine Learning.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Application of Extended IOWA Operator for Making Group Decision on Co-owned Contents in Online Social Networks (OSNs).
Proceedings of the 10th IEEE International Conference on Intelligent Systems, 2020

Towards Secure Data Sharing Processes in Online Social Networks: Trusty.
Proceedings of the 15th International Conference on Software Technologies, 2020

2019
Software-defined networks: A walkthrough guide from occurrence To data plane fault tolerance.
PeerJ Prepr., 2019

Deriving event data sharing in IoT systems using formal modelling and analysis.
Internet Things, 2019

Advantages of Having Users' Trust and Reputation Values on Data Sharing Process in Online Social Networks.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security.
Proceedings of the 2019 International Conference on Networked Systems, 2019

Predicting CyberSecurity Incidents using Machine Learning Algorithms: A Case Study of Korean SMEs.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Evaluating the Quantity of Incident-Related Information in an Open Cyber Security Dataset.
Proceedings of the Business Information Systems Workshops, 2019

A Fuzzy Modeling Approach for Group Decision Making in Social Networks.
Proceedings of the Business Information Systems - 22nd International Conference, 2019

2018
Anomaly analysis on an open DNS dataset.
PeerJ Prepr., 2018

A false negative study of the steganalysis tool: Stegdetect.
PeerJ Prepr., 2018

Towards a mutation analysis of IoT protocols.
Inf. Softw. Technol., 2018

Towards open data-driven evaluation of access control policies.
Comput. Stand. Interfaces, 2018

Cloud-based federated identity for the Internet of Things.
Ann. des Télécommunications, 2018

THRIFTY: Towards High Reduction In Flow Table memorY.
Proceedings of the 2018 Imperial College Computing Student Workshop, 2018

Data-Driven Chinese Walls.
Proceedings of the 2018 Imperial College Computing Student Workshop, 2018

2017
Optimisation Methods for Fast Restoration of Software-Defined Networks.
IEEE Access, 2017

Finding most reliable paths for software defined networks.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

New Computing Model for Securing Mobile Agents in IP Networks.
Proceedings of the 2nd International Conference on Internet of Things, 2017

Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper - .
Proceedings of the 2nd International Conference on Internet of Things, 2017

Virtual topology partitioning towards an efficient failure recovery of software defined networks.
Proceedings of the 2017 International Conference on Machine Learning and Cybernetics, 2017

2016
An Incremental B-Model for RBAC-Controlled Electronic Marking System.
Int. J. Secur. Softw. Eng., 2016

Modelling Fine-Grained Access Control Policies in Grids.
J. Grid Comput., 2016

A formal model and analysis of an IoT protocol.
Ad Hoc Networks, 2016

A Utility-Based Reputation Model for the Internet of Things.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Check Your Blind Spot: A New Cyber-Security Metric for Measuring Incident Response Readiness.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

Privacy-enhancing Federated Middleware for the Internet of Things.
Proceedings of the Posters and Demos Session of the 17th International Middleware Conference, 2016

Search-Based SQL Injection Attacks Testing Using Genetic Programming.
Proceedings of the Genetic Programming - 19th European Conference, 2016

A Temporal Blockchain: A Formal Analysis.
Proceedings of the 2016 International Conference on Collaboration Technologies and Systems, 2016

OAuthing: Privacy-enhancing federation for the Internet of Things.
Proceedings of the 2016 Cloudification of the Internet of Things, 2016

2015
Privacy Aware on-Demand Resource Provisioning for IoT Data Processing.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

Web API Management Meets the Internet of Things.
Proceedings of the Third Workshop on Services and Applications over Linked APIs and Data co-located with the 12th Extended Semantic Web Conference (ESWC 2015), 2015

Goal-Oriented Requirement Engineering Support for Business Continuity Planning.
Proceedings of the Advances in Conceptual Modeling, 2015

Incremental Development of RBAC-Controlled E-Marking System Using the B Method.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Enforcing Reputation Constraints on Business Process Workflows.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Modelling and refinement of forensic data acquisition specifications.
Digit. Investig., 2014

Security and VO Management Capabilities in a Large-Scale Grid Operating System.
Comput. Informatics, 2014

Using Security Patterns for Modelling Security Capabilities in Grid Systems.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

Federated Identity and Access Management for the Internet of Things.
Proceedings of the 2014 International Workshop on Secure Internet of Things, 2014

A Formal Model for Forensic Storage Media Preparation Tools.
Proceedings of the SECRYPT 2014, 2014

A Formal Model and Analysis of the MQ Telemetry Transport Protocol.
Proceedings of the Ninth International Conference on Availability, 2014

2013
A Framework for Digital Forensics and Investigations: The Goal-Driven Approach.
Int. J. Digit. Crime Forensics, 2013

A study on the false positive rate of Stegdetect.
Digit. Investig., 2013

On Formalising Policy Refinement in Grid Virtual Organisations.
Proceedings of the Software Engineering Research, 2013

Single-mismatch 2LSB embedding steganography.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Using a Goal-Driven Approach in the Investigation of a Questioned Contract.
Proceedings of the Advances in Digital Forensics IX, 2013

Reputation-Controlled Business Process Workflows.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
An Algorithm for Trading Grid Resources in a Virtual Marketplace.
Scalable Comput. Pract. Exp., 2012

Application of formal analysis to enhancing trust in a complex grid-based operating system.
Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems, 2012

2011
Verifying a delegation protocol for grid systems.
Future Gener. Comput. Syst., 2011

Correcting a Delegation Protocol for Grids.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

A Metadata Model for Data Centric Security.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

An Autonomic Security Monitor for Distributed Operating Systems - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Model-Based Refinement of Security Policies in Collaborative Virtual Organisations.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

2010
Reputation management in collaborative computing systems.
Secur. Commun. Networks, 2010

Management of Security Policies in Virtual Organisations.
Proceedings of the SECRYPT 2010, 2010

An Event-B Approach to Data Sharing Agreements.
Proceedings of the Integrated Formal Methods - 8th International Conference, 2010

A Secure and Scalable Grid-Based Content Management System.
Proceedings of the ARES 2010, 2010

2009
Configuring storage-area networks using mandatory security.
J. Comput. Secur., 2009

Detecting Man-in-the-Middle Attacks by Precise Timing.
Proceedings of the Third International Conference on Emerging Security Information, 2009

From Goal-Oriented Requirements to Event-B Specifications.
Proceedings of the First NASA Formal Methods Symposium, 2009

On Usage Control in Data Grids.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

2008
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
Proceedings of the Trust, 2008

Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach.
Proceedings of the Towards a Service-Based Internet, 2008

Reputation Management in Grid-based Virtual Organisations.
Proceedings of the SECRYPT 2008, 2008

Towards Modelling Obligations in Event-B.
Proceedings of the Abstract State Machines, B and Z, First International Conference, 2008

Modelling Security Properties in a Grid-based Operating System with Anti-Goals.
Proceedings of the The Third International Conference on Availability, 2008

2007
Modelling and Analysis of PKI-Based Systems Using Process Calculi.
Int. J. Found. Comput. Sci., 2007

Managing Conflicts of Interest in Virtual Organisations.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

2006
Reconfiguring Role Based Access Control policies using risk semantics.
J. High Speed Networks, 2006

Measuring the Speed of Information Leakage in Mobile Processes.
Proceedings of the Algebraic Methodology and Software Technology, 2006

2005
A static analysis of cryptographic processes: the denotational approach.
J. Log. Algebraic Methods Program., 2005

A Semiring-based Quantitative Analysis of Mobile Systems.
Proceedings of the Third International Workshop on Software Verification and Validation, 2005

A Static Analysis of PKI-Based Systems.
Proceedings of the Theoretical Computer Science, 9th Italian Conference, 2005

Trading Off Security in a Service Oriented Architecture.
Proceedings of the Data and Applications Security XIX, 2005

2004
Configuring Storage Area Networks for Mandatory Security.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
A Denotational Approach to the Static Analysis of Cryptographic Processes.
Proceedings of the International Workshop on Software Verification and Validation, 2003

A Calculus for Secure Mobility.
Proceedings of the Advances in Computing Science, 2003

2001
A Denotational Semantics for the Pi-Calculus.
Proceedings of the 5th Irish Workshop on Formal Methods, 2001

2000
Adaptability in CORBA: The Mobile Proxy Approach.
Proceedings of the International Symposium on Distributed Objects and Applications, 2000


  Loading...