2007 |
44 | EE | Saqib Ali,
Torab Torabi,
Ben Soh:
Rule component specification for business process deployment.
DEXA Workshops 2007: 595-599 |
2006 |
43 | EE | Omar Khadeer Hussain,
Elizabeth Chang,
Farookh Khadeer Hussain,
Tharam S. Dillon,
Ben Soh:
Context and Time Based Riskiness Assessment for Decision Making.
AICT/ICIW 2006: 104 |
42 | EE | Omar Khadeer Hussain,
Elizabeth Chang,
Farookh Khadeer Hussain,
Tharam S. Dillon,
Ben Soh:
Context and Time Dependent Risk Based Decision Making.
AINA (1) 2006: 585-590 |
41 | EE | Jun Lai,
Ben Soh,
Chai Fei:
A Web Page Ranking Method by Analyzing Hyperlink Structure and K-Elements.
ICCSA (4) 2006: 179-186 |
40 | EE | Tony de Souza-Daw,
Naveen K. Chilamkurti,
Ben Soh:
An integration of H.264 based Error Concealment technique and the SPLIT layer protocol.
ICN/ICONS/MCL 2006: 106 |
39 | EE | Amit Sood,
Naveen K. Chilamkurti,
Ben Soh:
Analysis of Error Resilience in H.264 Video Using Slice Interleaving Technique.
ICOIN 2006: 912-921 |
38 | EE | Joel Sing,
Ben Soh:
TCP New Vegas: Performance Evaluation and Validation.
ISCC 2006: 541-546 |
37 | EE | Lokesh D. Pathak,
Ben Soh:
Incorporating Data Mining Tools into a New Hybrid-IDS to Detect Known and Unknown Attacks.
UIC 2006: 826-834 |
36 | EE | Amitabh Saxena,
Ben Soh:
A New Cryptosystem Based On Hidden Order Groups
CoRR abs/cs/0605003: (2006) |
35 | EE | Naveen K. Chilamkurti,
Ben Soh:
A new TCP-friendly prioritized video multicast protocol using SPLIT protocol.
Computer Communications 29(8): 1110-1120 (2006) |
34 | EE | Saqib Ali,
Ben Soh,
Torab Torabi:
A novel approach toward integration of rules into business processes using an agent-oriented framework.
IEEE Trans. Industrial Informatics 2(3): 145-154 (2006) |
2005 |
33 | EE | Amitabh Saxena,
Ben Soh:
Authenticating Mobile Agent Platforms Using Signature Chaining Without Trusted Third Parties.
EEE 2005: 282-285 |
32 | EE | Umair Hassan,
Ben Soh:
Web Service Intelligent Agent Structuring for Supply Chain Management (SCM).
EEE 2005: 329-332 |
31 | EE | Amitabh Saxena,
Ben Soh,
Dimitri Zantidis:
A Digital Cash Protocol Based on Additive Zero Knowledge.
ICCSA (3) 2005: 672-680 |
30 | EE | Omar Khadeer Hussain,
Elizabeth Chang,
Farookh Khadeer Hussain,
Tharam S. Dillon,
Ben Soh:
Risk in Trusted Decentralized Communications.
ICDE Workshops 2005: 1198 |
29 | EE | Jun Lai,
Ben Soh:
CRANAI: A New Search Model Reinforced by Combining a Ranking Algorithm with Author Inputs.
ICEBE 2005: 340-345 |
28 | EE | Saqib Ali,
Ben Soh,
Torab Torabi:
Design and Implementation of a Model for Business Rules Automation.
ICITA (1) 2005: 40-45 |
27 | EE | Jun Lai,
Ben Soh:
Personalized Web Search Results with Profile Comparisons.
ICITA (1) 2005: 573-576 |
26 | EE | Saqib Ali,
Ben Soh,
Torab Torabi:
A New Adaptive Business Model for E-Commerce.
ICITA (1) 2005: 99-102 |
25 | EE | Naveen K. Chilamkurti,
Ben Soh:
Multimedia Multicast Using SPLIT and Layered FEC.
ICITA (2) 2005: 393-396 |
24 | EE | Amitabh Saxena,
Ben Soh:
Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet.
ICITA (2) 2005: 460-464 |
23 | EE | Joel Sing,
Ben Soh:
A Critical Analysis of Multilayer IP Security Protocol.
ICITA (2) 2005: 683-688 |
22 | EE | Joel Sing,
Ben Soh:
On the Use of Snoop with Geostationary Satellite Links.
ICITA (2) 2005: 689-694 |
21 | | Naveen K. Chilamkurti,
Ben Soh:
Simulation of Video Multicasting over SPLIT Protocol.
IMSA 2005: 331-336 |
20 | EE | Jun Lai,
Ben Soh:
Turning Mass Media to Your Media: Intelligent Search with Customized Results.
KES (2) 2005: 887-893 |
19 | EE | Joel Sing,
Ben Soh:
TCP New Vegas: Improving the Performance of TCP Vegas Over High Latency Links.
NCA 2005: 73-82 |
2004 |
18 | EE | Kon Papazis,
Naveen K. Chilamkurti,
Ben Soh:
A New Receiver-Based Layered-Rate Estimator Algorithm for Fair Bandwidth Distribution.
COMPSAC 2004: 560-565 |
17 | EE | Jun Lai,
Ben Soh:
Using Element and Document Profile for Information Clustering.
EEE 2004: 503-506 |
16 | EE | Kon Papazis,
Naveen K. Chilamkurti,
Ben Soh:
A New Adaptive Layered Multicast Protocol.
HSNMC 2004: 381-389 |
15 | | Jun Lai,
Ben Soh,
Mao Lin Huang:
A New Word-Intersection Clustering Method for Information Filtering.
ICETE (1) 2004: 241-244 |
14 | | Ben Soh,
Aaron Joy:
Optimal Analysis of a Hybrid Authentication System: Web Security versus System Performance.
ICETE (2) 2004: 281-286 |
13 | | Ben Soh,
Daniel Bonello:
A New Reduction Method of Intrusion Detection False Alerts Using SNORT.
ICETE (2) 2004: 46-53 |
12 | | Ben Soh,
Luke Sledziona:
Internet Security: Public-Key Infrastractures and Certification Systems.
ICETE (2) 2004: 93-106 |
11 | | Naveen K. Chilamkurti,
Ben Soh,
Sri Vijaya Gutala:
Performance Analysis of a Split-Layer Multicast Mechanism with H.26L Video Coding Scheme.
ICETE (3) 2004: 181-186 |
10 | EE | Naveen K. Chilamkurti,
Ben Soh,
A. Aitham:
SPLIT: A priority based TCP-friendly video protocol.
ISCC 2004: 828-833 |
2003 |
9 | | Jun Lai,
Ben Soh:
Design and Implementation of an Efficient B2C Online Platform.
International Conference on Internet Computing 2003: 160-166 |
8 | | Jun Lai,
Ben Soh:
Web Security Solutions: Current Development and Future Trend.
International Conference on Internet Computing 2003: 181-187 |
7 | EE | Simon C. Brennan,
Naveen K. Chilamkurti,
Ben Soh:
Split-Layer Video Multicast Protocol: A New Receiver-Based Rate-Adaptation Protocol.
NCA 2003: 105-112 |
6 | EE | Ben Soh,
Aaron Joy:
A Novel Web Security Evaluation Model for a One-Time-Password System.
Web Intelligence 2003: 413-416 |
2002 |
5 | | Aaron Joy,
Ben Soh:
A Proposed Secure TCP Connection-oriented Model for E-Commerce Systems.
IMSA 2002: 68-73 |
1997 |
4 | EE | Ben Soh,
Tharam S. Dillon:
System intrusion processes: a simulation model.
Computers & Security 16(1): 71-79 (1997) |
1995 |
3 | EE | Ben Soh,
Tharam S. Dillon,
Phil County:
Quantitative Risk Assessment of Computer Virus Attacks on Computer Networks.
Computer Networks and ISDN Systems 27(10): 1447-1456 (1995) |
2 | EE | Ben Soh,
Tharam S. Dillon:
Setting optimal intrusion-detection thresholds.
Computers & Security 14(7): 621-631 (1995) |
1991 |
1 | | Ben Soh,
Tharam S. Dillon:
On Modelling and Analysis of Latency Problem in Fault-Tolerant Systems.
Fault-Tolerant Computing Systems 1991: 217-228 |