dblp.uni-trier.dewww.uni-trier.de

Ben Soh

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
44EESaqib Ali, Torab Torabi, Ben Soh: Rule component specification for business process deployment. DEXA Workshops 2007: 595-599
2006
43EEOmar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon, Ben Soh: Context and Time Based Riskiness Assessment for Decision Making. AICT/ICIW 2006: 104
42EEOmar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon, Ben Soh: Context and Time Dependent Risk Based Decision Making. AINA (1) 2006: 585-590
41EEJun Lai, Ben Soh, Chai Fei: A Web Page Ranking Method by Analyzing Hyperlink Structure and K-Elements. ICCSA (4) 2006: 179-186
40EETony de Souza-Daw, Naveen K. Chilamkurti, Ben Soh: An integration of H.264 based Error Concealment technique and the SPLIT layer protocol. ICN/ICONS/MCL 2006: 106
39EEAmit Sood, Naveen K. Chilamkurti, Ben Soh: Analysis of Error Resilience in H.264 Video Using Slice Interleaving Technique. ICOIN 2006: 912-921
38EEJoel Sing, Ben Soh: TCP New Vegas: Performance Evaluation and Validation. ISCC 2006: 541-546
37EELokesh D. Pathak, Ben Soh: Incorporating Data Mining Tools into a New Hybrid-IDS to Detect Known and Unknown Attacks. UIC 2006: 826-834
36EEAmitabh Saxena, Ben Soh: A New Cryptosystem Based On Hidden Order Groups CoRR abs/cs/0605003: (2006)
35EENaveen K. Chilamkurti, Ben Soh: A new TCP-friendly prioritized video multicast protocol using SPLIT protocol. Computer Communications 29(8): 1110-1120 (2006)
34EESaqib Ali, Ben Soh, Torab Torabi: A novel approach toward integration of rules into business processes using an agent-oriented framework. IEEE Trans. Industrial Informatics 2(3): 145-154 (2006)
2005
33EEAmitabh Saxena, Ben Soh: Authenticating Mobile Agent Platforms Using Signature Chaining Without Trusted Third Parties. EEE 2005: 282-285
32EEUmair Hassan, Ben Soh: Web Service Intelligent Agent Structuring for Supply Chain Management (SCM). EEE 2005: 329-332
31EEAmitabh Saxena, Ben Soh, Dimitri Zantidis: A Digital Cash Protocol Based on Additive Zero Knowledge. ICCSA (3) 2005: 672-680
30EEOmar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon, Ben Soh: Risk in Trusted Decentralized Communications. ICDE Workshops 2005: 1198
29EEJun Lai, Ben Soh: CRANAI: A New Search Model Reinforced by Combining a Ranking Algorithm with Author Inputs. ICEBE 2005: 340-345
28EESaqib Ali, Ben Soh, Torab Torabi: Design and Implementation of a Model for Business Rules Automation. ICITA (1) 2005: 40-45
27EEJun Lai, Ben Soh: Personalized Web Search Results with Profile Comparisons. ICITA (1) 2005: 573-576
26EESaqib Ali, Ben Soh, Torab Torabi: A New Adaptive Business Model for E-Commerce. ICITA (1) 2005: 99-102
25EENaveen K. Chilamkurti, Ben Soh: Multimedia Multicast Using SPLIT and Layered FEC. ICITA (2) 2005: 393-396
24EEAmitabh Saxena, Ben Soh: Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet. ICITA (2) 2005: 460-464
23EEJoel Sing, Ben Soh: A Critical Analysis of Multilayer IP Security Protocol. ICITA (2) 2005: 683-688
22EEJoel Sing, Ben Soh: On the Use of Snoop with Geostationary Satellite Links. ICITA (2) 2005: 689-694
21 Naveen K. Chilamkurti, Ben Soh: Simulation of Video Multicasting over SPLIT Protocol. IMSA 2005: 331-336
20EEJun Lai, Ben Soh: Turning Mass Media to Your Media: Intelligent Search with Customized Results. KES (2) 2005: 887-893
19EEJoel Sing, Ben Soh: TCP New Vegas: Improving the Performance of TCP Vegas Over High Latency Links. NCA 2005: 73-82
2004
18EEKon Papazis, Naveen K. Chilamkurti, Ben Soh: A New Receiver-Based Layered-Rate Estimator Algorithm for Fair Bandwidth Distribution. COMPSAC 2004: 560-565
17EEJun Lai, Ben Soh: Using Element and Document Profile for Information Clustering. EEE 2004: 503-506
16EEKon Papazis, Naveen K. Chilamkurti, Ben Soh: A New Adaptive Layered Multicast Protocol. HSNMC 2004: 381-389
15 Jun Lai, Ben Soh, Mao Lin Huang: A New Word-Intersection Clustering Method for Information Filtering. ICETE (1) 2004: 241-244
14 Ben Soh, Aaron Joy: Optimal Analysis of a Hybrid Authentication System: Web Security versus System Performance. ICETE (2) 2004: 281-286
13 Ben Soh, Daniel Bonello: A New Reduction Method of Intrusion Detection False Alerts Using SNORT. ICETE (2) 2004: 46-53
12 Ben Soh, Luke Sledziona: Internet Security: Public-Key Infrastractures and Certification Systems. ICETE (2) 2004: 93-106
11 Naveen K. Chilamkurti, Ben Soh, Sri Vijaya Gutala: Performance Analysis of a Split-Layer Multicast Mechanism with H.26L Video Coding Scheme. ICETE (3) 2004: 181-186
10EENaveen K. Chilamkurti, Ben Soh, A. Aitham: SPLIT: A priority based TCP-friendly video protocol. ISCC 2004: 828-833
2003
9 Jun Lai, Ben Soh: Design and Implementation of an Efficient B2C Online Platform. International Conference on Internet Computing 2003: 160-166
8 Jun Lai, Ben Soh: Web Security Solutions: Current Development and Future Trend. International Conference on Internet Computing 2003: 181-187
7EESimon C. Brennan, Naveen K. Chilamkurti, Ben Soh: Split-Layer Video Multicast Protocol: A New Receiver-Based Rate-Adaptation Protocol. NCA 2003: 105-112
6EEBen Soh, Aaron Joy: A Novel Web Security Evaluation Model for a One-Time-Password System. Web Intelligence 2003: 413-416
2002
5 Aaron Joy, Ben Soh: A Proposed Secure TCP Connection-oriented Model for E-Commerce Systems. IMSA 2002: 68-73
1997
4EEBen Soh, Tharam S. Dillon: System intrusion processes: a simulation model. Computers & Security 16(1): 71-79 (1997)
1995
3EEBen Soh, Tharam S. Dillon, Phil County: Quantitative Risk Assessment of Computer Virus Attacks on Computer Networks. Computer Networks and ISDN Systems 27(10): 1447-1456 (1995)
2EEBen Soh, Tharam S. Dillon: Setting optimal intrusion-detection thresholds. Computers & Security 14(7): 621-631 (1995)
1991
1 Ben Soh, Tharam S. Dillon: On Modelling and Analysis of Latency Problem in Fault-Tolerant Systems. Fault-Tolerant Computing Systems 1991: 217-228

Coauthor Index

1A. Aitham [10]
2Saqib Ali [26] [28] [34] [44]
3Daniel Bonello [13]
4Simon C. Brennan [7]
5Elizabeth Chang [30] [42] [43]
6Naveen K. Chilamkurti [7] [10] [11] [16] [18] [21] [25] [35] [39] [40]
7Phil County [3]
8Tharam S. Dillon [1] [2] [3] [4] [30] [42] [43]
9Chai Fei [41]
10Sri Vijaya Gutala [11]
11Umair Hassan [32]
12Mao Lin Huang [15]
13Farookh Khadeer Hussain [30] [42] [43]
14Omar Khadeer Hussain [30] [42] [43]
15Aaron Joy [5] [6] [14]
16Jun Lai [8] [9] [15] [17] [20] [27] [29] [41]
17Kon Papazis [16] [18]
18Lokesh D. Pathak [37]
19Amitabh Saxena [24] [31] [33] [36]
20Joel Sing [19] [22] [23] [38]
21Luke Sledziona [12]
22Amit Sood [39]
23Tony de Souza-Daw [40]
24Torab Torabi [26] [28] [34] [44]
25Dimitri Zantidis [31]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)