default search action
Benjamin Aziz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2022
- [b1]Benjamin Aziz:
Formal Analysis by Abstract Interpretation - Case Studies in Modern Protocols. Springer 2022, ISBN 978-3-030-91152-2, pp. 1-113
Journal Articles
- 2024
- [j30]Benjamin Aziz, Aysha Bukhelli:
A study on human perception of document paragraph layout using surveys. Intell. Decis. Technol. 18(2): 1425-1445 (2024) - [j29]Benjamin Aziz, Alaa Mohasseb:
Cyber Incidents Risk Assessments Using Feature Analysis. SN Comput. Sci. 5(1): 7 (2024) - [j28]Leigh Chase, Alaa Mohasseb, Benjamin Aziz:
The LeWiS Method: Target Variable Estimation Using Cyber Security Intelligence. SN Comput. Sci. 5(5): 445 (2024) - 2022
- [j27]Muntadher Sallal, Ruairí de Fréin, Ali Malik, Benjamin Aziz:
An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks. Array 15: 100221 (2022) - 2021
- [j26]Benjamin Aziz:
A Note on the Problem of Semantic Interpretation Agreement in Steganographic Communications. J. Internet Serv. Inf. Secur. 11(3): 47-57 (2021) - [j25]Benjamin Aziz:
A process algebraic mutation framework with application to a vehicle charging protocol. Veh. Commun. 30: 100352 (2021) - 2020
- [j24]Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
Towards Consensus-Based Group Decision Making for Co-Owned Data Sharing in Online Social Networks. IEEE Access 8: 91311-91325 (2020) - [j23]Ali Malik, Benjamin Aziz, Mo Adda, Chih-Heng Ke:
Smart routing: Towards proactive fault handling of software-defined networks. Comput. Networks 170: 107104 (2020) - [j22]Benjamin Aziz:
Modeling and Analyzing an Industry 4.0 Communication Protocol. IEEE Internet Things J. 7(10): 10120-10127 (2020) - [j21]Alaa Mohasseb, Benjamin Aziz, Jeyong Jung, Julak Lee:
Cyber security incidents analysis and classification in a case study of Korean enterprises. Knowl. Inf. Syst. 62(7): 2917-2935 (2020) - 2019
- [j20]Paul Fremantle, Benjamin Aziz:
Deriving event data sharing in IoT systems using formal modelling and analysis. Internet Things 8 (2019) - 2018
- [j19]Paul Fremantle, Benjamin Aziz:
Cloud-based federated identity for the Internet of Things. Ann. des Télécommunications 73(7-8): 415-427 (2018) - [j18]Benjamin Aziz:
Towards open data-driven evaluation of access control policies. Comput. Stand. Interfaces 56: 13-26 (2018) - [j17]Benjamin Aziz:
Towards a mutation analysis of IoT protocols. Inf. Softw. Technol. 100: 183-184 (2018) - 2017
- [j16]Ali Malik, Benjamin Aziz, Mo Adda, Chih-Heng Ke:
Optimisation Methods for Fast Restoration of Software-Defined Networks. IEEE Access 5: 16111-16123 (2017) - 2016
- [j15]Benjamin Aziz:
A formal model and analysis of an IoT protocol. Ad Hoc Networks 36: 49-57 (2016) - [j14]Benjamin Aziz:
Modelling Fine-Grained Access Control Policies in Grids. J. Grid Comput. 14(3): 477-493 (2016) - [j13]Nasser Al-Hadhrami, Benjamin Aziz, Lotfi Ben Othmane:
An Incremental B-Model for RBAC-Controlled Electronic Marking System. Int. J. Secur. Softw. Eng. 7(2): 37-64 (2016) - 2014
- [j12]Benjamin Aziz, Ioana Sporea:
Security and VO Management Capabilities in a Large-Scale Grid Operating System. Comput. Informatics 33(2): 303-326 (2014) - [j11]Benjamin Aziz:
Modelling and refinement of forensic data acquisition specifications. Digit. Investig. 11(2): 90-101 (2014) - [j10]Benjamin Aziz, Geoff W. Hamilton:
Enforcing Reputation Constraints on Business Process Workflows. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(1): 101-121 (2014) - 2013
- [j9]Omed S. Khalind, Julio C. Hernandez-Castro, Benjamin Aziz:
A study on the false positive rate of Stegdetect. Digit. Investig. 9(3-4): 235-245 (2013) - [j8]Benjamin Aziz, Clive Blackwell, Shareeful Islam:
A Framework for Digital Forensics and Investigations: The Goal-Driven Approach. Int. J. Digit. Crime Forensics 5(2): 1-22 (2013) - 2012
- [j7]Benjamin Aziz:
An Algorithm for Trading Grid Resources in a Virtual Marketplace. Scalable Comput. Pract. Exp. 13(4) (2012) - 2011
- [j6]Benjamin Aziz, Geoff W. Hamilton:
Verifying a delegation protocol for grid systems. Future Gener. Comput. Syst. 27(5): 476-485 (2011) - 2010
- [j5]Alvaro E. Arenas, Benjamin Aziz, Gheorghe Cosmin Silaghi:
Reputation management in collaborative computing systems. Secur. Commun. Networks 3(6): 546-564 (2010) - 2009
- [j4]Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart:
Configuring storage-area networks using mandatory security. J. Comput. Secur. 17(2): 191-210 (2009) - 2007
- [j3]Benjamin Aziz, Geoff W. Hamilton:
Modelling and Analysis of PKI-Based Systems Using Process Calculi. Int. J. Found. Comput. Sci. 18(3): 593-618 (2007) - 2006
- [j2]Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart:
Reconfiguring Role Based Access Control policies using risk semantics. J. High Speed Networks 15(3): 261-273 (2006) - 2005
- [j1]Benjamin Aziz, Geoff W. Hamilton, David Gray:
A static analysis of cryptographic processes: the denotational approach. J. Log. Algebraic Methods Program. 64(2): 285-320 (2005)
Conference and Workshop Papers
- 2024
- [c71]Benjamin Aziz, Alaa Mohasseb, Jeyong Jung:
A Prediction Analysis for the Case of a Korean Police Dataset. AIAI (2) 2024: 145-157 - [c70]Benjamin Aziz, Estabraq Makiyah, Aysha Bukhelli:
An Extended Method for Transmitting Secret Messages in Textual Documents Based on Paragraph Resizing. SECRYPT 2024: 389-396 - 2023
- [c69]Leigh Chase, Alaa Mohasseb, Benjamin Aziz:
Epistemology for Cyber Security: A Controlled Natural Language Approach. ICIKS 2023: 267-282 - [c68]Benjamin Aziz, Aysha Bukhelli:
A Study on Human Perception of Document Paragraph Layout. IISA 2023: 1-8 - [c67]Benjamin Aziz, Aysha Bukhelli:
Detecting the Manipulation of Text Structure in Text Steganography Using Machine Learning. WEBIST 2023: 557-565 - 2022
- [c66]Geoff W. Hamilton, Benjamin Aziz:
Excommunication: Transforming π-Calculus Specifications to Remove Internal Communication. SBMF 2022: 109-123 - [c65]Benjamin Aziz, Aysha Bukhelli, Rinat Khusainov, Alaa Mohasseb:
A Novel Method for Embedding and Extracting Secret Messages in Textual Documents based on Paragraph Resizing. SECRYPT 2022: 714-719 - [c64]Benjamin Aziz, Alaa Mohasseb:
Using Feature Analysis to Guide Risk Calculations of Cyber Incidents. WEBIST 2022: 190-195 - 2021
- [c63]Leigh Chase, Alaa Mohasseb, Benjamin Aziz:
The LeWiS Method: Target Variable Estimation using Cyber Security Intelligence. WEBIST 2021: 15-26 - 2020
- [c62]Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
Towards Secure Data Sharing Processes in Online Social Networks: Trusty. ICSOFT 2020: 418-425 - [c61]Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
Application of Extended IOWA Operator for Making Group Decision on Co-owned Contents in Online Social Networks (OSNs). IEEE Conf. on Intelligent Systems 2020: 31-37 - [c60]Omar Ali, Nancy Scheidt, Alexander E. Gegov, Ella Haig, Mo Adda, Benjamin Aziz:
Automated Detection of Racial Microaggressions using Machine Learning. SSCI 2020: 2477-2484 - [c59]Alaa Mohasseb, Benjamin Aziz, Andreas Kanavos:
SMS Spam Identification and Risk Assessment Evaluations. WEBIST 2020: 417-424 - 2019
- [c58]Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
A Fuzzy Modeling Approach for Group Decision Making in Social Networks. BIS (2) 2019: 74-85 - [c57]Benjamin Aziz, John Arthur Lee, Gulsum Akkuzu:
Evaluating the Quantity of Incident-Related Information in an Open Cyber Security Dataset. BIS (Workshops) 2019: 531-542 - [c56]Alaa Mohasseb, Benjamin Aziz, Jeyong Jung, Julak Lee:
Predicting CyberSecurity Incidents using Machine Learning Algorithms: A Case Study of Korean SMEs. ICISSP 2019: 230-237 - [c55]Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks. ICISSP 2019: 674-684 - [c54]Ali Al-Haj, Benjamin Aziz:
Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security. NetSys 2019: 1-6 - [c53]Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
Advantages of Having Users' Trust and Reputation Values on Data Sharing Process in Online Social Networks. SNAMS 2019: 189-195 - 2018
- [c52]Ali Malik, Benjamin Aziz, Chih-Heng Ke:
THRIFTY: Towards High Reduction In Flow Table memorY. ICCSW 2018: 2:1-2:9 - [c51]Gulsum Akkuzu, Benjamin Aziz:
Data-Driven Chinese Walls. ICCSW 2018: 3:1-3:8 - 2017
- [c50]Ali Malik, Benjamin Aziz, Chih-Heng Ke, Han Liu, Mo Adda:
Virtual topology partitioning towards an efficient failure recovery of software defined networks. ICMLC 2017: 646-651 - [c49]Jean Tajer, Mo Adda, Benjamin Aziz:
New Computing Model for Securing Mobile Agents in IP Networks. IoTBDS 2017: 232-238 - [c48]Paul Fremantle, Benjamin Aziz, Tom Kirkham:
Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper - . IoTBDS 2017: 344-349 - [c47]Ali Malik, Benjamin Aziz, Mohamed Bader-El-Den:
Finding most reliable paths for software defined networks. IWCMC 2017: 1309-1314 - 2016
- [c46]Paul Fremantle, Benjamin Aziz:
OAuthing: Privacy-enhancing federation for the Internet of Things. CIoT 2016: 1-6 - [c45]Richard Dennis, Gareth Owenson, Benjamin Aziz:
A Temporal Blockchain: A Formal Analysis. CTS 2016: 430-437 - [c44]Benjamin Aziz, Mohamed Bader-El-Den, Cerana Hippolyte:
Search-Based SQL Injection Attacks Testing Using Genetic Programming. EuroGP 2016: 183-198 - [c43]Paul Fremantle, Benjamin Aziz:
Privacy-enhancing Federated Middleware for the Internet of Things. Middleware Posters and Demos 2016: 33-34 - [c42]Benjamin Aziz, Ali Malik, Jeyong Jung:
Check Your Blind Spot: A New Cyber-Security Metric for Measuring Incident Response Readiness. RISK 2016: 19-33 - [c41]Benjamin Aziz, Paul Fremantle, Rui Wei, Álvaro Enrique Arenas:
A Utility-Based Reputation Model for the Internet of Things. SEC 2016: 261-275 - 2015
- [c40]Nasser Al-Hadhrami, Benjamin Aziz, Shantanu Sardesai, Lotfi Ben Othmane:
Incremental Development of RBAC-Controlled E-Marking System Using the B Method. ARES 2015: 532-539 - [c39]Álvaro Enrique Arenas, Philippe Massonet, Christophe Ponsard, Benjamin Aziz:
Goal-Oriented Requirement Engineering Support for Business Continuity Planning. ER Workshops 2015: 259-269 - [c38]Paul Fremantle, Jacek Kopecký, Benjamin Aziz:
Web API Management Meets the Internet of Things. SALAD@ESWC 2015: 1-9 - [c37]Paul Fremantle, Jacek Kopecký, Benjamin Aziz:
Web API Management Meets the Internet of Things. ESWC (Satellite Events) 2015: 367-375 - [c36]Tom Kirkham, Arnab Sinha, Nikos Parlavantzas, Bartosz Kryza, Paul Fremantle, Kyriakos Kritikos, Benjamin Aziz:
Privacy Aware on-Demand Resource Provisioning for IoT Data Processing. IoT 360 (2) 2015: 87-95 - 2014
- [c35]Benjamin Aziz:
A Formal Model and Analysis of the MQ Telemetry Transport Protocol. ARES 2014: 59-68 - [c34]Benjamin Aziz, Philippe Massonet, Christophe Ponsard:
A Formal Model for Forensic Storage Media Preparation Tools. SECRYPT 2014: 165-170 - [c33]Paul Fremantle, Benjamin Aziz, Jacek Kopecký, Philip J. Scott:
Federated Identity and Access Management for the Internet of Things. SIoT 2014: 10-17 - [c32]Benjamin Aziz, Clive Blackwell:
Using Security Patterns for Modelling Security Capabilities in Grid Systems. SOSE 2014: 422-427 - 2013
- [c31]Benjamin Aziz, Geoff W. Hamilton:
Reputation-Controlled Business Process Workflows. ARES 2013: 42-51 - [c30]Clive Blackwell, Shareeful Islam, Benjamin Aziz:
Using a Goal-Driven Approach in the Investigation of a Questioned Contract. IFIP Int. Conf. Digital Forensics 2013: 153-167 - [c29]Omed S. Khalind, Benjamin Aziz:
Single-mismatch 2LSB embedding steganography. ISSPIT 2013: 283-286 - [c28]Benjamin Aziz:
On Formalising Policy Refinement in Grid Virtual Organisations. SERA (selected papers) 2013: 17-31 - 2012
- [c27]Benjamin Aziz:
Application of formal analysis to enhancing trust in a complex grid-based operating system. ISARCS 2012: 41-50 - 2011
- [c26]Benjamin Aziz, Alvaro E. Arenas, Michael D. Wilson:
Model-Based Refinement of Security Policies in Collaborative Virtual Organisations. ESSoS 2011: 1-14 - [c25]Alvaro E. Arenas, Benjamin Aziz, Szymon Maj, Brian Matthews:
An Autonomic Security Monitor for Distributed Operating Systems - (Invited Paper). ServiceWave 2011: 112-121 - [c24]Benjamin Aziz, Shirley Y. Crompton, Michael D. Wilson:
A Metadata Model for Data Centric Security. STA 2011: 21-28 - [c23]Benjamin Aziz, Alvaro Arenas, Michael D. Wilson:
SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements. STA 2011: 29-36 - [c22]Benjamin Aziz:
Correcting a Delegation Protocol for Grids. TrustBus 2011: 198-209 - 2010
- [c21]Benjamin Aziz, Alvaro Arenas, Giovanni Cortese, Bruno Crispo, Silvio Causetti:
A Secure and Scalable Grid-Based Content Management System. ARES 2010: 404-409 - [c20]Alvaro E. Arenas, Benjamin Aziz, Juan Bicarregui, Michael D. Wilson:
An Event-B Approach to Data Sharing Agreements. IFM 2010: 28-42 - [c19]Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej Artac, Ales Cernivec, Philip Robinson:
Management of Security Policies in Virtual Organisations. SECRYPT 2010: 467-477 - 2009
- [c18]Federico Stagni, Alvaro Arenas, Benjamin Aziz, Fabio Martinelli:
On Usage Control in Data Grids. IFIPTM 2009: 99-116 - [c17]Benjamin Aziz, Alvaro Arenas, Juan Bicarregui, Christophe Ponsard, Philippe Massonet:
From Goal-Oriented Requirements to Event-B Specifications. NASA Formal Methods 2009: 96-105 - [c16]Benjamin Aziz, Geoff W. Hamilton:
Detecting Man-in-the-Middle Attacks by Precise Timing. SECURWARE 2009: 81-86 - 2008
- [c15]Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews, Erica Y. Yang:
Modelling Security Properties in a Grid-based Operating System with Anti-Goals. ARES 2008: 1429-1436 - [c14]Juan Bicarregui, Alvaro Arenas, Benjamin Aziz, Philippe Massonet, Christophe Ponsard:
Towards Modelling Obligations in Event-B. ABZ 2008: 181-194 - [c13]Álvaro Enrique Arenas, Benjamin Aziz, Gheorghe Cosmin Silaghi:
Reputation Management in Grid-based Virtual Organisations. SECRYPT 2008: 538-545 - [c12]Syed Naqvi, Philippe Massonet, Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Paolo Mori, Lorenzo Blasi, Giovanni Cortese:
Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach. ServiceWave 2008: 242-253 - [c11]Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria Matteucci, Paolo Mori:
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies. TrustBus 2008: 100-117 - 2007
- [c10]Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews:
Managing Conflicts of Interest in Virtual Organisations. STM@ESORICS 2007: 45-56 - 2006
- [c9]Benjamin Aziz:
Measuring the Speed of Information Leakage in Mobile Processes. AMAST 2006: 36-50 - 2005
- [c8]Garret Swart, Benjamin Aziz, Simon N. Foley, John Herbert:
Trading Off Security in a Service Oriented Architecture. DBSec 2005: 295-309 - [c7]Benjamin Aziz, David Gray, Geoff W. Hamilton:
A Static Analysis of PKI-Based Systems. ICTCS 2005: 51-65 - [c6]Benjamin Aziz:
A Semiring-based Quantitative Analysis of Mobile Systems. SVV@ICFEM 2005: 3-21 - 2004
- [c5]Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart:
Configuring Storage Area Networks for Mandatory Security. DBSec 2004: 357-370 - 2003
- [c4]Bruno Blanchet, Benjamin Aziz:
A Calculus for Secure Mobility. ASIAN 2003: 188-204 - [c3]Benjamin Aziz, Geoff W. Hamilton, David Gray:
A Denotational Approach to the Static Analysis of Cryptographic Processes. SVV@ICLP 2003: 19-36 - 2001
- [c2]Benjamin Aziz, Geoff W. Hamilton:
A Denotational Semantics for the Pi-Calculus. IWFM 2001 - 2000
- [c1]Benjamin Aziz, Christian Damsgaard Jensen:
Adaptability in CORBA: The Mobile Proxy Approach. DOA 2000: 295-304
Editorship
- 2003
- [e1]Joseph M. Morris, Benjamin Aziz, Frédéric Oehl:
6th International Workshop on Formal Methods, IWFM 2003, Dublin City University, Ireland, 11 July, 2003. Workshops in Computing, BCS 2003 [contents]
Informal and Other Publications
- 2019
- [i4]Ali Malik, Benjamin Aziz, Mo Adda, Chih-Heng Ke:
Smart Routing: Towards Proactive Fault-Handling in Software-Defined Networks. CoRR abs/1904.00717 (2019) - [i3]Ali Malik, Benjamin Aziz, Ali Al-Haj, Mo Adda:
Software-defined networks: A walkthrough guide from occurrence To data plane fault tolerance. PeerJ Prepr. 7: e27624 (2019) - 2018
- [i2]Benjamin Aziz, Nikolaos Menychtas, Ammar Al-Bazi:
Anomaly analysis on an open DNS dataset. PeerJ Prepr. 6: e27116 (2018) - [i1]Benjamin Aziz, Jeyong Jung:
A false negative study of the steganalysis tool: Stegdetect. PeerJ Prepr. 6: e27339 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint