Ben Soh
Cited by
Cited by
Cloud computing security: from single to multi-clouds
MA AlZain, E Pardede, B Soh, JA Thom
2012 45th Hawaii International Conference on System Sciences, 5490-5499, 2012
Mcdb: using multi-clouds to ensure security in cloud computing
MA AlZain, B Soh, E Pardede
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
TCP New Vegas: improving the performance of TCP Vegas over high latency links
J Sing, B Soh
Fourth IEEE International Symposium on Network Computing and Applications, 73-82, 2005
A new approach using redundancy technique to improve security in cloud computing
MA AlZain, B Soh, E Pardede
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds.
MA AlZain, B Soh, E Pardede
J. Softw. 8 (5), 1068-1078, 2013
Challenges and Solutions for Applications and Technologies in the Internet of Things
S Albishi, B Soh, A Ullah, F Algarni
Procedia Computer Science 124, 608-614, 2017
A new model to ensure security in cloud computing services
MA AlZain, B Soh, E Pardede
Journal of Service Science Research 4 (1), 49-70, 2012
A smart approach towards a mobile e-health monitoring system architecture
A Alahmadi, B Soh
2011 International Conference on Research and Innovation in Information …, 2011
A comparative study of different sensors for smart car park management
R Kumar, NK Chilamkurti, B Soh
the 2007 International Conference on Intelligent Pervasive Computing (IPC …, 2007
Multi-cloud data management using Shamir's secret sharing and quantum byzantine agreement schemes
MA AlZain, AS Li, B Soh, E Pardede
Web-Based Services: Concepts, Methodologies, Tools, and Applications, 1205-1222, 2016
A novel approach toward integration of rules into business processes using an agent-oriented framework
S Ali, B Soh, T Torabi
IEEE Transactions on Industrial Informatics 2 (3), 145-154, 2006
A byzantine fault tolerance model for a multi-cloud computing
MA AlZain, B Soh, E Pardede
2013 IEEE 16Th International Conference On Computational Science And …, 2013
Setting optimal intrusion-detection thresholds
BC Soh, TS Dillon
Computers & Security 14 (7), 621-631, 1995
Block-Based Optical Color Image Encryption Based on Double Random Phase Encoding
OS Faragallah, MA Alzain, HS El-Sayed, JF Al-Amri, W El-Shafai, A Afifi, ...
IEEE Access 7, 4184-4194, 2019
A critical analysis of multilayer IP security protocol
J Sing, B Soh
Third International Conference on Information Technology and Applications …, 2005
Authenticating mobile agent platforms using signature chaining without trusted third parties
A Saxena, B Soh
2005 IEEE International Conference on e-Technology, e-Commerce and e-Service …, 2005
Investigation of chaotic image encryption in spatial and FrFT domains for cybersecurity applications
OS Faragallah, A Afifi, W El-Shafai, HS El-Sayed, EA Naeem, MA Alzain, ...
IEEE Access 8, 42491-42503, 2020
A novel design framework for business process modelling in automotive industry
Z Dubani, B Soh, C Seeling
2010 Fifth IEEE International Symposium on Electronic Design, Test …, 2010
Personalized Web search results with profile comparisons
J Lai, B Soh
Third International Conference on Information Technology and Applications …, 2005
A novel method for authenticating mobile agents with one-way signature chaining
A Saxena, B Soh
Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005., 187-193, 2005
The system can't perform the operation now. Try again later.
Articles 1–20