Benjamin Aziz. Formal Analysis by Abstract Interpretation: Case Studies in Modern Protocols. SpringerBriefs in Applied Sciences and Technology. Springer Nature, January 2022.
Benjamin Aziz, Alvaro Arenas and Bruno Crispo (editors). Engineering Secure Internet of Things Systems. The Institution of Engineering and Technology (The IET), October 2016.
Joseph Morris, Benjamin Aziz, and Frederic Oehl (editors). Proceedings of the 6th International Workshop on Formal Methods. Electronic Workshops in Computing (eWiC), British Computer Society, July 2003.
Benjamin Aziz. A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems. Ph.D. Thesis, Dublin City University, 2003.
Benjamin Aziz. Mobile Proxies. M.Sc. Dissertation, Trinity College Dublin, 1999.
Benjamin Aziz. On the Security of the MQTT Protocol. In Engineering Secure Internet of Things Systems. The Institution of Engineering and Technology (The IET), October 2016.
Benjamin Aziz, Paul Fremantle and Alvaro Arenas. A Reputation Model for the Internet of Things. In Engineering Secure Internet of Things Systems. The Institution of Engineering and Technology (The IET), October 2016.
Alvaro Arenas, Benjamin Aziz, Fabio Martinelli, Marinella Petrocchi and Paolo Mori. Trust Management for Grid Systems. In Trust Modelling and Management in Digital Environments: From Social Concept to System Development, IGI-Global, December 2009.
Benjamin Aziz and Aysha Bukhelli. A Study on Human Perception of Document Paragraph Layout using Surveys. Intelligent Decision Technologies, IOS Press, vol. 18(2):1425-1445, 2024.
Leigh Chase, Alaa Mohasseb and Benjamin Aziz. The LeWiS Method: Target Variable Estimation using Cyber Security Intelligence. SN Computer Science, Springer, vol. 5:445, 2024.
Benjamin Aziz and Alaa Mohasseb. Cyber Incidents Risk Assessments Using Feature Analysis. SN Computer Science, Springer, vol. 5:7, 2023.
Benjamin Aziz. Analysing Potential Data Security Losses in Organisations based on Subsequent Users Logins. PLOS ONE, Public Library of Science, vol. 18(8): e0286856, 2023.
Benjamin Aziz. Detecting Data Anomalies from Their Formal Specifications: A Case Study in IoT Systems. Electronics, MDPI, vol. 12(3): 630, 2023.
Muntadher Sallal, Ruairí de Fréin, Ali Malik and Benjamin Aziz. An Empirical Comparison of the Security and Performance Characteristics of Topology Formation Algorithms for Bitcoin Networks. Array, Elsevier, vol. 15: 100221, 2022.
Gulsum Akkuzu Kaya and Benjamin Aziz. Modelling Shared Co-owned Data Flow in Online Social Networks by Formal Methods. International Journal of Multidisciplinary Studies and Innovative Technologies, DergiPark Akademik, vol. 5(2): 155-166, 2021.
Benjamin Aziz. A Formalisation of Digital Forensic String Search Specifications. Research Briefs on Information & Communication Technology Evolution, vol. 7, article 5: 1-7, 2021.
Benjamin Aziz. A Note on the Problem of Semantic Interpretation Agreement in Steganographic Communications. Journal of Internet Services and Information Security, vol. 11(3): 82-96, 2021.
Benjamin Aziz and Jeyong Jung. A study on securing safety via application of the blind spot metrics for report cases of the police. Korean Journal of Safety Culture, vol. 12: 47-58, 2021.
Benjamin Aziz. A Process Algebraic Mutation Framework with Application to a Vehicle Charging Protocol. Vehicular Communications, Elsevier, vol. 30: 100352, 2021.
Benjamin Aziz, Jeyong Jung, Julak Lee and Yong-tae Chun. A False Negative Study of the Steganalysis Tool Stegdetect. Applied Sciences, MDPI, vol. 10(22): 8188, 2020.
Benjamin Aziz. Modelling and Analysing an Industry 4.0 Communication Protocol. IEEE Internet of Things Journal, IEEE, vol. 7(10): 10120-10127, 2020.
Gulsum Akkuzu, Benjamin Aziz and Mo Adda. Towards Consensus-based Group Decision Making for Co-owned Data Sharing in Online Social Networks. IEEE Access, IEEE, vol. 8: 91311-91325, 2020.
Ali Malik, Ruairí de Fréin and Benjamin Aziz. Rapid Restoration Techniques for Software-Defined Networks. Applied Sciences, MDPI, vol. 10(10): 3411, 2020.
Alaa Mohasseb, Benjamin Aziz, Jeyong Jung and Julak Lee. Cyber Security Incidents Analysis and Classification in a Case Study of Korean Enterprises. Knowledge and Information Systems, Springer, vol. 62(7): 2917–2935, 2020.
Ali Malik, Benjamin Aziz, Mo Adda and Chih-Heng Ke. Smart Routing: Towards Proactive Fault Handling of Software-Defined Networks. Computer Networks, Elsevier, vol. 170: 107104, 2020.
Paul Fremantle and Benjamin Aziz. Deriving Event Data Sharing in IoT Systems using Formal Modelling and Analysis. Internet of Things: Engineering Cyber Physical Human Systems, Elsevier, vol. 8: 100092, 2019.
Paul Fremantle and Benjamin Aziz. Cloud-based Federated Identity for the Internet of Things. Annals of Telecommunications, Springer, vol. 73(7-8): 415-427, 2018.
Benjamin Aziz. Towards a Mutation Analysis of IoT Protocols. Information and Software Technology, Elsevier, vol. 100: 183-184, 2018.
Benjamin Aziz. Towards Open Data-Driven Evaluation of Access Control Policies. Computer Standards and Interfaces, Elsevier, vol. 56: 13–26, 2018.
Jean Tajer, Mo Adda and Benjamin Aziz. Detection of Flooding Attacks on Mobile Agents Using Sketch Technique and Divergence Measures. International Journal of Engineering Sciences and Research Technology, vol. 6(8):112-121, 2017.
Ali Malik, Benjamin Aziz, Mo Adda and Chih-Heng Ke. Optimisation Methods For Fast Restoration of Software-Defined Networks. IEEE Access, IEEE, vol. 5: 16111-16123, 2017.
Jean Tajer, Mo Adda and Benjamin Aziz. Comparison between Divergence Measures for Anomaly Detection of Mobile Agents in IP Networks. International Journal of Wireless & Mobile Networks, AIRCC Publishing Corporation, vol. 9(3), 2017.
Benjamin Aziz. Modelling Fine-Grained Access Control Policies in Grids. Journal of Grid Computing, Springer, vol. 14(3): 477-493, 2016.
Nasser Al-hadhrami, Benjamin Aziz and Lotfi ben Othmane. An Incremental B-Model for RBAC-controlled Electronic Marking System. In International Journal of Secure Software Engineering: Special Issue on Agile Secure Software Development, IGI Global, vol. 7(2): 37-62, 2016.
Benjamin Aziz. A Formal Model and Analysis of an IoT Protocol. Ad Hoc Networks, Elsevier, vol. 36(1): 49–57, 2016.
Carl Adams, Amanda Peart, Penny Ross and Benjamin Aziz. Temporal Stakeholder Analysis of Future Technologies: Exploring the Impact of IoV. Cutter IT Journal, vol. 28(7): 24-29, 2015.
Alberto Gugel, Benjamin Aziz and Geoff Hamilton. Revisiting the BAN-Modified Andrew Secure RPC Protocol. Journal of Internet Services and Information Security, vol. 4(3): 82-96, 2014.
Benjamin Aziz. Modelling and Refinement of Forensic Data Acquisition Specifications. Digital Investigation, Elsevier, vol. 11(2): 90-101, 2014.
Benjamin Aziz and Ioana Sporea. Security and VO Management Capabilities in a Large-Scale Grid Operating System. Computing and Informatics, Slovak Academy of Sciences, vol. 33(2): 303-326, 2014.
Benjamin Aziz and Geoff Hamilton. Enforcing Reputation Constraints on Business Process Workflows. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 5(1):101-121, 2014.
Benjamin Aziz, Clive Blackwell and Shareeful Islam. A Framework for Digital Forensics and Investigations: The Goal-Driven Approach. International Journal of Digital Crime and Forensics, IGI-Global, 5(2):1-22, 2013.
Omed Khalind, Julio Hernandez-Castro and Benjamin Aziz. A Study on the False Positive Ratio of Stegdetect. Digital Investigation, 9(3/4): 235-245, Elsevier, 2013.
Benjamin Aziz. An Algorithm for Trading Grid Resources in a Virtual Marketplace. Scalable Computing: Practice and Experience (Scientific International Journal for Parallel and Distributed Computing), West University of Timisoara, Romania, 13(4): 339-350, 2013.
Benjamin Aziz and Mario Tejedor-Gonzalez. An Android PGP Manager: Towards Bridging End-User Cryptography to Smart Phones. International Journal of Security, Computer Science Journals, 6(4):45-57, 2012.
Ioana Sporea, Benjamin Aziz and Zak McIntyre. On the Availability of Anti-Forensic Tools for Smartphones. International Journal of Security, Computer Science Journals, 6(4): 58-64, 2012.
Benjamin Aziz and Geoff Hamilton. Verifying a Delegation Protocol for Grid Systems. Future Generation Computer Systems: The International Journal of Grid Computing and eScience, Elsevier, 27(5): 476–485, 2011.
Alvaro Arenas, Benjamin Aziz and Gheorghe Silaghi. Reputation Management in Collaborative Computing Systems. Journal of Security and Communication Networks, 3(6): 546–564, John Wiley and Sons, 2009.
Benjamin Aziz, Simon Foley, John Herbert and Garret Swart. Configuring Storage Area Networks Using Mandatory Security. Journal of Computer Security, 17(2):191-210, IOS Press, 2009.
Benjamin Aziz and Geoff Hamilton. Modelling and Analysis of PKI-based Systems Using Process Calculi. International Journal of Foundations of Computer Science, 18(3):593-618, World Scientific, 2007.
Benjamin Aziz, Simon Foley, John Herbert and Garret Swart. Reconfiguring Role Based Access Control Policies Using Risk Semantics. Journal of High Speed Networks: Special Issue on Managing Security Policies, Modelling Verification and Configuration, 15(3):261-273, IOS Press, 2006.
Benjamin Aziz, Geoff Hamilton and David Gray. A Static Analysis of Cryptographic Processes: The Denotational Approach. Journal of Logic and Algebraic Programming, 64(2):285-320, Elsevier, 2005.
Benjamin Aziz, Gareth Hewlett, Ukamaka Oragwu, Peter Richards, Safa Tharib and Erica Yang. Requirements Cube: Towards a Matrix-based Model of Requirements. In Proceedings of the 20th International Conference on Software Technologies (ICSOFT 2025), SciTePress Digital Library, Bilbao, Spain, June 2025 (to appear).
Benjamin Aziz, Ukamaka Oragwu and Safa Tharib. A Deontic Logic Model of Attribute-based Information Flows in Database-Defined Networks with Application to Healthcare Monitoring. In Proceedings of the 11th International Conference on Information Systems Security and Privacy (ICISSP 2025), pages 330-341, SciTePress Digital Library, Porto, Portugal, February 2025.
Benjamin Aziz, Estabraq Makiyah and Aysha Bukhelli. An Extended Method for Transmitting Secret Messages in Textual Documents based on Paragraph Resizing. In Proceedings of the 21st International Conference on Security and Cryptography (Secrypt 2024), pages 389-396, SciTePress Digital Library, Dijon, France, July 2024.
Benjamin Aziz, Alaa Mohasseb and Jeyong Jung. A Prediction Analysis for the Case of a Korean Police Dataset. In Proceedings of the 20th International Conference on Artificial Intelligence Applications and Innovations (AIAI 2024), vol. 712, pages 145-157, Springer IFIP AICT Series, Corfu, Greece, June 2024.
Benjamin Aziz and Aysha Bukhelli. Detecting the Manipulation of Text Structure in Text Steganography using Machine Learning. In Proceedings of the 19th International Conference on Web Information Systems and Technologies (WEBIST 2023), pages 557-565, SciTePress Digital Library, Rome, Italy, November 2023.
Benjamin Aziz and Aysha Bukhelli. A Study on Human Perception of Document Paragraph Layout. In Proceedings of the 14th International Conference on on Information, Intelligence, Systems and Applications (IISA 2023), pages 1-8, IEEE Xplore, Volos, Greece, July 2023.
Leigh Chase, Alaa Mohasseb and Benjamin Aziz. Epistemology for Cyber Security: A Controlled Natural Language Approach. In Proceedings of the 6th International Conference on Information and Knowledge Systems (ICIKS 2023), LNBIP 486: 267-282, Springer, Portsmouth, UK, June 2023.
Benjamin Aziz and Alaa Mohasseb. Using Feature Analysis to Guide Risk Calculations of Cyber Incidents. In Proceedings of the 18th International Conference on Web Information Systems and Technologies (WEBIST 2022), pages 190-195, SciTePress Digital Library, Valletta, Malta, November 2022.
Benjamin Aziz, Aysha Bukhelli, Rinat Khusainov and Alaa Mohasseb. A Novel Method for Embedding and Extracting Secret Messages in Textual Documents based on Paragraph Resizing. In Proceedings of the 19th International Conference on Security and Cryptography (Secrypt 2022), pages 714-719, SciTePress Digital Library, Lisbon, Portugal, July 2022.
Leigh Chase, Alaa Mohasseb and Benjamin Aziz. The LeWiS Method: Target Variable Estimation using Cyber Security Intelligence. In Proceedings of the 17th International Conference on Web Information Systems and Technologies (WEBIST 2021), pages 15-26, SciTePress Digital Library, Online Streaming, October 2021.
Alaa Mohasseb, Benjamin Aziz and Andreas Kanavos. SMS Spam Identification and Risk Assessment Evaluations. In Proceedings of the 16th International Conference on Web Information Systems and Technologies (WEBIST 2020), pages 417-424, SciTePress Digital Library, Online Streaming, November 2020.
Gulsum Akkuzu, Benjamin Aziz and Mo Adda. Towards secure data sharing processes in online social networks: TRUSTY. In Proceedings of the 15th International Conference on Software Technologies (ICSOFT2020), pages 418-425, SciTePress Digital Library, Online Streaming, July 2020.
Gulsum Akkuzu, Benjamin Aziz and Mo Adda. Application of extended IOWA operator for making group decision on co-owned contents in Online Social Networks (OSNs). In Proceedings of the 10th IEEE International Conference on Intelligent Systems (IS'20), IEEE, Varna, Bulgaria, June 2020.
Gulsum Akkuzu, Benjamin Aziz and Mo Adda. Advantages of Having Users' Trust and Reputation Values on Data Sharing Process in Online Social Networks. In Proceedings of the 6th IEEE International Conference on Social Networks Analysis, Management and Security (SNAMS-2019), pages 189-195, IEEE, Granada, Spain, October 2019.
Gulsum Akkuzu, Benjamin Aziz and Mo Adda. A Fuzzy Modeling Approach for Group Decision Making in Social Networks. In Proceedings of the 22nd International Conference on Business Information Systems (BIS2019), LNBIP 354: 74-85, Springer, Seville, Spain, June 2019.
Alaa Mohasseb, Benjamin Aziz, Jeyong Jung and Julak Lee. Predicting Cyber Security Incidents Using Machine Learning Algorithms: A Case Study of Korean SMEs. In Proceedings of the 5th International Conference on Information Systems Security and Privacy (ICISSP 2019), pages 230-237, INSTICC, Prague, Czech Republic, February 2019.
Gulsum Akkuzu, Benjamin Aziz and Han Liu. Feature Analysis on the Containment Time for Cybersecurity Incidents. In Proceedings of the 2018 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR), pages 262-269, IEEE, Chengdu, China, July 2018.
Ali Malik, Benjamin Aziz and Mo Adda. Towards Filling The Gap of Routing Changes in Software-Defined Networks. In Proceedings of the Future Technologies Conference 2018 (FTC 2018), AISC 881: 682-693, Springer, Vancouver, BC, Canada, November 2018.
Ali Malik, Benjamin Aziz, Chih-Heng Ke, Han Liu and Mo Adda. Virtual Topology Partitioning Towards An Efficient Failure Recovery of Software Defined Networks. In Proceedings of the 16th International Conference on Machine Learning and Cybernetics (ICMLC), pages 646-651, IEEE, Ningbo, China, July 2017.
Jean Tajer, Mo Adda and Benjamin Aziz. Flooding Attacks Detection of Mobile Agents in IP Networks. Fourth International Conference on Computer Networks & Communications (CCNET-2017), pages 1-12, AIRCC Publishing Corporation, Dubai, UAE, April 2017.
Ali Malik, Benjamin Aziz and Mohamed Bader-El-Den. Finding Most Reliable Paths For Software Defined Networks. In Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (IWCMC 2017), pages 1309-1314, IEEE, Valencia, Spain, June 2017.
Paul Fremantle, Benjamin Aziz and Tom Kirkham. Enhancing IoT Security and Privacy with Distributed Ledgers - a Position Paper. In Proceedings of the 2nd International Conference of Internet of Things, Big Data and Security, Porto, Portugal, pages 344-349, SciTePress Digital Library, April 2017.
Jean Tajer, Mo Adda and Benjamin Aziz. New Computing Model for Securing Mobile Agents in IP Networks. In Proceedings of the 2nd International Conference of Internet of Things, Big Data and Security (IoTBDS 2017), Porto, Portugal, pages 232-238, SciTePress Digital Library, April 2017.
Paul Fremantle and Benjamin Aziz. OAuthing: Privacy-enhancing Federation for the Internet of Things. In Proceedings of the 2nd International Conference on Cloudification of the Internet of Things, Paris, France, IEEE, pages 17-22, November 2016.
Benjamin Aziz, Paul Fremantle, Rui Wei and Alvaro Arenas. A Utility-based Reputation Model for the Internet of Things. In Proceedings of the 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2016), Ghent, Belgium, vol. 471, pages 261-275, May 2016.
Benjamin Aziz, Mohamed Bader and Cerana Hippolyte. Search-based SQL Injection Attacks Testing using Genetic Programming. In Proceedings of the 19th European Conference on Genetic Programming (EuroGP 2016), Porto, Portugal, LNCS 9594:183 -198, Springer, March 2016.
Tom Kirkham, Arnab Sinha, Nikos Parlavantzas, Bartosz Kryza, Paul Fremantle, Kyriakos Kritikos and Benjamin Aziz. Privacy Aware on-Demand Resource Provisioning for IoT Data Processing. In Proceedings of the 2nd EAI International Conference on IoT as a Service (IoTaaS 2015), Rome, Italy, LNICST 170: 87-95, Springer, October 2015.
Omed Khalind and Benjamin Aziz. A Better Detection of 2LSB Steganography via Standard Deviation of the Extended Pairs of Values. In Proceedings of the 2015 SPIE Conference on Mobile Multimedia/Image Processing, Security and Applications, volume 9497, Baltimore, USA, April 2015 (won best paper award).
Omed Khalind and Benjamin Aziz. LSB Steganography with Improved Embedding Efficiency and Undetectability. In Proceedings of the 4th International Conference on Signal & Image Processing (SIP 2015), Zurich, Switzerland, AIRCC CSCP, January 2015.
Benjamin Aziz. A Formal Model and Analysis of the MQ Telemetry Transport Protocol. In Proceedings of the 9th International Conference on Availability, Reliability and Security (ARES 2014), Fribourg, Switzerland, IEEE, September 2014.
Omed Khalind and Benjamin Aziz. Detecting 2LSB Steganography Using Extended Pairs of Values Analysis. In Proceedings of the 2014 SPIE Conference on Mobile Multimedia/Image Processing, Security and Applications, volume 9120, Baltimore, USA, May 2014.
Benjamin Aziz and Geoff Hamilton. Reputation-Controlled Business Process Workflows. In Proceedings of the 8th International Conference on Availability, Reliability and Security (ARES 2013), Regensburg, Germany, pages 42-51, IEEE, September 2013.
Benjamin Aziz. On Formalising Policy Refinement in Grid Virtual Organisations. In Proceedings of the 11th International Conference on Software Engineering Research, Management and Applications (SERA 2013), Prague, Czech Republic, Studies in Computational Intelligence, 496:17-31, Springer, August 2013.
Clive Blackwell, Shareeful Islam and Benjamin Aziz. Implementation of Digital Forensics Investigations Using a Goal-Driven Approach for a Questioned Contract. In Proceedings of the 9th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, USA, IFIP Advances in Information and Communication Technology 410: 153-167, Springer, January 2013.
Benjamin Aziz. Towards Goal-Driven Digital Forensics Investigations. In Proceedings of the 2nd International Conference on Cybercrime, Security and Digital Forensics (Cyfor-12), London, UK, May 2012.
Alvaro Arenas, Benjamin Aziz, Szymon Maj and Brian Matthews. An Autonomic Security Monitor for Distributed Operating Systems (Invited Paper). In Proceedings of the 4th European Conference ServiceWave 2011, Poznan, Poland, LNCS 6994: 112-121, Springer, October 2011.
Benjamin Aziz. Correcting a Delegation Protocol for Grids. In Proceedings of the 8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2011), Toulouse, France, LNCS 6863: 198-209, Springer, August 2011.
Benjamin Aziz, Shirley Crompton and Michael Wilson. A Metadata Model for Data Centric Security. In Proceedings of the 8th FTRA International Conference on Secure and Trust Computing, Data Management, and Applications (STA 2011), Crete, Greece, CCIS 186: 21-28, Springer, June 2011.
Benjamin Aziz, Alvaro Arenas and Michael Wilson. SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements. In Proceedings of the 8th FTRA International Conference on Secure and Trust Computing, Data Management, and Applications (STA 2011), Crete, Greece, CCIS 186: 29-36, Springer, June 2011.
Alvaro E. Arenas, Benjamin Aziz, Juan Bicarregui and Michael D. Wilson. An Event-B Approach to Data Sharing Agreements. In Proceedings of the 8th International Conference on Integrated Formal Methods (iFM 2010), Nancy, France, LNCS 6396: 28-42, Springer, October 2010.
Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej Artac, Ales Cernivec and Philip Robinson. Management of Security Policies in Virtual Organisations. In Proceedings of the 2010 International Conference on Security and Cryptography (Secrypt 2010), Athens, Greece, July 2010.
Benjamin Aziz, Alvaro Arenas, Shirley Crompton and Brian Matthews. From Community to Resource Policies: A Tool for the Automatic Refinement of VO Policies. In Proceedings of the 2009 UK e-Science All Hands Meeting, Oxford, UK, December 2009.
Benjamin Aziz and Geoff Hamilton. Detecting Man-in-the-Middle Attacks by Precise Timing. In Proceedings of The Third International Conference on Emerging Security Information, Systems and Technologies (Securware 2009), Athens, Greece, 81-86, IEEE Computer Society, June 2009 (won best paper award).
Federico Stagni, Alvaro Arenas, Benjamin Aziz and Fabio Martinelli. On Usage Control in Data Grids. In Proceedings of the 3rd IFIP International Conference on Trust Management (TM'09), Purdue University, West Lafayette, USA, IFIP Advances in Information and Communication Technology, vol. 300/2009, 99-116, June 2009.
Syed Naqvi, Philippe Massonet, Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Paolo Mori, Lorenzo Blasi and Giovanni Cortese. Fine-grained continuous usage control of service based Grids the GridTrust Approach. In Proceedings of ServiceWave 2008, Madrid, Spain, December 2008.
Alvaro Arenas, Benjamin Aziz, Philippe Massonet and Christophe Ponsard. A Goal-Oriented Approach to Grid Security Requirements. In Proceedings of the 2008 UK e-Science All Hands Meeting, Edinburgh, UK, September 2008.
Michael D. Wilson, Alvaro Arenas, Brian M. Matthews, Shirley Crompton and Benjamin Aziz. Security Policies in Scientific Data Sharing Agreements. In Proceedings of the 2008 UK e-Science All Hands Meeting, Edinburgh, UK, September 2008.
Lorenzo Blasi, Alvaro Arenas, Benjamin Aziz, Paolo Mori, Umberto Rovati, Bruno Crispo, Fabio Martinelli and Philippe Massonet. A Secure Environment for Grid-Based Supply Chains. In Proceedings of the eChallenges e-2008 Conference, Stockholm, Sweden, October 2008.
Alvaro Arenas, Benjamin Aziz and Gheorghe Cosmin Silaghi. Reputation Management in Grid-based Virtual Organisations. In Proceedings of the 3rd International Conference on Security and Cryptography (Secrypt 2008), Porto, Portugal, INSTICC, July 2008.
Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria Matteucci and Paolo Mori. Controlling Usage of Business Processes through Fine-Grained Security Policies. In Proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2008), Turin, Italy, LNCS 5185:100-117, Springer, September 2008.
Juan Bicarregui, Alvaro Arenas, Benjamin Aziz, Philippe Massonet and Christophe Ponsard. Towards Modelling Obligations in Event-B. In Proceedings of the ABZ 2008 Conference, London, UK, LNCS 5238:181-194, Springer, September 2008.
Benjamin Aziz. Measuring the Speed of Information Leakage in Mobile Processes. In Proceedings of the 11th International Conference on Algebraic Methodology and Software Technology (AMAST'06), Kuressaare, Estonia, LNCS 4019:36-50, Springer, July 2006.
Benjamin Aziz, David Gray and Geoff Hamilton. A Static Analysis of PKI-based Systems. In Proceedings of the 9th Italian Conference on Theoretical Computer Science (ICTCS'05), Certosa di Pontignano (Siena), Italy, LNCS 3701:51-65, Springer, October 2005.
Garret Swart, Benjamin Aziz, Simon Foley and John Herbert. Trading Off Security in a Service Oriented Architecture. In Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, LNCS 3654:295-309, Springer-Verlag, August 2005.
Garret Swart, Benjamin Aziz, Simon Foley and John Herbert. Automatic Configuration of Services for Security, Bandwidth, Throughput and Availability. In Forum proceedings of the 2nd International Conference on Service Oriented Computing (IC-SOC'04), New York, USA, IBM Technical Report RA221, November 2004.
Benjamin Aziz, Simon N. Foley, John Herbert and Garret Swart. Configuring Storage-Area Networks for Mandatory Security. In Proceedings of the 18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sitges, Spain, 144:357-370, Kluwer, July 2004.
Bruno Blanchet and Benjamin Aziz. A Calculus for Secure Mobility. In Proceedings of the 8th Asian Computing Science Conference (Asian'03), Mumbai, India, LNCS 2896:188-204, Springer-Verlag, December 2003.
Benjamin Aziz, David Gray, Geoff Hamilton, Frederic Oehl, James Power, and David Sinclair. Implementing Protocol Verification for E-Commerce. In Proceedings of the 2001 International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet (SSGRR'01), L’Aquila, Italy, August 2001.
Geoff Hamilton and Benjamin Aziz. Excommunication: Transforming π-Calculus Specifications to Remove Internal Communication. In Proceedings of the 25th Brazilian Symposium on Formal Methods (SBMF 2022), pages 109-123, Online, LNCS, December 2022.
Omar Ali, Nancy Scheidt, Alexander Gegov, Ella Haig, Mo Adda and Benjamin Aziz. Automated Detection of Microaggression using Machine Learning. In Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence (SSCI 2020), pages 2477-2484, Online, December 2020.
Richard Dennis, Gareth Owenson and Benjamin Aziz. A Temporal Blockchain: A Formal Analysis. In Proceedings of the 6th International Symposium on Security in Collaboration Technologies and Systems. Orlando, USA, 430-437, IEEE, November 2016.
Omed Khalind and Benjamin Aziz. Single-Mismatch 2LSB Embedding Method of Steganography. In Proceedings of the IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2013), Athens, Greece, 283 - 286, IEEE, December 2013.
Benjamin Aziz. Application of Formal Analysis to Enhancing Trust in a Complex Grid-based Operating System. In Proceedings of the 3rd International ACM SIGSOFT Symposium on Architecting Critical Systems (ISARCS 2012), Bertinoro, Italy, 41-50, ACM, June 2012.
Benjamin Aziz, Alvaro E. Arenas and Michael Wilson. Model-based Refinement of Security Policies in Collaborative Virtual Organisations. In Proceedings of the 3rd International Symposium on Engineering Secure Software and Systems (ESSOS’11), Madrid, Spain, LNCS 6542: 1-14, Springer, February 2011.
Benjamin Aziz, Alvaro Arenas, Juan Bicarregui, Christophe Ponsard and Philippe Massonet. From Goal-Oriented Requirements to Event-B Specifications. In Proceedings of the First NASA Formal Methods Symposium, California, USA, 96-105, NASA, April 2009.
Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews and Erica Yang. Modelling Security Properties in a Goal-based Operating System with Anti-Goals. In Proceedings of the Symposium on Requirements Engineering for Information Security (SRIES 2008), Barcelona, Spain, 1429-1436, IEEE Computer Society, March 2008.
Benjamin Aziz and Christian Jensen. Adaptability in CORBA: The Mobile Proxy Approach. In Proceedings of the 2nd International Symposium on Distributed Objects and Applications (DOA'00), Antwerp, Belgium, 295-304, IEEE Press, September 2000.
Benjamin Aziz, John Arthur Lee and Gulsum Akkuzu. Evaluating the Quantity of Incident-Related Information in an Open Cyber Security Dataset. In Proceedings of the 2nd Workshop on Quality of Open Data (QOD 2019), Seville, Spain, LNBIP 373: 531-542, Springer, June 2019.
Ali Al-Haj and Benjamin Aziz. Enforcing Multilevel Security Policies in Database-Defined Networks. In Proceedings of the 3rd Workshop on Software-Defined Networking and Network Function Virtualization for Flexible Network Management (SDNFlex 2019), pages 191-196, IEEE, Garching b. München, Germany, March 2019.
Gulsum Akkuzu, Benjamin Aziz and Mo Adda. Fuzzy Logic Decision Based Collaborative Privacy Management Framework for Online Social Networks. In Proceedings of 3rd International Workshop on FORmal methods for Security Engineering (ForSE 2019), pages 674-684, INSTICC, Prague, Czech Republic, February 2019.
Gulsum Akkuzu and Benjamin Aziz. Data-Driven Chinese Walls. In Proceedings of the 2018 Imperial College Computing Student Workshop, London, UK, OpenAccess Series in Informatics (OASICS) vol. 66, 3:1-3:8, Schloss Dagstuhl, September 2018.
Ali Malik, Benjamin Aziz and Chih-Heng Ke. THRIFTY: Towards High Reduction In Flow Table memorY. In Proceedings of the 2018 Imperial College Computing Student Workshop, London, UK, OpenAccess Series in Informatics (OASICS) vol. 66, 2:1-2:9, Schloss Dagstuhl, September 2018.
Benjamin Aziz, Ali Malik and Jeyong Jung. Check Your Blind Spots: A New Cyber-Security Metric for Measuring Incident Response Readiness. In Proceedings of the 4th International Workshop on Risk Assessment and Risk-driven Quality Assurance (RISK 2016), Graz, Austria, LNCS 10224: 19-33, Springer, October 2016.
Alvaro Arenas, Benjamin Aziz, Philippe Massonet and Christophe Ponsard. Goal-Oriented Requirement Engineering Support for Business Continuity Planning. In Proceedings of the 2nd International Workshop on Conceptual Modeling in Requirements Engineering and Business Analysis (MReBA'15), Stockholm, Sweden, LNCS 9382: 259-269, Springer, December 2015.
Nasser Al-Hadhrami, Benjamin Aziz, Shantanu Sardesai and Lotfi ben Othmane. Incremental Development of RBAC-controlled e-Marking System Using the B Method. In Proceedings of the 1st International Workshop on Agile Secure Software Development, Toulouse, France, 532-539, IEEE, August 2015.
Paul Fremantle, Jacek Kopecky, Benjamin Aziz. Web API Management Meets the Internet of Things. In Proceedings of the 2015 Services and Applications over Linked APIs and Data Workshop (SALAD2015), Portoroz, Slovenia, CEUR Workshop Proceedings, vol. 1359, 1-9, June 2015.
Paul Fremantle, Benjamin Aziz, Jacek Kopecky and Philip Scott. Federated Identity and Access Management for the Internet of Things. In Proceedings of the 2014 International Workshop on Secure Internet of Things (SIoT 2014), Wroclaw, Poland, 10-17, IEEE, September 2014.
Benjamin Aziz and Clive Blackwell. Using Security Patterns for Modelling Security Capabilities in a Grid OS. In Proceedings of the 3rd International Workshop on Cyberpatterns: From Big Data to Reusable Knowledge, Attack and Forensic Patterns part of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE), Oxford, UK, 422-427, IEEE April 2014.
Benjamin Aziz and Clive Blackwell. Use of KAOS in Operational Digital Forensic Investigations. In Proceedings of the 2nd International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns, Abingdon, UK, July 2013.
Benjamin Aziz, Alvaro Arenas, Giovanni Cortese, Bruno Crispo and Silvio Causetti. A Secure and Scalable Grid-based Content Management System. In Proceedings of the 5th International Workshop on Frontiers in Availability, Reliability and Security (FARES 2010), Krakow, Poland, 404-409, IEEE Computer Society, February 2010.
Shirley Crompton, Benjamin Aziz and Michael Wilson. Sharing Scientific Data: Scenarios and Challenges. In Proceedings of the W3C Workshop on Access Control Application Scenarios, Luxembourg, November 2009.
Alvaro Arenas, Benjamin Aziz and Juan Bicarregui. Policy Refinement in Virtual Organisations. In Proceedings of the 2008 Formal Aspects of Virtual Organisations Workshop (FAVO2008), Turku, Finland, May 2008.
Benjamin Aziz, Alvaro Arenas, Juan Bicarregui, Brian Matthews and Erica Yang. A Formal Security Requirements Model for a Grid-based Operating System. In Proceedings of the BCS-FACS 2007 Christmas Workshop: Formal Methods in Industry, London, UK, Electronic Workshops in Computing (eWiC), BCS, December 2007.
Alvaro Arenas, Benjamin Aziz, Juan Bicarregui and Brian Matthews. Managing Conflicts of Interest in Virtual Organisations. In Proceedings of the 3rd International Workshop on Security and Trust Management (STM'07), Dresden, Germany, ENTCS 197(2):45-56, Elsevier, September 2007.
Benjamin Aziz. A Semiring-based Quantitative Analysis of Mobile Systems. In Proceedings of the 3th International Workshop on Software Verification and Validation (SVV'05), Manchester, UK, ENTCS 157(1):3-21, Elsevier, May 2006.
Benjamin Aziz, Geoff Hamilton and David Gray. A Denotational Approach to the Static Analysis of Cryptographic Processes. In Proceedings of the International Workshop on Software Verification and Validation (SVV'03), Mumbai, India, ENTCS 118:19-36, Elsevier, December 2005.
David Gray, Benjamin Aziz and Geoff Hamilton. SPIKY: A Nominal Calculus for Modelling Protocols that use PKIs. In Proceedings of the International Workshop on Security Analysis of Systems: Formalism and Tools (SASYFT'04), Orleans, France, Technical Report RR-2004-11, Laboratoire d'Informatique Fondamentale d'Orleans, June 2004.
Benjamin Aziz and Geoff Hamilton. A Privacy Analysis for the Pi-calculus: The Denotational Approach. In Proceedings of the 2nd Workshop on the Specification, Analysis and Validation for Emerging Technologies (SAVE'02), Copenhagen, Denmark, July 2002.
Benjamin Aziz and Geoff Hamilton. A Denotational Semantics for the Pi-Calculus. In Proceedings of the 5th Irish Workshop in Formal Methods (IWFM'01), Trinity College, Dublin, Ireland, Electronic Workshops in Computing (eWiC), BCS, July 2001.
Benjamin Aziz, Philippe Massonet and Christophe Ponsard. A Formal Model for Forensic Storage Media Preparation Tools. A poster presented to the 11th International Conference on Security and Cryptography, Vienna, Austria, August 2014.
Adam Barker, Benjamin Aziz, Alvaro Arenas, Ian Johnson, Brian Matthews and Erica Y. Yang. Trust Management of Dynamic Virtual Organisations in XtreemOS, A poster presented to the UK e-Science 2009 All Hands Meeting, December 2009.
Paul Fremantle and Benjamin Aziz. Privacy-enhancing Federated Middleware for the Internet of Things. In the 17th International ACM/IFIP/USENIX Middleware Conference (Middleware 2016), Trento, Italy, December 2016.
Benjamin Aziz, Alvaro Arenas, Ian Johnson, Erica Yang, Matej Artac, Ales Cernivec, Philip Robinson and Yvon Jegou. Trust Management in the XtreemOS Operating System. XtreemOS Technical Report 5, 2010.
Federico Stagni, Alvaro Arenas and Benjamin Aziz. On Usage Control in Data Grids. CoreGrid Technical report TR-0154, STFC RAL, Oxfordshire, UK, 2008.
Benjamin Aziz. A Static Analysis of the Applied Pi-Calculus. Technical report 2006/15, Imperial College London, London, UK, 2006.
Benjamin Aziz and Geoff Hamilton. Modelling and Analysis of PKI-based Systems using Process Calculi. Technical report 2006/14, Imperial College London, London, UK, 2006.
Benjamin Aziz and Christian Jensen. Adaptability in CORBA: The Mobile Proxy Approach. Technical report TCD-CS-2000-57, Trinity College, Dublin, Ireland, December 2000.
Benjamin Aziz. Mobile Proxies. Technical report TCD-CS-1999-60, Trinity College, Dublin, Ireland, December 1999.
D1.1: Use cases Description. Eureka Celtic Next/Innovate UK project “ADA-UK: Remote Healthcare Monitoring powered by Network Intelligence and Automation”, 2024.
D10.1 – Models of Currency and Smart Contracts that can be Enabled by Blockchains. Innovate UK project “Energy Autonomous Community (Isle of Wight)”, 2019.
Methodology and Design Alternatives for Federation and Interoperability. EU FP6 Project XtreemOS Deliverable D3.5.15, 2010.
Methodology and Design Alternatives for Trust Services in XtreemOS. EU FP6 Project XtreemOS Deliverable D3.5.9, 2010.
Fourth Specification of the Security and VO Management Services. EU FP6 Project XtreemOS Deliverable D3.5.13, 2009.
Evaluation Report. EU FP6 Project GridTrust Deliverable D5.3, 2009.
VO Management System. EU FP6 Project GridTrust Deliverable D4.3, 2009.
A Framework for Reasoning about Trust and Security in Grids at Requirement and Application Levels. EU FP6 Project GridTrust Deliverable D4.1, 2009.
Methodologies and tools for data sharing agreement infrastructure. EU FP7 Consequence Deliverable D2.1, 2008.
Models and Framework for Metadata Generation and Policy Infrastructure. EU FP7 Consequence Deliverable D3.1, 2008.
Requirements Specification for the Sharing Sensitive Scientific Data Test Bed. EU FP7 Consequence Deliverable D6.1, 2008.
Integration of TSP Policies in the UCON Model and Integration of the UCON Model with the VO Model. EU FP6 GridTrust Deliverable D3.3, 2008.
Reasoning about Trust and Security Properties in Dynamic Virtual Organisations: State of the Art. EU FP6 Project GridTrust Deliverable D2.1, 2007.
Reasoning about Trust and Security Properties in Virtual Organisations. EU FP6 Project GridTrust Deliverable D2.2, 2007.
Report on Formal Analysis of Security Properties. EU FP6 project XtreemOS Deliverable D3.5.6, 2007.
Benjamin Aziz. Use of E-Learning and Web Technologies in Enhancing the Curriculum of a New Computer Security Unit. In BNU Computing Letters (p. 3). Buckinghamshire New University, April 2025.
Benjamin Aziz. On the Sequential Composition of the Moore-Penrose Matrix Inverse. In BNU Computing Letters (p. 0). Buckinghamshire New University, November 2023.
Ali Malik, Benjamin Aziz, Ali Al-Haj and Mo Adda. Software-defined networks: A walkthrough guide from occurrence To data plane fault tolerance. PeerJ PrePrints, volume 7, April 2019.
Benjamin Aziz and Jeyong Jung. A false negative study of the steganalysis tool: Stegdetect. PeerJ PrePrints, volume 6, November 2018.
Benjamin Aziz, Nikolaos Menychtas and Ammar Al-Bazi. Anomaly analysis on an open DNS dataset. PeerJ PrePrints, volume 6, August 2018.
‘Mean blind spot’ leaves organisations vulnerable to cyber attack. In Phys.org, March 22, 2017 (https://phys.org/news/2017-03-organisations-vulnerable-cyber.html)