Benjamin Aziz

1.1k total citations
81 papers, 555 citations indexed

About

Benjamin Aziz is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Benjamin Aziz has authored 81 papers receiving a total of 555 indexed citations (citations by other indexed papers that have themselves been cited), including 42 papers in Computer Networks and Communications, 35 papers in Artificial Intelligence and 34 papers in Information Systems. Recurrent topics in Benjamin Aziz's work include Access Control and Trust (18 papers), Distributed systems and fault tolerance (13 papers) and Advanced Malware Detection Techniques (13 papers). Benjamin Aziz is often cited by papers focused on Access Control and Trust (18 papers), Distributed systems and fault tolerance (13 papers) and Advanced Malware Detection Techniques (13 papers). Benjamin Aziz collaborates with scholars based in United Kingdom, Ireland and United States. Benjamin Aziz's co-authors include Paul Fremantle, Ali Malik, Mo Adda, Philip Scott, Jacek Kopecký, Álvaro Arenas, Chih‐Heng Ke, Gheorghe Cosmin Silaghi, Ruairí de Fréin and Simon N. Foley and has published in prestigious journals such as PLoS ONE, IEEE Access and IEEE Internet of Things Journal.

In The Last Decade

Benjamin Aziz

73 papers receiving 517 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Benjamin Aziz United Kingdom 12 334 243 167 98 65 81 555
John Buford United States 11 438 1.3× 216 0.9× 145 0.9× 88 0.9× 51 0.8× 81 674
Dongwan Shin United States 16 396 1.2× 286 1.2× 215 1.3× 156 1.6× 79 1.2× 94 762
Ludger Fiege Germany 16 644 1.9× 199 0.8× 165 1.0× 70 0.7× 68 1.0× 39 815
Carsten Rudolph Australia 13 218 0.7× 340 1.4× 263 1.6× 98 1.0× 107 1.6× 92 658
Tuomas Aura Finland 18 523 1.6× 202 0.8× 242 1.4× 71 0.7× 94 1.4× 61 750
H. Chi Wong United States 9 530 1.6× 356 1.5× 357 2.1× 119 1.2× 87 1.3× 14 829
Naoto Yanai Japan 10 200 0.6× 367 1.5× 302 1.8× 69 0.7× 78 1.2× 63 590
Ilaria Matteucci Italy 12 139 0.4× 140 0.6× 169 1.0× 75 0.8× 119 1.8× 67 405
M.U. Çağlayan Türkiye 14 290 0.9× 134 0.6× 171 1.0× 66 0.7× 27 0.4× 53 526
Brighten Godfrey United States 13 1.1k 3.3× 247 1.0× 143 0.9× 50 0.5× 55 0.8× 26 1.2k

Countries citing papers authored by Benjamin Aziz

Since Specialization
Citations

This map shows the geographic impact of Benjamin Aziz's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Benjamin Aziz with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Benjamin Aziz more than expected).

Fields of papers citing papers by Benjamin Aziz

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Benjamin Aziz. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Benjamin Aziz. The network helps show where Benjamin Aziz may publish in the future.

Co-authorship network of co-authors of Benjamin Aziz

This figure shows the co-authorship network connecting the top 25 collaborators of Benjamin Aziz. A scholar is included among the top collaborators of Benjamin Aziz based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Benjamin Aziz. Benjamin Aziz is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Aziz, Benjamin. (2023). Analysing potential data security losses in organisations based on subsequent users logins. PLoS ONE. 18(8). e0286856–e0286856. 2 indexed citations
2.
Aziz, Benjamin, et al.. (2023). A Study on Human Perception of Document Paragraph Layout. 15. 1–8.
3.
Fréin, Ruairí de, et al.. (2022). An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks. Array. 15. 100221–100221. 4 indexed citations
5.
Aziz, Benjamin, et al.. (2020). Towards Consensus-Based Group Decision Making for Co-Owned Data Sharing in Online Social Networks. IEEE Access. 8. 91311–91325. 13 indexed citations
6.
Aziz, Benjamin, et al.. (2020). Application of Extended IOWA Operator for Making Group Decision on Co-owned Contents in Online Social Networks (OSNs). Portsmouth Research Portal (University of Portsmouth). 31–37. 1 indexed citations
7.
Adda, Mo, et al.. (2017). New Computing Model for Securing Mobile Agents in IP Networks. Portsmouth Research Portal (University of Portsmouth). 232–238.
8.
Aziz, Benjamin, et al.. (2015). LSB steganography with improved embedding efficiency and undetectability. 5(1). 89–105. 2 indexed citations
9.
Aziz, Benjamin, et al.. (2015). A better detection of 2LSB steganography via standard deviation of the extended pairs of values. Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE. 9497. 94970E–94970E. 1 indexed citations
10.
Aziz, Benjamin, et al.. (2014). Enforcing Reputation Constraints on Business Process Workflows. Bucks New University Repository (Bucks New University). 2 indexed citations
11.
Aziz, Benjamin, et al.. (2014). Security and VO Management Capabilities in a Large-Scale Grid Operating System. Computing and Informatics / Computers and Artificial Intelligence. 33(2). 303–326. 1 indexed citations
12.
Aziz, Benjamin, et al.. (2014). Revisiting the BAN-modified Andrew Secure RPC protocol. Journal of Internet Services and Information Security. 4(3). 82–96. 1 indexed citations
13.
Islam, Shareeful, et al.. (2013). Implementation of digital forensics investigations using a goal-driven approach for a questioned contract. 1 indexed citations
14.
Aziz, Benjamin, et al.. (2012). On the availability of anti-forensic tools for smartphones. Electromagnetic Biology and Medicine. 6(4). 58–64. 6 indexed citations
15.
Aziz, Benjamin, Álvaro Arenas, & Michael Wilson. (2011). Model-based refinement of security policies in collaborative virtual organisations. 1–14. 3 indexed citations
16.
Aziz, Benjamin, et al.. (2010). A Secure and Scalable Grid-Based Content Management System. Science and Technology Facilities Council. 404–409. 11 indexed citations
17.
Aziz, Benjamin, Álvaro Arenas, Juan Bicarregui, Christophe Ponsard, & Philippe Massonet. (2009). From Goal-Oriented Requirements to Event-B Specifications. Bucks New University Repository (Bucks New University). 96–105. 6 indexed citations
18.
Aziz, Benjamin. (2009). A framework for reasoning about trust and security in grids at requirement and application levels. 1 indexed citations
19.
Arenas, Álvaro, Benjamin Aziz, Paolo Mori, et al.. (2008). A Secure Environment for Grid-based Supply Chains. 1647–1654. 3 indexed citations
20.
Aziz, Benjamin, Simon N. Foley, John J. Herbert, & Garret Swart. (2006). Reconfiguring Role Based Access Control policies using risk semantics. Journal of High Speed Networks. 15(3). 261–273. 21 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026