[go: up one dir, main page]

Follow
Budi Arief
Title
Cited by
Cited by
Year
The many meanings of open source
C Gacek, B Arief
IEEE software 21 (1), 34-40, 2004
4792004
Computer security impaired by legitimate users
D Besnard, B Arief
Computers & Security 23 (3), 253-264, 2004
2822004
Cyber stalking, cyber harassment, and adult mental health: A systematic review
F Stevens, JRC Nurse, B Arief
Cyberpsychology, Behavior, and Social Networking 24 (6), 367-376, 2021
2592021
Ransomware deployment methods and analysis: views from a predictive model and human responses
G Hull, H John, B Arief
Crime Science 8 (1), 1-22, 2019
1532019
A UML tool for an automatic generation of simulation programs
LB Arief, NA Speirs
Proceedings of the 2nd international workshop on Software and performance, 71-76, 2000
1342000
Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers
B Arief, MAB Adzmi, T Gross
IEEE Security & Privacy 13 (1), 71-76, 2015
592015
Harvesting high value foreign currency transactions from emv contactless credit cards without the pin
M Emms, B Arief, L Freitas, J Hannon, A van Moorsel
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
522014
Does the online card payment landscape unwittingly facilitate fraud?
MA Ali, B Arief, M Emms, A van Moorsel
IEEE Security & Privacy 15 (2), 78-86, 2017
452017
Technical and human issues in computer-based systems security
B Arief, D Besnard
CS-TR-790, 2003
422003
PaperW8: an IoT bricking ransomware proof of concept
C Brierley, J Pont, B Arief, DJ Barnes, J Hernandez-Castro
Proceedings of the 15th International Conference on Availability …, 2020
402020
Sensible privacy: How we can protect domestic violence survivors without facilitating misuse
B Arief, KPL Coopamootoo, M Emms, A Van Moorsel
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 201-204, 2014
402014
Why current statistical approaches to ransomware detection fail
J Pont, B Arief, J Hernandez-Castro
International Conference on Information Security, 199-216, 2020
382020
New tricks to old codes: can ai chatbots replace static code analysis tools?
OS Ozturk, E Ekmekcioglu, O Cetin, B Arief, J Hernandez-Castro
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference …, 2023
352023
Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms
P Yadav, A Feraudo, B Arief, SF Shahandashti, VG Vassilakis
Proceedings of the 2nd international workshop on challenges in artificial …, 2020
342020
Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour
AS McGough, B Arief, C Gamble, D Wall, J Brennan, JS Fitzgerald, ...
JoWUA 6 (4), 3-46, 2015
34*2015
Risks of offline verify PIN on contactless cards
M Emms, B Arief, N Little, A van Moorsel
International Conference on Financial Cryptography and Data Security, 313-321, 2013
322013
Automatic generation of distributed system simulations from UML
B Arief, N Speirs
291999
A roadmap for improving the impact of anti-ransomware research
J Pont, O Abu Oun, C Brierley, B Arief, J Hernandez-Castro
Nordic Conference on Secure IT Systems, 137-154, 2019
282019
Understanding cybercrime from its stakeholders' perspectives: Part 2--defenders and victims
B Arief, MAB Adzmi
IEEE Security & Privacy 13 (2), 84-88, 2015
272015
Software architectures and open source software–Where can research leverage the most?
B Arief, C Gacek, T Lawrie
IEEE, 2001
272001
The system can't perform the operation now. Try again later.
Articles 1–20