Skip to main content

Items where Author, Editor or other role is "Arief, Budi"

Group by: Creator's name | Item Type | Date | No Grouping
Jump to: A | B | E | G | H | I | K | M | P | S | V | Y
Number of items: 50.

A

Arief, Budi, Periam, Andy, Cetin, Orcun, Hernandez-Castro, Julio C. (2020) Using Eyetracker to Find Ways to Mitigate Ransomware. In: Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. . pp. 448-456. Scitepress ISBN 978-989-758-399-5. (doi:10.5220/0008956004480456) (KAR id:80445)
[thumbnail of ICISSP_2020_48.pdf]
Preview
[thumbnail of ICISSP_2020_48_CR.pdf]
Preview

Ali, Mohammed Aamir, Arief, Budi, Emms, Martin, van Moorsel, Aad (2017) Does The Online Card Payment Landscape Unwittingly Facilitate Fraud? IEEE Security & Privacy, 15 (2). pp. 78-86. ISSN 1540-7993. E-ISSN 1558-4046. (doi:10.1109/MSP.2017.27) (KAR id:58364)
[thumbnail of SandP_article_v62.pdf]
Preview

Arief, Budi, Bin Adzmi, Mohd Azeem (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 2 - Defenders and Victims. IEEE Security & Privacy, 13 (2). pp. 84-88. ISSN 1540-7993. (doi:10.1109/MSP.2015.44) (KAR id:54146)
[thumbnail of UnderstandingCybercrime-Part2.pdf]
Preview

Arief, Budi, Bin Adzmi, Mohd Azeem, Gross, Thomas (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 1 - Attackers. IEEE Security & Privacy, 13 (1). pp. 71-76. ISSN 1540-7993. (doi:10.1109/MSP.2015.19) (KAR id:54147)
[thumbnail of UnderstandingCybercrime-Part1.pdf]
Preview

Anderson, Tom, Arief, Budi, Basit, Tehmina, Borup, Rosie, Rutherford, Louise (2015) How To Succeed in Cyberspace. In: ICERI2015: 8TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION. ICERI Proceedings . pp. 6074-6083. ISBN 978-84-608-2657-6. (doi:WOS:000377304006024) (KAR id:58706)
[thumbnail of ICERI2015.pdf]
Preview

Arief, Budi and Coopamootoo, Kovila P.L. and Emms, Martin and van Moorsel, Aad (2014) Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society. CCS Computer and Communications Security . ACM, New York, USA, pp. 201-204. ISBN 978-1-4503-3148-7. (doi:10.1145/2665943.2665965) (KAR id:54149)
[thumbnail of WPES2014.pdf]
Preview

Arief, Budi, Greathead, David, Coventry, Lynne, van Moorsel, Aad (2011) Towards the Implementation of an Internet-based Neighbourhood Watch Scheme. In: 3rd International Conference on Computational Aspects of Social Networks (CASoN), 19-22 October 2011, Salamanca, Spain. (KAR id:58713)
[thumbnail of CASoN11.pdf]
Preview

Arief, Budi and Coleman, Joey and Greathead, David (2010) How Paranoid Are You?: Issues in Location Information of Ambient Systems. Technical report. CS-TR-1219 (KAR id:58715)
[thumbnail of TR1219.pdf]
Preview

Arief, Budi, von Arnim, Axel (2008) TRACKSS approach to improving road safety through sensors collaboration on vehicle and in infrastructure. In: Vehicular Technology Conference, 2008. VTC 2008-Fall. IEEE 68th. . IEEE ISBN 978-1-4244-1722-3. (doi:10.1109/VETECF.2008.439) (KAR id:58691)
[thumbnail of WiVeC08.pdf]
Preview

Arief, Budi, Blythe, Phil, Fairchild, Richard, Selvarajah, Kirusnapillai, Tully, Alan (2008) Integrating Smartdust into Intelligent Transportation System. In: 10th International Conference on Application of Advanced Technologies in Transportation (AATT 2008), 27-31 May 2008, Athens, Greece. (KAR id:58716)
[thumbnail of 753_Arief.pdf]
Preview

Arief, Budi and Iliasov, Alexei and Romanovsky, Alexander (2007) On developing open mobile fault tolerant agent systems. In: Choren, R. and Garcia, A. and Giese, H. and Leung, H.-f. and Lucena, C. and Romanovsky, A., eds. Software Engineering for Multi-Agent Systems V. Lecture Notes in Computer Science . Springer, Shanghai, pp. 21-40. ISBN 978-3-540-73130-6. (doi:10.1007/978-3-540-73131-3_2) (KAR id:58694)
[thumbnail of SELMAS-LNCS.pdf]
Preview

Arief, Budi, Iliasov, Alexei, Romanovsky, Alexander (2007) Rigorous Development of Ambient Campus Applications that can Recover from Errors. In: Workshop on Methods, Models and Tools for Fault-Tolerance (MeMoT 2007), at the International Conference on Integrated Formal Methods 2007 (IFM 2007), 3 July 2007. (KAR id:58721)
[thumbnail of MeMoT-AriefIliasovRomanovsky.pdf]
Preview

Arief, Budi, Iliasov, Alexei, Romanovsky, Alexander (2006) On using the CAMA framework for developing open mobile fault tolerant agent systems. In: Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems. . pp. 29-36. ISBN 978-1-59593-395-9. (doi:10.1145/1138063.1138070) (KAR id:58696)
[thumbnail of TR943.pdf]
Preview

Arief, Budi and Besnard, Denis (2003) Technical and Human Issues in Computer-Based Systems Security. Technical report. CS-TR-790 (KAR id:58732)
[thumbnail of TR790.pdf]
Preview

Arief, Budi and Bosio, Diana and Gacek, Cristina and Rouncefield, Mark (2002) Dependability Issues in Open Source Software - DIRC Project Activity 5 Final Report. Technical report. CS-TR-760 (KAR id:58771)
[thumbnail of TR760.pdf]
Preview

Arief, Budi and Gacek, Cristina and Lawrie, Tony (2001) Software Architectures and Open Source Software – Where can Research Leverage the Most? In: 23rd International Conference on Software Engineering. IEEE, pp. 3-5. ISBN 0-7695-1050-7. (KAR id:58807)
[thumbnail of wosse2001.pdf]
Preview

Arief, Budi, Speirs, Neil (2000) A UML tool for an automatic generation of simulation programs. In: WOSP '00 Proceedings of the 2nd international workshop on Software and performance. . pp. 71-76. ISBN 1-58113-195-X. (doi:10.1145/350391.350408) (KAR id:58700)
[thumbnail of wosp2000.pdf]
Preview

Arief, Budi, Speirs, Neil (1999) Automatic Generation of Distributed System Simulations from UML. In: 13th European Simulation Multiconference (ESM'99), 1-4 June, 1999, Warsaw, Poland. (KAR id:58809)
[thumbnail of esm99.pdf]
Preview

Arief, Budi, Little, Mark, Shrivastava, Santosh, Speirs, Neil, Wheater, Stuart (1999) Specifying distributed system services. British Telecom technology journal, 17 (2). pp. 126-136. ISSN 0265-0193. (doi:10.1023/A:1009650219559) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58702)
[thumbnail of BT-TechJournal.pdf]

Arief, Budi, Speirs, Neil (1999) Simulation Generation from UML Like Specifications. In: IASTED Applied Modelling and Simulation (AMS'99), Cairns, Australia. (KAR id:58808)
[thumbnail of iasted99.pdf]
Preview

B

Brierley, Calvin, Pont, Jamie, Arief, Budi, Barnes, David J., Hernandez-Castro, Julio C. (2021) Persistence in Linux-Based IoT Malware. In: Lecture Notes in Computer Science. Secure IT Systems. 12556. pp. 3-19. Springer E-ISBN 978-3-030-70852-8. (doi:10.1007/978-3-030-70852-8_1) (KAR id:84209)
[thumbnail of Persistence_in_IoT_Malware_Camera_Ready.pdf]
Preview

Bryans, Jeremy and Arief, Budi (2006) Security implications of structure. In: Besnard, Denis and Gacek, Cristina and Jones, Cliff, eds. Structure for Dependability: Computer-Based Systems from an Interdisciplinary Perspective. Springer London, London, pp. 217-227. ISBN 978-1-84628-110-5. E-ISBN 978-1-84628-111-2. (doi:10.1007/1-84628-111-3_11) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58728)
[thumbnail of SecurityImplicationsOfStructure.pdf]

Besnard, Denis, Arief, Budi (2004) Computer security impaired by legitimate users. Computers and Security, 23 (3). pp. 253-264. ISSN 0167-4048. (doi:10.1016/j.cose.2003.09.002) (KAR id:58698)
[thumbnail of cose2004-orig.pdf]
Preview

Besnard, Denis and Arief, Budi (2003) Computer security impaired by legal users. Technical report. CS-TR-794 (KAR id:58730)
[thumbnail of TR794.pdf]
Preview

E

Emms, Martin, Arief, Budi, Freitas, Leonardo, Hannon, Joseph, van Moorsel, Aad (2014) Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN. In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). CCS Computer and Communications Security . pp. 716-726. ACM, New York, USA ISBN 978-1-4503-2957-6. (doi:10.1145/2660267.2660312) (KAR id:54148)
[thumbnail of ccs2014-contactless-foreign-currency.pdf]
Preview

Emms, Martin, Arief, Budi, van Moorsel, Aad (2014) Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. In: Preneel, Bart and Ikonomou, Demosthenes, eds. APF 2012: Privacy Technologies and Policy. Lecture Notes in Computer Science . pp. 203-214. Springer Berlin Heidelberg ISBN 978-3-642-54068-4. E-ISBN 978-3-642-54069-1. (doi:10.1007/978-3-642-54069-1_13) (KAR id:54150)
[thumbnail of APF2012.pdf]
Preview

Emms, Martin and Arief, Budi and Hannon, Joseph and van Moorsel, Aad (2013) POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards. Technical report. CS-TR-1386 (KAR id:58709)
[thumbnail of TR1386.pdf]
Preview

Emms, Martin, Arief, Budi, Little, Nicholas, van Moorsel, Aad (2013) Risks of Offline Verify PIN on Contactless Cards. In: Sadeghi, Ahmad-Reza, ed. Lecture Notes in Computer Science. Lecture Notes in Computer Science LNCS , 7859. pp. 313-321. Springer Berlin Heidelberg, Berlin ISBN 978-3-642-39883-4. E-ISBN 978-3-642-39884-1. (doi:10.1007/978-3-642-39884-1_26) (KAR id:54151)
[thumbnail of FC2013-PostPrint.pdf]
Preview

Emms, Martin and Arief, Budi and Defty, Troy and Hannon, Joseph and Hao, Feng and van Moorsel, Aad (2012) The Dangers of Verify PIN on Contactless Cards. Technical report. CS-TR-1332 (KAR id:58711)
[thumbnail of TR1332.pdf]
Preview

G

Greathead, David and Coventry, Lynne and Arief, Budi and van Moorsel, Aad (2012) Deriving Requirements for an Online Community Interaction Scheme: Indications from Older Adults. In: CHI '12 Extended Abstracts on Human Factors in Computing Systems. ACM, New York, USA, pp. 1541-1546. ISBN 978-1-4503-1016-1. (doi:10.1145/2212776.2223669) (KAR id:54152)
[thumbnail of CHI2012.pdf]
Preview

Grosso, Sergio and Tully, Alan and Arief, Budi and Marques, Antonio and Matoses, Manuel Serrano (2006) Collaborations among in-vehicle and infrastructure-based sensing technology for automotive applications: The EMMA and TRACKSS EU Projects. In: IET Seminar on RFID and Electronic Vehicle Identification in Road Transport. IEEE, pp. 57-65. ISBN 978-0-86341-734-4. (doi:10.1049/ic:20060135) (KAR id:58697)
[thumbnail of EMMA-TRACKSS.pdf]
Preview

Gacek, Cristina, Arief, Budi (2004) The Many Meanings of Open Source. IEEE Software, 21 (1). pp. 34-40. ISSN 0740-7459. (doi:10.1109/MS.2004.1259206) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58699)
[thumbnail of TheManyMeaningsOfOSS.pdf]

Gacek, Cristina, Lawrie, Tony, Arief, Budi (2002) Interdisciplinary Insights on Open Source. In: Proceedings of the Open Source Software Development Workshop, 25th - 26th February, 2002, Newcastle upon Tyne, U.K.. (KAR id:58770)
[thumbnail of OSSDW02.pdf]
Preview

H

Hariri, Ali, Giannelos, Nicolas, Arief, Budi (2020) Selective Forwarding Attack on IoT Home Security Kits. In: Lecture Notes in Computer Science. Springer LNCS Proceedings, 2nd International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2019). . Springer ISBN 978-3-030-42047-5. (doi:10.1007/978-3-030-42048-2_23) (KAR id:75895)
[thumbnail of Selective_Forwarding_Attack_on_IoT_Home_Security_Kits.pdf]
Preview

Hull, Gavin, John, Henna, Arief, Budi (2019) Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses. Crime Science, 8 . Article Number 2. ISSN 2193-7680. (doi:10.1186/s40163-019-0097-9) (KAR id:71720)
[thumbnail of Hull2019_Article_RansomwareDeploymentMethodsAnd.pdf]
Preview
[thumbnail of Questionnaire Template - Company]
Preview

I

Iliasov, Alexei and Romanovsky, Alexander and Arief, Budi and Laibinis, Linas and Troubitsyna, Elena (2007) On rigorous design and implementation of fault tolerant ambient systems. In: 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07). IEEE, pp. 141-145. ISBN 978-0-7695-2765-9. (doi:10.1109/ISORC.2007.46) (KAR id:58695)
[thumbnail of ISORC07.pdf]
Preview

Iliasov, Alexei, Romanovsky, Alexander, Arief, Budi, Laibinis, Linas, Troubitsyna, Elena (2007) A framework for open distributed system design. In: International Computer Software and Applications Conference. 2. pp. 658-668. ISBN 978-0-7695-2870-0. (doi:10.1109/COMPSAC.2007.23) (KAR id:58693)
[thumbnail of SPAC07.pdf]
Preview

K

Knight, Edward, Lord, Sam, Arief, Budi (2019) Lock Picking in the Era of Internet of Things. In: Proceedings: 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 835-842. IEEE ISBN 978-1-72812-776-7. (doi:10.1109/TrustCom/BigDataSE.2019.00121) (KAR id:75142)
[thumbnail of 3Y7CKfyKtPwmqu2Q7m6xIA.pdf]
Preview

M

McBride, Jack and Hernandez-Castro, Julio and Arief, Budi (2018) Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override. In: 2017 International Workshop on Secure Internet of Things (SIoT). IEEE. ISBN 978-1-5386-4542-0. E-ISBN 978-1-5386-4541-3. (doi:10.1109/SIoT.2017.00009) (KAR id:64302)
[thumbnail of EarwormsMakeBadPasswords.pdf]
Preview

McBride, Jack and Arief, Budi and Hernandez-Castro, Julio C. (2018) Security Analysis of Contiki IoT Operating System. In: EWSN ’18 Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks. Junction Publishing, Canada, pp. 278-283. ISBN 978-0-9949886-2-1. (KAR id:67379)
[thumbnail of SecurityAnalysisOfContiki.pdf]
Preview

McGough, Andrew Stephen, Arief, Budi, Gamble, Carl, Wall, David, Brennan, John, Fitzgerald, John, van Moorsel, Aad, Alwis, Sujeewa, Theodoropoulos, Georgios, Ruck-Keene, Ed and others. (2015) Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 6 (4). pp. 3-46. ISSN 2093-5374. E-ISSN 2093-5382. (KAR id:54143)
[thumbnail of jowua-v6n4-1.pdf]
Preview

McGough, Andrew Stephen and Wall, David and Brennan, John and Theodoropoulos, Georgios and Ruck-Keene, Ed and Arief, Budi and Gamble, Carl and Fitzgerald, John and van Moorsel, Aad and Alwis, Sujeewa (2015) Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats. CCS Computer and Communications Security . ACM, New York, USA, pp. 1-12. ISBN 978-1-4503-3824-0. (doi:10.1145/2808783.2808785) (KAR id:54145)
[thumbnail of MIST15.pdf]
Preview

P

Pont, Jamie, Arief, Budi, Hernandez-Castro, Julio C. (2020) Why Current Statistical Approaches to Ransomware Detection Fail. In: Lecture Notes in Computer Science. Information Security. 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings. 12472. Springer ISBN 978-3-030-62973-1. (doi:10.1007/978-3-030-62974-8_12) (KAR id:82960)
[thumbnail of why-current-statistical-approaches-to-ransomware-detection-fail.pdf]
Preview

Pont, Jamie, Abu Oun, Osama, Brierley, Calvin, Arief, Budi, Hernandez-Castro, Julio C. (2019) A Roadmap for Improving the Impact of Anti-Ransomware Research. In: Askarov, Aslan and Hansen, René Rydhof and Rafnsson, Willard, eds. Lecture Notes in Computer Science. Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings. 11875. Springer ISBN 978-3-030-35054-3. (doi:10.1007/978-3-030-35055-0_9) (KAR id:76942)
[thumbnail of Paper24.pdf]
Preview

S

Stevens, Francesca, Nurse, Jason R.C., Arief, Budi (2020) Cyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review. Cyberpsychology, Behavior, and Social Networking, . ISSN 2152-2715. (doi:10.1089/cyber.2020.0253) (KAR id:83544)
[thumbnail of Cyber Abuse Impact on Adult Mental Health - AAM.pdf]
Preview

Selvarajah, Kirusnapillai and Arief, Budi and Tully, Alan and Blythe, Phil (2012) Deploying Wireless Sensor Devices in Intelligent Transportation System Applications. In: Abdel-Rahim, A, ed. Intelligent Transportation Systems. InTech. (KAR id:58712)
[thumbnail of InTech2012.pdf]
Preview

Speirs, Neil, Arief, Budi (2000) Simulation of a telecommunication system using simML. In: Proceedings of the IEEE 26th Annual Simulation Symposium, Washington. (SS 2000) Proceedings. 33rd Annual Simulation Symposium, 2000. . pp. 131-138. IEEE Computer Society Press, Los Alamitos, CA, United States, Washington, DC, USA ISBN 0-7695-0598-8. (doi:10.1109/SIMSYM.2000.844909) (KAR id:58701)
[thumbnail of anss2000.pdf]
Preview

V

van Moorsel, Aad and Emms, Martin and Rendall, Gemma and Arief, Budi (2011) Digital Strategy for the Social Inclusion of Survivors of Domestic Violence. Technical report. CS-TR-1277 (KAR id:58714)
[thumbnail of TR1277.pdf]
Preview

von Arnim, Axel and Arief, Budi and Fusée, Antoine (2008) Cooperative Road Sign and Traffic Light Using Near Infrared Identification and Zigbee Smartdust Technologies. In: 15th World Congress on Intelligent Transport Systems and ITS America Annual Meeting 2008. , pp. 1696-1707. ISBN 978-1-61567-756-6. (KAR id:58692)
[thumbnail of ITS08.pdf]
Preview

Y

Yadav, Poonam, Feraudo, Angelo, Arief, Budi, Shahandashti, Siamak F., Vassilakis, Vassilios G. (2020) A systematic framework for categorising IoT device fingerprinting mechanisms. In: 2nd Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things (AIChallengeIoT 2020), 16 November 2020, online. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:84210)
[thumbnail of aichallengeiot20-final23.pdf]

This list was generated on Tue Nov 30 20:33:06 2021 GMT.