Items where Author, Editor or other role is "Arief, Budi"
Number of items: 72.
A
Arief, Budi, Periam, Andy, Cetin, Orcun, Hernandez-Castro, Julio C. (2020) Using Eyetracker to Find Ways to Mitigate Ransomware. In: Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. . pp. 448-456. Scitepress ISBN 978-989-758-399-5. (doi:10.5220/0008956004480456) (KAR id:80445) |
Ali, Mohammed Aamir, Arief, Budi, Emms, Martin, van Moorsel, Aad (2017) Does The Online Card Payment Landscape Unwittingly Facilitate Fraud? IEEE Security & Privacy, 15 (2). pp. 78-86. ISSN 1540-7993. E-ISSN 1558-4046. (doi:10.1109/MSP.2017.27) (KAR id:58364) |
Arief, Budi, Bin Adzmi, Mohd Azeem (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 2 - Defenders and Victims. IEEE Security & Privacy, 13 (2). pp. 84-88. ISSN 1540-7993. (doi:10.1109/MSP.2015.44) (KAR id:54146) |
Arief, Budi, Bin Adzmi, Mohd Azeem, Gross, Thomas (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 1 - Attackers. IEEE Security & Privacy, 13 (1). pp. 71-76. ISSN 1540-7993. (doi:10.1109/MSP.2015.19) (KAR id:54147) |
Anderson, Tom, Arief, Budi, Basit, Tehmina, Borup, Rosie, Rutherford, Louise (2015) How To Succeed in Cyberspace. In: ICERI2015: 8TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION. ICERI Proceedings . pp. 6074-6083. ISBN 978-84-608-2657-6. (doi:WOS:000377304006024) (KAR id:58706) |
Arief, Budi and Coopamootoo, Kovila P.L. and Emms, Martin and van Moorsel, Aad (2014) Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society. CCS Computer and Communications Security . ACM, New York, USA, pp. 201-204. ISBN 978-1-4503-3148-7. (doi:10.1145/2665943.2665965) (KAR id:54149) |
Arief, Budi, Greathead, David, Coventry, Lynne, van Moorsel, Aad (2011) Towards the Implementation of an Internet-based Neighbourhood Watch Scheme. In: 3rd International Conference on Computational Aspects of Social Networks (CASoN), 19-22 October 2011, Salamanca, Spain. (KAR id:58713) |
Arief, Budi and Coleman, Joey and Greathead, David (2010) How Paranoid Are You?: Issues in Location Information of Ambient Systems. Technical report. CS-TR-1219 (KAR id:58715) |
Arief, Budi, von Arnim, Axel (2008) TRACKSS approach to improving road safety through sensors collaboration on vehicle and in infrastructure. In: Vehicular Technology Conference, 2008. VTC 2008-Fall. IEEE 68th. . IEEE ISBN 978-1-4244-1722-3. (doi:10.1109/VETECF.2008.439) (KAR id:58691) |
Arief, Budi, Blythe, Phil, Fairchild, Richard, Selvarajah, Kirusnapillai, Tully, Alan (2008) Integrating Smartdust into Intelligent Transportation System. In: 10th International Conference on Application of Advanced Technologies in Transportation (AATT 2008), 27-31 May 2008, Athens, Greece. (KAR id:58716) |
Arief, Budi and Iliasov, Alexei and Romanovsky, Alexander (2007) On developing open mobile fault tolerant agent systems. In: Choren, R. and Garcia, A. and Giese, H. and Leung, H.-f. and Lucena, C. and Romanovsky, A., eds. Software Engineering for Multi-Agent Systems V. Lecture Notes in Computer Science . Springer, Shanghai, pp. 21-40. ISBN 978-3-540-73130-6. (doi:10.1007/978-3-540-73131-3_2) (KAR id:58694) |
Arief, Budi, Iliasov, Alexei, Romanovsky, Alexander (2007) Rigorous Development of Ambient Campus Applications that can Recover from Errors. In: Workshop on Methods, Models and Tools for Fault-Tolerance (MeMoT 2007), at the International Conference on Integrated Formal Methods 2007 (IFM 2007), 3 July 2007. (KAR id:58721) |
Arief, Budi, Iliasov, Alexei, Romanovsky, Alexander (2006) On using the CAMA framework for developing open mobile fault tolerant agent systems. In: Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems. . pp. 29-36. ISBN 978-1-59593-395-9. (doi:10.1145/1138063.1138070) (KAR id:58696) |
Arief, Budi and Besnard, Denis (2003) Technical and Human Issues in Computer-Based Systems Security. Technical report. CS-TR-790 (KAR id:58732) |
Arief, Budi and Bosio, Diana and Gacek, Cristina and Rouncefield, Mark (2002) Dependability Issues in Open Source Software - DIRC Project Activity 5 Final Report. Technical report. CS-TR-760 (KAR id:58771) |
Arief, Budi and Gacek, Cristina and Lawrie, Tony (2001) Software Architectures and Open Source Software – Where can Research Leverage the Most? In: 23rd International Conference on Software Engineering. IEEE, pp. 3-5. ISBN 0-7695-1050-7. (KAR id:58807) |
Arief, Budi, Speirs, Neil (2000) A UML tool for an automatic generation of simulation programs. In: WOSP '00 Proceedings of the 2nd international workshop on Software and performance. . pp. 71-76. ISBN 1-58113-195-X. (doi:10.1145/350391.350408) (KAR id:58700) |
Arief, Budi, Speirs, Neil (1999) Automatic Generation of Distributed System Simulations from UML. In: 13th European Simulation Multiconference (ESM'99), 1-4 June, 1999, Warsaw, Poland. (KAR id:58809) |
Arief, Budi, Little, Mark, Shrivastava, Santosh, Speirs, Neil, Wheater, Stuart (1999) Specifying distributed system services. British Telecom technology journal, 17 (2). pp. 126-136. ISSN 0265-0193. (doi:10.1023/A:1009650219559) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58702) |
Arief, Budi, Speirs, Neil (1999) Simulation Generation from UML Like Specifications. In: IASTED Applied Modelling and Simulation (AMS'99), Cairns, Australia. (KAR id:58808) |
B
Brierley, Calvin (2022) The Viability and Potential Consequences of IoT-Based Ransomware. Doctor of Philosophy (PhD) thesis, University of Kent,. (doi:10.22024/UniKent/01.02.100745) (KAR id:100745) |
Brierley, Calvin, Arief, Budi, Barnes, David J., Hernandez-Castro, Julio C. (2021) Industrialising Blackmail: Privacy Invasion Based IoT Ransomware. In: Tuveri, N. and Michalas, A. and Brumley, B.B., eds. Lecture Notes in Computer Science. Secure IT Systems. 26th Nordic Conference, NordSec 2021. 13115. pp. 79-92. Springer ISBN 978-3-030-91624-4. E-ISBN 978-3-030-91625-1. (doi:10.1007/978-3-030-91625-1_5) (KAR id:92304) |
Brierley, Calvin, Pont, Jamie, Arief, Budi, Barnes, David J., Hernandez-Castro, Julio C. (2021) Persistence in Linux-Based IoT Malware. In: Lecture Notes in Computer Science. Secure IT Systems. 12556. pp. 3-19. Springer E-ISBN 978-3-030-70852-8. (doi:10.1007/978-3-030-70852-8_1) (KAR id:84209) |
Bryans, Jeremy and Arief, Budi (2006) Security implications of structure. In: Besnard, Denis and Gacek, Cristina and Jones, Cliff, eds. Structure for Dependability: Computer-Based Systems from an Interdisciplinary Perspective. Springer London, London, pp. 217-227. ISBN 978-1-84628-110-5. E-ISBN 978-1-84628-111-2. (doi:10.1007/1-84628-111-3_11) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58728) |
Besnard, Denis, Arief, Budi (2004) Computer security impaired by legitimate users. Computers and Security, 23 (3). pp. 253-264. ISSN 0167-4048. (doi:10.1016/j.cose.2003.09.002) (KAR id:58698) |
Besnard, Denis and Arief, Budi (2003) Computer security impaired by legal users. Technical report. CS-TR-794 (KAR id:58730) |
C
Connolly, Lena, Borrion, Hervé, Arief, Budi, Kaddoura, Sanaa (2023) Applying Neutralisation Theory to Better Understand Ransomware Offenders. In: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). . pp. 177-182. IEEE Computer Society, Los Alamitos, CA, USA ISBN 979-8-3503-2720-5. (doi:10.1109/EuroSPW59978.2023.00025) (KAR id:102142) |
E
ElZemity, Adel, Arief, Budi (2024) Privacy Threats and Countermeasures in Federated Learning for Internet of Things: A Systematic Review. In: 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics. . pp. 331-338. IEEE ISBN 979-8-3503-5164-4. E-ISBN 979-8-3503-5163-7. (doi:10.1109/ithings-greencom-cpscom-smartdata-cybermatics62450.2024.00072) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:107769) |
Emms, Martin, Arief, Budi, Freitas, Leonardo, Hannon, Joseph, van Moorsel, Aad (2014) Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN. In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). CCS Computer and Communications Security . pp. 716-726. ACM, New York, USA ISBN 978-1-4503-2957-6. (doi:10.1145/2660267.2660312) (KAR id:54148) |
Emms, Martin, Arief, Budi, van Moorsel, Aad (2014) Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. In: Preneel, Bart and Ikonomou, Demosthenes, eds. APF 2012: Privacy Technologies and Policy. Lecture Notes in Computer Science . pp. 203-214. Springer Berlin Heidelberg ISBN 978-3-642-54068-4. E-ISBN 978-3-642-54069-1. (doi:10.1007/978-3-642-54069-1_13) (KAR id:54150) |
Emms, Martin and Arief, Budi and Hannon, Joseph and van Moorsel, Aad (2013) POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards. Technical report. CS-TR-1386 (KAR id:58709) |
Emms, Martin, Arief, Budi, Little, Nicholas, van Moorsel, Aad (2013) Risks of Offline Verify PIN on Contactless Cards. In: Sadeghi, Ahmad-Reza, ed. Lecture Notes in Computer Science. Lecture Notes in Computer Science LNCS , 7859. pp. 313-321. Springer Berlin Heidelberg, Berlin ISBN 978-3-642-39883-4. E-ISBN 978-3-642-39884-1. (doi:10.1007/978-3-642-39884-1_26) (KAR id:54151) |
Emms, Martin and Arief, Budi and Defty, Troy and Hannon, Joseph and Hao, Feng and van Moorsel, Aad (2012) The Dangers of Verify PIN on Contactless Cards. Technical report. CS-TR-1332 (KAR id:58711) |
F
Filiz, Burak, Arief, Budi, Cetin, Orcun, Hernandez-Castro, Julio C. (2021) On the Effectiveness of Ransomware Decryption Tools. Computers & Security, 111 . Article Number 102469. ISSN 0167-4048. (doi:10.1016/j.cose.2021.102469) (KAR id:92302) |
G
Greathead, David and Coventry, Lynne and Arief, Budi and van Moorsel, Aad (2012) Deriving Requirements for an Online Community Interaction Scheme: Indications from Older Adults. In: CHI '12 Extended Abstracts on Human Factors in Computing Systems. ACM, New York, USA, pp. 1541-1546. ISBN 978-1-4503-1016-1. (doi:10.1145/2212776.2223669) (KAR id:54152) |
Grosso, Sergio and Tully, Alan and Arief, Budi and Marques, Antonio and Matoses, Manuel Serrano (2006) Collaborations among in-vehicle and infrastructure-based sensing technology for automotive applications: The EMMA and TRACKSS EU Projects. In: IET Seminar on RFID and Electronic Vehicle Identification in Road Transport. IEEE, pp. 57-65. ISBN 978-0-86341-734-4. (doi:10.1049/ic:20060135) (KAR id:58697) |
Gacek, Cristina, Arief, Budi (2004) The Many Meanings of Open Source. IEEE Software, 21 (1). pp. 34-40. ISSN 0740-7459. (doi:10.1109/MS.2004.1259206) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58699) |
Gacek, Cristina, Lawrie, Tony, Arief, Budi (2002) Interdisciplinary Insights on Open Source. In: Proceedings of the Open Source Software Development Workshop, 25th - 26th February, 2002, Newcastle upon Tyne, U.K.. (KAR id:58770) |
H
Hariri, Ali, Giannelos, Nicolas, Arief, Budi (2020) Selective Forwarding Attack on IoT Home Security Kits. In: Lecture Notes in Computer Science. Springer LNCS Proceedings, 2nd International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2019). . Springer ISBN 978-3-030-42047-5. (doi:10.1007/978-3-030-42048-2_23) (KAR id:75895) |
Hull, Gavin, John, Henna, Arief, Budi (2019) Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses. Crime Science, 8 . Article Number 2. ISSN 2193-7680. (doi:10.1186/s40163-019-0097-9) (KAR id:71720) |
I
Iliasov, Alexei and Romanovsky, Alexander and Arief, Budi and Laibinis, Linas and Troubitsyna, Elena (2007) On rigorous design and implementation of fault tolerant ambient systems. In: 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07). IEEE, pp. 141-145. ISBN 978-0-7695-2765-9. (doi:10.1109/ISORC.2007.46) (KAR id:58695) |
Iliasov, Alexei, Romanovsky, Alexander, Arief, Budi, Laibinis, Linas, Troubitsyna, Elena (2007) A framework for open distributed system design. In: International Computer Software and Applications Conference. 2. pp. 658-668. ISBN 978-0-7695-2870-0. (doi:10.1109/COMPSAC.2007.23) (KAR id:58693) |
K
Kocaogullar, Yekta, Cetin, Orcun, Arief, Budi, Brierley, Calvin, Pont, Jamie, Hernandez-Castro, Julio C. (2022) Hunting High or Low: Evaluating the Effectiveness of High-Interaction and Low-Interaction Honeypots. In: 12th International Workshop on Socio-Technical Aspects in Security (STAST 2022). . pp. 15-31. (In press) (KAR id:102122) |
Knight, Edward, Lord, Sam, Arief, Budi (2019) Lock Picking in the Era of Internet of Things. In: Proceedings: 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 835-842. IEEE ISBN 978-1-7281-2776-7. (doi:10.1109/TrustCom/BigDataSE.2019.00121) (KAR id:75142) |
M
Mohd Kassim, Sharifah Roziah Binti (2024) The study of the operational practices of national CSIRTS regarding the Use of free tools and public data in supporting computer security incident response. Doctor of Philosophy (PhD) thesis, University of Kent. (doi:10.22024/UniKent/01.02.105956) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:105956) |
Mohd Kassim, Sharifah Roziah Binti, Li, Shujun, Arief, Budi (2023) Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions. Digital Threats: Research and Practice, 4 (3). pp. 1-24. ISSN 2576-5337. (doi:10.1145/3609230) (KAR id:103162) |
Mohd Kassim, Sharifah Roziah Binti, Shamsuddin, Solahuddin Bin, Li, Shujun, Arief, Budi (2022) How National CSIRTs Operate: Personal Observations and Opinions from MyCERT. In: Institute of Electrical and Electronics Engineers. 2022 IEEE Conference on Dependable and Secure Computing (DSC). . IEEE ISBN 978-1-6654-1815-7. (doi:10.1109/DSC54232.2022.9888803) (KAR id:97693) |
Mohd Kassim, Sharifah Roziah Binti, Li, Shujun, Arief, Budi (2022) Incident Response Practices Across National CSIRTs: Results from an Online Survey. OIC-CERT Journal of Cyber Security, 4 (1). pp. 67-84. ISSN 2636-9680. E-ISSN 2682-9266. (KAR id:94119) |
Mohd Kassim, Sharifah Roziah Binti, Li, Shujun, Arief, Budi (2022) How National CSIRTs Leverage Public Data, OSINT and Free Tools in Operational Practices: An Empirical Study. Cyber Security: A Peer-Reviewed Journal, 5 (3). pp. 251-276. ISSN 2398-5100. (KAR id:93768) |
McBride, Jack and Hernandez-Castro, Julio and Arief, Budi (2018) Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override. In: 2017 International Workshop on Secure Internet of Things (SIoT). IEEE. ISBN 978-1-5386-4542-0. E-ISBN 978-1-5386-4541-3. (doi:10.1109/SIoT.2017.00009) (KAR id:64302) |
McBride, Jack and Arief, Budi and Hernandez-Castro, Julio C. (2018) Security Analysis of Contiki IoT Operating System. In: EWSN ’18 Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks. Junction Publishing, Canada, pp. 278-283. ISBN 978-0-9949886-2-1. (KAR id:67379) |
McGough, Andrew Stephen, Arief, Budi, Gamble, Carl, Wall, David, Brennan, John, Fitzgerald, John, van Moorsel, Aad, Alwis, Sujeewa, Theodoropoulos, Georgios, Ruck-Keene, Ed and others. (2015) Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 6 (4). pp. 3-46. ISSN 2093-5374. E-ISSN 2093-5382. (KAR id:54143) |
McGough, Andrew Stephen and Wall, David and Brennan, John and Theodoropoulos, Georgios and Ruck-Keene, Ed and Arief, Budi and Gamble, Carl and Fitzgerald, John and van Moorsel, Aad and Alwis, Sujeewa (2015) Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats. CCS Computer and Communications Security . ACM, New York, USA, pp. 1-12. ISBN 978-1-4503-3824-0. (doi:10.1145/2808783.2808785) (KAR id:54145) |
O
Ozkok, Meryem Berfin, Birinci, Baturay, Cetin, Orcun, Arief, Budi, Hernandez-Castro, Julio (2024) Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot Logs. In: European Interdisciplinary Cybersecurity Conference. EICC '24: Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference. . ACM ISBN 979-8-4007-1651-5. (doi:10.1145/3655693.3655716) (KAR id:106254) |
Ozturk, Omer Said, Ekmekcioglu, Emre, Cetin, Orcun, Arief, Budi, Hernandez-Castro, Julio C. (2023) New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools? In: EICC '23: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference. . pp. 13-18. ACM ISBN 978-1-4503-9829-9. (doi:10.1145/3590777.3590780) (KAR id:102124) |
P
Pont, Jamie John (2023) Identifying Ransomware Through Statistical and Behavioural Analysis. Doctor of Philosophy (PhD) thesis, University of Kent,. (doi:10.22024/UniKent/01.02.100606) (KAR id:100606) |
Pont, Jamie, Arief, Budi, Hernandez-Castro, Julio C. (2020) Why Current Statistical Approaches to Ransomware Detection Fail. In: Lecture Notes in Computer Science. Information Security. 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings. 12472. Springer ISBN 978-3-030-62973-1. (doi:10.1007/978-3-030-62974-8_12) (KAR id:82960) |
Pont, Jamie, Abu Oun, Osama, Brierley, Calvin, Arief, Budi, Hernandez-Castro, Julio C. (2019) A Roadmap for Improving the Impact of Anti-Ransomware Research. In: Askarov, Aslan and Hansen, René Rydhof and Rafnsson, Willard, eds. Lecture Notes in Computer Science. Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings. 11875. Springer ISBN 978-3-030-35054-3. (doi:10.1007/978-3-030-35055-0_9) (KAR id:76942) |
S
Stevens, Francesca, Nurse, Jason R. C., Arief, Budi (2020) Cyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review. Cyberpsychology, Behavior, and Social Networking, . ISSN 2152-2715. (doi:10.1089/cyber.2020.0253) (KAR id:83544) |
Selvarajah, Kirusnapillai and Arief, Budi and Tully, Alan and Blythe, Phil (2012) Deploying Wireless Sensor Devices in Intelligent Transportation System Applications. In: Abdel-Rahim, A, ed. Intelligent Transportation Systems. InTech. (doi:10.5772/25993) (KAR id:58712) |
Speirs, Neil, Arief, Budi (2000) Simulation of a telecommunication system using simML. In: Proceedings of the IEEE 26th Annual Simulation Symposium, Washington. (SS 2000) Proceedings. 33rd Annual Simulation Symposium, 2000. . pp. 131-138. IEEE Computer Society Press, Los Alamitos, CA, United States, Washington, DC, USA ISBN 0-7695-0598-8. (doi:10.1109/SIMSYM.2000.844909) (KAR id:58701) |
V
van Moorsel, Aad and Emms, Martin and Rendall, Gemma and Arief, Budi (2011) Digital Strategy for the Social Inclusion of Survivors of Domestic Violence. Technical report. CS-TR-1277 (KAR id:58714) |
von Arnim, Axel and Arief, Budi and Fusée, Antoine (2008) Cooperative Road Sign and Traffic Light Using Near Infrared Identification and Zigbee Smartdust Technologies. In: 15th World Congress on Intelligent Transport Systems and ITS America Annual Meeting 2008. , pp. 1696-1707. ISBN 978-1-61567-756-6. (KAR id:58692) |
W
Wang, Yichao, Arief, Budi, Hernandez-Castro, Julio C. (2024) Analysis of Security Mechanisms of Dark Web Markets. In: EICC '24: Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference. . ACM ISBN 979-8-4007-1651-5. (doi:10.1145/3655693.3655700) (KAR id:105237) |
Wang, Yichao, Roscoe, Sophia, Arief, Budi, Connolly, Lena, Borrion, Hervé, Kaddoura, Sanaa (2023) The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities. In: 9th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2023). Lecture Notes in Computer Science (LNCS) . pp. 149-163. Springer Singapore ISBN 978-981-99-5176-5. E-ISBN 978-981-99-5177-2. (doi:10.1007/978-981-99-5177-2_9) (KAR id:102144) |
Wang, Yichao, Arief, Budi, Franqueira, Virginia N. L., Coates, Anna Grace, Ó Ciardha, Caoilte (2023) Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned. In: EICC '23: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference. . pp. 59-64. ACM ISBN 978-1-4503-9829-9. (doi:10.1145/3590777.3590812) (KAR id:102125) |
Wang, Yichao, Arief, Budi, Hernandez-Castro, Julio C. (2023) Dark ending: what happens when a dark web market closes down. In: In Proceedings of the 9th International Conference on Information Systems Security and Privacy. . ISBN 978-989-758-624-8. (doi:10.5220/0011681600003405) (KAR id:100540) |
Wang, Yichao, Arief, Budi, Hernandez-Castro, Julio C. (2021) Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets. In: 2021 APWG Symposium on Electronic Crime Research (eCrime). . pp. 1-13. IEEE ISBN 978-1-6654-8029-1. (doi:10.1109/eCrime54498.2021.9738745) (KAR id:99679) |
Y
Yilmaz, Yagiz, Cetin, Orcun, Ozturk, Omer Said, Ekmekcioglu, Emre, Arief, Budi, Hernandez-Castro, Julio C. (2024) Assessing the Silent Frontlines: Exploring the Impact of DDoS Hacktivism in the Russo-Ukrainian War. In: 40th Annual Computer Security Applications Conference (ACSAC'24), 9-13 December 2024, Hawaii, USA. (In press) (KAR id:107797) |
Yilmaz, Yagiz, Cetin, Orcun, Grigore, Claudia, Arief, Budi, Hernandez-Castro, Julio (2023) Personality Types and Ransomware Victimisation. Digital Threats: Research and Practice, 4 (4). pp. 1-25. ISSN 2692-1626. E-ISSN 2576-5337. (doi:10.1145/3568994) (KAR id:102123) |
Yilmaz, Yagiz, Cetin, Orcun, Arief, Budi, Hernandez-Castro, Julio C. (2021) Investigating the Impact of Ransomware Splash Screens. Journal of Information Security and Applications, 61 . Article Number 102934. ISSN 2214-2126. E-ISSN 2214-2126. (doi:10.1016/j.jisa.2021.102934) (KAR id:92301) |
Yadav, Poonam, Feraudo, Angelo, Arief, Budi, Shahandashti, Siamak F., Vassilakis, Vassilios G. (2020) A systematic framework for categorising IoT device fingerprinting mechanisms. In: AIChallengeIoT '20: Proceedings of the 2nd International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things. . ACM ISBN 978-1-4503-8134-5. (doi:10.1145/3417313.3429384) (KAR id:84210) |