Skip to main content
Kent Academic Repository

Browse by Person (creator, editor, contributor, etc.)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date | No Grouping
Number of items: 43.

Article

Hull, Gavin and John, Henna and Arief, Budi (2019) Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses. Crime Science, 8 (2). (doi:https://doi.org/10.1186/s40163-019-0097-9) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]

Ali, Mohammed Aamir and Arief, Budi and Emms, Martin and van Moorsel, Aad (2017) Does The Online Card Payment Landscape Unwittingly Facilitate Fraud? IEEE Security & Privacy, 15 (2). pp. 78-86. ISSN 1540-7993. (Full text available)
[img]
Preview

McGough, Andrew Stephen and Arief, Budi and Gamble, Carl and Wall, David and Brennan, John and Fitzgerald, John and van Moorsel, Aad and Alwis, Sujeewa and Theodoropoulos, Georgios and Ruck-Keene, Ed (2015) Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 6 (4). pp. 3-46. ISSN 2093-5374. E-ISSN 2093-5382. (Full text available)
[img]
Preview

Arief, Budi and Bin Adzmi, Mohd Azeem (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 2 - Defenders and Victims. IEEE Security & Privacy, 13 (2). pp. 84-88. ISSN 1540-7993. (doi:https://doi.org/10.1109/MSP.2015.44) (Full text available)
[img]
Preview

Arief, Budi and Bin Adzmi, Mohd Azeem and Gross, Thomas (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 1 - Attackers. IEEE Security & Privacy, 13 (1). pp. 71-76. ISSN 1540-7993. (doi:https://doi.org/10.1109/MSP.2015.19) (Full text available)
[img]
Preview

Gacek, Cristina and Arief, Budi (2004) The Many Meanings of Open Source. IEEE Software, 21 (1). pp. 34-40. ISSN 0740-7459. (doi:https://doi.org/10.1109/MS.2004.1259206) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Besnard, Denis and Arief, Budi (2004) Computer security impaired by legitimate users. Computers and Security, 23 (3). pp. 253-264. ISSN 0167-4048. (doi:https://doi.org/10.1016/j.cose.2003.09.002) (Full text available)
[img]
Preview

Arief, Budi and Little, Mark and Shrivastava, Santosh and Speirs, Neil and Wheater, Stuart (1999) Specifying distributed system services. British Telecom technology journal, 17 (2). pp. 126-136. ISSN 0265-0193. (doi:https://doi.org/10.1023/A:1009650219559) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Book section

Selvarajah, Kirusnapillai and Arief, Budi and Tully, Alan and Blythe, Phil (2012) Deploying Wireless Sensor Devices in Intelligent Transportation System Applications. In: Abdel-Rahim, A, ed. Intelligent Transportation Systems. InTech. (Full text available)
[img]
Preview

Iliasov, Alexei and Arief, Budi and Romanovsky, Alexander (2009) Step-wise development of resilient ambient campus scenarios. In: Butler, Michael and Jones, Cliff and Romanovsky, Alexander and Troubitsyna, Elena, eds. Methods, Models and Tools for Fault Tolerance. Lecture Notes in Computer Science . Springer, pp. 297-323. ISBN 03029743. (doi:https://doi.org/10.1007/978-3-642-00867-2_14) (Full text available)
[img]
Preview

Arief, Budi and Iliasov, Alexei and Romanovsky, Alexander (2007) On developing open mobile fault tolerant agent systems. In: Choren, R. and Garcia, A. and Giese, H. and Leung, H.-f. and Lucena, C. and Romanovsky, A., eds. Software Engineering for Multi-Agent Systems V. Lecture Notes in Computer Science . Springer, Shanghai, pp. 21-40. ISBN 978-3-540-73130-6. (doi:https://doi.org/10.1007/978-3-540-73131-3_2) (Full text available)
[img]
Preview

Bryans, Jeremy and Arief, Budi (2006) Security implications of structure. In: Besnard, Denis and Gacek, Cristina and Jones, Cliff, eds. Structure for Dependability: Computer-Based Systems from an Interdisciplinary Perspective. Springer London, London, pp. 217-227. ISBN 978-1-84628-110-5. E-ISBN 978-1-84628-111-2. (doi:https://doi.org/10.1007/1-84628-111-3_11) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Monograph

Emms, Martin and Arief, Budi and Hannon, Joseph and van Moorsel, Aad (2013) POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards. Technical report. CS-TR-1386 (Full text available)
[img]
Preview

Emms, Martin and Arief, Budi and Defty, Troy and Hannon, Joseph and Hao, Feng and van Moorsel, Aad (2012) The Dangers of Verify PIN on Contactless Cards. Technical report. CS-TR-1332 (Full text available)
[img]
Preview

van Moorsel, Aad and Emms, Martin and Rendall, Gemma and Arief, Budi (2011) Digital Strategy for the Social Inclusion of Survivors of Domestic Violence. Technical report. CS-TR-1277 (Full text available)
[img]
Preview

Arief, Budi and Coleman, Joey and Greathead, David (2010) How Paranoid Are You?: Issues in Location Information of Ambient Systems. Technical report. CS-TR-1219 (Full text available)
[img]
Preview

Besnard, Denis and Arief, Budi (2003) Computer security impaired by legal users. Technical report. CS-TR-794 (Full text available)
[img]
Preview

Arief, Budi and Besnard, Denis (2003) Technical and Human Issues in Computer-Based Systems Security. Technical report. CS-TR-790 (Full text available)
[img]
Preview

Arief, Budi and Bosio, Diana and Gacek, Cristina and Rouncefield, Mark (2002) Dependability Issues in Open Source Software - DIRC Project Activity 5 Final Report. Technical report. CS-TR-760 (Full text available)
[img]
Preview

Conference or workshop item

McBride, Jack and Hernandez-Castro, Julio C. and Arief, Budi (2018) Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override. In: Proceedings of the 2017 International Workshop on Secure Internet of Things SIoT 2017. IEEE ISBN 978-1-5386-4541-3. (doi:https://doi.org/10.1109/SIoT.2017.00009) (Full text available)
[img]
Preview

McBride, Jack and Arief, Budi and Hernandez-Castro, Julio C. (2018) Security Analysis of Contiki IoT Operating System. In: ACM Digital Library. 2018 International Conference on Embedded Wireless Systems and Networks (EWSN). pp. 278-283. ISBN 978-0-9949886-2-1. (Full text available)
[img]
Preview

McGough, Andrew Stephen and Wall, David and Brennan, John and Theodoropoulos, Georgios and Ruck-Keene, Ed and Arief, Budi and Gamble, Carl and Fitzgerald, John and van Moorsel, Aad and Alwis, Sujeewa (2015) Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). In: MIST '15 Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats. 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST’15). ACM, New York, NY, USA pp. 1-12. ISBN 978-1-4503-3824-0. (doi:https://doi.org/10.1145/2808783.2808785) (Full text available)
[img]
Preview

Anderson, Tom and Arief, Budi and Basit, Tehmina and Borup, Rosie and Rutherford, Louise (2015) How To Succeed in Cyberspace. In: ICERI2015: 8TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION. ICERI Proceedings. pp. 6074-6083. ISBN 978-84-608-2657-6. (doi:WOS:000377304006024) (Full text available)
[img]
Preview

Emms, Martin and Arief, Budi and Freitas, Leo and Hannon, Joseph and van Moorsel, Aad (2014) Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN. In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). CCS '14. ACM, New York, NY, USA pp. 716-726. ISBN 978-1-4503-2957-6. (doi:https://doi.org/10.1145/2660267.2660312) (Full text available)
[img]
Preview

Arief, Budi and Coopamootoo, Kovila P.L. and Emms, Martin and van Moorsel, Aad (2014) Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse. In: WPES '14 Proceedings of the 13th Workshop on Privacy in the Electronic Society. WPES '14. ACM pp. 201-204. ISBN 978-1-4503-3148-7. (doi:https://doi.org/10.1145/2665943.2665965) (Full text available)
[img]
Preview

Emms, Martin and Arief, Budi and van Moorsel, Aad (2014) Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. In: Preneel, Bart and Ikonomou, Demosthenes, eds. APF 2012: Privacy Technologies and Policy. Lecture Notes in Computer Science. Springer Berlin Heidelberg pp. 203-214. ISBN 978-3-642-54068-4. E-ISBN 978-3-642-54069-1. (doi:https://doi.org/10.1007/978-3-642-54069-1_13) (Full text available)
[img]
Preview

Emms, Martin and Arief, Budi and Little, Nicholas and van Moorsel, Aad (2013) Risks of Offline Verify PIN on Contactless Cards. In: Sadeghi, Ahmad-Reza, ed. Lecture Notes in Computer Science. Lecture Notes in Computer Science LNCS, 7859. Springer Berlin Heidelberg, Berlin pp. 313-321. ISBN 978-3-642-39883-4. E-ISBN 978-3-642-39884-1. (doi:https://doi.org/10.1007/978-3-642-39884-1_26) (Full text available)
[img]
Preview

Greathead, David and Coventry, Lynne and Arief, Budi and van Moorsel, Aad (2012) Deriving Requirements for an Online Community Interaction Scheme: Indications from Older Adults. In: ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2012) Extended Abstracts on Human Factors in Computing Systems. , Austin, Texas, USA pp. 1541-1546. ISBN 978-1-4503-1016-1. (doi:https://doi.org/10.1145/2212776.2223669) (Full text available)
[img]
Preview

Arief, Budi and Greathead, David and Coventry, Lynne and van Moorsel, Aad (2011) Towards the Implementation of an Internet-based Neighbourhood Watch Scheme. In: 3rd International Conference on Computational Aspects of Social Networks (CASoN), 19-22 October 2011, Salamanca, Spain. (Full text available)
[img]
Preview

Arief, Budi and von Arnim, Axel (2008) TRACKSS approach to improving road safety through sensors collaboration on vehicle and in infrastructure. In: Vehicular Technology Conference, 2008. VTC 2008-Fall. IEEE 68th. IEEE ISBN 978-1-4244-1722-3. (doi:https://doi.org/10.1109/VETECF.2008.439) (Full text available)
[img]
Preview

von Arnim, Axel and Arief, Budi and Fusee, Antoine (2008) Cooperative Road Sign and Traffic Light Using Near Infrared Identification and Zigbee Smartdust Technologies. In: 15th World Congress on Intelligent Transport Systems and ITS America Annual Meeting 2008, 16-20 Nov 2008, New York, NY. (Full text available)
[img]
Preview

Arief, Budi and Blythe, Phil and Fairchild, Richard and Selvarajah, Kirusnapillai and Tully, Alan (2008) Integrating Smartdust into Intelligent Transportation System. In: 10th International Conference on Application of Advanced Technologies in Transportation (AATT 2008), 27-31 May 2008, Athens, Greece. (Full text available)
[img]
Preview

Iliasov, Alexei and Romanovsky, Alexander and Arief, Budi and Laibinis, Linas and Troubitsyna, Elena (2007) On rigorous design and implementation of fault tolerant ambient systems. In: 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing,. pp. 141-145. ISBN 978-0-7695-2765-9. (doi:https://doi.org/10.1109/ISORC.2007.46) (Full text available)
[img]
Preview

Arief, Budi and Iliasov, Alexei and Romanovsky, Alexander (2007) Rigorous Development of Ambient Campus Applications that can Recover from Errors. In: Workshop on Methods, Models and Tools for Fault-Tolerance (MeMoT 2007), at the International Conference on Integrated Formal Methods 2007 (IFM 2007), 3 July 2007. (Full text available)
[img]
Preview

Iliasov, Alexei and Romanovsky, Alexander and Arief, Budi and Laibinis, Linas and Troubitsyna, Elena (2007) A framework for open distributed system design. In: International Computer Software and Applications Conference. pp. 658-668. ISBN 978-0-7695-2870-0. (doi:https://doi.org/10.1109/COMPSAC.2007.23) (Full text available)
[img]
Preview

Arief, Budi and Iliasov, Alexei and Romanovsky, Alexander (2006) On using the CAMA framework for developing open mobile fault tolerant agent systems. In: Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems. pp. 29-36. ISBN 978-1-59593-395-9. (doi:https://doi.org/10.1145/1138063.1138070) (Full text available)
[img]
Preview

Grosso, Sergio and Tully, Alan and Arief, Budi and Marques, Antonio and Matoses, Manuel Serrano (2006) Collaborations among in-vehicle and infrastructure-based sensing technology for automotive applications: The EMMA and TRACKSS EU Projects. In: IET Seminar on RFID and Electronic Vehicle Identification in Road Transport. , Newcastle pp. 57-65. ISBN 978-0-86341-734-4. (doi:https://doi.org/10.1049/ic:20060135) (Full text available)
[img]
Preview

Gacek, Cristina and Lawrie, Tony and Arief, Budi (2002) Interdisciplinary Insights on Open Source. In: Proceedings of the Open Source Software Development Workshop, 25th - 26th February, 2002, Newcastle upon Tyne, U.K.. (Full text available)
[img]
Preview

Arief, Budi and Gacek, Cristina and Lawrie, Tony (2001) Software Architectures and Open Source Software – Where can Research Leverage the Most? In: ICSE '01 Proceedings of the 23rd International Conference on Software Engineering. ACM pp. 3-5. ISBN 0-7695-1050-7. (Full text available)
[img]
Preview

Arief, Budi and Speirs, Neil (2000) A UML tool for an automatic generation of simulation programs. In: WOSP '00 Proceedings of the 2nd international workshop on Software and performance. pp. 71-76. ISBN 1-58113-195-X. (doi:https://doi.org/10.1145/350391.350408) (Full text available)
[img]
Preview

Speirs, Neil and Arief, Budi (2000) Simulation of a telecommunication system using simML. In: Proceedings of the IEEE 26th Annual Simulation Symposium, Washington. (SS 2000) Proceedings. 33rd Annual Simulation Symposium, 2000. IEEE Computer Society Press, Los Alamitos, CA, United States, Washington, DC, USA pp. 131-138. ISBN 0-7695-0598-8. (doi:https://doi.org/10.1109/SIMSYM.2000.844909) (Full text available)
[img]
Preview

Arief, Budi and Speirs, Neil (1999) Automatic Generation of Distributed System Simulations from UML. In: 13th European Simulation Multiconference (ESM'99), 1-4 June, 1999, Warsaw, Poland. (Full text available)
[img]
Preview

Arief, Budi and Speirs, Neil (1999) Simulation Generation from UML Like Specifications. In: IASTED Applied Modelling and Simulation (AMS'99), Cairns, Australia. (Full text available)
[img]
Preview

This list was generated on Sun May 26 17:31:55 2019 BST.