default search action
Budi Arief
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c33]Yichao Wang, Budi Arief, Julio C. Hernandez-Castro:
Analysis of Security Mechanisms of Dark Web Markets. EICC 2024: 120-127 - [c32]Meryem Berfin Ozkok, Baturay Birinci, Orçun Çetin, Budi Arief, Julio C. Hernandez-Castro:
Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot Logs. EICC 2024: 128-135 - [c31]Adel Elzemity, Budi Arief:
Privacy Threats and Countermeasures in Federated Learning for Internet of Things: A Systematic Review. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 331-338 - [i3]Adel Elzemity, Budi Arief:
Privacy Threats and Countermeasures in Federated Learning for Internet of Things: A Systematic Review. CoRR abs/2407.18096 (2024) - 2023
- [c30]Omer Said Ozturk, Emre Ekmekcioglu, Orçun Çetin, Budi Arief, Julio C. Hernandez-Castro:
New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools? EICC 2023: 13-18 - [c29]Yichao Wang, Budi Arief, Virginia Nunes Leal Franqueira, Anna Grace Coates, Caoilte Ó Ciardha:
Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned. EICC 2023: 59-64 - [c28]Lena Yuryna Connolly, Hervé Borrion, Budi Arief, Sanaa Kaddoura:
Applying Neutralisation Theory to Better Understand Ransomware Offenders. EuroS&P Workshops 2023: 177-182 - [c27]Yichao Wang, Budi Arief, Julio C. Hernandez-Castro:
Dark Ending: What Happens when a Dark Web Market Closes down. ICISSP 2023: 106-117 - [c26]Yichao Wang, Sophia Roscoe, Budi Arief, Lena Yuryna Connolly, Hervé Borrion, Sanaa Kaddoura:
The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities. SocialSec 2023: 149-163 - [e1]Budi Arief, Anna Monreale, Michael Sirivianos, Shujun Li:
Security and Privacy in Social Networks and Big Data - 9th International Symposium, SocialSec 2023, Canterbury, UK, August 14-16, 2023, Proceedings. Lecture Notes in Computer Science 14097, Springer 2023, ISBN 978-981-99-5176-5 [contents] - [i2]Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief:
The Use of Public Data and Free Tools in National CSIRTs' Operational Practices: A Systematic Literature Review. CoRR abs/2306.07988 (2023) - 2022
- [c25]Sharifah Roziah Binti Mohd Kassim, Solahuddin Bin Shamsuddin, Shujun Li, Budi Arief:
How National CSIRTs Operate: Personal Observations and Opinions from MyCERT. DSC 2022: 1-2 - 2021
- [j9]Francesca Stevens, Jason R. C. Nurse, Budi Arief:
Cyber Stalking, Cyber Harassment, and Adult Mental Health: A Systematic Review. Cyberpsychology Behav. Soc. Netw. 24(6): 367-376 (2021) - [j8]Burak Filiz, Budi Arief, Orçun Çetin, Julio C. Hernandez-Castro:
On the Effectiveness of Ransomware Decryption Tools. Comput. Secur. 111: 102469 (2021) - [j7]Yagiz Yilmaz, Orçun Çetin, Budi Arief, Julio C. Hernandez-Castro:
Investigating the impact of ransomware splash screens. J. Inf. Secur. Appl. 61: 102934 (2021) - [c24]Yichao Wang, Budi Arief, Julio César Hernández Castro:
Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets. eCrime 2021: 1-13 - [c23]Calvin Brierley, Budi Arief, David J. Barnes, Julio C. Hernandez-Castro:
Industrialising Blackmail: Privacy Invasion Based IoT Ransomware. NordSec 2021: 72-92 - 2020
- [c22]Calvin Brierley, Jamie Pont, Budi Arief, David J. Barnes, Julio C. Hernandez-Castro:
PaperW8: an IoT bricking ransomware proof of concept. ARES 2020: 82:1-82:10 - [c21]Budi Arief, Andy Periam, Orçun Çetin, Julio C. Hernandez-Castro:
Using Eyetracker to Find Ways to Mitigate Ransomware. ICISSP 2020: 448-456 - [c20]Jamie Pont, Budi Arief, Julio C. Hernandez-Castro:
Why Current Statistical Approaches to Ransomware Detection Fail. ISC 2020: 199-216 - [c19]Calvin Brierley, Jamie Pont, Budi Arief, David J. Barnes, Julio C. Hernandez-Castro:
Persistence in Linux-Based IoT Malware. NordSec 2020: 3-19 - [c18]Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, Vassilios G. Vassilakis:
Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms. AIChallengeIoT@SenSys 2020: 62-68 - [i1]Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, Vassilios G. Vassilakis:
Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms. CoRR abs/2010.08466 (2020)
2010 – 2019
- 2019
- [c17]Ali Hariri, Nicolas Giannelos, Budi Arief:
Selective Forwarding Attack on IoT Home Security Kits. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 360-373 - [c16]Jamie Pont, Osama Abu Oun, Calvin Brierley, Budi Arief, Julio C. Hernandez-Castro:
A Roadmap for Improving the Impact of Anti-ransomware Research. NordSec 2019: 137-154 - [c15]Edward Knight, Sam Lord, Budi Arief:
Lock Picking in the Era of Internet of Things. TrustCom/BigDataSE 2019: 835-842 - 2018
- [c14]Jack McBride, Budi Arief, Julio C. Hernandez-Castro:
Security Analysis of Contiki IoT Operating System. EWSN 2018: 278-283 - 2017
- [j6]Mohammed Aamir Ali, Budi Arief, Martin Emms, Aad P. A. van Moorsel:
Does the Online Card Payment Landscape Unwittingly Facilitate Fraud? IEEE Secur. Priv. 15(2): 78-86 (2017) - [c13]Jack McBride, Julio C. Hernandez-Castro, Budi Arief:
Earworms Make Bad Passwords: An Analysis of the Nokē Smart Lock Manual Override. SIoT 2017: 30-39 - 2015
- [j5]Budi Arief, Mohd Azeem Bin Adzmi, Thomas Gross:
Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1-Attackers. IEEE Secur. Priv. 13(1): 71-76 (2015) - [j4]Budi Arief, Mohd Azeem Bin Adzmi:
Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2-Defenders and Victims. IEEE Secur. Priv. 13(2): 84-88 (2015) - [j3]Andrew Stephen McGough, Budi Arief, Carl Gamble, David Wall, John Brennan, John S. Fitzgerald, Aad P. A. van Moorsel, Sujeewa Alwis, Georgios Theodoropoulos, Ed Ruck-Keene:
Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(4): 3-46 (2015) - [c12]Andrew Stephen McGough, David Wall, John Brennan, Georgios Theodoropoulos, Ed Ruck-Keene, Budi Arief, Carl Gamble, John S. Fitzgerald, Aad P. A. van Moorsel, Sujeewa Alwis:
Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). MIST@CCS 2015: 1-12 - 2014
- [c11]Martin Emms, Budi Arief, Leo Freitas, Joseph Hannon, Aad P. A. van Moorsel:
Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN. CCS 2014: 716-726 - [c10]Budi Arief, Kovila P. L. Coopamootoo, Martin Emms, Aad P. A. van Moorsel:
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse. WPES 2014: 201-204 - 2013
- [c9]Martin Emms, Budi Arief, Nicholas Little, Aad P. A. van Moorsel:
Risks of Offline Verify PIN on Contactless Cards. Financial Cryptography 2013: 313-321 - 2012
- [c8]Martin Emms, Budi Arief, Aad P. A. van Moorsel:
Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. APF 2012: 203-214 - [c7]David Greathead, Lynne M. Coventry, Budi Arief, Aad P. A. van Moorsel:
Deriving requirements for an online community interaction scheme: indications from older adults. CHI Extended Abstracts 2012: 1541-1546 - 2011
- [c6]Budi Arief, Aad P. A. van Moorsel, David Greathead, Lynne M. Coventry:
Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies. CASoN 2011: 25-30
2000 – 2009
- 2009
- [p1]Alexei Iliasov, Budi Arief, Alexander B. Romanovsky:
Step-Wise Development of Resilient Ambient Campus Scenarios. Methods, Models and Tools for Fault Tolerance 2009: 297-323 - 2008
- [c5]Budi Arief, Axel von Arnim:
TRACKSS Approach to Improving Road Safety through Sensors Collaboration on Vehicle and in Infrastructure. VTC Fall 2008: 1-5 - 2007
- [c4]Alexei Iliasov, Alexander B. Romanovsky, Budi Arief:
A Framework for Open Distributed System Design. COMPSAC (2) 2007: 658-674 - [c3]Alexei Iliasov, Alexander B. Romanovsky, Budi Arief, Linas Laibinis, Elena Troubitsyna:
On Rigorous Design and Implementation of Fault Tolerant Ambient Systems. ISORC 2007: 141-145 - 2006
- [c2]Budi Arief, Alexei Iliasov, Alexander B. Romanovsky:
On Developing Open Mobile Fault Tolerant Agent Systems. SELMAS (LNCS) 2006: 21-40 - [c1]Budi Arief, Alexei Iliasov, Alexander B. Romanovsky:
On using the CAMA framework for developing open mobile fault tolerant agent systems. SELMAS 2006: 29-36 - 2004
- [j2]Denis Besnard, Budi Arief:
Computer security impaired by legitimate users. Comput. Secur. 23(3): 253-264 (2004) - [j1]Cristina Gacek, Budi Arief:
The Many Meanings of Open Source. IEEE Softw. 21(1): 34-40 (2004)
Coauthor Index
aka: Julio C. Hernandez-Castro
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint