Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Pete Burnap
@article{DBLP:journals/corr/abs-2401-12990, author = {Lowri Williams and Eirini Anthi and Laura Arman and Pete Burnap}, title = {Topic Modelling: Going Beyond Token Outputs}, journal = {CoRR}, volume = {abs/2401.12990}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.12990}, doi = {10.48550/ARXIV.2401.12990}, eprinttype = {arXiv}, eprint = {2401.12990}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-12990.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-01670, author = {Lowri Williams and Eirini Anthi and Pete Burnap}, title = {A Scalable and Automated Framework for Tracking the likely Adoption of Emerging Technologies}, journal = {CoRR}, volume = {abs/2402.01670}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.01670}, doi = {10.48550/ARXIV.2402.01670}, eprinttype = {arXiv}, eprint = {2402.01670}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-01670.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RotibiSBT23, author = {Ayodeji O. Rotibi and Neetesh Saxena and Pete Burnap and Alex Tarter}, title = {Extended Dependency Modeling Technique for Cyber Risk Identification in {ICS}}, journal = {{IEEE} Access}, volume = {11}, pages = {37229--37242}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3263671}, doi = {10.1109/ACCESS.2023.3263671}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RotibiSBT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AgyepongCRB23, author = {Enoch Agyepong and Yulia Cherdantseva and Philipp Reinecke and Pete Burnap}, title = {A systematic method for measuring the performance of a cyber security operations centre analyst}, journal = {Comput. Secur.}, volume = {124}, pages = {102959}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102959}, doi = {10.1016/J.COSE.2022.102959}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AgyepongCRB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MohammedARSB23, author = {Abubakar Sadiq Mohammed and Eirini Anthi and Omer F. Rana and Neetesh Saxena and Pete Burnap}, title = {Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication}, journal = {Comput. Secur.}, volume = {124}, pages = {103007}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103007}, doi = {10.1016/J.COSE.2022.103007}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MohammedARSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShakedCBM23, author = {Avi Shaked and Yulia Cherdantseva and Pete Burnap and Peter Maynard}, title = {Operations-informed incident response playbooks}, journal = {Comput. Secur.}, volume = {134}, pages = {103454}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103454}, doi = {10.1016/J.COSE.2023.103454}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ShakedCBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/NafeesSCGB23, author = {Muhammad Nouman Nafees and Neetesh Saxena and Alvaro A. C{\'{a}}rdenas and Santiago Grijalva and Pete Burnap}, title = {Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: {A} Review}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {10}, pages = {215:1--215:36}, year = {2023}, url = {https://doi.org/10.1145/3565570}, doi = {10.1145/3565570}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/NafeesSCGB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/IkwuGJBW23, author = {Ruth Ikwu and Luca Giommoni and Amir Javed and Pete Burnap and Matthew L. Williams}, title = {Digital fingerprinting for identifying malicious collusive groups on Twitter}, journal = {J. Cybersecur.}, volume = {9}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/cybsec/tyad014}, doi = {10.1093/CYBSEC/TYAD014}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/IkwuGJBW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cps/AlrowailiSSCB23, author = {Yazeed Alrowaili and Neetesh Saxena and Anurag Srivastava and Mauro Conti and Pete Burnap}, title = {A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification}, journal = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.}, volume = {8}, number = {3}, pages = {160--185}, year = {2023}, url = {https://doi.org/10.1049/cps2.12059}, doi = {10.1049/CPS2.12059}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-cps/AlrowailiSSCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/AsiriSGB23, author = {Mohammed Asiri and Neetesh Saxena and Rigel Gjomemo and Pete Burnap}, title = {Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: {A} Security Perspective}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {7}, number = {2}, pages = {15:1--15:33}, year = {2023}, url = {https://doi.org/10.1145/3587255}, doi = {10.1145/3587255}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcps/AsiriSGB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NafeesSB23, author = {Muhammad Nouman Nafees and Neetesh Saxena and Pete Burnap}, editor = {Jianying Zhou and Lejla Batina and Zengpeng Li and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Mohammad Ashiqur Rahman and Jun Shao and Masaki Shimaoka and Ezekiel O. Soremekun and Chunhua Su and Je Sen Teh and Aleksei Udovenko and Cong Wang and Leo Yu Zhang and Yury Zhauniarovich}, title = {{POSTER:} Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13907}, pages = {700--704}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41181-6\_43}, doi = {10.1007/978-3-031-41181-6\_43}, timestamp = {Mon, 16 Oct 2023 19:47:08 +0200}, biburl = {https://dblp.org/rec/conf/acns/NafeesSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/AsiriSB23, author = {Mohammed Asiri and Neetesh Saxena and Pete Burnap}, title = {{ARCSG:} Advancing Resilience of Cyber-Physical Smart Grid: An Integrated Co-Simulation Approach Incorporating Indicators of Compromise}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023 - Workshops, Delft, Netherlands, July 3-7, 2023}, pages = {370--378}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSPW59978.2023.00047}, doi = {10.1109/EUROSPW59978.2023.00047}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/AsiriSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/KayanRBP23, author = {Hakan Kayan and Omer F. Rana and Pete Burnap and Charith Perera}, title = {Artifact: {CASPER:} Context-Aware Anomaly Detection System for Industrial Robotic Arms}, booktitle = {{IEEE} International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2023, Atlanta, GA, USA, March 13-17, 2023}, pages = {3--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/PerComWorkshops56833.2023.10150236}, doi = {10.1109/PERCOMWORKSHOPS56833.2023.10150236}, timestamp = {Tue, 27 Jun 2023 10:38:32 +0200}, biburl = {https://dblp.org/rec/conf/percom/KayanRBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/KayanRBP23a, author = {Hakan Kayan and Omer F. Rana and Pete Burnap and Charith Perera}, title = {{CASPER:} Context-Aware Anomaly Detection System for Industrial Robotic Arms}, booktitle = {{IEEE} International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2023, Atlanta, GA, USA, March 13-17, 2023}, pages = {282--284}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/PerComWorkshops56833.2023.10150354}, doi = {10.1109/PERCOMWORKSHOPS56833.2023.10150354}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/percom/KayanRBP23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/KayanRBP23, author = {Hakan Kayan and Omer Farooq Rana and Pete Burnap and Charith Perera}, title = {{CASPER:} Context-Aware Anomaly Detection System for Industrial Robotic Arms}, publisher = {{IEEE} DataPort}, year = {2023}, month = jan, howpublished = {\url{https://doi.org/10.21227/q2e6-t883}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/q2e6-t883}, doi = {10.21227/Q2E6-T883}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/KayanRBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-04926, author = {Sanyam Vyas and John Hannay and Andrew Bolton and Pete Burnap}, title = {Automated Cyber Defence: {A} Review}, journal = {CoRR}, volume = {abs/2303.04926}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.04926}, doi = {10.48550/ARXIV.2303.04926}, eprinttype = {arXiv}, eprint = {2303.04926}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-04926.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-18165, author = {Baskoro Adi Pratomo and Toby Jackson and Pete Burnap and Andrew Hood and Eirini Anthi}, title = {Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection}, journal = {CoRR}, volume = {abs/2310.18165}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.18165}, doi = {10.48550/ARXIV.2310.18165}, eprinttype = {arXiv}, eprint = {2310.18165}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-18165.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AliwaRPB21, author = {Emad Aliwa and Omer F. Rana and Charith Perera and Peter Burnap}, title = {Cyberattacks and Countermeasures for In-Vehicle Networks}, journal = {{ACM} Comput. Surv.}, volume = {54}, number = {1}, pages = {21:1--21:37}, year = {2022}, url = {https://doi.org/10.1145/3431233}, doi = {10.1145/3431233}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/AliwaRPB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/KayanNRBP22, author = {Hakan Kayan and Matthew Nunes and Omer F. Rana and Pete Burnap and Charith Perera}, title = {Cybersecurity of Industrial Cyber-Physical Systems: {A} Review}, journal = {{ACM} Comput. Surv.}, volume = {54}, number = {11s}, pages = {229:1--229:35}, year = {2022}, url = {https://doi.org/10.1145/3510410}, doi = {10.1145/3510410}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/KayanNRBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NunesBRL22, author = {Matthew Nunes and Pete Burnap and Philipp Reinecke and Kaelon Lloyd}, title = {Bane or Boon: Measuring the effect of evasive malware on system call classifiers}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103202}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103202}, doi = {10.1016/J.JISA.2022.103202}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NunesBRL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlorainiJRB22, author = {Fatimah Aloraini and Amir Javed and Omer F. Rana and Pete Burnap}, title = {Adversarial machine learning in IoT from an insider point of view}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103341}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103341}, doi = {10.1016/J.JISA.2022.103341}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AlorainiJRB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/snam/AlorainyBLWG22, author = {Wafa Alorainy and Pete Burnap and Han Liu and Matthew L. Williams and Luca Giommoni}, title = {Disrupting networks of hate: characterising hateful networks and removing critical nodes}, journal = {Soc. Netw. Anal. Min.}, volume = {12}, number = {1}, pages = {27}, year = {2022}, url = {https://doi.org/10.1007/s13278-021-00818-z}, doi = {10.1007/S13278-021-00818-Z}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/snam/AlorainyBLWG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/snam/JavedIBGW22, author = {Amir Javed and Ruth Ikwu and Pete Burnap and Luca Giommoni and Matthew L. Williams}, title = {Disrupting drive-by download networks on Twitter}, journal = {Soc. Netw. Anal. Min.}, volume = {12}, number = {1}, pages = {117}, year = {2022}, url = {https://doi.org/10.1007/s13278-022-00944-2}, doi = {10.1007/S13278-022-00944-2}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/snam/JavedIBGW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/JavedLBR22, author = {Amir Javed and Mike Lakoju and Pete Burnap and Omer F. Rana}, title = {Security analytics for real-time forecasting of cyberattacks}, journal = {Softw. Pract. Exp.}, volume = {52}, number = {3}, pages = {788--804}, year = {2022}, url = {https://doi.org/10.1002/spe.2822}, doi = {10.1002/SPE.2822}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/JavedLBR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/MohammedRBRA22, author = {Abubakar Sadiq Mohammed and Philipp Reinecke and Pete Burnap and Omer F. Rana and Eirini Anthi}, title = {Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems {(ICPS)} Perspective}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {6}, number = {3}, pages = {28:1--28:27}, year = {2022}, url = {https://doi.org/10.1145/3548691}, doi = {10.1145/3548691}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcps/MohammedRBRA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ShakedCB22, author = {Avi Shaked and Yulia Cherdantseva and Pete Burnap}, title = {Model-Based Incident Response Playbooks}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {26:1--26:7}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3538976}, doi = {10.1145/3538969.3538976}, timestamp = {Fri, 19 Aug 2022 09:45:12 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ShakedCB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NafeesSB22, author = {Muhammad Nouman Nafees and Neetesh Saxena and Pete Burnap}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Poster: Physics-Informed Augmentation for Contextual Anomaly Detection in Smart Grid}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3427--3429}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3563533}, doi = {10.1145/3548606.3563533}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NafeesSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/NafeesSB22, author = {Muhammad Nouman Nafees and Neetesh Saxena and Pete Burnap}, title = {On The Efficacy of Physics-Informed Context-Based Anomaly Detection for Power Systems}, booktitle = {{IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2022, Singapore, October 25-28, 2022}, pages = {374--379}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SmartGridComm52983.2022.9961034}, doi = {10.1109/SMARTGRIDCOMM52983.2022.9961034}, timestamp = {Fri, 09 Dec 2022 16:50:07 +0100}, biburl = {https://dblp.org/rec/conf/smartgridcomm/NafeesSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-12179, author = {Abubakar Sadiq Mohammed and Philipp Reinecke and Pete Burnap and Omer F. Rana and Eirini Anthi}, title = {Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems {(ICPS)} Perspective}, journal = {CoRR}, volume = {abs/2202.12179}, year = {2022}, url = {https://arxiv.org/abs/2202.12179}, eprinttype = {arXiv}, eprint = {2202.12179}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-12179.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-08141, author = {Petar Radanliev and David De Roure and Pete Burnap and Omar Santos}, title = {Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things}, journal = {CoRR}, volume = {abs/2212.08141}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.08141}, doi = {10.48550/ARXIV.2212.08141}, eprinttype = {arXiv}, eprint = {2212.08141}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-08141.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AnthiWJB21, author = {Eirini Anthi and Lowri Williams and Amir Javed and Pete Burnap}, title = {Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks}, journal = {Comput. Secur.}, volume = {108}, pages = {102352}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102352}, doi = {10.1016/J.COSE.2021.102352}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AnthiWJB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/AnthiWBJ21, author = {Eirini Anthi and Lowri Williams and Pete Burnap and Kevin Jones}, title = {A three-tiered intrusion detection system for industrial control systems}, journal = {J. Cybersecur.}, volume = {7}, number = {1}, year = {2021}, url = {https://doi.org/10.1093/cybsec/tyab006}, doi = {10.1093/CYBSEC/TYAB006}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/AnthiWBJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/diot/LakojuJRBAC21, author = {Mike Lakoju and Amir Javed and Omer F. Rana and Pete Burnap and Samuelson Tijesunimi Atiba and Soumaya Cherkaoui}, title = {"Chatty Devices" and edge-based activity classification}, journal = {Discov. Internet Things}, volume = {1}, number = {1}, year = {2021}, url = {https://doi.org/10.1007/s43926-021-00004-9}, doi = {10.1007/S43926-021-00004-9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/diot/LakojuJRBAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AnthiWRBW21, author = {Eirini Anthi and Lowri Williams and Matilda Rhode and Pete Burnap and Adam Wedgbury}, title = {Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102717}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102717}, doi = {10.1016/J.JISA.2020.102717}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AnthiWRBW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rss/RadanlievRBS21, author = {Petar Radanliev and David De Roure and Pete Burnap and Omar Santos}, title = {Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things}, journal = {Rev. Socionetwork Strateg.}, volume = {15}, number = {2}, pages = {381--411}, year = {2021}, url = {https://doi.org/10.1007/s12626-021-00086-5}, doi = {10.1007/S12626-021-00086-5}, timestamp = {Fri, 04 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/rss/RadanlievRBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LakojuAKBB21, author = {Mike Lakoju and Nemitari Ajienka and Mojtaba Ahmadieh Khanesar and Pete Burnap and David T. Branson}, title = {Unsupervised Learning for Product Use Activity Recognition: An Exploratory Study of a "Chatty Device"}, journal = {Sensors}, volume = {21}, number = {15}, pages = {4991}, year = {2021}, url = {https://doi.org/10.3390/s21154991}, doi = {10.3390/S21154991}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/LakojuAKBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NafeesSB21, author = {Muhammad Nouman Nafees and Neetesh Saxena and Pete Burnap}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Optimized Predictive Control for {AGC} Cyber Resiliency}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2450--2452}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485358}, doi = {10.1145/3460120.3485358}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NafeesSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-03564, author = {Hakan Kayan and Matthew Nunes and Omer F. Rana and Pete Burnap and Charith Perera}, title = {Cybersecurity of Industrial Cyber-Physical Systems: {A} Review}, journal = {CoRR}, volume = {abs/2101.03564}, year = {2021}, url = {https://arxiv.org/abs/2101.03564}, eprinttype = {arXiv}, eprint = {2101.03564}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-03564.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SaxenaTGBK20, author = {Neetesh Saxena and Ieuan Thomas and Prosanta Gope and Pete Burnap and Neeraj Kumar}, title = {PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs}, journal = {Computer}, volume = {53}, number = {7}, pages = {29--44}, year = {2020}, url = {https://doi.org/10.1109/MC.2020.2989238}, doi = {10.1109/MC.2020.2989238}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SaxenaTGBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/RadanlievRPNMSM20, author = {Petar Radanliev and David De Roure and Kevin R. Page and Jason R. C. Nurse and Rafael Mantilla Montalvo and Omar Santos and La Treall Maddox and Pete Burnap}, title = {Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains}, journal = {Cybersecur.}, volume = {3}, number = {1}, pages = {13}, year = {2020}, url = {https://doi.org/10.1186/s42400-020-00052-8}, doi = {10.1186/S42400-020-00052-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/RadanlievRPNMSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PratomoBT20, author = {Baskoro Adi Pratomo and Pete Burnap and George Theodorakopoulos}, title = {{BLATTA:} Early Exploit Detection on Network Traffic with Recurrent Neural Networks}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {8826038:1--8826038:15}, year = {2020}, url = {https://doi.org/10.1155/2020/8826038}, doi = {10.1155/2020/8826038}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/PratomoBT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/JavedBWR20, author = {Amir Javed and Pete Burnap and Matthew L. Williams and Omer F. Rana}, title = {Emotions Behind Drive-by Download Propagation on Twitter}, journal = {{ACM} Trans. Web}, volume = {14}, number = {4}, pages = {16:1--16:26}, year = {2020}, url = {https://doi.org/10.1145/3408894}, doi = {10.1145/3408894}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tweb/JavedBWR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl-trac/LiuBAW20, author = {Han Liu and Pete Burnap and Wafa Alorainy and Matthew L. Williams}, editor = {Ritesh Kumar and Atul Kr. Ojha and Bornini Lahiri and Marcos Zampieri and Shervin Malmasi and Vanessa Murdock and Daniel Kadar}, title = {Scmhl5 at {TRAC-2} Shared Task on Aggression Identification: Bert Based Ensemble Learning Approach}, booktitle = {Proceedings of the Second Workshop on Trolling, Aggression and Cyberbullying, TRAC@LREC 2020, Marseille, France, May 2020}, pages = {62--68}, publisher = {European Language Resources Association {(ELRA)}}, year = {2020}, url = {https://aclanthology.org/2020.trac-1.10/}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl-trac/LiuBAW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NafeesSBC20, author = {Muhammad Nouman Nafees and Neetesh Saxena and Pete Burnap and Bong Jun Choi}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in Industrial Context}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {2117--2119}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3420022}, doi = {10.1145/3372297.3420022}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NafeesSBC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/AgyepongCRB20, author = {Enoch Agyepong and Yulia Cherdantseva and Philipp Reinecke and Pete Burnap}, title = {Towards a Framework for Measuring the Performance of a Security Operations Center Analyst}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138872}, doi = {10.1109/CYBERSECURITY49315.2020.9138872}, timestamp = {Fri, 24 Jul 2020 16:51:21 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/AgyepongCRB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-05005, author = {Eirini Anthi and Lowri Williams and Matilda Rhode and Pete Burnap and Adam Wedgbury}, title = {Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems}, journal = {CoRR}, volume = {abs/2004.05005}, year = {2020}, url = {https://arxiv.org/abs/2004.05005}, eprinttype = {arXiv}, eprint = {2004.05005}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-05005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-10781, author = {Emad Aliwa and Omer F. Rana and Charith Perera and Peter Burnap}, title = {Cyberattacks and Countermeasures For In-Vehicle Networks}, journal = {CoRR}, volume = {abs/2004.10781}, year = {2020}, url = {https://arxiv.org/abs/2004.10781}, eprinttype = {arXiv}, eprint = {2004.10781}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-10781.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-12150, author = {Petar Radanliev and David De Roure and Kevin R. Page and Max Van Kleek and Rafael Mantilla Montalvo and Omar Santos and La Treall Maddox and Stacy Cannady and Pete Burnap and Eirini Anthi and Carsten Maple}, title = {Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics}, journal = {CoRR}, volume = {abs/2005.12150}, year = {2020}, url = {https://arxiv.org/abs/2005.12150}, eprinttype = {arXiv}, eprint = {2005.12150}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-12150.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/AnthiWSTB19, author = {Eirini Anthi and Lowri Williams and Malgorzata Slowinska and George Theodorakopoulos and Pete Burnap}, title = {A Supervised Intrusion Detection System for Smart Home IoT Devices}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {5}, pages = {9042--9053}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2926365}, doi = {10.1109/JIOT.2019.2926365}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/AnthiWSTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/JavedBR19, author = {Amir Javed and Pete Burnap and Omer F. Rana}, title = {Prediction of drive-by download attacks on Twitter}, journal = {Inf. Process. Manag.}, volume = {56}, number = {3}, pages = {1133--1145}, year = {2019}, url = {https://doi.org/10.1016/j.ipm.2018.02.003}, doi = {10.1016/J.IPM.2018.02.003}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipm/JavedBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NunesBRRL19, author = {Matthew Nunes and Pete Burnap and Omer F. Rana and Philipp Reinecke and Kaelon Lloyd}, title = {Getting to the root of the problem: {A} detailed comparison of kernel and user level data for dynamic malware analysis}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102365}, doi = {10.1016/J.JISA.2019.102365}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NunesBRRL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/LiuBAW19, author = {Han Liu and Pete Burnap and Wafa Alorainy and Matthew L. Williams}, title = {A Fuzzy Approach to Text Classification With Two-Stage Training for Ambiguous Instances}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {6}, number = {2}, pages = {227--240}, year = {2019}, url = {https://doi.org/10.1109/TCSS.2019.2892037}, doi = {10.1109/TCSS.2019.2892037}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/LiuBAW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/AlorainyBLW19, author = {Wafa Alorainy and Pete Burnap and Han Liu and Matthew L. Williams}, title = {"The Enemy Among Us": Detecting Cyber Hate Speech with Threats-based Othering Language Embeddings}, journal = {{ACM} Trans. Web}, volume = {13}, number = {3}, pages = {14:1--14:26}, year = {2019}, url = {https://doi.org/10.1145/3324997}, doi = {10.1145/3324997}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tweb/AlorainyBLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/RhodeTBJ19, author = {Matilda Rhode and Lewis Tuson and Pete Burnap and Kevin Jones}, title = {{LAB} to {SOC:} Robust Features for Dynamic Malware Detection}, booktitle = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} (Industry Track) 2019, Portland, OR, USA, June 24-27, 2019}, pages = {13--16}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSN-Industry.2019.00010}, doi = {10.1109/DSN-INDUSTRY.2019.00010}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/dsn/RhodeTBJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficloud/BaratiRTB19, author = {Masoud Barati and Omer F. Rana and George Theodorakopoulos and Peter Burnap}, editor = {Muhammad Younas and Irfan Awan and Takahiro Hara}, title = {Privacy-Aware Cloud Ecosystems and {GDPR} Compliance}, booktitle = {7th International Conference on Future Internet of Things and Cloud, FiCloud 2019, Istanbul, Turkey, August 26-28, 2019}, pages = {117--124}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/FiCloud.2019.00024}, doi = {10.1109/FICLOUD.2019.00024}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ficloud/BaratiRTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tto/ProcterWBHEWJ19, author = {Rob Procter and Helena Webb and Pete Burnap and William Housley and Adam Edwards and Matthew L. Williams and Marina Jirotka}, editor = {Maria Liakata and Andreas Vlachos}, title = {A Study of Cyber Hate on Twitter with Implications for Social Media Governance Strategies}, booktitle = {Proceedings of the 2019 Truth and Trust Online Conference {(TTO} 2019), London, UK, October 4-5, 2019}, year = {2019}, url = {https://truthandtrustonline.com/wp-content/uploads/2019/09/paper\_20.pdf}, timestamp = {Tue, 03 Nov 2020 16:50:40 +0100}, biburl = {https://dblp.org/rec/conf/tto/ProcterWBHEWJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/0002BAW19, author = {Han Liu and Pete Burnap and Wafa Alorainy and Matthew L. Williams}, editor = {Ling Liu and Ryen W. White and Amin Mantrach and Fabrizio Silvestri and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {Fuzzy Multi-task Learning for Hate Speech Type Identification}, booktitle = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {3006--3012}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308558.3313546}, doi = {10.1145/3308558.3313546}, timestamp = {Sun, 22 Sep 2019 18:12:47 +0200}, biburl = {https://dblp.org/rec/conf/www/0002BAW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sin/2019, editor = {Oleg B. Makarevich and Dmitry Popov and Ludmila K. Babenko and Pete Burnap and Atilla El{\c{c}}i and Ron Poet and Jaideep Vaidya and Mehmet A. Orgun and Manoj Singh Gaur and Rajveer Singh Shekhawat}, title = {Proceedings of the 12th International Conference on Security of Information and Networks, {SIN} 2019, Sochi, Russian Federation, September 12-15, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3357613}, doi = {10.1145/3357613}, isbn = {978-1-4503-7242-8}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-02598, author = {Matilda Rhode and Pete Burnap and Kevin Jones}, title = {Dual-task agent for run-time classification and killing of malicious processes}, journal = {CoRR}, volume = {abs/1902.02598}, year = {2019}, url = {http://arxiv.org/abs/1902.02598}, eprinttype = {arXiv}, eprint = {1902.02598}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-02598.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-04428, author = {Petar Radanliev and David De Roure and Jason R. C. Nurse and Rafael Mantilla Montalvo and Peter Burnap}, title = {Standardisation of cyber risk impact assessment for the Internet of Things (IoT)}, journal = {CoRR}, volume = {abs/1903.04428}, year = {2019}, url = {http://arxiv.org/abs/1903.04428}, eprinttype = {arXiv}, eprint = {1903.04428}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-04428.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-12084, author = {Petar Radanliev and David Charles De Roure and Jason R. C. Nurse and Pete Burnap and Eirini Anthi and Uchenna Ani and La Treall Maddox and Omar Santos and Rafael Mantilla Montalvo}, title = {Definition of Internet of Things (IoT) Cyber Risk Discussion on a Transformation Roadmap for Standardisation of Regulations Risk Maturity Strategy Design and Impact Assessment}, journal = {CoRR}, volume = {abs/1903.12084}, year = {2019}, url = {http://arxiv.org/abs/1903.12084}, eprinttype = {arXiv}, eprint = {1903.12084}, timestamp = {Fri, 04 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-12084.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-12582, author = {Petar Radanliev and David Charles De Roure and Jason R. C. Nurse and Peter Burnap and Rafael Mantilla Montalvo}, title = {Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies}, journal = {CoRR}, volume = {abs/1903.12582}, year = {2019}, url = {http://arxiv.org/abs/1903.12582}, eprinttype = {arXiv}, eprint = {1903.12582}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-12582.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-11732, author = {Rob Procter and Helena Webb and Marina Jirotka and Pete Burnap and William Housley and Adam Edwards and Matthew L. Williams}, title = {A Study of Cyber Hate on Twitter with Implications for Social Media Governance Strategies}, journal = {CoRR}, volume = {abs/1908.11732}, year = {2019}, url = {http://arxiv.org/abs/1908.11732}, eprinttype = {arXiv}, eprint = {1908.11732}, timestamp = {Wed, 04 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-11732.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-05726, author = {Petar Radanliev and David Charles De Roure and Kevin R. Page and Jason R. C. Nurse and Rafael Mantilla Montalvo and Omar Santos and La Treall Maddox and Peter Burnap}, title = {The Industrial Internet of Things in the Industry 4.0 supply chains: literature review and future trends}, journal = {CoRR}, volume = {abs/1911.05726}, year = {2019}, url = {http://arxiv.org/abs/1911.05726}, eprinttype = {arXiv}, eprint = {1911.05726}, timestamp = {Fri, 04 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-05726.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/RadanlievRNHMCB18, author = {Petar Radanliev and David Charles De Roure and Razvan Nicolescu and Michael Huth and Rafael Montalvo Mantilla and Stacy Cannady and Peter Burnap}, title = {Future developments in cyber risk assessment for the internet of things}, journal = {Comput. Ind.}, volume = {102}, pages = {14--22}, year = {2018}, url = {https://doi.org/10.1016/j.compind.2018.08.002}, doi = {10.1016/J.COMPIND.2018.08.002}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cii/RadanlievRNHMCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BurnapFTJ18, author = {Pete Burnap and Richard French and Frederick Turner and Kevin Jones}, title = {Malware classification using self organising feature maps and machine activity data}, journal = {Comput. Secur.}, volume = {73}, pages = {399--410}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.016}, doi = {10.1016/J.COSE.2017.11.016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BurnapFTJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RhodeBJ18, author = {Matilda Rhode and Pete Burnap and Kevin Jones}, title = {Early-stage malware prediction using recurrent neural networks}, journal = {Comput. Secur.}, volume = {77}, pages = {578--594}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.05.010}, doi = {10.1016/J.COSE.2018.05.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RhodeBJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AnthiARTB18, author = {Eirini Anthi and Shazaib Ahmad and Omer F. Rana and George Theodorakopoulos and Pete Burnap}, title = {EclipseIoT: {A} secure and adaptive hub for the Internet of Things}, journal = {Comput. Secur.}, volume = {78}, pages = {477--490}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.016}, doi = {10.1016/J.COSE.2018.07.016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AnthiARTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/PratomoBT18, author = {Baskoro Adi Pratomo and Pete Burnap and George Theodorakopoulos}, title = {Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder}, booktitle = {2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSecPODS.2018.8560678}, doi = {10.1109/CYBERSECPODS.2018.8560678}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/PratomoBT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmlc/AlorainyB0JW18, author = {Wafa Alorainy and Pete Burnap and Han Liu and Amir Javed and Matthew L. Williams}, title = {Suspended Accounts: {A} Source of Tweets with Disgust and Anger Emotions for Augmenting Hate Speech Data Sample}, booktitle = {2018 International Conference on Machine Learning and Cybernetics, {ICMLC} 2018, Chengdu, China, July 15-18, 2018}, pages = {581--586}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICMLC.2018.8527001}, doi = {10.1109/ICMLC.2018.8527001}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icmlc/AlorainyB0JW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-05229, author = {Petar Radanliev and David Charles De Roure and Razvan Nicolescu and Michael Huth and Rafael Montalvo Mantilla and Stacy Cannady and Peter Burnap}, title = {Future developments in cyber risk assessment for the internet of things}, journal = {CoRR}, volume = {abs/1809.05229}, year = {2018}, url = {http://arxiv.org/abs/1809.05229}, eprinttype = {arXiv}, eprint = {1809.05229}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-05229.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BurnapCBEJSS17, author = {Pete Burnap and Yulia Cherdantseva and Andrew Blyth and Peter Eden and Kevin Jones and Hugh Soulsby and Kristan Stoddart}, title = {Determining and Sharing Risk Data in Distributed Interdependent Systems}, journal = {Computer}, volume = {50}, number = {4}, pages = {72--79}, year = {2017}, url = {https://doi.org/10.1109/MC.2017.108}, doi = {10.1109/MC.2017.108}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BurnapCBEJSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/osnm/BurnapCAHS17, author = {Pete Burnap and Gualtiero Colombo and Rosie Amery and Andrei Hodorog and Jonathan Scourfield}, title = {Multi-class machine classification of suicide-related communication on Twitter}, journal = {Online Soc. Networks Media}, volume = {2}, pages = {32--44}, year = {2017}, url = {https://doi.org/10.1016/j.osnem.2017.08.001}, doi = {10.1016/J.OSNEM.2017.08.001}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/osnm/BurnapCAHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/AlsaediBR17, author = {Nasser Alsaedi and Pete Burnap and Omer F. Rana}, title = {Can We Predict a Riot? Disruptive Event Detection Using Twitter}, journal = {{ACM} Trans. Internet Techn.}, volume = {17}, number = {2}, pages = {18:1--18:26}, year = {2017}, url = {https://doi.org/10.1145/2996183}, doi = {10.1145/2996183}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/AlsaediBR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/websci/WebbJSHEWPRB17, author = {Helena Webb and Marina Jirotka and Bernd Carsten Stahl and William Housley and Adam Edwards and Matthew L. Williams and Rob Procter and Omer F. Rana and Pete Burnap}, editor = {Peter Fox and Deborah L. McGuinness and Lindsay Poirier and Paolo Boldi and Katharina Kinder{-}Kurlanda}, title = {The Ethical Challenges of Publishing Twitter Data for Research Dissemination}, booktitle = {Proceedings of the 2017 {ACM} on Web Science Conference, WebSci 2017, Troy, NY, USA, June 25 - 28, 2017}, pages = {339--348}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3091478.3091489}, doi = {10.1145/3091478.3091489}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/websci/WebbJSHEWPRB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsdm/TsikrikaAKVBW17, author = {Theodora Tsikrika and Babak Akhgar and Vasilis Katos and Stefanos Vrochidis and Pete Burnap and Matthew L. Williams}, editor = {Maarten de Rijke and Milad Shokouhi and Andrew Tomkins and Min Zhang}, title = {1st International Workshop on Search and Mining Terrorist Online Content {\&} Advances in Data Science for Cyber Security and Risk on the Web}, booktitle = {Proceedings of the Tenth {ACM} International Conference on Web Search and Data Mining, {WSDM} 2017, Cambridge, United Kingdom, February 6-10, 2017}, pages = {823--824}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3018661.3022760}, doi = {10.1145/3018661.3022760}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wsdm/TsikrikaAKVBW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-03513, author = {Matilda Rhode and Pete Burnap and Kevin Jones}, title = {Early Stage Malware Prediction Using Recurrent Neural Networks}, journal = {CoRR}, volume = {abs/1708.03513}, year = {2017}, url = {http://arxiv.org/abs/1708.03513}, eprinttype = {arXiv}, eprint = {1708.03513}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-03513.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-05831, author = {Amir Javed and Pete Burnap and Omer F. Rana}, title = {Real Time Prediction of Drive by Download Attacks on Twitter}, journal = {CoRR}, volume = {abs/1708.05831}, year = {2017}, url = {http://arxiv.org/abs/1708.05831}, eprinttype = {arXiv}, eprint = {1708.05831}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-05831.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ColomboBHS16, author = {Gualtiero B. Colombo and Pete Burnap and Andrei Hodorog and Jonathan Scourfield}, title = {Analysing the connectivity and communication of suicidal users on twitter}, journal = {Comput. Commun.}, volume = {73}, pages = {291--300}, year = {2016}, url = {https://doi.org/10.1016/j.comcom.2015.07.018}, doi = {10.1016/J.COMCOM.2015.07.018}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ColomboBHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CherdantsevaBBE16, author = {Yulia Cherdantseva and Pete Burnap and Andrew Blyth and Peter Eden and Kevin Jones and Hugh Soulsby and Kristan Stoddart}, title = {A review of cyber security risk assessment methods for {SCADA} systems}, journal = {Comput. Secur.}, volume = {56}, pages = {1--27}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2015.09.009}, doi = {10.1016/J.COSE.2015.09.009}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CherdantsevaBBE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AwanBR16, author = {Malik Shahzad Kaleem Awan and Pete Burnap and Omer F. Rana}, title = {Identifying cyber risk hotspots: {A} framework for measuring temporal variance in computer network risk}, journal = {Comput. Secur.}, volume = {57}, pages = {31--46}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2015.11.003}, doi = {10.1016/J.COSE.2015.11.003}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AwanBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/epjds/BurnapW16, author = {Pete Burnap and Matthew L. Williams}, title = {Us and them: identifying cyber hate on Twitter across multiple protected characteristics}, journal = {{EPJ} Data Sci.}, volume = {5}, number = {1}, pages = {11}, year = {2016}, url = {https://doi.org/10.1140/epjds/s13688-016-0072-6}, doi = {10.1140/EPJDS/S13688-016-0072-6}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/epjds/BurnapW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ConejeroRBMCC16, author = {Javier Conejero and Omer F. Rana and Pete Burnap and Jeffrey Morgan and Mar{\'{\i}}a Blanca Caminero and Carmen Carri{\'{o}}n}, title = {Analyzing Hadoop power consumption and impact on application QoS}, journal = {Future Gener. Comput. Syst.}, volume = {55}, pages = {213--223}, year = {2016}, url = {https://doi.org/10.1016/j.future.2015.03.009}, doi = {10.1016/J.FUTURE.2015.03.009}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ConejeroRBMCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tois/WebbBPRSWHEJ16, author = {Helena Webb and Pete Burnap and Rob Procter and Omer F. Rana and Bernd Carsten Stahl and Matthew L. Williams and William Housley and Adam Edwards and Marina Jirotka}, title = {Digital Wildfires: Propagation, Verification, Regulation, and Responsible Innovation}, journal = {{ACM} Trans. Inf. Syst.}, volume = {34}, number = {3}, pages = {15:1--15:23}, year = {2016}, url = {https://doi.org/10.1145/2893478}, doi = {10.1145/2893478}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tois/WebbBPRSWHEJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/EdenBBCJSS16, author = {Peter Eden and Andrew Blyth and Pete Burnap and Yulia Cherdantseva and Kevin Jones and Hugh Soulsby and Kristan Stoddart}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Forensic Readiness for {SCADA/ICS} Incident Response}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56489}, timestamp = {Thu, 08 Sep 2016 09:49:45 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/EdenBBCJSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/AlsaediBR16, author = {Nasser Alsaedi and Pete Burnap and Omer F. Rana}, title = {Automatic Summarization of Real World Events Using Twitter}, booktitle = {Proceedings of the Tenth International Conference on Web and Social Media, Cologne, Germany, May 17-20, 2016}, pages = {511--514}, publisher = {{AAAI} Press}, year = {2016}, url = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13017}, timestamp = {Fri, 05 Feb 2021 11:07:46 +0100}, biburl = {https://dblp.org/rec/conf/icwsm/AlsaediBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/AlsaediBR16a, author = {Nasser Alsaedi and Pete Burnap and Omer F. Rana}, title = {Sensing Real-World Events Using Arabic Twitter Posts}, booktitle = {Proceedings of the Tenth International Conference on Web and Social Media, Cologne, Germany, May 17-20, 2016}, pages = {515--518}, publisher = {{AAAI} Press}, year = {2016}, url = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13016}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icwsm/AlsaediBR16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webi/AlsaediBR16, author = {Nasser Alsaedi and Pete Burnap and Omer F. Rana}, title = {Sensing Real-World Events Using Social Media Data and a Classification-Clustering Framework}, booktitle = {2016 {IEEE/WIC/ACM} International Conference on Web Intelligence, {WI} 2016, Omaha, NE, USA, October 13-16, 2016}, pages = {216--223}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/WI.2016.0039}, doi = {10.1109/WI.2016.0039}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/webi/AlsaediBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webi/AlsaediBR16a, author = {Nasser Alsaedi and Pete Burnap and Omer F. Rana}, title = {Temporal {TF-IDF:} {A} High Performance Approach for Event Summarization in Twitter}, booktitle = {2016 {IEEE/WIC/ACM} International Conference on Web Intelligence, {WI} 2016, Omaha, NE, USA, October 13-16, 2016}, pages = {515--521}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/WI.2016.0087}, doi = {10.1109/WI.2016.0087}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/webi/AlsaediBR16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpcn/SaidRB15, author = {Taimur Al Said and Omer F. Rana and Pete Burnap}, title = {VMInformant: an instrumented virtual machine to support trustworthy cloud computing}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {8}, number = {3}, pages = {222--234}, year = {2015}, url = {https://doi.org/10.1504/IJHPCN.2015.071257}, doi = {10.1504/IJHPCN.2015.071257}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/SaidRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paapp/BurnapRWHEMSC15, author = {Pete Burnap and Omer F. Rana and Matthew L. Williams and William Housley and Adam Edwards and Jeffrey Morgan and Luke Sloan and Javier Conejero}, title = {{COSMOS:} Towards an integrated and scalable service for analysing social media on demand}, journal = {Int. J. Parallel Emergent Distributed Syst.}, volume = {30}, number = {2}, pages = {80--100}, year = {2015}, url = {https://doi.org/10.1080/17445760.2014.902057}, doi = {10.1080/17445760.2014.902057}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/paapp/BurnapRWHEMSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigcas/WebbJSHEWPRB15, author = {Helena Webb and Marina Jirotka and Bernd Carsten Stahl and William Housley and Adam Edwards and Matthew L. Williams and Rob Procter and Omer F. Rana and Pete Burnap}, title = {Digital wildfires: hyper-connectivity, havoc and a global ethos to govern social media}, journal = {{SIGCAS} Comput. Soc.}, volume = {45}, number = {3}, pages = {193--201}, year = {2015}, url = {https://doi.org/10.1145/2874239.2874267}, doi = {10.1145/2874239.2874267}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigcas/WebbJSHEWPRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/AwanBR15, author = {Malik Shahzad Kaleem Awan and Pete Burnap and Omer F. Rana}, editor = {Yulei Wu and Geyong Min and Nektarios Georgalas and Jia Hu and Luigi Atzori and Xiaolong Jin and Stephen A. Jarvis and Lei (Chris) Liu and Ram{\'{o}}n Ag{\"{u}}ero Calvo}, title = {An Empirical Risk Management Framework for Monitoring Network Security}, booktitle = {15th {IEEE} International Conference on Computer and Information Technology, {CIT} 2015; 14th {IEEE} International Conference on Ubiquitous Computing and Communications, {IUCC} 2015; 13th {IEEE} International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2015; 13th {IEEE} International Conference on Pervasive Intelligence and Computing, PICom 2015, Liverpool, United Kingdom, October 26-28, 2015}, pages = {1764--1771}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.266}, doi = {10.1109/CIT/IUCC/DASC/PICOM.2015.266}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcit/AwanBR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/AlsaediBR15, author = {Nasser Alsaedi and Pete Burnap and Omer F. Rana}, editor = {Jian Pei and Fabrizio Silvestri and Jie Tang}, title = {Identifying Disruptive Events from Social Media to Enhance Situational Awareness}, booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France, August 25 - 28, 2015}, pages = {934--941}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808797.2808879}, doi = {10.1145/2808797.2808879}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asunam/AlsaediBR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/BurnapJRA15, author = {Pete Burnap and Amir Javed and Omer F. Rana and Malik Shahzad Kaleem Awan}, editor = {Jian Pei and Fabrizio Silvestri and Jie Tang}, title = {Real-time Classification of Malicious URLs on Twitter using Machine Activity Data}, booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France, August 25 - 28, 2015}, pages = {970--977}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808797.2809281}, doi = {10.1145/2808797.2809281}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asunam/BurnapJRA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/AlsaediB15, author = {Nasser Alsaedi and Pete Burnap}, editor = {Jian Pei and Fabrizio Silvestri and Jie Tang}, title = {Feature Extraction and Analysis for Identifying Disruptive Events from Social Media}, booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France, August 25 - 28, 2015}, pages = {1495--1502}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808797.2808867}, doi = {10.1145/2808797.2808867}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asunam/AlsaediB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cicling/AlsaediB15, author = {Nasser Alsaedi and Pete Burnap}, editor = {Alexander F. Gelbukh}, title = {Arabic Event Detection in Social Media}, booktitle = {Computational Linguistics and Intelligent Text Processing - 16th International Conference, CICLing 2015, Cairo, Egypt, April 14-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9041}, pages = {384--401}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18111-0\_29}, doi = {10.1007/978-3-319-18111-0\_29}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/cicling/AlsaediB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/RahulamathavanR15, author = {Yogachandran Rahulamathavan and Muttukrishnan Rajarajan and Omer F. Rana and Malik S. K. Awan and Pete Burnap and Sajal K. Das}, title = {Assessing Data Breach Risk in Cloud Systems}, booktitle = {7th {IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2015, Vancouver, BC, Canada, November 30 - December 3, 2015}, pages = {363--370}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CloudCom.2015.58}, doi = {10.1109/CLOUDCOM.2015.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/RahulamathavanR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/EdenBBCJSS15, author = {Peter Eden and Andrew Blyth and Pete Burnap and Yulia Cherdantseva and Kevin Jones and Hugh Soulsby and Kristan Stoddart}, editor = {Erich Rome and Marianthi Theocharidou and Stephen D. Wolthusen}, title = {A Cyber Forensic Taxonomy for {SCADA} Systems in Critical Infrastructure}, booktitle = {Critical Information Infrastructures Security - 10th International Conference, {CRITIS} 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9578}, pages = {27--39}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-33331-1\_3}, doi = {10.1007/978-3-319-33331-1\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/EdenBBCJSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/AwanBRJ15, author = {Malik Shahzad Kaleem Awan and Pete Burnap and Omer F. Rana and Amir Javed}, title = {Continuous Monitoring and Assessment of Cybersecurity Risks in Large Computing Infrastructures}, booktitle = {17th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2015, 7th {IEEE} International Symposium on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International Conference on Embedded Software and Systems, {ICESS} 2015, New York, NY, USA, August 24-26, 2015}, pages = {1442--1447}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.224}, doi = {10.1109/HPCC-CSS-ICESS.2015.224}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/AwanBRJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ht/BurnapCS15, author = {Pete Burnap and Gualtiero Colombo and Jonathan Scourfield}, editor = {Yeliz Yesilada and Rosta Farzan and Geert{-}Jan Houben}, title = {Machine Classification and Analysis of Suicide-Related Communication on Twitter}, booktitle = {Proceedings of the 26th {ACM} Conference on Hypertext {\&} Social Media, {HT} 2015, Guzelyurt, TRNC, Cyprus, September 1-4, 2015}, pages = {75--84}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2700171.2791023}, doi = {10.1145/2700171.2791023}, timestamp = {Thu, 30 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ht/BurnapCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/EdenBBJS15, author = {Peter Eden and Andrew Blyth and Pete Burnap and Kevin Jones and Kristan Stoddart}, editor = {Helge Janicke and Kevin I. Jones}, title = {A Forensic Taxonomy of {SCADA} Systems and Approach to Incident Response}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.5}, doi = {10.14236/EWIC/ICS2015.5}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/EdenBBJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iot360/WangRJSBRG15, author = {Meisong Wang and Rajiv Ranjan and Prem Prakash Jayaraman and Peter Strazdins and Pete Burnap and Omer F. Rana and Dimitrios Georgakopoulos}, editor = {Benny Mandler and Johann M{\'{a}}rquez{-}Barja and Miguel Elias Mitre Campista and Dagmar Cag{\'{a}}nov{\'{a}} and Hakima Chaouchi and Sherali Zeadally and Mohamad Badra and Stefano Giordano and Maria Fazio and Andrey Somov and Radu{-}Laurentiu Vieriu}, title = {A Case for Understanding End-to-End Performance of Topic Detection and Tracking Based Big Data Applications in the Cloud}, booktitle = {Internet of Things. IoT Infrastructures - Second International Summit, IoT 360{\textdegree} 2015, Rome, Italy, October 27-29, 2015, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {169}, pages = {315--325}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-47063-4\_33}, doi = {10.1007/978-3-319-47063-4\_33}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iot360/WangRJSBRG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/AwanBR15, author = {Malik Shahzad Kaleem Awan and Pete Burnap and Omer F. Rana}, editor = {Ehab Al{-}Shaer and Christopher S. Oehmen and Mohammad Ashiqur Rahman}, title = {Estimating Risk Boundaries for Persistent and Stealthy Cyber-Attacks}, booktitle = {Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October 12, 2015}, pages = {15--20}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2809826.2809830}, doi = {10.1145/2809826.2809830}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/AwanBR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AwanAABR15, author = {Malik S. K. Awan and Mohammed A. AlGhamdi and Sultan H. Almotiri and Pete Burnap and Omer F. Rana}, editor = {Oleg B. Makarevich and Ron Poet and Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Ludmila K. Babenko and Md. Sadek Ferdous and Anthony T. S. Ho and Vijay Laxmi and Josef Pieprzyk}, title = {A classification framework for distinct cyber-attacks based on occurrence patterns}, booktitle = {Proceedings of the 8th International Conference on Security of Information and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10, 2015}, pages = {165--168}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799979.2800037}, doi = {10.1145/2799979.2800037}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AwanAABR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/websci/SowriraghavanB15, author = {Abinaya Sowriraghavan and Pete Burnap}, editor = {David De Roure and Pete Burnap and Susan Halford}, title = {Prediction of Malware Propagation and Links within Communities in Social Media Based Events}, booktitle = {Proceedings of the {ACM} Web Science Conference, WebSci 2015, Oxford, United Kingdom, June 28 - July 1, 2015}, pages = {59:1--59:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786451.2786494}, doi = {10.1145/2786451.2786494}, timestamp = {Sat, 24 Nov 2018 11:59:52 +0100}, biburl = {https://dblp.org/rec/conf/websci/SowriraghavanB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/websci/WebbJSHEWPRB15, author = {Helena Webb and Marina Jirotka and Bernd Carsten Stahl and William Housley and Adam Edwards and Matthew L. Williams and Rob Procter and Omer F. Rana and Pete Burnap}, editor = {David De Roure and Pete Burnap and Susan Halford}, title = {'Digital Wildfires': a challenge to the governance of social media?}, booktitle = {Proceedings of the {ACM} Web Science Conference, WebSci 2015, Oxford, United Kingdom, June 28 - July 1, 2015}, pages = {64:1--64:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786451.2786929}, doi = {10.1145/2786451.2786929}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/websci/WebbJSHEWPRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/insci/2015, editor = {Thanassis Tiropanis and Athena Vakali and Laura Sartori and Pete Burnap}, title = {Internet Science - Second International Conference, {INSCI} 2015, Brussels, Belgium, May 27-29, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9089}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18609-2}, doi = {10.1007/978-3-319-18609-2}, isbn = {978-3-319-18608-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/insci/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/websci/2015, editor = {David De Roure and Pete Burnap and Susan Halford}, title = {Proceedings of the {ACM} Web Science Conference, WebSci 2015, Oxford, United Kingdom, June 28 - July 1, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786451}, doi = {10.1145/2786451}, isbn = {978-1-4503-3672-7}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/websci/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BurnapGSSW15, author = {Pete Burnap and Rachel Gibson and Luke Sloan and Rosalynd Southern and Matthew L. Williams}, title = {140 Characters to Victory?: Using Twitter to Predict the {UK} 2015 General Election}, journal = {CoRR}, volume = {abs/1505.01511}, year = {2015}, url = {http://arxiv.org/abs/1505.01511}, eprinttype = {arXiv}, eprint = {1505.01511}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BurnapGSSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bigdatasociety/HousleyPEBWSRMVG14, author = {William Housley and Rob Procter and Adam Edwards and Peter Burnap and Matthew L. Williams and Luke Sloan and Omer F. Rana and Jeffrey Morgan and Alex Voss and Anita Greenhill}, title = {Big and broad social data and the sociological imagination: {A} collaborative response}, journal = {Big Data Soc.}, volume = {1}, number = {2}, pages = {205395171454513}, year = {2014}, url = {https://doi.org/10.1177/2053951714545135}, doi = {10.1177/2053951714545135}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bigdatasociety/HousleyPEBWSRMVG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/snam/BurnapWSRHEKPV14, author = {Pete Burnap and Matthew L. Williams and Luke Sloan and Omer F. Rana and William Housley and Adam Edwards and Vincent A. Knight and Rob Procter and Alex Voss}, title = {Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack}, journal = {Soc. Netw. Anal. Min.}, volume = {4}, number = {1}, pages = {206}, year = {2014}, url = {https://doi.org/10.1007/s13278-014-0206-4}, doi = {10.1007/S13278-014-0206-4}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/snam/BurnapWSRHEKPV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis/BurnapRPB14, author = {Pete Burnap and Omer F. Rana and Nargis Pauran and Phil Bowen}, title = {Towards Real-Time Probabilistic Risk Assessment by Sensing Disruptive Events from Streamed News Feeds}, booktitle = {Eighth International Conference on Complex, Intelligent and Software Intensive Systems, {CISIS} 2014, Birmingham, UK, July 2-4, 2014}, pages = {608--613}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CISIS.2014.87}, doi = {10.1109/CISIS.2014.87}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisis/BurnapRPB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/RahulamathavanPBRRS14, author = {Yogachandran Rahulamathavan and Pramod S. Pawar and Pete Burnap and Muttukrishnan Rajarajan and Omer F. Rana and George Spanoudakis}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Analysing Security requirements in Cloud-based Service Level Agreements}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {73}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659735}, doi = {10.1145/2659651.2659735}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/RahulamathavanPBRRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/ConejeroBRM13, author = {Javier Conejero and Pete Burnap and Omer F. Rana and Jeffrey Morgan}, title = {Scaling Archived Social Media Data Analysis Using a Hadoop Cloud}, booktitle = {2013 {IEEE} Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28 - July 3, 2013}, pages = {685--692}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CLOUD.2013.120}, doi = {10.1109/CLOUD.2013.120}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/ConejeroBRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/ConejeroRBMCC13, author = {Javier Conejero and Omer F. Rana and Pete Burnap and Jeffrey Morgan and Carmen Carri{\'{o}}n and Mar{\'{\i}}a Blanca Caminero}, editor = {Fr{\'{e}}d{\'{e}}ric Desprez and Donald Ferguson and Ethan Hadar and Frank Leymann and Matthias Jarke and Markus Helfert}, title = {Characterising the Power Consumption of Hadoop Clouds - {A} Social Media Analysis Case Study}, booktitle = {{CLOSER} 2013 - Proceedings of the 3rd International Conference on Cloud Computing and Services Science, Aachen, Germany, 8-10 May, 2013}, pages = {233--243}, publisher = {SciTePress}, year = {2013}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/closer/ConejeroRBMCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/BurnapSGHRE12, author = {Pete Burnap and Irena Spasic and W. Alex Gray and Jeremy Hilton and Omer F. Rana and Glyn Elwyn}, editor = {Waleed W. Smari and Geoffrey Charles Fox}, title = {Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information}, booktitle = {2012 International Conference on Collaboration Technologies and Systems, {CTS} 2012, Denver, CO, USA, May 21-25, 2012}, pages = {490--497}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CTS.2012.6261095}, doi = {10.1109/CTS.2012.6261095}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cts/BurnapSGHRE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Burnap09, author = {Peter Richard Burnap}, title = {Advanced access control in support and distributed collaborative working and de-perimeterization}, school = {Cardiff University, {UK}}, year = {2009}, url = {http://orca.cf.ac.uk/55019/}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Burnap09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icds/BurnapH09, author = {Pete Burnap and Jeremy Hilton}, title = {Self Protecting Data for De-perimeterised Information Sharing}, booktitle = {Third International Conference on the Digital Society {(ICDS} 2009), February 1-7, 2009, Cancun, Mexico}, pages = {65--70}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDS.2009.41}, doi = {10.1109/ICDS.2009.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icds/BurnapH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/PahwaBGM06, author = {Jaspreet Singh Pahwa and Pete Burnap and W. A. Gray and John C. Miles}, editor = {St{\'{e}}phane Bressan and Josef K{\"{u}}ng and Roland R. Wagner}, title = {{MDSSF} - {A} Federated Architecture for Product Procurement}, booktitle = {Database and Expert Systems Applications, 17th International Conference, {DEXA} 2006, Krak{\'{o}}w, Poland, September 4-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4080}, pages = {812--821}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11827405\_79}, doi = {10.1007/11827405\_79}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/dexa/PahwaBGM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip5-5/JoitaRBPGM04, author = {Liviu Joita and Omer F. Rana and Pete Burnap and Jaspreet Singh Pahwa and W. A. Gray and John C. Miles}, editor = {Luis M. Camarinha{-}Matos}, title = {A Grid-Enabled Security Framework for Collaborative Virtual Organisations}, booktitle = {Virtual Enterprises and Collaborative Networks, {IFIP} 18th World Computer Congress, {TC5} / {WG5.5} - 5th Working Conference on Virtual Enterprises, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {149}, pages = {415--422}, publisher = {Kluwer/springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8139-1\_44}, doi = {10.1007/1-4020-8139-1\_44}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip5-5/JoitaRBPGM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.