Budi Arief
Title
Cited by
Cited by
Year
The many meanings of open source
C Gacek, B Arief
IEEE software 21 (1), 34-40, 2004
3922004
Computer security impaired by legitimate users
D Besnard, B Arief
Computers & Security 23 (3), 253-264, 2004
2252004
A UML tool for an automatic generation of simulation programs
LB Arief, NA Speirs
Proceedings of the 2nd international workshop on Software and performance, 71-76, 2000
1242000
Harvesting high value foreign currency transactions from emv contactless credit cards without the pin
M Emms, B Arief, L Freitas, J Hannon, A van Moorsel
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
322014
Technical and human issues in computer-based systems security
B Arief, D Besnard
School of Computing Science Technical Report Series, 2003
302003
Automatic generation of distributed system simulations from UML
B Arief, N Speirs
271999
Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers
B Arief, MAB Adzmi, T Gross
IEEE Security & Privacy 13 (1), 71-76, 2015
252015
Software architectures and Open Source Software: Where can research leverage the most?
C Gacek, B Arief, T Lawrie
252001
On using the CAMA framework for developing open mobile fault tolerant agent systems
B Arief, A Iliasov, A Romanovsky
Proceedings of the 2006 international workshop on Software engineering for …, 2006
232006
Does the online card payment landscape unwittingly facilitate fraud?
MA Ali, B Arief, M Emms, A van Moorsel
IEEE Security & Privacy 15 (2), 78-86, 2017
192017
Risks of offline verify PIN on contactless cards
M Emms, B Arief, N Little, A Van Moorsel
International Conference on Financial Cryptography and Data Security, 313-321, 2013
192013
On rigorous design and implementation of fault tolerant ambient systems
A Iliasov, A Romanovsky, B Arief, L Laibinis, E Troubitsyna
10th IEEE International Symposium on Object and Component-Oriented Real-Time …, 2007
182007
Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour
AS McGough, B Arief, C Gamble, D Wall, J Brennan, JS Fitzgerald, ...
JoWUA 6 (4), 3-46, 2015
17*2015
Ransomware deployment methods and analysis: views from a predictive model and human responses
G Hull, H John, B Arief
Crime Science 8 (1), 2, 2019
142019
Integrating smartdust into intelligent transportation systems
B Arief, P Blythe, R Fairchild, K Selvarajah, A Tully
School of Computing Science Technical Report Series, 2007
142007
Interdisciplinary insights on open source
C Gacek, T Lawrie, B Arief
142002
Understanding cybercrime from its stakeholders' perspectives: Part 2--defenders and victims
B Arief, MAB Adzmi
IEEE Security & Privacy 13 (2), 84-88, 2015
122015
Sensible privacy: how we can protect domestic violence survivors without facilitating misuse
B Arief, KPL Coopamootoo, M Emms, A van Moorsel
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 201-204, 2014
122014
TRACKSS approach to improving road safety through sensors collaboration on vehicle and in infrastructure
B Arief, A von Arnim
2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008
112008
Using SimML to bridge the transformation from UML to simulation
LB Arief, NA Speirs
Proc. of One Day Workshop on Software Performance and Prediction extracted …, 1999
111999
The system can't perform the operation now. Try again later.
Articles 1–20