Budi Arief
TitleCited byYear
The many meanings of open source
C Gacek, B Arief
IEEE software 21 (1), 34-40, 2004
3712004
Computer security impaired by legitimate users
D Besnard, B Arief
Computers & Security 23 (3), 253-264, 2004
2132004
A UML tool for an automatic generation of simulation programs
LB Arief, NA Speirs
Proceedings of the 2nd international workshop on Software and performance, 71-76, 2000
1232000
Harvesting high value foreign currency transactions from emv contactless credit cards without the pin
M Emms, B Arief, L Freitas, J Hannon, A van Moorsel
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
292014
Technical and human issues in computer-based systems security
B Arief, D Besnard
School of Computing Science Technical Report Series, 2003
292003
Automatic generation of distributed system simulations from UML
B Arief, N Speirs
271999
Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers
B Arief, MAB Adzmi, T Gross
IEEE Security & Privacy 13 (1), 71-76, 2015
232015
Software architectures and Open Source Software: Where can research leverage the most?
C Gacek, B Arief, T Lawrie
232001
On using the CAMA framework for developing open mobile fault tolerant agent systems
B Arief, A Iliasov, A Romanovsky
Proceedings of the 2006 international workshop on Software engineering for …, 2006
222006
Risks of offline verify PIN on contactless cards
M Emms, B Arief, N Little, A Van Moorsel
International Conference on Financial Cryptography and Data Security, 313-321, 2013
182013
On rigorous design and implementation of fault tolerant ambient systems
A Iliasov, A Romanovsky, B Arief, L Laibinis, E Troubitsyna
10th IEEE International Symposium on Object and Component-Oriented Real-Time …, 2007
182007
Does the online card payment landscape unwittingly facilitate fraud?
MA Ali, B Arief, M Emms, A van Moorsel
IEEE Security & Privacy 15 (2), 78-86, 2017
162017
Integrating smartdust into intelligent transportation systems
B Arief, P Blythe, R Fairchild, K Selvarajah, A Tully
School of Computing Science Technical Report Series, 2007
142007
Interdisciplinary insights on open source
C Gacek, T Lawrie, B Arief
142002
Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour
AS McGough, B Arief, C Gamble, D Wall, J Brennan, JS Fitzgerald, ...
JoWUA 6 (4), 3-46, 2015
13*2015
Sensible privacy: how we can protect domestic violence survivors without facilitating misuse
B Arief, KPL Coopamootoo, M Emms, A van Moorsel
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 201-204, 2014
112014
TRACKSS approach to improving road safety through sensors collaboration on vehicle and in infrastructure
B Arief, A von Arnim
2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008
112008
Using SimML to bridge the transformation from UML to simulation
LB Arief, NA Speirs
Proc. of One Day Workshop on Software Performance and Prediction extracted …, 1999
111999
Understanding cybercrime from its stakeholders' perspectives: Part 2--defenders and victims
B Arief, MAB Adzmi
IEEE Security & Privacy 13 (2), 84-88, 2015
102015
Cooperative road sign and traffic light using near infrared identification and zigbee smartdust technologies
B Arief, A Fusée
School of Computing Science Technical Report Series, 2008
102008
The system can't perform the operation now. Try again later.
Articles 1–20