Budi Arief
Cited by
Cited by
The many meanings of open source
C Gacek, B Arief
IEEE software 21 (1), 34-40, 2004
Computer security impaired by legitimate users
D Besnard, B Arief
Computers & Security 23 (3), 253-264, 2004
A UML tool for an automatic generation of simulation programs
LB Arief, NA Speirs
Proceedings of the 2nd international workshop on Software and performance, 71-76, 2000
Harvesting high value foreign currency transactions from emv contactless credit cards without the pin
M Emms, B Arief, L Freitas, J Hannon, A van Moorsel
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Technical and human issues in computer-based systems security
B Arief, D Besnard
School of Computing Science Technical Report Series, 2003
Automatic generation of distributed system simulations from UML
B Arief, N Speirs
Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers
B Arief, MAB Adzmi, T Gross
IEEE Security & Privacy 13 (1), 71-76, 2015
Software architectures and Open Source Software: Where can research leverage the most?
C Gacek, B Arief, T Lawrie
On using the CAMA framework for developing open mobile fault tolerant agent systems
B Arief, A Iliasov, A Romanovsky
Proceedings of the 2006 international workshop on Software engineering for …, 2006
Does the online card payment landscape unwittingly facilitate fraud?
MA Ali, B Arief, M Emms, A van Moorsel
IEEE Security & Privacy 15 (2), 78-86, 2017
Risks of offline verify PIN on contactless cards
M Emms, B Arief, N Little, A Van Moorsel
International Conference on Financial Cryptography and Data Security, 313-321, 2013
On rigorous design and implementation of fault tolerant ambient systems
A Iliasov, A Romanovsky, B Arief, L Laibinis, E Troubitsyna
10th IEEE International Symposium on Object and Component-Oriented Real-Time …, 2007
Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour
AS McGough, B Arief, C Gamble, D Wall, J Brennan, JS Fitzgerald, ...
JoWUA 6 (4), 3-46, 2015
Ransomware deployment methods and analysis: views from a predictive model and human responses
G Hull, H John, B Arief
Crime Science 8 (1), 2, 2019
Integrating smartdust into intelligent transportation systems
B Arief, P Blythe, R Fairchild, K Selvarajah, A Tully
School of Computing Science Technical Report Series, 2007
Interdisciplinary insights on open source
C Gacek, T Lawrie, B Arief
Understanding cybercrime from its stakeholders' perspectives: Part 2--defenders and victims
B Arief, MAB Adzmi
IEEE Security & Privacy 13 (2), 84-88, 2015
Sensible privacy: how we can protect domestic violence survivors without facilitating misuse
B Arief, KPL Coopamootoo, M Emms, A van Moorsel
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 201-204, 2014
TRACKSS approach to improving road safety through sensors collaboration on vehicle and in infrastructure
B Arief, A von Arnim
2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008
Using SimML to bridge the transformation from UML to simulation
LB Arief, NA Speirs
Proc. of One Day Workshop on Software Performance and Prediction extracted …, 1999
The system can't perform the operation now. Try again later.
Articles 1–20