Login / Signup
Budi Arief
ORCID
Publication Activity (10 Years)
Years Active: 2004-2024
Publications (10 Years): 27
Top Topics
Systematic Review
Intelligent Software
Security Analysis
Human Behaviour
Top Venues
EICC
CoRR
NordSec
IEEE Secur. Priv.
</>
Publications
</>
Yichao Wang
,
Budi Arief
,
Julio C. Hernandez-Castro
Analysis of Security Mechanisms of Dark Web Markets.
EICC
(2024)
Adel Elzemity
,
Budi Arief
Privacy Threats and Countermeasures in Federated Learning for Internet of Things: A Systematic Review.
CoRR
(2024)
Meryem Berfin Ozkok
,
Baturay Birinci
,
Orçun Çetin
,
Budi Arief
,
Julio C. Hernandez-Castro
Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot Logs.
EICC
(2024)
Yichao Wang
,
Budi Arief
,
Virginia Nunes Leal Franqueira
,
Anna Grace Coates
,
Caoilte Ó Ciardha
Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned.
EICC
(2023)
Yichao Wang
,
Sophia Roscoe
,
Budi Arief
,
Lena Yuryna Connolly
,
Hervé Borrion
,
Sanaa Kaddoura
The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities.
SocialSec
(2023)
Lena Yuryna Connolly
,
Hervé Borrion
,
Budi Arief
,
Sanna Kaddoura
Applying Neutralisation Theory to Better Understand Ransomware Offenders.
EuroS&P Workshops
(2023)
Yichao Wang
,
Budi Arief
,
Julio C. Hernandez-Castro
Dark Ending: What Happens when a Dark Web Market Closes down.
ICISSP
(2023)
Omer Said Ozturk
,
Emre Ekmekcioglu
,
Orçun Çetin
,
Budi Arief
,
Julio Hernandez-Castro
New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?
EICC
(2023)
Sharifah Roziah Binti Mohd Kassim
,
Shujun Li
,
Budi Arief
The Use of Public Data and Free Tools in National CSIRTs' Operational Practices: A Systematic Literature Review.
CoRR
(2023)
Sharifah Roziah Binti Mohd Kassim
,
Solahuddin Bin Shamsuddin
,
Shujun Li
,
Budi Arief
How National CSIRTs Operate: Personal Observations and Opinions from MyCERT.
DSC
(2022)
Francesca Stevens
,
Jason R. C. Nurse
,
Budi Arief
Cyber Stalking, Cyber Harassment, and Adult Mental Health: A Systematic Review.
Cyberpsychology Behav. Soc. Netw.
24 (6) (2021)
Burak Filiz
,
Budi Arief
,
Orçun Çetin
,
Julio C. Hernandez-Castro
On the Effectiveness of Ransomware Decryption Tools.
Comput. Secur.
111 (2021)
Yichao Wang
,
Budi Arief
,
Julio César Hernández Castro
Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets.
eCrime
(2021)
Yagiz Yilmaz
,
Orçun Çetin
,
Budi Arief
,
Julio C. Hernandez-Castro
Investigating the impact of ransomware splash screens.
J. Inf. Secur. Appl.
61 (2021)
Calvin Brierley
,
Budi Arief
,
David J. Barnes
,
Julio C. Hernandez-Castro
Industrialising Blackmail: Privacy Invasion Based IoT Ransomware.
NordSec
(2021)
Poonam Yadav
,
Angelo Feraudo
,
Budi Arief
,
Siamak F. Shahandashti
,
Vassilios G. Vassilakis
Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms.
AIChallengeIoT@SenSys
(2020)
Calvin Brierley
,
Jamie Pont
,
Budi Arief
,
David J. Barnes
,
Julio C. Hernandez-Castro
Persistence in Linux-Based IoT Malware.
NordSec
(2020)
Jamie Pont
,
Budi Arief
,
Julio C. Hernandez-Castro
Why Current Statistical Approaches to Ransomware Detection Fail.
ISC
(2020)
Poonam Yadav
,
Angelo Feraudo
,
Budi Arief
,
Siamak F. Shahandashti
,
Vassilios G. Vassilakis
Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms.
CoRR
(2020)
Calvin Brierley
,
Jamie Pont
,
Budi Arief
,
David J. Barnes
,
Julio C. Hernandez-Castro
PaperW8: an IoT bricking ransomware proof of concept.
ARES
(2020)
Budi Arief
,
Andy Periam
,
Orçun Çetin
,
Julio C. Hernandez-Castro
Using Eyetracker to Find Ways to Mitigate Ransomware.
ICISSP
(2020)
Jamie Pont
,
Osama Abu Oun
,
Calvin Brierley
,
Budi Arief
,
Julio C. Hernandez-Castro
A Roadmap for Improving the Impact of Anti-ransomware Research.
NordSec
(2019)
Ali Hariri
,
Nicolas Giannelos
,
Budi Arief
Selective Forwarding Attack on IoT Home Security Kits.
CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS
(2019)
Edward Knight
,
Sam Lord
,
Budi Arief
Lock Picking in the Era of Internet of Things.
TrustCom/BigDataSE
(2019)
Jack McBride
,
Budi Arief
,
Julio C. Hernandez-Castro
Security Analysis of Contiki IoT Operating System.
EWSN
(2018)
Mohammed Aamir Ali
,
Budi Arief
,
Martin Emms
,
Aad P. A. van Moorsel
Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?
IEEE Secur. Priv.
15 (2) (2017)
Jack McBride
,
Julio C. Hernandez-Castro
,
Budi Arief
Earworms Make Bad Passwords: An Analysis of the Nokē Smart Lock Manual Override.
SIoT
(2017)
Andrew Stephen McGough
,
David Wall
,
John Brennan
,
Georgios Theodoropoulos
,
Ed Ruck-Keene
,
Budi Arief
,
Carl Gamble
,
John S. Fitzgerald
,
Aad P. A. van Moorsel
,
Sujeewa Alwis
Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware).
MIST@CCS
(2015)
Budi Arief
,
Mohd Azeem Bin Adzmi
,
Thomas Gross
Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1-Attackers.
IEEE Secur. Priv.
13 (1) (2015)
Andrew Stephen McGough
,
Budi Arief
,
Carl Gamble
,
David Wall
,
John Brennan
,
John S. Fitzgerald
,
Aad P. A. van Moorsel
,
Sujeewa Alwis
,
Georgios Theodoropoulos
,
Ed Ruck-Keene
Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
6 (4) (2015)
Budi Arief
,
Mohd Azeem Bin Adzmi
Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2-Defenders and Victims.
IEEE Secur. Priv.
13 (2) (2015)
Budi Arief
,
Kovila P. L. Coopamootoo
,
Martin Emms
,
Aad P. A. van Moorsel
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse.
WPES
(2014)
Martin Emms
,
Budi Arief
,
Leo Freitas
,
Joseph Hannon
,
Aad P. A. van Moorsel
Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN.
CCS
(2014)
Martin Emms
,
Budi Arief
,
Nicholas Little
,
Aad P. A. van Moorsel
Risks of Offline Verify PIN on Contactless Cards.
Financial Cryptography
(2013)
Martin Emms
,
Budi Arief
,
Aad P. A. van Moorsel
Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors.
APF
(2012)
David Greathead
,
Lynne M. Coventry
,
Budi Arief
,
Aad P. A. van Moorsel
Deriving requirements for an online community interaction scheme: indications from older adults.
CHI Extended Abstracts
(2012)
Budi Arief
,
Aad P. A. van Moorsel
,
David Greathead
,
Lynne M. Coventry
Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies.
CASoN
(2011)
Budi Arief
,
Axel von Arnim
TRACKSS Approach to Improving Road Safety through Sensors Collaboration on Vehicle and in Infrastructure.
VTC Fall
(2008)
Alexei Iliasov
,
Alexander B. Romanovsky
,
Budi Arief
,
Linas Laibinis
,
Elena Troubitsyna
On Rigorous Design and Implementation of Fault Tolerant Ambient Systems.
ISORC
(2007)
Alexei Iliasov
,
Alexander B. Romanovsky
,
Budi Arief
A Framework for Open Distributed System Design.
COMPSAC (2)
(2007)
Budi Arief
,
Alexei Iliasov
,
Alexander B. Romanovsky
On Developing Open Mobile Fault Tolerant Agent Systems.
SELMAS (LNCS)
(2006)
Budi Arief
,
Alexei Iliasov
,
Alexander B. Romanovsky
On using the CAMA framework for developing open mobile fault tolerant agent systems.
SELMAS
(2006)
Denis Besnard
,
Budi Arief
Computer security impaired by legitimate users.
Comput. Secur.
23 (3) (2004)
Cristina Gacek
,
Budi Arief
The Many Meanings of Open Source.
IEEE Softw.
21 (1) (2004)