© University of Kent - Contact | Feedback | Legal | FOI | Cookies
Budi Arief
Senior Lecturer / Operations Lead at the Institute of Cyber Security for Society (iCSS) / REF co-ordinator
![]() |
|
|
Publications
My publications are available from the University of Kent's Academic Repository.
My full publications list can be found below, or you can have a look at my Google Scholar page.
Research Interests
I belong to the following research groups:
My main research areas are cybercrime (especially in understanding the stakeholders involved), computer security, and the Internet of Things, with a strong overarching element of interdisciplinary research. Currently, I focus on applying machine learning for cyber security research (including leveraging Large Language Models for improving security), and investigating various aspects of ransomware. I have also worked in the areas of reliability and dependability of computer-based systems, wireless sensor networks (in the intelligent transport system domain), distributed systems (including performance evaluation and simulation) and software engineering (in particular, open source software).If you are interested to do a PhD in security-related topic with me, please drop me a line at b.arief@kent.ac.uk.
Other Information
Prior to joining the School of Computing at the University of Kent, I was a Senior Research Associate at Newcastle University's School of Computing Science.
Funded Projects
- UK TSB: Safety App for Vulnerable Users (Oct'12-Mar'13)
- UK EPSRC: Cybercrime Network (Sep'12-Aug'15)
- UK EPSRC: Hyper-privacy: Case of Domestic Violence (Apr'13-Mar'14)
- UK TSB: Secure Mobile Safety Apps for Vulnerable Groups (Apr'13-Mar'15)
- EU ISEC: Novel Image/photo Forensic Tools for fighting against child pornography (NIFTy) (Jul'13-Jul'15)
- UK Dstl: Cyber Defence: Identifying anomalous human behaviour in heterogeneous systems using beneficial intelligent software (Ben-ware) (Apr’14-Sep’14)
- EU CIPS: Shaping University Curricula to Critical Infrastructure Employer Needs (SUCCEED) (Sep’14-Feb’16)
- Newcastle University’s Contactless and Wearable Technologies (Feb’15-Mar’15)
- UK Metropolitan Police Service: Mobile Smartcard Reader (Mar’15-Oct’15)
- Fostering Collaboration Between Newcastle and Kent (Jan’16-Mar’16)
- Newcastle Access Control Live Lab (Jan’16-Mar’16)
- Kent University’s Internet of Things (Jan’16-Mar’16)
- Red-Blue Team Approach for Securing IoT Operating Systems (Jan'17-Mar'17)
- Equipment for Continuing Summer Internship Work (Feb'17-Mar'17)
- University of Kent's Faculty and School funding: Support for collaborative research on secure software for the Internet of Things (Feb'17-Jul'17)
- UK EPSRC: EconoMical, PsycHologicAl and Societal Impact of RanSomware (EMPHASIS) (Jul’17-Dec’19), https://gow.epsrc.ukri.org/NGBOViewGrant.aspx?GrantRef=EP/P011772/1
- UK VeTSS: Symbolic Computation for Mainstream Verification (Apr’21-Mar’22)
- UK Dstl/FNC: Playing Cyber Security Games (Jan’23-Nov’23)
- EU H2020: Novel Strategies to Fight Child Sexual Exploitation and Human Trafficking Crimes and Protect their Victims (HEROES) (Dec’21-Nov’24), https://heroes-fct.eu/
- EU ISF: Child-protection based strategies to fight against sexual abuse and exploitation crimes (ALUNA) (Jun'23-May'25), https://www.aluna-isf.eu/
- UK EPSRC: Countering HArms caused by Ransomware in the Internet Of Things (CHARIOT) (Sep'23-Aug'26), https://gtr.ukri.org/projects?ref=EP%2FX036707%2F1
- UKRI Horizon Europe Guarantee Extension: Continuum of Trust: Increased Path Agility and Trustworthy Device and Service Provisioning (CASTOR) (Oct'24-Sep'27), https://castorhorizon.eu/
Full List of Publications
- Orçun Çetin, Baturay Birinci, Çağlar Uysal, Budi Arief, "Exploring the Cybercrime Potential of LLMs: A Focus on Phishing and Malware Generation", accepted to 2025 European Interdisciplinary Cybersecurity Conference (EICC '25), 2025 [Authors' Accepted Manuscript].
- Yichao Wang, Budi Arief, Julio Hernandez-Castro, "Secure in the Dark? An In-Depth Analysis of Dark Web Markets Security", International Journal of Information Security, Volume 24, Article Number 107, 2025 [Authors' Accepted Manuscript | link].
- Lena Connolly, Hervé Borrion, Budi Arief, "Ransomware Crime through the Lens of Neutralisation Theory", accepted to European Journal of Criminology, 2025 [link].
- Yagiz Yilmaz, Orcun Cetin, Omer Said Ozturk, Emre Ekmekcioglu, Budi Arief, Julio Hernandez-Castro, "Assessing The Silent Frontlines: Exploring The Impact of DDoS Hacktivism In The Russo-Ukrainian War", In Proceedings of the 40th Annual Computer Security Applications Conference (ACSAC'24), 9-13 December 2024 [Authors' Accepted Manuscript | link].
- Orçun Çetin, Emre Ekmekcioglu, Budi Arief, Julio Hernandez-Castro, "An Empirical Evaluation of Large Language Models in Static Code Analysis for PHP Vulnerability Detection", Journal of Universal Computer Science, 30(9):1163-1183, 2024 [Authors' Accepted Manuscript | link].
- Adel ElZemity, Budi Arief, "Privacy Threats and Countermeasures in Federated Learning for Internet of Things: A Systematic Review", International Workshop on Emerging Technology in IoT, held in conjunction with the 2024 IEEE International Conference on Internet of Things (iThings-2024), 19-22 August 2024 [arXiv | link].
- Meryem Berfin Ozkok, Baturay Birinci, Orcun Cetin, Budi Arief, Julio Hernandez-Castro, "Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot Logs", In Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference (EICC '24), pp. 128-135, 5-6 June 2024 [Authors' Accepted Manuscript | link].
- Yichao Wang, Budi Arief, Julio Hernandez-Castro, "Analysis of Security Mechanisms of Dark Web Markets", In Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference (EICC '24), pp. 120-127, 5-6 June 2024 [Authors' Accepted Manuscript | link].
- Yagiz Yilmaz, Orçun Çetin, Claudia Grigore, Budi Arief, Julio Hernandez-Castro, "Personality Types and Ransomware Victimisation", ACM Digital Threats: Research and Practice, Volume 4, Number 4, Article 53, October 2023 (Available online from 26 October 2022) [pdf | link].
- Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief, "Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions", ACM Digital Threats: Research and Practice, Volume 4, Number 3, Article 45, October 2023 [link].
- Yichao Wang, Sophia Roscoe, Budi Arief, Lena Connolly, Hervé Borrion, Sanaa Kaddoura, "The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities", In: B. Arief, A. Monreale, M. Sirivianos, S. Li (eds) Security and Privacy in Social Networks and Big Data (SocialSec 2023), LNCS 14097, Springer, pp. 149-163, 2023 [pdf | link].
- Lena Connolly, Hervé Borrion, Budi Arief, Sanaa Kaddoura, "Applying Neutralisation Theory to Better Understand Ransomware Offenders", In 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 177-182, 2023 [pdf | link].
- Yichao Wang, Budi Arief, Virginia N.L. Franqueira, Anna Grace Coates, Caoilte Ó Ciardha, "Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned", In Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference (EICC '23), pp. 59-64, 14-15 June 2023 [Camera Ready Version | link].
- Omer Said Ozturk, Emre Ekmekcioglu, Orcun Cetin, Budi Arief, Julio Hernandez-Castro, "New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?", In Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference (EICC '23), pp. 13-18, 14-15 June 2023 [Camera Ready Version | link].
- Yichao Wang, Budi Arief, Julio Hernandez-Castro, "Dark Ending: What Happens When A Dark Web Market Closes Down", In Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP 2023), pp. 106-117, 22-24 February 2023 [Camera Ready Version | link].
- Yekta Kocaogullar, Orçun Çetin, Budi Arief, Calvin Brierley, Jamie Pont and Julio Hernandez-Castro, "Hunting High or Low: Evaluating the Effectiveness of High-Interaction and Low-Interaction Honeypots", 12th International Workshop on Socio-Technical Aspects in Security (STAST 2022), LNCS 13855, pp. 14-30, 29 September 2022 [Pre-proceedings version from the workshop | link].
- Sharifah Roziah Binti Mohd Kassim, Solahuddin Bin Shamsuddin, Shujun Li, Budi Arief, "How national CSIRTs Operate: Personal Observations and Opinions from MyCERT", 2022 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1-2, 2022 [link].
- Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief, "Incident Response Practices Across National CSIRTs: Results from an Online Survey", OIC-CERT Journal of Cyber Security, 4(1):67-84, 2022 [pdf].
- Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief, "How national CSIRTs leverage public data, OSINT and free tools in operational practices: An empirical study", Cyber Security: A Peer-Reviewed Journal 5(3):251-276, 2022 [pdf | link].
- Yichao Wang, Budi Arief, Julio Hernandez-Castro, "Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets", APWG Symposium on Electronic Crime Research (eCrime 2021), 1-3 December 2021 [Pre Camera Ready Version | link].
- Calvin Brierley, Budi Arief, David Barnes, Julio Hernandez-Castro, "Industrialising Blackmail: Privacy Invasion Based IoT Ransomware", In 26th Nordic Conference on Secure IT Systems (NordSec 2021), pp. 72-92, 2021 [pdf | link].
- Burak Filiz, Budi Arief, Orçun Çetin, Julio Hernandez-Castro, "On the Effectiveness of Ransomware Decryption Tools", Computers & Security, 102469, 2021 (available online: 30 September 2021) [link].
- Yagiz Yilmaz, Orçun Çetin, Budi Arief, Julio Hernandez-Castro, "Investigating the impact of ransomware splash screens", Journal of Information Security and Applications, Volume 61, 102934, September 2021 (available online: 28 July 2021) [link].
- Francesca Stevens, Jason R.C. Nurse, Budi Arief, "Cyber Stalking, Cyber Harassment, and Adult Mental Health: A Systematic Review", Journal of Cyberpsychology, Behavior, and Social Networking, Vol. 24, Issue 6, pp. 367-376, 14 June 2021 (online ahead of print: 12 November 2020) [pdf | link].
- Calvin Brierley, Jamie Pont, Budi Arief, David J. Barnes, Julio Hernandez-Castro, "Persistence in Linux-Based IoT Malware", In Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings 25, pp. 3-19, Springer International Publishing, 2020 [pdf | link].
- Jamie Pont, Budi Arief, Julio Hernandez-Castro, "Why Current Statistical Approaches to Ransomware Detection Fail", In International Conference on Information Security (ISC 2020), Springer, Cham, pp. 199-216, 2020 [pdf | link].
- Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, Vassilios G. Vassilakis, "Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms", In Proceedings of the 2nd International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things, pp. 62-68, 2020 [pdf | link].
- Calvin Brierley, Jamie Pont, Budi Arief, David J. Barnes, Julio Hernandez-Castro, "PaperW8: An IoT Bricking Ransomware Proof of Concept", 4th International Workshop on Security and Forensics of IoT (IoT-SECFOR 2020), In Proceedings of the 15th International Conference on Availability, Reliability and Security, 2020 [pdf | link].
- Budi Arief, Andy Periam, Orçun Çetin, Julio Hernandez-Castro, "Using Eyetracker to Find Ways to Mitigate Ransomware", 6th International Conference on Information Systems Security and Privacy (ICISSP 2020), pp. 448-456, 2020 [pdf | link].
- Jamie Pont, Osama Abu Oun, Calvin Brierley, Budi Arief, Julio Hernandez-Castro, "A Roadmap for Improving the Impact of Anti-Ransomware Research", In: A. Askarov, R. Hansen, W. Rafnsson (eds) Secure IT Systems, NordSec 2019, Lecture Notes in Computer Science, vol 11875, Springer, Cham, pp. 137-154, 2019 [pdf | link].
- Ali Hariri, Nicolas Giannelos, Budi Arief, "Selective Forwarding Attack on IoT Home Security Kits", 2nd International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2019), in conjunction with ESORICS 2019, pp. 360-373, 2019 [pdf | link].
- Edward Knight, Sam Lord, Budi Arief, "Lock Picking in the Era of Internet of Things", In 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 835-842, 2019 [pdf | link].
- Gavin Hull, Henna John, Budi Arief, "Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses", Crime Science 8(2), 2019 [link].
- Jack McBride, Budi Arief, Julio Hernandez-Castro, "Security Analysis of Contiki IoT Operating System", International Conference on Embedded Wireless Systems and Networks (EWSN) 2018, pp. 278-283, 2018 [pdf | link].
- Jack McBride, Julio Hernandez-Castro, Budi Arief, "Earworms make bad passwords: An analysis of the Noke smart lock manual override", International Workshop on Secure Internet of Things 2017 (SIoT 2017), held in conjunction with ESORICS 2017, pp. 30-39, 15 September 2017 [pdf | link].
- Mohammed Aamir Ali, Budi Arief, Martin Emms, Aad van Moorsel, "Does The Online Card Payment Landscape Unwittingly Facilitate Fraud?", IEEE Security & Privacy, Vol. 15, No. 2, pp. 78-86, 2017 [pdf | link].
- Andrew Stephen McGough, Budi Arief, Carl Gamble, David Wall, John Brennan, John Fitzgerald, Aad van Moorsel, Sujeewa Alwis, Georgios Theodoropoulos, and Ed Ruck-Keene, Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 6, No. 4, pp. 3-46, 2015 [pdf].
- Tom Anderson, Budi Arief, Tehmina Basit, Rosemary Borup, Louise Rutherford, How To Succeed in Cyberspace, Proc. 8th Annual International Conference of Education, Research and Innovation (ICERI), pp. 6074-6083, 2015 [link].
- Andrew Stephen McGough, Budi Arief, David Wall, John Brennan, Carl Gamble, John Fitzgerald, Aad van Moorsel, Sujeewa Alwis, Georgios Theodoropoulos, Ed Ruck-Keene, Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware), Proc. 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST'15), pp.1-12, 2015 [link].
- Budi Arief, Tom Anderson, Rosie Borup, Louise Rutherford, SUCCEED Approach for Better Cyber Security and Counter Terrorism Education, presented at 1st UK Workshop on Cybersecurity Training & Education, 11 June 2015 [pdf].
- Budi Arief, Mohd Azeem Bin Adzmi, Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2-Defenders and Victims, IEEE Security & Privacy, Vol. 13, No. 2, pp. 84-88, Mar-Apr 2015 [link].
- Budi Arief, Mohd Azeem Bin Adzmi, Thomas Gross, Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1-Attackers, IEEE Security & Privacy, Vol. 13, No. 1, pp. 71-76, Jan-Feb 2015 [link].
- Budi Arief, Kovila P. L. Coopamootoo, Martin Emms, Aad van Moorsel, Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse, Proceedings of the 13th Workshop on Privacy in the Electronic Society (WPES'14), pp. 201-204, 2014 [pdf | link].
- Martin Emms, Budi Arief, Leo Freitas, Joseph Hannon, Aad van Moorsel, Harvesting high value foreign currency transactions from EMV contactless credit cards without the PIN, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS'14), pp. 716-726, 2014 [pdf | link].
- Martin Emms, Budi Arief, and Aad Van Moorsel, Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors, Privacy Technologies and Policy, Bart Preneel and Demosthenes Ikonomou (Eds.), LNCS 8319, Springer Berlin Heidelberg, pp. 203-214, 2014 [pdf | link].
- Martin Emms, Budi Arief, Nicholas Little and Aad van Moorsel, Risks of Offline Verify PIN on Contactless Cards, Financial Cryptography and Data Security, Ahmad-Reza Sadeghi (Ed.), LNCS 7859, Springer Berlin Heidelberg, pp. 313-321, 2013 [pdf | link].
- Martin Emms, Budi Arief, Joseph Hannon, Aad van Moorsel, POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards, Technical Report CS-TR-1386, School of Computing Science, Newcastle University, pp. 1-8, May 2013 [pdf].
- Martin Emms, Budi Arief, Troy Defty, Joseph Hannon, Feng Hao and Aad van Moorsel, The Dangers of Verify PIN on Contactless Cards, Technical Report CS-TR-1332, School of Computing Science, Newcastle University, 2013 [pdf].
- David Greathead, Lynne Coventry, Budi Arief, Aad van Moorsel, Deriving Requirements for an Online Community Interaction Scheme: Indications from Older Adults, ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), Austin, Texas, USA, 2012 [pdf].
- Kirusnapillai Selvarajah, Budi Arief, Alan Tully A, Phil Blythe, Deploying Wireless Sensor Devices in Intelligent Transportation System Applications, Intelligent Transportation Systems, In: Abdel-Rahim, A, ed. Intelligent Transportation Systems, InTech, Rijeka, Croatia, 143-168, 2012 [pdf].
- Budi Arief, David Greathead, Lynne Coventry, and Aad van Moorsel, Towards the Implementation of an Internet-based Neighbourhood Watch Scheme: Impacts of Inclusive Technologies on Societies, 3rd International Conference on Computational Aspects of Social Networks (CASoN), Salamanca, Spain, 19-22 October 2011 [pdf].
- Budi Arief, David Greathead, Chris Smith, Lynne Coventry, Aad van Moorsel, and Phil Butler, Inclusive Technology’s Impact on Society through the Neighbourhood Watch Scheme, Presented at Connected Communities Symposium, Newcastle upon Tyne, 12-14 September 2011 [pdf].
- Aad van Moorsel, Martin Emms, Gemma Rendall, Budi Arief, Digital Strategy for the Social Inclusion of Survivors of Domestic Violence, Technical Report CS-TR-1277, School of Computing Science, Newcastle University, pp. 1-18, 29 July 2011 [pdf].
- Budi Arief, Joey Coleman and David Greathead, How Paranoid Are You?: Issues in Location Information of Ambient Systems, Technical Report CS-TR-1219, School of Computing Science, Newcastle University, pp. 1-16, October 2010 [pdf].
- Alexei Iliasov, Budi Arief and Alexander Romanovsky, Step-Wise Development of Resilient Ambient Campus Scenarios, in Methods, Models and Tools for Fault Tolerance, LNCS 5454, Springer, Michael Butler, Cliff Jones, Alexander Romanovsky, and Elena Troubitsyna (Eds), pp. 297-323, 2009 [pdf].
- Budi Arief, Phil Blythe and Alan Tully, Using Smart Dust in Transport Domain, Position paper presented at UbiComp Grand Challenge Workshop, London, 6-7 January 2009 [pdf].
- Axel von Arnim, Budi Arief, and Antoine Fusee, Cooperative Road Sign and Traffic Light Using Near Infrared Identification and Zigbee Smartdust Technologies, Presented at 15th World Congress on Intelligent Transport Systems (ITS 2008), New York, USA (also available as Technical Report CS-TR-1082, Mar 2008), 16-20 November 2008 [pdf].
- Budi Arief and Axel von Arnim, TRACKSS Approach to Improving Road Safety through Sensors Collaboration on Vehicle and in Infrastructure, Presented at 2nd IEEE International Symposium on Wireless Vehicular Communications (WiVeC 2008), Calgary, Canada, 21-22 September 2008 [pdf].
- Budi Arief, Phil Blythe, Richard Fairchild, Kirusnapillai Selvarajah, and Alan Tully, Integrating Smartdust into Intelligent Transportation System, Presented at 10th International Conference on Application of Advanced Technologies in Transportation (AATT 2008), Athens, Greece (also available as Technical Report CS-TR-1062, Dec 2007), 27-31 May 2008 [pdf].
- Alexei Iliasov, Alexander Romanovsky, Budi Arief, Linas Laibinis and Elena Troubitsyna, A Framework for Open Distributed System Design, Proceedings of Computer Software & Applications Conference (COMPSAC 07), Volume II - Workshop Papers, 1st IEEE International Workshop on Software Patterns (SPAC 2007), Beijing, China, pp. 658-668, 27 July 2007 [pdf].
- Budi Arief, Alexei Iliasov and Alexander Romanovsky, On Developing Open Mobile Fault Tolerant Agent Systems, in Software Engineering for Multi-Agent Systems V, LNCS 4408, Springer, R. Choren, A. Garcia, H. Giese, H.-f. Leung, C. Lucena, and A. Romanovsky (Eds), pp. 21-40, 2007 [pdf].
- Budi Arief, Alexei Iliasov, and Alexander Romanovsky, Rigorous Development of Ambient Campus Applications that can Recover from Errors, Presented at the Workshop on Methods, Models and Tools for Fault-Tolerance (MeMoT 2007), at the International Conference on Integrated Formal Methods 2007 (IFM 2007), pp. 103-110, 3 July 2007 [pdf].
- Alexei Iliasov, Alexander Romanovsky, Budi Arief, Linas Laibinis and Elena Troubitsyna, On Rigorous Design and Implementation of Fault Tolerant Ambient Systems, 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC07), Santorini Island, Greece, 7-9 May, pp. 141-145, 2007 [pdf].
- Alexei Iliasov, Alexander Romanovsky, Budi Arief, Linas Laibinis and Elena Troubitsyna, On Rigorous Design and Implementation of Fault Tolerant Ambient Systems, Technical Report CS-TR-993, School of Computing Science, Newcastle University, December 2006 [pdf].
- Budi Arief, Alexei Iliasov and Alexander Romanovsky, On Using the CAMA Framework for Developing Open Mobile Fault Tolerant Agent Systems, SELMAS 2006 workshop at ICSE 2006, Shanghai, China, (also as Technical Report CS-TR-943, School of Computing Science, Newcastle University), pp. 29-36, 22-23 May 2006 [pdf].
- Jeremy Bryans and Budi Arief, Security Implications of Structure, in Structure for Dependability: Computer-Based Systems from an Interdisciplinary Perspective, D. Besnard, C. Gacek, and C.B. Jones (eds.), Springer, pp. 217-227, 2006 [pdf].
- Gordon Baxter, Budi Arief, Shamus Smith, Andrew Monk, Structuring Dependable On-line Services: A Case Study Using Internet Grocery Shopping, Paper given at the Annual DIRC Conference, Edinburgh, ISBN 1-86220-159-5, pp. 114-118, 15-17 March 2005 [pdf].
- Denis Besnard and Budi Arief, Computer security impaired by legitimate users, Computers & Security, Volume 23, Issue 3, pp. 253-264, May 2004 [pdf | link].
- Cristina Gacek and Budi Arief, The Many Meanings Of Open Source, IEEE Software, Vol. 21, No. 1, pp. 34-40, January/February 2004 [link].
- Denis Besnard and Budi Arief, Computer Security Impaired by Legal Users, Technical Report CS-TR-794, School of Computing Science, Newcastle University, May 2003 [pdf].
- Budi Arief and Denis Besnard, Technical and Human Issues in Computer-Based Systems Security, Technical Report CS-TR-790, School of Computing Science, Newcastle University, March 2003 [pdf].
- Cristina Gacek, Tony Lawrie and Budi Arief, Interdisciplinary Insights on Open Source, Proceedings of the Open Source Software Development Workshop, Newcastle University, pp. 68-82, February 2002 [pdf].
- Cristina Gacek and Budi Arief, editors, Proceedings of the Open Source Software Development Workshop, Newcastle University, Newcastle upon Tyne, United Kingdom, February 2002 [pdf].
- Budi Arief, Diana Bosio, Cristina Gacek, and Mark Rouncefield, Dependability Issues in Open Source Software - DIRC Project Activity 5 Final Report, Technical Report CS-TR-760, School of Computing Science, Newcastle University, February 2002 [pdf].
- Cristina Gacek, Tony Lawrie and Budi Arief, The many meanings of Open Source, Technical Report CS-TR-737, School of Computing Science, Newcastle University, pp. 1-15, 6th August 2001 [pdf].
- Budi Arief, Cristina Gacek and Tony Lawrie, Software Architectures and Open Source Software - Where can Research Leverage the Most?, Position Paper included in the Proceeding of 1st Workshop on Open Source Software Engineering, Toronto, Canada, pp. 3-5, 15th May 2001 [pdf].
- L.B. Arief and N.A. Speirs, A UML Tool for an Automatic Generation of Simulation Programs, Technical Report CS-TR-731, School of Computing Science, Newcastle University, pp. 1-12, 30th April 2001 [pdf].
- L.B. Arief and N.A. Speirs, A UML Tool for an Automatic Generation of Simulation Programs, ACM Proceedings of 2nd International Workshop on Software Performance (WOSP 2000), Ottawa, Canada, pp. 71-76, September 2000 [pdf].
- N.A. Speirs and L.B.Arief, Simulation of a Telecommunication System using SimML, IEEE Proceedings of 33rd Annual Simulation Symposium (ANSS 2000), Washington D.C., USA, pp. 131-138, April 2000 [pdf].
- L.B. Arief and N.A. Speirs, Using SimML to Bridge the Transformation from UML to Simulation, Position Paper in Workshop on Software Performance & Prediction, Heriot-Watt University, Edinburgh, 25 November 1999 [pdf].
- L.B. Arief and N.A. Speirs, Simulation Generation from UML Like Specifications, Proc. IASTED Applied Modelling and Simulation (AMS'99), Cairns, Australia, pp. 384-388, September 1999 [pdf].
- L.B. Arief and N.A. Speirs, Automatic Generation of Distributed System Simulations from UML, Proc. 13th European Simulation Multiconference (ESM'99), Warsaw, Poland, pp. 85-91, June 1999 [pdf].
- L.B. Arief, M.C. Little, S.K. Shrivastava, N.A. Speirs and S.M. Wheater, Specifying Distributed System Services, BT Technical Journal - Special Issue, Vol. 17, No. 2, pp. 126-136, April 1999 [pdf].