School of Computing

Publications by Dr Budi Arief

Also view these in the Kent Academic Repository

Ali, M. et al. (2017). Does The Online Card Payment Landscape Unwittingly Facilitate Fraud? IEEE Security & Privacy [Online] 15:78-86. Available at:
McGough, A. et al. (2015). Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications [Online] 6:3-46. Available at:
Gacek, C. and Arief, B. (2004). The Many Meanings of Open Source. IEEE Software [Online] 21:34-40. Available at:
Besnard, D. and Arief, B. (2004). Computer security impaired by legitimate users. Computers and Security [Online] 23:253-264. Available at:
Arief, B. et al. (1999). Specifying distributed system services. British Telecom technology journal [Online] 17:126-136. Available at:
Book section
Selvarajah, K. et al. (2012). Deploying Wireless Sensor Devices in Intelligent Transportation System Applications. in: Abdel-Rahim, A. ed. Intelligent Transportation Systems. InTech.
Arief, B., Iliasov, A. and Romanovsky, A. (2007). On developing open mobile fault tolerant agent systems. in: Choren, R. et al. eds. Software Engineering for Multi-Agent Systems V. Shanghai: Springer, pp. 21-40. Available at:
Bryans, J. and Arief, B. (2006). Security implications of structure. in: Besnard, D., Gacek, C. and Jones, C. eds. Structure for Dependability: Computer-Based Systems from an Interdisciplinary Perspective. London: Springer London, pp. 217-227. Available at:
Emms, M. et al. (2013). POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards. CS-TR-1386.
Emms, M. et al. (2012). The Dangers of Verify PIN on Contactless Cards. CS-TR-1332.
van Moorsel, A. et al. (2011). Digital Strategy for the Social Inclusion of Survivors of Domestic Violence. CS-TR-1277.
Arief, B., Coleman, J. and Greathead, D. (2010). How Paranoid Are You?: Issues in Location Information of Ambient Systems. CS-TR-1219.
Besnard, D. and Arief, B. (2003). Computer security impaired by legal users. CS-TR-794.
Arief, B. and Besnard, D. (2003). Technical and Human Issues in Computer-Based Systems Security. CS-TR-790.
Arief, B. et al. (2002). Dependability Issues in Open Source Software - DIRC Project Activity 5 Final Report. CS-TR-760.
Conference or workshop item
McBride, J., Arief, B. and Hernandez-Castro, J. (2018). Security Analysis of Contiki IoT Operating System. in: International Conference on Embedded Wireless Systems and Networks (EWSN) 2018. pp. 278-283. Available at:
Anderson, T. et al. (2015). How To Succeed in Cyberspace. in: 8th Annual International Conference of Education, Research and Innovation (ICERI). pp. 6074-6083.
Arief, B. et al. (2014). Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse. in: 13th Workshop on Privacy in the Electronic Society. ACM, pp. 201-204. Available at:
Emms, M., Arief, B. and van Moorsel, A. (2014). Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. in: Preneel, B. and Ikonomou, D. eds. Annual Privacy Forum. Springer Berlin Heidelberg, pp. 203-214. Available at:
Emms, M. et al. (2013). Risks of Offline Verify PIN on Contactless Cards. in: Sadeghi, A. -R. ed. Proceedings of the 17th international conference, Financial Cryptography and Data Security (FC'13). Berlin: Springer Berlin Heidelberg, pp. 313-321. Available at:
Greathead, D. et al. (2012). Deriving Requirements for an Online Community Interaction Scheme: Indications from Older Adults. in: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2012) Extended Abstracts on Human Factors in Computing Systems. Austin, Texas, USA, pp. 1541-1546. Available at:
Arief, B. et al. (2011). Towards the Implementation of an Internet-based Neighbourhood Watch Scheme. in: 3rd International Conference on Computational Aspects of Social Networks (CASoN).
Arief, B. and von Arnim, A. (2008). TRACKSS approach to improving road safety through sensors collaboration on vehicle and in infrastructure. in: 68th Semi-Annual IEEE Vehicular Technology, VTC 2008-Fall, Conference. IEEE. Available at:
von Arnim, A., Arief, B. and Fusee, A. (2008). Cooperative Road Sign and Traffic Light Using Near Infrared Identification and Zigbee Smartdust Technologies. in: 15th World Congress on Intelligent Transport Systems and ITS America Annual Meeting 2008. pp. 1696-1707. Available at:
Arief, B. et al. (2008). Integrating Smartdust into Intelligent Transportation System. in: 10th International Conference on Application of Advanced Technologies in Transportation (AATT 2008).
Iliasov, A. et al. (2007). On rigorous design and implementation of fault tolerant ambient systems. in: 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing, ISORC 2007. pp. 141-145. Available at:
Arief, B., Iliasov, A. and Romanovsky, A. (2007). Rigorous Development of Ambient Campus Applications that can Recover from Errors. in: Workshop on Methods, Models and Tools for Fault-Tolerance (MeMoT 2007), at the International Conference on Integrated Formal Methods 2007 (IFM 2007). pp. 103-110.
Iliasov, A. et al. (2007). A framework for open distributed system design. in: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007. pp. 658-668. Available at:
Arief, B., Iliasov, A. and Romanovsky, A. (2006). On using the CAMA framework for developing open mobile fault tolerant agent systems. in: 2006 International Workshop on Software Engineering for Large-Scale Multi-Agent Systems, SELMAS '06, Co-located with the 28th International Conference on SoftwareEngineering, ICSE 2006. pp. 29-36. Available at:
Grosso, S. et al. (2006). Collaborations among in-vehicle and infrastructure-based sensing technology for automotive applications: The EMMA and TRACKSS EU Projects. in: IET Seminar on RFID and Electronic Vehicle Identification in Road Transport. Newcastle, pp. 57-65. Available at:
Gacek, C., Lawrie, T. and Arief, B. (2002). Interdisciplinary Insights on Open Source. in: Proceedings of the Open Source Software Development Workshop. pp. 68-82. Available at:
Arief, B., Gacek, C. and Lawrie, T. (2001). Software Architectures and Open Source Software – Where can Research Leverage the Most? in: 1st Workshop on Open Source Software Engineering. ACM, pp. 3-5.
Speirs, N. and Arief, B. (2000). Simulation of a telecommunication system using simML. in: 33rd Annual Simulation Symposium. Los Alamitos, CA, United States, Washington, DC, USA: IEEE Computer Society Press, pp. 131-138. Available at:
Arief, B. and Speirs, N. (2000). A UML tool for an automatic generation of simulation programs. in: Second International Workshop on Software and Performance WOSP2000. pp. 71-76. Available at:
Arief, B. and Speirs, N. (1999). Simulation Generation from UML Like Specifications. in: IASTED Applied Modelling and Simulation (AMS'99). pp. 384-388.
Arief, B. and Speirs, N. (1999). Automatic Generation of Distributed System Simulations from UML. in: 13th European Simulation Multiconference (ESM'99). pp. 85-91. Available at:
McBride, J., Hernandez-Castro, J. and Arief, B. (2017). Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override. in: International Workshop on Secure Internet of Things 2017 (SIoT 2017).
Total publications in KAR: 37 [See all in KAR]

School of Computing, University of Kent, Canterbury, Kent, CT2 7NF

Enquiries: +44 (0)1227 824180 or contact us.

Last Updated: 24/06/2018