School of Computing

Publications by Dr Budi Arief

Also view these in the Kent Academic Repository

Articles
Yilmaz, Y., Cetin, O., Grigore, C., Arief, B. and Hernandez-Castro, J. (2023) 'Personality Types and Ransomware Victimisation', Digital Threats: Research and Practice. ACM, pp. 1-25. doi: 10.1145/3568994.
Mohd Kassim, S. R. B., Li, S. and Arief, B. (2023) 'Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions', Digital Threats: Research and Practice. Association for Computing Machinery (ACM), pp. 1-24. doi: 10.1145/3609230.
Mohd Kassim, S. R. B., Li, S. and Arief, B. (2022) 'Incident Response Practices Across National CSIRTs: Results from an Online Survey', OIC-CERT Journal of Cyber Security. OIC CERT, pp. 67-84. Available at: https://www.oic-cert.org/en/journal/vol-4-issue-1/5.html.
Mohd Kassim, S. R. B., Li, S. and Arief, B. (2022) 'How National CSIRTs Leverage Public Data, OSINT and Free Tools in Operational Practices: An Empirical Study', Cyber Security: A Peer-Reviewed Journal. Simon Beckett, pp. 251-276. Available at: https://www.ingentaconnect.com/contentone/hsp/jcs/2022/00000005/00000003/art00007.
Filiz, B., Arief, B., Cetin, O. and Hernandez-Castro, J. C. (2021) 'On the Effectiveness of Ransomware Decryption Tools', Computers & Security. Elsevier. doi: 10.1016/j.cose.2021.102469.
Yilmaz, Y., Cetin, O., Arief, B. and Hernandez-Castro, J. C. (2021) 'Investigating the Impact of Ransomware Splash Screens', Journal of Information Security and Applications. Elsevier. doi: 10.1016/j.jisa.2021.102934.
Stevens, F., Nurse, J. R. C. and Arief, B. (2020) 'Cyber Stalking, Cyber Harassment and Adult Mental Health: A Systematic Review', Cyberpsychology, Behavior, and Social Networking. Mary Ann Liebert. doi: 10.1089/cyber.2020.0253.
Hull, G., John, H. and Arief, B. (2019) 'Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses', Crime Science. Springer. doi: 10.1186/s40163-019-0097-9.
Ali, M. A., Arief, B., Emms, M. and van Moorsel, A. (2017) 'Does The Online Card Payment Landscape Unwittingly Facilitate Fraud?', IEEE Security & Privacy. IEEE Computer Society, pp. 78-86. doi: 10.1109/MSP.2017.27.
McGough, A. S., Arief, B., Gamble, C., Wall, D., Brennan, J., Fitzgerald, J., van Moorsel, A., Alwis, S., Theodoropoulos, G. and Ruck-Keene, E. (2015) 'Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour', Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. Innovative Information Science & Technology Research Group, pp. 3-46. Available at: http://jowua.yolasite.com/vol6no4.php.
Arief, B. and Bin Adzmi, M. A. (2015) 'Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2 - Defenders and Victims', IEEE Security & Privacy. IEEE Computer Society, pp. 84-88. doi: 10.1109/MSP.2015.44.
Arief, B., Bin Adzmi, M. A. and Gross, T. (2015) 'Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1 - Attackers', IEEE Security & Privacy. IEEE Computer Society, pp. 71-76. doi: 10.1109/MSP.2015.19.
Gacek, C. and Arief, B. (2004) 'The Many Meanings of Open Source', IEEE Software. IEEE, pp. 34-40. doi: 10.1109/MS.2004.1259206.
Besnard, D. and Arief, B. (2004) 'Computer security impaired by legitimate users', Computers and Security. Elsevier, pp. 253-264. doi: 10.1016/j.cose.2003.09.002.
Arief, B., Little, M., Shrivastava, S., Speirs, N. and Wheater, S. (1999) 'Specifying distributed system services', British Telecom technology journal. London, United Kingdom: BT Lab plc, pp. 126-136. doi: 10.1023/A:1009650219559.
Book sections
McBride, J., Hernandez-Castro, J. and Arief, B. (2018) 'Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override', in 2017 International Workshop on Secure Internet of Things (SIoT). International Workshop on Secure Internet of Things 2017 (SIoT 2017), IEEE. doi: 10.1109/SIoT.2017.00009.
McBride, J., Arief, B. and Hernandez-Castro, J. C. (2018) 'Security Analysis of Contiki IoT Operating System', in EWSN '18 Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks. International Conference on Embedded Wireless Systems and Networks (EWSN) 2018, Canada: Junction Publishing, pp. 278-283.
McGough, A. S., Wall, D., Brennan, J., Theodoropoulos, G., Ruck-Keene, E., Arief, B., Gamble, C., Fitzgerald, J., van Moorsel, A. and Alwis, S. (2015) 'Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware)', in Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats. Proceedings of the 7th ACM CCS (Computer and Communications Security) International Workshop on Managing Insider Security Threats (MIST'15), New York, USA: ACM, pp. 1-12. doi: 10.1145/2808783.2808785.
Arief, B., Coopamootoo, K. P., Emms, M. and van Moorsel, A. (2014) 'Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse', in Proceedings of the 13th Workshop on Privacy in the Electronic Society. 13th Workshop on Privacy in the Electronic Society, New York, USA: ACM, pp. 201-204. doi: 10.1145/2665943.2665965.
Selvarajah, K., Arief, B., Tully, A. and Blythe, P. (2012) 'Deploying Wireless Sensor Devices in Intelligent Transportation System Applications', in Abdel-Rahim, A. (ed.) Intelligent Transportation Systems. InTech. doi: 10.5772/25993.
Greathead, D., Coventry, L., Arief, B. and van Moorsel, A. (2012) 'Deriving Requirements for an Online Community Interaction Scheme: Indications from Older Adults', in CHI '12 Extended Abstracts on Human Factors in Computing Systems. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2012) Extended Abstracts on Human Factors in Computing Systems, New York, USA: ACM, pp. 1541-1546. doi: 10.1145/2212776.2223669.
von Arnim, A., Arief, B. and Fusée, A. (2008) 'Cooperative Road Sign and Traffic Light Using Near Infrared Identification and Zigbee Smartdust Technologies', in 15th World Congress on Intelligent Transport Systems and ITS America Annual Meeting 2008. 15th World Congress on Intelligent Transport Systems and ITS America Annual Meeting 2008, pp. 1696-1707.
Iliasov, A., Romanovsky, A., Arief, B., Laibinis, L. and Troubitsyna, E. (2007) 'On rigorous design and implementation of fault tolerant ambient systems', in 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07). 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing, ISORC 2007, IEEE, pp. 141-145. doi: 10.1109/ISORC.2007.46.
Arief, B., Iliasov, A. and Romanovsky, A. (2007) 'On developing open mobile fault tolerant agent systems', in Choren, R., Garcia, A., Giese, H., Leung, H.- f., Lucena, C., and Romanovsky, A. (eds) Software Engineering for Multi-Agent Systems V. International Workshop on Software Engineering for Large-Scale Multi-agent Systems, Shanghai: Springer, pp. 21-40. doi: 10.1007/978-3-540-73131-3_2.
Bryans, J. and Arief, B. (2006) 'Security implications of structure', in Besnard, D., Gacek, C., and Jones, C. (eds) Structure for Dependability: Computer-Based Systems from an Interdisciplinary Perspective. London: Springer London, pp. 217-227. doi: 10.1007/1-84628-111-3_11.
Grosso, S., Tully, A., Arief, B., Marques, A. and Matoses, M. S. (2006) 'Collaborations among in-vehicle and infrastructure-based sensing technology for automotive applications: The EMMA and TRACKSS EU Projects', in IET Seminar on RFID and Electronic Vehicle Identification in Road Transport. IET Seminar on RFID and Electronic Vehicle Identification in Road Transport, IEEE, pp. 57-65. doi: 10.1049/ic:20060135.
Arief, B., Gacek, C. and Lawrie, T. (2001) 'Software Architectures and Open Source Software – Where can Research Leverage the Most?', in 23rd International Conference on Software Engineering. 1st Workshop on Open Source Software Engineering, IEEE, pp. 3-5.
Monographs
Emms, M., Arief, B., Hannon, J. and van Moorsel, A. (2013) POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards. CS-TR-1386.
Emms, M., Arief, B., Defty, T., Hannon, J., Hao, F. and van Moorsel, A. (2012) The Dangers of Verify PIN on Contactless Cards. CS-TR-1332.
van Moorsel, A., Emms, M., Rendall, G. and Arief, B. (2011) Digital Strategy for the Social Inclusion of Survivors of Domestic Violence. CS-TR-1277.
Arief, B., Coleman, J. and Greathead, D. (2010) How Paranoid Are You?: Issues in Location Information of Ambient Systems. CS-TR-1219.
Besnard, D. and Arief, B. (2003) Computer security impaired by legal users. CS-TR-794.
Arief, B. and Besnard, D. (2003) Technical and Human Issues in Computer-Based Systems Security. CS-TR-790.
Arief, B., Bosio, D., Gacek, C. and Rouncefield, M. (2002) Dependability Issues in Open Source Software - DIRC Project Activity 5 Final Report. CS-TR-760.
Conference or workshop items
Wang, Y., Arief, B. and Hernandez-Castro, J. C. (2024) 'Analysis of Security Mechanisms of Dark Web Markets', in. European Interdisciplinary Cybersecurity Conference (EICC 2024).
Wang, Y., Roscoe, S., Arief, B., Connolly, L., Borrion, H. and Kaddoura, S. (2023) 'The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities', in. 9th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2023), Springer Singapore, pp. 149-163. doi: 10.1007/978-981-99-5177-2_9.
Connolly, L., Borrion, H., Arief, B. and Kaddoura, S. (2023) 'Applying Neutralisation Theory to Better Understand Ransomware Offenders', in. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Los Alamitos, CA, USA: IEEE Computer Society, pp. 177-182. doi: 10.1109/EuroSPW59978.2023.00025.
Wang, Y., Arief, B., Franqueira, V. N. L., Coates, A. G. and Ó Ciardha, C. (2023) 'Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned', in. European Interdisciplinary Cybersecurity Conference (EICC 2023), ACM, pp. 59-64. doi: 10.1145/3590777.3590812.
Ozturk, O. S., Ekmekcioglu, E., Cetin, O., Arief, B. and Hernandez-Castro, J. C. (2023) 'New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?', in. European Interdisciplinary Cybersecurity Conference (EICC 2023), ACM, pp. 13-18. doi: 10.1145/3590777.3590780.
Wang, Y., Arief, B. and Hernandez-Castro, J. C. (2023) 'Dark ending: what happens when a dark web market closes down', in. 9th International Conference on Information Systems Security and Privacy (ICISSP 2023). doi: 10.5220/0011681600003405.
Mohd Kassim, S. R. B., Shamsuddin, S. B., Li, S. and Arief, B. (2022) 'How National CSIRTs Operate: Personal Observations and Opinions from MyCERT', in. 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022), IEEE. doi: 10.1109/DSC54232.2022.9888803.
Kocaogullar, Y., Cetin, O., Arief, B., Brierley, C., Pont, J. and Hernandez-Castro, J. C. (2022) 'Hunting High or Low: Evaluating the Effectiveness of High-Interaction and Low-Interaction Honeypots', in. 12th International Workshop on Socio-Technical Aspects in Security (STAST 2022), pp. 15-31.
Brierley, C., Arief, B., Barnes, D. J. and Hernandez-Castro, J. C. (2021) 'Industrialising Blackmail: Privacy Invasion Based IoT Ransomware', in Tuveri, N., Michalas, A., and Brumley, B. (eds). The 26th Nordic Conference on Secure IT Systems (NordSec 2021), Springer, pp. 79-92. doi: 10.1007/978-3-030-91625-1_5.
Brierley, C., Pont, J., Arief, B., Barnes, D. J. and Hernandez-Castro, J. C. (2021) 'Persistence in Linux-Based IoT Malware', in. 25th Nordic Conference on Secure IT Systems (Nordsec), Springer, pp. 3-19. doi: 10.1007/978-3-030-70852-8_1.
Wang, Y., Arief, B. and Hernandez-Castro, J. C. (2021) 'Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets', in. 2021 APWG Symposium on Electronic Crime Research (eCrime), IEEE, pp. 1-13. doi: 10.1109/eCrime54498.2021.9738745.
Pont, J., Arief, B. and Hernandez-Castro, J. C. (2020) 'Why Current Statistical Approaches to Ransomware Detection Fail', in. 23rd Information Security Conference, Springer. doi: 10.1007/978-3-030-62974-8_12.
Yadav, P., Feraudo, A., Arief, B., Shahandashti, S. F. and Vassilakis, V. G. (2020) 'A systematic framework for categorising IoT device fingerprinting mechanisms', in. 2nd Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things (AIChallengeIoT 2020), ACM. doi: 10.1145/3417313.3429384.
Hariri, A., Giannelos, N. and Arief, B. (2020) 'Selective Forwarding Attack on IoT Home Security Kits', in. 2nd International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2019), Springer. doi: 10.1007/978-3-030-42048-2_23.
Arief, B., Periam, A., Cetin, O. and Hernandez-Castro, J. C. (2020) 'Using Eyetracker to Find Ways to Mitigate Ransomware', in. 6th International Conference on Information Systems Security and Privacy (ICISSP), Scitepress, pp. 448-456. doi: 10.5220/0008956004480456.
Pont, J., Abu Oun, O., Brierley, C., Arief, B. and Hernandez-Castro, J. C. (2019) 'A Roadmap for Improving the Impact of Anti-Ransomware Research', in Askarov, A., Hansen, R. R., and Rafnsson, W. (eds). NordSec 2019: The 24th Nordic Conference on Secure IT Systems, Springer. doi: 10.1007/978-3-030-35055-0_9.
Knight, E., Lord, S. and Arief, B. (2019) 'Lock Picking in the Era of Internet of Things', in. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, pp. 835-842. doi: 10.1109/TrustCom/BigDataSE.2019.00121.
Anderson, T., Arief, B., Basit, T., Borup, R. and Rutherford, L. (2015) 'How To Succeed in Cyberspace', in. 8th Annual International Conference of Education, Research and Innovation (ICERI), pp. 6074-6083. doi: WOS:000377304006024.
Emms, M., Arief, B., Freitas, L., Hannon, J. and van Moorsel, A. (2014) 'Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN', in. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, New York, USA: ACM, pp. 716-726. doi: 10.1145/2660267.2660312.
Emms, M., Arief, B. and van Moorsel, A. (2014) 'Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors', in Preneel, B. and Ikonomou, D. (eds). Annual Privacy Forum, Springer Berlin Heidelberg, pp. 203-214. doi: 10.1007/978-3-642-54069-1_13.
Emms, M., Arief, B., Little, N. and van Moorsel, A. (2013) 'Risks of Offline Verify PIN on Contactless Cards', in Sadeghi, A.-R. (ed.). Proceedings of the 17th international conference, Financial Cryptography and Data Security (FC'13), Berlin: Springer Berlin Heidelberg, pp. 313-321. doi: 10.1007/978-3-642-39884-1_26.
Arief, B., Greathead, D., Coventry, L. and van Moorsel, A. (2011) 'Towards the Implementation of an Internet-based Neighbourhood Watch Scheme', in. 3rd International Conference on Computational Aspects of Social Networks (CASoN).
Arief, B. and von Arnim, A. (2008) 'TRACKSS approach to improving road safety through sensors collaboration on vehicle and in infrastructure', in. 68th Semi-Annual IEEE Vehicular Technology, VTC 2008-Fall, Conference, IEEE. doi: 10.1109/VETECF.2008.439.
Arief, B., Blythe, P., Fairchild, R., Selvarajah, K. and Tully, A. (2008) 'Integrating Smartdust into Intelligent Transportation System', in. 10th International Conference on Application of Advanced Technologies in Transportation (AATT 2008).
Arief, B., Iliasov, A. and Romanovsky, A. (2007) 'Rigorous Development of Ambient Campus Applications that can Recover from Errors', in. Workshop on Methods, Models and Tools for Fault-Tolerance (MeMoT 2007), at the International Conference on Integrated Formal Methods 2007 (IFM 2007), pp. 103-110.
Iliasov, A., Romanovsky, A., Arief, B., Laibinis, L. and Troubitsyna, E. (2007) 'A framework for open distributed system design', in. 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, pp. 658-668. doi: 10.1109/COMPSAC.2007.23.
Arief, B., Iliasov, A. and Romanovsky, A. (2006) 'On using the CAMA framework for developing open mobile fault tolerant agent systems', in. 2006 International Workshop on Software Engineering for Large-Scale Multi-Agent Systems, SELMAS '06, Co-located with the 28th International Conference on SoftwareEngineering, ICSE 2006, pp. 29-36. doi: 10.1145/1138063.1138070.
Gacek, C., Lawrie, T. and Arief, B. (2002) 'Interdisciplinary Insights on Open Source', in. Proceedings of the Open Source Software Development Workshop, pp. 68-82. Available at: http://www.dirc.org.uk/events/ossdw/OSSDW-Proceedings-Final.pdf.
Arief, B. and Speirs, N. (2000) 'A UML tool for an automatic generation of simulation programs', in. Second International Workshop on Software and Performance WOSP2000, pp. 71-76. doi: 10.1145/350391.350408.
Speirs, N. and Arief, B. (2000) 'Simulation of a telecommunication system using simML', in. 33rd Annual Simulation Symposium, Los Alamitos, CA, United States, Washington, DC, USA: IEEE Computer Society Press, pp. 131-138. doi: 10.1109/SIMSYM.2000.844909.
Arief, B. and Speirs, N. (1999) 'Automatic Generation of Distributed System Simulations from UML', in. 13th European Simulation Multiconference (ESM'99), pp. 85-91. Available at: http://www.scs-europe.net/conf/esm99/index.htm.
Arief, B. and Speirs, N. (1999) 'Simulation Generation from UML Like Specifications', in. IASTED Applied Modelling and Simulation (AMS'99), pp. 384-388.
Total publications in KAR: 66 [See all in KAR]

School of Computing, University of Kent, Canterbury, Kent, CT2 7NF

Enquiries: +44 (0)1227 824180 or contact us.

Last Updated: 24/04/2024