default search action
BibTeX records: Pete Burnap
@article{DBLP:journals/ijcip/MohammedARBH25,
author = {Abubakar Sadiq Mohammed and
Eirini Anthi and
Omer F. Rana and
Pete Burnap and
Andrew Hood},
title = {STADe: An unsupervised time-windows method of detecting anomalies
in oil and gas Industrial Cyber-Physical Systems {(ICPS)} networks},
journal = {Int. J. Crit. Infrastructure Prot.},
volume = {49},
pages = {100762},
year = {2025},
url = {https://doi.org/10.1016/j.ijcip.2025.100762},
doi = {10.1016/J.IJCIP.2025.100762},
timestamp = {Sat, 31 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijcip/MohammedARBH25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informatics/WilliamsKB25,
author = {Lowri Williams and
Hamza Khan and
Pete Burnap},
title = {The Evolution of Digital Security by Design Using Temporal Network
Analysis},
journal = {Informatics},
volume = {12},
number = {1},
pages = {8},
year = {2025},
url = {https://doi.org/10.3390/informatics12010008},
doi = {10.3390/INFORMATICS12010008},
timestamp = {Fri, 09 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/informatics/WilliamsKB25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informatics/WilliamsB25,
author = {Lowri Williams and
Pete Burnap},
title = {The Emotional Landscape of Technological Innovation: {A} Data-Driven
Case Study of ChatGPT's Launch},
journal = {Informatics},
volume = {12},
number = {3},
pages = {58},
year = {2025},
url = {https://doi.org/10.3390/informatics12030058},
doi = {10.3390/INFORMATICS12030058},
timestamp = {Thu, 06 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/informatics/WilliamsB25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KayanHRBP25,
author = {Hakan Kayan and
Ryan Heartfield and
Omer Rana and
Pete Burnap and
Charith Perera},
title = {Real-Time Anomaly Detection for Industrial Robotic Arms Using Edge
Computing},
journal = {{IEEE} Internet Things J.},
volume = {12},
number = {15},
pages = {29696--29712},
year = {2025},
url = {https://doi.org/10.1109/JIOT.2025.3569780},
doi = {10.1109/JIOT.2025.3569780},
timestamp = {Sat, 09 Aug 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iotj/KayanHRBP25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IeropoulosASBMKC25,
author = {Vasilis Ieropoulos and
Eirini Anthi and
Theodoros Spyridopoulos and
Pete Burnap and
Ioannis Mavromatis and
Aftab Khan and
Pietro Carnelli},
title = {Collaborative intrusion detection in resource-constrained IoT environments:
Challenges, methods, and future directions a review},
journal = {J. Inf. Secur. Appl.},
volume = {93},
pages = {104127},
year = {2025},
url = {https://doi.org/10.1016/j.jisa.2025.104127},
doi = {10.1016/J.JISA.2025.104127},
timestamp = {Sat, 09 Aug 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/istr/IeropoulosASBMKC25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2505-16398,
author = {Peter Maynard and
Yulia Cherdantseva and
Avi Shaked and
Pete Burnap and
Arif Mehmood},
title = {Consistent and Compatible Modelling of Cyber Intrusions and Incident
Response Demonstrated in the Context of Malware Attacks on Critical
Infrastructure},
journal = {CoRR},
volume = {abs/2505.16398},
year = {2025},
url = {https://doi.org/10.48550/arXiv.2505.16398},
doi = {10.48550/ARXIV.2505.16398},
eprinttype = {arXiv},
eprint = {2505.16398},
timestamp = {Wed, 25 Jun 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2505-16398.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2507-04883,
author = {Sanyam Vyas and
Alberto Caron and
Chris Hicks and
Pete Burnap and
Vasilios Mavroudis},
title = {Beyond Training-time Poisoning: Component-level and Post-training
Backdoors in Deep Reinforcement Learning},
journal = {CoRR},
volume = {abs/2507.04883},
year = {2025},
url = {https://doi.org/10.48550/arXiv.2507.04883},
doi = {10.48550/ARXIV.2507.04883},
eprinttype = {arXiv},
eprint = {2507.04883},
timestamp = {Tue, 12 Aug 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2507-04883.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bdcc/WilliamsAB24,
author = {Lowri Williams and
Eirini Anthi and
Pete Burnap},
title = {Comparing Hierarchical Approaches to Enhance Supervised Emotive Text
Classification},
journal = {Big Data Cogn. Comput.},
volume = {8},
number = {4},
pages = {38},
year = {2024},
url = {https://doi.org/10.3390/bdcc8040038},
doi = {10.3390/BDCC8040038},
timestamp = {Fri, 31 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/bdcc/WilliamsAB24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bdcc/WilliamsAAB24,
author = {Lowri Williams and
Eirini Anthi and
Laura Arman and
Pete Burnap},
title = {Topic Modelling: Going beyond Token Outputs},
journal = {Big Data Cogn. Comput.},
volume = {8},
number = {5},
pages = {44},
year = {2024},
url = {https://doi.org/10.3390/bdcc8050044},
doi = {10.3390/BDCC8050044},
timestamp = {Fri, 19 Jul 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/bdcc/WilliamsAAB24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cps/RotibiSB24,
author = {Ayodeji O. Rotibi and
Neetesh Saxena and
Pete Burnap},
title = {Winning the battle with cyber risk identification tools in industrial
control systems: {A} review},
journal = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.},
volume = {9},
number = {4},
pages = {350--365},
year = {2024},
url = {https://doi.org/10.1049/cps2.12105},
doi = {10.1049/CPS2.12105},
timestamp = {Sat, 31 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iet-cps/RotibiSB24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/WilliamsAB24,
author = {Lowri Williams and
Eirini Anthi and
Pete Burnap},
title = {A Scalable and Automated Framework for Tracking the Likely Adoption
of Emerging Technologies},
journal = {Inf.},
volume = {15},
number = {4},
pages = {237},
year = {2024},
url = {https://doi.org/10.3390/info15040237},
doi = {10.3390/INFO15040237},
timestamp = {Sat, 04 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/information/WilliamsAB24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/BurnapARWCAJ24,
author = {Pete Burnap and
Eirini Anthi and
Philipp Reinecke and
Lowri Williams and
Fengnian Cao and
Rakan Aldmour and
Kevin Jones},
title = {Mapping Automated Cyber Attack Intelligence to Context-Based Impact
on System-Level Goals},
journal = {J. Cybersecur. Priv.},
volume = {4},
number = {2},
pages = {340--356},
year = {2024},
url = {https://doi.org/10.3390/jcp4020017},
doi = {10.3390/JCP4020017},
timestamp = {Thu, 22 Aug 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jocsap/BurnapARWCAJ24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tiot/KayanHRBP24,
author = {Hakan Kayan and
Ryan Heartfield and
Omer F. Rana and
Pete Burnap and
Charith Perera},
title = {{CASPER:} Context-Aware IoT Anomaly Detection System for Industrial
Robotic Arms},
journal = {{ACM} Trans. Internet Things},
volume = {5},
number = {3},
pages = {18:1--18:36},
year = {2024},
url = {https://doi.org/10.1145/3670414},
doi = {10.1145/3670414},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tiot/KayanHRBP24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/AlrowailiSB24,
author = {Yazeed Alrowaili and
Neetesh Saxena and
Pete Burnap},
title = {Towards Developing an Asset-Criticality Identification Framework in
Smart Grids},
booktitle = {{IEEE} International Conference on Cyber Security and Resilience,
{CSR} 2024, London, UK, September 2-4, 2024},
pages = {720--725},
publisher = {{IEEE}},
year = {2024},
url = {https://doi.org/10.1109/CSR61664.2024.10679477},
doi = {10.1109/CSR61664.2024.10679477},
timestamp = {Tue, 14 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/csr2/AlrowailiSB24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-12990,
author = {Lowri Williams and
Eirini Anthi and
Laura Arman and
Pete Burnap},
title = {Topic Modelling: Going Beyond Token Outputs},
journal = {CoRR},
volume = {abs/2401.12990},
year = {2024},
url = {https://doi.org/10.48550/arXiv.2401.12990},
doi = {10.48550/ARXIV.2401.12990},
eprinttype = {arXiv},
eprint = {2401.12990},
timestamp = {Mon, 05 Feb 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2401-12990.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-01670,
author = {Lowri Williams and
Eirini Anthi and
Pete Burnap},
title = {A Scalable and Automated Framework for Tracking the likely Adoption
of Emerging Technologies},
journal = {CoRR},
volume = {abs/2402.01670},
year = {2024},
url = {https://doi.org/10.48550/arXiv.2402.01670},
doi = {10.48550/ARXIV.2402.01670},
eprinttype = {arXiv},
eprint = {2402.01670},
timestamp = {Fri, 09 Feb 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2402-01670.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RotibiSBT23,
author = {Ayodeji O. Rotibi and
Neetesh Saxena and
Pete Burnap and
Alex Tarter},
title = {Extended Dependency Modeling Technique for Cyber Risk Identification
in {ICS}},
journal = {{IEEE} Access},
volume = {11},
pages = {37229--37242},
year = {2023},
url = {https://doi.org/10.1109/ACCESS.2023.3263671},
doi = {10.1109/ACCESS.2023.3263671},
timestamp = {Tue, 14 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/RotibiSBT23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AgyepongCRB23,
author = {Enoch Agyepong and
Yulia Cherdantseva and
Philipp Reinecke and
Pete Burnap},
title = {A systematic method for measuring the performance of a cyber security
operations centre analyst},
journal = {Comput. Secur.},
volume = {124},
pages = {102959},
year = {2023},
url = {https://doi.org/10.1016/j.cose.2022.102959},
doi = {10.1016/J.COSE.2022.102959},
timestamp = {Mon, 09 Dec 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/compsec/AgyepongCRB23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MohammedARSB23,
author = {Abubakar Sadiq Mohammed and
Eirini Anthi and
Omer F. Rana and
Neetesh Saxena and
Pete Burnap},
title = {Detection and mitigation of field flooding attacks on oil and gas
critical infrastructure communication},
journal = {Comput. Secur.},
volume = {124},
pages = {103007},
year = {2023},
url = {https://doi.org/10.1016/j.cose.2022.103007},
doi = {10.1016/J.COSE.2022.103007},
timestamp = {Mon, 09 Dec 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/compsec/MohammedARSB23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShakedCBM23,
author = {Avi Shaked and
Yulia Cherdantseva and
Pete Burnap and
Peter Maynard},
title = {Operations-informed incident response playbooks},
journal = {Comput. Secur.},
volume = {134},
pages = {103454},
year = {2023},
url = {https://doi.org/10.1016/j.cose.2023.103454},
doi = {10.1016/J.COSE.2023.103454},
timestamp = {Mon, 05 Feb 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/compsec/ShakedCBM23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/NafeesSCGB23,
author = {Muhammad Nouman Nafees and
Neetesh Saxena and
Alvaro A. C{\'{a}}rdenas and
Santiago Grijalva and
Pete Burnap},
title = {Smart Grid Cyber-Physical Situational Awareness of Complex Operational
Technology Attacks: {A} Review},
journal = {{ACM} Comput. Surv.},
volume = {55},
number = {10},
pages = {215:1--215:36},
year = {2023},
url = {https://doi.org/10.1145/3565570},
doi = {10.1145/3565570},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/csur/NafeesSCGB23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/IkwuGJBW23,
author = {Ruth Ikwu and
Luca Giommoni and
Amir Javed and
Pete Burnap and
Matthew L. Williams},
title = {Digital fingerprinting for identifying malicious collusive groups
on Twitter},
journal = {J. Cybersecur.},
volume = {9},
number = {1},
year = {2023},
url = {https://doi.org/10.1093/cybsec/tyad014},
doi = {10.1093/CYBSEC/TYAD014},
timestamp = {Thu, 31 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/cybersecurity/IkwuGJBW23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cps/AlrowailiSSCB23,
author = {Yazeed Alrowaili and
Neetesh Saxena and
Anurag Srivastava and
Mauro Conti and
Pete Burnap},
title = {A review: Monitoring situational awareness of smart grid cyber-physical
systems and critical asset identification},
journal = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.},
volume = {8},
number = {3},
pages = {160--185},
year = {2023},
url = {https://doi.org/10.1049/cps2.12059},
doi = {10.1049/CPS2.12059},
timestamp = {Sun, 12 Nov 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iet-cps/AlrowailiSSCB23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/AsiriSGB23,
author = {Mohammed Asiri and
Neetesh Saxena and
Rigel Gjomemo and
Pete Burnap},
title = {Understanding Indicators of Compromise against Cyber-attacks in Industrial
Control Systems: {A} Security Perspective},
journal = {{ACM} Trans. Cyber Phys. Syst.},
volume = {7},
number = {2},
pages = {15:1--15:33},
year = {2023},
url = {https://doi.org/10.1145/3587255},
doi = {10.1145/3587255},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tcps/AsiriSGB23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NafeesSB23,
author = {Muhammad Nouman Nafees and
Neetesh Saxena and
Pete Burnap},
editor = {Jianying Zhou and
Lejla Batina and
Zengpeng Li and
Jingqiang Lin and
Eleonora Losiouk and
Suryadipta Majumdar and
Daisuke Mashima and
Weizhi Meng and
Stjepan Picek and
Mohammad Ashiqur Rahman and
Jun Shao and
Masaki Shimaoka and
Ezekiel O. Soremekun and
Chunhua Su and
Je Sen Teh and
Aleksei Udovenko and
Cong Wang and
Leo Yu Zhang and
Yury Zhauniarovich},
title = {{POSTER:} Adaptive Moving Target Defense: Enhancing Dynamic Perturbation
Through Voltage Sensitivity Analysis in Power Systems},
booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2023
Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {13907},
pages = {700--704},
publisher = {Springer},
year = {2023},
url = {https://doi.org/10.1007/978-3-031-41181-6\_43},
doi = {10.1007/978-3-031-41181-6\_43},
timestamp = {Tue, 14 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/acns/NafeesSB23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/AsiriSB23,
author = {Mohammed Asiri and
Neetesh Saxena and
Pete Burnap},
title = {{ARCSG:} Advancing Resilience of Cyber-Physical Smart Grid: An Integrated
Co-Simulation Approach Incorporating Indicators of Compromise},
booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
2023 - Workshops, Delft, Netherlands, July 3-7, 2023},
pages = {370--378},
publisher = {{IEEE}},
year = {2023},
url = {https://doi.org/10.1109/EuroSPW59978.2023.00047},
doi = {10.1109/EUROSPW59978.2023.00047},
timestamp = {Tue, 14 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/eurosp/AsiriSB23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/KayanRBP23,
author = {Hakan Kayan and
Omer F. Rana and
Pete Burnap and
Charith Perera},
title = {Artifact: {CASPER:} Context-Aware Anomaly Detection System for Industrial
Robotic Arms},
booktitle = {{IEEE} International Conference on Pervasive Computing and Communications
Workshops and other Affiliated Events, PerCom Workshops 2023, Atlanta,
GA, USA, March 13-17, 2023},
pages = {3--4},
publisher = {{IEEE}},
year = {2023},
url = {https://doi.org/10.1109/PerComWorkshops56833.2023.10150236},
doi = {10.1109/PERCOMWORKSHOPS56833.2023.10150236},
timestamp = {Tue, 27 Jun 2023 10:38:32 +0200},
biburl = {https://dblp.org/rec/conf/percom/KayanRBP23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/KayanRBP23a,
author = {Hakan Kayan and
Omer F. Rana and
Pete Burnap and
Charith Perera},
title = {{CASPER:} Context-Aware Anomaly Detection System for Industrial Robotic
Arms},
booktitle = {{IEEE} International Conference on Pervasive Computing and Communications
Workshops and other Affiliated Events, PerCom Workshops 2023, Atlanta,
GA, USA, March 13-17, 2023},
pages = {282--284},
publisher = {{IEEE}},
year = {2023},
url = {https://doi.org/10.1109/PerComWorkshops56833.2023.10150354},
doi = {10.1109/PERCOMWORKSHOPS56833.2023.10150354},
timestamp = {Tue, 27 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/percom/KayanRBP23a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/KayanRBP23,
author = {Hakan Kayan and
Omer Farooq Rana and
Pete Burnap and
Charith Perera},
title = {{CASPER:} Context-Aware Anomaly Detection System for Industrial Robotic
Arms},
publisher = {{IEEE} DataPort},
year = {2023},
month = jan,
howpublished = {\url{https://doi.org/10.21227/q2e6-t883}},
note = {Accessed on YYYY-MM-DD.},
url = {https://doi.org/10.21227/q2e6-t883},
doi = {10.21227/Q2E6-T883},
timestamp = {Tue, 18 Jun 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/data/10/KayanRBP23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-04926,
author = {Sanyam Vyas and
John Hannay and
Andrew Bolton and
Pete Burnap},
title = {Automated Cyber Defence: {A} Review},
journal = {CoRR},
volume = {abs/2303.04926},
year = {2023},
url = {https://doi.org/10.48550/arXiv.2303.04926},
doi = {10.48550/ARXIV.2303.04926},
eprinttype = {arXiv},
eprint = {2303.04926},
timestamp = {Wed, 15 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2303-04926.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-18165,
author = {Baskoro Adi Pratomo and
Toby Jackson and
Pete Burnap and
Andrew Hood and
Eirini Anthi},
title = {Enhancing Enterprise Network Security: Comparing Machine-Level and
Process-Level Analysis for Dynamic Malware Detection},
journal = {CoRR},
volume = {abs/2310.18165},
year = {2023},
url = {https://doi.org/10.48550/arXiv.2310.18165},
doi = {10.48550/ARXIV.2310.18165},
eprinttype = {arXiv},
eprint = {2310.18165},
timestamp = {Thu, 02 Nov 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2310-18165.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AliwaRPB21,
author = {Emad Aliwa and
Omer F. Rana and
Charith Perera and
Peter Burnap},
title = {Cyberattacks and Countermeasures for In-Vehicle Networks},
journal = {{ACM} Comput. Surv.},
volume = {54},
number = {1},
pages = {21:1--21:37},
year = {2022},
url = {https://doi.org/10.1145/3431233},
doi = {10.1145/3431233},
timestamp = {Wed, 23 Nov 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/csur/AliwaRPB21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/KayanNRBP22,
author = {Hakan Kayan and
Matthew Nunes and
Omer F. Rana and
Pete Burnap and
Charith Perera},
title = {Cybersecurity of Industrial Cyber-Physical Systems: {A} Review},
journal = {{ACM} Comput. Surv.},
volume = {54},
number = {11s},
pages = {229:1--229:35},
year = {2022},
url = {https://doi.org/10.1145/3510410},
doi = {10.1145/3510410},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/csur/KayanNRBP22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NunesBRL22,
author = {Matthew Nunes and
Pete Burnap and
Philipp Reinecke and
Kaelon Lloyd},
title = {Bane or Boon: Measuring the effect of evasive malware on system call
classifiers},
journal = {J. Inf. Secur. Appl.},
volume = {67},
pages = {103202},
year = {2022},
url = {https://doi.org/10.1016/j.jisa.2022.103202},
doi = {10.1016/J.JISA.2022.103202},
timestamp = {Sun, 02 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/istr/NunesBRL22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlorainiJRB22,
author = {Fatimah Aloraini and
Amir Javed and
Omer F. Rana and
Pete Burnap},
title = {Adversarial machine learning in IoT from an insider point of view},
journal = {J. Inf. Secur. Appl.},
volume = {70},
pages = {103341},
year = {2022},
url = {https://doi.org/10.1016/j.jisa.2022.103341},
doi = {10.1016/J.JISA.2022.103341},
timestamp = {Sun, 02 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/istr/AlorainiJRB22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/AlorainyBLWG22,
author = {Wafa Alorainy and
Pete Burnap and
Han Liu and
Matthew L. Williams and
Luca Giommoni},
title = {Disrupting networks of hate: characterising hateful networks and removing
critical nodes},
journal = {Soc. Netw. Anal. Min.},
volume = {12},
number = {1},
pages = {27},
year = {2022},
url = {https://doi.org/10.1007/s13278-021-00818-z},
doi = {10.1007/S13278-021-00818-Z},
timestamp = {Tue, 14 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/snam/AlorainyBLWG22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/JavedIBGW22,
author = {Amir Javed and
Ruth Ikwu and
Pete Burnap and
Luca Giommoni and
Matthew L. Williams},
title = {Disrupting drive-by download networks on Twitter},
journal = {Soc. Netw. Anal. Min.},
volume = {12},
number = {1},
pages = {117},
year = {2022},
url = {https://doi.org/10.1007/s13278-022-00944-2},
doi = {10.1007/S13278-022-00944-2},
timestamp = {Mon, 24 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/snam/JavedIBGW22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/JavedLBR22,
author = {Amir Javed and
Mike Lakoju and
Pete Burnap and
Omer F. Rana},
title = {Security analytics for real-time forecasting of cyberattacks},
journal = {Softw. Pract. Exp.},
volume = {52},
number = {3},
pages = {788--804},
year = {2022},
url = {https://doi.org/10.1002/spe.2822},
doi = {10.1002/SPE.2822},
timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/spe/JavedLBR22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/MohammedRBRA22,
author = {Abubakar Sadiq Mohammed and
Philipp Reinecke and
Pete Burnap and
Omer F. Rana and
Eirini Anthi},
title = {Cybersecurity Challenges in the Offshore Oil and Gas Industry: An
Industrial Cyber-Physical Systems {(ICPS)} Perspective},
journal = {{ACM} Trans. Cyber Phys. Syst.},
volume = {6},
number = {3},
pages = {28:1--28:27},
year = {2022},
url = {https://doi.org/10.1145/3548691},
doi = {10.1145/3548691},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tcps/MohammedRBRA22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ShakedCB22,
author = {Avi Shaked and
Yulia Cherdantseva and
Pete Burnap},
title = {Model-Based Incident Response Playbooks},
booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability
and Security, Vienna,Austria, August 23 - 26, 2022},
pages = {26:1--26:7},
publisher = {{ACM}},
year = {2022},
url = {https://doi.org/10.1145/3538969.3538976},
doi = {10.1145/3538969.3538976},
timestamp = {Fri, 19 Aug 2022 09:45:12 +0200},
biburl = {https://dblp.org/rec/conf/IEEEares/ShakedCB22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NafeesSB22,
author = {Muhammad Nouman Nafees and
Neetesh Saxena and
Pete Burnap},
editor = {Heng Yin and
Angelos Stavrou and
Cas Cremers and
Elaine Shi},
title = {Poster: Physics-Informed Augmentation for Contextual Anomaly Detection
in Smart Grid},
booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
7-11, 2022},
pages = {3427--3429},
publisher = {{ACM}},
year = {2022},
url = {https://doi.org/10.1145/3548606.3563533},
doi = {10.1145/3548606.3563533},
timestamp = {Sat, 17 Dec 2022 01:15:29 +0100},
biburl = {https://dblp.org/rec/conf/ccs/NafeesSB22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/NafeesSB22,
author = {Muhammad Nouman Nafees and
Neetesh Saxena and
Pete Burnap},
title = {On The Efficacy of Physics-Informed Context-Based Anomaly Detection
for Power Systems},
booktitle = {{IEEE} International Conference on Communications, Control, and Computing
Technologies for Smart Grids, SmartGridComm 2022, Singapore, October
25-28, 2022},
pages = {374--379},
publisher = {{IEEE}},
year = {2022},
url = {https://doi.org/10.1109/SmartGridComm52983.2022.9961034},
doi = {10.1109/SMARTGRIDCOMM52983.2022.9961034},
timestamp = {Tue, 14 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/smartgridcomm/NafeesSB22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-12179,
author = {Abubakar Sadiq Mohammed and
Philipp Reinecke and
Pete Burnap and
Omer F. Rana and
Eirini Anthi},
title = {Cybersecurity Challenges in the Offshore Oil and Gas Industry: An
Industrial Cyber-Physical Systems {(ICPS)} Perspective},
journal = {CoRR},
volume = {abs/2202.12179},
year = {2022},
url = {https://arxiv.org/abs/2202.12179},
eprinttype = {arXiv},
eprint = {2202.12179},
timestamp = {Wed, 02 Mar 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2202-12179.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-08141,
author = {Petar Radanliev and
David De Roure and
Pete Burnap and
Omar Santos},
title = {Epistemological Equation for Analysing Uncontrollable States in Complex
Systems: Quantifying Cyber Risks from the Internet of Things},
journal = {CoRR},
volume = {abs/2212.08141},
year = {2022},
url = {https://doi.org/10.48550/arXiv.2212.08141},
doi = {10.48550/ARXIV.2212.08141},
eprinttype = {arXiv},
eprint = {2212.08141},
timestamp = {Sat, 15 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2212-08141.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AnthiWJB21,
author = {Eirini Anthi and
Lowri Williams and
Amir Javed and
Pete Burnap},
title = {Hardening machine learning denial of service (DoS) defences against
adversarial attacks in IoT smart home networks},
journal = {Comput. Secur.},
volume = {108},
pages = {102352},
year = {2021},
url = {https://doi.org/10.1016/j.cose.2021.102352},
doi = {10.1016/J.COSE.2021.102352},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/compsec/AnthiWJB21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/AnthiWBJ21,
author = {Eirini Anthi and
Lowri Williams and
Pete Burnap and
Kevin Jones},
title = {A three-tiered intrusion detection system for industrial control systems},
journal = {J. Cybersecur.},
volume = {7},
number = {1},
year = {2021},
url = {https://doi.org/10.1093/cybsec/tyab006},
doi = {10.1093/CYBSEC/TYAB006},
timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/cybersecurity/AnthiWBJ21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/diot/LakojuJRBAC21,
author = {Mike Lakoju and
Amir Javed and
Omer F. Rana and
Pete Burnap and
Samuelson Tijesunimi Atiba and
Soumaya Cherkaoui},
title = {"Chatty Devices" and edge-based activity classification},
journal = {Discov. Internet Things},
volume = {1},
number = {1},
year = {2021},
url = {https://doi.org/10.1007/s43926-021-00004-9},
doi = {10.1007/S43926-021-00004-9},
timestamp = {Tue, 14 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/diot/LakojuJRBAC21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AnthiWRBW21,
author = {Eirini Anthi and
Lowri Williams and
Matilda Rhode and
Pete Burnap and
Adam Wedgbury},
title = {Adversarial attacks on machine learning cybersecurity defences in
Industrial Control Systems},
journal = {J. Inf. Secur. Appl.},
volume = {58},
pages = {102717},
year = {2021},
url = {https://doi.org/10.1016/j.jisa.2020.102717},
doi = {10.1016/J.JISA.2020.102717},
timestamp = {Sun, 16 May 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/istr/AnthiWRBW21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rss/RadanlievRBS21,
author = {Petar Radanliev and
David De Roure and
Pete Burnap and
Omar Santos},
title = {Epistemological Equation for Analysing Uncontrollable States in Complex
Systems: Quantifying Cyber Risks from the Internet of Things},
journal = {Rev. Socionetwork Strateg.},
volume = {15},
number = {2},
pages = {381--411},
year = {2021},
url = {https://doi.org/10.1007/s12626-021-00086-5},
doi = {10.1007/S12626-021-00086-5},
timestamp = {Fri, 04 Mar 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/rss/RadanlievRBS21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LakojuAKBB21,
author = {Mike Lakoju and
Nemitari Ajienka and
Mojtaba Ahmadieh Khanesar and
Pete Burnap and
David T. Branson},
title = {Unsupervised Learning for Product Use Activity Recognition: An Exploratory
Study of a "Chatty Device"},
journal = {Sensors},
volume = {21},
number = {15},
pages = {4991},
year = {2021},
url = {https://doi.org/10.3390/s21154991},
doi = {10.3390/S21154991},
timestamp = {Wed, 07 Dec 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/sensors/LakojuAKBB21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NafeesSB21,
author = {Muhammad Nouman Nafees and
Neetesh Saxena and
Pete Burnap},
editor = {Yongdae Kim and
Jong Kim and
Giovanni Vigna and
Elaine Shi},
title = {Optimized Predictive Control for {AGC} Cyber Resiliency},
booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
pages = {2450--2452},
publisher = {{ACM}},
year = {2021},
url = {https://doi.org/10.1145/3460120.3485358},
doi = {10.1145/3460120.3485358},
timestamp = {Tue, 14 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ccs/NafeesSB21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-03564,
author = {Hakan Kayan and
Matthew Nunes and
Omer F. Rana and
Pete Burnap and
Charith Perera},
title = {Cybersecurity of Industrial Cyber-Physical Systems: {A} Review},
journal = {CoRR},
volume = {abs/2101.03564},
year = {2021},
url = {https://arxiv.org/abs/2101.03564},
eprinttype = {arXiv},
eprint = {2101.03564},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2101-03564.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SaxenaTGBK20,
author = {Neetesh Saxena and
Ieuan Thomas and
Prosanta Gope and
Pete Burnap and
Neeraj Kumar},
title = {PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit
Drugs},
journal = {Computer},
volume = {53},
number = {7},
pages = {29--44},
year = {2020},
url = {https://doi.org/10.1109/MC.2020.2989238},
doi = {10.1109/MC.2020.2989238},
timestamp = {Mon, 26 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/computer/SaxenaTGBK20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/RadanlievRPNMSM20,
author = {Petar Radanliev and
David De Roure and
Kevin R. Page and
Jason R. C. Nurse and
Rafael Mantilla Montalvo and
Omar Santos and
La Treall Maddox and
Pete Burnap},
title = {Cyber risk at the edge: current and future trends on cyber risk analytics
and artificial intelligence in the industrial internet of things and
industry 4.0 supply chains},
journal = {Cybersecur.},
volume = {3},
number = {1},
pages = {13},
year = {2020},
url = {https://doi.org/10.1186/s42400-020-00052-8},
doi = {10.1186/S42400-020-00052-8},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/cybersec/RadanlievRPNMSM20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PratomoBT20,
author = {Baskoro Adi Pratomo and
Pete Burnap and
George Theodorakopoulos},
title = {{BLATTA:} Early Exploit Detection on Network Traffic with Recurrent
Neural Networks},
journal = {Secur. Commun. Networks},
volume = {2020},
pages = {8826038:1--8826038:15},
year = {2020},
url = {https://doi.org/10.1155/2020/8826038},
doi = {10.1155/2020/8826038},
timestamp = {Sat, 25 Dec 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/scn/PratomoBT20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/JavedBWR20,
author = {Amir Javed and
Pete Burnap and
Matthew L. Williams and
Omer F. Rana},
title = {Emotions Behind Drive-by Download Propagation on Twitter},
journal = {{ACM} Trans. Web},
volume = {14},
number = {4},
pages = {16:1--16:26},
year = {2020},
url = {https://doi.org/10.1145/3408894},
doi = {10.1145/3408894},
timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tweb/JavedBWR20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl-trac/LiuBAW20,
author = {Han Liu and
Pete Burnap and
Wafa Alorainy and
Matthew L. Williams},
editor = {Ritesh Kumar and
Atul Kr. Ojha and
Bornini Lahiri and
Marcos Zampieri and
Shervin Malmasi and
Vanessa Murdock and
Daniel Kadar},
title = {Scmhl5 at {TRAC-2} Shared Task on Aggression Identification: Bert
Based Ensemble Learning Approach},
booktitle = {Proceedings of the Second Workshop on Trolling, Aggression and Cyberbullying,
TRAC@LREC 2020, Marseille, France, May 2020},
pages = {62--68},
publisher = {European Language Resources Association {(ELRA)}},
year = {2020},
url = {https://aclanthology.org/2020.trac-1.10/},
timestamp = {Wed, 11 Jun 2025 20:59:44 +0200},
biburl = {https://dblp.org/rec/conf/acl-trac/LiuBAW20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NafeesSBC20,
author = {Muhammad Nouman Nafees and
Neetesh Saxena and
Pete Burnap and
Bong Jun Choi},
editor = {Jay Ligatti and
Xinming Ou and
Jonathan Katz and
Giovanni Vigna},
title = {Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in
Industrial Context},
booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
Security, Virtual Event, USA, November 9-13, 2020},
pages = {2117--2119},
publisher = {{ACM}},
year = {2020},
url = {https://doi.org/10.1145/3372297.3420022},
doi = {10.1145/3372297.3420022},
timestamp = {Tue, 14 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ccs/NafeesSBC20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/AgyepongCRB20,
author = {Enoch Agyepong and
Yulia Cherdantseva and
Philipp Reinecke and
Pete Burnap},
title = {Towards a Framework for Measuring the Performance of a Security Operations
Center Analyst},
booktitle = {2020 International Conference on Cyber Security and Protection of
Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
2020},
pages = {1--8},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138872},
doi = {10.1109/CYBERSECURITY49315.2020.9138872},
timestamp = {Fri, 24 Jul 2020 16:51:21 +0200},
biburl = {https://dblp.org/rec/conf/cybersecpods/AgyepongCRB20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-05005,
author = {Eirini Anthi and
Lowri Williams and
Matilda Rhode and
Pete Burnap and
Adam Wedgbury},
title = {Adversarial Attacks on Machine Learning Cybersecurity Defences in
Industrial Control Systems},
journal = {CoRR},
volume = {abs/2004.05005},
year = {2020},
url = {https://arxiv.org/abs/2004.05005},
eprinttype = {arXiv},
eprint = {2004.05005},
timestamp = {Tue, 14 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2004-05005.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-10781,
author = {Emad Aliwa and
Omer F. Rana and
Charith Perera and
Peter Burnap},
title = {Cyberattacks and Countermeasures For In-Vehicle Networks},
journal = {CoRR},
volume = {abs/2004.10781},
year = {2020},
url = {https://arxiv.org/abs/2004.10781},
eprinttype = {arXiv},
eprint = {2004.10781},
timestamp = {Wed, 02 Feb 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2004-10781.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-12150,
author = {Petar Radanliev and
David De Roure and
Kevin R. Page and
Max Van Kleek and
Rafael Mantilla Montalvo and
Omar Santos and
La Treall Maddox and
Stacy Cannady and
Pete Burnap and
Eirini Anthi and
Carsten Maple},
title = {Design of a dynamic and self-adapting system, supported with artificial
intelligence, machine learning and real-time intelligence for predictive
cyber risk analytics},
journal = {CoRR},
volume = {abs/2005.12150},
year = {2020},
url = {https://arxiv.org/abs/2005.12150},
eprinttype = {arXiv},
eprint = {2005.12150},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2005-12150.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/AnthiWSTB19,
author = {Eirini Anthi and
Lowri Williams and
Malgorzata Slowinska and
George Theodorakopoulos and
Pete Burnap},
title = {A Supervised Intrusion Detection System for Smart Home IoT Devices},
journal = {{IEEE} Internet Things J.},
volume = {6},
number = {5},
pages = {9042--9053},
year = {2019},
url = {https://doi.org/10.1109/JIOT.2019.2926365},
doi = {10.1109/JIOT.2019.2926365},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iotj/AnthiWSTB19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/JavedBR19,
author = {Amir Javed and
Pete Burnap and
Omer F. Rana},
title = {Prediction of drive-by download attacks on Twitter},
journal = {Inf. Process. Manag.},
volume = {56},
number = {3},
pages = {1133--1145},
year = {2019},
url = {https://doi.org/10.1016/j.ipm.2018.02.003},
doi = {10.1016/J.IPM.2018.02.003},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ipm/JavedBR19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NunesBRRL19,
author = {Matthew Nunes and
Pete Burnap and
Omer F. Rana and
Philipp Reinecke and
Kaelon Lloyd},
title = {Getting to the root of the problem: {A} detailed comparison of kernel
and user level data for dynamic malware analysis},
journal = {J. Inf. Secur. Appl.},
volume = {48},
year = {2019},
url = {https://doi.org/10.1016/j.jisa.2019.102365},
doi = {10.1016/J.JISA.2019.102365},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/istr/NunesBRRL19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/LiuBAW19,
author = {Han Liu and
Pete Burnap and
Wafa Alorainy and
Matthew L. Williams},
title = {A Fuzzy Approach to Text Classification With Two-Stage Training for
Ambiguous Instances},
journal = {{IEEE} Trans. Comput. Soc. Syst.},
volume = {6},
number = {2},
pages = {227--240},
year = {2019},
url = {https://doi.org/10.1109/TCSS.2019.2892037},
doi = {10.1109/TCSS.2019.2892037},
timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tcss/LiuBAW19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/AlorainyBLW19,
author = {Wafa Alorainy and
Pete Burnap and
Han Liu and
Matthew L. Williams},
title = {"The Enemy Among Us": Detecting Cyber Hate Speech with Threats-based
Othering Language Embeddings},
journal = {{ACM} Trans. Web},
volume = {13},
number = {3},
pages = {14:1--14:26},
year = {2019},
url = {https://doi.org/10.1145/3324997},
doi = {10.1145/3324997},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tweb/AlorainyBLW19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/RhodeTBJ19,
author = {Matilda Rhode and
Lewis Tuson and
Pete Burnap and
Kevin Jones},
title = {{LAB} to {SOC:} Robust Features for Dynamic Malware Detection},
booktitle = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems
and Networks, {DSN} (Industry Track) 2019, Portland, OR, USA, June
24-27, 2019},
pages = {13--16},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/DSN-Industry.2019.00010},
doi = {10.1109/DSN-INDUSTRY.2019.00010},
timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
biburl = {https://dblp.org/rec/conf/dsn/RhodeTBJ19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficloud/BaratiRTB19,
author = {Masoud Barati and
Omer F. Rana and
George Theodorakopoulos and
Peter Burnap},
editor = {Muhammad Younas and
Irfan Awan and
Takahiro Hara},
title = {Privacy-Aware Cloud Ecosystems and {GDPR} Compliance},
booktitle = {7th International Conference on Future Internet of Things and Cloud,
FiCloud 2019, Istanbul, Turkey, August 26-28, 2019},
pages = {117--124},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/FiCloud.2019.00024},
doi = {10.1109/FICLOUD.2019.00024},
timestamp = {Wed, 02 Feb 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ficloud/BaratiRTB19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tto/ProcterWBHEWJ19,
author = {Rob Procter and
Helena Webb and
Pete Burnap and
William Housley and
Adam Edwards and
Matthew L. Williams and
Marina Jirotka},
editor = {Maria Liakata and
Andreas Vlachos},
title = {A Study of Cyber Hate on Twitter with Implications for Social Media
Governance Strategies},
booktitle = {Proceedings of the 2019 Truth and Trust Online Conference {(TTO} 2019),
London, UK, October 4-5, 2019},
year = {2019},
url = {https://truthandtrustonline.com/wp-content/uploads/2019/09/paper\_20.pdf},
timestamp = {Tue, 03 Nov 2020 16:50:40 +0100},
biburl = {https://dblp.org/rec/conf/tto/ProcterWBHEWJ19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/0002BAW19,
author = {Han Liu and
Pete Burnap and
Wafa Alorainy and
Matthew L. Williams},
editor = {Ling Liu and
Ryen W. White and
Amin Mantrach and
Fabrizio Silvestri and
Julian J. McAuley and
Ricardo Baeza{-}Yates and
Leila Zia},
title = {Fuzzy Multi-task Learning for Hate Speech Type Identification},
booktitle = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA,
May 13-17, 2019},
pages = {3006--3012},
publisher = {{ACM}},
year = {2019},
url = {https://doi.org/10.1145/3308558.3313546},
doi = {10.1145/3308558.3313546},
timestamp = {Tue, 14 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/www/0002BAW19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sin/2019,
editor = {Oleg B. Makarevich and
Dmitry Popov and
Ludmila K. Babenko and
Pete Burnap and
Atilla El{\c{c}}i and
Ron Poet and
Jaideep Vaidya and
Mehmet A. Orgun and
Manoj Singh Gaur and
Rajveer Singh Shekhawat},
title = {Proceedings of the 12th International Conference on Security of Information
and Networks, {SIN} 2019, Sochi, Russian Federation, September 12-15,
2019},
publisher = {{ACM}},
year = {2019},
url = {https://doi.org/10.1145/3357613},
doi = {10.1145/3357613},
isbn = {978-1-4503-7242-8},
timestamp = {Mon, 19 Dec 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sin/2019.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-02598,
author = {Matilda Rhode and
Pete Burnap and
Kevin Jones},
title = {Dual-task agent for run-time classification and killing of malicious
processes},
journal = {CoRR},
volume = {abs/1902.02598},
year = {2019},
url = {http://arxiv.org/abs/1902.02598},
eprinttype = {arXiv},
eprint = {1902.02598},
timestamp = {Tue, 21 May 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1902-02598.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-04428,
author = {Petar Radanliev and
David De Roure and
Jason R. C. Nurse and
Rafael Mantilla Montalvo and
Peter Burnap},
title = {Standardisation of cyber risk impact assessment for the Internet of
Things (IoT)},
journal = {CoRR},
volume = {abs/1903.04428},
year = {2019},
url = {http://arxiv.org/abs/1903.04428},
eprinttype = {arXiv},
eprint = {1903.04428},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1903-04428.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-12084,
author = {Petar Radanliev and
David Charles De Roure and
Jason R. C. Nurse and
Pete Burnap and
Eirini Anthi and
Uchenna Ani and
La Treall Maddox and
Omar Santos and
Rafael Mantilla Montalvo},
title = {Definition of Internet of Things (IoT) Cyber Risk Discussion on a
Transformation Roadmap for Standardisation of Regulations Risk Maturity
Strategy Design and Impact Assessment},
journal = {CoRR},
volume = {abs/1903.12084},
year = {2019},
url = {http://arxiv.org/abs/1903.12084},
eprinttype = {arXiv},
eprint = {1903.12084},
timestamp = {Fri, 04 Mar 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-1903-12084.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-12582,
author = {Petar Radanliev and
David Charles De Roure and
Jason R. C. Nurse and
Peter Burnap and
Rafael Mantilla Montalvo},
title = {Methodology for Designing Decision Support Systems for Visualising
and Mitigating Supply Chain Cyber Risk from IoT Technologies},
journal = {CoRR},
volume = {abs/1903.12582},
year = {2019},
url = {http://arxiv.org/abs/1903.12582},
eprinttype = {arXiv},
eprint = {1903.12582},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1903-12582.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-11732,
author = {Rob Procter and
Helena Webb and
Marina Jirotka and
Pete Burnap and
William Housley and
Adam Edwards and
Matthew L. Williams},
title = {A Study of Cyber Hate on Twitter with Implications for Social Media
Governance Strategies},
journal = {CoRR},
volume = {abs/1908.11732},
year = {2019},
url = {http://arxiv.org/abs/1908.11732},
eprinttype = {arXiv},
eprint = {1908.11732},
timestamp = {Wed, 04 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1908-11732.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-05726,
author = {Petar Radanliev and
David Charles De Roure and
Kevin R. Page and
Jason R. C. Nurse and
Rafael Mantilla Montalvo and
Omar Santos and
La Treall Maddox and
Peter Burnap},
title = {The Industrial Internet of Things in the Industry 4.0 supply chains:
literature review and future trends},
journal = {CoRR},
volume = {abs/1911.05726},
year = {2019},
url = {http://arxiv.org/abs/1911.05726},
eprinttype = {arXiv},
eprint = {1911.05726},
timestamp = {Tue, 01 Apr 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1911-05726.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/RadanlievRNHMCB18,
author = {Petar Radanliev and
David Charles De Roure and
Razvan Nicolescu and
Michael Huth and
Rafael Montalvo Mantilla and
Stacy Cannady and
Peter Burnap},
title = {Future developments in cyber risk assessment for the internet of things},
journal = {Comput. Ind.},
volume = {102},
pages = {14--22},
year = {2018},
url = {https://doi.org/10.1016/j.compind.2018.08.002},
doi = {10.1016/J.COMPIND.2018.08.002},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/cii/RadanlievRNHMCB18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BurnapFTJ18,
author = {Pete Burnap and
Richard French and
Frederick Turner and
Kevin Jones},
title = {Malware classification using self organising feature maps and machine
activity data},
journal = {Comput. Secur.},
volume = {73},
pages = {399--410},
year = {2018},
url = {https://doi.org/10.1016/j.cose.2017.11.016},
doi = {10.1016/J.COSE.2017.11.016},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/compsec/BurnapFTJ18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RhodeBJ18,
author = {Matilda Rhode and
Pete Burnap and
Kevin Jones},
title = {Early-stage malware prediction using recurrent neural networks},
journal = {Comput. Secur.},
volume = {77},
pages = {578--594},
year = {2018},
url = {https://doi.org/10.1016/j.cose.2018.05.010},
doi = {10.1016/J.COSE.2018.05.010},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/compsec/RhodeBJ18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AnthiARTB18,
author = {Eirini Anthi and
Shazaib Ahmad and
Omer F. Rana and
George Theodorakopoulos and
Pete Burnap},
title = {EclipseIoT: {A} secure and adaptive hub for the Internet of Things},
journal = {Comput. Secur.},
volume = {78},
pages = {477--490},
year = {2018},
url = {https://doi.org/10.1016/j.cose.2018.07.016},
doi = {10.1016/J.COSE.2018.07.016},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/compsec/AnthiARTB18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/PratomoBT18,
author = {Baskoro Adi Pratomo and
Pete Burnap and
George Theodorakopoulos},
title = {Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic
with Autoencoder},
booktitle = {2018 International Conference on Cyber Security and Protection of
Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom,
June 11-12, 2018},
pages = {1--8},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/CyberSecPODS.2018.8560678},
doi = {10.1109/CYBERSECPODS.2018.8560678},
timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cybersecpods/PratomoBT18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmlc/AlorainyB0JW18,
author = {Wafa Alorainy and
Pete Burnap and
Han Liu and
Amir Javed and
Matthew L. Williams},
title = {Suspended Accounts: {A} Source of Tweets with Disgust and Anger Emotions
for Augmenting Hate Speech Data Sample},
booktitle = {2018 International Conference on Machine Learning and Cybernetics,
{ICMLC} 2018, Chengdu, China, July 15-18, 2018},
pages = {581--586},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/ICMLC.2018.8527001},
doi = {10.1109/ICMLC.2018.8527001},
timestamp = {Tue, 14 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icmlc/AlorainyB0JW18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-05229,
author = {Petar Radanliev and
David Charles De Roure and
Razvan Nicolescu and
Michael Huth and
Rafael Montalvo Mantilla and
Stacy Cannady and
Peter Burnap},
title = {Future developments in cyber risk assessment for the internet of things},
journal = {CoRR},
volume = {abs/1809.05229},
year = {2018},
url = {http://arxiv.org/abs/1809.05229},
eprinttype = {arXiv},
eprint = {1809.05229},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1809-05229.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BurnapCBEJSS17,
author = {Pete Burnap and
Yulia Cherdantseva and
Andrew Blyth and
Peter Eden and
Kevin Jones and
Hugh Soulsby and
Kristan Stoddart},
title = {Determining and Sharing Risk Data in Distributed Interdependent Systems},
journal = {Computer},
volume = {50},
number = {4},
pages = {72--79},
year = {2017},
url = {https://doi.org/10.1109/MC.2017.108},
doi = {10.1109/MC.2017.108},
timestamp = {Mon, 26 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/computer/BurnapCBEJSS17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/osnm/BurnapCAHS17,
author = {Pete Burnap and
Gualtiero Colombo and
Rosie Amery and
Andrei Hodorog and
Jonathan Scourfield},
title = {Multi-class machine classification of suicide-related communication
on Twitter},
journal = {Online Soc. Networks Media},
volume = {2},
pages = {32--44},
year = {2017},
url = {https://doi.org/10.1016/j.osnem.2017.08.001},
doi = {10.1016/J.OSNEM.2017.08.001},
timestamp = {Thu, 25 Aug 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/osnm/BurnapCAHS17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/AlsaediBR17,
author = {Nasser Alsaedi and
Pete Burnap and
Omer F. Rana},
title = {Can We Predict a Riot? Disruptive Event Detection Using Twitter},
journal = {{ACM} Trans. Internet Techn.},
volume = {17},
number = {2},
pages = {18:1--18:26},
year = {2017},
url = {https://doi.org/10.1145/2996183},
doi = {10.1145/2996183},
timestamp = {Sat, 15 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/toit/AlsaediBR17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/websci/WebbJSHEWPRB17,
author = {Helena Webb and
Marina Jirotka and
Bernd Carsten Stahl and
William Housley and
Adam Edwards and
Matthew L. Williams and
Rob Procter and
Omer F. Rana and
Pete Burnap},
editor = {Peter Fox and
Deborah L. McGuinness and
Lindsay Poirier and
Paolo Boldi and
Katharina Kinder{-}Kurlanda},
title = {The Ethical Challenges of Publishing Twitter Data for Research Dissemination},
booktitle = {Proceedings of the 2017 {ACM} on Web Science Conference, WebSci 2017,
Troy, NY, USA, June 25 - 28, 2017},
pages = {339--348},
publisher = {{ACM}},
year = {2017},
url = {https://doi.org/10.1145/3091478.3091489},
doi = {10.1145/3091478.3091489},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/websci/WebbJSHEWPRB17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsdm/TsikrikaAKVBW17,
author = {Theodora Tsikrika and
Babak Akhgar and
Vasilis Katos and
Stefanos Vrochidis and
Pete Burnap and
Matthew L. Williams},
editor = {Maarten de Rijke and
Milad Shokouhi and
Andrew Tomkins and
Min Zhang},
title = {1st International Workshop on Search and Mining Terrorist Online Content
{\&} Advances in Data Science for Cyber Security and Risk on the
Web},
booktitle = {Proceedings of the Tenth {ACM} International Conference on Web Search
and Data Mining, {WSDM} 2017, Cambridge, United Kingdom, February
6-10, 2017},
pages = {823--824},
publisher = {{ACM}},
year = {2017},
url = {https://doi.org/10.1145/3018661.3022760},
doi = {10.1145/3018661.3022760},
timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/wsdm/TsikrikaAKVBW17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-03513,
author = {Matilda Rhode and
Pete Burnap and
Kevin Jones},
title = {Early Stage Malware Prediction Using Recurrent Neural Networks},
journal = {CoRR},
volume = {abs/1708.03513},
year = {2017},
url = {http://arxiv.org/abs/1708.03513},
eprinttype = {arXiv},
eprint = {1708.03513},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1708-03513.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-05831,
author = {Amir Javed and
Pete Burnap and
Omer F. Rana},
title = {Real Time Prediction of Drive by Download Attacks on Twitter},
journal = {CoRR},
volume = {abs/1708.05831},
year = {2017},
url = {http://arxiv.org/abs/1708.05831},
eprinttype = {arXiv},
eprint = {1708.05831},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1708-05831.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ColomboBHS16,
author = {Gualtiero B. Colombo and
Pete Burnap and
Andrei Hodorog and
Jonathan Scourfield},
title = {Analysing the connectivity and communication of suicidal users on
twitter},
journal = {Comput. Commun.},
volume = {73},
pages = {291--300},
year = {2016},
url = {https://doi.org/10.1016/j.comcom.2015.07.018},
doi = {10.1016/J.COMCOM.2015.07.018},
timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/comcom/ColomboBHS16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CherdantsevaBBE16,
author = {Yulia Cherdantseva and
Pete Burnap and
Andrew Blyth and
Peter Eden and
Kevin Jones and
Hugh Soulsby and
Kristan Stoddart},
title = {A review of cyber security risk assessment methods for {SCADA} systems},
journal = {Comput. Secur.},
volume = {56},
pages = {1--27},
year = {2016},
url = {https://doi.org/10.1016/j.cose.2015.09.009},
doi = {10.1016/J.COSE.2015.09.009},
timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/compsec/CherdantsevaBBE16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AwanBR16,
author = {Malik Shahzad Kaleem Awan and
Pete Burnap and
Omer F. Rana},
title = {Identifying cyber risk hotspots: {A} framework for measuring temporal
variance in computer network risk},
journal = {Comput. Secur.},
volume = {57},
pages = {31--46},
year = {2016},
url = {https://doi.org/10.1016/j.cose.2015.11.003},
doi = {10.1016/J.COSE.2015.11.003},
timestamp = {Wed, 07 Dec 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/compsec/AwanBR16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/epjds/BurnapW16,
author = {Pete Burnap and
Matthew L. Williams},
title = {Us and them: identifying cyber hate on Twitter across multiple protected
characteristics},
journal = {{EPJ} Data Sci.},
volume = {5},
number = {1},
pages = {11},
year = {2016},
url = {https://doi.org/10.1140/epjds/s13688-016-0072-6},
doi = {10.1140/EPJDS/S13688-016-0072-6},
timestamp = {Sun, 23 Dec 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/epjds/BurnapW16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ConejeroRBMCC16,
author = {Javier Conejero and
Omer F. Rana and
Pete Burnap and
Jeffrey Morgan and
Mar{\'{\i}}a Blanca Caminero and
Carmen Carri{\'{o}}n},
title = {Analyzing Hadoop power consumption and impact on application QoS},
journal = {Future Gener. Comput. Syst.},
volume = {55},
pages = {213--223},
year = {2016},
url = {https://doi.org/10.1016/j.future.2015.03.009},
doi = {10.1016/J.FUTURE.2015.03.009},
timestamp = {Mon, 30 Jan 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/fgcs/ConejeroRBMCC16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tois/WebbBPRSWHEJ16,
author = {Helena Webb and
Pete Burnap and
Rob Procter and
Omer F. Rana and
Bernd Carsten Stahl and
Matthew L. Williams and
William Housley and
Adam Edwards and
Marina Jirotka},
title = {Digital Wildfires: Propagation, Verification, Regulation, and Responsible
Innovation},
journal = {{ACM} Trans. Inf. Syst.},
volume = {34},
number = {3},
pages = {15:1--15:23},
year = {2016},
url = {https://doi.org/10.1145/2893478},
doi = {10.1145/2893478},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tois/WebbBPRSWHEJ16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/EdenBBCJSS16,
author = {Peter Eden and
Andrew Blyth and
Pete Burnap and
Yulia Cherdantseva and
Kevin Jones and
Hugh Soulsby and
Kristan Stoddart},
editor = {Thomas Brandstetter and
Helge Janicke},
title = {Forensic Readiness for {SCADA/ICS} Incident Response},
booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
University, {UK}},
series = {Workshops in Computing},
publisher = {{BCS}},
year = {2016},
url = {http://ewic.bcs.org/content/ConWebDoc/56489},
timestamp = {Thu, 08 Sep 2016 09:49:45 +0200},
biburl = {https://dblp.org/rec/conf/ics-csr/EdenBBCJSS16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/AlsaediBR16,
author = {Nasser Alsaedi and
Pete Burnap and
Omer F. Rana},
title = {Automatic Summarization of Real World Events Using Twitter},
booktitle = {Proceedings of the Tenth International Conference on Web and Social
Media, Cologne, Germany, May 17-20, 2016},
pages = {511--514},
publisher = {{AAAI} Press},
year = {2016},
url = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13017},
timestamp = {Fri, 05 Feb 2021 11:07:46 +0100},
biburl = {https://dblp.org/rec/conf/icwsm/AlsaediBR16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/AlsaediBR16a,
author = {Nasser Alsaedi and
Pete Burnap and
Omer F. Rana},
title = {Sensing Real-World Events Using Arabic Twitter Posts},
booktitle = {Proceedings of the Tenth International Conference on Web and Social
Media, Cologne, Germany, May 17-20, 2016},
pages = {515--518},
publisher = {{AAAI} Press},
year = {2016},
url = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13016},
timestamp = {Fri, 05 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icwsm/AlsaediBR16a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webi/AlsaediBR16,
author = {Nasser Alsaedi and
Pete Burnap and
Omer F. Rana},
title = {Sensing Real-World Events Using Social Media Data and a Classification-Clustering
Framework},
booktitle = {2016 {IEEE/WIC/ACM} International Conference on Web Intelligence,
{WI} 2016, Omaha, NE, USA, October 13-16, 2016},
pages = {216--223},
publisher = {{IEEE} Computer Society},
year = {2016},
url = {https://doi.org/10.1109/WI.2016.0039},
doi = {10.1109/WI.2016.0039},
timestamp = {Sat, 15 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/webi/AlsaediBR16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webi/AlsaediBR16a,
author = {Nasser Alsaedi and
Pete Burnap and
Omer F. Rana},
title = {Temporal {TF-IDF:} {A} High Performance Approach for Event Summarization
in Twitter},
booktitle = {2016 {IEEE/WIC/ACM} International Conference on Web Intelligence,
{WI} 2016, Omaha, NE, USA, October 13-16, 2016},
pages = {515--521},
publisher = {{IEEE} Computer Society},
year = {2016},
url = {https://doi.org/10.1109/WI.2016.0087},
doi = {10.1109/WI.2016.0087},
timestamp = {Sat, 15 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/webi/AlsaediBR16a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/SaidRB15,
author = {Taimur Al Said and
Omer F. Rana and
Pete Burnap},
title = {VMInformant: an instrumented virtual machine to support trustworthy
cloud computing},
journal = {Int. J. High Perform. Comput. Netw.},
volume = {8},
number = {3},
pages = {222--234},
year = {2015},
url = {https://doi.org/10.1504/IJHPCN.2015.071257},
doi = {10.1504/IJHPCN.2015.071257},
timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijhpcn/SaidRB15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/BurnapRWHEMSC15,
author = {Pete Burnap and
Omer F. Rana and
Matthew L. Williams and
William Housley and
Adam Edwards and
Jeffrey Morgan and
Luke Sloan and
Javier Conejero},
title = {{COSMOS:} Towards an integrated and scalable service for analysing
social media on demand},
journal = {Int. J. Parallel Emergent Distributed Syst.},
volume = {30},
number = {2},
pages = {80--100},
year = {2015},
url = {https://doi.org/10.1080/17445760.2014.902057},
doi = {10.1080/17445760.2014.902057},
timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/paapp/BurnapRWHEMSC15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/WebbJSHEWPRB15,
author = {Helena Webb and
Marina Jirotka and
Bernd Carsten Stahl and
William Housley and
Adam Edwards and
Matthew L. Williams and
Rob Procter and
Omer F. Rana and
Pete Burnap},
title = {Digital wildfires: hyper-connectivity, havoc and a global ethos to
govern social media},
journal = {{SIGCAS} Comput. Soc.},
volume = {45},
number = {3},
pages = {193--201},
year = {2015},
url = {https://doi.org/10.1145/2874239.2874267},
doi = {10.1145/2874239.2874267},
timestamp = {Wed, 01 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/sigcas/WebbJSHEWPRB15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/AwanBR15,
author = {Malik Shahzad Kaleem Awan and
Pete Burnap and
Omer F. Rana},
editor = {Yulei Wu and
Geyong Min and
Nektarios Georgalas and
Jia Hu and
Luigi Atzori and
Xiaolong Jin and
Stephen A. Jarvis and
Lei (Chris) Liu and
Ram{\'{o}}n Ag{\"{u}}ero Calvo},
title = {An Empirical Risk Management Framework for Monitoring Network Security},
booktitle = {15th {IEEE} International Conference on Computer and Information Technology,
{CIT} 2015; 14th {IEEE} International Conference on Ubiquitous Computing
and Communications, {IUCC} 2015; 13th {IEEE} International Conference
on Dependable, Autonomic and Secure Computing, {DASC} 2015; 13th {IEEE}
International Conference on Pervasive Intelligence and Computing,
PICom 2015, Liverpool, United Kingdom, October 26-28, 2015},
pages = {1764--1771},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.266},
doi = {10.1109/CIT/IUCC/DASC/PICOM.2015.266},
timestamp = {Tue, 25 Feb 2025 09:21:51 +0100},
biburl = {https://dblp.org/rec/conf/IEEEcit/AwanBR15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/AlsaediBR15,
author = {Nasser Alsaedi and
Pete Burnap and
Omer F. Rana},
editor = {Jian Pei and
Fabrizio Silvestri and
Jie Tang},
title = {Identifying Disruptive Events from Social Media to Enhance Situational
Awareness},
booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
August 25 - 28, 2015},
pages = {934--941},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2808797.2808879},
doi = {10.1145/2808797.2808879},
timestamp = {Sat, 15 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/asunam/AlsaediBR15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/BurnapJRA15,
author = {Pete Burnap and
Amir Javed and
Omer F. Rana and
Malik Shahzad Kaleem Awan},
editor = {Jian Pei and
Fabrizio Silvestri and
Jie Tang},
title = {Real-time Classification of Malicious URLs on Twitter using Machine
Activity Data},
booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
August 25 - 28, 2015},
pages = {970--977},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2808797.2809281},
doi = {10.1145/2808797.2809281},
timestamp = {Tue, 07 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/asunam/BurnapJRA15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/AlsaediB15,
author = {Nasser Alsaedi and
Pete Burnap},
editor = {Jian Pei and
Fabrizio Silvestri and
Jie Tang},
title = {Feature Extraction and Analysis for Identifying Disruptive Events
from Social Media},
booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
August 25 - 28, 2015},
pages = {1495--1502},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2808797.2808867},
doi = {10.1145/2808797.2808867},
timestamp = {Sat, 15 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/asunam/AlsaediB15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cicling/AlsaediB15,
author = {Nasser Alsaedi and
Pete Burnap},
editor = {Alexander F. Gelbukh},
title = {Arabic Event Detection in Social Media},
booktitle = {Computational Linguistics and Intelligent Text Processing - 16th International
Conference, CICLing 2015, Cairo, Egypt, April 14-20, 2015, Proceedings,
Part {I}},
series = {Lecture Notes in Computer Science},
volume = {9041},
pages = {384--401},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-18111-0\_29},
doi = {10.1007/978-3-319-18111-0\_29},
timestamp = {Sat, 15 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/cicling/AlsaediB15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/RahulamathavanR15,
author = {Yogachandran Rahulamathavan and
Muttukrishnan Rajarajan and
Omer F. Rana and
Malik S. K. Awan and
Pete Burnap and
Sajal K. Das},
title = {Assessing Data Breach Risk in Cloud Systems},
booktitle = {7th {IEEE} International Conference on Cloud Computing Technology
and Science, CloudCom 2015, Vancouver, BC, Canada, November 30 - December
3, 2015},
pages = {363--370},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/CloudCom.2015.58},
doi = {10.1109/CLOUDCOM.2015.58},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/cloudcom/RahulamathavanR15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/EdenBBCJSS15,
author = {Peter Eden and
Andrew Blyth and
Pete Burnap and
Yulia Cherdantseva and
Kevin Jones and
Hugh Soulsby and
Kristan Stoddart},
editor = {Erich Rome and
Marianthi Theocharidou and
Stephen D. Wolthusen},
title = {A Cyber Forensic Taxonomy for {SCADA} Systems in Critical Infrastructure},
booktitle = {Critical Information Infrastructures Security - 10th International
Conference, {CRITIS} 2015, Berlin, Germany, October 5-7, 2015, Revised
Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {9578},
pages = {27--39},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-33331-1\_3},
doi = {10.1007/978-3-319-33331-1\_3},
timestamp = {Mon, 26 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/critis/EdenBBCJSS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/AwanBRJ15,
author = {Malik Shahzad Kaleem Awan and
Pete Burnap and
Omer F. Rana and
Amir Javed},
title = {Continuous Monitoring and Assessment of Cybersecurity Risks in Large
Computing Infrastructures},
booktitle = {17th {IEEE} International Conference on High Performance Computing
and Communications, {HPCC} 2015, 7th {IEEE} International Symposium
on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International
Conference on Embedded Software and Systems, {ICESS} 2015, New York,
NY, USA, August 24-26, 2015},
pages = {1442--1447},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.224},
doi = {10.1109/HPCC-CSS-ICESS.2015.224},
timestamp = {Wed, 07 Dec 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/hpcc/AwanBRJ15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ht/BurnapCS15,
author = {Pete Burnap and
Gualtiero Colombo and
Jonathan Scourfield},
editor = {Yeliz Yesilada and
Rosta Farzan and
Geert{-}Jan Houben},
title = {Machine Classification and Analysis of Suicide-Related Communication
on Twitter},
booktitle = {Proceedings of the 26th {ACM} Conference on Hypertext {\&} Social
Media, {HT} 2015, Guzelyurt, TRNC, Cyprus, September 1-4, 2015},
pages = {75--84},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2700171.2791023},
doi = {10.1145/2700171.2791023},
timestamp = {Thu, 30 Sep 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ht/BurnapCS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/EdenBBJS15,
author = {Peter Eden and
Andrew Blyth and
Pete Burnap and
Kevin Jones and
Kristan Stoddart},
editor = {Helge Janicke and
Kevin I. Jones},
title = {A Forensic Taxonomy of {SCADA} Systems and Approach to Incident Response},
booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
Applied Sciences Ingolstadt, Germany},
series = {Workshops in Computing},
publisher = {{BCS}},
year = {2015},
url = {https://doi.org/10.14236/ewic/ICS2015.5},
doi = {10.14236/EWIC/ICS2015.5},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ics-csr/EdenBBJS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iot360/WangRJSBRG15,
author = {Meisong Wang and
Rajiv Ranjan and
Prem Prakash Jayaraman and
Peter Strazdins and
Pete Burnap and
Omer F. Rana and
Dimitrios Georgakopoulos},
editor = {Benny Mandler and
Johann M{\'{a}}rquez{-}Barja and
Miguel Elias Mitre Campista and
Dagmar Cag{\'{a}}nov{\'{a}} and
Hakima Chaouchi and
Sherali Zeadally and
Mohamad Badra and
Stefano Giordano and
Maria Fazio and
Andrey Somov and
Radu{-}Laurentiu Vieriu},
title = {A Case for Understanding End-to-End Performance of Topic Detection
and Tracking Based Big Data Applications in the Cloud},
booktitle = {Internet of Things. IoT Infrastructures - Second International Summit,
IoT 360{\textdegree} 2015, Rome, Italy, October 27-29, 2015, Revised
Selected Papers, Part {I}},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering},
volume = {169},
pages = {315--325},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-47063-4\_33},
doi = {10.1007/978-3-319-47063-4\_33},
timestamp = {Thu, 07 Mar 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iot360/WangRJSBRG15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/AwanBR15,
author = {Malik Shahzad Kaleem Awan and
Pete Burnap and
Omer F. Rana},
editor = {Ehab Al{-}Shaer and
Christopher S. Oehmen and
Mohammad Ashiqur Rahman},
title = {Estimating Risk Boundaries for Persistent and Stealthy Cyber-Attacks},
booktitle = {Proceedings of the 2015 Workshop on Automated Decision Making for
Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October
12, 2015},
pages = {15--20},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2809826.2809830},
doi = {10.1145/2809826.2809830},
timestamp = {Wed, 07 Dec 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/safeconfig/AwanBR15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AwanAABR15,
author = {Malik S. K. Awan and
Mohammed A. AlGhamdi and
Sultan H. Almotiri and
Pete Burnap and
Omer F. Rana},
editor = {Oleg B. Makarevich and
Ron Poet and
Atilla El{\c{c}}i and
Manoj Singh Gaur and
Mehmet A. Orgun and
Ludmila K. Babenko and
Md. Sadek Ferdous and
Anthony T. S. Ho and
Vijay Laxmi and
Josef Pieprzyk},
title = {A classification framework for distinct cyber-attacks based on occurrence
patterns},
booktitle = {Proceedings of the 8th International Conference on Security of Information
and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10,
2015},
pages = {165--168},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2799979.2800037},
doi = {10.1145/2799979.2800037},
timestamp = {Mon, 05 Feb 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sin/AwanAABR15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/websci/SowriraghavanB15,
author = {Abinaya Sowriraghavan and
Pete Burnap},
editor = {David De Roure and
Pete Burnap and
Susan Halford},
title = {Prediction of Malware Propagation and Links within Communities in
Social Media Based Events},
booktitle = {Proceedings of the {ACM} Web Science Conference, WebSci 2015, Oxford,
United Kingdom, June 28 - July 1, 2015},
pages = {59:1--59:2},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2786451.2786494},
doi = {10.1145/2786451.2786494},
timestamp = {Sat, 24 Nov 2018 11:59:52 +0100},
biburl = {https://dblp.org/rec/conf/websci/SowriraghavanB15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/websci/WebbJSHEWPRB15,
author = {Helena Webb and
Marina Jirotka and
Bernd Carsten Stahl and
William Housley and
Adam Edwards and
Matthew L. Williams and
Rob Procter and
Omer F. Rana and
Pete Burnap},
editor = {David De Roure and
Pete Burnap and
Susan Halford},
title = {'Digital Wildfires': a challenge to the governance of social media?},
booktitle = {Proceedings of the {ACM} Web Science Conference, WebSci 2015, Oxford,
United Kingdom, June 28 - July 1, 2015},
pages = {64:1--64:2},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2786451.2786929},
doi = {10.1145/2786451.2786929},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/websci/WebbJSHEWPRB15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/insci/2015,
editor = {Thanassis Tiropanis and
Athena Vakali and
Laura Sartori and
Pete Burnap},
title = {Internet Science - Second International Conference, {INSCI} 2015,
Brussels, Belgium, May 27-29, 2015, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9089},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-18609-2},
doi = {10.1007/978-3-319-18609-2},
isbn = {978-3-319-18608-5},
timestamp = {Tue, 14 May 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/insci/2015.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/websci/2015,
editor = {David De Roure and
Pete Burnap and
Susan Halford},
title = {Proceedings of the {ACM} Web Science Conference, WebSci 2015, Oxford,
United Kingdom, June 28 - July 1, 2015},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2786451},
doi = {10.1145/2786451},
isbn = {978-1-4503-3672-7},
timestamp = {Sat, 24 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/websci/2015.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BurnapGSSW15,
author = {Pete Burnap and
Rachel Gibson and
Luke Sloan and
Rosalynd Southern and
Matthew L. Williams},
title = {140 Characters to Victory?: Using Twitter to Predict the {UK} 2015
General Election},
journal = {CoRR},
volume = {abs/1505.01511},
year = {2015},
url = {http://arxiv.org/abs/1505.01511},
eprinttype = {arXiv},
eprint = {1505.01511},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/BurnapGSSW15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bigdatasociety/HousleyPEBWSRMVG14,
author = {William Housley and
Rob Procter and
Adam Edwards and
Peter Burnap and
Matthew L. Williams and
Luke Sloan and
Omer F. Rana and
Jeffrey Morgan and
Alex Voss and
Anita Greenhill},
title = {Big and broad social data and the sociological imagination: {A} collaborative
response},
journal = {Big Data Soc.},
volume = {1},
number = {2},
pages = {205395171454513},
year = {2014},
url = {https://doi.org/10.1177/2053951714545135},
doi = {10.1177/2053951714545135},
timestamp = {Sat, 15 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/bigdatasociety/HousleyPEBWSRMVG14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/BurnapWSRHEKPV14,
author = {Pete Burnap and
Matthew L. Williams and
Luke Sloan and
Omer F. Rana and
William Housley and
Adam Edwards and
Vincent A. Knight and
Rob Procter and
Alex Voss},
title = {Tweeting the terror: modelling the social media reaction to the Woolwich
terrorist attack},
journal = {Soc. Netw. Anal. Min.},
volume = {4},
number = {1},
pages = {206},
year = {2014},
url = {https://doi.org/10.1007/s13278-014-0206-4},
doi = {10.1007/S13278-014-0206-4},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/snam/BurnapWSRHEKPV14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/BurnapRPB14,
author = {Pete Burnap and
Omer F. Rana and
Nargis Pauran and
Phil Bowen},
title = {Towards Real-Time Probabilistic Risk Assessment by Sensing Disruptive
Events from Streamed News Feeds},
booktitle = {Eighth International Conference on Complex, Intelligent and Software
Intensive Systems, {CISIS} 2014, Birmingham, UK, July 2-4, 2014},
pages = {608--613},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/CISIS.2014.87},
doi = {10.1109/CISIS.2014.87},
timestamp = {Tue, 07 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cisis/BurnapRPB14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/RahulamathavanPBRRS14,
author = {Yogachandran Rahulamathavan and
Pramod S. Pawar and
Pete Burnap and
Muttukrishnan Rajarajan and
Omer F. Rana and
George Spanoudakis},
editor = {Ron Poet and
Muttukrishnan Rajarajan},
title = {Analysing Security requirements in Cloud-based Service Level Agreements},
booktitle = {Proceedings of the 7th International Conference on Security of Information
and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
pages = {73},
publisher = {{ACM}},
year = {2014},
url = {https://doi.org/10.1145/2659651.2659735},
doi = {10.1145/2659651.2659735},
timestamp = {Wed, 07 Dec 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sin/RahulamathavanPBRRS14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/ConejeroBRM13,
author = {Javier Conejero and
Pete Burnap and
Omer F. Rana and
Jeffrey Morgan},
title = {Scaling Archived Social Media Data Analysis Using a Hadoop Cloud},
booktitle = {2013 {IEEE} Sixth International Conference on Cloud Computing, Santa
Clara, CA, USA, June 28 - July 3, 2013},
pages = {685--692},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/CLOUD.2013.120},
doi = {10.1109/CLOUD.2013.120},
timestamp = {Tue, 07 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/IEEEcloud/ConejeroBRM13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/ConejeroRBMCC13,
author = {Javier Conejero and
Omer F. Rana and
Pete Burnap and
Jeffrey Morgan and
Carmen Carri{\'{o}}n and
Mar{\'{\i}}a Blanca Caminero},
editor = {Fr{\'{e}}d{\'{e}}ric Desprez and
Donald Ferguson and
Ethan Hadar and
Frank Leymann and
Matthias Jarke and
Markus Helfert},
title = {Characterising the Power Consumption of Hadoop Clouds - {A} Social
Media Analysis Case Study},
booktitle = {{CLOSER} 2013 - Proceedings of the 3rd International Conference on
Cloud Computing and Services Science, Aachen, Germany, 8-10 May, 2013},
pages = {233--243},
publisher = {SciTePress},
year = {2013},
timestamp = {Mon, 30 Jan 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/closer/ConejeroRBMCC13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/BurnapSGHRE12,
author = {Pete Burnap and
Irena Spasic and
W. Alex Gray and
Jeremy Hilton and
Omer F. Rana and
Glyn Elwyn},
editor = {Waleed W. Smari and
Geoffrey Charles Fox},
title = {Protecting patient privacy in distributed collaborative healthcare
environments by retaining access control of shared information},
booktitle = {2012 International Conference on Collaboration Technologies and Systems,
{CTS} 2012, Denver, CO, USA, May 21-25, 2012},
pages = {490--497},
publisher = {{IEEE}},
year = {2012},
url = {https://doi.org/10.1109/CTS.2012.6261095},
doi = {10.1109/CTS.2012.6261095},
timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cts/BurnapSGHRE12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Burnap09,
author = {Peter Richard Burnap},
title = {Advanced access control in support and distributed collaborative working
and de-perimeterization},
school = {Cardiff University, {UK}},
year = {2009},
url = {http://orca.cf.ac.uk/55019/},
timestamp = {Tue, 05 Apr 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/phd/ethos/Burnap09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icds/BurnapH09,
author = {Pete Burnap and
Jeremy Hilton},
title = {Self Protecting Data for De-perimeterised Information Sharing},
booktitle = {Third International Conference on the Digital Society {(ICDS} 2009),
February 1-7, 2009, Cancun, Mexico},
pages = {65--70},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://doi.org/10.1109/ICDS.2009.41},
doi = {10.1109/ICDS.2009.41},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icds/BurnapH09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/PahwaBGM06,
author = {Jaspreet Singh Pahwa and
Pete Burnap and
W. A. Gray and
John C. Miles},
editor = {St{\'{e}}phane Bressan and
Josef K{\"{u}}ng and
Roland R. Wagner},
title = {{MDSSF} - {A} Federated Architecture for Product Procurement},
booktitle = {Database and Expert Systems Applications, 17th International Conference,
{DEXA} 2006, Krak{\'{o}}w, Poland, September 4-8, 2006, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {4080},
pages = {812--821},
publisher = {Springer},
year = {2006},
url = {https://doi.org/10.1007/11827405\_79},
doi = {10.1007/11827405\_79},
timestamp = {Tue, 14 May 2019 10:00:46 +0200},
biburl = {https://dblp.org/rec/conf/dexa/PahwaBGM06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip5-5/JoitaRBPGM04,
author = {Liviu Joita and
Omer F. Rana and
Pete Burnap and
Jaspreet Singh Pahwa and
W. A. Gray and
John C. Miles},
editor = {Luis M. Camarinha{-}Matos},
title = {A Grid-Enabled Security Framework for Collaborative Virtual Organisations},
booktitle = {Virtual Enterprises and Collaborative Networks, {IFIP} 18th World
Computer Congress, {TC5} / {WG5.5} - 5th Working Conference on Virtual
Enterprises, 22-27 August 2004, Toulouse, France},
series = {{IFIP}},
volume = {149},
pages = {415--422},
publisher = {Kluwer/springer},
year = {2004},
url = {https://doi.org/10.1007/1-4020-8139-1\_44},
doi = {10.1007/1-4020-8139-1\_44},
timestamp = {Tue, 07 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ifip5-5/JoitaRBPGM04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.