


Остановите войну!
for scientists:


default search action
Pete Burnap
Peter Burnap – Peter Richard Burnap
Person information

- affiliation: Cardiff University, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j49]Ayodeji O. Rotibi, Neetesh Saxena, Pete Burnap
, Alex Tarter:
Extended Dependency Modeling Technique for Cyber Risk Identification in ICS. IEEE Access 11: 37229-37242 (2023) - [j48]Enoch Agyepong
, Yulia Cherdantseva, Philipp Reinecke, Pete Burnap:
A systematic method for measuring the performance of a cyber security operations centre analyst. Comput. Secur. 124: 102959 (2023) - [j47]Abubakar Sadiq Mohammed
, Eirini Anthi
, Omer F. Rana
, Neetesh Saxena
, Pete Burnap:
Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication. Comput. Secur. 124: 103007 (2023) - [j46]Avi Shaked
, Yulia Cherdantseva
, Pete Burnap, Peter Maynard
:
Operations-informed incident response playbooks. Comput. Secur. 134: 103454 (2023) - [j45]Muhammad Nouman Nafees
, Neetesh Saxena
, Alvaro A. Cárdenas
, Santiago Grijalva
, Pete Burnap
:
Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review. ACM Comput. Surv. 55(10): 215:1-215:36 (2023) - [j44]Ruth Ikwu
, Luca Giommoni, Amir Javed, Pete Burnap, Matthew L. Williams:
Digital fingerprinting for identifying malicious collusive groups on Twitter. J. Cybersecur. 9(1) (2023) - [j43]Yazeed Alrowaili
, Neetesh Saxena
, Anurag Srivastava, Mauro Conti
, Pete Burnap:
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification. IET Cyper-Phys. Syst.: Theory & Appl. 8(3): 160-185 (2023) - [j42]Mohammed Asiri
, Neetesh Saxena
, Rigel Gjomemo
, Pete Burnap
:
Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective. ACM Trans. Cyber Phys. Syst. 7(2): 15:1-15:33 (2023) - [c47]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems. ACNS Workshops 2023: 700-704 - [c46]Mohammed Asiri
, Neetesh Saxena, Pete Burnap:
ARCSG: Advancing Resilience of Cyber-Physical Smart Grid: An Integrated Co-Simulation Approach Incorporating Indicators of Compromise. EuroS&P Workshops 2023: 370-378 - [c45]Hakan Kayan, Omer F. Rana, Pete Burnap, Charith Perera:
Artifact: CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms. PerCom Workshops 2023: 3-4 - [c44]Hakan Kayan, Omer F. Rana, Pete Burnap, Charith Perera:
CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms. PerCom Workshops 2023: 282-284 - [d1]Hakan Kayan
, Omer Farooq Rana, Pete Burnap, Charith Perera:
CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms. IEEE DataPort, 2023 - [i18]Sanyam Vyas, John Hannay, Andrew Bolton, Pete Burnap:
Automated Cyber Defence: A Review. CoRR abs/2303.04926 (2023) - [i17]Baskoro Adi Pratomo, Toby Jackson, Pete Burnap, Andrew Hood, Eirini Anthi:
Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection. CoRR abs/2310.18165 (2023) - 2022
- [j41]Emad Aliwa, Omer F. Rana
, Charith Perera, Peter Burnap:
Cyberattacks and Countermeasures for In-Vehicle Networks. ACM Comput. Surv. 54(1): 21:1-21:37 (2022) - [j40]Hakan Kayan
, Matthew Nunes, Omer F. Rana
, Pete Burnap, Charith Perera:
Cybersecurity of Industrial Cyber-Physical Systems: A Review. ACM Comput. Surv. 54(11s): 229:1-229:35 (2022) - [j39]Matthew Nunes
, Pete Burnap, Philipp Reinecke, Kaelon Lloyd:
Bane or Boon: Measuring the effect of evasive malware on system call classifiers. J. Inf. Secur. Appl. 67: 103202 (2022) - [j38]Fatimah Aloraini
, Amir Javed, Omer F. Rana
, Pete Burnap:
Adversarial machine learning in IoT from an insider point of view. J. Inf. Secur. Appl. 70: 103341 (2022) - [j37]Wafa Alorainy
, Pete Burnap, Han Liu, Matthew L. Williams, Luca Giommoni:
Disrupting networks of hate: characterising hateful networks and removing critical nodes. Soc. Netw. Anal. Min. 12(1): 27 (2022) - [j36]Amir Javed
, Ruth Ikwu, Pete Burnap, Luca Giommoni, Matthew L. Williams:
Disrupting drive-by download networks on Twitter. Soc. Netw. Anal. Min. 12(1): 117 (2022) - [j35]Amir Javed
, Mike Lakoju
, Pete Burnap, Omer F. Rana
:
Security analytics for real-time forecasting of cyberattacks. Softw. Pract. Exp. 52(3): 788-804 (2022) - [j34]Abubakar Sadiq Mohammed
, Philipp Reinecke
, Pete Burnap
, Omer F. Rana
, Eirini Anthi
:
Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective. ACM Trans. Cyber Phys. Syst. 6(3): 28:1-28:27 (2022) - [c43]Avi Shaked, Yulia Cherdantseva, Pete Burnap:
Model-Based Incident Response Playbooks. ARES 2022: 26:1-26:7 - [c42]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
Poster: Physics-Informed Augmentation for Contextual Anomaly Detection in Smart Grid. CCS 2022: 3427-3429 - [c41]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
On The Efficacy of Physics-Informed Context-Based Anomaly Detection for Power Systems. SmartGridComm 2022: 374-379 - [i16]Abubakar Sadiq Mohammed, Philipp Reinecke, Pete Burnap, Omer F. Rana, Eirini Anthi:
Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective. CoRR abs/2202.12179 (2022) - [i15]Petar Radanliev, David De Roure, Pete Burnap, Omar Santos:
Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things. CoRR abs/2212.08141 (2022) - 2021
- [j33]Eirini Anthi
, Lowri Williams
, Amir Javed
, Pete Burnap:
Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks. Comput. Secur. 108: 102352 (2021) - [j32]Eirini Anthi
, Lowri Williams, Pete Burnap, Kevin Jones:
A three-tiered intrusion detection system for industrial control systems. J. Cybersecur. 7(1) (2021) - [j31]Mike Lakoju, Amir Javed, Omer F. Rana
, Pete Burnap, Samuelson Tijesunimi Atiba, Soumaya Cherkaoui:
"Chatty Devices" and edge-based activity classification. Discov. Internet Things 1(1) (2021) - [j30]Eirini Anthi
, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury:
Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems. J. Inf. Secur. Appl. 58: 102717 (2021) - [j29]Petar Radanliev
, David De Roure, Pete Burnap, Omar Santos:
Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things. Rev. Socionetwork Strateg. 15(2): 381-411 (2021) - [j28]Mike Lakoju
, Nemitari Ajienka, Mojtaba Ahmadieh Khanesar
, Pete Burnap, David T. Branson
:
Unsupervised Learning for Product Use Activity Recognition: An Exploratory Study of a "Chatty Device". Sensors 21(15): 4991 (2021) - [c40]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
Optimized Predictive Control for AGC Cyber Resiliency. CCS 2021: 2450-2452 - [i14]Hakan Kayan, Matthew Nunes
, Omer F. Rana, Pete Burnap, Charith Perera:
Cybersecurity of Industrial Cyber-Physical Systems: A Review. CoRR abs/2101.03564 (2021) - 2020
- [j27]Neetesh Saxena
, Ieuan Thomas, Prosanta Gope
, Pete Burnap
, Neeraj Kumar
:
PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs. Computer 53(7): 29-44 (2020) - [j26]Petar Radanliev
, David De Roure, Kevin R. Page
, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La Treall Maddox, Pete Burnap:
Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecur. 3(1): 13 (2020) - [j25]Baskoro Adi Pratomo
, Pete Burnap, George Theodorakopoulos:
BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks. Secur. Commun. Networks 2020: 8826038:1-8826038:15 (2020) - [j24]Amir Javed
, Pete Burnap, Matthew L. Williams, Omer F. Rana
:
Emotions Behind Drive-by Download Propagation on Twitter. ACM Trans. Web 14(4): 16:1-16:26 (2020) - [c39]Han Liu, Pete Burnap, Wafa Alorainy, Matthew L. Williams:
Scmhl5 at TRAC-2 Shared Task on Aggression Identification: Bert Based Ensemble Learning Approach. TRAC@LREC 2020: 62-68 - [c38]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap, Bong Jun Choi:
Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in Industrial Context. CCS 2020: 2117-2119 - [c37]Enoch Agyepong, Yulia Cherdantseva, Philipp Reinecke, Pete Burnap:
Towards a Framework for Measuring the Performance of a Security Operations Center Analyst. Cyber Security 2020: 1-8 - [i13]Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury:
Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems. CoRR abs/2004.05005 (2020) - [i12]Emad Aliwa, Omer F. Rana, Charith Perera, Peter Burnap:
Cyberattacks and Countermeasures For In-Vehicle Networks. CoRR abs/2004.10781 (2020) - [i11]Petar Radanliev
, David De Roure, Kevin R. Page, Max Van Kleek, Rafael Mantilla Montalvo, Omar Santos, La Treall Maddox, Stacy Cannady, Pete Burnap, Eirini Anthi, Carsten Maple:
Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics. CoRR abs/2005.12150 (2020)
2010 – 2019
- 2019
- [j23]Eirini Anthi
, Lowri Williams
, Malgorzata Slowinska, George Theodorakopoulos, Pete Burnap:
A Supervised Intrusion Detection System for Smart Home IoT Devices. IEEE Internet Things J. 6(5): 9042-9053 (2019) - [j22]Amir Javed, Pete Burnap, Omer F. Rana
:
Prediction of drive-by download attacks on Twitter. Inf. Process. Manag. 56(3): 1133-1145 (2019) - [j21]Matthew Nunes
, Pete Burnap, Omer F. Rana
, Philipp Reinecke, Kaelon Lloyd:
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis. J. Inf. Secur. Appl. 48 (2019) - [j20]Han Liu
, Pete Burnap, Wafa Alorainy, Matthew L. Williams:
A Fuzzy Approach to Text Classification With Two-Stage Training for Ambiguous Instances. IEEE Trans. Comput. Soc. Syst. 6(2): 227-240 (2019) - [j19]Wafa Alorainy, Pete Burnap, Han Liu, Matthew L. Williams:
"The Enemy Among Us": Detecting Cyber Hate Speech with Threats-based Othering Language Embeddings. ACM Trans. Web 13(3): 14:1-14:26 (2019) - [c36]Matilda Rhode, Lewis Tuson, Pete Burnap, Kevin Jones:
LAB to SOC: Robust Features for Dynamic Malware Detection. DSN (Industry Track) 2019: 13-16 - [c35]Masoud Barati, Omer F. Rana
, George Theodorakopoulos, Peter Burnap:
Privacy-Aware Cloud Ecosystems and GDPR Compliance. FiCloud 2019: 117-124 - [c34]Rob Procter, Helena Webb, Pete Burnap, William Housley, Adam Edwards, Matthew L. Williams, Marina Jirotka:
A Study of Cyber Hate on Twitter with Implications for Social Media Governance Strategies. TTO 2019 - [c33]Han Liu, Pete Burnap, Wafa Alorainy, Matthew L. Williams:
Fuzzy Multi-task Learning for Hate Speech Type Identification. WWW 2019: 3006-3012 - [e3]Oleg B. Makarevich, Dmitry Popov, Ludmila K. Babenko, Pete Burnap, Atilla Elçi, Ron Poet, Jaideep Vaidya, Mehmet A. Orgun, Manoj Singh Gaur, Rajveer Singh Shekhawat:
Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019. ACM 2019, ISBN 978-1-4503-7242-8 [contents] - [i10]Matilda Rhode, Pete Burnap, Kevin Jones:
Dual-task agent for run-time classification and killing of malicious processes. CoRR abs/1902.02598 (2019) - [i9]Petar Radanliev
, David De Roure, Jason R. C. Nurse, Rafael Mantilla Montalvo, Peter Burnap:
Standardisation of cyber risk impact assessment for the Internet of Things (IoT). CoRR abs/1903.04428 (2019) - [i8]Petar Radanliev, David Charles De Roure, Jason R. C. Nurse, Pete Burnap, Eirini Anthi, Uchenna Ani
, La Treall Maddox, Omar Santos, Rafael Mantilla Montalvo:
Definition of Internet of Things (IoT) Cyber Risk Discussion on a Transformation Roadmap for Standardisation of Regulations Risk Maturity Strategy Design and Impact Assessment. CoRR abs/1903.12084 (2019) - [i7]Petar Radanliev
, David Charles De Roure, Jason R. C. Nurse, Peter Burnap, Rafael Mantilla Montalvo:
Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies. CoRR abs/1903.12582 (2019) - [i6]Rob Procter, Helena Webb, Marina Jirotka, Pete Burnap, William Housley, Adam Edwards, Matthew L. Williams:
A Study of Cyber Hate on Twitter with Implications for Social Media Governance Strategies. CoRR abs/1908.11732 (2019) - [i5]Petar Radanliev, David Charles De Roure, Kevin R. Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La Treall Maddox, Peter Burnap:
The Industrial Internet of Things in the Industry 4.0 supply chains: literature review and future trends. CoRR abs/1911.05726 (2019) - 2018
- [j18]Petar Radanliev
, David Charles De Roure
, Razvan Nicolescu, Michael Huth, Rafael Montalvo Mantilla, Stacy Cannady, Peter Burnap:
Future developments in cyber risk assessment for the internet of things. Comput. Ind. 102: 14-22 (2018) - [j17]Pete Burnap
, Richard French, Frederick Turner, Kevin Jones:
Malware classification using self organising feature maps and machine activity data. Comput. Secur. 73: 399-410 (2018) - [j16]Matilda Rhode, Pete Burnap, Kevin Jones:
Early-stage malware prediction using recurrent neural networks. Comput. Secur. 77: 578-594 (2018) - [j15]Eirini Anthi
, Shazaib Ahmad, Omer F. Rana
, George Theodorakopoulos, Pete Burnap:
EclipseIoT: A secure and adaptive hub for the Internet of Things. Comput. Secur. 78: 477-490 (2018) - [c32]Baskoro Adi Pratomo
, Pete Burnap, George Theodorakopoulos:
Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder. Cyber Security 2018: 1-8 - [c31]Wafa Alorainy, Pete Burnap, Han Liu, Amir Javed, Matthew L. Williams:
Suspended Accounts: A Source of Tweets with Disgust and Anger Emotions for Augmenting Hate Speech Data Sample. ICMLC 2018: 581-586 - [i4]Petar Radanliev
, David Charles De Roure, Razvan Nicolescu, Michael Huth, Rafael Montalvo Mantilla, Stacy Cannady, Peter Burnap:
Future developments in cyber risk assessment for the internet of things. CoRR abs/1809.05229 (2018) - 2017
- [j14]Pete Burnap, Yulia Cherdantseva, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart
:
Determining and Sharing Risk Data in Distributed Interdependent Systems. Computer 50(4): 72-79 (2017) - [j13]Pete Burnap, Gualtiero Colombo
, Rosie Amery
, Andrei Hodorog
, Jonathan Scourfield
:
Multi-class machine classification of suicide-related communication on Twitter. Online Soc. Networks Media 2: 32-44 (2017) - [j12]Nasser Alsaedi, Pete Burnap, Omer F. Rana
:
Can We Predict a Riot? Disruptive Event Detection Using Twitter. ACM Trans. Internet Techn. 17(2): 18:1-18:26 (2017) - [c30]Helena Webb
, Marina Jirotka, Bernd Carsten Stahl, William Housley, Adam Edwards, Matthew L. Williams, Rob Procter, Omer F. Rana
, Pete Burnap:
The Ethical Challenges of Publishing Twitter Data for Research Dissemination. WebSci 2017: 339-348 - [c29]Theodora Tsikrika
, Babak Akhgar, Vasilis Katos, Stefanos Vrochidis
, Pete Burnap, Matthew L. Williams:
1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web. WSDM 2017: 823-824 - [i3]Matilda Rhode, Pete Burnap, Kevin Jones:
Early Stage Malware Prediction Using Recurrent Neural Networks. CoRR abs/1708.03513 (2017) - [i2]Amir Javed, Pete Burnap, Omer F. Rana:
Real Time Prediction of Drive by Download Attacks on Twitter. CoRR abs/1708.05831 (2017) - 2016
- [j11]Gualtiero B. Colombo
, Pete Burnap
, Andrei Hodorog
, Jonathan Scourfield
:
Analysing the connectivity and communication of suicidal users on twitter. Comput. Commun. 73: 291-300 (2016) - [j10]Yulia Cherdantseva
, Pete Burnap
, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart
:
A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 56: 1-27 (2016) - [j9]Malik Shahzad Kaleem Awan
, Pete Burnap
, Omer F. Rana
:
Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. Comput. Secur. 57: 31-46 (2016) - [j8]Pete Burnap
, Matthew L. Williams
:
Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Sci. 5(1): 11 (2016) - [j7]Javier Conejero
, Omer F. Rana
, Pete Burnap
, Jeffrey Morgan, María Blanca Caminero
, Carmen Carrión
:
Analyzing Hadoop power consumption and impact on application QoS. Future Gener. Comput. Syst. 55: 213-223 (2016) - [j6]Helena Webb
, Pete Burnap, Rob Procter, Omer F. Rana
, Bernd Carsten Stahl
, Matthew L. Williams, William Housley, Adam Edwards, Marina Jirotka:
Digital Wildfires: Propagation, Verification, Regulation, and Responsible Innovation. ACM Trans. Inf. Syst. 34(3): 15:1-15:23 (2016) - [c28]Peter Eden, Andrew Blyth, Pete Burnap, Yulia Cherdantseva, Kevin Jones, Hugh Soulsby, Kristan Stoddart:
Forensic Readiness for SCADA/ICS Incident Response. ICS-CSR 2016 - [c27]Nasser Alsaedi, Pete Burnap, Omer F. Rana:
Automatic Summarization of Real World Events Using Twitter. ICWSM 2016: 511-514 - [c26]Nasser Alsaedi, Pete Burnap, Omer F. Rana:
Sensing Real-World Events Using Arabic Twitter Posts. ICWSM 2016: 515-518 - [c25]Nasser Alsaedi, Pete Burnap, Omer F. Rana
:
Sensing Real-World Events Using Social Media Data and a Classification-Clustering Framework. WI 2016: 216-223 - [c24]Nasser Alsaedi, Pete Burnap, Omer F. Rana
:
Temporal TF-IDF: A High Performance Approach for Event Summarization in Twitter. WI 2016: 515-521 - 2015
- [j5]Taimur Al Said, Omer F. Rana
, Pete Burnap
:
VMInformant: an instrumented virtual machine to support trustworthy cloud computing. Int. J. High Perform. Comput. Netw. 8(3): 222-234 (2015) - [j4]Pete Burnap
, Omer F. Rana
, Matthew L. Williams
, William Housley, Adam Edwards
, Jeffrey Morgan, Luke Sloan, Javier Conejero
:
COSMOS: Towards an integrated and scalable service for analysing social media on demand. Int. J. Parallel Emergent Distributed Syst. 30(2): 80-100 (2015) - [j3]Helena Webb, Marina Jirotka, Bernd Carsten Stahl, William Housley, Adam Edwards, Matthew L. Williams
, Rob Procter, Omer F. Rana, Pete Burnap
:
Digital wildfires: hyper-connectivity, havoc and a global ethos to govern social media. SIGCAS Comput. Soc. 45(3): 193-201 (2015) - [c23]Malik Shahzad Kaleem Awan, Pete Burnap
, Omer F. Rana
:
An Empirical Risk Management Framework for Monitoring Network Security. CIT/IUCC/DASC/PICom 2015: 1764-1771 - [c22]Nasser Alsaedi, Pete Burnap
, Omer F. Rana
:
Identifying Disruptive Events from Social Media to Enhance Situational Awareness. ASONAM 2015: 934-941 - [c21]Pete Burnap
, Amir Javed, Omer F. Rana, Malik Shahzad Kaleem Awan:
Real-time Classification of Malicious URLs on Twitter using Machine Activity Data. ASONAM 2015: 970-977 - [c20]Nasser Alsaedi, Pete Burnap
:
Feature Extraction and Analysis for Identifying Disruptive Events from Social Media. ASONAM 2015: 1495-1502 - [c19]Nasser Alsaedi, Pete Burnap
:
Arabic Event Detection in Social Media. CICLing (1) 2015: 384-401 - [c18]Yogachandran Rahulamathavan
, Muttukrishnan Rajarajan, Omer F. Rana
, Malik S. K. Awan, Pete Burnap
, Sajal K. Das
:
Assessing Data Breach Risk in Cloud Systems. CloudCom 2015: 363-370 - [c17]Peter Eden, Andrew Blyth, Pete Burnap, Yulia Cherdantseva, Kevin Jones, Hugh Soulsby, Kristan Stoddart
:
A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure. CRITIS 2015: 27-39 - [c16]Malik Shahzad Kaleem Awan, Pete Burnap
, Omer F. Rana
, Amir Javed:
Continuous Monitoring and Assessment of Cybersecurity Risks in Large Computing Infrastructures. HPCC/CSS/ICESS 2015: 1442-1447 - [c15]Pete Burnap
, Gualtiero Colombo, Jonathan Scourfield
:
Machine Classification and Analysis of Suicide-Related Communication on Twitter. HT 2015: 75-84 - [c14]Peter Eden, Andrew Blyth, Pete Burnap, Kevin Jones, Kristan Stoddart:
A Forensic Taxonomy of SCADA Systems and Approach to Incident Response. ICS-CSR 2015 - [c13]Meisong Wang, Rajiv Ranjan
, Prem Prakash Jayaraman
, Peter Strazdins, Pete Burnap, Omer F. Rana, Dimitrios Georgakopoulos:
A Case for Understanding End-to-End Performance of Topic Detection and Tracking Based Big Data Applications in the Cloud. IoT 360 (1) 2015: 315-325 - [c12]Malik Shahzad Kaleem Awan, Pete Burnap
, Omer F. Rana
:
Estimating Risk Boundaries for Persistent and Stealthy Cyber-Attacks. SafeConfig@CCS 2015: 15-20 - [c11]Malik S. K. Awan, Mohammed A. AlGhamdi, Sultan H. Almotiri, Pete Burnap
, Omer F. Rana
:
A classification framework for distinct cyber-attacks based on occurrence patterns. SIN 2015: 165-168 - [c10]Abinaya Sowriraghavan, Pete Burnap:
Prediction of Malware Propagation and Links within Communities in Social Media Based Events. WebSci 2015: 59:1-59:2 - [c9]Helena Webb
, Marina Jirotka, Bernd Carsten Stahl
, William Housley, Adam Edwards, Matthew L. Williams, Rob Procter, Omer F. Rana, Pete Burnap:
'Digital Wildfires': a challenge to the governance of social media? WebSci 2015: 64:1-64:2 - [e2]Thanassis Tiropanis, Athena Vakali, Laura Sartori, Pete Burnap
:
Internet Science - Second International Conference, INSCI 2015, Brussels, Belgium, May 27-29, 2015, Proceedings. Lecture Notes in Computer Science 9089, Springer 2015, ISBN 978-3-319-18608-5 [contents] - [e1]David De Roure, Pete Burnap, Susan Halford:
Proceedings of the ACM Web Science Conference, WebSci 2015, Oxford, United Kingdom, June 28 - July 1, 2015. ACM 2015, ISBN 978-1-4503-3672-7 [contents] - [i1]Pete Burnap, Rachel Gibson, Luke Sloan, Rosalynd Southern, Matthew L. Williams:
140 Characters to Victory?: Using Twitter to Predict the UK 2015 General Election. CoRR abs/1505.01511 (2015) - 2014
- [j2]