Budi Arief

Orcid: 0000-0002-1830-1587

According to our database1, Budi Arief authored at least 41 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The Use of Public Data and Free Tools in National CSIRTs' Operational Practices: A Systematic Literature Review.
CoRR, 2023

The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023

Dark Ending: What Happens when a Dark Web Market Closes down.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Applying Neutralisation Theory to Better Understand Ransomware Offenders.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

2022
How National CSIRTs Operate: Personal Observations and Opinions from MyCERT.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
Investigating the impact of ransomware splash screens.
J. Inf. Secur. Appl., 2021

On the Effectiveness of Ransomware Decryption Tools.
Comput. Secur., 2021

Cyber Stalking, Cyber Harassment, and Adult Mental Health: A Systematic Review.
Cyberpsychology Behav. Soc. Netw., 2021

Industrialising Blackmail: Privacy Invasion Based IoT Ransomware.
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021

Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021

2020
Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms.
Proceedings of the AIChallengeIoT@SenSys 2020: Proceedings of the 2nd International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things, 2020

Persistence in Linux-Based IoT Malware.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

Why Current Statistical Approaches to Ransomware Detection Fail.
Proceedings of the Information Security - 23rd International Conference, 2020

Using Eyetracker to Find Ways to Mitigate Ransomware.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

PaperW8: an IoT bricking ransomware proof of concept.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Lock Picking in the Era of Internet of Things.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Roadmap for Improving the Impact of Anti-ransomware Research.
Proceedings of the Secure IT Systems, 2019

Selective Forwarding Attack on IoT Home Security Kits.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
Security Analysis of Contiki IoT Operating System.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

2017
Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?
IEEE Secur. Priv., 2017

Earworms Make Bad Passwords: An Analysis of the Nokē Smart Lock Manual Override.
Proceedings of the 2017 International Workshop on Secure Internet of Things, 2017

2015
Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1-Attackers.
IEEE Secur. Priv., 2015

Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2-Defenders and Victims.
IEEE Secur. Priv., 2015

Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware).
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

2014
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Risks of Offline Verify PIN on Contactless Cards.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Deriving requirements for an online community interaction scheme: indications from older adults.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

2011
Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

2009
Step-Wise Development of Resilient Ambient Campus Scenarios.
Proceedings of the Methods, 2009

2008
TRACKSS Approach to Improving Road Safety through Sensors Collaboration on Vehicle and in Infrastructure.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

2007
On Rigorous Design and Implementation of Fault Tolerant Ambient Systems.
Proceedings of the Tenth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2007), 2007

A Framework for Open Distributed System Design.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
On using the CAMA framework for developing open mobile fault tolerant agent systems.
Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems, 2006

On Developing Open Mobile Fault Tolerant Agent Systems.
Proceedings of the Software Engineering for Multi-Agent Systems V, 2006

2004
The Many Meanings of Open Source.
IEEE Softw., 2004

Computer security impaired by legitimate users.
Comput. Secur., 2004


  Loading...