Pete Burnap

According to our database1, Pete Burnap
  • authored at least 45 papers between 2004 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Malware classification using self organising feature maps and machine activity data.
Computers & Security, 2018

2017
Can We Predict a Riot? Disruptive Event Detection Using Twitter.
ACM Trans. Internet Techn., 2017

Real Time Prediction of Drive by Download Attacks on Twitter.
CoRR, 2017

Early Stage Malware Prediction Using Recurrent Neural Networks.
CoRR, 2017

Determining and Sharing Risk Data in Distributed Interdependent Systems.
IEEE Computer, 2017

1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web.
Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, 2017

The Ethical Challenges of Publishing Twitter Data for Research Dissemination.
Proceedings of the 2017 ACM on Web Science Conference, 2017

2016
Digital Wildfires: Propagation, Verification, Regulation, and Responsible Innovation.
ACM Trans. Inf. Syst., 2016

Analyzing Hadoop power consumption and impact on application QoS.
Future Generation Comp. Syst., 2016

A review of cyber security risk assessment methods for SCADA systems.
Computers & Security, 2016

Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk.
Computers & Security, 2016

Analysing the connectivity and communication of suicidal users on twitter.
Computer Communications, 2016

Temporal TF-IDF: A High Performance Approach for Event Summarization in Twitter.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Sensing Real-World Events Using Social Media Data and a Classification-Clustering Framework.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Sensing Real-World Events Using Arabic Twitter Posts.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Automatic Summarization of Real World Events Using Twitter.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Forensic Readiness for SCADA/ICS Incident Response.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

2015
Digital wildfires: hyper-connectivity, havoc and a global ethos to govern social media.
SIGCAS Computers and Society, 2015

COSMOS: Towards an integrated and scalable service for analysing social media on demand.
IJPEDS, 2015

VMInformant: an instrumented virtual machine to support trustworthy cloud computing.
IJHPCN, 2015

140 Characters to Victory?: Using Twitter to Predict the UK 2015 General Election.
CoRR, 2015

'Digital Wildfires': a challenge to the governance of social media?
Proceedings of the ACM Web Science Conference, 2015

Prediction of Malware Propagation and Links within Communities in Social Media Based Events.
Proceedings of the ACM Web Science Conference, 2015

A classification framework for distinct cyber-attacks based on occurrence patterns.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Estimating Risk Boundaries for Persistent and Stealthy Cyber-Attacks.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

A Case for Understanding End-to-End Performance of Topic Detection and Tracking Based Big Data Applications in the Cloud.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

A Forensic Taxonomy of SCADA Systems and Approach to Incident Response.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Machine Classification and Analysis of Suicide-Related Communication on Twitter.
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 2015

Continuous Monitoring and Assessment of Cybersecurity Risks in Large Computing Infrastructures.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure.
Proceedings of the Critical Information Infrastructures Security, 2015

Assessing Data Breach Risk in Cloud Systems.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Arabic Event Detection in Social Media.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2015

Real-time Classification of Malicious URLs on Twitter using Machine Activity Data.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Identifying Disruptive Events from Social Media to Enhance Situational Awareness.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Feature Extraction and Analysis for Identifying Disruptive Events from Social Media.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

An Empirical Risk Management Framework for Monitoring Network Security.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack.
Social Netw. Analys. Mining, 2014

Analysing Security requirements in Cloud-based Service Level Agreements.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Towards Real-Time Probabilistic Risk Assessment by Sensing Disruptive Events from Streamed News Feeds.
Proceedings of the Eighth International Conference on Complex, 2014

2013
Characterising the Power Consumption of Hadoop Clouds - A Social Media Analysis Case Study.
Proceedings of the CLOSER 2013, 2013

Scaling Archived Social Media Data Analysis Using a Hadoop Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

2009
Self Protecting Data for De-perimeterised Information Sharing.
Proceedings of the Third International Conference on the Digital Society (ICDS 2009), 2009

2006
MDSSF - A Federated Architecture for Product Procurement.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006

2004
A Grid-Enabled Security Framework for Collaborative Virtual Organisations.
Proceedings of the Virtual Enterprises and Collaborative Networks, IFIP 18th World Computer Congress, TC5 / WG5.5, 2004


  Loading...