default search action
Pete Burnap
Person information
- affiliation: Cardiff University, UK
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Lowri Williams, Eirini Anthi, Pete Burnap:
Comparing Hierarchical Approaches to Enhance Supervised Emotive Text Classification. Big Data Cogn. Comput. 8(4): 38 (2024) - [j53]Lowri Williams, Eirini Anthi, Laura Arman, Pete Burnap:
Topic Modelling: Going beyond Token Outputs. Big Data Cogn. Comput. 8(5): 44 (2024) - [j52]Lowri Williams, Eirini Anthi, Pete Burnap:
A Scalable and Automated Framework for Tracking the Likely Adoption of Emerging Technologies. Inf. 15(4): 237 (2024) - [j51]Pete Burnap, Eirini Anthi, Philipp Reinecke, Lowri Williams, Fengnian Cao, Rakan Aldmour, Kevin Jones:
Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals. J. Cybersecur. Priv. 4(2): 340-356 (2024) - [j50]Hakan Kayan, Ryan Heartfield, Omer F. Rana, Pete Burnap, Charith Perera:
CASPER: Context-Aware IoT Anomaly Detection System for Industrial Robotic Arms. ACM Trans. Internet Things 5(3): 18:1-18:36 (2024) - [c48]Yazeed Alrowaili, Neetesh Saxena, Pete Burnap:
Towards Developing an Asset-Criticality Identification Framework in Smart Grids. CSR 2024: 720-725 - [i20]Lowri Williams, Eirini Anthi, Laura Arman, Pete Burnap:
Topic Modelling: Going Beyond Token Outputs. CoRR abs/2401.12990 (2024) - [i19]Lowri Williams, Eirini Anthi, Pete Burnap:
A Scalable and Automated Framework for Tracking the likely Adoption of Emerging Technologies. CoRR abs/2402.01670 (2024) - 2023
- [j49]Ayodeji O. Rotibi, Neetesh Saxena, Pete Burnap, Alex Tarter:
Extended Dependency Modeling Technique for Cyber Risk Identification in ICS. IEEE Access 11: 37229-37242 (2023) - [j48]Enoch Agyepong, Yulia Cherdantseva, Philipp Reinecke, Pete Burnap:
A systematic method for measuring the performance of a cyber security operations centre analyst. Comput. Secur. 124: 102959 (2023) - [j47]Abubakar Sadiq Mohammed, Eirini Anthi, Omer F. Rana, Neetesh Saxena, Pete Burnap:
Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication. Comput. Secur. 124: 103007 (2023) - [j46]Avi Shaked, Yulia Cherdantseva, Pete Burnap, Peter Maynard:
Operations-informed incident response playbooks. Comput. Secur. 134: 103454 (2023) - [j45]Muhammad Nouman Nafees, Neetesh Saxena, Alvaro A. Cárdenas, Santiago Grijalva, Pete Burnap:
Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review. ACM Comput. Surv. 55(10): 215:1-215:36 (2023) - [j44]Ruth Ikwu, Luca Giommoni, Amir Javed, Pete Burnap, Matthew L. Williams:
Digital fingerprinting for identifying malicious collusive groups on Twitter. J. Cybersecur. 9(1) (2023) - [j43]Yazeed Alrowaili, Neetesh Saxena, Anurag Srivastava, Mauro Conti, Pete Burnap:
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification. IET Cyper-Phys. Syst.: Theory & Appl. 8(3): 160-185 (2023) - [j42]Mohammed Asiri, Neetesh Saxena, Rigel Gjomemo, Pete Burnap:
Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective. ACM Trans. Cyber Phys. Syst. 7(2): 15:1-15:33 (2023) - [c47]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems. ACNS Workshops 2023: 700-704 - [c46]Mohammed Asiri, Neetesh Saxena, Pete Burnap:
ARCSG: Advancing Resilience of Cyber-Physical Smart Grid: An Integrated Co-Simulation Approach Incorporating Indicators of Compromise. EuroS&P Workshops 2023: 370-378 - [c45]Hakan Kayan, Omer F. Rana, Pete Burnap, Charith Perera:
Artifact: CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms. PerCom Workshops 2023: 3-4 - [c44]Hakan Kayan, Omer F. Rana, Pete Burnap, Charith Perera:
CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms. PerCom Workshops 2023: 282-284 - [d1]Hakan Kayan, Omer Farooq Rana, Pete Burnap, Charith Perera:
CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms. IEEE DataPort, 2023 - [i18]Sanyam Vyas, John Hannay, Andrew Bolton, Pete Burnap:
Automated Cyber Defence: A Review. CoRR abs/2303.04926 (2023) - [i17]Baskoro Adi Pratomo, Toby Jackson, Pete Burnap, Andrew Hood, Eirini Anthi:
Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection. CoRR abs/2310.18165 (2023) - 2022
- [j41]Emad Aliwa, Omer F. Rana, Charith Perera, Peter Burnap:
Cyberattacks and Countermeasures for In-Vehicle Networks. ACM Comput. Surv. 54(1): 21:1-21:37 (2022) - [j40]Hakan Kayan, Matthew Nunes, Omer F. Rana, Pete Burnap, Charith Perera:
Cybersecurity of Industrial Cyber-Physical Systems: A Review. ACM Comput. Surv. 54(11s): 229:1-229:35 (2022) - [j39]Matthew Nunes, Pete Burnap, Philipp Reinecke, Kaelon Lloyd:
Bane or Boon: Measuring the effect of evasive malware on system call classifiers. J. Inf. Secur. Appl. 67: 103202 (2022) - [j38]Fatimah Aloraini, Amir Javed, Omer F. Rana, Pete Burnap:
Adversarial machine learning in IoT from an insider point of view. J. Inf. Secur. Appl. 70: 103341 (2022) - [j37]Wafa Alorainy, Pete Burnap, Han Liu, Matthew L. Williams, Luca Giommoni:
Disrupting networks of hate: characterising hateful networks and removing critical nodes. Soc. Netw. Anal. Min. 12(1): 27 (2022) - [j36]Amir Javed, Ruth Ikwu, Pete Burnap, Luca Giommoni, Matthew L. Williams:
Disrupting drive-by download networks on Twitter. Soc. Netw. Anal. Min. 12(1): 117 (2022) - [j35]Amir Javed, Mike Lakoju, Pete Burnap, Omer F. Rana:
Security analytics for real-time forecasting of cyberattacks. Softw. Pract. Exp. 52(3): 788-804 (2022) - [j34]Abubakar Sadiq Mohammed, Philipp Reinecke, Pete Burnap, Omer F. Rana, Eirini Anthi:
Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective. ACM Trans. Cyber Phys. Syst. 6(3): 28:1-28:27 (2022) - [c43]Avi Shaked, Yulia Cherdantseva, Pete Burnap:
Model-Based Incident Response Playbooks. ARES 2022: 26:1-26:7 - [c42]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
Poster: Physics-Informed Augmentation for Contextual Anomaly Detection in Smart Grid. CCS 2022: 3427-3429 - [c41]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
On The Efficacy of Physics-Informed Context-Based Anomaly Detection for Power Systems. SmartGridComm 2022: 374-379 - [i16]Abubakar Sadiq Mohammed, Philipp Reinecke, Pete Burnap, Omer F. Rana, Eirini Anthi:
Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective. CoRR abs/2202.12179 (2022) - [i15]Petar Radanliev, David De Roure, Pete Burnap, Omar Santos:
Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things. CoRR abs/2212.08141 (2022) - 2021
- [j33]Eirini Anthi, Lowri Williams, Amir Javed, Pete Burnap:
Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks. Comput. Secur. 108: 102352 (2021) - [j32]Eirini Anthi, Lowri Williams, Pete Burnap, Kevin Jones:
A three-tiered intrusion detection system for industrial control systems. J. Cybersecur. 7(1) (2021) - [j31]Mike Lakoju, Amir Javed, Omer F. Rana, Pete Burnap, Samuelson Tijesunimi Atiba, Soumaya Cherkaoui:
"Chatty Devices" and edge-based activity classification. Discov. Internet Things 1(1) (2021) - [j30]Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury:
Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems. J. Inf. Secur. Appl. 58: 102717 (2021) - [j29]Petar Radanliev, David De Roure, Pete Burnap, Omar Santos:
Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things. Rev. Socionetwork Strateg. 15(2): 381-411 (2021) - [j28]Mike Lakoju, Nemitari Ajienka, Mojtaba Ahmadieh Khanesar, Pete Burnap, David T. Branson:
Unsupervised Learning for Product Use Activity Recognition: An Exploratory Study of a "Chatty Device". Sensors 21(15): 4991 (2021) - [c40]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
Optimized Predictive Control for AGC Cyber Resiliency. CCS 2021: 2450-2452 - [i14]Hakan Kayan, Matthew Nunes, Omer F. Rana, Pete Burnap, Charith Perera:
Cybersecurity of Industrial Cyber-Physical Systems: A Review. CoRR abs/2101.03564 (2021) - 2020
- [j27]Neetesh Saxena, Ieuan Thomas, Prosanta Gope, Pete Burnap, Neeraj Kumar:
PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs. Computer 53(7): 29-44 (2020) - [j26]Petar Radanliev, David De Roure, Kevin R. Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La Treall Maddox, Pete Burnap:
Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecur. 3(1): 13 (2020) - [j25]Baskoro Adi Pratomo, Pete Burnap, George Theodorakopoulos:
BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks. Secur. Commun. Networks 2020: 8826038:1-8826038:15 (2020) - [j24]Amir Javed, Pete Burnap, Matthew L. Williams, Omer F. Rana:
Emotions Behind Drive-by Download Propagation on Twitter. ACM Trans. Web 14(4): 16:1-16:26 (2020) - [c39]Han Liu, Pete Burnap, Wafa Alorainy, Matthew L. Williams:
Scmhl5 at TRAC-2 Shared Task on Aggression Identification: Bert Based Ensemble Learning Approach. TRAC@LREC 2020: 62-68 - [c38]Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap, Bong Jun Choi:
Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in Industrial Context. CCS 2020: 2117-2119 - [c37]Enoch Agyepong, Yulia Cherdantseva, Philipp Reinecke, Pete Burnap:
Towards a Framework for Measuring the Performance of a Security Operations Center Analyst. Cyber Security 2020: 1-8 - [i13]Eirini Anthi, Lowri Williams, Matilda Rhode, Pete Burnap, Adam Wedgbury:
Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems. CoRR abs/2004.05005 (2020) - [i12]Emad Aliwa, Omer F. Rana, Charith Perera, Peter Burnap:
Cyberattacks and Countermeasures For In-Vehicle Networks. CoRR abs/2004.10781 (2020) - [i11]Petar Radanliev, David De Roure, Kevin R. Page, Max Van Kleek, Rafael Mantilla Montalvo, Omar Santos, La Treall Maddox, Stacy Cannady, Pete Burnap, Eirini Anthi, Carsten Maple:
Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics. CoRR abs/2005.12150 (2020)
2010 – 2019
- 2019
- [j23]Eirini Anthi, Lowri Williams, Malgorzata Slowinska, George Theodorakopoulos, Pete Burnap:
A Supervised Intrusion Detection System for Smart Home IoT Devices. IEEE Internet Things J. 6(5): 9042-9053 (2019) - [j22]Amir Javed, Pete Burnap, Omer F. Rana:
Prediction of drive-by download attacks on Twitter. Inf. Process. Manag. 56(3): 1133-1145 (2019) - [j21]Matthew Nunes, Pete Burnap, Omer F. Rana, Philipp Reinecke, Kaelon Lloyd:
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis. J. Inf. Secur. Appl. 48 (2019) - [j20]Han Liu, Pete Burnap, Wafa Alorainy, Matthew L. Williams:
A Fuzzy Approach to Text Classification With Two-Stage Training for Ambiguous Instances. IEEE Trans. Comput. Soc. Syst. 6(2): 227-240 (2019) - [j19]Wafa Alorainy, Pete Burnap, Han Liu, Matthew L. Williams:
"The Enemy Among Us": Detecting Cyber Hate Speech with Threats-based Othering Language Embeddings. ACM Trans. Web 13(3): 14:1-14:26 (2019) - [c36]Matilda Rhode, Lewis Tuson, Pete Burnap, Kevin Jones:
LAB to SOC: Robust Features for Dynamic Malware Detection. DSN (Industry Track) 2019: 13-16 - [c35]Masoud Barati, Omer F. Rana, George Theodorakopoulos, Peter Burnap:
Privacy-Aware Cloud Ecosystems and GDPR Compliance. FiCloud 2019: 117-124 - [c34]Rob Procter, Helena Webb, Pete Burnap, William Housley, Adam Edwards, Matthew L. Williams, Marina Jirotka:
A Study of Cyber Hate on Twitter with Implications for Social Media Governance Strategies. TTO 2019 - [c33]Han Liu, Pete Burnap, Wafa Alorainy, Matthew L. Williams:
Fuzzy Multi-task Learning for Hate Speech Type Identification. WWW 2019: 3006-3012 - [e3]Oleg B. Makarevich, Dmitry Popov, Ludmila K. Babenko, Pete Burnap, Atilla Elçi, Ron Poet, Jaideep Vaidya, Mehmet A. Orgun, Manoj Singh Gaur, Rajveer Singh Shekhawat:
Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019. ACM 2019, ISBN 978-1-4503-7242-8 [contents] - [i10]Matilda Rhode, Pete Burnap, Kevin Jones:
Dual-task agent for run-time classification and killing of malicious processes. CoRR abs/1902.02598 (2019) - [i9]Petar Radanliev, David De Roure, Jason R. C. Nurse, Rafael Mantilla Montalvo, Peter Burnap:
Standardisation of cyber risk impact assessment for the Internet of Things (IoT). CoRR abs/1903.04428 (2019) - [i8]Petar Radanliev, David Charles De Roure, Jason R. C. Nurse, Pete Burnap, Eirini Anthi, Uchenna Ani, La Treall Maddox, Omar Santos, Rafael Mantilla Montalvo:
Definition of Internet of Things (IoT) Cyber Risk Discussion on a Transformation Roadmap for Standardisation of Regulations Risk Maturity Strategy Design and Impact Assessment. CoRR abs/1903.12084 (2019) - [i7]Petar Radanliev, David Charles De Roure, Jason R. C. Nurse, Peter Burnap, Rafael Mantilla Montalvo:
Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies. CoRR abs/1903.12582 (2019) - [i6]Rob Procter, Helena Webb, Marina Jirotka, Pete Burnap, William Housley, Adam Edwards, Matthew L. Williams:
A Study of Cyber Hate on Twitter with Implications for Social Media Governance Strategies. CoRR abs/1908.11732 (2019) - [i5]Petar Radanliev, David Charles De Roure, Kevin R. Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La Treall Maddox, Peter Burnap:
The Industrial Internet of Things in the Industry 4.0 supply chains: literature review and future trends. CoRR abs/1911.05726 (2019) - 2018
- [j18]Petar Radanliev, David Charles De Roure, Razvan Nicolescu, Michael Huth, Rafael Montalvo Mantilla, Stacy Cannady, Peter Burnap:
Future developments in cyber risk assessment for the internet of things. Comput. Ind. 102: 14-22 (2018) - [j17]Pete Burnap, Richard French, Frederick Turner, Kevin Jones:
Malware classification using self organising feature maps and machine activity data. Comput. Secur. 73: 399-410 (2018) - [j16]Matilda Rhode, Pete Burnap, Kevin Jones:
Early-stage malware prediction using recurrent neural networks. Comput. Secur. 77: 578-594 (2018) - [j15]Eirini Anthi, Shazaib Ahmad, Omer F. Rana, George Theodorakopoulos, Pete Burnap:
EclipseIoT: A secure and adaptive hub for the Internet of Things. Comput. Secur. 78: 477-490 (2018) - [c32]Baskoro Adi Pratomo, Pete Burnap, George Theodorakopoulos:
Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder. Cyber Security 2018: 1-8 - [c31]Wafa Alorainy, Pete Burnap, Han Liu, Amir Javed, Matthew L. Williams:
Suspended Accounts: A Source of Tweets with Disgust and Anger Emotions for Augmenting Hate Speech Data Sample. ICMLC 2018: 581-586 - [i4]Petar Radanliev, David Charles De Roure, Razvan Nicolescu, Michael Huth, Rafael Montalvo Mantilla, Stacy Cannady, Peter Burnap:
Future developments in cyber risk assessment for the internet of things. CoRR abs/1809.05229 (2018) - 2017
- [j14]Pete Burnap, Yulia Cherdantseva, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart:
Determining and Sharing Risk Data in Distributed Interdependent Systems. Computer 50(4): 72-79 (2017) - [j13]Pete Burnap, Gualtiero Colombo, Rosie Amery, Andrei Hodorog, Jonathan Scourfield:
Multi-class machine classification of suicide-related communication on Twitter. Online Soc. Networks Media 2: 32-44 (2017) - [j12]Nasser Alsaedi, Pete Burnap, Omer F. Rana:
Can We Predict a Riot? Disruptive Event Detection Using Twitter. ACM Trans. Internet Techn. 17(2): 18:1-18:26 (2017) - [c30]Helena Webb, Marina Jirotka, Bernd Carsten Stahl, William Housley, Adam Edwards, Matthew L. Williams, Rob Procter, Omer F. Rana, Pete Burnap:
The Ethical Challenges of Publishing Twitter Data for Research Dissemination. WebSci 2017: 339-348 - [c29]Theodora Tsikrika, Babak Akhgar, Vasilis Katos, Stefanos Vrochidis, Pete Burnap, Matthew L. Williams:
1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web. WSDM 2017: 823-824 - [i3]Matilda Rhode, Pete Burnap, Kevin Jones:
Early Stage Malware Prediction Using Recurrent Neural Networks. CoRR abs/1708.03513 (2017) - [i2]Amir Javed, Pete Burnap, Omer F. Rana:
Real Time Prediction of Drive by Download Attacks on Twitter. CoRR abs/1708.05831 (2017) - 2016
- [j11]Gualtiero B. Colombo, Pete Burnap, Andrei Hodorog, Jonathan Scourfield:
Analysing the connectivity and communication of suicidal users on twitter. Comput. Commun. 73: 291-300 (2016) - [j10]Yulia Cherdantseva, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart:
A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 56: 1-27 (2016) - [j9]Malik Shahzad Kaleem Awan, Pete Burnap, Omer F. Rana:
Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. Comput. Secur. 57: 31-46 (2016) - [j8]Pete Burnap, Matthew L. Williams:
Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Sci. 5(1): 11 (2016) - [j7]Javier Conejero, Omer F. Rana, Pete Burnap, Jeffrey Morgan, María Blanca Caminero, Carmen Carrión:
Analyzing Hadoop power consumption and impact on application QoS. Future Gener. Comput. Syst. 55: 213-223 (2016) - [j6]Helena Webb, Pete Burnap, Rob Procter, Omer F. Rana, Bernd Carsten Stahl, Matthew L. Williams, William Housley, Adam Edwards, Marina Jirotka:
Digital Wildfires: Propagation, Verification, Regulation, and Responsible Innovation. ACM Trans. Inf. Syst. 34(3): 15:1-15:23 (2016) - [c28]Peter Eden, Andrew Blyth, Pete Burnap, Yulia Cherdantseva, Kevin Jones, Hugh Soulsby, Kristan Stoddart:
Forensic Readiness for SCADA/ICS Incident Response. ICS-CSR 2016 - [c27]Nasser Alsaedi, Pete Burnap, Omer F. Rana:
Automatic Summarization of Real World Events Using Twitter. ICWSM 2016: 511-514 - [c26]Nasser Alsaedi, Pete Burnap, Omer F. Rana:
Sensing Real-World Events Using Arabic Twitter Posts. ICWSM 2016: 515-518 - [c25]Nasser Alsaedi, Pete Burnap, Omer F. Rana:
Sensing Real-World Events Using Social Media Data and a Classification-Clustering Framework. WI 2016: 216-223 - [c24]Nasser Alsaedi, Pete Burnap, Omer F. Rana:
Temporal TF-IDF: A High Performance Approach for Event Summarization in Twitter. WI 2016: 515-521 - 2015
- [j5]Taimur Al Said, Omer F. Rana, Pete Burnap:
VMInformant: an instrumented virtual machine to support trustworthy cloud computing. Int. J. High Perform. Comput. Netw. 8(3): 222-234 (2015) - [j4]Pete Burnap, Omer F. Rana, Matthew L. Williams, William Housley, Adam Edwards, Jeffrey Morgan, Luke Sloan, Javier Conejero:
COSMOS: Towards an integrated and scalable service for analysing social media on demand. Int. J. Parallel Emergent Distributed Syst. 30(2): 80-100 (2015) - [j3]Helena Webb, Marina Jirotka, Bernd Carsten Stahl, William Housley, Adam Edwards, Matthew L. Williams, Rob Procter, Omer F. Rana, Pete Burnap:
Digital wildfires: hyper-connectivity, havoc and a global ethos to govern social media. SIGCAS Comput. Soc. 45(3): 193-201 (2015) - [c23]Malik Shahzad Kaleem Awan, Pete Burnap, Omer F. Rana:
An Empirical Risk Management Framework for Monitoring Network Security. CIT/IUCC/DASC/PICom 2015: 1764-1771 - [c22]Nasser Alsaedi, Pete Burnap, Omer F. Rana:
Identifying Disruptive Events from Social Media to Enhance Situational Awareness. ASONAM 2015: 934-941 - [c21]Pete Burnap, Amir Javed, Omer F. Rana, Malik Shahzad Kaleem Awan:
Real-time Classification of Malicious URLs on Twitter using Machine Activity Data. ASONAM 2015: 970-977 - [c20]Nasser Alsaedi, Pete Burnap:
Feature Extraction and Analysis for Identifying Disruptive Events from Social Media. ASONAM 2015: 1495-1502 - [c19]Nasser Alsaedi, Pete Burnap:
Arabic Event Detection in Social Media. CICLing (1) 2015: 384-401 - [c18]Yogachandran Rahulamathavan, Muttukrishnan Rajarajan, Omer F. Rana, Malik S. K. Awan, Pete Burnap, Sajal K. Das:
Assessing Data Breach Risk in Cloud Systems. CloudCom 2015: 363-370 - [c17]Peter Eden, Andrew Blyth, Pete Burnap, Yulia Cherdantseva, Kevin Jones, Hugh Soulsby, Kristan Stoddart:
A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure. CRITIS 2015: 27-39 - [c16]Malik Shahzad Kaleem Awan, Pete Burnap, Omer F. Rana, Amir Javed:
Continuous Monitoring and Assessment of Cybersecurity Risks in Large Computing Infrastructures. HPCC/CSS/ICESS 2015: 1442-1447 - [c15]Pete Burnap, Gualtiero Colombo, Jonathan Scourfield:
Machine Classification and Analysis of Suicide-Related Communication on Twitter. HT 2015: 75-84 - [c14]Peter Eden, Andrew Blyth, Pete Burnap, Kevin Jones, Kristan Stoddart:
A Forensic Taxonomy of SCADA Systems and Approach to Incident Response. ICS-CSR 2015 - [c13]Meisong Wang, Rajiv Ranjan, Prem Prakash Jayaraman, Peter Strazdins, Pete Burnap, Omer F. Rana, Dimitrios Georgakopoulos:
A Case for Understanding End-to-End Performance of Topic Detection and Tracking Based Big Data Applications in the Cloud. IoT 360 (1) 2015: 315-325 - [c12]Malik Shahzad Kaleem Awan, Pete Burnap, Omer F. Rana:
Estimating Risk Boundaries for Persistent and Stealthy Cyber-Attacks. SafeConfig@CCS 2015: 15-20 - [c11]Malik S. K. Awan, Mohammed A. AlGhamdi, Sultan H. Almotiri, Pete Burnap, Omer F. Rana:
A classification framework for distinct cyber-attacks based on occurrence patterns. SIN 2015: 165-168 - [c10]Abinaya Sowriraghavan, Pete Burnap:
Prediction of Malware Propagation and Links within Communities in Social Media Based Events. WebSci 2015: 59:1-59:2 - [c9]Helena Webb, Marina Jirotka, Bernd Carsten Stahl, William Housley, Adam Edwards, Matthew L. Williams, Rob Procter, Omer F. Rana, Pete Burnap:
'Digital Wildfires': a challenge to the governance of social media? WebSci 2015: 64:1-64:2 - [e2]Thanassis Tiropanis, Athena Vakali, Laura Sartori, Pete Burnap:
Internet Science - Second International Conference, INSCI 2015, Brussels, Belgium, May 27-29, 2015, Proceedings. Lecture Notes in Computer Science 9089, Springer 2015, ISBN 978-3-319-18608-5 [contents] - [e1]David De Roure, Pete Burnap, Susan Halford:
Proceedings of the ACM Web Science Conference, WebSci 2015, Oxford, United Kingdom, June 28 - July 1, 2015. ACM 2015, ISBN 978-1-4503-3672-7 [contents] - [i1]Pete Burnap, Rachel Gibson, Luke Sloan, Rosalynd Southern, Matthew L. Williams:
140 Characters to Victory?: Using Twitter to Predict the UK 2015 General Election. CoRR abs/1505.01511 (2015) - 2014
- [j2]William Housley, Rob Procter, Adam Edwards, Peter Burnap, Matthew L. Williams, Luke Sloan, Omer F. Rana, Jeffrey Morgan, Alex Voss, Anita Greenhill:
Big and broad social data and the sociological imagination: A collaborative response. Big Data Soc. 1(2): 205395171454513 (2014) - [j1]Pete Burnap, Matthew L. Williams, Luke Sloan, Omer F. Rana, William Housley, Adam Edwards, Vincent A. Knight, Rob Procter, Alex Voss:
Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Soc. Netw. Anal. Min. 4(1): 206 (2014) - [c8]Pete Burnap, Omer F. Rana, Nargis Pauran, Phil Bowen:
Towards Real-Time Probabilistic Risk Assessment by Sensing Disruptive Events from Streamed News Feeds. CISIS 2014: 608-613 - [c7]Yogachandran Rahulamathavan, Pramod S. Pawar, Pete Burnap, Muttukrishnan Rajarajan, Omer F. Rana, George Spanoudakis:
Analysing Security requirements in Cloud-based Service Level Agreements. SIN 2014: 73 - 2013
- [c6]Javier Conejero, Pete Burnap, Omer F. Rana, Jeffrey Morgan:
Scaling Archived Social Media Data Analysis Using a Hadoop Cloud. IEEE CLOUD 2013: 685-692 - [c5]Javier Conejero, Omer F. Rana, Pete Burnap, Jeffrey Morgan, Carmen Carrión, María Blanca Caminero:
Characterising the Power Consumption of Hadoop Clouds - A Social Media Analysis Case Study. CLOSER 2013: 233-243 - 2012
- [c4]Pete Burnap, Irena Spasic, W. Alex Gray, Jeremy Hilton, Omer F. Rana, Glyn Elwyn:
Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information. CTS 2012: 490-497
2000 – 2009
- 2009
- [b1]Peter Richard Burnap:
Advanced access control in support and distributed collaborative working and de-perimeterization. Cardiff University, UK, 2009 - [c3]Pete Burnap, Jeremy Hilton:
Self Protecting Data for De-perimeterised Information Sharing. ICDS 2009: 65-70 - 2006
- [c2]Jaspreet Singh Pahwa, Pete Burnap, W. A. Gray, John C. Miles:
MDSSF - A Federated Architecture for Product Procurement. DEXA 2006: 812-821 - 2004
- [c1]Liviu Joita, Omer F. Rana, Pete Burnap, Jaspreet Singh Pahwa, W. A. Gray, John C. Miles:
A Grid-Enabled Security Framework for Collaborative Virtual Organisations. Virtual Enterprises and Collaborative Networks 2004: 415-422
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint