Budi Arief
Orcid: 0000-0002-1830-1587
According to our database1,
Budi Arief
authored at least 48 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
An Empirical Evaluation of Large Language Models in Static Code Analysis for PHP Vulnerability Detection.
J. Univers. Comput. Sci., 2024
Privacy Threats and Countermeasures in Federated Learning for Internet of Things: A Systematic Review.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024
2023
Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions.
DTRAP, 2023
The Use of Public Data and Free Tools in National CSIRTs' Operational Practices: A Systematic Literature Review.
CoRR, 2023
The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023
2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
2021
Cyberpsychology Behav. Soc. Netw., 2021
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021
Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021
2020
Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms.
Proceedings of the AIChallengeIoT@SenSys 2020: Proceedings of the 2nd International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things, 2020
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Secure IT Systems, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
2018
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018
2017
IEEE Secur. Priv., 2017
Proceedings of the 2017 International Workshop on Secure Internet of Things, 2017
2015
Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015
IEEE Secur. Priv., 2015
Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2-Defenders and Victims.
IEEE Secur. Priv., 2015
Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware).
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
2014
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the Financial Cryptography and Data Security, 2013
2012
Deriving requirements for an online community interaction scheme: indications from older adults.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012
2011
Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011
2009
Proceedings of the Methods, 2009
2008
TRACKSS Approach to Improving Road Safety through Sensors Collaboration on Vehicle and in Infrastructure.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008
2007
Proceedings of the Tenth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2007), 2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
2006
Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems, 2006
Proceedings of the Software Engineering for Multi-Agent Systems V, 2006
2004