Pete Burnap
Orcid: 0000-0003-0396-633XAffiliations:
- Cardiff University, UK
According to our database1,
Pete Burnap
authored at least 114 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on burnap.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
ACM Trans. Internet Things, August, 2024
Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals.
J. Cybersecur. Priv., June, 2024
A Scalable and Automated Framework for Tracking the Likely Adoption of Emerging Technologies.
Inf., April, 2024
Big Data Cogn. Comput., April, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification.
IET Cyper-Phys. Syst.: Theory & Appl., September, 2023
Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective.
ACM Trans. Cyber Phys. Syst., April, 2023
J. Cybersecur., January, 2023
Dataset, January, 2023
Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review.
ACM Comput. Surv., 2023
Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection.
CoRR, 2023
Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication.
Comput. Secur., 2023
A systematic method for measuring the performance of a cyber security operations centre analyst.
Comput. Secur., 2023
IEEE Access, 2023
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023
Artifact: CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023
ARCSG: Advancing Resilience of Cyber-Physical Smart Grid: An Integrated Co-Simulation Approach Incorporating Indicators of Compromise.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
ACM Comput. Surv., January, 2022
Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective.
ACM Trans. Cyber Phys. Syst., 2022
Softw. Pract. Exp., 2022
Disrupting networks of hate: characterising hateful networks and removing critical nodes.
Soc. Netw. Anal. Min., 2022
J. Inf. Secur. Appl., 2022
J. Inf. Secur. Appl., 2022
On The Efficacy of Physics-Informed Context-Based Anomaly Detection for Power Systems.
Proceedings of the IEEE International Conference on Communications, 2022
Poster: Physics-Informed Augmentation for Contextual Anomaly Detection in Smart Grid.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Unsupervised Learning for Product Use Activity Recognition: An Exploratory Study of a "Chatty Device".
Sensors, 2021
Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things.
Rev. Socionetwork Strateg., 2021
Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems.
J. Inf. Secur. Appl., 2021
Discov. Internet Things, 2021
J. Cybersecur., 2021
Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks.
Comput. Secur., 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Secur. Commun. Networks, 2020
Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains.
Cybersecur., 2020
Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics.
CoRR, 2020
Computer, 2020
Towards a Framework for Measuring the Performance of a Security Operations Center Analyst.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in Industrial Context.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Scmhl5 at TRAC-2 Shared Task on Aggression Identification: Bert Based Ensemble Learning Approach.
Proceedings of the Second Workshop on Trolling, Aggression and Cyberbullying, 2020
2019
"The Enemy Among Us": Detecting Cyber Hate Speech with Threats-based Othering Language Embeddings.
ACM Trans. Web, 2019
A Fuzzy Approach to Text Classification With Two-Stage Training for Ambiguous Instances.
IEEE Trans. Comput. Soc. Syst., 2019
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis.
J. Inf. Secur. Appl., 2019
IEEE Internet Things J., 2019
The Industrial Internet of Things in the Industry 4.0 supply chains: literature review and future trends.
CoRR, 2019
Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies.
CoRR, 2019
Definition of Internet of Things (IoT) Cyber Risk Discussion on a Transformation Roadmap for Standardisation of Regulations Risk Maturity Strategy Design and Impact Assessment.
CoRR, 2019
CoRR, 2019
CoRR, 2019
Proceedings of the World Wide Web Conference, 2019
A Study of Cyber Hate on Twitter with Implications for Social Media Governance Strategies.
Proceedings of the 2019 Truth and Trust Online Conference (TTO 2019), 2019
Proceedings of the 7th International Conference on Future Internet of Things and Cloud, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
Comput. Secur., 2018
Comput. Secur., 2018
Comput. Ind., 2018
Suspended Accounts: A Source of Tweets with Disgust and Anger Emotions for Augmenting Hate Speech Data Sample.
Proceedings of the 2018 International Conference on Machine Learning and Cybernetics, 2018
Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018
2017
ACM Trans. Internet Techn., 2017
Online Soc. Networks Media, 2017
Computer, 2017
1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web.
Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, 2017
Proceedings of the 2017 ACM on Web Science Conference, 2017
2016
Digital Wildfires: Propagation, Verification, Regulation, and Responsible Innovation.
ACM Trans. Inf. Syst., 2016
Future Gener. Comput. Syst., 2016
Us and them: identifying cyber hate on Twitter across multiple protected characteristics.
EPJ Data Sci., 2016
Comput. Secur., 2016
Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk.
Comput. Secur., 2016
Comput. Commun., 2016
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016
Sensing Real-World Events Using Social Media Data and a Classification-Clustering Framework.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016
Proceedings of the Tenth International Conference on Web and Social Media, 2016
Proceedings of the Tenth International Conference on Web and Social Media, 2016
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
2015
Digital wildfires: hyper-connectivity, havoc and a global ethos to govern social media.
SIGCAS Comput. Soc., 2015
COSMOS: Towards an integrated and scalable service for analysing social media on demand.
Int. J. Parallel Emergent Distributed Syst., 2015
Int. J. High Perform. Comput. Netw., 2015
CoRR, 2015
Proceedings of the ACM Web Science Conference, 2015
Prediction of Malware Propagation and Links within Communities in Social Media Based Events.
Proceedings of the ACM Web Science Conference, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015
A Case for Understanding End-to-End Performance of Topic Detection and Tracking Based Big Data Applications in the Cloud.
Proceedings of the Internet of Things. IoT Infrastructures, 2015
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 2015
Continuous Monitoring and Assessment of Cybersecurity Risks in Large Computing Infrastructures.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the Critical Information Infrastructures Security, 2015
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Big and broad social data and the sociological imagination: A collaborative response.
Big Data Soc., July, 2014
Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack.
Soc. Netw. Anal. Min., 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Towards Real-Time Probabilistic Risk Assessment by Sensing Disruptive Events from Streamed News Feeds.
Proceedings of the Eighth International Conference on Complex, 2014
2013
Characterising the Power Consumption of Hadoop Clouds - A Social Media Analysis Case Study.
Proceedings of the CLOSER 2013, 2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012
2009
Advanced access control in support and distributed collaborative working and de-perimeterization.
PhD thesis, 2009
Proceedings of the Third International Conference on the Digital Society (ICDS 2009), 2009
2006
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006
2004
Proceedings of the Virtual Enterprises and Collaborative Networks, IFIP 18th World Computer Congress, TC5 / WG5.5, 2004