Pete Burnap

Orcid: 0000-0003-0396-633X

Affiliations:
  • Cardiff University, UK


According to our database1, Pete Burnap authored at least 114 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CASPER: Context-Aware IoT Anomaly Detection System for Industrial Robotic Arms.
ACM Trans. Internet Things, August, 2024

Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals.
J. Cybersecur. Priv., June, 2024

A Scalable and Automated Framework for Tracking the Likely Adoption of Emerging Technologies.
Inf., April, 2024

Comparing Hierarchical Approaches to Enhance Supervised Emotive Text Classification.
Big Data Cogn. Comput., April, 2024

Topic Modelling: Going beyond Token Outputs.
Big Data Cogn. Comput., 2024

Towards Developing an Asset-Criticality Identification Framework in Smart Grids.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
Operations-informed incident response playbooks.
Comput. Secur., November, 2023

A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification.
IET Cyper-Phys. Syst.: Theory & Appl., September, 2023

Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective.
ACM Trans. Cyber Phys. Syst., April, 2023

Digital fingerprinting for identifying malicious collusive groups on Twitter.
J. Cybersecur., January, 2023

CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms.
Dataset, January, 2023

Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review.
ACM Comput. Surv., 2023

Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection.
CoRR, 2023

Automated Cyber Defence: A Review.
CoRR, 2023

Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication.
Comput. Secur., 2023

A systematic method for measuring the performance of a cyber security operations centre analyst.
Comput. Secur., 2023

Extended Dependency Modeling Technique for Cyber Risk Identification in ICS.
IEEE Access, 2023

CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

Artifact: CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

ARCSG: Advancing Resilience of Cyber-Physical Smart Grid: An Integrated Co-Simulation Approach Incorporating Indicators of Compromise.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Cybersecurity of Industrial Cyber-Physical Systems: A Review.
ACM Comput. Surv., January, 2022

Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective.
ACM Trans. Cyber Phys. Syst., 2022

Security analytics for real-time forecasting of cyberattacks.
Softw. Pract. Exp., 2022

Disrupting drive-by download networks on Twitter.
Soc. Netw. Anal. Min., 2022

Disrupting networks of hate: characterising hateful networks and removing critical nodes.
Soc. Netw. Anal. Min., 2022

Bane or Boon: Measuring the effect of evasive malware on system call classifiers.
J. Inf. Secur. Appl., 2022

Adversarial machine learning in IoT from an insider point of view.
J. Inf. Secur. Appl., 2022

Cyberattacks and Countermeasures for In-Vehicle Networks.
ACM Comput. Surv., 2022

On The Efficacy of Physics-Informed Context-Based Anomaly Detection for Power Systems.
Proceedings of the IEEE International Conference on Communications, 2022

Poster: Physics-Informed Augmentation for Contextual Anomaly Detection in Smart Grid.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Model-Based Incident Response Playbooks.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Unsupervised Learning for Product Use Activity Recognition: An Exploratory Study of a "Chatty Device".
Sensors, 2021

Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things.
Rev. Socionetwork Strateg., 2021

Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems.
J. Inf. Secur. Appl., 2021

"Chatty Devices" and edge-based activity classification.
Discov. Internet Things, 2021

A three-tiered intrusion detection system for industrial control systems.
J. Cybersecur., 2021

Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks.
Comput. Secur., 2021

Optimized Predictive Control for AGC Cyber Resiliency.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Emotions Behind Drive-by Download Propagation on Twitter.
ACM Trans. Web, 2020

BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks.
Secur. Commun. Networks, 2020

Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains.
Cybersecur., 2020

Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics.
CoRR, 2020

PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs.
Computer, 2020

Towards a Framework for Measuring the Performance of a Security Operations Center Analyst.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in Industrial Context.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Scmhl5 at TRAC-2 Shared Task on Aggression Identification: Bert Based Ensemble Learning Approach.
Proceedings of the Second Workshop on Trolling, Aggression and Cyberbullying, 2020

2019
"The Enemy Among Us": Detecting Cyber Hate Speech with Threats-based Othering Language Embeddings.
ACM Trans. Web, 2019

A Fuzzy Approach to Text Classification With Two-Stage Training for Ambiguous Instances.
IEEE Trans. Comput. Soc. Syst., 2019

Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis.
J. Inf. Secur. Appl., 2019

Prediction of drive-by download attacks on Twitter.
Inf. Process. Manag., 2019

A Supervised Intrusion Detection System for Smart Home IoT Devices.
IEEE Internet Things J., 2019

The Industrial Internet of Things in the Industry 4.0 supply chains: literature review and future trends.
CoRR, 2019

Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies.
CoRR, 2019

Definition of Internet of Things (IoT) Cyber Risk Discussion on a Transformation Roadmap for Standardisation of Regulations Risk Maturity Strategy Design and Impact Assessment.
CoRR, 2019

Standardisation of cyber risk impact assessment for the Internet of Things (IoT).
CoRR, 2019

Dual-task agent for run-time classification and killing of malicious processes.
CoRR, 2019

Fuzzy Multi-task Learning for Hate Speech Type Identification.
Proceedings of the World Wide Web Conference, 2019

A Study of Cyber Hate on Twitter with Implications for Social Media Governance Strategies.
Proceedings of the 2019 Truth and Trust Online Conference (TTO 2019), 2019

Privacy-Aware Cloud Ecosystems and GDPR Compliance.
Proceedings of the 7th International Conference on Future Internet of Things and Cloud, 2019

LAB to SOC: Robust Features for Dynamic Malware Detection.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Early-stage malware prediction using recurrent neural networks.
Comput. Secur., 2018

Malware classification using self organising feature maps and machine activity data.
Comput. Secur., 2018

EclipseIoT: A secure and adaptive hub for the Internet of Things.
Comput. Secur., 2018

Future developments in cyber risk assessment for the internet of things.
Comput. Ind., 2018

Suspended Accounts: A Source of Tweets with Disgust and Anger Emotions for Augmenting Hate Speech Data Sample.
Proceedings of the 2018 International Conference on Machine Learning and Cybernetics, 2018

Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

2017
Can We Predict a Riot? Disruptive Event Detection Using Twitter.
ACM Trans. Internet Techn., 2017

Multi-class machine classification of suicide-related communication on Twitter.
Online Soc. Networks Media, 2017

Real Time Prediction of Drive by Download Attacks on Twitter.
CoRR, 2017

Determining and Sharing Risk Data in Distributed Interdependent Systems.
Computer, 2017

1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web.
Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, 2017

The Ethical Challenges of Publishing Twitter Data for Research Dissemination.
Proceedings of the 2017 ACM on Web Science Conference, 2017

2016
Digital Wildfires: Propagation, Verification, Regulation, and Responsible Innovation.
ACM Trans. Inf. Syst., 2016

Analyzing Hadoop power consumption and impact on application QoS.
Future Gener. Comput. Syst., 2016

Us and them: identifying cyber hate on Twitter across multiple protected characteristics.
EPJ Data Sci., 2016

A review of cyber security risk assessment methods for SCADA systems.
Comput. Secur., 2016

Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk.
Comput. Secur., 2016

Analysing the connectivity and communication of suicidal users on twitter.
Comput. Commun., 2016

Temporal TF-IDF: A High Performance Approach for Event Summarization in Twitter.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Sensing Real-World Events Using Social Media Data and a Classification-Clustering Framework.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Sensing Real-World Events Using Arabic Twitter Posts.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Automatic Summarization of Real World Events Using Twitter.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Forensic Readiness for SCADA/ICS Incident Response.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

2015
Digital wildfires: hyper-connectivity, havoc and a global ethos to govern social media.
SIGCAS Comput. Soc., 2015

COSMOS: Towards an integrated and scalable service for analysing social media on demand.
Int. J. Parallel Emergent Distributed Syst., 2015

VMInformant: an instrumented virtual machine to support trustworthy cloud computing.
Int. J. High Perform. Comput. Netw., 2015

140 Characters to Victory?: Using Twitter to Predict the UK 2015 General Election.
CoRR, 2015

'Digital Wildfires': a challenge to the governance of social media?
Proceedings of the ACM Web Science Conference, 2015

Prediction of Malware Propagation and Links within Communities in Social Media Based Events.
Proceedings of the ACM Web Science Conference, 2015

A classification framework for distinct cyber-attacks based on occurrence patterns.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Estimating Risk Boundaries for Persistent and Stealthy Cyber-Attacks.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

A Case for Understanding End-to-End Performance of Topic Detection and Tracking Based Big Data Applications in the Cloud.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

A Forensic Taxonomy of SCADA Systems and Approach to Incident Response.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

Machine Classification and Analysis of Suicide-Related Communication on Twitter.
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 2015

Continuous Monitoring and Assessment of Cybersecurity Risks in Large Computing Infrastructures.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure.
Proceedings of the Critical Information Infrastructures Security, 2015

Assessing Data Breach Risk in Cloud Systems.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Arabic Event Detection in Social Media.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2015

Real-time Classification of Malicious URLs on Twitter using Machine Activity Data.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Identifying Disruptive Events from Social Media to Enhance Situational Awareness.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Feature Extraction and Analysis for Identifying Disruptive Events from Social Media.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

An Empirical Risk Management Framework for Monitoring Network Security.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Big and broad social data and the sociological imagination: A collaborative response.
Big Data Soc., July, 2014

Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack.
Soc. Netw. Anal. Min., 2014

Analysing Security requirements in Cloud-based Service Level Agreements.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Towards Real-Time Probabilistic Risk Assessment by Sensing Disruptive Events from Streamed News Feeds.
Proceedings of the Eighth International Conference on Complex, 2014

2013
Characterising the Power Consumption of Hadoop Clouds - A Social Media Analysis Case Study.
Proceedings of the CLOSER 2013, 2013

Scaling Archived Social Media Data Analysis Using a Hadoop Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

2009
Advanced access control in support and distributed collaborative working and de-perimeterization.
PhD thesis, 2009

Self Protecting Data for De-perimeterised Information Sharing.
Proceedings of the Third International Conference on the Digital Society (ICDS 2009), 2009

2006
MDSSF - A Federated Architecture for Product Procurement.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006

2004
A Grid-Enabled Security Framework for Collaborative Virtual Organisations.
Proceedings of the Virtual Enterprises and Collaborative Networks, IFIP 18th World Computer Congress, TC5 / WG5.5, 2004


  Loading...