The many meanings of open source C Gacek, B Arief IEEE software 21 (1), 34-40, 2004 | 453 | 2004 |
Computer security impaired by legitimate users D Besnard, B Arief Computers & Security 23 (3), 253-264, 2004 | 267 | 2004 |
Cyber stalking, cyber harassment, and adult mental health: A systematic review F Stevens, JRC Nurse, B Arief Cyberpsychology, Behavior, and Social Networking 24 (6), 367-376, 2021 | 137 | 2021 |
A UML tool for an automatic generation of simulation programs LB Arief, NA Speirs Proceedings of the 2nd international workshop on Software and performance, 71-76, 2000 | 136 | 2000 |
Ransomware deployment methods and analysis: views from a predictive model and human responses G Hull, H John, B Arief Crime Science 8 (1), 1-22, 2019 | 117 | 2019 |
Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers B Arief, MAB Adzmi, T Gross IEEE Security & Privacy 13 (1), 71-76, 2015 | 53 | 2015 |
Harvesting high value foreign currency transactions from emv contactless credit cards without the pin M Emms, B Arief, L Freitas, J Hannon, A van Moorsel Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 43 | 2014 |
Technical and human issues in computer-based systems security B Arief, D Besnard CS-TR-790, 2003 | 42 | 2003 |
Does the online card payment landscape unwittingly facilitate fraud? MA Ali, B Arief, M Emms, A van Moorsel IEEE Security & Privacy 15 (2), 78-86, 2017 | 40 | 2017 |
Sensible privacy: how we can protect domestic violence survivors without facilitating misuse B Arief, KPL Coopamootoo, M Emms, A van Moorsel Proceedings of the 13th Workshop on Privacy in the Electronic Society, 201-204, 2014 | 35 | 2014 |
Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour AS McGough, B Arief, C Gamble, D Wall, J Brennan, JS Fitzgerald, ... JoWUA 6 (4), 3-46, 2015 | 32* | 2015 |
Automatic generation of distributed system simulations from UML B Arief, N Speirs | 29 | 1999 |
Software architectures and open source software–Where can research leverage the most? B Arief, C Gacek, T Lawrie IEEE, 2001 | 27 | 2001 |
Why current statistical approaches to ransomware detection fail J Pont, B Arief, J Hernandez-Castro International Conference on Information Security, 199-216, 2020 | 26 | 2020 |
PaperW8: an IoT bricking ransomware proof of concept C Brierley, J Pont, B Arief, DJ Barnes, J Hernandez-Castro Proceedings of the 15th International Conference on Availability …, 2020 | 25 | 2020 |
A roadmap for improving the impact of anti-ransomware research J Pont, O Abu Oun, C Brierley, B Arief, J Hernandez-Castro Nordic Conference on Secure IT Systems, 137-154, 2019 | 24 | 2019 |
Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms P Yadav, A Feraudo, B Arief, SF Shahandashti, VG Vassilakis Proceedings of the 2nd international workshop on challenges in artificial …, 2020 | 23 | 2020 |
Understanding cybercrime from its stakeholders' perspectives: Part 2--defenders and victims B Arief, MAB Adzmi IEEE Security & Privacy 13 (2), 84-88, 2015 | 23 | 2015 |
Risks of offline verify PIN on contactless cards M Emms, B Arief, N Little, A van Moorsel Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 23 | 2013 |
On using the CAMA framework for developing open mobile fault tolerant agent systems B Arief, A Iliasov, A Romanovsky Proceedings of the 2006 international workshop on Software engineering for …, 2006 | 23 | 2006 |