Budi Arief
TitleCited byYear
The many meanings of open source
C Gacek, B Arief
IEEE software 21 (1), 34-40, 2004
Computer security impaired by legitimate users
D Besnard, B Arief
Computers & Security 23 (3), 253-264, 2004
A UML tool for an automatic generation of simulation programs
B Arief, N Speirs
Technical and human issues in computer-based systems security
B Arief, D Besnard
CS-TR-790, 2003
Automatic generation of distributed system simulations from UML
B Arief, N Speirs
Harvesting high value foreign currency transactions from emv contactless credit cards without the pin
M Emms, B Arief, L Freitas, J Hannon, A van Moorsel
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Software architectures and Open Source Software: Where can research leverage the most?
C Gacek, B Arief, T Lawrie
Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers
B Arief, MAB Adzmi, T Gross
IEEE Security & Privacy 13 (1), 71-76, 2015
On using the CAMA framework for developing open mobile fault tolerant agent systems
B Arief, A Iliasov, A Romanovsky
Proceedings of the 2006 international workshop on Software engineering for …, 2006
On rigorous design and implementation of fault tolerant ambient systems
A Iliasov, A Romanovsky, B Arief, L Laibinis, E Troubitsyna
10th IEEE International Symposium on Object and Component-Oriented Real-Time …, 2007
Risks of offline verify PIN on contactless cards
M Emms, B Arief, N Little, A Van Moorsel
International Conference on Financial Cryptography and Data Security, 313-321, 2013
Interdisciplinary insights on open source
C Gacek, T Lawrie, B Arief
A framework for supporting automatic simulation generation from design
LB Arief
Newcastle University, 2001
Integrating smartdust into intelligent transportation system
B Arief, P Blythe, R Fairchild, K Selvarajah, A Tully
Does the online card payment landscape unwittingly facilitate fraud?
MA Ali, B Arief, M Emms, A van Moorsel
IEEE Security & Privacy 15 (2), 78-86, 2017
Understanding cybercrime from its stakeholders' perspectives: Part 2--defenders and victims
B Arief, MAB Adzmi
IEEE Security & Privacy 13 (2), 84-88, 2015
Using SimML to bridge the transformation from UML to simulation
LB Arief, NA Speirs
Proc. of One Day Workshop on Software Performance and Prediction extracted …, 1999
Sensible privacy: how we can protect domestic violence survivors without facilitating misuse
B Arief, KPL Coopamootoo, M Emms, A van Moorsel
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 201-204, 2014
Deploying Wireless Sensor Devices in Intelligent Transportation System Applications
K Selvarajah, B Arief, A Tully, P Blythe
Intelligent Transportation Systems, 143-168, 2012
TRACKSS approach to improving road safety through sensors collaboration on vehicle and in infrastructure
B Arief, A von Arnim
2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008
The system can't perform the operation now. Try again later.
Articles 1–20