Budi Arief
TitleCited byYear
The many meanings of open source
C Gacek, B Arief
IEEE software 21 (1), 34-40, 2004
3642004
Computer security impaired by legitimate users
D Besnard, B Arief
Computers & Security 23 (3), 253-264, 2004
2052004
A UML tool for an automatic generation of simulation programs
B Arief, N Speirs
1172000
Technical and human issues in computer-based systems security
B Arief, D Besnard
CS-TR-790, 2003
272003
Automatic generation of distributed system simulations from UML
B Arief, N Speirs
261999
Harvesting high value foreign currency transactions from emv contactless credit cards without the pin
M Emms, B Arief, L Freitas, J Hannon, A van Moorsel
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
232014
Software architectures and Open Source Software: Where can research leverage the most?
C Gacek, B Arief, T Lawrie
232001
Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers
B Arief, MAB Adzmi, T Gross
IEEE Security & Privacy 13 (1), 71-76, 2015
222015
On using the CAMA framework for developing open mobile fault tolerant agent systems
B Arief, A Iliasov, A Romanovsky
Proceedings of the 2006 international workshop on Software engineering for …, 2006
222006
On rigorous design and implementation of fault tolerant ambient systems
A Iliasov, A Romanovsky, B Arief, L Laibinis, E Troubitsyna
10th IEEE International Symposium on Object and Component-Oriented Real-Time …, 2007
182007
Risks of offline verify PIN on contactless cards
M Emms, B Arief, N Little, A Van Moorsel
International Conference on Financial Cryptography and Data Security, 313-321, 2013
162013
Interdisciplinary insights on open source
C Gacek, T Lawrie, B Arief
142002
A framework for supporting automatic simulation generation from design
LB Arief
Newcastle University, 2001
132001
Integrating smartdust into intelligent transportation system
B Arief, P Blythe, R Fairchild, K Selvarajah, A Tully
122008
Does the online card payment landscape unwittingly facilitate fraud?
MA Ali, B Arief, M Emms, A van Moorsel
IEEE Security & Privacy 15 (2), 78-86, 2017
102017
Understanding cybercrime from its stakeholders' perspectives: Part 2--defenders and victims
B Arief, MAB Adzmi
IEEE Security & Privacy 13 (2), 84-88, 2015
102015
Using SimML to bridge the transformation from UML to simulation
LB Arief, NA Speirs
Proc. of One Day Workshop on Software Performance and Prediction extracted …, 1999
101999
Sensible privacy: how we can protect domestic violence survivors without facilitating misuse
B Arief, KPL Coopamootoo, M Emms, A van Moorsel
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 201-204, 2014
92014
Deploying Wireless Sensor Devices in Intelligent Transportation System Applications
K Selvarajah, B Arief, A Tully, P Blythe
Intelligent Transportation Systems, 143-168, 2012
92012
TRACKSS approach to improving road safety through sensors collaboration on vehicle and in infrastructure
B Arief, A von Arnim
2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008
92008
The system can't perform the operation now. Try again later.
Articles 1–20