BibTeX records: Pete Burnap

download as .bib file

@article{DBLP:journals/information/WilliamsAB24,
  author       = {Lowri Williams and
                  Eirini Anthi and
                  Pete Burnap},
  title        = {A Scalable and Automated Framework for Tracking the Likely Adoption
                  of Emerging Technologies},
  journal      = {Inf.},
  volume       = {15},
  number       = {4},
  pages        = {237},
  year         = {2024},
  url          = {https://doi.org/10.3390/info15040237},
  doi          = {10.3390/INFO15040237},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/WilliamsAB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-12990,
  author       = {Lowri Williams and
                  Eirini Anthi and
                  Laura Arman and
                  Pete Burnap},
  title        = {Topic Modelling: Going Beyond Token Outputs},
  journal      = {CoRR},
  volume       = {abs/2401.12990},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.12990},
  doi          = {10.48550/ARXIV.2401.12990},
  eprinttype    = {arXiv},
  eprint       = {2401.12990},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-12990.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-01670,
  author       = {Lowri Williams and
                  Eirini Anthi and
                  Pete Burnap},
  title        = {A Scalable and Automated Framework for Tracking the likely Adoption
                  of Emerging Technologies},
  journal      = {CoRR},
  volume       = {abs/2402.01670},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.01670},
  doi          = {10.48550/ARXIV.2402.01670},
  eprinttype    = {arXiv},
  eprint       = {2402.01670},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-01670.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RotibiSBT23,
  author       = {Ayodeji O. Rotibi and
                  Neetesh Saxena and
                  Pete Burnap and
                  Alex Tarter},
  title        = {Extended Dependency Modeling Technique for Cyber Risk Identification
                  in {ICS}},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {37229--37242},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3263671},
  doi          = {10.1109/ACCESS.2023.3263671},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RotibiSBT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AgyepongCRB23,
  author       = {Enoch Agyepong and
                  Yulia Cherdantseva and
                  Philipp Reinecke and
                  Pete Burnap},
  title        = {A systematic method for measuring the performance of a cyber security
                  operations centre analyst},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102959},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102959},
  doi          = {10.1016/J.COSE.2022.102959},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AgyepongCRB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MohammedARSB23,
  author       = {Abubakar Sadiq Mohammed and
                  Eirini Anthi and
                  Omer F. Rana and
                  Neetesh Saxena and
                  Pete Burnap},
  title        = {Detection and mitigation of field flooding attacks on oil and gas
                  critical infrastructure communication},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {103007},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103007},
  doi          = {10.1016/J.COSE.2022.103007},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MohammedARSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShakedCBM23,
  author       = {Avi Shaked and
                  Yulia Cherdantseva and
                  Pete Burnap and
                  Peter Maynard},
  title        = {Operations-informed incident response playbooks},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103454},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103454},
  doi          = {10.1016/J.COSE.2023.103454},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ShakedCBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/NafeesSCGB23,
  author       = {Muhammad Nouman Nafees and
                  Neetesh Saxena and
                  Alvaro A. C{\'{a}}rdenas and
                  Santiago Grijalva and
                  Pete Burnap},
  title        = {Smart Grid Cyber-Physical Situational Awareness of Complex Operational
                  Technology Attacks: {A} Review},
  journal      = {{ACM} Comput. Surv.},
  volume       = {55},
  number       = {10},
  pages        = {215:1--215:36},
  year         = {2023},
  url          = {https://doi.org/10.1145/3565570},
  doi          = {10.1145/3565570},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/NafeesSCGB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/IkwuGJBW23,
  author       = {Ruth Ikwu and
                  Luca Giommoni and
                  Amir Javed and
                  Pete Burnap and
                  Matthew L. Williams},
  title        = {Digital fingerprinting for identifying malicious collusive groups
                  on Twitter},
  journal      = {J. Cybersecur.},
  volume       = {9},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/cybsec/tyad014},
  doi          = {10.1093/CYBSEC/TYAD014},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/IkwuGJBW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cps/AlrowailiSSCB23,
  author       = {Yazeed Alrowaili and
                  Neetesh Saxena and
                  Anurag Srivastava and
                  Mauro Conti and
                  Pete Burnap},
  title        = {A review: Monitoring situational awareness of smart grid cyber-physical
                  systems and critical asset identification},
  journal      = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.},
  volume       = {8},
  number       = {3},
  pages        = {160--185},
  year         = {2023},
  url          = {https://doi.org/10.1049/cps2.12059},
  doi          = {10.1049/CPS2.12059},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-cps/AlrowailiSSCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/AsiriSGB23,
  author       = {Mohammed Asiri and
                  Neetesh Saxena and
                  Rigel Gjomemo and
                  Pete Burnap},
  title        = {Understanding Indicators of Compromise against Cyber-attacks in Industrial
                  Control Systems: {A} Security Perspective},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {15:1--15:33},
  year         = {2023},
  url          = {https://doi.org/10.1145/3587255},
  doi          = {10.1145/3587255},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcps/AsiriSGB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NafeesSB23,
  author       = {Muhammad Nouman Nafees and
                  Neetesh Saxena and
                  Pete Burnap},
  editor       = {Jianying Zhou and
                  Lejla Batina and
                  Zengpeng Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Daisuke Mashima and
                  Weizhi Meng and
                  Stjepan Picek and
                  Mohammad Ashiqur Rahman and
                  Jun Shao and
                  Masaki Shimaoka and
                  Ezekiel O. Soremekun and
                  Chunhua Su and
                  Je Sen Teh and
                  Aleksei Udovenko and
                  Cong Wang and
                  Leo Yu Zhang and
                  Yury Zhauniarovich},
  title        = {{POSTER:} Adaptive Moving Target Defense: Enhancing Dynamic Perturbation
                  Through Voltage Sensitivity Analysis in Power Systems},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2023
                  Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13907},
  pages        = {700--704},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41181-6\_43},
  doi          = {10.1007/978-3-031-41181-6\_43},
  timestamp    = {Mon, 16 Oct 2023 19:47:08 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NafeesSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/AsiriSB23,
  author       = {Mohammed Asiri and
                  Neetesh Saxena and
                  Pete Burnap},
  title        = {{ARCSG:} Advancing Resilience of Cyber-Physical Smart Grid: An Integrated
                  Co-Simulation Approach Incorporating Indicators of Compromise},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023 - Workshops, Delft, Netherlands, July 3-7, 2023},
  pages        = {370--378},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSPW59978.2023.00047},
  doi          = {10.1109/EUROSPW59978.2023.00047},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/AsiriSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/KayanRBP23,
  author       = {Hakan Kayan and
                  Omer F. Rana and
                  Pete Burnap and
                  Charith Perera},
  title        = {Artifact: {CASPER:} Context-Aware Anomaly Detection System for Industrial
                  Robotic Arms},
  booktitle    = {{IEEE} International Conference on Pervasive Computing and Communications
                  Workshops and other Affiliated Events, PerCom Workshops 2023, Atlanta,
                  GA, USA, March 13-17, 2023},
  pages        = {3--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/PerComWorkshops56833.2023.10150236},
  doi          = {10.1109/PERCOMWORKSHOPS56833.2023.10150236},
  timestamp    = {Tue, 27 Jun 2023 10:38:32 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/KayanRBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/KayanRBP23a,
  author       = {Hakan Kayan and
                  Omer F. Rana and
                  Pete Burnap and
                  Charith Perera},
  title        = {{CASPER:} Context-Aware Anomaly Detection System for Industrial Robotic
                  Arms},
  booktitle    = {{IEEE} International Conference on Pervasive Computing and Communications
                  Workshops and other Affiliated Events, PerCom Workshops 2023, Atlanta,
                  GA, USA, March 13-17, 2023},
  pages        = {282--284},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/PerComWorkshops56833.2023.10150354},
  doi          = {10.1109/PERCOMWORKSHOPS56833.2023.10150354},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/KayanRBP23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/KayanRBP23,
  author       = {Hakan Kayan and
                  Omer Farooq Rana and
                  Pete Burnap and
                  Charith Perera},
  title        = {{CASPER:} Context-Aware Anomaly Detection System for Industrial Robotic
                  Arms},
  publisher    = {{IEEE} DataPort},
  year         = {2023},
  month        = jan,
  howpublished = {\url{https://doi.org/10.21227/q2e6-t883}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/q2e6-t883},
  doi          = {10.21227/Q2E6-T883},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/KayanRBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-04926,
  author       = {Sanyam Vyas and
                  John Hannay and
                  Andrew Bolton and
                  Pete Burnap},
  title        = {Automated Cyber Defence: {A} Review},
  journal      = {CoRR},
  volume       = {abs/2303.04926},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.04926},
  doi          = {10.48550/ARXIV.2303.04926},
  eprinttype    = {arXiv},
  eprint       = {2303.04926},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-04926.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-18165,
  author       = {Baskoro Adi Pratomo and
                  Toby Jackson and
                  Pete Burnap and
                  Andrew Hood and
                  Eirini Anthi},
  title        = {Enhancing Enterprise Network Security: Comparing Machine-Level and
                  Process-Level Analysis for Dynamic Malware Detection},
  journal      = {CoRR},
  volume       = {abs/2310.18165},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.18165},
  doi          = {10.48550/ARXIV.2310.18165},
  eprinttype    = {arXiv},
  eprint       = {2310.18165},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-18165.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AliwaRPB21,
  author       = {Emad Aliwa and
                  Omer F. Rana and
                  Charith Perera and
                  Peter Burnap},
  title        = {Cyberattacks and Countermeasures for In-Vehicle Networks},
  journal      = {{ACM} Comput. Surv.},
  volume       = {54},
  number       = {1},
  pages        = {21:1--21:37},
  year         = {2022},
  url          = {https://doi.org/10.1145/3431233},
  doi          = {10.1145/3431233},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/AliwaRPB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/KayanNRBP22,
  author       = {Hakan Kayan and
                  Matthew Nunes and
                  Omer F. Rana and
                  Pete Burnap and
                  Charith Perera},
  title        = {Cybersecurity of Industrial Cyber-Physical Systems: {A} Review},
  journal      = {{ACM} Comput. Surv.},
  volume       = {54},
  number       = {11s},
  pages        = {229:1--229:35},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510410},
  doi          = {10.1145/3510410},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/KayanNRBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NunesBRL22,
  author       = {Matthew Nunes and
                  Pete Burnap and
                  Philipp Reinecke and
                  Kaelon Lloyd},
  title        = {Bane or Boon: Measuring the effect of evasive malware on system call
                  classifiers},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103202},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103202},
  doi          = {10.1016/J.JISA.2022.103202},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NunesBRL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlorainiJRB22,
  author       = {Fatimah Aloraini and
                  Amir Javed and
                  Omer F. Rana and
                  Pete Burnap},
  title        = {Adversarial machine learning in IoT from an insider point of view},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103341},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103341},
  doi          = {10.1016/J.JISA.2022.103341},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlorainiJRB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/AlorainyBLWG22,
  author       = {Wafa Alorainy and
                  Pete Burnap and
                  Han Liu and
                  Matthew L. Williams and
                  Luca Giommoni},
  title        = {Disrupting networks of hate: characterising hateful networks and removing
                  critical nodes},
  journal      = {Soc. Netw. Anal. Min.},
  volume       = {12},
  number       = {1},
  pages        = {27},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13278-021-00818-z},
  doi          = {10.1007/S13278-021-00818-Z},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/snam/AlorainyBLWG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/JavedIBGW22,
  author       = {Amir Javed and
                  Ruth Ikwu and
                  Pete Burnap and
                  Luca Giommoni and
                  Matthew L. Williams},
  title        = {Disrupting drive-by download networks on Twitter},
  journal      = {Soc. Netw. Anal. Min.},
  volume       = {12},
  number       = {1},
  pages        = {117},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13278-022-00944-2},
  doi          = {10.1007/S13278-022-00944-2},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/snam/JavedIBGW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/JavedLBR22,
  author       = {Amir Javed and
                  Mike Lakoju and
                  Pete Burnap and
                  Omer F. Rana},
  title        = {Security analytics for real-time forecasting of cyberattacks},
  journal      = {Softw. Pract. Exp.},
  volume       = {52},
  number       = {3},
  pages        = {788--804},
  year         = {2022},
  url          = {https://doi.org/10.1002/spe.2822},
  doi          = {10.1002/SPE.2822},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/JavedLBR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/MohammedRBRA22,
  author       = {Abubakar Sadiq Mohammed and
                  Philipp Reinecke and
                  Pete Burnap and
                  Omer F. Rana and
                  Eirini Anthi},
  title        = {Cybersecurity Challenges in the Offshore Oil and Gas Industry: An
                  Industrial Cyber-Physical Systems {(ICPS)} Perspective},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {6},
  number       = {3},
  pages        = {28:1--28:27},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548691},
  doi          = {10.1145/3548691},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcps/MohammedRBRA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ShakedCB22,
  author       = {Avi Shaked and
                  Yulia Cherdantseva and
                  Pete Burnap},
  title        = {Model-Based Incident Response Playbooks},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {26:1--26:7},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3538976},
  doi          = {10.1145/3538969.3538976},
  timestamp    = {Fri, 19 Aug 2022 09:45:12 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ShakedCB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NafeesSB22,
  author       = {Muhammad Nouman Nafees and
                  Neetesh Saxena and
                  Pete Burnap},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Poster: Physics-Informed Augmentation for Contextual Anomaly Detection
                  in Smart Grid},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3427--3429},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3563533},
  doi          = {10.1145/3548606.3563533},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NafeesSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/NafeesSB22,
  author       = {Muhammad Nouman Nafees and
                  Neetesh Saxena and
                  Pete Burnap},
  title        = {On The Efficacy of Physics-Informed Context-Based Anomaly Detection
                  for Power Systems},
  booktitle    = {{IEEE} International Conference on Communications, Control, and Computing
                  Technologies for Smart Grids, SmartGridComm 2022, Singapore, October
                  25-28, 2022},
  pages        = {374--379},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SmartGridComm52983.2022.9961034},
  doi          = {10.1109/SMARTGRIDCOMM52983.2022.9961034},
  timestamp    = {Fri, 09 Dec 2022 16:50:07 +0100},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/NafeesSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-12179,
  author       = {Abubakar Sadiq Mohammed and
                  Philipp Reinecke and
                  Pete Burnap and
                  Omer F. Rana and
                  Eirini Anthi},
  title        = {Cybersecurity Challenges in the Offshore Oil and Gas Industry: An
                  Industrial Cyber-Physical Systems {(ICPS)} Perspective},
  journal      = {CoRR},
  volume       = {abs/2202.12179},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.12179},
  eprinttype    = {arXiv},
  eprint       = {2202.12179},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-12179.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-08141,
  author       = {Petar Radanliev and
                  David De Roure and
                  Pete Burnap and
                  Omar Santos},
  title        = {Epistemological Equation for Analysing Uncontrollable States in Complex
                  Systems: Quantifying Cyber Risks from the Internet of Things},
  journal      = {CoRR},
  volume       = {abs/2212.08141},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.08141},
  doi          = {10.48550/ARXIV.2212.08141},
  eprinttype    = {arXiv},
  eprint       = {2212.08141},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-08141.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AnthiWJB21,
  author       = {Eirini Anthi and
                  Lowri Williams and
                  Amir Javed and
                  Pete Burnap},
  title        = {Hardening machine learning denial of service (DoS) defences against
                  adversarial attacks in IoT smart home networks},
  journal      = {Comput. Secur.},
  volume       = {108},
  pages        = {102352},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102352},
  doi          = {10.1016/J.COSE.2021.102352},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AnthiWJB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/AnthiWBJ21,
  author       = {Eirini Anthi and
                  Lowri Williams and
                  Pete Burnap and
                  Kevin Jones},
  title        = {A three-tiered intrusion detection system for industrial control systems},
  journal      = {J. Cybersecur.},
  volume       = {7},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1093/cybsec/tyab006},
  doi          = {10.1093/CYBSEC/TYAB006},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AnthiWBJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/diot/LakojuJRBAC21,
  author       = {Mike Lakoju and
                  Amir Javed and
                  Omer F. Rana and
                  Pete Burnap and
                  Samuelson Tijesunimi Atiba and
                  Soumaya Cherkaoui},
  title        = {"Chatty Devices" and edge-based activity classification},
  journal      = {Discov. Internet Things},
  volume       = {1},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1007/s43926-021-00004-9},
  doi          = {10.1007/S43926-021-00004-9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/diot/LakojuJRBAC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AnthiWRBW21,
  author       = {Eirini Anthi and
                  Lowri Williams and
                  Matilda Rhode and
                  Pete Burnap and
                  Adam Wedgbury},
  title        = {Adversarial attacks on machine learning cybersecurity defences in
                  Industrial Control Systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102717},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102717},
  doi          = {10.1016/J.JISA.2020.102717},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AnthiWRBW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rss/RadanlievRBS21,
  author       = {Petar Radanliev and
                  David De Roure and
                  Pete Burnap and
                  Omar Santos},
  title        = {Epistemological Equation for Analysing Uncontrollable States in Complex
                  Systems: Quantifying Cyber Risks from the Internet of Things},
  journal      = {Rev. Socionetwork Strateg.},
  volume       = {15},
  number       = {2},
  pages        = {381--411},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12626-021-00086-5},
  doi          = {10.1007/S12626-021-00086-5},
  timestamp    = {Fri, 04 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/rss/RadanlievRBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LakojuAKBB21,
  author       = {Mike Lakoju and
                  Nemitari Ajienka and
                  Mojtaba Ahmadieh Khanesar and
                  Pete Burnap and
                  David T. Branson},
  title        = {Unsupervised Learning for Product Use Activity Recognition: An Exploratory
                  Study of a "Chatty Device"},
  journal      = {Sensors},
  volume       = {21},
  number       = {15},
  pages        = {4991},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21154991},
  doi          = {10.3390/S21154991},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/LakojuAKBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NafeesSB21,
  author       = {Muhammad Nouman Nafees and
                  Neetesh Saxena and
                  Pete Burnap},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Optimized Predictive Control for {AGC} Cyber Resiliency},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2450--2452},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485358},
  doi          = {10.1145/3460120.3485358},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NafeesSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-03564,
  author       = {Hakan Kayan and
                  Matthew Nunes and
                  Omer F. Rana and
                  Pete Burnap and
                  Charith Perera},
  title        = {Cybersecurity of Industrial Cyber-Physical Systems: {A} Review},
  journal      = {CoRR},
  volume       = {abs/2101.03564},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.03564},
  eprinttype    = {arXiv},
  eprint       = {2101.03564},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-03564.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SaxenaTGBK20,
  author       = {Neetesh Saxena and
                  Ieuan Thomas and
                  Prosanta Gope and
                  Pete Burnap and
                  Neeraj Kumar},
  title        = {PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit
                  Drugs},
  journal      = {Computer},
  volume       = {53},
  number       = {7},
  pages        = {29--44},
  year         = {2020},
  url          = {https://doi.org/10.1109/MC.2020.2989238},
  doi          = {10.1109/MC.2020.2989238},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SaxenaTGBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/RadanlievRPNMSM20,
  author       = {Petar Radanliev and
                  David De Roure and
                  Kevin R. Page and
                  Jason R. C. Nurse and
                  Rafael Mantilla Montalvo and
                  Omar Santos and
                  La Treall Maddox and
                  Pete Burnap},
  title        = {Cyber risk at the edge: current and future trends on cyber risk analytics
                  and artificial intelligence in the industrial internet of things and
                  industry 4.0 supply chains},
  journal      = {Cybersecur.},
  volume       = {3},
  number       = {1},
  pages        = {13},
  year         = {2020},
  url          = {https://doi.org/10.1186/s42400-020-00052-8},
  doi          = {10.1186/S42400-020-00052-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/RadanlievRPNMSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PratomoBT20,
  author       = {Baskoro Adi Pratomo and
                  Pete Burnap and
                  George Theodorakopoulos},
  title        = {{BLATTA:} Early Exploit Detection on Network Traffic with Recurrent
                  Neural Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {8826038:1--8826038:15},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8826038},
  doi          = {10.1155/2020/8826038},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/PratomoBT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/JavedBWR20,
  author       = {Amir Javed and
                  Pete Burnap and
                  Matthew L. Williams and
                  Omer F. Rana},
  title        = {Emotions Behind Drive-by Download Propagation on Twitter},
  journal      = {{ACM} Trans. Web},
  volume       = {14},
  number       = {4},
  pages        = {16:1--16:26},
  year         = {2020},
  url          = {https://doi.org/10.1145/3408894},
  doi          = {10.1145/3408894},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tweb/JavedBWR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl-trac/LiuBAW20,
  author       = {Han Liu and
                  Pete Burnap and
                  Wafa Alorainy and
                  Matthew L. Williams},
  editor       = {Ritesh Kumar and
                  Atul Kr. Ojha and
                  Bornini Lahiri and
                  Marcos Zampieri and
                  Shervin Malmasi and
                  Vanessa Murdock and
                  Daniel Kadar},
  title        = {Scmhl5 at {TRAC-2} Shared Task on Aggression Identification: Bert
                  Based Ensemble Learning Approach},
  booktitle    = {Proceedings of the Second Workshop on Trolling, Aggression and Cyberbullying,
                  TRAC@LREC 2020, Marseille, France, May 2020},
  pages        = {62--68},
  publisher    = {European Language Resources Association {(ELRA)}},
  year         = {2020},
  url          = {https://aclanthology.org/2020.trac-1.10/},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acl-trac/LiuBAW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NafeesSBC20,
  author       = {Muhammad Nouman Nafees and
                  Neetesh Saxena and
                  Pete Burnap and
                  Bong Jun Choi},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in
                  Industrial Context},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {2117--2119},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3420022},
  doi          = {10.1145/3372297.3420022},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NafeesSBC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/AgyepongCRB20,
  author       = {Enoch Agyepong and
                  Yulia Cherdantseva and
                  Philipp Reinecke and
                  Pete Burnap},
  title        = {Towards a Framework for Measuring the Performance of a Security Operations
                  Center Analyst},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138872},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138872},
  timestamp    = {Fri, 24 Jul 2020 16:51:21 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/AgyepongCRB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-05005,
  author       = {Eirini Anthi and
                  Lowri Williams and
                  Matilda Rhode and
                  Pete Burnap and
                  Adam Wedgbury},
  title        = {Adversarial Attacks on Machine Learning Cybersecurity Defences in
                  Industrial Control Systems},
  journal      = {CoRR},
  volume       = {abs/2004.05005},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.05005},
  eprinttype    = {arXiv},
  eprint       = {2004.05005},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-05005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-10781,
  author       = {Emad Aliwa and
                  Omer F. Rana and
                  Charith Perera and
                  Peter Burnap},
  title        = {Cyberattacks and Countermeasures For In-Vehicle Networks},
  journal      = {CoRR},
  volume       = {abs/2004.10781},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.10781},
  eprinttype    = {arXiv},
  eprint       = {2004.10781},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-10781.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-12150,
  author       = {Petar Radanliev and
                  David De Roure and
                  Kevin R. Page and
                  Max Van Kleek and
                  Rafael Mantilla Montalvo and
                  Omar Santos and
                  La Treall Maddox and
                  Stacy Cannady and
                  Pete Burnap and
                  Eirini Anthi and
                  Carsten Maple},
  title        = {Design of a dynamic and self-adapting system, supported with artificial
                  intelligence, machine learning and real-time intelligence for predictive
                  cyber risk analytics},
  journal      = {CoRR},
  volume       = {abs/2005.12150},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.12150},
  eprinttype    = {arXiv},
  eprint       = {2005.12150},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-12150.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/AnthiWSTB19,
  author       = {Eirini Anthi and
                  Lowri Williams and
                  Malgorzata Slowinska and
                  George Theodorakopoulos and
                  Pete Burnap},
  title        = {A Supervised Intrusion Detection System for Smart Home IoT Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {5},
  pages        = {9042--9053},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2926365},
  doi          = {10.1109/JIOT.2019.2926365},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/AnthiWSTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/JavedBR19,
  author       = {Amir Javed and
                  Pete Burnap and
                  Omer F. Rana},
  title        = {Prediction of drive-by download attacks on Twitter},
  journal      = {Inf. Process. Manag.},
  volume       = {56},
  number       = {3},
  pages        = {1133--1145},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ipm.2018.02.003},
  doi          = {10.1016/J.IPM.2018.02.003},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipm/JavedBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NunesBRRL19,
  author       = {Matthew Nunes and
                  Pete Burnap and
                  Omer F. Rana and
                  Philipp Reinecke and
                  Kaelon Lloyd},
  title        = {Getting to the root of the problem: {A} detailed comparison of kernel
                  and user level data for dynamic malware analysis},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102365},
  doi          = {10.1016/J.JISA.2019.102365},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NunesBRRL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/LiuBAW19,
  author       = {Han Liu and
                  Pete Burnap and
                  Wafa Alorainy and
                  Matthew L. Williams},
  title        = {A Fuzzy Approach to Text Classification With Two-Stage Training for
                  Ambiguous Instances},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {6},
  number       = {2},
  pages        = {227--240},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCSS.2019.2892037},
  doi          = {10.1109/TCSS.2019.2892037},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/LiuBAW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/AlorainyBLW19,
  author       = {Wafa Alorainy and
                  Pete Burnap and
                  Han Liu and
                  Matthew L. Williams},
  title        = {"The Enemy Among Us": Detecting Cyber Hate Speech with Threats-based
                  Othering Language Embeddings},
  journal      = {{ACM} Trans. Web},
  volume       = {13},
  number       = {3},
  pages        = {14:1--14:26},
  year         = {2019},
  url          = {https://doi.org/10.1145/3324997},
  doi          = {10.1145/3324997},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tweb/AlorainyBLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/RhodeTBJ19,
  author       = {Matilda Rhode and
                  Lewis Tuson and
                  Pete Burnap and
                  Kevin Jones},
  title        = {{LAB} to {SOC:} Robust Features for Dynamic Malware Detection},
  booktitle    = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} (Industry Track) 2019, Portland, OR, USA, June
                  24-27, 2019},
  pages        = {13--16},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSN-Industry.2019.00010},
  doi          = {10.1109/DSN-INDUSTRY.2019.00010},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/RhodeTBJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficloud/BaratiRTB19,
  author       = {Masoud Barati and
                  Omer F. Rana and
                  George Theodorakopoulos and
                  Peter Burnap},
  editor       = {Muhammad Younas and
                  Irfan Awan and
                  Takahiro Hara},
  title        = {Privacy-Aware Cloud Ecosystems and {GDPR} Compliance},
  booktitle    = {7th International Conference on Future Internet of Things and Cloud,
                  FiCloud 2019, Istanbul, Turkey, August 26-28, 2019},
  pages        = {117--124},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/FiCloud.2019.00024},
  doi          = {10.1109/FICLOUD.2019.00024},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ficloud/BaratiRTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tto/ProcterWBHEWJ19,
  author       = {Rob Procter and
                  Helena Webb and
                  Pete Burnap and
                  William Housley and
                  Adam Edwards and
                  Matthew L. Williams and
                  Marina Jirotka},
  editor       = {Maria Liakata and
                  Andreas Vlachos},
  title        = {A Study of Cyber Hate on Twitter with Implications for Social Media
                  Governance Strategies},
  booktitle    = {Proceedings of the 2019 Truth and Trust Online Conference {(TTO} 2019),
                  London, UK, October 4-5, 2019},
  year         = {2019},
  url          = {https://truthandtrustonline.com/wp-content/uploads/2019/09/paper\_20.pdf},
  timestamp    = {Tue, 03 Nov 2020 16:50:40 +0100},
  biburl       = {https://dblp.org/rec/conf/tto/ProcterWBHEWJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/0002BAW19,
  author       = {Han Liu and
                  Pete Burnap and
                  Wafa Alorainy and
                  Matthew L. Williams},
  editor       = {Ling Liu and
                  Ryen W. White and
                  Amin Mantrach and
                  Fabrizio Silvestri and
                  Julian J. McAuley and
                  Ricardo Baeza{-}Yates and
                  Leila Zia},
  title        = {Fuzzy Multi-task Learning for Hate Speech Type Identification},
  booktitle    = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA,
                  May 13-17, 2019},
  pages        = {3006--3012},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308558.3313546},
  doi          = {10.1145/3308558.3313546},
  timestamp    = {Sun, 22 Sep 2019 18:12:47 +0200},
  biburl       = {https://dblp.org/rec/conf/www/0002BAW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sin/2019,
  editor       = {Oleg B. Makarevich and
                  Dmitry Popov and
                  Ludmila K. Babenko and
                  Pete Burnap and
                  Atilla El{\c{c}}i and
                  Ron Poet and
                  Jaideep Vaidya and
                  Mehmet A. Orgun and
                  Manoj Singh Gaur and
                  Rajveer Singh Shekhawat},
  title        = {Proceedings of the 12th International Conference on Security of Information
                  and Networks, {SIN} 2019, Sochi, Russian Federation, September 12-15,
                  2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3357613},
  doi          = {10.1145/3357613},
  isbn         = {978-1-4503-7242-8},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-02598,
  author       = {Matilda Rhode and
                  Pete Burnap and
                  Kevin Jones},
  title        = {Dual-task agent for run-time classification and killing of malicious
                  processes},
  journal      = {CoRR},
  volume       = {abs/1902.02598},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.02598},
  eprinttype    = {arXiv},
  eprint       = {1902.02598},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-02598.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-04428,
  author       = {Petar Radanliev and
                  David De Roure and
                  Jason R. C. Nurse and
                  Rafael Mantilla Montalvo and
                  Peter Burnap},
  title        = {Standardisation of cyber risk impact assessment for the Internet of
                  Things (IoT)},
  journal      = {CoRR},
  volume       = {abs/1903.04428},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.04428},
  eprinttype    = {arXiv},
  eprint       = {1903.04428},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-04428.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-12084,
  author       = {Petar Radanliev and
                  David Charles De Roure and
                  Jason R. C. Nurse and
                  Pete Burnap and
                  Eirini Anthi and
                  Uchenna Ani and
                  La Treall Maddox and
                  Omar Santos and
                  Rafael Mantilla Montalvo},
  title        = {Definition of Internet of Things (IoT) Cyber Risk Discussion on a
                  Transformation Roadmap for Standardisation of Regulations Risk Maturity
                  Strategy Design and Impact Assessment},
  journal      = {CoRR},
  volume       = {abs/1903.12084},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.12084},
  eprinttype    = {arXiv},
  eprint       = {1903.12084},
  timestamp    = {Fri, 04 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-12084.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-12582,
  author       = {Petar Radanliev and
                  David Charles De Roure and
                  Jason R. C. Nurse and
                  Peter Burnap and
                  Rafael Mantilla Montalvo},
  title        = {Methodology for Designing Decision Support Systems for Visualising
                  and Mitigating Supply Chain Cyber Risk from IoT Technologies},
  journal      = {CoRR},
  volume       = {abs/1903.12582},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.12582},
  eprinttype    = {arXiv},
  eprint       = {1903.12582},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-12582.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-11732,
  author       = {Rob Procter and
                  Helena Webb and
                  Marina Jirotka and
                  Pete Burnap and
                  William Housley and
                  Adam Edwards and
                  Matthew L. Williams},
  title        = {A Study of Cyber Hate on Twitter with Implications for Social Media
                  Governance Strategies},
  journal      = {CoRR},
  volume       = {abs/1908.11732},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.11732},
  eprinttype    = {arXiv},
  eprint       = {1908.11732},
  timestamp    = {Wed, 04 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-11732.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-05726,
  author       = {Petar Radanliev and
                  David Charles De Roure and
                  Kevin R. Page and
                  Jason R. C. Nurse and
                  Rafael Mantilla Montalvo and
                  Omar Santos and
                  La Treall Maddox and
                  Peter Burnap},
  title        = {The Industrial Internet of Things in the Industry 4.0 supply chains:
                  literature review and future trends},
  journal      = {CoRR},
  volume       = {abs/1911.05726},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.05726},
  eprinttype    = {arXiv},
  eprint       = {1911.05726},
  timestamp    = {Fri, 04 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-05726.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/RadanlievRNHMCB18,
  author       = {Petar Radanliev and
                  David Charles De Roure and
                  Razvan Nicolescu and
                  Michael Huth and
                  Rafael Montalvo Mantilla and
                  Stacy Cannady and
                  Peter Burnap},
  title        = {Future developments in cyber risk assessment for the internet of things},
  journal      = {Comput. Ind.},
  volume       = {102},
  pages        = {14--22},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.compind.2018.08.002},
  doi          = {10.1016/J.COMPIND.2018.08.002},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cii/RadanlievRNHMCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BurnapFTJ18,
  author       = {Pete Burnap and
                  Richard French and
                  Frederick Turner and
                  Kevin Jones},
  title        = {Malware classification using self organising feature maps and machine
                  activity data},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {399--410},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.016},
  doi          = {10.1016/J.COSE.2017.11.016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BurnapFTJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RhodeBJ18,
  author       = {Matilda Rhode and
                  Pete Burnap and
                  Kevin Jones},
  title        = {Early-stage malware prediction using recurrent neural networks},
  journal      = {Comput. Secur.},
  volume       = {77},
  pages        = {578--594},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.05.010},
  doi          = {10.1016/J.COSE.2018.05.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RhodeBJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AnthiARTB18,
  author       = {Eirini Anthi and
                  Shazaib Ahmad and
                  Omer F. Rana and
                  George Theodorakopoulos and
                  Pete Burnap},
  title        = {EclipseIoT: {A} secure and adaptive hub for the Internet of Things},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {477--490},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.016},
  doi          = {10.1016/J.COSE.2018.07.016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AnthiARTB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/PratomoBT18,
  author       = {Baskoro Adi Pratomo and
                  Pete Burnap and
                  George Theodorakopoulos},
  title        = {Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic
                  with Autoencoder},
  booktitle    = {2018 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom,
                  June 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSecPODS.2018.8560678},
  doi          = {10.1109/CYBERSECPODS.2018.8560678},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/PratomoBT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmlc/AlorainyB0JW18,
  author       = {Wafa Alorainy and
                  Pete Burnap and
                  Han Liu and
                  Amir Javed and
                  Matthew L. Williams},
  title        = {Suspended Accounts: {A} Source of Tweets with Disgust and Anger Emotions
                  for Augmenting Hate Speech Data Sample},
  booktitle    = {2018 International Conference on Machine Learning and Cybernetics,
                  {ICMLC} 2018, Chengdu, China, July 15-18, 2018},
  pages        = {581--586},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICMLC.2018.8527001},
  doi          = {10.1109/ICMLC.2018.8527001},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icmlc/AlorainyB0JW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-05229,
  author       = {Petar Radanliev and
                  David Charles De Roure and
                  Razvan Nicolescu and
                  Michael Huth and
                  Rafael Montalvo Mantilla and
                  Stacy Cannady and
                  Peter Burnap},
  title        = {Future developments in cyber risk assessment for the internet of things},
  journal      = {CoRR},
  volume       = {abs/1809.05229},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.05229},
  eprinttype    = {arXiv},
  eprint       = {1809.05229},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-05229.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BurnapCBEJSS17,
  author       = {Pete Burnap and
                  Yulia Cherdantseva and
                  Andrew Blyth and
                  Peter Eden and
                  Kevin Jones and
                  Hugh Soulsby and
                  Kristan Stoddart},
  title        = {Determining and Sharing Risk Data in Distributed Interdependent Systems},
  journal      = {Computer},
  volume       = {50},
  number       = {4},
  pages        = {72--79},
  year         = {2017},
  url          = {https://doi.org/10.1109/MC.2017.108},
  doi          = {10.1109/MC.2017.108},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BurnapCBEJSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/osnm/BurnapCAHS17,
  author       = {Pete Burnap and
                  Gualtiero Colombo and
                  Rosie Amery and
                  Andrei Hodorog and
                  Jonathan Scourfield},
  title        = {Multi-class machine classification of suicide-related communication
                  on Twitter},
  journal      = {Online Soc. Networks Media},
  volume       = {2},
  pages        = {32--44},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.osnem.2017.08.001},
  doi          = {10.1016/J.OSNEM.2017.08.001},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/osnm/BurnapCAHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/AlsaediBR17,
  author       = {Nasser Alsaedi and
                  Pete Burnap and
                  Omer F. Rana},
  title        = {Can We Predict a Riot? Disruptive Event Detection Using Twitter},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {17},
  number       = {2},
  pages        = {18:1--18:26},
  year         = {2017},
  url          = {https://doi.org/10.1145/2996183},
  doi          = {10.1145/2996183},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/AlsaediBR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/websci/WebbJSHEWPRB17,
  author       = {Helena Webb and
                  Marina Jirotka and
                  Bernd Carsten Stahl and
                  William Housley and
                  Adam Edwards and
                  Matthew L. Williams and
                  Rob Procter and
                  Omer F. Rana and
                  Pete Burnap},
  editor       = {Peter Fox and
                  Deborah L. McGuinness and
                  Lindsay Poirier and
                  Paolo Boldi and
                  Katharina Kinder{-}Kurlanda},
  title        = {The Ethical Challenges of Publishing Twitter Data for Research Dissemination},
  booktitle    = {Proceedings of the 2017 {ACM} on Web Science Conference, WebSci 2017,
                  Troy, NY, USA, June 25 - 28, 2017},
  pages        = {339--348},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3091478.3091489},
  doi          = {10.1145/3091478.3091489},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/websci/WebbJSHEWPRB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsdm/TsikrikaAKVBW17,
  author       = {Theodora Tsikrika and
                  Babak Akhgar and
                  Vasilis Katos and
                  Stefanos Vrochidis and
                  Pete Burnap and
                  Matthew L. Williams},
  editor       = {Maarten de Rijke and
                  Milad Shokouhi and
                  Andrew Tomkins and
                  Min Zhang},
  title        = {1st International Workshop on Search and Mining Terrorist Online Content
                  {\&} Advances in Data Science for Cyber Security and Risk on the
                  Web},
  booktitle    = {Proceedings of the Tenth {ACM} International Conference on Web Search
                  and Data Mining, {WSDM} 2017, Cambridge, United Kingdom, February
                  6-10, 2017},
  pages        = {823--824},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3018661.3022760},
  doi          = {10.1145/3018661.3022760},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wsdm/TsikrikaAKVBW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-03513,
  author       = {Matilda Rhode and
                  Pete Burnap and
                  Kevin Jones},
  title        = {Early Stage Malware Prediction Using Recurrent Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1708.03513},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.03513},
  eprinttype    = {arXiv},
  eprint       = {1708.03513},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-03513.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-05831,
  author       = {Amir Javed and
                  Pete Burnap and
                  Omer F. Rana},
  title        = {Real Time Prediction of Drive by Download Attacks on Twitter},
  journal      = {CoRR},
  volume       = {abs/1708.05831},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.05831},
  eprinttype    = {arXiv},
  eprint       = {1708.05831},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-05831.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ColomboBHS16,
  author       = {Gualtiero B. Colombo and
                  Pete Burnap and
                  Andrei Hodorog and
                  Jonathan Scourfield},
  title        = {Analysing the connectivity and communication of suicidal users on
                  twitter},
  journal      = {Comput. Commun.},
  volume       = {73},
  pages        = {291--300},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comcom.2015.07.018},
  doi          = {10.1016/J.COMCOM.2015.07.018},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ColomboBHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CherdantsevaBBE16,
  author       = {Yulia Cherdantseva and
                  Pete Burnap and
                  Andrew Blyth and
                  Peter Eden and
                  Kevin Jones and
                  Hugh Soulsby and
                  Kristan Stoddart},
  title        = {A review of cyber security risk assessment methods for {SCADA} systems},
  journal      = {Comput. Secur.},
  volume       = {56},
  pages        = {1--27},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2015.09.009},
  doi          = {10.1016/J.COSE.2015.09.009},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CherdantsevaBBE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AwanBR16,
  author       = {Malik Shahzad Kaleem Awan and
                  Pete Burnap and
                  Omer F. Rana},
  title        = {Identifying cyber risk hotspots: {A} framework for measuring temporal
                  variance in computer network risk},
  journal      = {Comput. Secur.},
  volume       = {57},
  pages        = {31--46},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2015.11.003},
  doi          = {10.1016/J.COSE.2015.11.003},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AwanBR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/epjds/BurnapW16,
  author       = {Pete Burnap and
                  Matthew L. Williams},
  title        = {Us and them: identifying cyber hate on Twitter across multiple protected
                  characteristics},
  journal      = {{EPJ} Data Sci.},
  volume       = {5},
  number       = {1},
  pages        = {11},
  year         = {2016},
  url          = {https://doi.org/10.1140/epjds/s13688-016-0072-6},
  doi          = {10.1140/EPJDS/S13688-016-0072-6},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/epjds/BurnapW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ConejeroRBMCC16,
  author       = {Javier Conejero and
                  Omer F. Rana and
                  Pete Burnap and
                  Jeffrey Morgan and
                  Mar{\'{\i}}a Blanca Caminero and
                  Carmen Carri{\'{o}}n},
  title        = {Analyzing Hadoop power consumption and impact on application QoS},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {55},
  pages        = {213--223},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.future.2015.03.009},
  doi          = {10.1016/J.FUTURE.2015.03.009},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ConejeroRBMCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tois/WebbBPRSWHEJ16,
  author       = {Helena Webb and
                  Pete Burnap and
                  Rob Procter and
                  Omer F. Rana and
                  Bernd Carsten Stahl and
                  Matthew L. Williams and
                  William Housley and
                  Adam Edwards and
                  Marina Jirotka},
  title        = {Digital Wildfires: Propagation, Verification, Regulation, and Responsible
                  Innovation},
  journal      = {{ACM} Trans. Inf. Syst.},
  volume       = {34},
  number       = {3},
  pages        = {15:1--15:23},
  year         = {2016},
  url          = {https://doi.org/10.1145/2893478},
  doi          = {10.1145/2893478},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tois/WebbBPRSWHEJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/EdenBBCJSS16,
  author       = {Peter Eden and
                  Andrew Blyth and
                  Pete Burnap and
                  Yulia Cherdantseva and
                  Kevin Jones and
                  Hugh Soulsby and
                  Kristan Stoddart},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Forensic Readiness for {SCADA/ICS} Incident Response},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56489},
  timestamp    = {Thu, 08 Sep 2016 09:49:45 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/EdenBBCJSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/AlsaediBR16,
  author       = {Nasser Alsaedi and
                  Pete Burnap and
                  Omer F. Rana},
  title        = {Automatic Summarization of Real World Events Using Twitter},
  booktitle    = {Proceedings of the Tenth International Conference on Web and Social
                  Media, Cologne, Germany, May 17-20, 2016},
  pages        = {511--514},
  publisher    = {{AAAI} Press},
  year         = {2016},
  url          = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13017},
  timestamp    = {Fri, 05 Feb 2021 11:07:46 +0100},
  biburl       = {https://dblp.org/rec/conf/icwsm/AlsaediBR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/AlsaediBR16a,
  author       = {Nasser Alsaedi and
                  Pete Burnap and
                  Omer F. Rana},
  title        = {Sensing Real-World Events Using Arabic Twitter Posts},
  booktitle    = {Proceedings of the Tenth International Conference on Web and Social
                  Media, Cologne, Germany, May 17-20, 2016},
  pages        = {515--518},
  publisher    = {{AAAI} Press},
  year         = {2016},
  url          = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13016},
  timestamp    = {Fri, 05 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icwsm/AlsaediBR16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webi/AlsaediBR16,
  author       = {Nasser Alsaedi and
                  Pete Burnap and
                  Omer F. Rana},
  title        = {Sensing Real-World Events Using Social Media Data and a Classification-Clustering
                  Framework},
  booktitle    = {2016 {IEEE/WIC/ACM} International Conference on Web Intelligence,
                  {WI} 2016, Omaha, NE, USA, October 13-16, 2016},
  pages        = {216--223},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/WI.2016.0039},
  doi          = {10.1109/WI.2016.0039},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/webi/AlsaediBR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webi/AlsaediBR16a,
  author       = {Nasser Alsaedi and
                  Pete Burnap and
                  Omer F. Rana},
  title        = {Temporal {TF-IDF:} {A} High Performance Approach for Event Summarization
                  in Twitter},
  booktitle    = {2016 {IEEE/WIC/ACM} International Conference on Web Intelligence,
                  {WI} 2016, Omaha, NE, USA, October 13-16, 2016},
  pages        = {515--521},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/WI.2016.0087},
  doi          = {10.1109/WI.2016.0087},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/webi/AlsaediBR16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/SaidRB15,
  author       = {Taimur Al Said and
                  Omer F. Rana and
                  Pete Burnap},
  title        = {VMInformant: an instrumented virtual machine to support trustworthy
                  cloud computing},
  journal      = {Int. J. High Perform. Comput. Netw.},
  volume       = {8},
  number       = {3},
  pages        = {222--234},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJHPCN.2015.071257},
  doi          = {10.1504/IJHPCN.2015.071257},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpcn/SaidRB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/BurnapRWHEMSC15,
  author       = {Pete Burnap and
                  Omer F. Rana and
                  Matthew L. Williams and
                  William Housley and
                  Adam Edwards and
                  Jeffrey Morgan and
                  Luke Sloan and
                  Javier Conejero},
  title        = {{COSMOS:} Towards an integrated and scalable service for analysing
                  social media on demand},
  journal      = {Int. J. Parallel Emergent Distributed Syst.},
  volume       = {30},
  number       = {2},
  pages        = {80--100},
  year         = {2015},
  url          = {https://doi.org/10.1080/17445760.2014.902057},
  doi          = {10.1080/17445760.2014.902057},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/paapp/BurnapRWHEMSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/WebbJSHEWPRB15,
  author       = {Helena Webb and
                  Marina Jirotka and
                  Bernd Carsten Stahl and
                  William Housley and
                  Adam Edwards and
                  Matthew L. Williams and
                  Rob Procter and
                  Omer F. Rana and
                  Pete Burnap},
  title        = {Digital wildfires: hyper-connectivity, havoc and a global ethos to
                  govern social media},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {45},
  number       = {3},
  pages        = {193--201},
  year         = {2015},
  url          = {https://doi.org/10.1145/2874239.2874267},
  doi          = {10.1145/2874239.2874267},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/WebbJSHEWPRB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/AwanBR15,
  author       = {Malik Shahzad Kaleem Awan and
                  Pete Burnap and
                  Omer F. Rana},
  editor       = {Yulei Wu and
                  Geyong Min and
                  Nektarios Georgalas and
                  Jia Hu and
                  Luigi Atzori and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Lei (Chris) Liu and
                  Ram{\'{o}}n Ag{\"{u}}ero Calvo},
  title        = {An Empirical Risk Management Framework for Monitoring Network Security},
  booktitle    = {15th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2015; 14th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, {IUCC} 2015; 13th {IEEE} International Conference
                  on Dependable, Autonomic and Secure Computing, {DASC} 2015; 13th {IEEE}
                  International Conference on Pervasive Intelligence and Computing,
                  PICom 2015, Liverpool, United Kingdom, October 26-28, 2015},
  pages        = {1764--1771},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.266},
  doi          = {10.1109/CIT/IUCC/DASC/PICOM.2015.266},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/AwanBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/AlsaediBR15,
  author       = {Nasser Alsaedi and
                  Pete Burnap and
                  Omer F. Rana},
  editor       = {Jian Pei and
                  Fabrizio Silvestri and
                  Jie Tang},
  title        = {Identifying Disruptive Events from Social Media to Enhance Situational
                  Awareness},
  booktitle    = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
                  in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
                  August 25 - 28, 2015},
  pages        = {934--941},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808797.2808879},
  doi          = {10.1145/2808797.2808879},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asunam/AlsaediBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/BurnapJRA15,
  author       = {Pete Burnap and
                  Amir Javed and
                  Omer F. Rana and
                  Malik Shahzad Kaleem Awan},
  editor       = {Jian Pei and
                  Fabrizio Silvestri and
                  Jie Tang},
  title        = {Real-time Classification of Malicious URLs on Twitter using Machine
                  Activity Data},
  booktitle    = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
                  in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
                  August 25 - 28, 2015},
  pages        = {970--977},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808797.2809281},
  doi          = {10.1145/2808797.2809281},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asunam/BurnapJRA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/AlsaediB15,
  author       = {Nasser Alsaedi and
                  Pete Burnap},
  editor       = {Jian Pei and
                  Fabrizio Silvestri and
                  Jie Tang},
  title        = {Feature Extraction and Analysis for Identifying Disruptive Events
                  from Social Media},
  booktitle    = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
                  in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
                  August 25 - 28, 2015},
  pages        = {1495--1502},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808797.2808867},
  doi          = {10.1145/2808797.2808867},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/AlsaediB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cicling/AlsaediB15,
  author       = {Nasser Alsaedi and
                  Pete Burnap},
  editor       = {Alexander F. Gelbukh},
  title        = {Arabic Event Detection in Social Media},
  booktitle    = {Computational Linguistics and Intelligent Text Processing - 16th International
                  Conference, CICLing 2015, Cairo, Egypt, April 14-20, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9041},
  pages        = {384--401},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18111-0\_29},
  doi          = {10.1007/978-3-319-18111-0\_29},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/cicling/AlsaediB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/RahulamathavanR15,
  author       = {Yogachandran Rahulamathavan and
                  Muttukrishnan Rajarajan and
                  Omer F. Rana and
                  Malik S. K. Awan and
                  Pete Burnap and
                  Sajal K. Das},
  title        = {Assessing Data Breach Risk in Cloud Systems},
  booktitle    = {7th {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2015, Vancouver, BC, Canada, November 30 - December
                  3, 2015},
  pages        = {363--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CloudCom.2015.58},
  doi          = {10.1109/CLOUDCOM.2015.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/RahulamathavanR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/EdenBBCJSS15,
  author       = {Peter Eden and
                  Andrew Blyth and
                  Pete Burnap and
                  Yulia Cherdantseva and
                  Kevin Jones and
                  Hugh Soulsby and
                  Kristan Stoddart},
  editor       = {Erich Rome and
                  Marianthi Theocharidou and
                  Stephen D. Wolthusen},
  title        = {A Cyber Forensic Taxonomy for {SCADA} Systems in Critical Infrastructure},
  booktitle    = {Critical Information Infrastructures Security - 10th International
                  Conference, {CRITIS} 2015, Berlin, Germany, October 5-7, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9578},
  pages        = {27--39},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-33331-1\_3},
  doi          = {10.1007/978-3-319-33331-1\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/EdenBBCJSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/AwanBRJ15,
  author       = {Malik Shahzad Kaleem Awan and
                  Pete Burnap and
                  Omer F. Rana and
                  Amir Javed},
  title        = {Continuous Monitoring and Assessment of Cybersecurity Risks in Large
                  Computing Infrastructures},
  booktitle    = {17th {IEEE} International Conference on High Performance Computing
                  and Communications, {HPCC} 2015, 7th {IEEE} International Symposium
                  on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International
                  Conference on Embedded Software and Systems, {ICESS} 2015, New York,
                  NY, USA, August 24-26, 2015},
  pages        = {1442--1447},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.224},
  doi          = {10.1109/HPCC-CSS-ICESS.2015.224},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/AwanBRJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ht/BurnapCS15,
  author       = {Pete Burnap and
                  Gualtiero Colombo and
                  Jonathan Scourfield},
  editor       = {Yeliz Yesilada and
                  Rosta Farzan and
                  Geert{-}Jan Houben},
  title        = {Machine Classification and Analysis of Suicide-Related Communication
                  on Twitter},
  booktitle    = {Proceedings of the 26th {ACM} Conference on Hypertext {\&} Social
                  Media, {HT} 2015, Guzelyurt, TRNC, Cyprus, September 1-4, 2015},
  pages        = {75--84},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2700171.2791023},
  doi          = {10.1145/2700171.2791023},
  timestamp    = {Thu, 30 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ht/BurnapCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/EdenBBJS15,
  author       = {Peter Eden and
                  Andrew Blyth and
                  Pete Burnap and
                  Kevin Jones and
                  Kristan Stoddart},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {A Forensic Taxonomy of {SCADA} Systems and Approach to Incident Response},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.5},
  doi          = {10.14236/EWIC/ICS2015.5},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/EdenBBJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iot360/WangRJSBRG15,
  author       = {Meisong Wang and
                  Rajiv Ranjan and
                  Prem Prakash Jayaraman and
                  Peter Strazdins and
                  Pete Burnap and
                  Omer F. Rana and
                  Dimitrios Georgakopoulos},
  editor       = {Benny Mandler and
                  Johann M{\'{a}}rquez{-}Barja and
                  Miguel Elias Mitre Campista and
                  Dagmar Cag{\'{a}}nov{\'{a}} and
                  Hakima Chaouchi and
                  Sherali Zeadally and
                  Mohamad Badra and
                  Stefano Giordano and
                  Maria Fazio and
                  Andrey Somov and
                  Radu{-}Laurentiu Vieriu},
  title        = {A Case for Understanding End-to-End Performance of Topic Detection
                  and Tracking Based Big Data Applications in the Cloud},
  booktitle    = {Internet of Things. IoT Infrastructures - Second International Summit,
                  IoT 360{\textdegree} 2015, Rome, Italy, October 27-29, 2015, Revised
                  Selected Papers, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {169},
  pages        = {315--325},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-47063-4\_33},
  doi          = {10.1007/978-3-319-47063-4\_33},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iot360/WangRJSBRG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/AwanBR15,
  author       = {Malik Shahzad Kaleem Awan and
                  Pete Burnap and
                  Omer F. Rana},
  editor       = {Ehab Al{-}Shaer and
                  Christopher S. Oehmen and
                  Mohammad Ashiqur Rahman},
  title        = {Estimating Risk Boundaries for Persistent and Stealthy Cyber-Attacks},
  booktitle    = {Proceedings of the 2015 Workshop on Automated Decision Making for
                  Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October
                  12, 2015},
  pages        = {15--20},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2809826.2809830},
  doi          = {10.1145/2809826.2809830},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/AwanBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AwanAABR15,
  author       = {Malik S. K. Awan and
                  Mohammed A. AlGhamdi and
                  Sultan H. Almotiri and
                  Pete Burnap and
                  Omer F. Rana},
  editor       = {Oleg B. Makarevich and
                  Ron Poet and
                  Atilla El{\c{c}}i and
                  Manoj Singh Gaur and
                  Mehmet A. Orgun and
                  Ludmila K. Babenko and
                  Md. Sadek Ferdous and
                  Anthony T. S. Ho and
                  Vijay Laxmi and
                  Josef Pieprzyk},
  title        = {A classification framework for distinct cyber-attacks based on occurrence
                  patterns},
  booktitle    = {Proceedings of the 8th International Conference on Security of Information
                  and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10,
                  2015},
  pages        = {165--168},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2799979.2800037},
  doi          = {10.1145/2799979.2800037},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AwanAABR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/websci/SowriraghavanB15,
  author       = {Abinaya Sowriraghavan and
                  Pete Burnap},
  editor       = {David De Roure and
                  Pete Burnap and
                  Susan Halford},
  title        = {Prediction of Malware Propagation and Links within Communities in
                  Social Media Based Events},
  booktitle    = {Proceedings of the {ACM} Web Science Conference, WebSci 2015, Oxford,
                  United Kingdom, June 28 - July 1, 2015},
  pages        = {59:1--59:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2786451.2786494},
  doi          = {10.1145/2786451.2786494},
  timestamp    = {Sat, 24 Nov 2018 11:59:52 +0100},
  biburl       = {https://dblp.org/rec/conf/websci/SowriraghavanB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/websci/WebbJSHEWPRB15,
  author       = {Helena Webb and
                  Marina Jirotka and
                  Bernd Carsten Stahl and
                  William Housley and
                  Adam Edwards and
                  Matthew L. Williams and
                  Rob Procter and
                  Omer F. Rana and
                  Pete Burnap},
  editor       = {David De Roure and
                  Pete Burnap and
                  Susan Halford},
  title        = {'Digital Wildfires': a challenge to the governance of social media?},
  booktitle    = {Proceedings of the {ACM} Web Science Conference, WebSci 2015, Oxford,
                  United Kingdom, June 28 - July 1, 2015},
  pages        = {64:1--64:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2786451.2786929},
  doi          = {10.1145/2786451.2786929},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/websci/WebbJSHEWPRB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/insci/2015,
  editor       = {Thanassis Tiropanis and
                  Athena Vakali and
                  Laura Sartori and
                  Pete Burnap},
  title        = {Internet Science - Second International Conference, {INSCI} 2015,
                  Brussels, Belgium, May 27-29, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9089},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18609-2},
  doi          = {10.1007/978-3-319-18609-2},
  isbn         = {978-3-319-18608-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/insci/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/websci/2015,
  editor       = {David De Roure and
                  Pete Burnap and
                  Susan Halford},
  title        = {Proceedings of the {ACM} Web Science Conference, WebSci 2015, Oxford,
                  United Kingdom, June 28 - July 1, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2786451},
  doi          = {10.1145/2786451},
  isbn         = {978-1-4503-3672-7},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/websci/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BurnapGSSW15,
  author       = {Pete Burnap and
                  Rachel Gibson and
                  Luke Sloan and
                  Rosalynd Southern and
                  Matthew L. Williams},
  title        = {140 Characters to Victory?: Using Twitter to Predict the {UK} 2015
                  General Election},
  journal      = {CoRR},
  volume       = {abs/1505.01511},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.01511},
  eprinttype    = {arXiv},
  eprint       = {1505.01511},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BurnapGSSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bigdatasociety/HousleyPEBWSRMVG14,
  author       = {William Housley and
                  Rob Procter and
                  Adam Edwards and
                  Peter Burnap and
                  Matthew L. Williams and
                  Luke Sloan and
                  Omer F. Rana and
                  Jeffrey Morgan and
                  Alex Voss and
                  Anita Greenhill},
  title        = {Big and broad social data and the sociological imagination: {A} collaborative
                  response},
  journal      = {Big Data Soc.},
  volume       = {1},
  number       = {2},
  pages        = {205395171454513},
  year         = {2014},
  url          = {https://doi.org/10.1177/2053951714545135},
  doi          = {10.1177/2053951714545135},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bigdatasociety/HousleyPEBWSRMVG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/BurnapWSRHEKPV14,
  author       = {Pete Burnap and
                  Matthew L. Williams and
                  Luke Sloan and
                  Omer F. Rana and
                  William Housley and
                  Adam Edwards and
                  Vincent A. Knight and
                  Rob Procter and
                  Alex Voss},
  title        = {Tweeting the terror: modelling the social media reaction to the Woolwich
                  terrorist attack},
  journal      = {Soc. Netw. Anal. Min.},
  volume       = {4},
  number       = {1},
  pages        = {206},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13278-014-0206-4},
  doi          = {10.1007/S13278-014-0206-4},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/snam/BurnapWSRHEKPV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/BurnapRPB14,
  author       = {Pete Burnap and
                  Omer F. Rana and
                  Nargis Pauran and
                  Phil Bowen},
  title        = {Towards Real-Time Probabilistic Risk Assessment by Sensing Disruptive
                  Events from Streamed News Feeds},
  booktitle    = {Eighth International Conference on Complex, Intelligent and Software
                  Intensive Systems, {CISIS} 2014, Birmingham, UK, July 2-4, 2014},
  pages        = {608--613},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISIS.2014.87},
  doi          = {10.1109/CISIS.2014.87},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisis/BurnapRPB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/RahulamathavanPBRRS14,
  author       = {Yogachandran Rahulamathavan and
                  Pramod S. Pawar and
                  Pete Burnap and
                  Muttukrishnan Rajarajan and
                  Omer F. Rana and
                  George Spanoudakis},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Analysing Security requirements in Cloud-based Service Level Agreements},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {73},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659735},
  doi          = {10.1145/2659651.2659735},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/RahulamathavanPBRRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/ConejeroBRM13,
  author       = {Javier Conejero and
                  Pete Burnap and
                  Omer F. Rana and
                  Jeffrey Morgan},
  title        = {Scaling Archived Social Media Data Analysis Using a Hadoop Cloud},
  booktitle    = {2013 {IEEE} Sixth International Conference on Cloud Computing, Santa
                  Clara, CA, USA, June 28 - July 3, 2013},
  pages        = {685--692},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CLOUD.2013.120},
  doi          = {10.1109/CLOUD.2013.120},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/ConejeroBRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/ConejeroRBMCC13,
  author       = {Javier Conejero and
                  Omer F. Rana and
                  Pete Burnap and
                  Jeffrey Morgan and
                  Carmen Carri{\'{o}}n and
                  Mar{\'{\i}}a Blanca Caminero},
  editor       = {Fr{\'{e}}d{\'{e}}ric Desprez and
                  Donald Ferguson and
                  Ethan Hadar and
                  Frank Leymann and
                  Matthias Jarke and
                  Markus Helfert},
  title        = {Characterising the Power Consumption of Hadoop Clouds - {A} Social
                  Media Analysis Case Study},
  booktitle    = {{CLOSER} 2013 - Proceedings of the 3rd International Conference on
                  Cloud Computing and Services Science, Aachen, Germany, 8-10 May, 2013},
  pages        = {233--243},
  publisher    = {SciTePress},
  year         = {2013},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/closer/ConejeroRBMCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/BurnapSGHRE12,
  author       = {Pete Burnap and
                  Irena Spasic and
                  W. Alex Gray and
                  Jeremy Hilton and
                  Omer F. Rana and
                  Glyn Elwyn},
  editor       = {Waleed W. Smari and
                  Geoffrey Charles Fox},
  title        = {Protecting patient privacy in distributed collaborative healthcare
                  environments by retaining access control of shared information},
  booktitle    = {2012 International Conference on Collaboration Technologies and Systems,
                  {CTS} 2012, Denver, CO, USA, May 21-25, 2012},
  pages        = {490--497},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CTS.2012.6261095},
  doi          = {10.1109/CTS.2012.6261095},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cts/BurnapSGHRE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Burnap09,
  author       = {Peter Richard Burnap},
  title        = {Advanced access control in support and distributed collaborative working
                  and de-perimeterization},
  school       = {Cardiff University, {UK}},
  year         = {2009},
  url          = {http://orca.cf.ac.uk/55019/},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Burnap09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icds/BurnapH09,
  author       = {Pete Burnap and
                  Jeremy Hilton},
  title        = {Self Protecting Data for De-perimeterised Information Sharing},
  booktitle    = {Third International Conference on the Digital Society {(ICDS} 2009),
                  February 1-7, 2009, Cancun, Mexico},
  pages        = {65--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICDS.2009.41},
  doi          = {10.1109/ICDS.2009.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icds/BurnapH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/PahwaBGM06,
  author       = {Jaspreet Singh Pahwa and
                  Pete Burnap and
                  W. A. Gray and
                  John C. Miles},
  editor       = {St{\'{e}}phane Bressan and
                  Josef K{\"{u}}ng and
                  Roland R. Wagner},
  title        = {{MDSSF} - {A} Federated Architecture for Product Procurement},
  booktitle    = {Database and Expert Systems Applications, 17th International Conference,
                  {DEXA} 2006, Krak{\'{o}}w, Poland, September 4-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4080},
  pages        = {812--821},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11827405\_79},
  doi          = {10.1007/11827405\_79},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/PahwaBGM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip5-5/JoitaRBPGM04,
  author       = {Liviu Joita and
                  Omer F. Rana and
                  Pete Burnap and
                  Jaspreet Singh Pahwa and
                  W. A. Gray and
                  John C. Miles},
  editor       = {Luis M. Camarinha{-}Matos},
  title        = {A Grid-Enabled Security Framework for Collaborative Virtual Organisations},
  booktitle    = {Virtual Enterprises and Collaborative Networks, {IFIP} 18th World
                  Computer Congress, {TC5} / {WG5.5} - 5th Working Conference on Virtual
                  Enterprises, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {149},
  pages        = {415--422},
  publisher    = {Kluwer/springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8139-1\_44},
  doi          = {10.1007/1-4020-8139-1\_44},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip5-5/JoitaRBPGM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics