<?xml version="1.0"?>
<dblpperson name="Pete Burnap" pid="80/305" n="139">
<person key="homepages/80/305" mdate="2023-12-07">
<author pid="80/305">Pete Burnap</author>
<author pid="80/305">Peter Burnap</author>
<author pid="80/305">Peter Richard Burnap</author>
<note type="affiliation">Cardiff University, UK</note>
<url>http://burnap.org/</url>
<url>https://dl.acm.org/profile/81414621356</url>
<url>https://orcid.org/0000-0003-0396-633X</url>
<url>https://www.wikidata.org/entity/Q47813333</url>
<url>https://ieeexplore.ieee.org/author/37085505671</url>
</person>
<r><article key="journals/csur/VyasMB26" mdate="2026-02-03">
<author orcid="0000-0002-5603-6868" pid="342/2936">Sanyam Vyas</author>
<author orcid="0000-0003-2667-5906" pid="154/8074">Vasilios Mavroudis</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<title>Towards the Deployment of Realistic Autonomous Cyber Network Defence: A Systematic Review.</title>
<pages>5:1-5:36</pages>
<year>2026</year>
<month>January</month>
<volume>58</volume>
<journal>ACM Comput. Surv.</journal>
<number>1</number>
<ee>https://doi.org/10.1145/3729213</ee>
<url>db/journals/csur/csur58.html#VyasMB26</url>
<stream>streams/journals/csur</stream>
</article>
</r>
<r><inproceedings key="conf/aaai/VyasCHBM26" mdate="2026-03-25">
<author pid="342/2936">Sanyam Vyas</author>
<author pid="274/2818">Alberto Caron</author>
<author pid="262/6509">Chris Hicks</author>
<author pid="80/305">Pete Burnap</author>
<author pid="154/8074">Vasilios Mavroudis</author>
<title>Beyond Training-time Poisoning: Component-level and Post-training Backdoors in Deep Reinforcement Learning.</title>
<pages>26072-26080</pages>
<year>2026</year>
<booktitle>AAAI</booktitle>
<ee type="oa">https://doi.org/10.1609/aaai.v40i31.39809</ee>
<crossref>conf/aaai/2026</crossref>
<url>db/conf/aaai/aaai2026.html#VyasCHBM26</url>
</inproceedings>
</r>
<r><article key="journals/ijcip/MohammedARBH25" mdate="2025-05-31">
<author orcid="0000-0001-7505-7835" pid="191/2084">Abubakar Sadiq Mohammed</author>
<author orcid="0000-0002-5274-0727" pid="218/8785">Eirini Anthi</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="80/305">Pete Burnap</author>
<author pid="359/6260">Andrew Hood</author>
<title>STADe: An unsupervised time-windows method of detecting anomalies in oil and gas Industrial Cyber-Physical Systems (ICPS) networks.</title>
<pages>100762</pages>
<year>2025</year>
<volume>49</volume>
<journal>Int. J. Crit. Infrastructure Prot.</journal>
<ee>https://doi.org/10.1016/j.ijcip.2025.100762</ee>
<url>db/journals/ijcip/ijcip49.html#MohammedARBH25</url>
<stream>streams/journals/ijcip</stream>
</article>
</r>
<r><article key="journals/informatics/WilliamsKB25" mdate="2025-05-09">
<author orcid="0000-0002-3794-6145" pid="167/1910">Lowri Williams</author>
<author orcid="0009-0009-7917-0486" pid="154/1636">Hamza Khan</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<title>The Evolution of Digital Security by Design Using Temporal Network Analysis.</title>
<pages>8</pages>
<year>2025</year>
<volume>12</volume>
<journal>Informatics</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.3390/informatics12010008</ee>
<url>db/journals/informatics/informatics12.html#WilliamsKB25</url>
<stream>streams/journals/informatics</stream>
</article>
</r>
<r><article key="journals/informatics/WilliamsB25" mdate="2025-11-06">
<author orcid="0000-0002-3794-6145" pid="167/1910">Lowri Williams</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<title>The Emotional Landscape of Technological Innovation: A Data-Driven Case Study of ChatGPT's Launch.</title>
<pages>58</pages>
<year>2025</year>
<volume>12</volume>
<journal>Informatics</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.3390/informatics12030058</ee>
<url>db/journals/informatics/informatics12.html#WilliamsB25</url>
<stream>streams/journals/informatics</stream>
</article>
</r>
<r><article key="journals/iotj/KayanHRBP25" mdate="2025-08-09">
<author orcid="0000-0002-4878-2326" pid="225/3270">Hakan Kayan</author>
<author pid="123/9730">Ryan Heartfield</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer Rana 0001</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author pid="115/6940">Charith Perera</author>
<title>Real-Time Anomaly Detection for Industrial Robotic Arms Using Edge Computing.</title>
<pages>29696-29712</pages>
<year>2025</year>
<month>aug1</month>
<volume>12</volume>
<journal>IEEE Internet Things J.</journal>
<number>15</number>
<ee>https://doi.org/10.1109/JIOT.2025.3569780</ee>
<url>db/journals/iotj/iotj12.html#KayanHRBP25</url>
<stream>streams/journals/iotj</stream>
</article>
</r>
<r><article key="journals/istr/IeropoulosASBMKC25" mdate="2025-08-09">
<author orcid="0009-0002-0196-6571" pid="371/2359">Vasilis Ieropoulos</author>
<author orcid="0000-0002-5274-0727" pid="218/8785">Eirini Anthi</author>
<author orcid="0000-0001-7575-9909" pid="22/10667">Theodoros Spyridopoulos</author>
<author pid="80/305">Pete Burnap</author>
<author orcid="0000-0002-3309-132X" pid="195/6027">Ioannis Mavromatis</author>
<author orcid="0000-0002-3573-6240" pid="23/8192-1">Aftab Khan 0001</author>
<author orcid="0000-0002-4993-5873" pid="195/8133">Pietro Carnelli</author>
<title>Collaborative intrusion detection in resource-constrained IoT environments: Challenges, methods, and future directions a review.</title>
<pages>104127</pages>
<year>2025</year>
<volume>93</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee>https://doi.org/10.1016/j.jisa.2025.104127</ee>
<url>db/journals/istr/istr93.html#IeropoulosASBMKC25</url>
<stream>streams/journals/istr</stream>
</article>
</r>
<r><inproceedings key="conf/bcca/AwanK0B25" mdate="2026-03-24">
<author pid="43/531">Malik Shahzad Kaleem Awan</author>
<author pid="84/6980">Vincent A. Knight</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer Rana 0001</author>
<author pid="80/305">Pete Burnap</author>
<title>Modelling Spatio-Temporal Progression of Cyberattacks in Data Networks.</title>
<pages>882-888</pages>
<year>2025</year>
<booktitle>BCCA</booktitle>
<ee>https://doi.org/10.1109/BCCA66705.2025.11229708</ee>
<crossref>conf/bcca/2025</crossref>
<url>db/conf/bcca/bcca2025.html#AwanK0B25</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2505-16398" mdate="2025-06-25">
<author pid="168/4381">Peter Maynard 0001</author>
<author pid="118/7522">Yulia Cherdantseva</author>
<author pid="224/5770">Avi Shaked</author>
<author pid="80/305">Pete Burnap</author>
<author pid="185/3015">Arif Mehmood</author>
<title>Consistent and Compatible Modelling of Cyber Intrusions and Incident Response Demonstrated in the Context of Malware Attacks on Critical Infrastructure.</title>
<year>2025</year>
<month>May</month>
<volume>abs/2505.16398</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2505.16398</ee>
<url>db/journals/corr/corr2505.html#abs-2505-16398</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2507-04883" mdate="2025-08-12">
<author pid="342/2936">Sanyam Vyas</author>
<author pid="274/2818">Alberto Caron</author>
<author pid="262/6509">Chris Hicks</author>
<author pid="80/305">Pete Burnap</author>
<author pid="154/8074">Vasilios Mavroudis</author>
<title>Beyond Training-time Poisoning: Component-level and Post-training Backdoors in Deep Reinforcement Learning.</title>
<year>2025</year>
<month>July</month>
<volume>abs/2507.04883</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2507.04883</ee>
<url>db/journals/corr/corr2507.html#abs-2507-04883</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/bdcc/WilliamsAB24" mdate="2024-05-31">
<author orcid="0000-0002-3794-6145" pid="167/1910">Lowri Williams</author>
<author orcid="0000-0002-5274-0727" pid="218/8785">Eirini Anthi</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<title>Comparing Hierarchical Approaches to Enhance Supervised Emotive Text Classification.</title>
<pages>38</pages>
<year>2024</year>
<month>April</month>
<volume>8</volume>
<journal>Big Data Cogn. Comput.</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.3390/bdcc8040038</ee>
<url>db/journals/bdcc/bdcc8.html#WilliamsAB24</url>
</article>
</r>
<r><article key="journals/bdcc/WilliamsAAB24" mdate="2024-07-19">
<author orcid="0000-0002-3794-6145" pid="167/1910">Lowri Williams</author>
<author orcid="0000-0002-5274-0727" pid="218/8785">Eirini Anthi</author>
<author orcid="0000-0002-2517-845X" pid="367/4132">Laura Arman</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<title>Topic Modelling: Going beyond Token Outputs.</title>
<pages>44</pages>
<year>2024</year>
<volume>8</volume>
<journal>Big Data Cogn. Comput.</journal>
<number>5</number>
<ee type="oa">https://doi.org/10.3390/bdcc8050044</ee>
<url>db/journals/bdcc/bdcc8.html#WilliamsAAB24</url>
</article>
</r>
<r><article key="journals/iet-cps/RotibiSB24" mdate="2025-05-31">
<author orcid="0000-0001-6732-6070" pid="345/7396">Ayodeji O. Rotibi</author>
<author orcid="0000-0002-6437-0807" pid="122/2037">Neetesh Saxena</author>
<author pid="80/305">Pete Burnap</author>
<title>Winning the battle with cyber risk identification tools in industrial control systems: A review.</title>
<pages>350-365</pages>
<year>2024</year>
<volume>9</volume>
<journal>IET Cyper-Phys. Syst.: Theory &#38; Appl.</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.1049/cps2.12105</ee>
<url>db/journals/iet-cps/iet-cps9.html#RotibiSB24</url>
<stream>streams/journals/iet-cps</stream>
</article>
</r>
<r><article key="journals/information/WilliamsAB24" mdate="2024-05-04">
<author orcid="0000-0002-3794-6145" pid="167/1910">Lowri Williams</author>
<author orcid="0000-0002-5274-0727" pid="218/8785">Eirini Anthi</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<title>A Scalable and Automated Framework for Tracking the Likely Adoption of Emerging Technologies.</title>
<pages>237</pages>
<year>2024</year>
<month>April</month>
<volume>15</volume>
<journal>Inf.</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.3390/info15040237</ee>
<url>db/journals/information/information15.html#WilliamsAB24</url>
</article>
</r>
<r><article key="journals/information/WilliamsAB24a" mdate="2026-01-02">
<author orcid="0000-0002-3794-6145" pid="167/1910">Lowri Williams</author>
<author orcid="0000-0002-5274-0727" pid="218/8785">Eirini Anthi</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<title>Uncovering Key Factors That Drive the Impressions of Online Emerging Technology Narratives.</title>
<pages>706</pages>
<year>2024</year>
<volume>15</volume>
<journal>Inf.</journal>
<number>11</number>
<ee type="oa">https://doi.org/10.3390/info15110706</ee>
<url>db/journals/information/information15.html#WilliamsAB24a</url>
<stream>streams/journals/information</stream>
</article>
</r>
<r><article key="journals/jocsap/BurnapARWCAJ24" mdate="2024-08-22">
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0002-5274-0727" pid="218/8785">Eirini Anthi</author>
<author pid="42/5902">Philipp Reinecke</author>
<author orcid="0000-0002-3794-6145" pid="167/1910">Lowri Williams</author>
<author pid="382/7348">Fengnian Cao</author>
<author pid="222/6122">Rakan Aldmour</author>
<author pid="45/5883">Kevin Jones</author>
<title>Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals.</title>
<pages>340-356</pages>
<year>2024</year>
<month>June</month>
<volume>4</volume>
<journal>J. Cybersecur. Priv.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.3390/jcp4020017</ee>
<url>db/journals/jocsap/jocsap4.html#BurnapARWCAJ24</url>
<stream>streams/journals/jocsap</stream>
</article>
</r>
<r><article key="journals/tiot/KayanHRBP24" mdate="2025-01-19">
<author orcid="0000-0002-4878-2326" pid="225/3270">Hakan Kayan</author>
<author orcid="0000-0002-3708-1540" pid="123/9730">Ryan Heartfield</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0002-0190-3346" pid="115/6940">Charith Perera</author>
<title>CASPER: Context-Aware IoT Anomaly Detection System for Industrial Robotic Arms.</title>
<pages>18:1-18:36</pages>
<year>2024</year>
<month>August</month>
<volume>5</volume>
<journal>ACM Trans. Internet Things</journal>
<number>3</number>
<ee>https://doi.org/10.1145/3670414</ee>
<ee>https://www.wikidata.org/entity/Q130805128</ee>
<url>db/journals/tiot/tiot5.html#KayanHRBP24</url>
<stream>streams/journals/tiot</stream>
</article>
</r>
<r><inproceedings key="conf/csr2/AlrowailiSB24" mdate="2025-10-14">
<author pid="357/7515">Yazeed Alrowaili</author>
<author orcid="0000-0002-6437-0807" pid="122/2037">Neetesh Saxena</author>
<author pid="80/305">Pete Burnap</author>
<title>Towards Developing an Asset-Criticality Identification Framework in Smart Grids.</title>
<pages>720-725</pages>
<year>2024</year>
<booktitle>CSR</booktitle>
<ee>https://doi.org/10.1109/CSR61664.2024.10679477</ee>
<crossref>conf/csr2/2024</crossref>
<url>db/conf/csr2/csr2024.html#AlrowailiSB24</url>
<stream>streams/conf/csr2</stream>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2401-12990" mdate="2024-02-05">
<author pid="167/1910">Lowri Williams</author>
<author pid="218/8785">Eirini Anthi</author>
<author pid="367/4132">Laura Arman</author>
<author pid="80/305">Pete Burnap</author>
<title>Topic Modelling: Going Beyond Token Outputs.</title>
<year>2024</year>
<volume>abs/2401.12990</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2401.12990</ee>
<url>db/journals/corr/corr2401.html#abs-2401-12990</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2402-01670" mdate="2024-02-09">
<author pid="167/1910">Lowri Williams</author>
<author pid="218/8785">Eirini Anthi</author>
<author pid="80/305">Pete Burnap</author>
<title>A Scalable and Automated Framework for Tracking the likely Adoption of Emerging Technologies.</title>
<year>2024</year>
<volume>abs/2402.01670</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2402.01670</ee>
<url>db/journals/corr/corr2402.html#abs-2402-01670</url>
</article>
</r>
<r><article key="journals/access/RotibiSBT23" mdate="2025-10-14">
<author orcid="0000-0001-6732-6070" pid="345/7396">Ayodeji O. Rotibi</author>
<author orcid="0000-0002-6437-0807" pid="122/2037">Neetesh Saxena</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author pid="278/2409">Alex Tarter</author>
<title>Extended Dependency Modeling Technique for Cyber Risk Identification in ICS.</title>
<pages>37229-37242</pages>
<year>2023</year>
<volume>11</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2023.3263671</ee>
<url>db/journals/access/access11.html#RotibiSBT23</url>
</article>
</r>
<r><article key="journals/compsec/AgyepongCRB23" mdate="2024-12-09">
<author orcid="0000-0003-3280-1745" pid="270/6165">Enoch Agyepong</author>
<author pid="118/7522">Yulia Cherdantseva</author>
<author pid="42/5902">Philipp Reinecke</author>
<author pid="80/305">Pete Burnap</author>
<title>A systematic method for measuring the performance of a cyber security operations centre analyst.</title>
<pages>102959</pages>
<year>2023</year>
<volume>124</volume>
<journal>Comput. Secur.</journal>
<ee type="oa">https://doi.org/10.1016/j.cose.2022.102959</ee>
<ee>https://www.wikidata.org/entity/Q115045702</ee>
<url>db/journals/compsec/compsec124.html#AgyepongCRB23</url>
</article>
</r>
<r><article key="journals/compsec/MohammedARSB23" mdate="2024-12-09">
<author orcid="0000-0001-7505-7835" pid="191/2084">Abubakar Sadiq Mohammed</author>
<author orcid="0000-0002-5274-0727" pid="218/8785">Eirini Anthi</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author orcid="0000-0002-6437-0807" pid="122/2037">Neetesh Saxena</author>
<author pid="80/305">Pete Burnap</author>
<title>Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication.</title>
<pages>103007</pages>
<year>2023</year>
<volume>124</volume>
<journal>Comput. Secur.</journal>
<ee type="oa">https://doi.org/10.1016/j.cose.2022.103007</ee>
<url>db/journals/compsec/compsec124.html#MohammedARSB23</url>
</article>
</r>
<r><article key="journals/compsec/ShakedCBM23" mdate="2024-02-05">
<author orcid="0000-0001-7976-1942" pid="224/5770">Avi Shaked</author>
<author orcid="0000-0002-3527-1121" pid="118/7522">Yulia Cherdantseva</author>
<author pid="80/305">Pete Burnap</author>
<author orcid="0000-0002-6267-7530" pid="168/4381">Peter Maynard 0001</author>
<title>Operations-informed incident response playbooks.</title>
<pages>103454</pages>
<year>2023</year>
<month>November</month>
<volume>134</volume>
<journal>Comput. Secur.</journal>
<ee type="oa">https://doi.org/10.1016/j.cose.2023.103454</ee>
<url>db/journals/compsec/compsec134.html#ShakedCBM23</url>
</article>
</r>
<r><article key="journals/csur/NafeesSCGB23" mdate="2025-01-19">
<author orcid="0000-0001-8138-2140" pid="277/8167">Muhammad Nouman Nafees</author>
<author orcid="0000-0002-6437-0807" pid="122/2037">Neetesh Saxena</author>
<author orcid="0000-0002-5142-9750" pid="48/6119">Alvaro A. C&#225;rdenas</author>
<author orcid="0000-0001-8601-4662" pid="06/5639">Santiago Grijalva</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<title>Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review.</title>
<pages>215:1-215:36</pages>
<year>2023</year>
<volume>55</volume>
<journal>ACM Comput. Surv.</journal>
<number>10</number>
<ee>https://doi.org/10.1145/3565570</ee>
<ee>https://www.wikidata.org/entity/Q131123799</ee>
<url>db/journals/csur/csur55.html#NafeesSCGB23</url>
</article>
</r>
<r><article key="journals/cybersecurity/IkwuGJBW23" mdate="2023-08-31">
<author orcid="0000-0002-1700-293X" pid="212/8976">Ruth Ikwu</author>
<author pid="206/7783">Luca Giommoni</author>
<author pid="142/6631">Amir Javed</author>
<author pid="80/305">Pete Burnap</author>
<author pid="149/6839">Matthew L. Williams</author>
<title>Digital fingerprinting for identifying malicious collusive groups on Twitter.</title>
<year>2023</year>
<month>January</month>
<volume>9</volume>
<journal>J. Cybersecur.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1093/cybsec/tyad014</ee>
<url>db/journals/cybersecurity/cybersecurity9.html#IkwuGJBW23</url>
</article>
</r>
<r><article key="journals/iet-cps/AlrowailiSSCB23" mdate="2026-01-01">
<author orcid="0000-0002-3710-2612" pid="357/7515">Yazeed Alrowaili</author>
<author orcid="0000-0002-6437-0807" pid="122/2037">Neetesh Saxena</author>
<author orcid="0000-0003-3518-8018" pid="122/9959">Anurag Srivastava 0001</author>
<author orcid="0000-0002-3612-1934" pid="82/4386">Mauro Conti</author>
<author pid="80/305">Pete Burnap</author>
<title>A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification.</title>
<pages>160-185</pages>
<year>2023</year>
<month>September</month>
<volume>8</volume>
<journal>IET Cyper-Phys. Syst.: Theory &#38; Appl.</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.1049/cps2.12059</ee>
<url>db/journals/iet-cps/iet-cps8.html#AlrowailiSSCB23</url>
</article>
</r>
<r><article key="journals/tcps/AsiriSGB23" mdate="2025-01-19">
<author orcid="0009-0003-7809-3796" pid="266/8025">Mohammed Asiri</author>
<author orcid="0000-0002-6437-0807" pid="122/2037">Neetesh Saxena</author>
<author orcid="0009-0001-3715-077X" pid="88/4984">Rigel Gjomemo</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<title>Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective.</title>
<pages>15:1-15:33</pages>
<year>2023</year>
<month>April</month>
<volume>7</volume>
<journal>ACM Trans. Cyber Phys. Syst.</journal>
<number>2</number>
<ee>https://doi.org/10.1145/3587255</ee>
<ee>https://www.wikidata.org/entity/Q131120099</ee>
<url>db/journals/tcps/tcps7.html#AsiriSGB23</url>
</article>
</r>
<r><inproceedings key="conf/acns/NafeesSB23" mdate="2025-10-14">
<author pid="277/8167">Muhammad Nouman Nafees</author>
<author orcid="0000-0002-6437-0807" pid="122/2037">Neetesh Saxena</author>
<author pid="80/305">Pete Burnap</author>
<title>POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems.</title>
<pages>700-704</pages>
<year>2023</year>
<booktitle>ACNS Workshops</booktitle>
<ee>https://doi.org/10.1007/978-3-031-41181-6_43</ee>
<crossref>conf/acns/2023w</crossref>
<url>db/conf/acns/acns2023w.html#NafeesSB23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurosp/AsiriSB23" mdate="2025-10-14">
<author orcid="0009-0003-7809-3796" pid="266/8025">Mohammed Asiri</author>
<author orcid="0000-0002-6437-0807" pid="122/2037">Neetesh Saxena</author>
<author pid="80/305">Pete Burnap</author>
<title>ARCSG: Advancing Resilience of Cyber-Physical Smart Grid: An Integrated Co-Simulation Approach Incorporating Indicators of Compromise.</title>
<pages>370-378</pages>
<year>2023</year>
<booktitle>EuroS&#38;P Workshops</booktitle>
<ee>https://doi.org/10.1109/EuroSPW59978.2023.00047</ee>
<crossref>conf/eurosp/2023w</crossref>
<url>db/conf/eurosp/eurosp2023w.html#AsiriSB23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/percom/KayanRBP23" mdate="2023-06-27">
<author pid="225/3270">Hakan Kayan</author>
<author pid="r/OmerFRana">Omer F. Rana</author>
<author pid="80/305">Pete Burnap</author>
<author pid="115/6940">Charith Perera</author>
<title>Artifact: CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms.</title>
<pages>3-4</pages>
<year>2023</year>
<booktitle>PerCom Workshops</booktitle>
<ee>https://doi.org/10.1109/PerComWorkshops56833.2023.10150236</ee>
<crossref>conf/percom/2023w</crossref>
<url>db/conf/percom/percomw2023.html#KayanRBP23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/percom/KayanRBP23a" mdate="2023-06-27">
<author pid="225/3270">Hakan Kayan</author>
<author pid="r/OmerFRana">Omer F. Rana</author>
<author pid="80/305">Pete Burnap</author>
<author pid="115/6940">Charith Perera</author>
<title>CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms.</title>
<pages>282-284</pages>
<year>2023</year>
<booktitle>PerCom Workshops</booktitle>
<ee>https://doi.org/10.1109/PerComWorkshops56833.2023.10150354</ee>
<crossref>conf/percom/2023w</crossref>
<url>db/conf/percom/percomw2023.html#KayanRBP23a</url>
</inproceedings>
</r>
<r><data key="data/10/KayanRBP23" mdate="2024-06-18">
<author orcid="0000-0002-4878-2326" pid="225/3270">Hakan Kayan</author>
<author pid="r/OmerFRana">Omer Farooq Rana</author>
<author pid="80/305">Pete Burnap</author>
<author pid="115/6940">Charith Perera</author>
<title>CASPER: Context-Aware Anomaly Detection System for Industrial Robotic Arms.</title>
<year>2023</year>
<month>January</month>
<ee>https://doi.org/10.21227/q2e6-t883</ee>
<publisher>IEEE DataPort</publisher>
<stream>streams/repo/ieeedataport</stream>
</data>
</r>
<r><article publtype="informal" key="journals/corr/abs-2303-04926" mdate="2023-03-15">
<author pid="342/2936">Sanyam Vyas</author>
<author pid="342/2715">John Hannay</author>
<author pid="342/2597">Andrew Bolton</author>
<author pid="80/305">Pete Burnap</author>
<title>Automated Cyber Defence: A Review.</title>
<year>2023</year>
<volume>abs/2303.04926</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2303.04926</ee>
<url>db/journals/corr/corr2303.html#abs-2303-04926</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2310-18165" mdate="2023-11-02">
<author pid="179/9601">Baskoro Adi Pratomo</author>
<author pid="359/6048">Toby Jackson</author>
<author pid="80/305">Pete Burnap</author>
<author pid="359/6260">Andrew Hood</author>
<author pid="218/8785">Eirini Anthi</author>
<title>Enhancing Enterprise Network Security: Comparing Machine-Level and Process-Level Analysis for Dynamic Malware Detection.</title>
<year>2023</year>
<volume>abs/2310.18165</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2310.18165</ee>
<url>db/journals/corr/corr2310.html#abs-2310-18165</url>
</article>
</r>
<r><article key="journals/csur/AliwaRPB21" mdate="2022-11-23">
<author pid="263/6914">Emad Aliwa</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="115/6940">Charith Perera</author>
<author pid="80/305">Peter Burnap</author>
<title>Cyberattacks and Countermeasures for In-Vehicle Networks.</title>
<pages>21:1-21:37</pages>
<year>2022</year>
<volume>54</volume>
<journal>ACM Comput. Surv.</journal>
<number>1</number>
<ee>https://doi.org/10.1145/3431233</ee>
<url>db/journals/csur/csur54.html#AliwaRPB21</url>
</article>
</r>
<r><article key="journals/csur/KayanNRBP22" mdate="2025-01-19">
<author orcid="0000-0002-4878-2326" pid="225/3270">Hakan Kayan</author>
<author pid="250/8966">Matthew Nunes</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="80/305">Pete Burnap</author>
<author pid="115/6940">Charith Perera</author>
<title>Cybersecurity of Industrial Cyber-Physical Systems: A Review.</title>
<pages>229:1-229:35</pages>
<year>2022</year>
<month>January</month>
<volume>54</volume>
<journal>ACM Comput. Surv.</journal>
<number>11s</number>
<ee>https://doi.org/10.1145/3510410</ee>
<ee>https://www.wikidata.org/entity/Q130926988</ee>
<url>db/journals/csur/csur54.html#KayanNRBP22</url>
</article>
</r>
<r><article key="journals/istr/NunesBRL22" mdate="2025-11-02">
<author orcid="0000-0003-1990-5814" pid="250/8966">Matthew Nunes</author>
<author pid="80/305">Pete Burnap</author>
<author pid="42/5902">Philipp Reinecke</author>
<author pid="180/5583">Kaelon Lloyd</author>
<title>Bane or Boon: Measuring the effect of evasive malware on system call classifiers.</title>
<pages>103202</pages>
<year>2022</year>
<volume>67</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee type="oa">https://doi.org/10.1016/j.jisa.2022.103202</ee>
<url>db/journals/istr/istr67.html#NunesBRL22</url>
</article>
</r>
<r><article key="journals/istr/AlorainiJRB22" mdate="2025-11-02">
<author orcid="0000-0001-5494-0661" pid="332/9847">Fatimah Aloraini</author>
<author pid="142/6631">Amir Javed</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="80/305">Pete Burnap</author>
<title>Adversarial machine learning in IoT from an insider point of view.</title>
<pages>103341</pages>
<year>2022</year>
<volume>70</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee type="oa">https://doi.org/10.1016/j.jisa.2022.103341</ee>
<url>db/journals/istr/istr70.html#AlorainiJRB22</url>
</article>
</r>
<r><article key="journals/snam/AlorainyBLWG22" mdate="2025-10-14">
<author orcid="0000-0002-1342-0317" pid="229/9295">Wafa Alorainy</author>
<author pid="80/305">Pete Burnap</author>
<author orcid="0000-0002-7731-8258" pid="35/2899-2">Han Liu 0002</author>
<author pid="149/6839">Matthew L. Williams</author>
<author pid="206/7783">Luca Giommoni</author>
<title>Disrupting networks of hate: characterising hateful networks and removing critical nodes.</title>
<pages>27</pages>
<year>2022</year>
<volume>12</volume>
<journal>Soc. Netw. Anal. Min.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1007/s13278-021-00818-z</ee>
<url>db/journals/snam/snam12.html#AlorainyBLWG22</url>
</article>
</r>
<r><article key="journals/snam/JavedIBGW22" mdate="2022-10-24">
<author orcid="0000-0001-9761-0945" pid="142/6631">Amir Javed</author>
<author pid="212/8976">Ruth Ikwu</author>
<author pid="80/305">Pete Burnap</author>
<author pid="206/7783">Luca Giommoni</author>
<author pid="149/6839">Matthew L. Williams</author>
<title>Disrupting drive-by download networks on Twitter.</title>
<pages>117</pages>
<year>2022</year>
<volume>12</volume>
<journal>Soc. Netw. Anal. Min.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1007/s13278-022-00944-2</ee>
<url>db/journals/snam/snam12.html#JavedIBGW22</url>
</article>
</r>
<r><article key="journals/spe/JavedLBR22" mdate="2022-04-09">
<author orcid="0000-0001-9761-0945" pid="142/6631">Amir Javed</author>
<author orcid="0000-0002-1534-4709" pid="194/7576">Mike Lakoju</author>
<author pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<title>Security analytics for real-time forecasting of cyberattacks.</title>
<pages>788-804</pages>
<year>2022</year>
<volume>52</volume>
<journal>Softw. Pract. Exp.</journal>
<number>3</number>
<ee>https://doi.org/10.1002/spe.2822</ee>
<url>db/journals/spe/spe52.html#JavedLBR22</url>
</article>
</r>
<r><article key="journals/tcps/MohammedRBRA22" mdate="2025-01-19">
<author orcid="0000-0001-7505-7835" pid="191/2084">Abubakar Sadiq Mohammed</author>
<author orcid="0000-0002-2411-0891" pid="42/5902">Philipp Reinecke</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author orcid="0000-0002-5274-0727" pid="218/8785">Eirini Anthi</author>
<title>Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective.</title>
<pages>28:1-28:27</pages>
<year>2022</year>
<volume>6</volume>
<journal>ACM Trans. Cyber Phys. Syst.</journal>
<number>3</number>
<ee>https://doi.org/10.1145/3548691</ee>
<ee>https://www.wikidata.org/entity/Q130979714</ee>
<url>db/journals/tcps/tcps6.html#MohammedRBRA22</url>
</article>
</r>
<r><inproceedings key="conf/IEEEares/ShakedCB22" mdate="2026-02-01">
<author orcid="0000-0001-7976-1942" pid="224/5770">Avi Shaked</author>
<author pid="118/7522">Yulia Cherdantseva</author>
<author pid="80/305">Pete Burnap</author>
<title>Model-Based Incident Response Playbooks.</title>
<pages>26:1-26:7</pages>
<year>2022</year>
<booktitle>ARES</booktitle>
<ee>https://doi.org/10.1145/3538969.3538976</ee>
<crossref>conf/IEEEares/2022</crossref>
<url>db/conf/IEEEares/ares2022.html#ShakedCB22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/NafeesSB22" mdate="2022-11-08">
<author pid="277/8167">Muhammad Nouman Nafees</author>
<author pid="122/2037">Neetesh Saxena</author>
<author pid="80/305">Pete Burnap</author>
<title>Poster: Physics-Informed Augmentation for Contextual Anomaly Detection in Smart Grid.</title>
<pages>3427-3429</pages>
<year>2022</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3548606.3563533</ee>
<crossref>conf/ccs/2022</crossref>
<url>db/conf/ccs/ccs2022.html#NafeesSB22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/smartgridcomm/NafeesSB22" mdate="2025-10-14">
<author pid="277/8167">Muhammad Nouman Nafees</author>
<author orcid="0000-0002-6437-0807" pid="122/2037">Neetesh Saxena</author>
<author pid="80/305">Pete Burnap</author>
<title>On The Efficacy of Physics-Informed Context-Based Anomaly Detection for Power Systems.</title>
<pages>374-379</pages>
<year>2022</year>
<booktitle>SmartGridComm</booktitle>
<ee>https://doi.org/10.1109/SmartGridComm52983.2022.9961034</ee>
<crossref>conf/smartgridcomm/2022</crossref>
<url>db/conf/smartgridcomm/smartgridcomm2022.html#NafeesSB22</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2202-12179" mdate="2022-03-02">
<author pid="191/2084">Abubakar Sadiq Mohammed</author>
<author pid="42/5902">Philipp Reinecke</author>
<author pid="80/305">Pete Burnap</author>
<author pid="r/OmerFRana">Omer F. Rana</author>
<author pid="218/8785">Eirini Anthi</author>
<title>Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective.</title>
<year>2022</year>
<volume>abs/2202.12179</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2202.12179</ee>
<url>db/journals/corr/corr2202.html#abs-2202-12179</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2212-08141" mdate="2025-11-15">
<author orcid="0000-0001-5629-6857" pid="222/3056">Petar Radanliev</author>
<author pid="l/DDRoure">David De Roure</author>
<author pid="80/305">Pete Burnap</author>
<author pid="66/10007-2">Omar Santos 0002</author>
<title>Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things.</title>
<year>2022</year>
<volume>abs/2212.08141</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2212.08141</ee>
<url>db/journals/corr/corr2212.html#abs-2212-08141</url>
</article>
</r>
<r><article key="journals/compsec/AnthiWJB21" mdate="2023-08-28">
<author orcid="0000-0002-5274-0727" pid="218/8785">Eirini Anthi</author>
<author orcid="0000-0002-3794-6145" pid="167/1910">Lowri Williams</author>
<author orcid="0000-0001-9761-0945" pid="142/6631">Amir Javed</author>
<author pid="80/305">Pete Burnap</author>
<title>Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks.</title>
<pages>102352</pages>
<year>2021</year>
<volume>108</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2021.102352</ee>
<ee>https://www.wikidata.org/entity/Q115047897</ee>
<url>db/journals/compsec/compsec108.html#AnthiWJB21</url>
</article>
</r>
<r><article key="journals/cybersecurity/AnthiWBJ21" mdate="2021-04-07">
<author orcid="0000-0002-5274-0727" pid="218/8785">Eirini Anthi</author>
<author pid="167/1910">Lowri Williams</author>
<author pid="80/305">Pete Burnap</author>
<author pid="45/5883">Kevin Jones</author>
<title>A three-tiered intrusion detection system for industrial control systems.</title>
<year>2021</year>
<volume>7</volume>
<journal>J. Cybersecur.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1093/cybsec/tyab006</ee>
<url>db/journals/cybersecurity/cybersecurity7.html#AnthiWBJ21</url>
</article>
</r>
<r><article key="journals/diot/LakojuJRBAC21" mdate="2025-10-14">
<author pid="194/7576">Mike Lakoju</author>
<author pid="142/6631">Amir Javed</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="80/305">Pete Burnap</author>
<author pid="295/2704">Samuelson Tijesunimi Atiba</author>
<author orcid="0000-0001-6140-770X" pid="57/689">Soumaya Cherkaoui</author>
<title>&#34;Chatty Devices&#34; and edge-based activity classification.</title>
<year>2021</year>
<volume>1</volume>
<journal>Discov. Internet Things</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1007/s43926-021-00004-9</ee>
<url>db/journals/diot/diot1.html#LakojuJRBAC21</url>
</article>
</r>
<r><article key="journals/istr/AnthiWRBW21" mdate="2021-05-16">
<author orcid="0000-0002-5274-0727" pid="218/8785">Eirini Anthi</author>
<author pid="167/1910">Lowri Williams</author>
<author pid="205/2668">Matilda Rhode</author>
<author pid="80/305">Pete Burnap</author>
<author pid="168/4403">Adam Wedgbury</author>
<title>Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems.</title>
<pages>102717</pages>
<year>2021</year>
<volume>58</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee type="oa">https://doi.org/10.1016/j.jisa.2020.102717</ee>
<url>db/journals/istr/istr58.html#AnthiWRBW21</url>
</article>
</r>
<r><article key="journals/rss/RadanlievRBS21" mdate="2022-03-04">
<author orcid="0000-0001-5629-6857" pid="222/3056">Petar Radanliev</author>
<author pid="l/DDRoure">David De Roure</author>
<author pid="80/305">Pete Burnap</author>
<author pid="66/10007-2">Omar Santos 0002</author>
<title>Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things.</title>
<pages>381-411</pages>
<year>2021</year>
<volume>15</volume>
<journal>Rev. Socionetwork Strateg.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s12626-021-00086-5</ee>
<url>db/journals/rss/rss15.html#RadanlievRBS21</url>
</article>
</r>
<r><article key="journals/sensors/LakojuAKBB21" mdate="2022-12-07">
<author orcid="0000-0002-1534-4709" pid="194/7576">Mike Lakoju</author>
<author pid="186/0407">Nemitari Ajienka</author>
<author orcid="0000-0001-5583-7295" pid="91/4632">Mojtaba Ahmadieh Khanesar</author>
<author pid="80/305">Pete Burnap</author>
<author orcid="0000-0001-5818-666X" pid="16/9966">David T. Branson</author>
<title>Unsupervised Learning for Product Use Activity Recognition: An Exploratory Study of a &#34;Chatty Device&#34;.</title>
<pages>4991</pages>
<year>2021</year>
<volume>21</volume>
<journal>Sensors</journal>
<number>15</number>
<ee type="oa">https://doi.org/10.3390/s21154991</ee>
<url>db/journals/sensors/sensors21.html#LakojuAKBB21</url>
</article>
</r>
<r><inproceedings key="conf/ccs/NafeesSB21" mdate="2025-10-14">
<author pid="277/8167">Muhammad Nouman Nafees</author>
<author orcid="0000-0002-6437-0807" pid="122/2037">Neetesh Saxena</author>
<author pid="80/305">Pete Burnap</author>
<title>Optimized Predictive Control for AGC Cyber Resiliency.</title>
<pages>2450-2452</pages>
<year>2021</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3460120.3485358</ee>
<crossref>conf/ccs/2021</crossref>
<url>db/conf/ccs/ccs2021.html#NafeesSB21</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2101-03564" mdate="2022-10-02">
<author pid="225/3270">Hakan Kayan</author>
<author orcid="0000-0003-1990-5814" pid="250/8966">Matthew Nunes</author>
<author pid="r/OmerFRana">Omer F. Rana</author>
<author pid="80/305">Pete Burnap</author>
<author pid="115/6940">Charith Perera</author>
<title>Cybersecurity of Industrial Cyber-Physical Systems: A Review.</title>
<year>2021</year>
<volume>abs/2101.03564</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2101.03564</ee>
<url>db/journals/corr/corr2101.html#abs-2101-03564</url>
</article>
</r>
<r><article key="journals/computer/SaxenaTGBK20" mdate="2025-12-04">
<author orcid="0000-0002-6437-0807" pid="122/2037">Neetesh Saxena</author>
<author pid="270/6368">Ieuan Thomas</author>
<author orcid="0000-0003-2786-0273" pid="146/8257">Prosanta Gope</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0002-3020-3947" pid="04/8395">Neeraj Kumar 0001</author>
<title>PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs.</title>
<pages>29-44</pages>
<year>2020</year>
<volume>53</volume>
<journal>Computer</journal>
<number>7</number>
<ee>https://doi.org/10.1109/MC.2020.2989238</ee>
<url>db/journals/computer/computer53.html#SaxenaTGBK20</url>
</article>
</r>
<r><article key="journals/cybersec/RadanlievRPNMSM20" mdate="2023-09-30">
<author orcid="0000-0001-5629-6857" pid="222/3056">Petar Radanliev</author>
<author pid="l/DDRoure">David De Roure</author>
<author orcid="0000-0002-1668-6540" pid="42/6266">Kevin R. Page</author>
<author pid="14/4905">Jason R. C. Nurse</author>
<author pid="42/2849">Rafael Mantilla Montalvo</author>
<author pid="66/10007-2">Omar Santos 0002</author>
<author pid="238/1262">La Treall Maddox</author>
<author pid="80/305">Pete Burnap</author>
<title>Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains.</title>
<pages>13</pages>
<year>2020</year>
<volume>3</volume>
<journal>Cybersecur.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1186/s42400-020-00052-8</ee>
<url>db/journals/cybersec/cybersec3.html#RadanlievRPNMSM20</url>
</article>
</r>
<r><article key="journals/scn/PratomoBT20" mdate="2021-12-25">
<author orcid="0000-0002-1419-7073" pid="179/9601">Baskoro Adi Pratomo</author>
<author pid="80/305">Pete Burnap</author>
<author pid="47/3584">George Theodorakopoulos 0001</author>
<title>BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks.</title>
<pages>8826038:1-8826038:15</pages>
<year>2020</year>
<volume>2020</volume>
<journal>Secur. Commun. Networks</journal>
<ee type="oa">https://doi.org/10.1155/2020/8826038</ee>
<url>db/journals/scn/scn2020.html#PratomoBT20</url>
</article>
</r>
<r><article key="journals/tweb/JavedBWR20" mdate="2022-04-09">
<author orcid="0000-0001-9761-0945" pid="142/6631">Amir Javed</author>
<author pid="80/305">Pete Burnap</author>
<author pid="149/6839">Matthew L. Williams</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<title>Emotions Behind Drive-by Download Propagation on Twitter.</title>
<pages>16:1-16:26</pages>
<year>2020</year>
<volume>14</volume>
<journal>ACM Trans. Web</journal>
<number>4</number>
<ee>https://doi.org/10.1145/3408894</ee>
<url>db/journals/tweb/tweb14.html#JavedBWR20</url>
</article>
</r>
<r><inproceedings key="conf/acl-trac/LiuBAW20" mdate="2021-08-06">
<author pid="35/2899-2">Han Liu 0002</author>
<author pid="80/305">Pete Burnap</author>
<author pid="229/9295">Wafa Alorainy</author>
<author pid="149/6839">Matthew L. Williams</author>
<title>Scmhl5 at TRAC-2 Shared Task on Aggression Identification: Bert Based Ensemble Learning Approach.</title>
<pages>62-68</pages>
<year>2020</year>
<booktitle>TRAC@LREC</booktitle>
<ee type="oa">https://aclanthology.org/2020.trac-1.10/</ee>
<crossref>conf/acl-trac/2020</crossref>
<url>db/conf/acl-trac/acl-trac2020.html#LiuBAW20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/NafeesSBC20" mdate="2025-10-14">
<author pid="277/8167">Muhammad Nouman Nafees</author>
<author orcid="0000-0002-6437-0807" pid="122/2037">Neetesh Saxena</author>
<author pid="80/305">Pete Burnap</author>
<author pid="12/7884">Bong Jun Choi 0001</author>
<title>Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in Industrial Context.</title>
<pages>2117-2119</pages>
<year>2020</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3372297.3420022</ee>
<crossref>conf/ccs/2020</crossref>
<url>db/conf/ccs/ccs2020.html#NafeesSBC20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cybersecpods/AgyepongCRB20" mdate="2020-07-24">
<author pid="270/6165">Enoch Agyepong</author>
<author pid="118/7522">Yulia Cherdantseva</author>
<author pid="42/5902">Philipp Reinecke</author>
<author pid="80/305">Pete Burnap</author>
<title>Towards a Framework for Measuring the Performance of a Security Operations Center Analyst.</title>
<pages>1-8</pages>
<year>2020</year>
<booktitle>Cyber Security</booktitle>
<ee>https://doi.org/10.1109/CyberSecurity49315.2020.9138872</ee>
<crossref>conf/cybersecpods/2020</crossref>
<url>db/conf/cybersecpods/cybersecpods2020.html#AgyepongCRB20</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2004-05005" mdate="2020-04-14">
<author pid="218/8785">Eirini Anthi</author>
<author pid="167/1910">Lowri Williams</author>
<author pid="205/2668">Matilda Rhode</author>
<author pid="80/305">Pete Burnap</author>
<author pid="168/4403">Adam Wedgbury</author>
<title>Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems.</title>
<year>2020</year>
<volume>abs/2004.05005</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2004.05005</ee>
<url>db/journals/corr/corr2004.html#abs-2004-05005</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2004-10781" mdate="2022-02-02">
<author pid="263/6914">Emad Aliwa</author>
<author pid="r/OmerFRana">Omer F. Rana</author>
<author pid="115/6940">Charith Perera</author>
<author pid="80/305">Peter Burnap</author>
<title>Cyberattacks and Countermeasures For In-Vehicle Networks.</title>
<year>2020</year>
<volume>abs/2004.10781</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2004.10781</ee>
<url>db/journals/corr/corr2004.html#abs-2004-10781</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2005-12150" mdate="2025-03-03">
<author orcid="0000-0001-5629-6857" pid="222/3056">Petar Radanliev</author>
<author pid="l/DDRoure">David De Roure</author>
<author orcid="0000-0002-1668-6540" pid="42/6266">Kevin R. Page</author>
<author pid="59/1825">Max Van Kleek</author>
<author pid="42/2849">Rafael Mantilla Montalvo</author>
<author pid="66/10007-2">Omar Santos 0002</author>
<author pid="238/1262">La Treall Maddox</author>
<author pid="144/2515">Stacy Cannady</author>
<author pid="80/305">Pete Burnap</author>
<author pid="218/8785">Eirini Anthi</author>
<author pid="05/2263">Carsten Maple</author>
<title>Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics.</title>
<year>2020</year>
<volume>abs/2005.12150</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2005.12150</ee>
<url>db/journals/corr/corr2005.html#abs-2005-12150</url>
</article>
</r>
<r><article key="journals/iotj/AnthiWSTB19" mdate="2025-01-19">
<author orcid="0000-0002-5274-0727" pid="218/8785">Eirini Anthi</author>
<author orcid="0000-0002-3794-6145" pid="167/1910">Lowri Williams</author>
<author pid="251/1450">Malgorzata Slowinska</author>
<author pid="47/3584">George Theodorakopoulos 0001</author>
<author pid="80/305">Pete Burnap</author>
<title>A Supervised Intrusion Detection System for Smart Home IoT Devices.</title>
<pages>9042-9053</pages>
<year>2019</year>
<volume>6</volume>
<journal>IEEE Internet Things J.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/JIOT.2019.2926365</ee>
<ee>https://www.wikidata.org/entity/Q127524064</ee>
<url>db/journals/iotj/iotj6.html#AnthiWSTB19</url>
</article>
</r>
<r><article key="journals/ipm/JavedBR19" mdate="2025-01-19">
<author pid="142/6631">Amir Javed</author>
<author pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<title>Prediction of drive-by download attacks on Twitter.</title>
<pages>1133-1145</pages>
<year>2019</year>
<volume>56</volume>
<journal>Inf. Process. Manag.</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.1016/j.ipm.2018.02.003</ee>
<ee>https://www.wikidata.org/entity/Q130198260</ee>
<url>db/journals/ipm/ipm56.html#JavedBR19</url>
</article>
</r>
<r><article key="journals/istr/NunesBRRL19" mdate="2023-08-28">
<author orcid="0000-0003-1990-5814" pid="250/8966">Matthew Nunes</author>
<author pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="42/5902">Philipp Reinecke</author>
<author pid="180/5583">Kaelon Lloyd</author>
<title>Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis.</title>
<year>2019</year>
<volume>48</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee type="oa">https://doi.org/10.1016/j.jisa.2019.102365</ee>
<ee>https://www.wikidata.org/entity/Q115041447</ee>
<url>db/journals/istr/istr48.html#NunesBRRL19</url>
</article>
</r>
<r><article key="journals/tcss/LiuBAW19" mdate="2020-06-08">
<author orcid="0000-0002-7731-8258" pid="35/2899-2">Han Liu 0002</author>
<author pid="80/305">Pete Burnap</author>
<author pid="229/9295">Wafa Alorainy</author>
<author pid="149/6839">Matthew L. Williams</author>
<title>A Fuzzy Approach to Text Classification With Two-Stage Training for Ambiguous Instances.</title>
<pages>227-240</pages>
<year>2019</year>
<volume>6</volume>
<journal>IEEE Trans. Comput. Soc. Syst.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TCSS.2019.2892037</ee>
<url>db/journals/tcss/tcss6.html#LiuBAW19</url>
</article>
</r>
<r><article key="journals/tweb/AlorainyBLW19" mdate="2020-05-11">
<author pid="229/9295">Wafa Alorainy</author>
<author pid="80/305">Pete Burnap</author>
<author pid="35/2899-2">Han Liu 0002</author>
<author pid="149/6839">Matthew L. Williams</author>
<title>&#34;The Enemy Among Us&#34;: Detecting Cyber Hate Speech with Threats-based Othering Language Embeddings.</title>
<pages>14:1-14:26</pages>
<year>2019</year>
<volume>13</volume>
<journal>ACM Trans. Web</journal>
<number>3</number>
<ee>https://doi.org/10.1145/3324997</ee>
<url>db/journals/tweb/tweb13.html#AlorainyBLW19</url>
</article>
</r>
<r><inproceedings key="conf/dsn/RhodeTBJ19" mdate="2019-08-27">
<author pid="205/2668">Matilda Rhode</author>
<author pid="247/7448">Lewis Tuson</author>
<author pid="80/305">Pete Burnap</author>
<author pid="45/5883">Kevin Jones</author>
<title>LAB to SOC: Robust Features for Dynamic Malware Detection.</title>
<pages>13-16</pages>
<year>2019</year>
<booktitle>DSN (Industry Track)</booktitle>
<ee>https://doi.org/10.1109/DSN-Industry.2019.00010</ee>
<crossref>conf/dsn/2019i</crossref>
<url>db/conf/dsn/dsn2019i.html#RhodeTBJ19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ficloud/BaratiRTB19" mdate="2022-02-02">
<author pid="123/6730">Masoud Barati</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="47/3584">George Theodorakopoulos 0001</author>
<author pid="80/305">Peter Burnap</author>
<title>Privacy-Aware Cloud Ecosystems and GDPR Compliance.</title>
<pages>117-124</pages>
<year>2019</year>
<booktitle>FiCloud</booktitle>
<ee>https://doi.org/10.1109/FiCloud.2019.00024</ee>
<crossref>conf/ficloud/2019</crossref>
<url>db/conf/ficloud/ficloud2019.html#BaratiRTB19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tto/ProcterWBHEWJ19" mdate="2020-11-03">
<author pid="67/6530">Rob Procter</author>
<author pid="176/2531">Helena Webb</author>
<author pid="80/305">Pete Burnap</author>
<author pid="149/6789">William Housley</author>
<author pid="124/2265">Adam Edwards</author>
<author pid="149/6839">Matthew L. Williams</author>
<author pid="40/1610">Marina Jirotka</author>
<title>A Study of Cyber Hate on Twitter with Implications for Social Media Governance Strategies.</title>
<year>2019</year>
<booktitle>TTO</booktitle>
<ee type="oa">https://truthandtrustonline.com/wp-content/uploads/2019/09/paper_20.pdf</ee>
<crossref>conf/tto/2019</crossref>
<url>db/conf/tto/tto2019.html#ProcterWBHEWJ19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/www/0002BAW19" mdate="2025-10-14">
<author orcid="0000-0002-7731-8258" pid="35/2899-2">Han Liu 0002</author>
<author pid="80/305">Pete Burnap</author>
<author pid="229/9295">Wafa Alorainy</author>
<author pid="149/6839">Matthew L. Williams</author>
<title>Fuzzy Multi-task Learning for Hate Speech Type Identification.</title>
<pages>3006-3012</pages>
<year>2019</year>
<booktitle>WWW</booktitle>
<ee>https://doi.org/10.1145/3308558.3313546</ee>
<crossref>conf/www/2019</crossref>
<url>db/conf/www/www2019.html#0002BAW19</url>
</inproceedings>
</r>
<r><proceedings key="conf/sin/2019" mdate="2022-12-19">
<editor pid="53/400">Oleg B. Makarevich</editor>
<editor pid="123/6424-2">Dmitry Popov 0002</editor>
<editor pid="14/3306">Ludmila K. Babenko</editor>
<editor pid="80/305">Pete Burnap</editor>
<editor pid="e/AtillaElci">Atilla El&#231;i</editor>
<editor pid="42/7379">Ron Poet</editor>
<editor pid="61/3091">Jaideep Vaidya</editor>
<editor pid="o/MehmetAOrgun">Mehmet A. Orgun</editor>
<editor pid="80/7311">Manoj Singh Gaur</editor>
<editor pid="214/8444">Rajveer Singh Shekhawat</editor>
<title>Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019</title>
<publisher>ACM</publisher>
<booktitle>SIN</booktitle>
<year>2019</year>
<isbn>978-1-4503-7242-8</isbn>
<ee>https://doi.org/10.1145/3357613</ee>
<url>db/conf/sin/sin2019.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1902-02598" mdate="2019-05-21">
<author pid="205/2668">Matilda Rhode</author>
<author pid="80/305">Pete Burnap</author>
<author pid="45/5883">Kevin Jones</author>
<title>Dual-task agent for run-time classification and killing of malicious processes.</title>
<year>2019</year>
<volume>abs/1902.02598</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1902.02598</ee>
<url>db/journals/corr/corr1902.html#abs-1902-02598</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1903-04428" mdate="2023-09-30">
<author orcid="0000-0001-5629-6857" pid="222/3056">Petar Radanliev</author>
<author pid="l/DDRoure">David De Roure</author>
<author pid="14/4905">Jason R. C. Nurse</author>
<author pid="42/2849">Rafael Mantilla Montalvo</author>
<author pid="80/305">Peter Burnap</author>
<title>Standardisation of cyber risk impact assessment for the Internet of Things (IoT).</title>
<year>2019</year>
<volume>abs/1903.04428</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1903.04428</ee>
<url>db/journals/corr/corr1903.html#abs-1903-04428</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1903-12084" mdate="2022-03-04">
<author pid="222/3056">Petar Radanliev</author>
<author pid="l/DDRoure">David Charles De Roure</author>
<author pid="14/4905">Jason R. C. Nurse</author>
<author pid="80/305">Pete Burnap</author>
<author pid="218/8785">Eirini Anthi</author>
<author orcid="0000-0001-6064-480X" pid="238/0870">Uchenna Ani</author>
<author pid="238/1262">La Treall Maddox</author>
<author pid="66/10007-2">Omar Santos 0002</author>
<author pid="42/2849">Rafael Mantilla Montalvo</author>
<title>Definition of Internet of Things (IoT) Cyber Risk Discussion on a Transformation Roadmap for Standardisation of Regulations Risk Maturity Strategy Design and Impact Assessment.</title>
<year>2019</year>
<volume>abs/1903.12084</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1903.12084</ee>
<url>db/journals/corr/corr1903.html#abs-1903-12084</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1903-12582" mdate="2023-09-30">
<author orcid="0000-0001-5629-6857" pid="222/3056">Petar Radanliev</author>
<author pid="l/DDRoure">David Charles De Roure</author>
<author pid="14/4905">Jason R. C. Nurse</author>
<author pid="80/305">Peter Burnap</author>
<author pid="42/2849">Rafael Mantilla Montalvo</author>
<title>Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies.</title>
<year>2019</year>
<volume>abs/1903.12582</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1903.12582</ee>
<url>db/journals/corr/corr1903.html#abs-1903-12582</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1908-11732" mdate="2019-09-04">
<author pid="67/6530">Rob Procter</author>
<author pid="176/2531">Helena Webb</author>
<author pid="40/1610">Marina Jirotka</author>
<author pid="80/305">Pete Burnap</author>
<author pid="149/6789">William Housley</author>
<author pid="124/2265">Adam Edwards</author>
<author pid="149/6839">Matthew L. Williams</author>
<title>A Study of Cyber Hate on Twitter with Implications for Social Media Governance Strategies.</title>
<year>2019</year>
<volume>abs/1908.11732</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1908.11732</ee>
<url>db/journals/corr/corr1908.html#abs-1908-11732</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1911-05726" mdate="2025-04-01">
<author pid="222/3056">Petar Radanliev</author>
<author pid="l/DDRoure">David Charles De Roure</author>
<author orcid="0000-0002-1668-6540" pid="42/6266">Kevin R. Page</author>
<author pid="14/4905">Jason R. C. Nurse</author>
<author pid="42/2849">Rafael Mantilla Montalvo</author>
<author pid="66/10007-2">Omar Santos 0002</author>
<author pid="238/1262">La Treall Maddox</author>
<author pid="80/305">Peter Burnap</author>
<title>The Industrial Internet of Things in the Industry 4.0 supply chains: literature review and future trends.</title>
<year>2019</year>
<volume>abs/1911.05726</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1911.05726</ee>
<url>db/journals/corr/corr1911.html#abs-1911-05726</url>
</article>
</r>
<r><article key="journals/cii/RadanlievRNHMCB18" mdate="2025-01-19">
<author orcid="0000-0001-5629-6857" pid="222/3056">Petar Radanliev</author>
<author orcid="0000-0001-9074-3016" pid="l/DDRoure">David Charles De Roure</author>
<author pid="227/0015">Razvan Nicolescu</author>
<author pid="h/MichaelHuth">Michael Huth 0001</author>
<author pid="42/2849">Rafael Montalvo Mantilla</author>
<author pid="144/2515">Stacy Cannady</author>
<author pid="80/305">Peter Burnap</author>
<title>Future developments in cyber risk assessment for the internet of things.</title>
<pages>14-22</pages>
<year>2018</year>
<volume>102</volume>
<journal>Comput. Ind.</journal>
<ee type="oa">https://doi.org/10.1016/j.compind.2018.08.002</ee>
<ee>https://www.wikidata.org/entity/Q129370930</ee>
<url>db/journals/cii/cii102.html#RadanlievRNHMCB18</url>
</article>
</r>
<r><article key="journals/compsec/BurnapFTJ18" mdate="2023-08-28">
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author pid="189/5478">Richard French</author>
<author pid="214/9452">Frederick Turner</author>
<author pid="45/5883">Kevin Jones</author>
<title>Malware classification using self organising feature maps and machine activity data.</title>
<pages>399-410</pages>
<year>2018</year>
<volume>73</volume>
<journal>Comput. Secur.</journal>
<ee type="oa">https://doi.org/10.1016/j.cose.2017.11.016</ee>
<ee>https://www.wikidata.org/entity/Q115059816</ee>
<url>db/journals/compsec/compsec73.html#BurnapFTJ18</url>
</article>
</r>
<r><article key="journals/compsec/RhodeBJ18" mdate="2023-08-28">
<author pid="205/2668">Matilda Rhode</author>
<author pid="80/305">Pete Burnap</author>
<author pid="45/5883">Kevin Jones</author>
<title>Early-stage malware prediction using recurrent neural networks.</title>
<pages>578-594</pages>
<year>2018</year>
<volume>77</volume>
<journal>Comput. Secur.</journal>
<ee type="oa">https://doi.org/10.1016/j.cose.2018.05.010</ee>
<ee>https://www.wikidata.org/entity/Q115059622</ee>
<url>db/journals/compsec/compsec77.html#RhodeBJ18</url>
</article>
</r>
<r><article key="journals/compsec/AnthiARTB18" mdate="2023-08-28">
<author orcid="0000-0002-5274-0727" pid="218/8785">Eirini Anthi</author>
<author pid="227/0227">Shazaib Ahmad</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="47/3584">George Theodorakopoulos 0001</author>
<author pid="80/305">Pete Burnap</author>
<title>EclipseIoT: A secure and adaptive hub for the Internet of Things.</title>
<pages>477-490</pages>
<year>2018</year>
<volume>78</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2018.07.016</ee>
<ee>https://www.wikidata.org/entity/Q115059563</ee>
<url>db/journals/compsec/compsec78.html#AnthiARTB18</url>
</article>
</r>
<r><inproceedings key="conf/cybersecpods/PratomoBT18" mdate="2020-10-25">
<author orcid="0000-0002-1419-7073" pid="179/9601">Baskoro Adi Pratomo</author>
<author pid="80/305">Pete Burnap</author>
<author pid="47/3584">George Theodorakopoulos 0001</author>
<title>Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder.</title>
<pages>1-8</pages>
<year>2018</year>
<booktitle>Cyber Security</booktitle>
<ee>https://doi.org/10.1109/CyberSecPODS.2018.8560678</ee>
<crossref>conf/cybersecpods/2018</crossref>
<url>db/conf/cybersecpods/cybersecpods2018.html#PratomoBT18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icmlc/AlorainyB0JW18" mdate="2025-10-14">
<author pid="229/9295">Wafa Alorainy</author>
<author pid="80/305">Pete Burnap</author>
<author orcid="0000-0002-7731-8258" pid="35/2899-2">Han Liu 0002</author>
<author pid="142/6631">Amir Javed</author>
<author pid="149/6839">Matthew L. Williams</author>
<title>Suspended Accounts: A Source of Tweets with Disgust and Anger Emotions for Augmenting Hate Speech Data Sample.</title>
<pages>581-586</pages>
<year>2018</year>
<booktitle>ICMLC</booktitle>
<ee>https://doi.org/10.1109/ICMLC.2018.8527001</ee>
<crossref>conf/icmlc/2018</crossref>
<url>db/conf/icmlc/icmlc2018.html#AlorainyB0JW18</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1809-05229" mdate="2023-09-30">
<author orcid="0000-0001-5629-6857" pid="222/3056">Petar Radanliev</author>
<author pid="l/DDRoure">David Charles De Roure</author>
<author pid="227/0015">Razvan Nicolescu</author>
<author pid="h/MichaelHuth">Michael Huth 0001</author>
<author pid="42/2849">Rafael Montalvo Mantilla</author>
<author pid="144/2515">Stacy Cannady</author>
<author pid="80/305">Peter Burnap</author>
<title>Future developments in cyber risk assessment for the internet of things.</title>
<year>2018</year>
<volume>abs/1809.05229</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1809.05229</ee>
<url>db/journals/corr/corr1809.html#abs-1809-05229</url>
</article>
</r>
<r><article key="journals/computer/BurnapCBEJSS17" mdate="2023-06-26">
<author pid="80/305">Pete Burnap</author>
<author pid="118/7522">Yulia Cherdantseva</author>
<author pid="74/1840">Andrew Blyth</author>
<author pid="00/6761">Peter Eden</author>
<author pid="45/5883">Kevin Jones</author>
<author pid="180/0055">Hugh Soulsby</author>
<author orcid="0000-0003-4996-6482" pid="168/4393">Kristan Stoddart</author>
<title>Determining and Sharing Risk Data in Distributed Interdependent Systems.</title>
<pages>72-79</pages>
<year>2017</year>
<volume>50</volume>
<journal>Computer</journal>
<number>4</number>
<ee>https://doi.org/10.1109/MC.2017.108</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MC.2017.108</ee>
<url>db/journals/computer/computer50.html#BurnapCBEJSS17</url>
</article>
</r>
<r><article key="journals/osnm/BurnapCAHS17" mdate="2022-08-25">
<author pid="80/305">Pete Burnap</author>
<author orcid="0000-0001-5883-8517" pid="89/6497">Gualtiero Colombo 0001</author>
<author orcid="0000-0002-6636-3117" pid="228/9415">Rosie Amery</author>
<author orcid="0000-0002-4701-5643" pid="172/9808">Andrei Hodorog</author>
<author orcid="0000-0001-6218-8158" pid="167/5997">Jonathan Scourfield</author>
<title>Multi-class machine classification of suicide-related communication on Twitter.</title>
<pages>32-44</pages>
<year>2017</year>
<volume>2</volume>
<journal>Online Soc. Networks Media</journal>
<ee>https://doi.org/10.1016/j.osnem.2017.08.001</ee>
<ee>https://www.wikidata.org/entity/Q62496696</ee>
<url>db/journals/osnm/osnm2.html#BurnapCAHS17</url>
</article>
</r>
<r><article key="journals/toit/AlsaediBR17" mdate="2025-11-15">
<author orcid="0009-0007-1930-6543" pid="160/9655">Nasser Alsaedi</author>
<author pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<title>Can We Predict a Riot? Disruptive Event Detection Using Twitter.</title>
<pages>18:1-18:26</pages>
<year>2017</year>
<volume>17</volume>
<journal>ACM Trans. Internet Techn.</journal>
<number>2</number>
<ee>https://doi.org/10.1145/2996183</ee>
<url>db/journals/toit/toit17.html#AlsaediBR17</url>
</article>
</r>
<r><inproceedings key="conf/websci/WebbJSHEWPRB17" mdate="2025-03-03">
<author orcid="0000-0002-4303-7773" pid="176/2531">Helena Webb</author>
<author pid="40/1610">Marina Jirotka</author>
<author pid="64/687">Bernd Carsten Stahl</author>
<author pid="149/6789">William Housley</author>
<author pid="124/2265">Adam Edwards</author>
<author pid="149/6839">Matthew L. Williams</author>
<author orcid="0000-0001-8059-5224" pid="67/6530">Rob Procter</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="80/305">Pete Burnap</author>
<title>The Ethical Challenges of Publishing Twitter Data for Research Dissemination.</title>
<pages>339-348</pages>
<year>2017</year>
<booktitle>WebSci</booktitle>
<ee>https://doi.org/10.1145/3091478.3091489</ee>
<crossref>conf/websci/2017</crossref>
<url>db/conf/websci/websci2017.html#WebbJSHEWPRB17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wsdm/TsikrikaAKVBW17" mdate="2022-01-03">
<author orcid="0000-0003-4148-9028" pid="09/2945">Theodora Tsikrika</author>
<author pid="06/4417">Babak Akhgar</author>
<author pid="89/1496">Vasilis Katos</author>
<author orcid="0000-0002-2505-9178" pid="44/6029">Stefanos Vrochidis</author>
<author pid="80/305">Pete Burnap</author>
<author pid="149/6839">Matthew L. Williams</author>
<title>1st International Workshop on Search and Mining Terrorist Online Content &#38; Advances in Data Science for Cyber Security and Risk on the Web.</title>
<pages>823-824</pages>
<year>2017</year>
<booktitle>WSDM</booktitle>
<ee>https://doi.org/10.1145/3018661.3022760</ee>
<crossref>conf/wsdm/2017</crossref>
<url>db/conf/wsdm/wsdm2017.html#TsikrikaAKVBW17</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1708-03513" mdate="2018-08-13">
<author pid="205/2668">Matilda Rhode</author>
<author pid="80/305">Pete Burnap</author>
<author pid="45/5883">Kevin Jones</author>
<title>Early Stage Malware Prediction Using Recurrent Neural Networks.</title>
<year>2017</year>
<volume>abs/1708.03513</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1708.03513</ee>
<url>db/journals/corr/corr1708.html#abs-1708-03513</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1708-05831" mdate="2018-08-13">
<author pid="142/6631">Amir Javed</author>
<author pid="80/305">Pete Burnap</author>
<author pid="r/OmerFRana">Omer F. Rana</author>
<title>Real Time Prediction of Drive by Download Attacks on Twitter.</title>
<year>2017</year>
<volume>abs/1708.05831</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1708.05831</ee>
<url>db/journals/corr/corr1708.html#abs-1708-05831</url>
</article>
</r>
<r><article key="journals/comcom/ColomboBHS16" mdate="2020-02-20">
<author orcid="0000-0001-5883-8517" pid="89/6497">Gualtiero B. Colombo</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0002-4701-5643" pid="172/9808">Andrei Hodorog</author>
<author orcid="0000-0001-6218-8158" pid="167/5997">Jonathan Scourfield</author>
<title>Analysing the connectivity and communication of suicidal users on twitter.</title>
<pages>291-300</pages>
<year>2016</year>
<volume>73</volume>
<journal>Comput. Commun.</journal>
<ee type="oa">https://doi.org/10.1016/j.comcom.2015.07.018</ee>
<ee>https://www.wikidata.org/entity/Q36669068</ee>
<url>db/journals/comcom/comcom73.html#ColomboBHS16</url>
</article>
</r>
<r><article key="journals/compsec/CherdantsevaBBE16" mdate="2020-02-20">
<author orcid="0000-0002-3527-1121" pid="118/7522">Yulia Cherdantseva</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author pid="74/1840">Andrew Blyth</author>
<author pid="00/6761">Peter Eden</author>
<author pid="45/5883">Kevin Jones</author>
<author pid="180/0055">Hugh Soulsby</author>
<author orcid="0000-0003-4996-6482" pid="168/4393">Kristan Stoddart</author>
<title>A review of cyber security risk assessment methods for SCADA systems.</title>
<pages>1-27</pages>
<year>2016</year>
<volume>56</volume>
<journal>Comput. Secur.</journal>
<ee type="oa">https://doi.org/10.1016/j.cose.2015.09.009</ee>
<ee>https://www.wikidata.org/entity/Q57403551</ee>
<url>db/journals/compsec/compsec56.html#CherdantsevaBBE16</url>
</article>
</r>
<r><article key="journals/compsec/AwanBR16" mdate="2022-12-07">
<author orcid="0000-0002-9903-1071" pid="43/531">Malik Shahzad Kaleem Awan</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<title>Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk.</title>
<pages>31-46</pages>
<year>2016</year>
<volume>57</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2015.11.003</ee>
<ee>https://www.wikidata.org/entity/Q57403545</ee>
<url>db/journals/compsec/compsec57.html#AwanBR16</url>
</article>
</r>
<r><article key="journals/epjds/BurnapW16" mdate="2018-12-23">
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-2566-6063" pid="149/6839">Matthew L. Williams</author>
<title>Us and them: identifying cyber hate on Twitter across multiple protected characteristics.</title>
<pages>11</pages>
<year>2016</year>
<volume>5</volume>
<journal>EPJ Data Sci.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1140/epjds/s13688-016-0072-6</ee>
<ee>https://www.wikidata.org/entity/Q57403548</ee>
<url>db/journals/epjds/epjds5.html#BurnapW16</url>
</article>
</r>
<r><article key="journals/fgcs/ConejeroRBMCC16" mdate="2023-01-30">
<author orcid="0000-0001-6401-6229" pid="119/4519">Javier Conejero</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author pid="135/3234">Jeffrey Morgan</author>
<author orcid="0000-0003-3312-7393" pid="92/1280">Mar&#237;a Blanca Caminero</author>
<author orcid="0000-0003-4289-8034" pid="00/4544">Carmen Carri&#243;n 0001</author>
<title>Analyzing Hadoop power consumption and impact on application QoS.</title>
<pages>213-223</pages>
<year>2016</year>
<volume>55</volume>
<journal>Future Gener. Comput. Syst.</journal>
<ee>https://doi.org/10.1016/j.future.2015.03.009</ee>
<ee>https://www.wikidata.org/entity/Q57403553</ee>
<url>db/journals/fgcs/fgcs55.html#ConejeroRBMCC16</url>
</article>
</r>
<r><article key="journals/tois/WebbBPRSWHEJ16" mdate="2025-03-03">
<author orcid="0000-0002-4303-7773" pid="176/2531">Helena Webb</author>
<author pid="80/305">Pete Burnap</author>
<author orcid="0000-0001-8059-5224" pid="67/6530">Rob Procter</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author orcid="0000-0002-4058-4456" pid="64/687">Bernd Carsten Stahl</author>
<author pid="149/6839">Matthew L. Williams</author>
<author pid="149/6789">William Housley</author>
<author pid="124/2265">Adam Edwards</author>
<author pid="40/1610">Marina Jirotka</author>
<title>Digital Wildfires: Propagation, Verification, Regulation, and Responsible Innovation.</title>
<pages>15:1-15:23</pages>
<year>2016</year>
<volume>34</volume>
<journal>ACM Trans. Inf. Syst.</journal>
<number>3</number>
<ee>https://doi.org/10.1145/2893478</ee>
<url>db/journals/tois/tois34.html#WebbBPRSWHEJ16</url>
</article>
</r>
<r><inproceedings key="conf/ics-csr/EdenBBCJSS16" mdate="2016-09-08">
<author pid="00/6761">Peter Eden</author>
<author pid="74/1840">Andrew Blyth</author>
<author pid="80/305">Pete Burnap</author>
<author pid="118/7522">Yulia Cherdantseva</author>
<author pid="45/5883">Kevin Jones</author>
<author pid="180/0055">Hugh Soulsby</author>
<author pid="168/4393">Kristan Stoddart</author>
<title>Forensic Readiness for SCADA/ICS Incident Response.</title>
<year>2016</year>
<booktitle>ICS-CSR</booktitle>
<ee>http://ewic.bcs.org/content/ConWebDoc/56489</ee>
<crossref>conf/ics-csr/2016</crossref>
<url>db/conf/ics-csr/ics-csr2016.html#EdenBBCJSS16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icwsm/AlsaediBR16" mdate="2021-02-05">
<author pid="160/9655">Nasser Alsaedi</author>
<author pid="80/305">Pete Burnap</author>
<author pid="r/OmerFRana">Omer F. Rana</author>
<title>Automatic Summarization of Real World Events Using Twitter.</title>
<pages>511-514</pages>
<year>2016</year>
<booktitle>ICWSM</booktitle>
<ee type="oa">http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13017</ee>
<crossref>conf/icwsm/2016</crossref>
<url>db/conf/icwsm/icwsm2016.html#AlsaediBR16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icwsm/AlsaediBR16a" mdate="2021-02-05">
<author pid="160/9655">Nasser Alsaedi</author>
<author pid="80/305">Pete Burnap</author>
<author pid="r/OmerFRana">Omer F. Rana</author>
<title>Sensing Real-World Events Using Arabic Twitter Posts.</title>
<pages>515-518</pages>
<year>2016</year>
<booktitle>ICWSM</booktitle>
<ee type="oa">http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13016</ee>
<crossref>conf/icwsm/2016</crossref>
<url>db/conf/icwsm/icwsm2016.html#AlsaediBR16a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/webi/AlsaediBR16" mdate="2025-11-15">
<author orcid="0009-0007-1930-6543" pid="160/9655">Nasser Alsaedi</author>
<author pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<title>Sensing Real-World Events Using Social Media Data and a Classification-Clustering Framework.</title>
<pages>216-223</pages>
<year>2016</year>
<booktitle>WI</booktitle>
<ee>https://doi.org/10.1109/WI.2016.0039</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/WI.2016.0039</ee>
<crossref>conf/webi/2016</crossref>
<url>db/conf/webi/webi2016.html#AlsaediBR16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/webi/AlsaediBR16a" mdate="2025-11-15">
<author orcid="0009-0007-1930-6543" pid="160/9655">Nasser Alsaedi</author>
<author pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<title>Temporal TF-IDF: A High Performance Approach for Event Summarization in Twitter.</title>
<pages>515-521</pages>
<year>2016</year>
<booktitle>WI</booktitle>
<ee>https://doi.org/10.1109/WI.2016.0087</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/WI.2016.0087</ee>
<crossref>conf/webi/2016</crossref>
<url>db/conf/webi/webi2016.html#AlsaediBR16a</url>
</inproceedings>
</r>
<r><article key="journals/ijhpcn/SaidRB15" mdate="2022-04-09">
<author pid="155/4205">Taimur Al Said</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<title>VMInformant: an instrumented virtual machine to support trustworthy cloud computing.</title>
<pages>222-234</pages>
<year>2015</year>
<volume>8</volume>
<journal>Int. J. High Perform. Comput. Netw.</journal>
<number>3</number>
<ee>https://doi.org/10.1504/IJHPCN.2015.071257</ee>
<ee>https://www.wikidata.org/entity/Q57403596</ee>
<url>db/journals/ijhpcn/ijhpcn8.html#SaidRB15</url>
</article>
</r>
<r><article key="journals/paapp/BurnapRWHEMSC15" mdate="2022-04-09">
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author orcid="0000-0003-2566-6063" pid="149/6839">Matthew L. Williams</author>
<author pid="149/6789">William Housley</author>
<author orcid="0000-0002-1332-5934" pid="124/2265">Adam Edwards</author>
<author pid="135/3234">Jeffrey Morgan</author>
<author pid="149/6782">Luke Sloan</author>
<author orcid="0000-0001-6401-6229" pid="119/4519">Javier Conejero</author>
<title>COSMOS: Towards an integrated and scalable service for analysing social media on demand.</title>
<pages>80-100</pages>
<year>2015</year>
<volume>30</volume>
<journal>Int. J. Parallel Emergent Distributed Syst.</journal>
<number>2</number>
<ee>https://doi.org/10.1080/17445760.2014.902057</ee>
<ee>https://www.wikidata.org/entity/Q57403603</ee>
<url>db/journals/paapp/paapp30.html#BurnapRWHEMSC15</url>
</article>
</r>
<r><article key="journals/sigcas/WebbJSHEWPRB15" mdate="2020-04-01">
<author pid="176/2531">Helena Webb</author>
<author pid="40/1610">Marina Jirotka</author>
<author pid="64/687">Bernd Carsten Stahl</author>
<author pid="149/6789">William Housley</author>
<author pid="124/2265">Adam Edwards</author>
<author orcid="0000-0003-2566-6063" pid="149/6839">Matthew L. Williams</author>
<author pid="67/6530">Rob Procter</author>
<author pid="r/OmerFRana">Omer F. Rana</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<title>Digital wildfires: hyper-connectivity, havoc and a global ethos to govern social media.</title>
<pages>193-201</pages>
<year>2015</year>
<volume>45</volume>
<journal>SIGCAS Comput. Soc.</journal>
<number>3</number>
<ee>https://doi.org/10.1145/2874239.2874267</ee>
<ee>https://www.wikidata.org/entity/Q57403557</ee>
<url>db/journals/sigcas/sigcas45.html#WebbJSHEWPRB15</url>
</article>
</r>
<r><inproceedings key="conf/IEEEcit/AwanBR15" mdate="2022-04-09">
<author pid="43/531">Malik Shahzad Kaleem Awan</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<title>An Empirical Risk Management Framework for Monitoring Network Security.</title>
<pages>1764-1771</pages>
<year>2015</year>
<booktitle>CIT/IUCC/DASC/PICom</booktitle>
<ee>https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.266</ee>
<ee>https://www.wikidata.org/entity/Q57403562</ee>
<crossref>conf/IEEEcit/2015</crossref>
<url>db/conf/IEEEcit/cit-iucc-dasc-picom2015.html#AwanBR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asunam/AlsaediBR15" mdate="2025-11-15">
<author orcid="0009-0007-1930-6543" pid="160/9655">Nasser Alsaedi</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<title>Identifying Disruptive Events from Social Media to Enhance Situational Awareness.</title>
<pages>934-941</pages>
<year>2015</year>
<booktitle>ASONAM</booktitle>
<ee>https://doi.org/10.1145/2808797.2808879</ee>
<ee>https://www.wikidata.org/entity/Q57403588</ee>
<crossref>conf/asunam/2015</crossref>
<url>db/conf/asunam/asonam2015.html#AlsaediBR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asunam/BurnapJRA15" mdate="2024-05-07">
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author pid="142/6631">Amir Javed</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="43/531">Malik Shahzad Kaleem Awan</author>
<title>Real-time Classification of Malicious URLs on Twitter using Machine Activity Data.</title>
<pages>970-977</pages>
<year>2015</year>
<booktitle>ASONAM</booktitle>
<ee>https://doi.org/10.1145/2808797.2809281</ee>
<ee>https://www.wikidata.org/entity/Q57403594</ee>
<crossref>conf/asunam/2015</crossref>
<url>db/conf/asunam/asonam2015.html#BurnapJRA15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asunam/AlsaediB15" mdate="2025-11-15">
<author orcid="0009-0007-1930-6543" pid="160/9655">Nasser Alsaedi</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<title>Feature Extraction and Analysis for Identifying Disruptive Events from Social Media.</title>
<pages>1495-1502</pages>
<year>2015</year>
<booktitle>ASONAM</booktitle>
<ee>https://doi.org/10.1145/2808797.2808867</ee>
<ee>https://www.wikidata.org/entity/Q57403585</ee>
<crossref>conf/asunam/2015</crossref>
<url>db/conf/asunam/asonam2015.html#AlsaediB15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cicling/AlsaediB15" mdate="2025-11-15">
<author orcid="0009-0007-1930-6543" pid="160/9655">Nasser Alsaedi</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<title>Arabic Event Detection in Social Media.</title>
<pages>384-401</pages>
<year>2015</year>
<booktitle>CICLing (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-18111-0_29</ee>
<ee>https://www.wikidata.org/entity/Q57403580</ee>
<crossref>conf/cicling/2015-1</crossref>
<url>db/conf/cicling/cicling2015-1.html#AlsaediB15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cloudcom/RahulamathavanR15" mdate="2023-03-24">
<author orcid="0000-0002-1722-8621" pid="93/10585">Yogachandran Rahulamathavan</author>
<author pid="80/3898">Muttukrishnan Rajarajan</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="43/531">Malik S. K. Awan</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0002-9471-0868" pid="d/SajalKDas">Sajal K. Das 0001</author>
<title>Assessing Data Breach Risk in Cloud Systems.</title>
<pages>363-370</pages>
<year>2015</year>
<booktitle>CloudCom</booktitle>
<ee>https://doi.org/10.1109/CloudCom.2015.58</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CloudCom.2015.58</ee>
<ee>https://www.wikidata.org/entity/Q57403560</ee>
<crossref>conf/cloudcom/2015</crossref>
<url>db/conf/cloudcom/cloudcom2015.html#RahulamathavanR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/critis/EdenBBCJSS15" mdate="2023-06-26">
<author pid="00/6761">Peter Eden</author>
<author pid="74/1840">Andrew Blyth</author>
<author pid="80/305">Pete Burnap</author>
<author pid="118/7522">Yulia Cherdantseva</author>
<author pid="45/5883">Kevin Jones</author>
<author pid="180/0055">Hugh Soulsby</author>
<author orcid="0000-0003-4996-6482" pid="168/4393">Kristan Stoddart</author>
<title>A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure.</title>
<pages>27-39</pages>
<year>2015</year>
<booktitle>CRITIS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-33331-1_3</ee>
<crossref>conf/critis/2015</crossref>
<url>db/conf/critis/critis2015.html#EdenBBCJSS15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hpcc/AwanBRJ15" mdate="2022-12-07">
<author pid="43/531">Malik Shahzad Kaleem Awan</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="142/6631">Amir Javed</author>
<title>Continuous Monitoring and Assessment of Cybersecurity Risks in Large Computing Infrastructures.</title>
<pages>1442-1447</pages>
<year>2015</year>
<booktitle>HPCC/CSS/ICESS</booktitle>
<ee>https://doi.org/10.1109/HPCC-CSS-ICESS.2015.224</ee>
<ee>https://www.wikidata.org/entity/Q57403564</ee>
<crossref>conf/hpcc/2015</crossref>
<url>db/conf/hpcc/hpcc2015.html#AwanBRJ15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ht/BurnapCS15" mdate="2021-09-30">
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author pid="89/6497">Gualtiero Colombo 0001</author>
<author orcid="0000-0001-6218-8158" pid="167/5997">Jonathan Scourfield</author>
<title>Machine Classification and Analysis of Suicide-Related Communication on Twitter.</title>
<pages>75-84</pages>
<year>2015</year>
<booktitle>HT</booktitle>
<ee>https://doi.org/10.1145/2700171.2791023</ee>
<ee>https://www.wikidata.org/entity/Q57403592</ee>
<crossref>conf/ht/2015</crossref>
<url>db/conf/ht/ht2015.html#BurnapCS15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ics-csr/EdenBBJS15" mdate="2025-01-19">
<author pid="00/6761">Peter Eden</author>
<author pid="74/1840">Andrew Blyth</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author pid="45/5883">Kevin Jones</author>
<author pid="168/4393">Kristan Stoddart</author>
<title>A Forensic Taxonomy of SCADA Systems and Approach to Incident Response.</title>
<year>2015</year>
<booktitle>ICS-CSR</booktitle>
<crossref>conf/ics-csr/2015</crossref>
<url>db/conf/ics-csr/ics-csr2015.html#EdenBBJS15</url>
<ee type="oa">https://doi.org/10.14236/ewic/ICS2015.5</ee>
<ee>https://www.wikidata.org/entity/Q57403576</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/iot360/WangRJSBRG15" mdate="2024-03-07">
<author pid="152/4877">Meisong Wang</author>
<author orcid="0000-0002-6610-1328" pid="68/163-1">Rajiv Ranjan 0001</author>
<author orcid="0000-0003-4500-3443" pid="63/5509">Prem Prakash Jayaraman</author>
<author pid="s/PeterEStrazdins">Peter Strazdins</author>
<author pid="80/305">Pete Burnap</author>
<author pid="r/OmerFRana">Omer F. Rana</author>
<author pid="82/2760">Dimitrios Georgakopoulos 0001</author>
<title>A Case for Understanding End-to-End Performance of Topic Detection and Tracking Based Big Data Applications in the Cloud.</title>
<pages>315-325</pages>
<year>2015</year>
<booktitle>IoT 360 (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-47063-4_33</ee>
<crossref>conf/iot360/2015-1</crossref>
<url>db/conf/iot360/iot360-2015-1.html#WangRJSBRG15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/safeconfig/AwanBR15" mdate="2022-12-07">
<author pid="43/531">Malik Shahzad Kaleem Awan</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<title>Estimating Risk Boundaries for Persistent and Stealthy Cyber-Attacks.</title>
<pages>15-20</pages>
<year>2015</year>
<booktitle>SafeConfig@CCS</booktitle>
<ee>https://doi.org/10.1145/2809826.2809830</ee>
<ee>https://www.wikidata.org/entity/Q57403582</ee>
<crossref>conf/safeconfig/2015</crossref>
<url>db/conf/safeconfig/safeconfig2015.html#AwanBR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sin/AwanAABR15" mdate="2024-02-05">
<author pid="43/531">Malik S. K. Awan</author>
<author orcid="0000-0002-5993-5236" pid="08/10035">Mohammed A. AlGhamdi</author>
<author pid="259/5188">Sultan H. Almotiri</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<title>A classification framework for distinct cyber-attacks based on occurrence patterns.</title>
<pages>165-168</pages>
<year>2015</year>
<booktitle>SIN</booktitle>
<ee>https://doi.org/10.1145/2799979.2800037</ee>
<ee>https://www.wikidata.org/entity/Q57403577</ee>
<crossref>conf/sin/2015</crossref>
<url>db/conf/sin/sin2015.html#AwanAABR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/websci/SowriraghavanB15" mdate="2018-11-06">
<author pid="183/0573">Abinaya Sowriraghavan</author>
<author pid="80/305">Pete Burnap</author>
<title>Prediction of Malware Propagation and Links within Communities in Social Media Based Events.</title>
<pages>59:1-59:2</pages>
<year>2015</year>
<booktitle>WebSci</booktitle>
<ee>https://doi.org/10.1145/2786451.2786494</ee>
<crossref>conf/websci/2015</crossref>
<url>db/conf/websci/websci2015.html#SowriraghavanB15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/websci/WebbJSHEWPRB15" mdate="2025-03-03">
<author orcid="0000-0002-4303-7773" pid="176/2531">Helena Webb</author>
<author pid="40/1610">Marina Jirotka</author>
<author orcid="0000-0002-4058-4456" pid="64/687">Bernd Carsten Stahl</author>
<author pid="149/6789">William Housley</author>
<author pid="124/2265">Adam Edwards</author>
<author pid="149/6839">Matthew L. Williams</author>
<author orcid="0000-0001-8059-5224" pid="67/6530">Rob Procter</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="80/305">Pete Burnap</author>
<title>'Digital Wildfires': a challenge to the governance of social media?</title>
<pages>64:1-64:2</pages>
<year>2015</year>
<booktitle>WebSci</booktitle>
<ee>https://doi.org/10.1145/2786451.2786929</ee>
<crossref>conf/websci/2015</crossref>
<url>db/conf/websci/websci2015.html#WebbJSHEWPRB15</url>
</inproceedings>
</r>
<r><proceedings key="conf/insci/2015" mdate="2019-05-14">
<editor pid="64/6175">Thanassis Tiropanis</editor>
<editor pid="v/AthenaVakali">Athena Vakali</editor>
<editor pid="138/2346">Laura Sartori</editor>
<editor orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</editor>
<title>Internet Science - Second International Conference, INSCI 2015, Brussels, Belgium, May 27-29, 2015, Proceedings</title>
<booktitle>INSCI</booktitle>
<publisher>Springer</publisher>
<year>2015</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>9089</volume>
<isbn>978-3-319-18608-5</isbn>
<ee>https://doi.org/10.1007/978-3-319-18609-2</ee>
<ee>https://www.wikidata.org/entity/Q57403590</ee>
<url>db/conf/insci/insci2015.html</url>
</proceedings>
</r>
<r><proceedings key="conf/websci/2015" mdate="2018-11-24">
<editor pid="l/DDRoure">David De Roure</editor>
<editor pid="80/305">Pete Burnap</editor>
<editor pid="119/4605">Susan Halford</editor>
<title>Proceedings of the ACM Web Science Conference, WebSci 2015, Oxford, United Kingdom, June 28 - July 1, 2015</title>
<booktitle>WebSci</booktitle>
<publisher>ACM</publisher>
<year>2015</year>
<isbn>978-1-4503-3672-7</isbn>
<ee>https://doi.org/10.1145/2786451</ee>
<ee>https://www.wikidata.org/entity/Q54015230</ee>
<url>db/conf/websci/websci2015.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/BurnapGSSW15" mdate="2018-08-13">
<author pid="80/305">Pete Burnap</author>
<author pid="163/2232">Rachel Gibson</author>
<author pid="149/6782">Luke Sloan</author>
<author pid="163/1942">Rosalynd Southern</author>
<author pid="149/6839">Matthew L. Williams</author>
<title>140 Characters to Victory?: Using Twitter to Predict the UK 2015 General Election.</title>
<year>2015</year>
<volume>abs/1505.01511</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1505.01511</ee>
<url>db/journals/corr/corr1505.html#BurnapGSSW15</url>
</article>
</r>
<r><article key="journals/bigdatasociety/HousleyPEBWSRMVG14" mdate="2025-11-15">
<author pid="149/6789">William Housley</author>
<author orcid="0000-0001-8059-5224" pid="67/6530">Rob Procter</author>
<author pid="124/2265">Adam Edwards</author>
<author pid="80/305">Peter Burnap</author>
<author orcid="0000-0003-2566-6063" pid="149/6839">Matthew L. Williams</author>
<author pid="149/6782">Luke Sloan</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="135/3234">Jeffrey Morgan</author>
<author orcid="0000-0002-8053-2175" pid="18/3776">Alex Voss</author>
<author orcid="0000-0002-7417-974X" pid="84/1957">Anita Greenhill</author>
<title>Big and broad social data and the sociological imagination: A collaborative response.</title>
<pages>205395171454513</pages>
<year>2014</year>
<month>July</month>
<volume>1</volume>
<journal>Big Data Soc.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.1177/2053951714545135</ee>
<ee>https://www.wikidata.org/entity/Q57659112</ee>
<url>db/journals/bigdatasociety/bigdatasociety1.html#HousleyPEBWSRMVG14</url>
</article>
</r>
<r><article key="journals/snam/BurnapWSRHEKPV14" mdate="2025-03-03">
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-2566-6063" pid="149/6839">Matthew L. Williams</author>
<author pid="149/6782">Luke Sloan</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="149/6789">William Housley</author>
<author orcid="0000-0002-1332-5934" pid="124/2265">Adam Edwards</author>
<author pid="84/6980">Vincent A. Knight</author>
<author orcid="0000-0001-8059-5224" pid="67/6530">Rob Procter</author>
<author orcid="0000-0002-8053-2175" pid="18/3776">Alex Voss</author>
<title>Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack.</title>
<year>2014</year>
<volume>4</volume>
<journal>Soc. Netw. Anal. Min.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1007/s13278-014-0206-4</ee>
<ee>https://www.wikidata.org/entity/Q57403600</ee>
<url>db/journals/snam/snam4.html#BurnapWSRHEKPV14</url>
<pages>206</pages>
</article>
</r>
<r><inproceedings key="conf/cisis/BurnapRPB14" mdate="2024-05-07">
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="152/2623">Nargis Pauran</author>
<author pid="152/2613">Phil Bowen</author>
<title>Towards Real-Time Probabilistic Risk Assessment by Sensing Disruptive Events from Streamed News Feeds.</title>
<pages>608-613</pages>
<year>2014</year>
<booktitle>CISIS</booktitle>
<ee>https://doi.org/10.1109/CISIS.2014.87</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CISIS.2014.87</ee>
<ee>https://www.wikidata.org/entity/Q57403598</ee>
<crossref>conf/cisis/2014</crossref>
<url>db/conf/cisis/cisis2014.html#BurnapRPB14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sin/RahulamathavanPBRRS14" mdate="2022-12-07">
<author pid="93/10585">Yogachandran Rahulamathavan</author>
<author pid="94/4667">Pramod S. Pawar</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author pid="80/3898">Muttukrishnan Rajarajan</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="13/1166">George Spanoudakis</author>
<title>Analysing Security requirements in Cloud-based Service Level Agreements.</title>
<pages>73</pages>
<year>2014</year>
<booktitle>SIN</booktitle>
<ee>https://doi.org/10.1145/2659651.2659735</ee>
<ee>https://www.wikidata.org/entity/Q57403605</ee>
<crossref>conf/sin/2014</crossref>
<url>db/conf/sin/sin2014.html#RahulamathavanPBRRS14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/IEEEcloud/ConejeroBRM13" mdate="2024-05-07">
<author orcid="0000-0001-6401-6229" pid="119/4519">Javier Conejero</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="135/3234">Jeffrey Morgan</author>
<title>Scaling Archived Social Media Data Analysis Using a Hadoop Cloud.</title>
<pages>685-692</pages>
<year>2013</year>
<booktitle>IEEE CLOUD</booktitle>
<ee>https://doi.org/10.1109/CLOUD.2013.120</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CLOUD.2013.120</ee>
<ee>https://www.wikidata.org/entity/Q57403608</ee>
<crossref>conf/IEEEcloud/2013</crossref>
<url>db/conf/IEEEcloud/IEEEcloud2013.html#ConejeroBRM13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/closer/ConejeroRBMCC13" mdate="2023-01-30">
<author pid="119/4519">Javier Conejero</author>
<author pid="r/OmerFRana">Omer F. Rana</author>
<author pid="80/305">Pete Burnap</author>
<author pid="135/3234">Jeffrey Morgan</author>
<author pid="00/4544">Carmen Carri&#243;n 0001</author>
<author pid="92/1280">Mar&#237;a Blanca Caminero</author>
<title>Characterising the Power Consumption of Hadoop Clouds - A Social Media Analysis Case Study.</title>
<pages>233-243</pages>
<year>2013</year>
<booktitle>CLOSER</booktitle>
<crossref>conf/closer/2013</crossref>
<url>db/conf/closer/closer2013.html#ConejeroRBMCC13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cts/BurnapSGHRE12" mdate="2022-04-09">
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author pid="58/2734">Irena Spasic</author>
<author pid="g/WAGray">W. Alex Gray</author>
<author orcid="0000-0003-1462-2399" pid="56/1347">Jeremy Hilton</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author pid="34/10264">Glyn Elwyn</author>
<title>Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information.</title>
<pages>490-497</pages>
<year>2012</year>
<booktitle>CTS</booktitle>
<ee>https://doi.org/10.1109/CTS.2012.6261095</ee>
<ee>https://www.wikidata.org/entity/Q57403616</ee>
<crossref>conf/cts/2012</crossref>
<url>db/conf/cts/cts2012.html#BurnapSGHRE12</url>
</inproceedings>
</r>
<r><phdthesis key="phd/ethos/Burnap09" mdate="2022-04-05">
<author pid="80/305">Peter Richard Burnap</author>
<title>Advanced access control in support and distributed collaborative working and de-perimeterization.</title>
<year>2009</year>
<school>Cardiff University, UK</school>
<ee>http://orca.cf.ac.uk/55019/</ee>
<ee>https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.584678</ee>
<note type="source">British Library, EThOS</note>
</phdthesis>
</r>
<r><inproceedings key="conf/icds/BurnapH09" mdate="2023-03-24">
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author orcid="0000-0003-1462-2399" pid="56/1347">Jeremy Hilton</author>
<title>Self Protecting Data for De-perimeterised Information Sharing.</title>
<pages>65-70</pages>
<year>2009</year>
<booktitle>ICDS</booktitle>
<ee>https://doi.org/10.1109/ICDS.2009.41</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDS.2009.41</ee>
<ee>https://www.wikidata.org/entity/Q57403619</ee>
<crossref>conf/icds/2009</crossref>
<url>db/conf/icds/icds2009.html#BurnapH09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dexa/PahwaBGM06" mdate="2018-11-14">
<author pid="99/5739">Jaspreet Singh Pahwa</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author pid="g/WAGray">W. A. Gray</author>
<author pid="10/3158">John C. Miles</author>
<title>MDSSF - A Federated Architecture for Product Procurement.</title>
<pages>812-821</pages>
<year>2006</year>
<crossref>conf/dexa/2006</crossref>
<booktitle>DEXA</booktitle>
<ee>https://doi.org/10.1007/11827405_79</ee>
<ee>https://www.wikidata.org/entity/Q57403622</ee>
<url>db/conf/dexa/dexa2006.html#PahwaBGM06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip5-5/JoitaRBPGM04" mdate="2024-05-07">
<author pid="97/5329">Liviu Joita</author>
<author orcid="0000-0003-3597-2646" pid="r/OmerFRana">Omer F. Rana</author>
<author orcid="0000-0003-0396-633X" pid="80/305">Pete Burnap</author>
<author pid="99/5739">Jaspreet Singh Pahwa</author>
<author pid="g/WAGray">W. A. Gray</author>
<author pid="10/3158">John C. Miles</author>
<title>A Grid-Enabled Security Framework for Collaborative Virtual Organisations.</title>
<pages>415-422</pages>
<year>2004</year>
<crossref>conf/ifip5-5/2004</crossref>
<booktitle>Virtual Enterprises and Collaborative Networks</booktitle>
<url>db/conf/ifip5-5/ifip5-5-2004.html#JoitaRBPGM04</url>
<ee>https://doi.org/10.1007/1-4020-8139-1_44</ee>
<ee>https://www.wikidata.org/entity/Q57403629</ee>
</inproceedings>
</r>
<coauthors n="151" nc="2">
<co c="0"><na f="a/Agyepong:Enoch" pid="270/6165">Enoch Agyepong</na></co>
<co c="0"><na f="a/Ahmad:Shazaib" pid="227/0227">Shazaib Ahmad</na></co>
<co c="0"><na f="a/Ajienka:Nemitari" pid="186/0407">Nemitari Ajienka</na></co>
<co c="0"><na f="a/Akhgar:Babak" pid="06/4417">Babak Akhgar</na></co>
<co c="0"><na f="a/Aldmour:Rakan" pid="222/6122">Rakan Aldmour</na></co>
<co c="0" n="2"><na f="a/Alghamdi:Mohammad_A=" pid="08/10035">Mohammad A. Alghamdi</na><na>Mohammed A. AlGhamdi</na></co>
<co c="0"><na f="a/Aliwa:Emad" pid="263/6914">Emad Aliwa</na></co>
<co c="0"><na f="a/Almotiri:Sultan_H=" pid="259/5188">Sultan H. Almotiri</na></co>
<co c="0"><na f="a/Aloraini:Fatimah" pid="332/9847">Fatimah Aloraini</na></co>
<co c="0"><na f="a/Alorainy:Wafa" pid="229/9295">Wafa Alorainy</na></co>
<co c="0"><na f="a/Alrowaili:Yazeed" pid="357/7515">Yazeed Alrowaili</na></co>
<co c="0"><na f="a/Alsaedi:Nasser" pid="160/9655">Nasser Alsaedi</na></co>
<co c="1"><na f="a/Amery:Rosie" pid="228/9415">Rosie Amery</na></co>
<co c="0"><na f="a/Ani:Uchenna" pid="238/0870">Uchenna Ani</na></co>
<co c="0"><na f="a/Anthi:Eirini" pid="218/8785">Eirini Anthi</na></co>
<co c="0"><na f="a/Arman:Laura" pid="367/4132">Laura Arman</na></co>
<co c="0"><na f="a/Asiri:Mohammed" pid="266/8025">Mohammed Asiri</na></co>
<co c="0"><na f="a/Atiba:Samuelson_Tijesunimi" pid="295/2704">Samuelson Tijesunimi Atiba</na></co>
<co c="0" n="2"><na f="a/Awan:Malik_Shahzad_Kaleem" pid="43/531">Malik Shahzad Kaleem Awan</na><na>Malik S. K. Awan</na></co>
<co c="0"><na f="b/Babenko:Ludmila_K=" pid="14/3306">Ludmila K. Babenko</na></co>
<co c="0"><na f="b/Barati:Masoud" pid="123/6730">Masoud Barati</na></co>
<co c="0"><na f="b/Blyth:Andrew" pid="74/1840">Andrew Blyth</na></co>
<co c="0"><na f="b/Bolton:Andrew" pid="342/2597">Andrew Bolton</na></co>
<co c="0"><na f="b/Bowen:Phil" pid="152/2613">Phil Bowen</na></co>
<co c="0"><na f="b/Branson:David_T=" pid="16/9966">David T. Branson</na></co>
<co c="0"><na f="c/Caminero:Mar=iacute=a_Blanca" pid="92/1280">Mar&#237;a Blanca Caminero</na></co>
<co c="0"><na f="c/Cannady:Stacy" pid="144/2515">Stacy Cannady</na></co>
<co c="0"><na f="c/Cao:Fengnian" pid="382/7348">Fengnian Cao</na></co>
<co c="0"><na f="c/C=aacute=rdenas:Alvaro_A=" pid="48/6119">Alvaro A. C&#225;rdenas</na></co>
<co c="0" n="2"><na f="c/Carnelli:Pietro_Edoardo" pid="195/8133">Pietro Edoardo Carnelli</na><na>Pietro Carnelli</na></co>
<co c="0"><na f="c/Caron:Alberto" pid="274/2818">Alberto Caron</na></co>
<co c="0"><na f="c/Carri=oacute=n_0001:Carmen" pid="00/4544">Carmen Carri&#243;n 0001</na></co>
<co c="0"><na f="c/Cherdantseva:Yulia" pid="118/7522">Yulia Cherdantseva</na></co>
<co c="0"><na f="c/Cherkaoui:Soumaya" pid="57/689">Soumaya Cherkaoui</na></co>
<co c="0"><na f="c/Choi_0001:Bong_Jun" pid="12/7884">Bong Jun Choi 0001</na></co>
<co c="1" n="2"><na f="c/Colombo_0001:Gualtiero" pid="89/6497">Gualtiero Colombo 0001</na><na>Gualtiero B. Colombo</na></co>
<co c="0"><na f="c/Conejero:Javier" pid="119/4519">Javier Conejero</na></co>
<co c="0"><na f="c/Conti:Mauro" pid="82/4386">Mauro Conti</na></co>
<co c="0"><na f="d/Das_0001:Sajal_K=" pid="d/SajalKDas">Sajal K. Das 0001</na></co>
<co c="0"><na f="e/Eden:Peter" pid="00/6761">Peter Eden</na></co>
<co c="0"><na f="e/Edwards:Adam" pid="124/2265">Adam Edwards</na></co>
<co c="0"><na f="e/El=ccedil=i:Atilla" pid="e/AtillaElci">Atilla El&#231;i</na></co>
<co c="0"><na f="e/Elwyn:Glyn" pid="34/10264">Glyn Elwyn</na></co>
<co c="0"><na f="f/French:Richard" pid="189/5478">Richard French</na></co>
<co c="0"><na f="g/Gaur:Manoj_Singh" pid="80/7311">Manoj Singh Gaur</na></co>
<co c="0"><na f="g/Georgakopoulos_0001:Dimitrios" pid="82/2760">Dimitrios Georgakopoulos 0001</na></co>
<co c="0"><na f="g/Gibson:Rachel" pid="163/2232">Rachel Gibson</na></co>
<co c="0"><na f="g/Giommoni:Luca" pid="206/7783">Luca Giommoni</na></co>
<co c="0"><na f="g/Gjomemo:Rigel" pid="88/4984">Rigel Gjomemo</na></co>
<co c="0"><na f="g/Gope:Prosanta" pid="146/8257">Prosanta Gope</na></co>
<co c="0" n="2"><na f="g/Gray:W=_Alex" pid="g/WAGray">W. Alex Gray</na><na>W. A. Gray</na></co>
<co c="0"><na f="g/Greenhill:Anita" pid="84/1957">Anita Greenhill</na></co>
<co c="0"><na f="g/Grijalva:Santiago" pid="06/5639">Santiago Grijalva</na></co>
<co c="0"><na f="h/Halford:Susan" pid="119/4605">Susan Halford</na></co>
<co c="0"><na f="h/Hannay:John" pid="342/2715">John Hannay</na></co>
<co c="0"><na f="h/Heartfield:Ryan" pid="123/9730">Ryan Heartfield</na></co>
<co c="0"><na f="h/Hicks:Chris" pid="262/6509">Chris Hicks</na></co>
<co c="0"><na f="h/Hilton:Jeremy" pid="56/1347">Jeremy Hilton</na></co>
<co c="1"><na f="h/Hodorog:Andrei" pid="172/9808">Andrei Hodorog</na></co>
<co c="0"><na f="h/Hood:Andrew" pid="359/6260">Andrew Hood</na></co>
<co c="0"><na f="h/Housley:William" pid="149/6789">William Housley</na></co>
<co c="0"><na f="h/Huth_0001:Michael" pid="h/MichaelHuth">Michael Huth 0001</na></co>
<co c="0"><na f="i/Ieropoulos:Vasilis" pid="371/2359">Vasilis Ieropoulos</na></co>
<co c="0"><na f="i/Ikwu:Ruth" pid="212/8976">Ruth Ikwu</na></co>
<co c="0"><na f="j/Jackson:Toby" pid="359/6048">Toby Jackson</na></co>
<co c="0"><na f="j/Javed:Amir" pid="142/6631">Amir Javed</na></co>
<co c="0"><na f="j/Jayaraman:Prem_Prakash" pid="63/5509">Prem Prakash Jayaraman</na></co>
<co c="0"><na f="j/Jirotka:Marina" pid="40/1610">Marina Jirotka</na></co>
<co c="0"><na f="j/Joita:Liviu" pid="97/5329">Liviu Joita</na></co>
<co c="0"><na f="j/Jones:Kevin" pid="45/5883">Kevin Jones</na></co>
<co c="0" n="2"><na f="k/Katos:Vasilios" pid="89/1496">Vasilios Katos</na><na>Vasilis Katos</na></co>
<co c="0"><na f="k/Kayan:Hakan" pid="225/3270">Hakan Kayan</na></co>
<co c="0"><na f="k/Khan_0001:Aftab" pid="23/8192-1">Aftab Khan 0001</na></co>
<co c="0"><na f="k/Khan:Hamza" pid="154/1636">Hamza Khan</na></co>
<co c="0" n="2"><na f="k/Khanesar:Mojtaba_A=" pid="91/4632">Mojtaba A. Khanesar</na><na>Mojtaba Ahmadieh Khanesar</na></co>
<co c="0"><na f="k/Kleek:Max_Van" pid="59/1825">Max Van Kleek</na></co>
<co c="0"><na f="k/Knight:Vincent_A=" pid="84/6980">Vincent A. Knight</na></co>
<co c="0"><na f="k/Kumar_0001:Neeraj" pid="04/8395">Neeraj Kumar 0001</na></co>
<co c="0"><na f="l/Lakoju:Mike" pid="194/7576">Mike Lakoju</na></co>
<co c="0"><na f="l/Liu_0002:Han" pid="35/2899-2">Han Liu 0002</na></co>
<co c="0"><na f="l/Lloyd:Kaelon" pid="180/5583">Kaelon Lloyd</na></co>
<co c="0"><na f="m/Maddox:La_Treall" pid="238/1262">La Treall Maddox</na></co>
<co c="0"><na f="m/Makarevich:Oleg_B=" pid="53/400">Oleg B. Makarevich</na></co>
<co c="0"><na f="m/Maple:Carsten" pid="05/2263">Carsten Maple</na></co>
<co c="0"><na f="m/Mavromatis:Ioannis" pid="195/6027">Ioannis Mavromatis</na></co>
<co c="0"><na f="m/Mavroudis:Vasilios" pid="154/8074">Vasilios Mavroudis</na></co>
<co c="0"><na f="m/Maynard_0001:Peter" pid="168/4381">Peter Maynard 0001</na></co>
<co c="0"><na f="m/Mehmood:Arif" pid="185/3015">Arif Mehmood</na></co>
<co c="0"><na f="m/Miles:John_C=" pid="10/3158">John C. Miles</na></co>
<co c="0"><na f="m/Mohammed:Abubakar_Sadiq" pid="191/2084">Abubakar Sadiq Mohammed</na></co>
<co c="0" n="2"><na f="m/Montalvo:Rafael_Mantilla" pid="42/2849">Rafael Mantilla Montalvo</na><na>Rafael Montalvo Mantilla</na></co>
<co c="0"><na f="m/Morgan:Jeffrey" pid="135/3234">Jeffrey Morgan</na></co>
<co c="0"><na f="n/Nafees:Muhammad_Nouman" pid="277/8167">Muhammad Nouman Nafees</na></co>
<co c="0"><na f="n/Nicolescu:Razvan" pid="227/0015">Razvan Nicolescu</na></co>
<co c="0"><na f="n/Nunes:Matthew" pid="250/8966">Matthew Nunes</na></co>
<co c="0"><na f="n/Nurse:Jason_R=_C=" pid="14/4905">Jason R. C. Nurse</na></co>
<co c="0"><na f="o/Orgun:Mehmet_A=" pid="o/MehmetAOrgun">Mehmet A. Orgun</na></co>
<co c="0"><na f="p/Page:Kevin_R=" pid="42/6266">Kevin R. Page</na></co>
<co c="0"><na f="p/Pahwa:Jaspreet_Singh" pid="99/5739">Jaspreet Singh Pahwa</na></co>
<co c="0"><na f="p/Pauran:Nargis" pid="152/2623">Nargis Pauran</na></co>
<co c="0"><na f="p/Pawar:Pramod_S=" pid="94/4667">Pramod S. Pawar</na></co>
<co c="0"><na f="p/Perera:Charith" pid="115/6940">Charith Perera</na></co>
<co c="0"><na f="p/Poet:Ron" pid="42/7379">Ron Poet</na></co>
<co c="0"><na f="p/Popov_0002:Dmitry" pid="123/6424-2">Dmitry Popov 0002</na></co>
<co c="0"><na f="p/Pratomo:Baskoro_Adi" pid="179/9601">Baskoro Adi Pratomo</na></co>
<co c="0"><na f="p/Procter:Rob" pid="67/6530">Rob Procter</na></co>
<co c="0"><na f="r/Radanliev:Petar" pid="222/3056">Petar Radanliev</na></co>
<co c="0" n="2"><na f="r/Rahul:Yo" pid="93/10585">Yo Rahul</na><na>Yogachandran Rahulamathavan</na></co>
<co c="0"><na f="r/Rajarajan:Muttukrishnan" pid="80/3898">Muttukrishnan Rajarajan</na></co>
<co c="0" n="3"><na f="r/Rana:Omer_F=" pid="r/OmerFRana">Omer F. Rana</na><na>Omer Farooq Rana</na><na>Omer Rana 0001</na></co>
<co c="0"><na f="r/Ranjan_0001:Rajiv" pid="68/163-1">Rajiv Ranjan 0001</na></co>
<co c="0"><na f="r/Reinecke:Philipp" pid="42/5902">Philipp Reinecke</na></co>
<co c="0"><na f="r/Rhode:Matilda" pid="205/2668">Matilda Rhode</na></co>
<co c="0"><na f="r/Rotibi:Ayodeji_O=" pid="345/7396">Ayodeji O. Rotibi</na></co>
<co c="0" n="2"><na f="r/Roure:David_De" pid="l/DDRoure">David De Roure</na><na>David Charles De Roure</na></co>
<co c="0"><na f="s/Said:Taimur_Al" pid="155/4205">Taimur Al Said</na></co>
<co c="0"><na f="s/Santos_0002:Omar" pid="66/10007-2">Omar Santos 0002</na></co>
<co c="0"><na f="s/Sartori:Laura" pid="138/2346">Laura Sartori</na></co>
<co c="0"><na f="s/Saxena:Neetesh" pid="122/2037">Neetesh Saxena</na></co>
<co c="1"><na f="s/Scourfield:Jonathan" pid="167/5997">Jonathan Scourfield</na></co>
<co c="0"><na f="s/Shaked:Avi" pid="224/5770">Avi Shaked</na></co>
<co c="0"><na f="s/Shekhawat:Rajveer_Singh" pid="214/8444">Rajveer Singh Shekhawat</na></co>
<co c="0"><na f="s/Sloan:Luke" pid="149/6782">Luke Sloan</na></co>
<co c="0"><na f="s/Slowinska:Malgorzata" pid="251/1450">Malgorzata Slowinska</na></co>
<co c="0"><na f="s/Soulsby:Hugh" pid="180/0055">Hugh Soulsby</na></co>
<co c="0"><na f="s/Southern:Rosalynd" pid="163/1942">Rosalynd Southern</na></co>
<co c="-1"><na f="s/Sowriraghavan:Abinaya" pid="183/0573">Abinaya Sowriraghavan</na></co>
<co c="0"><na f="s/Spanoudakis:George" pid="13/1166">George Spanoudakis</na></co>
<co c="0"><na f="s/Spasic:Irena" pid="58/2734">Irena Spasic</na></co>
<co c="0"><na f="s/Spyridopoulos:Theodoros" pid="22/10667">Theodoros Spyridopoulos</na></co>
<co c="0"><na f="s/Srivastava_0001:Anurag" pid="122/9959">Anurag Srivastava 0001</na></co>
<co c="0" n="2"><na f="s/Stahl:Bernd_C=" pid="64/687">Bernd C. Stahl</na><na>Bernd Carsten Stahl</na></co>
<co c="0"><na f="s/Stoddart:Kristan" pid="168/4393">Kristan Stoddart</na></co>
<co c="0" n="2"><na f="s/Strazdins:Peter_E=" pid="s/PeterEStrazdins">Peter E. Strazdins</na><na>Peter Strazdins</na></co>
<co c="0"><na f="t/Tarter:Alex" pid="278/2409">Alex Tarter</na></co>
<co c="0"><na f="t/Theodorakopoulos_0001:George" pid="47/3584">George Theodorakopoulos 0001</na></co>
<co c="0"><na f="t/Thomas:Ieuan" pid="270/6368">Ieuan Thomas</na></co>
<co c="0"><na f="t/Tiropanis:Thanassis" pid="64/6175">Thanassis Tiropanis</na></co>
<co c="0"><na f="t/Tsikrika:Theodora" pid="09/2945">Theodora Tsikrika</na></co>
<co c="0"><na f="t/Turner:Frederick" pid="214/9452">Frederick Turner</na></co>
<co c="0"><na f="t/Tuson:Lewis" pid="247/7448">Lewis Tuson</na></co>
<co c="0"><na f="v/Vaidya:Jaideep" pid="61/3091">Jaideep Vaidya</na></co>
<co c="0"><na f="v/Vakali:Athena" pid="v/AthenaVakali">Athena Vakali</na></co>
<co c="0" n="2"><na f="v/Vo=szlig=:Alexander" pid="18/3776">Alexander Vo&#223;</na><na>Alex Voss</na></co>
<co c="0"><na f="v/Vrochidis:Stefanos" pid="44/6029">Stefanos Vrochidis</na></co>
<co c="0"><na f="v/Vyas:Sanyam" pid="342/2936">Sanyam Vyas</na></co>
<co c="0"><na f="w/Wang:Meisong" pid="152/4877">Meisong Wang</na></co>
<co c="0"><na f="w/Webb:Helena" pid="176/2531">Helena Webb</na></co>
<co c="0"><na f="w/Wedgbury:Adam" pid="168/4403">Adam Wedgbury</na></co>
<co c="0"><na f="w/Williams:Lowri" pid="167/1910">Lowri Williams</na></co>
<co c="0"><na f="w/Williams:Matthew_L=" pid="149/6839">Matthew L. Williams</na></co>
</coauthors>
</dblpperson>

