Professor Pete Burnap
- Media commentator
Teams and roles for Pete Burnap
Professor of Data Science & Cybersecurity
Overview
I am Professor of Data Science & Cybersecurity in the School of Computer Science & Informatics. I am Director of the Cardiff Centre for Cyber Security Research, which is recognised as an Academic Centre of Excellence in Cyber Security Research (ACE-CSR) by the National Cyber Security Centre and EPSRC.
I am the founding Director of the Wales Cyber Innovation Hub (CIH). Initially funded with £13.8m from Welsh Government and Cardiff Capital Region City Deal (CCRD), CIH is intended to help Wales become a global leader in cybersecurity. The CIH consortium led by Cardiff University with Airbus, Alacrity Cyber, CGI, Thales NDEC, Tramshed Tech, and the University of South Wales aims to boost the number of cyber security businesses anchored in South East Wales, and enhance cybersecurity skills to widen and diversify the cybersecurity talent pool. By 2030, the Hub aims to have:
- Created 25+ cybersecurity start-ups through translation of world leading IP into commercial ventures;
- Attracted more than £20m in private equity investment;
- Upskilled and reskilled approx. 1750 individuals with hands-on cybersecurity skills via bitesize, practical CPD activities.
I have been involved in research grants worth in excess of £23m, leading large awards from EPSRC, ESRC and industry on the topic of cyber security analytics – the fusion of artificial intelligence, cybersecurity and risk.
My work, developed in collaboration with key partners and collaborators, focusses on the development of novel approaches to automated cyber defence. Examples include the development of the first peer reviewed approach to machine-learning based prediction of cyber attack behaviour, within seconds of its execution. Subsequent work focussed on how to capture and kill the computational processes behind the cyber attack. In the case of Ransomware, our method reduced file encryption by 92%. This work is also applicable in the context of critical national infrastructure - including industrial control systems of the kind that operate manufacturing and energy systems.
In addition to AI approaches for enhanced cybersecurity, I put a great deal of emphasis on interrogating the potential harms of AI if inappropriately deployed - i.e. without thorough verification or long-term management. In this context, I have pioneered work in the security of AI in the context of cyber defence. Examples include understanding how attackers can manipulate their behaviour to evade detection by AI-based cyber defence techniques. We have demonstrated the vulnerabilities of AI-based cyber defences, and how to improve the resilience of AI-driven cyber defences in an IoT context as well as for safety critical industrial control systems.
We have also shown that the performance of machine learning models must be subject to enhanced interrogation over time. For example, our work has demonstrated that while data-driven cyber defence approaches work well in lab conditions, they can perform poorly in real-world settings. Moreover, we demonstrated that machine learning models can actually be using "hidden" features within the data used to train them to make decisions - such as malware being detected by its evasive behaviour rather than its actual malicious payload.
I believe research should be driven by real-world problems. I led AI for cybersecurity research at Airbus Cyber Innovation on a part-time secondment basis from 2016 to 2021, and I am still heavily invovled with Airbus' research agenda. I am director of Airbus' only global Centre of Excellence in Cyber Security Analytics. This has led to advanced malware detection algorithms as well as novel models for goal-oriented risk assessment being integrated into the business. Since 2012 we have established an interdisciplinary research team of technical and social researchers. Our collaborative projects have received more than £5m in funding from UK Research Councils (EPSRC, ESRC), Welsh Government (Endeavr Wales) and Industry (Airbus).
I lead the Safety Critical Systems theme in the £14m PETRAS National Centre of Excellence for Internet of Things Systems Cybersecurity, led out of UCL.
I was previously co-director of the WEFO-funded Data Innovation Accelerator (DIA) – a £3.75m investment in upskilling SMEs in South Wales to develop innovative AI-driven products and services.
I sit on the UK Government's AI Council, advising on the implementation of the industrial strategy in AI and the Data Economy.
I also have a strong interest in socio-technical security and the understanding of risks to society from cyber-enabled systems. I work very closely with the Criminology team at the Cardiff School of Social Sciences. We have pioneered innovation in AI for the modelling and understanding of risks to social safety and security in online social networks (e.g. production and propagation of cyber hate speech, suicidal ideation and malicious Web links). We have developed methods to understand the emotional factors contributing to propagation of harmful content, as well as network modeling methods to support the management of online harms. This research is organised under the banner of the Social Data Science Lab and HateLab within which I am a director and the computational lead. The Labs' core funding comes from ESRC and forms part of the £64m ‘Big Data Network’
ACM Keywords: Security and Protection; Human-centered computing; Modeling structured, textual and multimedia data; Data mining; Machine learning
Publication
2026
- Vyas, S. et al. 2026. Beyond training-time poisoning: Component-level and post-training backdoors in deep reinforcement learning. Presented at: AAAI Conference on Artificial Intelligence Conference Singapore 20-27 January 2026.
2025
- Awan, M. S. K. et al. 2025. Modelling spatio-temporal progression of cyberattacks in data networks. Presented at: 2025 7th International Conference on Blockchain Computing and Applications (BCCA) Dubrovnic, Croatia 14-17 October 2025. 2025 7th International Conference on Blockchain Computing and Applications (BCCA). IEEE. , pp.882-888. (10.1109/BCCA66705.2025.11229708)
- Ieropoulos, V. et al. 2025. Collaborative intrusion detection in resource-constrained IoT environments: Challenges, methods, and future directions a review. Journal of Information Security and Applications 93 104127. (10.1016/j.jisa.2025.104127)
- Kayan, H. et al. 2025. Real-time anomaly detection for industrial robotic arms using edge computing. IEEE Internet of Things Journal 12 (15), pp.29696-29712. (10.1109/jiot.2025.3569780)
- Mohammed, A. S. et al. 2025. STADe: An unsupervised time-windows method of detecting anomalies in oil and gas Industrial Cyber-Physical Systems (ICPS) networks. International Journal of Critical Infrastructure Protection 49 100762. (10.1016/j.ijcip.2025.100762)
- Vyas, S. et al. 2025. Towards the deployment of realistic autonomous cyber network defence: A systematic review. ACM Computing Surveys 58 (1) 5. (10.1145/3729213)
- Wang, X. , Li, S. and Burnap, P. 2025. SHAP-RM : An XAI framework for evaluating machine learning reliability. Presented at: The 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2025) Gold Coast, Australia 19-22 October, 2025.
- Williams, L. and Burnap, P. 2025. The emotional landscape of technological innovation: a data driven case study of ChatGPT's launch. Informatics 12 (3) 58. (10.3390/informatics12030058)
- Williams, L. , Khan, H. and Burnap, P. 2025. The evolution of digital security by design using temporal network analysis. Informatics 12 (1) 8. (10.3390/informatics12010008)
2024
- Alrowaili, Y. , Saxena, N. and Burnap, P. 2024. Towards developing an asset-criticality identification framework in smart grids. Presented at: IEEE International Conference on Cyber Security and Resilience (CSR) Workshop on Security, Privacy and Resilience of Critical Assets in Critical Infrastructure (SPARC) London, UK 2-4 Sept 2024. 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE. , pp.720-725. (10.1109/CSR61664.2024.10679477)
- Burnap, P. et al. 2024. Mapping automated cyber attack intelligence to context-based impact on system-level goals. Journal of Cybersecurity and Privacy 4 (2), pp.340-356. (10.3390/jcp4020017)
- Kayan, H. et al. 2024. CASPER: Context-aware IoT anomaly detection system for industrial robotic arms. ACM Transactions on Internet of Things 18 , pp.1-36. (10.1145/3670414)
- Nunes, M. et al. 2024. Exploiting user-centred design to secure industrial control systems. Frontiers in the Internet of Things 3 1436023. (10.3389/friot.2024.1436023)
- Rotibi, A. , Saxena, N. and Burnap, P. 2024. Winning the battle with cyber risk identification tools in industrial control systems: A review. IET Cyber-Physical Systems: Theory & Applications 9 (4), pp.350-365. (10.1049/cps2.12105)
- Rotibi, A. et al. 2024. System-level operational cyber risks identification in industrial control systems. Cyber-Physical Systems (10.1080/23335777.2024.2373388)
- Williams, L. et al. 2024. Topic modelling: Going beyond token outputs. Big Data and Cognitive Computing 8 (5) 44. (10.3390/bdcc8050044)
- Williams, L. , Anthi, E. and Burnap, P. 2024. A scalable and automated framework for tracking the likely adoption of emerging technologies. Information 15 (4) 237. (10.3390/info15040237)
- Williams, L. , Anthi, E. and Burnap, P. 2024. Comparing hierarchical approaches to enhance supervised emotive text classification. Big Data and Cognitive Computing 8 (4)(10.3390/bdcc8040038)
- Williams, L. , Anthi, E. and Burnap, P. 2024. Uncovering key factors that drive the impressions of online emerging technology narratives. Information 15 (11) 706. (10.3390/info15110706)
2023
- Agyepong, E. et al. 2023. A systematic method for measuring the performance of a cyber security operations centre analyst. Computers and Security 124 102959. (10.1016/j.cose.2022.102959)
- Alrowaili, Y. et al. 2023. Review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification. IET Cyber-Physical Systems: Theory & Applications 8 (3), pp.160-185. (10.1049/cps2.12059)
- Asiri, M. , Saxena, N. and Burnap, P. 2023. Advancing resilience of cyber-physical smart grid: An integrated co-simulation approach incorporating indicators of compromise. Presented at: International Workshop on Re-design Industrial Control Systems with Security (RICSS) in conjunction with IEEE EuroS&P Delft, Netherlands 3-7 July 2023. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE. , pp.370-378. (10.1109/eurospw59978.2023.00047)
- Asiri, M. et al. 2023. Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective. ACM transactions on cyber-physical systems 7 (2), pp.1-33. (10.1145/3587255)
- Foster, B. , Williams, M. and Burnap, P. 2023. Combatting community tensions in Wales: Mapping the cooperation space for multi-agency cohesion delivery. British Journal of Community Justice 19 (1), pp.55-81. (10.48411/eq13-km71)
- Ikwu, R. et al. 2023. Digital fingerprinting for identifying malicious collusive groups on Twitter. Journal of Cybersecurity 9 (1) tyad014. (10.1093/cybsec/tyad014)
- Kayan, H. et al. 2023. CASPER: Context-aware anomaly detection system for industrial robotic arms. Presented at: The 21st International Conference on Pervasive Computing and Communications (PerCom 2023) Atlanta, USA 13-17 March 2023.
- Mohammed, A. S. et al. 2023. Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication. Computers and Security 124 103007. (10.1016/j.cose.2022.103007)
- Nafees, M. N. , Saxena, N. and Burnap, P. 2023. POSTER: Adaptive moving target defense: Enhancing dynamic perturbation through voltage sensitivity analysis in power systems. Presented at: 21st International Conference on Applied Cryptography and Network Security (ACNS 2023) Kyoto, Japan 19-22 June 2023. 21st International Conference on Applied Cryptography and Network Security (ACNS 2023) Proceedings.
- Nafees, M. N. et al. 2023. Smart grid cyber-physical situational awareness of complex operational technology attacks: A review. ACM Computing Surveys 55 (10), pp.1-36. 215. (10.1145/3565570)
- Rotibi, A. et al. 2023. Extended dependency modelling technique for cyber risk identification in ICS. IEEE Access 11 , pp.37229-37242. (10.1109/ACCESS.2023.3263671)
- Rotibi, A. , Saxena, N. and Burnap, P. 2023. Poster: Using causal inference to extract hidden information from dependency modelling. Presented at: IEEE European Symposium on Security and Privacy (Euro S&P) Delft, Netherlands 3-7 July 2023.
- Shaked, A. et al. 2023. Operations-informed incident response playbooks. Computers and Security 134 103454. (10.1016/j.cose.2023.103454)
- Williams, M. L. et al. 2023. The effect of the Brexit vote on the variation in race and religious hate crimes in England, Wales, Scotland and Northern Ireland. The British Journal of Criminology: An International Review of Crime and Society 63 (4), pp.1003-1023. (10.1093/bjc/azac071)
2022
- Aloraini, F. et al. 2022. Adversarial machine learning in IoT from an insider point of view. Journal of Information Security and Applications 70 103341. (10.1016/j.jisa.2022.103341)
- Alorainy, W. et al. 2022. Disrupting networks of hate: Characterising hateful networks and removing critical nodes. Social Network Analysis and Mining 12 27. (10.1007/s13278-021-00818-z)
- Cherdantseva, Y. et al. 2022. A configurable dependency model of a SCADA system for goal-oriented risk assessment. Applied Sciences 12 (10) 4880. (10.3390/app12104880)
- Javed, A. et al. 2022. Disrupting drive-by download networks on Twitter.. Social Network Analysis and Mining 12 (117)
- Javed, A. et al. 2022. Security analytics for real-time forecasting of cyberattacks. Software: Practice and Experience 52 (3), pp.788-804. (10.1002/spe.2822)
- Kayan, H. et al. 2022. Cybersecurity of industrial cyber-physical systems: a review. ACM Computing Surveys 54 (11s) 229. (10.1145/3510410)
- Mohammed, A. S. et al. 2022. Cybersecurity challenges in the offshore oil and gas Industry: An Industrial Cyber-Physical Systems (ICPS) perspective. ACM transactions on cyber-physical systems 6 (3), pp.1-27. 27. (10.1145/3548691)
- Nafees, M. N. , Saxena, N. and Burnap, P. 2022. On the efficacy of physics-informed context-based anomaly detection for power system. Presented at: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids Singapore 25-28 October 2022. 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE(10.1109/SmartGridComm52983.2022.9961034)
- Nafees, M. N. , Saxena, N. and Burnap, P. 2022. Physics-informed augmentation for contextual anomaly detection in smart grid. Presented at: ACM CCS Los Angeles, USA 7-11 November 2022. CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. ACM. , pp.3427-3429. (10.1145/3548606.3563533)
- Nunes, M. et al. 2022. Bane or boon: measuring the effect of evasive malware on system call classifiers. Journal of Information Security and Applications 67 103202. (10.1016/j.jisa.2022.103202)
- Shaked, A. , Cherdantseva, Y. and Burnap, P. 2022. Model-based incident response playbooks. Presented at: 17th International Conference on Availability, Reliability and Security Vienna, Austia 23-26 August 2022. ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security. ACM. , pp.1-7. (10.1145/3538969.3538976)
2021
- Aliwa, E. et al. 2021. Cyberattacks and countermeasures for in-vehicle networks. ACM Computing Surveys 54 (1) 21. (10.1145/3431233)
- Alrowaili, Y. , Saxena, N. and Burnap, P. 2021. Determining asset criticality in cyber-physical smart grid. Presented at: 26th European Symposium on Research in Computer Security (ESORICS 2021) Virtual 04-08 October 2021.
- Anthi, E. et al. 2021. A three-tiered intrusion detection system for Industrial Control Systems (ICS). Journal of Cybersecurity 7 (1) tyab006. (10.1093/cybsec/tyab006)
- Anthi, E. et al. 2021. Hardening machine learning Denial of Service (DoS) defences against adversarial attacks in IoT smart home networks. Computers and Security 108 102352. (10.1016/j.cose.2021.102352)
- Anthi, E. et al. 2021. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. Journal of Information Security and Applications 58 102717. (10.1016/j.jisa.2020.102717)
- Asiri, M. , Saxena, N. and Burnap, P. 2021. Investigating usable indicators against cyber-attacks in industrial control systems. Presented at: 17th Symposium on Usable Privacy and Security (USENIX Security 2021) Virtual 08-10 August 2021. USENIX Symposium on Usable Privacy and Security (SOUPS) 2021. USENIX
- Lakoju, M. et al., 2021. Unsupervised learning for product use activity recognition: an exploratory study of a “Chatty Device”. Sensors 21 (15) 4991. (10.3390/s21154991)
- Lakoju, M. et al. 2021. "Chatty Devices” and edge-based activity classification. Discover Internet of Things 1 5. (10.1007/s43926-021-00004-9)
- Nafees, M. N. , Saxena, N. and Burnap, P. 2021. Optimized predictive control for AGC cyber resiliency. Presented at: 2021 ACM Conference on Computer and Communications Security (CCS) Seoul, South Korea 14-19 November 2021. CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM. , pp.2450-2452. (10.1145/3460120.3485358)
- Nafees, M. N. , Saxena, N. and Burnap, P. 2021. Specification-based process control attack detection in substation automation. Presented at: 42nd IEEE Symposium on Security and Privacy 2021 Virtual 23-27 May 2021.
- Radanliev, P. et al., 2021. Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge. Environment Systems and Decisions 41 , pp.236-247. (10.1007/s10669-020-09792-x)
- Rhode, M. , Burnap, P. and Wedgbury, A. 2021. Real-time malware process detection and automated process killing. Security and Communication Networks 2021 8933681. (10.1155/2021/8933681)
2020
- Agyepong, E. et al. 2020. Challenges and performance metrics for security operations center analysts: a systematic review. Journal of Cyber Security Technology 4 (3), pp.125-152. (10.1080/23742917.2019.1698178)
- Agyepong, E. et al. 2020. Cyber security operations centre concepts and implementation. In: Yaokumah, W. et al., Modern Theories and Practices for Cyber Ethics and Security Compliance. IGI Global. , pp.88-104. (10.4018/978-1-7998-3149-5.ch006)
- Agyepong, E. et al. 2020. Towards a framework for measuring the performance of a security operations center analyst. Presented at: IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020) Dublin, Ireland 15-17 June 2020. Proceedings of the International Conference on Cyber Security and Protection of Digital Services. IEEE. , pp.1-8. (10.1109/CyberSecurity49315.2020.9138872)
- Al Baghal, T. et al., 2020. Linking Twitter and survey data: the impact of survey mode and demographics on consent rates across three UK studies. Social Science Computer Review 38 (5), pp.517-532. (10.1177/0894439319828011)
- Bérubé, M. et al., 2020. Social media forensics applied to assessment of post–critical incident social reaction: The case of the 2017 Manchester Arena terrorist attack. Forensic Science International 313 110364. (10.1016/j.forsciint.2020.110364)
- Javed, A. et al. 2020. Emotions behind drive-by download propagation on Twitter. ACM Transactions on the Web 14 (4) 16. (10.1145/3408894)
- Liu, H. et al. 2020. Scmhl5 at TRAC-2 shared task on aggression identification: bert based ensemble learning approach. Presented at: Second Workshop on Trolling, Aggression and Cyberbullying Marseille, France 16 May 2020. Proceedings of the Second Workshop on Trolling, Aggression and Cyberbullying. European Language Resources Association. , pp.62-68.
- Nafees, M. N. et al. 2020. Impact of energy consumption attacks on LoRaWAN-enabled devices in industrial context. Presented at: ACM Conference on Computer and Communications Security (CCS 2020) Virtual 9-13 November 2020. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: Association for Computing Machinery. , pp.2117-2119. (10.1145/3372297)
- Nafees, M. N. et al. 2020. Towards distance relay attack discrimination for situational awareness-based anomaly detection. Presented at: Annual Computer Security Applications Conference (ACSAC 2020) Virtual 7-11 December 2020.
- Ozalp, S. et al. 2020. Antisemitism on twitter: collective efficacy and the role of community organisations in challenging online hate speech. Social Media and Society 6 (2), pp.1-20. (10.1177/2056305120916850)
- Pratomo, B. , Burnap, P. and Theodorakopoulos, G. 2020. BLATTA: early exploit setection on network traffic with recurrent neural networks. Security and Communication Networks 2020 8826038. (10.1155/2020/8826038)
- Radanliev, P. et al., 2020. Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecurity 3 13. (10.1186/s42400-020-00052-8)
- Saxena, N. et al. 2020. Impact and key challenges of insider threats on organizations and critical businesses. Electronics 9 (9) 1460. (10.3390/electronics9091460)
- Saxena, N. et al. 2020. PharmaCrypt: blockchain for critical pharmaceutical industry to counterfeit drugs. Computer 53 (7), pp.29-44. (10.1109/MC.2020.2989238)
- Scourfield, J. et al. 2020. Are youth suicide memorial sites on Facebook different from those for other sudden deaths?. Death Studies 44 (12), pp.793-801. (10.1080/07481187.2019.1614109)
- Williams, M. L. et al. 2020. Hate in the machine: anti-black and anti-Muslim social media posts as predictors of offline racially and religiously aggravated crime. British Journal of Criminology 60 (1), pp.93-117. (10.1093/bjc/azz049)
2019
- Aldmour, R. , Burnap, P. and Lakoju, M. 2019. Risk assessment methods for converged IoT and SCADA systems: review and recommendations. Presented at: Living in the Internet of Things (IoT 2019) London, UK 1-2 May 2019. Living in the Internet of Things (IoT 2019). IET. , pp.5-10. (10.1049/cp.2019.0130)
- Alorainy, W. et al. 2019. 'The enemy among us': detecting cyber hate speech with threats-based othering language embeddings. ACM Transactions on the Web 13 (3) 14. (10.1145/3324997)
- Anthi, E. et al. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things 6 (5), pp.9042-9053. (10.1109/JIOT.2019.2926365)
- Barati, M. et al. 2019. Privacy-aware cloud ecosystems and GDPR compliance. Presented at: 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud) 26-28 August 2019 Istanbul, Turkey. 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE. , pp.117. (10.1109/FiCloud.2019.00024)
- Burnap, P. et al. 2019. Chatty factories: a vision for the future of product design and manufacture with IoT. Presented at: Living in the Internet of Things (IoT 2019) London, UK 1-2 May 2019. Living in the Internet of Things (IoT 2019). IET. , pp.4 (6 pp.). (10.1049/cp.2019.0129)
- Javed, A. , Burnap, P. and Rana, O. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56 (3), pp.1133-1145. (10.1016/j.ipm.2018.02.003)
- Liu, H. et al. 2019. A fuzzy approach to text classification with two-stage training for ambiguous instances. IEEE Transactions on Computational Social Systems 6 (2), pp.227-240. (10.1109/TCSS.2019.2892037)
- Liu, H. et al. 2019. Fuzzy multi-task learning for hate speech type identification. Presented at: The Web Conference 2019 San Francisco, CA, USA 13-17 May 2019. WWW '19 The World Wide Web Conference. ACM. , pp.3006-3012. (10.1145/3308558.3313546)
- Nunes, M. et al. 2019. Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis. Journal of Information Security and Applications 48 102365. (10.1016/j.jisa.2019.102365)
- Procter, R. et al., 2019. A study of cyber hate on Twitter with implications for social media governance strategies. [Online].arXiv. Available at: https://arxiv.org/abs/1908.11732.
- Rhode, M. et al. 2019. LAB to SOC: Robust Features for Dynamic Malware Detection. Presented at: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2019) Portland, OR, USA 24-27 June 2019. 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Industry Track. IEEE. , pp.13-16. (10.1109/DSN-Industry.2019.00010)
- Scourfield, J. et al. 2019. The number and characteristics of newspaper and Twitter reports on suicides and road traffic deaths in young people. Archives of Suicide Research 23 (3), pp.507-522. (10.1080/13811118.2018.1479321)
- Williams, M. L. et al. 2019. Under the corporate radar: examining insider business cybercrime victimization through an application of routine activities theory. Deviant Behavior 40 (9), pp.1119-1131. (10.1080/01639625.2018.1461786)
2018
- Alorainy, W. et al. 2018. Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample. Presented at: International Conference on Machine Learning and Cybernetics Chengdu, China 15-18 July 2018. 2018 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE. , pp.581-586. (10.1109/ICMLC.2018.8527001)
- Anthi, E. et al. 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78 , pp.477-490. (10.1016/j.cose.2018.07.016)
- Burnap, P. et al. 2018. Malware classification using self organising feature maps and machine activity data. Computers and Security 73 , pp.399-410. (10.1016/j.cose.2017.11.016)
- Housley, W. et al. 2018. Interaction and transformation on social media: the case of Twitter campaigns. Social Media and Society 4 (1), pp.1-12. (10.1177/2056305117750721)
- Radanliev, P. et al., 2018. Future developments in cyber risk assessment for the internet of things. Computers in Industry 102 , pp.14-22. (10.1016/j.compind.2018.08.002)
- Rhode, M. , Burnap, P. and Jones, K. 2018. Early-stage malware prediction using recurrent neural networks. Computers and Security 77 , pp.578-594. (10.1016/j.cose.2018.05.010)
2017
- Alsaedi, N. , Burnap, P. and Rana, O. 2017. Can we predict a riot? Disruptive event detection using Twitter. ACM Transactions on Internet Technology 17 (2) 18. (10.1145/2996183)
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2017. Sensing real-world events using social media data and a classification-clustering framework. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence Omaha, Nebraska, USA 13-16 October 2016. 2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI). IEEE. , pp.216-223. (10.1109/WI.2016.0039)
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2017. Temporal TF-IDF: a high performance approach for event summarization in Twitter. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence Omaha, Nebraska, USA 13-16 October 2016. 2016 IEEE/WIC/ACM International Conference on Web Intelligence. IEEE. , pp.515-521. (10.1109/WI.2016.0087)
- Baylis, R. et al. 2017. Private lenders' demand for audit. Journal of Accounting and Economics 64 (1), pp.78-97. (10.1016/j.jacceco.2017.06.001)
- Burnap, P. et al. 2017. Multi-class machine classification of suicide-related communication on Twitter. Online Social Networks and Media 2 , pp.32-44. (10.1016/j.osnem.2017.08.001)
- Burnap, P. et al. 2017. Determining and sharing risk data in distributed interdependent systems. IEEE Computer 50 (4), pp.72-79. (10.1109/MC.2017.108)
- Burnap, P. and Williams, M. L. 2017. Classifying and modeling cyber hate speech: research and opportunities for practical intervention. Presented at: 1st International Conference on Cyber Deviance Detection (CyberDD) in conjunction with 10th ACM International Conference on Web Search and Data Mining (WSDM 2017) Cambridge, UK 10 Feb 2017.
- Eden, P. et al., 2017. SCADA system forensic analysis within IIoT. In: Thames, L. and Schaefer, D. eds. Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing. Springer Series in Advanced Manufacturing , pp.73-101. (10.1007/978-3-319-50660-9_4)
- Thomas, L. et al. 2017. Automation of the supplier role in the GB power system using blockchain based smart contracts. Presented at: CIRED 2017 - International Conference on Electricity Distribution Glasgow, UK 12-15 June 2017.
- Thomas, L. et al. 2017. Automation of the supplier role in the GB power system using blockchain based smart contracts. CIRED - Open Access Proceedings Journal 2017 (1), pp.2619-2623. (10.1049/oap-cired.2017.0987)
- Webb, H. et al., 2017. The ethical challenges of publishing Twitter data for research dissemination. Presented at: WebSci'17: ACM Web Science Conference Troy, NY, USA 25-28 June 2017. Proceedings of the 2017 ACM on Web Science Conference. ACM. , pp.339-348. (10.1145/3091478.3091489)
- Williams, M. and Burnap, P. 2017. Online extremism and hate speech: definition, measurement & regulation. Presented at: Internet Leadership Academy Oxford Internet Institute, University of Oxford, UK 26 September 2017.
- Williams, M. L. , Burnap, P. and Sloan, L. 2017. Crime sensing with big data: the affordances and limitations of using open-source communications to estimate crime patterns. British Journal of Criminology 57 (2), pp.320-340. (10.1093/bjc/azw031)
- Williams, M. L. , Burnap, P. and Sloan, L. 2017. Towards an ethical framework for publishing Twitter data in social research: taking into account users’ views, online context and algorithmic estimation. Sociology 51 (6), pp.1149-1168. (10.1177/0038038517708140)
- Williams, M. L. and Burnap, P. 2017. Data science solutions for detecting and monitoring Brexit related online hate speech. Presented at: UK Government Data Science Community Interest Workshop ONS Data Science Campus, Newport, Wales, UK 4 September 2017.
- Williams, M. L. and Burnap, P. 2017. Detecting crime events using social media. Presented at: Home Office Crime and Policing Analysis Unit Seminar Series Westminster, London, UK July, 2017. , pp.-.
- Williams, M. L. et al. 2017. Users' views of ethics in social media research: informed consent, anonymity and harm. In: Woodfield, K. ed. The Ethics of Online Research. Vol. 2, Advances in Research Ethics and Integrity Emerald Publishing. , pp.27-52. (10.1108/S2398-601820180000002002)
- Williams, M. L. and Burnap, P. 2017. Social data science & criminology: machine classification and modelling of cyberhate in online social networks. Presented at: Cambridge Institute of Criminology Seminar Series University of Cambridge, UK 9 February 2017.
2016
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2016. Automatic summarization of real world events using Twitter. Presented at: International AAAI Conference on Web and Social Media (ICWSM) Cologne, Germany 17-20 May 2016. Proceedings of the Tenth International AAAI Confe. AAAI. , pp.511-514.
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2016. Sensing real-world events using Arabic Twitter posts. Presented at: International AAAI Conference on Web and Social Media (ICWSM) Cologne, Germany 17-20 May 2016. Proceedings of the Tenth International AAAI Conference on Web and Social Media (ICWSM 2016). AAAI. , pp.515-518.
- Awan, M. S. K. , Burnap, P. and Rana, O. F. 2016. Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. Computers and Security 57 , pp.31-46. (10.1016/j.cose.2015.11.003)
- Burnap, P. et al. 2016. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Electoral Studies 41 , pp.230-233. (10.1016/j.electstud.2015.11.017)
- Burnap, P. and Williams, M. L. 2016. Computational human and cyber security analytics for government and policy. Presented at: Data Science and Government Conference Oxford, UK 22 June 2016.
- Burnap, P. and Williams, M. L. 2016. Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science 5 11. (10.1140/epjds/s13688-016-0072-6)
- Cherdantseva, Y. et al. 2016. A review of cyber security risk assessment methods for SCADA systems. Computers and Security 56 , pp.1-27. (10.1016/j.cose.2015.09.009)
- Conejero, J. et al., 2016. Analysing Hadoop power consumption and impact on application QoS. Future Generation Computer Systems 55 , pp.213-223. (10.1016/j.future.2015.03.009)
- Eden, P. et al., 2016. Forensic readiness for SCADA/ICS incident response. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research Queen's University Belfast, Belfast, UK 23-25 August 2016.
- Scourfield, J. B. et al. 2016. The response in Twitter to an assisted suicide in a television soap opera. Crisis: The Journal of Crisis Intervention and Suicide Prevention 37 (5), pp.392-395. (10.1027/0227-5910/a000377)
- Webb, H. et al., 2016. Digital wildfires: propagation, verification, regulation, and responsible innovation. ACM Transactions on Information Systems 34 (3) 15. (10.1145/2893478)
- Williams, M. L. and Burnap, P. 2016. Cyberhate on social media in the aftermath of Woolwich: a case study in computational criminology and big data. British Journal of Criminology 56 (2), pp.211-238. (10.1093/bjc/azv059)
2015
- Al Said, T. , Rana, O. F. and Burnap, P. 2015. VMInformant: an instrumented virtual machine to support trustworthy cloud computing. International Journal of High Performance Computing and Networking 8 (3), pp.222-234. IJHPCN080303. (10.1504/IJHPCN.2015.071257)
- Alsaedi, N. and Burnap, P. 2015. Arabic event detection in social media. Presented at: 16th International Conference on Intelligent Text Processing and Computational Linguistics Cairo, Egypt 14-20 April 2015. Published in: Gelbukh, A. ed. Computational Linguistics and Intelligent Text Processing: 16th International Conference, CICLing 2015, Cairo, Egypt, April 14-20, 2015, Proceedings, Part I. Vol. 9041.Lecture Notes in Computer Science Springer Verlag. , pp.384-401. (10.1007/978-3-319-18111-0_29)
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2015. Identifying disruptive events from social media to enhance situational awareness. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) Paris, France 24-27 August 2015. ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM. , pp.934-941. (10.1145/2808797.2808879)
- Awan, M. , Burnap, P. and Rana, O. F. 2015. An empirical risk management framework for monitoring network security. Presented at: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), Liverpool, UK 26-28 October 2015. Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on. IEEE. , pp.1764-1771. (10.1109/CIT/IUCC/DASC/PICOM.2015.266)
- Awan, M. S. K. et al. 2015. A classification framework for distinct cyber-attacks based on occurrence patterns. Presented at: The 9th International Conference on Security of Information and Networks Soch, Russia 8-10 September 2015. Proceedings of the 8th International Conference on Security of Information and Networks. ACM. , pp.165-168. (10.1145/2799979.2800037)
- Awan, M. S. K. et al. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC New York City, NY, USA 24-26 August 2015. High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE. , pp.1442-1447. (10.1109/HPCC-CSS-ICESS.2015.224)
- Awan, M. S. , Burnap, P. and Rana, O. F. 2015. Estimating risk boundaries for persistent and stealthy cyber-attacks. Presented at: 22nd ACM Conference on Computer and Communications Security Denver Colorado, USA 12-16 October 2015. SafeConfig '15 Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense. ACM. , pp.15-20. (10.1145/2809826.2809830)
- Burnap, P. , Colombo, G. and Scourfield, J. B. 2015. Machine classification and analysis of suicide-related communication on Twitter. Presented at: 26th ACM Conference on Hypertext & Social Media Cyprus 1-4 September 2015. HT '15- Proceedings of the 26th ACM Conference on Hypertext & Social Media. Association for Computing Machinery. , pp.75-84.
- Burnap, P. et al. 2015. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Working paper. Cardiff University.
- Burnap, P. et al. 2015. Real-time classification of malicious URLs on Twitter using Machine Activity Data. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) Paris, France 25-27 August 2015. 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). ACM. , pp.970-977. (10.1145/2808797.2809281)
- Burnap, P. et al. 2015. COSMOS: Towards an integrated and scalable service for analysing social media on demand. International Journal of Parallel, Emergent and Distributed Systems 30 (2), pp.80-100. (10.1080/17445760.2014.902057)
- Burnap, P. et al. 2015. Detecting tension in online communities with computational Twitter analysis. Technological Forecasting & Social Change 95 , pp.96-108. (10.1016/j.techfore.2013.04.013)
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7 (2), pp.223-242. (10.1002/poi3.85)
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: an application of machine classification and statistical modeling for policy and decision making. Presented at: ICWSM Workshop on Religion and Social Media University of Oxford, Oxford, UK 26 May 2015.
- Burnap, P. and Williams, M. L. 2015. Plenary: Computational & social security analytics using Big Data. Presented at: International Conference on Computational Social Science Helsinki, Finland 8-11 June 2015.
- Colombo, G. B. et al. 2015. Analysing the connectivity and communication of suicidal users on Twitter. Computer Communications 73 (B), pp.291-300. (10.1016/j.comcom.2015.07.018)
- Eden, P. et al., 2015. A cyber forensic taxonomy for SCADA systems in critical infrastructure. Presented at: The 10th International Conference on Critical Information Infrastructures Security 2015 (CRITIS 2015) Berlin, Germany 5-7 October 2015.
- Eden, P. et al., 2015. A forensic taxonomy of SCADA systems and approach to incident response. Presented at: The 3rd International Symposium for ICS and SCADA Cyber Security Research 2015 (ICS-CSR 2015) Ingolstadt, Germany 17 - 18 September 2015. (10.14236/ewic/ICS2015.5)
- Rahulamathavan, Y. et al., 2015. Assessing data breach risk in cloud systems. Presented at: 7th International Conference on Cloud Computing Technology and Science (CloudCom) Vancouver, BC, Canada 30 Nov-3 Dec 2015. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE. , pp.363-370. (10.1109/CloudCom.2015.58)
- Sloan, L. et al. 2015. Who tweets? Deriving the demographic characteristics of age, occupation and social class from Twitter user meta-data. PLoS ONE 10 (3) e0115545. (10.1371/journal.pone.0115545)
- Webb, H. et al., 2015. Digital wildfires: hyper-connectivity, havoc, and a global ethos to govern social media. Computers and Society 45 (3), pp.193-201.
- Williams, M. L. and Burnap, P. 2015. Combating cyber-hate on social media throughcounter-speech. Presented at: Symposium on Anti-Muslim Hate Crime University of Cambridge, Cambridge, UK 16 June 2015.
- Williams, M. L. and Burnap, P. 2015. Cyber-hate on social media in the aftermath of Woolwich. Presented at: Government Hate Crime Seminar London, UK 11 March 2015.
- Williams, M. L. and Burnap, P. 2015. Economic and Social Research Council Trans-Atlantic Platform Workshop. Presented at: Digital Scholarship in the Social Sciences and Humanities: New Forms of Data for Research Washington DC, USA 28-29 Jan 2015.
- Williams, M. L. and Burnap, P. 2015. Using big social data and real-time analytics to inform policy. Presented at: Policy-Making in the Big Data Era: Opportunities and Challenges University of Cambridge, Cambridge, UK 15-17 June 2015.
2014
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2014. A combined classification-clustering framework for identifying disruptive events. Presented at: ASE SocialCom Conference Stanford University, CA., USA May 27-21 2014.
- Burnap, P. et al. 2014. Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4 206. (10.1007/s13278-014-0206-4)
- Burnap, P. et al. 2014. Towards real-time probabilistic risk assessment by sensing disruptive events from streamed news feeds. Presented at: 8th IEEE International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2014) Birmingham City University, Birmingham, UK. 2-4 July 2014. , pp.-.
- Burnap, P. and Williams, M. L. 2014. Big social data analysis panel. Presented at: Web Science Trust Web Science Summer School National University of Singapore, Singapore, Malaysia 8-12 December 2014.
- Burnap, P. and Williams, M. L. 2014. Hate speech, machine classification and statistical modelling of information flows on Twitter: interpretation and communication for policy decision making. Presented at: Internet, Policy & Politics Oxford, UK 26 September 2014.
- Housley, W. et al. 2014. Big and broad social data and the sociological imagination: a collaborative response. Big Data & Society 1 (2)(10.1177/2053951714545135)
- Rahulamathavan, Y. et al., 2014. Analysing security requirements in cloud-based service level agreements. Presented at: SIN '14 The 7th International Conference on Security of Information and Networks Glasgow 9 - 11 September 2014. Proceedings of the 7th International Conference on Security of Information and Networks. New York, NY: ACM. , pp.73-77. (10.1145/2659651.2659735)
- Sloan, L. , Williams, M. L. and Burnap, P. 2014. Deriving demographic variables from twitter data. Presented at: Office for National Statistics Big Data Project Workshop Titchfield, England 21 July 2014. , pp.-.
- Williams, M. and Burnap, P. L. 2014. Human security analytics. Presented at: Web Science Trust Web Science Summer School National University of Singapore, Singapore, Malaysia 8-12 December 2014.
- Williams, M. L. and Burnap, P. 2014. Hate speech, tension monitoring and social media. Presented at: Wales Hate Crime Criminal Justice Board Cardiff, Wales 23 July 2014. , pp.-.
2013
- Burnap, P. , Avis, N. J. and Rana, O. F. 2013. Making sense of self-reported socially significant data using computational methods. International Journal of Social Research Methodology 16 (3), pp.215-230. (10.1080/13645579.2013.774174)
- Burnap, P. et al. 2013. Collaborative online social media observatory. Presented at: Web Observatory Launch, Royal Society London, UK 2013.
- Burnap, P. et al. 2013. Detecting tension in social media. Presented at: Third International Conference on Social Computing and its Applications Karlsruhe, Germany 30 Sept - 2 Oct 2013.
- Conejero, J. et al., 2013. Scaling archived social media data analysis using a hadoop cloud. Presented at: IEEE 6th International Conference on Cloud Computing (CLOUD) Santa Clara, CA, USA 27 June - 2 July 2013. IEEE
- Conejero, J. et al., 2013. Characterising the power consumption of Hadoop Clouds: A social media analysis case study. Presented at: CLOSER 2013: 3rd International Conference on Cloud Computing and Services Science Aachen, Germany 8-10 May 2013. (10.5220/0004373502330243)
- Housley, W. et al. 2013. COSMOS: theory, method and data. Presented at: Centre for Interdisciplinary Methodologies, University of Warwick Warwick, UK 2013.
- Rob, P. et al., 2013. Enabling social media research through citizen social science. Presented at: 13th European Conference on Computer Supported Cooperative Work Paphos, Cyprus 21-25 September 2013.
- Sloan, L. et al. 2013. Knowing the Tweeters: Deriving sociologically relevant demographics from Twitter. Sociological Research Online 18 (3) 7. (10.5153/sro.3001)
- Sloan, L. et al. 2013. The Collaborative Online Social Media Observatory. Presented at: ESRC Seminar Series: New Social Media, New Social Science? Blurring the Boundaries: One Year On London, UK 2013.
- Sloan, L. et al. 2013. Using social media with survey data. Presented at: ESRC Seminar Series: New Social Media, New Social Science? London, UK 2013.
- Williams, M. L. et al. 2013. Policing cyber-neighbourhoods: Tension monitoring and social media networks. Policing and Society 23 (4), pp.461-481. (10.1080/10439463.2013.780225)
- Williams, M. L. et al. 2013. Collaborative online social media observatory. Presented at: COSMOS Launch London, England 2013.
2012
- Burnap, P. et al. 2012. Social media analysis, Twitter and the London Olympics (a research note). Working paper. Cardiff: Cardiff University.
- Burnap, P. et al. 2012. Working paper 153: social media analysis, Twitter and the London Olympics 2012 [working paper]. Working paper. Cardiff: School of Social Sciences, Cardiff University. Available at: http://www.cardiff.ac.uk/socsi/resources/Working%20Paper%20153%20-%20Burnap%20et%20al.%20(2013)%20Social%20Media%20Analysis,%20Twitter%20and%20the%20London%20Olympics%202012%20-%20A%20Research%20Note.pdf.
- Burnap, P. et al. 2012. Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information. Presented at: 2012 International Conference on Collaboration Technologies and Systems (CTS) Denver, CO, USA 21-25 May 2012. Published in: Smari, W. W. and Charles, F. eds. 2012 International Conference on Collaboration Technologies and Systems (CTS). Vol. 14.Los Alamitos, CA: IEEE. , pp.490-497. (10.1109/CTS.2012.6261095)
- Edwards, A. M. et al. 2012. Mining tension and cohesion using the Cardiff Online Social Media Observatory. Presented at: NCRM, Research Methods Festival,St Catherine's College, University of Oxford Oxford, UK 2012.
- Housley, W. et al. 2012. Supporting empirical digital social research for the social sciences. Presented at: Digital Research 2012 Conference, St Catherines College, University of Oxford Oxford, UK 2012.
- Spasic, I. et al. 2012. A naïve Bayes approach to classifying topics in suicide notes. Biomedical Informatics Insights 5 (Supp 1), pp.87-97. (10.4137/BII.S8945)
- Williams, M. D. et al. 2012. Computational social science and methodological innovation: surrogacy, augmentation or reorientation. Presented at: ESRC Seminar Series: Blurring the boundaries: New social media, new social science? London, UK 2012.
- Williams, M. L. et al. 2012. Treating social media as data: computational sociological Methods, data analysis and the Cardiff online social media Observatory. Presented at: NCRM, Research Methods Festival, St Catherine's College, University of Oxford Oxford, UK 2012.
- Williams, M. L. et al. 2012. Computational and transformational social science. Presented at: Digital Social Research Experts Meeting, Keble College, University of Oxford Oxford, UK 2012.
2010
- Alsalamah, S. , Hilton, J. C. and Burnap, P. 2010. Towards information sharing in virtual organisations: The development of an icon-based information control model. Presented at: The UK All Hands Meeting (AHM) Cardiff, UK 13- 16 September 2010.
2009
- Burnap, P. 2009. Advanced access control in support and distributed collaborative working and de-perimeterization. PhD Thesis , Cardiff University.
- Burnap, P. and Hilton, J. C. 2009. Self protecting data for de-perimeterised information sharing. Presented at: Third International Conference on Digital Society ICDS '09 Cancun, Mexico 1-7 February 2009. Digital Society, 2009. ICDS '09. Third International Conference on. IEEE. , pp.65-70. (10.1109/ICDS.2009.41)
2008
- Burnap, P. and Hilton, J. C. 2008. Information assurance for collaborative working in deperimeterised environments. Presented at: UK e-Science All Hands Meeting Edinburgh, UK 8-11 September 2008.
2006
- Gray, W. A. et al. 2006. MDSSF - A Federated Architecture for Product Procurement. Lecture Notes in Computer Science 4080 , pp.812-821. (10.1007/11827405_79)
- Pahwa, J. S. et al. 2006. MDSSF- A federated architecture for product procurement. Presented at: 17th International Conference on Database and Expert Systems Applications (DEXA '06) Krakov, Poland
2005
- Burnap, P. et al. 2005. Worldwide messaging support for high performance real-time collaboration. Presented at: 4th UK e-Science Programme All Hands Meeting Nottingham, UK 19-22 September 2005. Published in: Cox, S. J. and Walker, D. W. eds. Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC. , pp.395.
- Burnap, P. et al. 2005. A service oriented infrastructure to facilitate trust in collaborative working. Presented at: 4th UK e-Science Programme All Hands Meeting Nottingham, UK 19-22 September 2005. Published in: Cox, S. J. and Walker, D. W. eds. Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC. , pp.346.
- Burnap, P. et al. 2005. Grid based E-procurement. Proceedings of the ASCE , pp.1-11. (10.1061/40794(179)156)
- Rana, O. F. et al. 2005. Secure virtual organisations: Protocols and requirements. Presented at: Information Security Solutions Europe (ISSE) 2005 - The Independent European ICT Security Conference and Exhibition Budapest, Hungary 27-29 September 2005. Published in: Paulus, S. , Pohlmann, N. and Reimer, H. eds. ISSE 2005 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2005 Conference. Berlin: Springer. , pp.422-432.
2004
- Burnap, P. et al. 2004. Security user and data management for collaborative virtual teams in a grid environment supporting consortia in the construction industry. Presented at: Proceedings of the Workshop on Requirements Capture for Collaboration in e-Science Edinburgh, UK, pp.54-60.
- Joita, L. et al. 2004. Supporting collaborative virtual organisations in the construction industry via the grid. Presented at: UK e-Science all Hands Meeting (AHM2004) Nottingham, UK 31 August - 3 September 2004. Published in: Cox, S. J. ed. Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC
- Joita, L. et al. 2004. A grid-enabled security framework for collaborative virtual organisations. Presented at: 5th IFIP Working Conference on Virtual Enterprises (PRO-VE) Toulouse, France 22-27 August 2004.
- Joita, L. et al. 2004. A grid enabled security framework for collaborative virtual organisations. Presented at: Proceedings of Virtual Enterprises and Collaborative Networks IFIP 18th World Computer congressTC5/WG5.5 5th Working Conference on Virtual Enterprises Toulouse, UK, pp.22-27.
- Miles, J. C. et al. 2004. Collaborative engineering Virtual Teams in a Grid Environment Supporting Consortia in the Construction Industry. Presented at: 10th International Conference on Computing in Civil and Building Engineering (ICCCBE) Weimar, Germany 2-4 June 2004.
- Pahwa, J. S. et al. 2004. Creating a virtual distributed database - data definition and search model for collaborative virtual teams in the construction industry. Presented at: Proceedings 21st Annual British National Conference on Databases (BNCOD2004) Edinburgh, UK
Articles
- Agyepong, E. et al. 2023. A systematic method for measuring the performance of a cyber security operations centre analyst. Computers and Security 124 102959. (10.1016/j.cose.2022.102959)
- Agyepong, E. et al. 2020. Challenges and performance metrics for security operations center analysts: a systematic review. Journal of Cyber Security Technology 4 (3), pp.125-152. (10.1080/23742917.2019.1698178)
- Al Baghal, T. et al., 2020. Linking Twitter and survey data: the impact of survey mode and demographics on consent rates across three UK studies. Social Science Computer Review 38 (5), pp.517-532. (10.1177/0894439319828011)
- Al Said, T. , Rana, O. F. and Burnap, P. 2015. VMInformant: an instrumented virtual machine to support trustworthy cloud computing. International Journal of High Performance Computing and Networking 8 (3), pp.222-234. IJHPCN080303. (10.1504/IJHPCN.2015.071257)
- Aliwa, E. et al. 2021. Cyberattacks and countermeasures for in-vehicle networks. ACM Computing Surveys 54 (1) 21. (10.1145/3431233)
- Aloraini, F. et al. 2022. Adversarial machine learning in IoT from an insider point of view. Journal of Information Security and Applications 70 103341. (10.1016/j.jisa.2022.103341)
- Alorainy, W. et al. 2019. 'The enemy among us': detecting cyber hate speech with threats-based othering language embeddings. ACM Transactions on the Web 13 (3) 14. (10.1145/3324997)
- Alorainy, W. et al. 2022. Disrupting networks of hate: Characterising hateful networks and removing critical nodes. Social Network Analysis and Mining 12 27. (10.1007/s13278-021-00818-z)
- Alrowaili, Y. et al. 2023. Review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification. IET Cyber-Physical Systems: Theory & Applications 8 (3), pp.160-185. (10.1049/cps2.12059)
- Alsaedi, N. , Burnap, P. and Rana, O. 2017. Can we predict a riot? Disruptive event detection using Twitter. ACM Transactions on Internet Technology 17 (2) 18. (10.1145/2996183)
- Anthi, E. et al. 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78 , pp.477-490. (10.1016/j.cose.2018.07.016)
- Anthi, E. et al. 2021. A three-tiered intrusion detection system for Industrial Control Systems (ICS). Journal of Cybersecurity 7 (1) tyab006. (10.1093/cybsec/tyab006)
- Anthi, E. et al. 2021. Hardening machine learning Denial of Service (DoS) defences against adversarial attacks in IoT smart home networks. Computers and Security 108 102352. (10.1016/j.cose.2021.102352)
- Anthi, E. et al. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things 6 (5), pp.9042-9053. (10.1109/JIOT.2019.2926365)
- Anthi, E. et al. 2021. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. Journal of Information Security and Applications 58 102717. (10.1016/j.jisa.2020.102717)
- Asiri, M. et al. 2023. Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective. ACM transactions on cyber-physical systems 7 (2), pp.1-33. (10.1145/3587255)
- Awan, M. S. K. , Burnap, P. and Rana, O. F. 2016. Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. Computers and Security 57 , pp.31-46. (10.1016/j.cose.2015.11.003)
- Baylis, R. et al. 2017. Private lenders' demand for audit. Journal of Accounting and Economics 64 (1), pp.78-97. (10.1016/j.jacceco.2017.06.001)
- Bérubé, M. et al., 2020. Social media forensics applied to assessment of post–critical incident social reaction: The case of the 2017 Manchester Arena terrorist attack. Forensic Science International 313 110364. (10.1016/j.forsciint.2020.110364)
- Burnap, P. et al. 2017. Multi-class machine classification of suicide-related communication on Twitter. Online Social Networks and Media 2 , pp.32-44. (10.1016/j.osnem.2017.08.001)
- Burnap, P. et al. 2018. Malware classification using self organising feature maps and machine activity data. Computers and Security 73 , pp.399-410. (10.1016/j.cose.2017.11.016)
- Burnap, P. et al. 2014. Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4 206. (10.1007/s13278-014-0206-4)
- Burnap, P. et al. 2024. Mapping automated cyber attack intelligence to context-based impact on system-level goals. Journal of Cybersecurity and Privacy 4 (2), pp.340-356. (10.3390/jcp4020017)
- Burnap, P. , Avis, N. J. and Rana, O. F. 2013. Making sense of self-reported socially significant data using computational methods. International Journal of Social Research Methodology 16 (3), pp.215-230. (10.1080/13645579.2013.774174)
- Burnap, P. et al. 2017. Determining and sharing risk data in distributed interdependent systems. IEEE Computer 50 (4), pp.72-79. (10.1109/MC.2017.108)
- Burnap, P. et al. 2016. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Electoral Studies 41 , pp.230-233. (10.1016/j.electstud.2015.11.017)
- Burnap, P. et al. 2005. Grid based E-procurement. Proceedings of the ASCE , pp.1-11. (10.1061/40794(179)156)
- Burnap, P. et al. 2015. COSMOS: Towards an integrated and scalable service for analysing social media on demand. International Journal of Parallel, Emergent and Distributed Systems 30 (2), pp.80-100. (10.1080/17445760.2014.902057)
- Burnap, P. et al. 2015. Detecting tension in online communities with computational Twitter analysis. Technological Forecasting & Social Change 95 , pp.96-108. (10.1016/j.techfore.2013.04.013)
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7 (2), pp.223-242. (10.1002/poi3.85)
- Burnap, P. and Williams, M. L. 2016. Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science 5 11. (10.1140/epjds/s13688-016-0072-6)
- Cherdantseva, Y. et al. 2022. A configurable dependency model of a SCADA system for goal-oriented risk assessment. Applied Sciences 12 (10) 4880. (10.3390/app12104880)
- Cherdantseva, Y. et al. 2016. A review of cyber security risk assessment methods for SCADA systems. Computers and Security 56 , pp.1-27. (10.1016/j.cose.2015.09.009)
- Colombo, G. B. et al. 2015. Analysing the connectivity and communication of suicidal users on Twitter. Computer Communications 73 (B), pp.291-300. (10.1016/j.comcom.2015.07.018)
- Conejero, J. et al., 2016. Analysing Hadoop power consumption and impact on application QoS. Future Generation Computer Systems 55 , pp.213-223. (10.1016/j.future.2015.03.009)
- Foster, B. , Williams, M. and Burnap, P. 2023. Combatting community tensions in Wales: Mapping the cooperation space for multi-agency cohesion delivery. British Journal of Community Justice 19 (1), pp.55-81. (10.48411/eq13-km71)
- Gray, W. A. et al. 2006. MDSSF - A Federated Architecture for Product Procurement. Lecture Notes in Computer Science 4080 , pp.812-821. (10.1007/11827405_79)
- Housley, W. et al. 2014. Big and broad social data and the sociological imagination: a collaborative response. Big Data & Society 1 (2)(10.1177/2053951714545135)
- Housley, W. et al. 2018. Interaction and transformation on social media: the case of Twitter campaigns. Social Media and Society 4 (1), pp.1-12. (10.1177/2056305117750721)
- Ieropoulos, V. et al. 2025. Collaborative intrusion detection in resource-constrained IoT environments: Challenges, methods, and future directions a review. Journal of Information Security and Applications 93 104127. (10.1016/j.jisa.2025.104127)
- Ikwu, R. et al. 2023. Digital fingerprinting for identifying malicious collusive groups on Twitter. Journal of Cybersecurity 9 (1) tyad014. (10.1093/cybsec/tyad014)
- Javed, A. , Burnap, P. and Rana, O. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56 (3), pp.1133-1145. (10.1016/j.ipm.2018.02.003)
- Javed, A. et al. 2020. Emotions behind drive-by download propagation on Twitter. ACM Transactions on the Web 14 (4) 16. (10.1145/3408894)
- Javed, A. et al. 2022. Disrupting drive-by download networks on Twitter.. Social Network Analysis and Mining 12 (117)
- Javed, A. et al. 2022. Security analytics for real-time forecasting of cyberattacks. Software: Practice and Experience 52 (3), pp.788-804. (10.1002/spe.2822)
- Kayan, H. et al. 2024. CASPER: Context-aware IoT anomaly detection system for industrial robotic arms. ACM Transactions on Internet of Things 18 , pp.1-36. (10.1145/3670414)
- Kayan, H. et al. 2025. Real-time anomaly detection for industrial robotic arms using edge computing. IEEE Internet of Things Journal 12 (15), pp.29696-29712. (10.1109/jiot.2025.3569780)
- Kayan, H. et al. 2022. Cybersecurity of industrial cyber-physical systems: a review. ACM Computing Surveys 54 (11s) 229. (10.1145/3510410)
- Lakoju, M. et al., 2021. Unsupervised learning for product use activity recognition: an exploratory study of a “Chatty Device”. Sensors 21 (15) 4991. (10.3390/s21154991)
- Lakoju, M. et al. 2021. "Chatty Devices” and edge-based activity classification. Discover Internet of Things 1 5. (10.1007/s43926-021-00004-9)
- Liu, H. et al. 2019. A fuzzy approach to text classification with two-stage training for ambiguous instances. IEEE Transactions on Computational Social Systems 6 (2), pp.227-240. (10.1109/TCSS.2019.2892037)
- Mohammed, A. S. et al. 2023. Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication. Computers and Security 124 103007. (10.1016/j.cose.2022.103007)
- Mohammed, A. S. et al. 2025. STADe: An unsupervised time-windows method of detecting anomalies in oil and gas Industrial Cyber-Physical Systems (ICPS) networks. International Journal of Critical Infrastructure Protection 49 100762. (10.1016/j.ijcip.2025.100762)
- Mohammed, A. S. et al. 2022. Cybersecurity challenges in the offshore oil and gas Industry: An Industrial Cyber-Physical Systems (ICPS) perspective. ACM transactions on cyber-physical systems 6 (3), pp.1-27. 27. (10.1145/3548691)
- Nafees, M. N. et al. 2023. Smart grid cyber-physical situational awareness of complex operational technology attacks: A review. ACM Computing Surveys 55 (10), pp.1-36. 215. (10.1145/3565570)
- Nunes, M. et al. 2019. Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis. Journal of Information Security and Applications 48 102365. (10.1016/j.jisa.2019.102365)
- Nunes, M. et al. 2022. Bane or boon: measuring the effect of evasive malware on system call classifiers. Journal of Information Security and Applications 67 103202. (10.1016/j.jisa.2022.103202)
- Nunes, M. et al. 2024. Exploiting user-centred design to secure industrial control systems. Frontiers in the Internet of Things 3 1436023. (10.3389/friot.2024.1436023)
- Ozalp, S. et al. 2020. Antisemitism on twitter: collective efficacy and the role of community organisations in challenging online hate speech. Social Media and Society 6 (2), pp.1-20. (10.1177/2056305120916850)
- Pratomo, B. , Burnap, P. and Theodorakopoulos, G. 2020. BLATTA: early exploit setection on network traffic with recurrent neural networks. Security and Communication Networks 2020 8826038. (10.1155/2020/8826038)
- Radanliev, P. et al., 2018. Future developments in cyber risk assessment for the internet of things. Computers in Industry 102 , pp.14-22. (10.1016/j.compind.2018.08.002)
- Radanliev, P. et al., 2020. Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecurity 3 13. (10.1186/s42400-020-00052-8)
- Radanliev, P. et al., 2021. Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge. Environment Systems and Decisions 41 , pp.236-247. (10.1007/s10669-020-09792-x)
- Rhode, M. , Burnap, P. and Jones, K. 2018. Early-stage malware prediction using recurrent neural networks. Computers and Security 77 , pp.578-594. (10.1016/j.cose.2018.05.010)
- Rhode, M. , Burnap, P. and Wedgbury, A. 2021. Real-time malware process detection and automated process killing. Security and Communication Networks 2021 8933681. (10.1155/2021/8933681)
- Rotibi, A. , Saxena, N. and Burnap, P. 2024. Winning the battle with cyber risk identification tools in industrial control systems: A review. IET Cyber-Physical Systems: Theory & Applications 9 (4), pp.350-365. (10.1049/cps2.12105)
- Rotibi, A. et al. 2023. Extended dependency modelling technique for cyber risk identification in ICS. IEEE Access 11 , pp.37229-37242. (10.1109/ACCESS.2023.3263671)
- Rotibi, A. et al. 2024. System-level operational cyber risks identification in industrial control systems. Cyber-Physical Systems (10.1080/23335777.2024.2373388)
- Saxena, N. et al. 2020. Impact and key challenges of insider threats on organizations and critical businesses. Electronics 9 (9) 1460. (10.3390/electronics9091460)
- Saxena, N. et al. 2020. PharmaCrypt: blockchain for critical pharmaceutical industry to counterfeit drugs. Computer 53 (7), pp.29-44. (10.1109/MC.2020.2989238)
- Scourfield, J. et al. 2019. The number and characteristics of newspaper and Twitter reports on suicides and road traffic deaths in young people. Archives of Suicide Research 23 (3), pp.507-522. (10.1080/13811118.2018.1479321)
- Scourfield, J. et al. 2020. Are youth suicide memorial sites on Facebook different from those for other sudden deaths?. Death Studies 44 (12), pp.793-801. (10.1080/07481187.2019.1614109)
- Scourfield, J. B. et al. 2016. The response in Twitter to an assisted suicide in a television soap opera. Crisis: The Journal of Crisis Intervention and Suicide Prevention 37 (5), pp.392-395. (10.1027/0227-5910/a000377)
- Shaked, A. et al. 2023. Operations-informed incident response playbooks. Computers and Security 134 103454. (10.1016/j.cose.2023.103454)
- Sloan, L. et al. 2015. Who tweets? Deriving the demographic characteristics of age, occupation and social class from Twitter user meta-data. PLoS ONE 10 (3) e0115545. (10.1371/journal.pone.0115545)
- Sloan, L. et al. 2013. Knowing the Tweeters: Deriving sociologically relevant demographics from Twitter. Sociological Research Online 18 (3) 7. (10.5153/sro.3001)
- Spasic, I. et al. 2012. A naïve Bayes approach to classifying topics in suicide notes. Biomedical Informatics Insights 5 (Supp 1), pp.87-97. (10.4137/BII.S8945)
- Thomas, L. et al. 2017. Automation of the supplier role in the GB power system using blockchain based smart contracts. CIRED - Open Access Proceedings Journal 2017 (1), pp.2619-2623. (10.1049/oap-cired.2017.0987)
- Vyas, S. et al. 2025. Towards the deployment of realistic autonomous cyber network defence: A systematic review. ACM Computing Surveys 58 (1) 5. (10.1145/3729213)
- Webb, H. et al., 2016. Digital wildfires: propagation, verification, regulation, and responsible innovation. ACM Transactions on Information Systems 34 (3) 15. (10.1145/2893478)
- Webb, H. et al., 2015. Digital wildfires: hyper-connectivity, havoc, and a global ethos to govern social media. Computers and Society 45 (3), pp.193-201.
- Williams, L. et al. 2024. Topic modelling: Going beyond token outputs. Big Data and Cognitive Computing 8 (5) 44. (10.3390/bdcc8050044)
- Williams, L. , Anthi, E. and Burnap, P. 2024. A scalable and automated framework for tracking the likely adoption of emerging technologies. Information 15 (4) 237. (10.3390/info15040237)
- Williams, L. , Anthi, E. and Burnap, P. 2024. Comparing hierarchical approaches to enhance supervised emotive text classification. Big Data and Cognitive Computing 8 (4)(10.3390/bdcc8040038)
- Williams, L. , Anthi, E. and Burnap, P. 2024. Uncovering key factors that drive the impressions of online emerging technology narratives. Information 15 (11) 706. (10.3390/info15110706)
- Williams, L. and Burnap, P. 2025. The emotional landscape of technological innovation: a data driven case study of ChatGPT's launch. Informatics 12 (3) 58. (10.3390/informatics12030058)
- Williams, L. , Khan, H. and Burnap, P. 2025. The evolution of digital security by design using temporal network analysis. Informatics 12 (1) 8. (10.3390/informatics12010008)
- Williams, M. L. et al. 2023. The effect of the Brexit vote on the variation in race and religious hate crimes in England, Wales, Scotland and Northern Ireland. The British Journal of Criminology: An International Review of Crime and Society 63 (4), pp.1003-1023. (10.1093/bjc/azac071)
- Williams, M. L. and Burnap, P. 2016. Cyberhate on social media in the aftermath of Woolwich: a case study in computational criminology and big data. British Journal of Criminology 56 (2), pp.211-238. (10.1093/bjc/azv059)
- Williams, M. L. et al. 2020. Hate in the machine: anti-black and anti-Muslim social media posts as predictors of offline racially and religiously aggravated crime. British Journal of Criminology 60 (1), pp.93-117. (10.1093/bjc/azz049)
- Williams, M. L. , Burnap, P. and Sloan, L. 2017. Crime sensing with big data: the affordances and limitations of using open-source communications to estimate crime patterns. British Journal of Criminology 57 (2), pp.320-340. (10.1093/bjc/azw031)
- Williams, M. L. , Burnap, P. and Sloan, L. 2017. Towards an ethical framework for publishing Twitter data in social research: taking into account users’ views, online context and algorithmic estimation. Sociology 51 (6), pp.1149-1168. (10.1177/0038038517708140)
- Williams, M. L. et al. 2019. Under the corporate radar: examining insider business cybercrime victimization through an application of routine activities theory. Deviant Behavior 40 (9), pp.1119-1131. (10.1080/01639625.2018.1461786)
- Williams, M. L. et al. 2013. Policing cyber-neighbourhoods: Tension monitoring and social media networks. Policing and Society 23 (4), pp.461-481. (10.1080/10439463.2013.780225)
Book sections
- Agyepong, E. et al. 2020. Cyber security operations centre concepts and implementation. In: Yaokumah, W. et al., Modern Theories and Practices for Cyber Ethics and Security Compliance. IGI Global. , pp.88-104. (10.4018/978-1-7998-3149-5.ch006)
- Eden, P. et al., 2017. SCADA system forensic analysis within IIoT. In: Thames, L. and Schaefer, D. eds. Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing. Springer Series in Advanced Manufacturing , pp.73-101. (10.1007/978-3-319-50660-9_4)
- Williams, M. L. et al. 2017. Users' views of ethics in social media research: informed consent, anonymity and harm. In: Woodfield, K. ed. The Ethics of Online Research. Vol. 2, Advances in Research Ethics and Integrity Emerald Publishing. , pp.27-52. (10.1108/S2398-601820180000002002)
Conferences
- Agyepong, E. et al. 2020. Towards a framework for measuring the performance of a security operations center analyst. Presented at: IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020) Dublin, Ireland 15-17 June 2020. Proceedings of the International Conference on Cyber Security and Protection of Digital Services. IEEE. , pp.1-8. (10.1109/CyberSecurity49315.2020.9138872)
- Aldmour, R. , Burnap, P. and Lakoju, M. 2019. Risk assessment methods for converged IoT and SCADA systems: review and recommendations. Presented at: Living in the Internet of Things (IoT 2019) London, UK 1-2 May 2019. Living in the Internet of Things (IoT 2019). IET. , pp.5-10. (10.1049/cp.2019.0130)
- Alorainy, W. et al. 2018. Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample. Presented at: International Conference on Machine Learning and Cybernetics Chengdu, China 15-18 July 2018. 2018 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE. , pp.581-586. (10.1109/ICMLC.2018.8527001)
- Alrowaili, Y. , Saxena, N. and Burnap, P. 2021. Determining asset criticality in cyber-physical smart grid. Presented at: 26th European Symposium on Research in Computer Security (ESORICS 2021) Virtual 04-08 October 2021.
- Alrowaili, Y. , Saxena, N. and Burnap, P. 2024. Towards developing an asset-criticality identification framework in smart grids. Presented at: IEEE International Conference on Cyber Security and Resilience (CSR) Workshop on Security, Privacy and Resilience of Critical Assets in Critical Infrastructure (SPARC) London, UK 2-4 Sept 2024. 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE. , pp.720-725. (10.1109/CSR61664.2024.10679477)
- Alsaedi, N. and Burnap, P. 2015. Arabic event detection in social media. Presented at: 16th International Conference on Intelligent Text Processing and Computational Linguistics Cairo, Egypt 14-20 April 2015. Published in: Gelbukh, A. ed. Computational Linguistics and Intelligent Text Processing: 16th International Conference, CICLing 2015, Cairo, Egypt, April 14-20, 2015, Proceedings, Part I. Vol. 9041.Lecture Notes in Computer Science Springer Verlag. , pp.384-401. (10.1007/978-3-319-18111-0_29)
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2014. A combined classification-clustering framework for identifying disruptive events. Presented at: ASE SocialCom Conference Stanford University, CA., USA May 27-21 2014.
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2016. Automatic summarization of real world events using Twitter. Presented at: International AAAI Conference on Web and Social Media (ICWSM) Cologne, Germany 17-20 May 2016. Proceedings of the Tenth International AAAI Confe. AAAI. , pp.511-514.
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2015. Identifying disruptive events from social media to enhance situational awareness. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) Paris, France 24-27 August 2015. ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM. , pp.934-941. (10.1145/2808797.2808879)
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2016. Sensing real-world events using Arabic Twitter posts. Presented at: International AAAI Conference on Web and Social Media (ICWSM) Cologne, Germany 17-20 May 2016. Proceedings of the Tenth International AAAI Conference on Web and Social Media (ICWSM 2016). AAAI. , pp.515-518.
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2017. Sensing real-world events using social media data and a classification-clustering framework. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence Omaha, Nebraska, USA 13-16 October 2016. 2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI). IEEE. , pp.216-223. (10.1109/WI.2016.0039)
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2017. Temporal TF-IDF: a high performance approach for event summarization in Twitter. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence Omaha, Nebraska, USA 13-16 October 2016. 2016 IEEE/WIC/ACM International Conference on Web Intelligence. IEEE. , pp.515-521. (10.1109/WI.2016.0087)
- Alsalamah, S. , Hilton, J. C. and Burnap, P. 2010. Towards information sharing in virtual organisations: The development of an icon-based information control model. Presented at: The UK All Hands Meeting (AHM) Cardiff, UK 13- 16 September 2010.
- Asiri, M. , Saxena, N. and Burnap, P. 2023. Advancing resilience of cyber-physical smart grid: An integrated co-simulation approach incorporating indicators of compromise. Presented at: International Workshop on Re-design Industrial Control Systems with Security (RICSS) in conjunction with IEEE EuroS&P Delft, Netherlands 3-7 July 2023. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE. , pp.370-378. (10.1109/eurospw59978.2023.00047)
- Asiri, M. , Saxena, N. and Burnap, P. 2021. Investigating usable indicators against cyber-attacks in industrial control systems. Presented at: 17th Symposium on Usable Privacy and Security (USENIX Security 2021) Virtual 08-10 August 2021. USENIX Symposium on Usable Privacy and Security (SOUPS) 2021. USENIX
- Awan, M. , Burnap, P. and Rana, O. F. 2015. An empirical risk management framework for monitoring network security. Presented at: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), Liverpool, UK 26-28 October 2015. Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on. IEEE. , pp.1764-1771. (10.1109/CIT/IUCC/DASC/PICOM.2015.266)
- Awan, M. S. K. et al. 2015. A classification framework for distinct cyber-attacks based on occurrence patterns. Presented at: The 9th International Conference on Security of Information and Networks Soch, Russia 8-10 September 2015. Proceedings of the 8th International Conference on Security of Information and Networks. ACM. , pp.165-168. (10.1145/2799979.2800037)
- Awan, M. S. K. et al. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC New York City, NY, USA 24-26 August 2015. High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE. , pp.1442-1447. (10.1109/HPCC-CSS-ICESS.2015.224)
- Awan, M. S. , Burnap, P. and Rana, O. F. 2015. Estimating risk boundaries for persistent and stealthy cyber-attacks. Presented at: 22nd ACM Conference on Computer and Communications Security Denver Colorado, USA 12-16 October 2015. SafeConfig '15 Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense. ACM. , pp.15-20. (10.1145/2809826.2809830)
- Awan, M. S. K. et al. 2025. Modelling spatio-temporal progression of cyberattacks in data networks. Presented at: 2025 7th International Conference on Blockchain Computing and Applications (BCCA) Dubrovnic, Croatia 14-17 October 2025. 2025 7th International Conference on Blockchain Computing and Applications (BCCA). IEEE. , pp.882-888. (10.1109/BCCA66705.2025.11229708)
- Barati, M. et al. 2019. Privacy-aware cloud ecosystems and GDPR compliance. Presented at: 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud) 26-28 August 2019 Istanbul, Turkey. 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE. , pp.117. (10.1109/FiCloud.2019.00024)
- Burnap, P. et al. 2019. Chatty factories: a vision for the future of product design and manufacture with IoT. Presented at: Living in the Internet of Things (IoT 2019) London, UK 1-2 May 2019. Living in the Internet of Things (IoT 2019). IET. , pp.4 (6 pp.). (10.1049/cp.2019.0129)
- Burnap, P. et al. 2005. Worldwide messaging support for high performance real-time collaboration. Presented at: 4th UK e-Science Programme All Hands Meeting Nottingham, UK 19-22 September 2005. Published in: Cox, S. J. and Walker, D. W. eds. Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC. , pp.395.
- Burnap, P. , Colombo, G. and Scourfield, J. B. 2015. Machine classification and analysis of suicide-related communication on Twitter. Presented at: 26th ACM Conference on Hypertext & Social Media Cyprus 1-4 September 2015. HT '15- Proceedings of the 26th ACM Conference on Hypertext & Social Media. Association for Computing Machinery. , pp.75-84.
- Burnap, P. et al. 2005. A service oriented infrastructure to facilitate trust in collaborative working. Presented at: 4th UK e-Science Programme All Hands Meeting Nottingham, UK 19-22 September 2005. Published in: Cox, S. J. and Walker, D. W. eds. Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC. , pp.346.
- Burnap, P. and Hilton, J. C. 2008. Information assurance for collaborative working in deperimeterised environments. Presented at: UK e-Science All Hands Meeting Edinburgh, UK 8-11 September 2008.
- Burnap, P. and Hilton, J. C. 2009. Self protecting data for de-perimeterised information sharing. Presented at: Third International Conference on Digital Society ICDS '09 Cancun, Mexico 1-7 February 2009. Digital Society, 2009. ICDS '09. Third International Conference on. IEEE. , pp.65-70. (10.1109/ICDS.2009.41)
- Burnap, P. et al. 2013. Collaborative online social media observatory. Presented at: Web Observatory Launch, Royal Society London, UK 2013.
- Burnap, P. et al. 2015. Real-time classification of malicious URLs on Twitter using Machine Activity Data. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) Paris, France 25-27 August 2015. 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). ACM. , pp.970-977. (10.1145/2808797.2809281)
- Burnap, P. et al. 2004. Security user and data management for collaborative virtual teams in a grid environment supporting consortia in the construction industry. Presented at: Proceedings of the Workshop on Requirements Capture for Collaboration in e-Science Edinburgh, UK, pp.54-60.
- Burnap, P. et al. 2014. Towards real-time probabilistic risk assessment by sensing disruptive events from streamed news feeds. Presented at: 8th IEEE International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2014) Birmingham City University, Birmingham, UK. 2-4 July 2014. , pp.-.
- Burnap, P. et al. 2012. Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information. Presented at: 2012 International Conference on Collaboration Technologies and Systems (CTS) Denver, CO, USA 21-25 May 2012. Published in: Smari, W. W. and Charles, F. eds. 2012 International Conference on Collaboration Technologies and Systems (CTS). Vol. 14.Los Alamitos, CA: IEEE. , pp.490-497. (10.1109/CTS.2012.6261095)
- Burnap, P. and Williams, M. L. 2014. Big social data analysis panel. Presented at: Web Science Trust Web Science Summer School National University of Singapore, Singapore, Malaysia 8-12 December 2014.
- Burnap, P. and Williams, M. L. 2017. Classifying and modeling cyber hate speech: research and opportunities for practical intervention. Presented at: 1st International Conference on Cyber Deviance Detection (CyberDD) in conjunction with 10th ACM International Conference on Web Search and Data Mining (WSDM 2017) Cambridge, UK 10 Feb 2017.
- Burnap, P. and Williams, M. L. 2016. Computational human and cyber security analytics for government and policy. Presented at: Data Science and Government Conference Oxford, UK 22 June 2016.
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: an application of machine classification and statistical modeling for policy and decision making. Presented at: ICWSM Workshop on Religion and Social Media University of Oxford, Oxford, UK 26 May 2015.
- Burnap, P. and Williams, M. L. 2014. Hate speech, machine classification and statistical modelling of information flows on Twitter: interpretation and communication for policy decision making. Presented at: Internet, Policy & Politics Oxford, UK 26 September 2014.
- Burnap, P. and Williams, M. L. 2015. Plenary: Computational & social security analytics using Big Data. Presented at: International Conference on Computational Social Science Helsinki, Finland 8-11 June 2015.
- Burnap, P. et al. 2013. Detecting tension in social media. Presented at: Third International Conference on Social Computing and its Applications Karlsruhe, Germany 30 Sept - 2 Oct 2013.
- Conejero, J. et al., 2013. Scaling archived social media data analysis using a hadoop cloud. Presented at: IEEE 6th International Conference on Cloud Computing (CLOUD) Santa Clara, CA, USA 27 June - 2 July 2013. IEEE
- Conejero, J. et al., 2013. Characterising the power consumption of Hadoop Clouds: A social media analysis case study. Presented at: CLOSER 2013: 3rd International Conference on Cloud Computing and Services Science Aachen, Germany 8-10 May 2013. (10.5220/0004373502330243)
- Eden, P. et al., 2015. A cyber forensic taxonomy for SCADA systems in critical infrastructure. Presented at: The 10th International Conference on Critical Information Infrastructures Security 2015 (CRITIS 2015) Berlin, Germany 5-7 October 2015.
- Eden, P. et al., 2015. A forensic taxonomy of SCADA systems and approach to incident response. Presented at: The 3rd International Symposium for ICS and SCADA Cyber Security Research 2015 (ICS-CSR 2015) Ingolstadt, Germany 17 - 18 September 2015. (10.14236/ewic/ICS2015.5)
- Eden, P. et al., 2016. Forensic readiness for SCADA/ICS incident response. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research Queen's University Belfast, Belfast, UK 23-25 August 2016.
- Edwards, A. M. et al. 2012. Mining tension and cohesion using the Cardiff Online Social Media Observatory. Presented at: NCRM, Research Methods Festival,St Catherine's College, University of Oxford Oxford, UK 2012.
- Housley, W. et al. 2012. Supporting empirical digital social research for the social sciences. Presented at: Digital Research 2012 Conference, St Catherines College, University of Oxford Oxford, UK 2012.
- Housley, W. et al. 2013. COSMOS: theory, method and data. Presented at: Centre for Interdisciplinary Methodologies, University of Warwick Warwick, UK 2013.
- Joita, L. et al. 2004. Supporting collaborative virtual organisations in the construction industry via the grid. Presented at: UK e-Science all Hands Meeting (AHM2004) Nottingham, UK 31 August - 3 September 2004. Published in: Cox, S. J. ed. Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC
- Joita, L. et al. 2004. A grid-enabled security framework for collaborative virtual organisations. Presented at: 5th IFIP Working Conference on Virtual Enterprises (PRO-VE) Toulouse, France 22-27 August 2004.
- Joita, L. et al. 2004. A grid enabled security framework for collaborative virtual organisations. Presented at: Proceedings of Virtual Enterprises and Collaborative Networks IFIP 18th World Computer congressTC5/WG5.5 5th Working Conference on Virtual Enterprises Toulouse, UK, pp.22-27.
- Kayan, H. et al. 2023. CASPER: Context-aware anomaly detection system for industrial robotic arms. Presented at: The 21st International Conference on Pervasive Computing and Communications (PerCom 2023) Atlanta, USA 13-17 March 2023.
- Liu, H. et al. 2019. Fuzzy multi-task learning for hate speech type identification. Presented at: The Web Conference 2019 San Francisco, CA, USA 13-17 May 2019. WWW '19 The World Wide Web Conference. ACM. , pp.3006-3012. (10.1145/3308558.3313546)
- Liu, H. et al. 2020. Scmhl5 at TRAC-2 shared task on aggression identification: bert based ensemble learning approach. Presented at: Second Workshop on Trolling, Aggression and Cyberbullying Marseille, France 16 May 2020. Proceedings of the Second Workshop on Trolling, Aggression and Cyberbullying. European Language Resources Association. , pp.62-68.
- Miles, J. C. et al. 2004. Collaborative engineering Virtual Teams in a Grid Environment Supporting Consortia in the Construction Industry. Presented at: 10th International Conference on Computing in Civil and Building Engineering (ICCCBE) Weimar, Germany 2-4 June 2004.
- Nafees, M. N. , Saxena, N. and Burnap, P. 2021. Optimized predictive control for AGC cyber resiliency. Presented at: 2021 ACM Conference on Computer and Communications Security (CCS) Seoul, South Korea 14-19 November 2021. CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM. , pp.2450-2452. (10.1145/3460120.3485358)
- Nafees, M. N. et al. 2020. Impact of energy consumption attacks on LoRaWAN-enabled devices in industrial context. Presented at: ACM Conference on Computer and Communications Security (CCS 2020) Virtual 9-13 November 2020. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: Association for Computing Machinery. , pp.2117-2119. (10.1145/3372297)
- Nafees, M. N. , Saxena, N. and Burnap, P. 2022. On the efficacy of physics-informed context-based anomaly detection for power system. Presented at: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids Singapore 25-28 October 2022. 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE(10.1109/SmartGridComm52983.2022.9961034)
- Nafees, M. N. , Saxena, N. and Burnap, P. 2022. Physics-informed augmentation for contextual anomaly detection in smart grid. Presented at: ACM CCS Los Angeles, USA 7-11 November 2022. CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. ACM. , pp.3427-3429. (10.1145/3548606.3563533)
- Nafees, M. N. , Saxena, N. and Burnap, P. 2023. POSTER: Adaptive moving target defense: Enhancing dynamic perturbation through voltage sensitivity analysis in power systems. Presented at: 21st International Conference on Applied Cryptography and Network Security (ACNS 2023) Kyoto, Japan 19-22 June 2023. 21st International Conference on Applied Cryptography and Network Security (ACNS 2023) Proceedings.
- Nafees, M. N. , Saxena, N. and Burnap, P. 2021. Specification-based process control attack detection in substation automation. Presented at: 42nd IEEE Symposium on Security and Privacy 2021 Virtual 23-27 May 2021.
- Nafees, M. N. et al. 2020. Towards distance relay attack discrimination for situational awareness-based anomaly detection. Presented at: Annual Computer Security Applications Conference (ACSAC 2020) Virtual 7-11 December 2020.
- Pahwa, J. S. et al. 2004. Creating a virtual distributed database - data definition and search model for collaborative virtual teams in the construction industry. Presented at: Proceedings 21st Annual British National Conference on Databases (BNCOD2004) Edinburgh, UK
- Pahwa, J. S. et al. 2006. MDSSF- A federated architecture for product procurement. Presented at: 17th International Conference on Database and Expert Systems Applications (DEXA '06) Krakov, Poland
- Rahulamathavan, Y. et al., 2014. Analysing security requirements in cloud-based service level agreements. Presented at: SIN '14 The 7th International Conference on Security of Information and Networks Glasgow 9 - 11 September 2014. Proceedings of the 7th International Conference on Security of Information and Networks. New York, NY: ACM. , pp.73-77. (10.1145/2659651.2659735)
- Rahulamathavan, Y. et al., 2015. Assessing data breach risk in cloud systems. Presented at: 7th International Conference on Cloud Computing Technology and Science (CloudCom) Vancouver, BC, Canada 30 Nov-3 Dec 2015. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE. , pp.363-370. (10.1109/CloudCom.2015.58)
- Rana, O. F. et al. 2005. Secure virtual organisations: Protocols and requirements. Presented at: Information Security Solutions Europe (ISSE) 2005 - The Independent European ICT Security Conference and Exhibition Budapest, Hungary 27-29 September 2005. Published in: Paulus, S. , Pohlmann, N. and Reimer, H. eds. ISSE 2005 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2005 Conference. Berlin: Springer. , pp.422-432.
- Rhode, M. et al. 2019. LAB to SOC: Robust Features for Dynamic Malware Detection. Presented at: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2019) Portland, OR, USA 24-27 June 2019. 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Industry Track. IEEE. , pp.13-16. (10.1109/DSN-Industry.2019.00010)
- Rob, P. et al., 2013. Enabling social media research through citizen social science. Presented at: 13th European Conference on Computer Supported Cooperative Work Paphos, Cyprus 21-25 September 2013.
- Rotibi, A. , Saxena, N. and Burnap, P. 2023. Poster: Using causal inference to extract hidden information from dependency modelling. Presented at: IEEE European Symposium on Security and Privacy (Euro S&P) Delft, Netherlands 3-7 July 2023.
- Shaked, A. , Cherdantseva, Y. and Burnap, P. 2022. Model-based incident response playbooks. Presented at: 17th International Conference on Availability, Reliability and Security Vienna, Austia 23-26 August 2022. ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security. ACM. , pp.1-7. (10.1145/3538969.3538976)
- Sloan, L. et al. 2013. The Collaborative Online Social Media Observatory. Presented at: ESRC Seminar Series: New Social Media, New Social Science? Blurring the Boundaries: One Year On London, UK 2013.
- Sloan, L. , Williams, M. L. and Burnap, P. 2014. Deriving demographic variables from twitter data. Presented at: Office for National Statistics Big Data Project Workshop Titchfield, England 21 July 2014. , pp.-.
- Sloan, L. et al. 2013. Using social media with survey data. Presented at: ESRC Seminar Series: New Social Media, New Social Science? London, UK 2013.
- Thomas, L. et al. 2017. Automation of the supplier role in the GB power system using blockchain based smart contracts. Presented at: CIRED 2017 - International Conference on Electricity Distribution Glasgow, UK 12-15 June 2017.
- Vyas, S. et al. 2026. Beyond training-time poisoning: Component-level and post-training backdoors in deep reinforcement learning. Presented at: AAAI Conference on Artificial Intelligence Conference Singapore 20-27 January 2026.
- Wang, X. , Li, S. and Burnap, P. 2025. SHAP-RM : An XAI framework for evaluating machine learning reliability. Presented at: The 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2025) Gold Coast, Australia 19-22 October, 2025.
- Webb, H. et al., 2017. The ethical challenges of publishing Twitter data for research dissemination. Presented at: WebSci'17: ACM Web Science Conference Troy, NY, USA 25-28 June 2017. Proceedings of the 2017 ACM on Web Science Conference. ACM. , pp.339-348. (10.1145/3091478.3091489)
- Williams, M. D. et al. 2012. Computational social science and methodological innovation: surrogacy, augmentation or reorientation. Presented at: ESRC Seminar Series: Blurring the boundaries: New social media, new social science? London, UK 2012.
- Williams, M. and Burnap, P. 2017. Online extremism and hate speech: definition, measurement & regulation. Presented at: Internet Leadership Academy Oxford Internet Institute, University of Oxford, UK 26 September 2017.
- Williams, M. and Burnap, P. L. 2014. Human security analytics. Presented at: Web Science Trust Web Science Summer School National University of Singapore, Singapore, Malaysia 8-12 December 2014.
- Williams, M. L. and Burnap, P. 2017. Data science solutions for detecting and monitoring Brexit related online hate speech. Presented at: UK Government Data Science Community Interest Workshop ONS Data Science Campus, Newport, Wales, UK 4 September 2017.
- Williams, M. L. and Burnap, P. 2017. Detecting crime events using social media. Presented at: Home Office Crime and Policing Analysis Unit Seminar Series Westminster, London, UK July, 2017. , pp.-.
- Williams, M. L. and Burnap, P. 2015. Combating cyber-hate on social media throughcounter-speech. Presented at: Symposium on Anti-Muslim Hate Crime University of Cambridge, Cambridge, UK 16 June 2015.
- Williams, M. L. and Burnap, P. 2015. Cyber-hate on social media in the aftermath of Woolwich. Presented at: Government Hate Crime Seminar London, UK 11 March 2015.
- Williams, M. L. and Burnap, P. 2015. Economic and Social Research Council Trans-Atlantic Platform Workshop. Presented at: Digital Scholarship in the Social Sciences and Humanities: New Forms of Data for Research Washington DC, USA 28-29 Jan 2015.
- Williams, M. L. and Burnap, P. 2014. Hate speech, tension monitoring and social media. Presented at: Wales Hate Crime Criminal Justice Board Cardiff, Wales 23 July 2014. , pp.-.
- Williams, M. L. and Burnap, P. 2017. Social data science & criminology: machine classification and modelling of cyberhate in online social networks. Presented at: Cambridge Institute of Criminology Seminar Series University of Cambridge, UK 9 February 2017.
- Williams, M. L. and Burnap, P. 2015. Using big social data and real-time analytics to inform policy. Presented at: Policy-Making in the Big Data Era: Opportunities and Challenges University of Cambridge, Cambridge, UK 15-17 June 2015.
- Williams, M. L. et al. 2012. Treating social media as data: computational sociological Methods, data analysis and the Cardiff online social media Observatory. Presented at: NCRM, Research Methods Festival, St Catherine's College, University of Oxford Oxford, UK 2012.
- Williams, M. L. et al. 2012. Computational and transformational social science. Presented at: Digital Social Research Experts Meeting, Keble College, University of Oxford Oxford, UK 2012.
- Williams, M. L. et al. 2013. Collaborative online social media observatory. Presented at: COSMOS Launch London, England 2013.
Monographs
- Burnap, P. et al. 2015. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Working paper. Cardiff University.
- Burnap, P. et al. 2012. Social media analysis, Twitter and the London Olympics (a research note). Working paper. Cardiff: Cardiff University.
- Burnap, P. et al. 2012. Working paper 153: social media analysis, Twitter and the London Olympics 2012 [working paper]. Working paper. Cardiff: School of Social Sciences, Cardiff University. Available at: http://www.cardiff.ac.uk/socsi/resources/Working%20Paper%20153%20-%20Burnap%20et%20al.%20(2013)%20Social%20Media%20Analysis,%20Twitter%20and%20the%20London%20Olympics%202012%20-%20A%20Research%20Note.pdf.
Thesis
- Burnap, P. 2009. Advanced access control in support and distributed collaborative working and de-perimeterization. PhD Thesis , Cardiff University.
Websites
- Procter, R. et al., 2019. A study of cyber hate on Twitter with implications for social media governance strategies. [Online].arXiv. Available at: https://arxiv.org/abs/1908.11732.
Research
To date I have been involved in more than 33 research grants, amounting to over £23 million (FEC), with over £10m of this coming to Cardiff University. Funding has been secured from a variety of sources including UKRI (EPSRC/ESRC/InnovateUK), JISC, US Department of Justice, UK DoH, and industry partners (e.g. Airbus, Admiral). I was/am currently Principal Investigator on 16 of these grants (including a £1.8m EPSRC grant on secure ‘Factories of the Future’).
Selected grants include:
Cyber Range and Immersive Cyber Attack Environment (research infrastructure)
* Funded by HEFCW
* £1,272,000 (Burnap)
Demystifying AI for Cybersecurity
* Funded by InnovateUK (/w Airbus)
* £394,784 (Burnap)
PETRAS 2
* Funded by EPSRC
* £290,291 to CU (Burnap, Perera et al.)
Academic Centre of Excellence in Cyber Security Research (ACE-CSR)
* Funded by EPSRC
* £64,989 (Burnap)
PACE: Privacy-aware cloud ecosystems
* Funded by EPSRC
* £757,817 (Rana, Theodorakopoulos, Burnap)
Data innovation accelerator
* Funded by ERDF
* £3,553,220 (funded at 52%) (Burnap & Whitaker).
How Online Technologies are Transforming Transnational Organised Crime (Cyber-TNOC)
* Funded by ESRC.
* £352,862 (Levi, Giommoni, Williams, Burnap)
Hate crime after Brexit: Linking terrestrial and new forms of data to inform governance
* Funded by ESRC
* £253,041 (Williams, Burnap, Sloan)
New Industrial Systems: Chatty Factories
* Funded by EPSRC
* £1,805,111 (Burnap, Murray-Rust, Richards, Preston, Branson)
Identifying Attack Vectors for Network Intrusion via IoT devices Developing a Goal-Oriented Approach to Determining Impact Across Threat Surfaces (IoT Depends)
* Funded by EPSRC PETRAS Hub
* £136,205 (Burnap)
SCADA Cyber Security Lifecycle (SCADA-CSL) 2
* Funded by Foundation Wales – Welsh Government and Airbus Innovations.
* £760,000 (Burnap, Cherdantseva and Theodorakopolous)
Centre for Cyberhate Research & Policy: Real-Time Scalable Methods & Infrastructure for Modelling the Spread of Cyberhate on Social Media
* Funded by ESRC
* £781,243 (Williams & Burnap)
Social Data Science Lab – Methods and Infrastructure Development for Open Data Analytics in Social Research
* Funded by ESRC
* £705.050 (Burnap, Williams, Sloan & Rana)
Understanding Online Hate Speech as a Motivator for Hate Crime
* Funded by National Institute for Justice, US Department of Justice
* £683,152 (Williams & Burnap in partnership with Rand US & Europe)
Event Detection using Open Source Communications
* Funded by Endeavr Wales
* £973,760 (Burnap & Williams in partnership with Airbus Endeavor Wales)
SCADA Cyber Security Lifecycle (SCADA-CSL)
* Funded by Foundation Wales – Welsh Government and Airbus Innovations
* £1,250,000 (Jones, Burnap, Blyth & Stoddart)
Identifying and Modelling Victim, Business, Regulatory and Malware Behaviours in a Changing Cyberthreat Landscape
* Funded by EPSRC under the Global Uncertainties Consortia for Exploratory Research in Security (CEReS) call
* £1,200,000 (Rana, Burnap, Williams, Levi, Matthews, Clarke, Furnell, Ganis, Rajarajan & Wall)
Improving Driver Risk Modeling with Big Data Analytics
* Knowledge Transfer Partnership with Admiral Insurance
* £378,648 (Burnap)
Investigating the link between social media activity and reporting crime
* Funded by Metropolitan Police Service Centre for Scientific and Engineering Excellence
* £49,950 (Burnap & Williams)
Estimating the Propagation of Anti-Semitic Content on Twitter
* Funded by Community Security Trust and the Lewis Trust Group
* £35,000 (Williams & Burnap)
Impact Acceleration Award – Embedding Open Source Intelligence Analytics within the Metropolitan Police Service
* Funded by ESRC
* £25,000 (Burnap, Williams, Rana & Sloan)
Evaluating the Utility of Social Media Analytics for International Development
* Funded by Department for International Development
* £7,500 (Williams & Burnap)
Impact Acceleration Award – Assessing the Market Interest in Big Social Data Analytics
* Funded by EPSRC
* £7,500 (Burnap, Williams, Rana & Sloan)
Digital Wildfire: (Mis)information flows, propagation and responsible governance
* Funded by ESRC (Global Uncertainties)
* £196,333 (Jirotka, Burnap, Williams, Rana, Procter, Housley, Edwards & Stahl)
Detecting Tension and Cohesion in Local Communities with Social Media
* Funded by Airbus Group
* £51,040 (Rana, Burnap, Sloan & Williams)
Social Media and Prediction: Crime Sensing, Data Integration & Statistical Modelling
* Funded by ESRC under the NCRM Methods Innovation Call
* £194,138 (Williams, Burnap, Sloan, Rana, Housley, Edwards, Procter & Voss)
Hate Speech and Social Media: Understanding Users, Networks and Information Flows
* Funded by ESRC and Google
* £124, 986 (Housley, Williams, Burnap, Edwards, Rana, Procter, Voss & Knight)
Digital Social Research Tools, Tension Indicators and Safer Communities: A Demonstration of COSMOS
* Funded by ESRC
* £97,506 (Williams, Rana, Avis, Housley, Edwards & Burnap)
The 2016 Welsh Election Study: A Study of the 2016 Election to the National Assembly for Wales
* Funded by ESRC
* £257,148 (Scully, Jones, Cutts, Sloan, Burnap & Williams)
Digital Social Research Tools, Tension Indicators and Safer Communities: A Demonstration of COSMOS
* Funded by ESRC
* £97,506 (Williams, Rana, Avis, Housley, Edwards & Burnap)
Public perceptions of the UK food system: public understanding and engagement, and the impact of crises and scares
* Funded by ESRC and the Food Standards Agency
* £291,200 (Roberts, Dowler, Draper, Sloan, Williams & Burnap)
Understanding the Role of Social Media in the Aftermath of Youth Suicides
* Funded Department of Health
* £200,000 (Scourfield, Burnap, Williams, Housley & Edwards)
Scaling the Computational Analysis of “Big Social Data” & Massive Temporal Social Media Datasets
* Funded by High Performance Computing Wales
* £45,000 (Burnap, Rana, Sloan & Williams)
Small items of research equipment at Cardiff University
* Funded by EPSRC
* £620,000 (Burnap)
Supporting Empirical Digital Social Research for the Social Sciences with a Virtual Research Environment
* Funded by JISC
* £55,519 (Burnap, Williams, Housley, Rana, Edwards & Avis)
Requirements Analysis for Social Media Analysis Research Tools
* Funded by ESRC
* £5,000 (Burnap, Rana, Avis, Williams, Housley & Edwards)
Sensing Data from the Web to Inform Probabilistic Risk Models. Funded by Welsh European Funding Office (Part of the Smart Operation for a Low Carbon Energy Region (SOLCER) project). £50,000
miConsent: Patient Controlled Access to Distributed Medical Records.
Funded by Technology Strategy Board with Abies Ltd and IMS Maxims. £54,000
Supervisions
Current supervision
Miah Thompson
Sanyam Vyas
Vasilis Ieropoulos