Professor Pete Burnap
- Media commentator
Teams and roles for Pete Burnap
Professor of Data Science & Cybersecurity
Overview
I am Professor of Data Science & Cybersecurity at Cardiff University. I work at the intersection of artificial intelligence, cybersecurity and digital risk, with a focus on the safe, secure and responsible deployment of AI in high-risk and regulated environments. I work with boards, senior executives and public sector leaders on strategic programmes related to AI governance, cyber risk and digital resilience.
Professional & Civic Leadership
Throughout my career, I have aimed to drive innovation in ways that support inclusive economic growth. Rather than pursuing a conventional academic trajectory focused solely on research outputs, I have consistently applied my expertise to address systemic challenges at the intersection of technology, society and national resilience.
Building National Research Capability
In 2012, when I began my academic work at Cardiff University, cybersecurity research was a small and fragmented activity, with only a handful of researchers across the institution. Recognising the growing national importance of digital security, I took on the responsibility of building a cross-disciplinary research community that could support both public and private sector needs.
I established and now lead the Cardiff Centre for Cyber Security Research, which has since grown into Wales’ only Academic Centre of Excellence in Cyber Security Research recognised by the UK National Cyber Security Centre and EPSRC. Under my leadership, the Centre now spans five academic schools across three colleges and supports more than 50 researchers and educators, creating a sustainable national capability that did not previously exist in Wales.
Translating Research into National Benefit
Over the last decade, I have led or co-led approximately £40m in competitive funding from UKRI, Government and industry. While this represents significant academic success, I believe my distinguishing contribution has been the deliberate translation of this research into operational systems and public benefit.
My work in AI-enabled cyber defence produced the first peer-reviewed machine-learning based prediction of cyber attack within seconds, techniques that actively blocked cyber attacks and reduced ransomware file encryption by up to 92%, and methods to secure AI systems deployed in safety-critical infrastructure. These innovations have directly supported organisations responsible for national infrastructure, manufacturing and energy systems.
My research has also shaped national understanding of AI governance and assurance, demonstrating that models which perform well in laboratory settings can fail in real-world conditions and may rely on hidden or unintended features when making decisions. This work has informed best practice in risk management and responsible AI deployment.
Industry Immersion and Operational Impact
To ensure my work addressed real-world challenges, I chose to step beyond academia and immerse myself within industry. I spent six years embedded within Airbus through a long-term secondment, where I led a multi-million-euro AI for cyber innovation programme across Europe.
During this period, I established Airbus’ global Centre of Excellence in Cyber Security Analytics at Cardiff University and translated academic research into operational tools used within a major multinational organisation. This collaboration underpinned a 4* REF impact case and has been cited nationally as a model for effective academic–industry partnership.
Creating a National Innovation Engine
Building on this experience, I recognised a wider systemic problem: research with clear societal and industrial value often failed to reach the market due to a lack of commercial leadership and coordinated support.
To address this limitation, in 2022, I founded the Wales Cyber Innovation Hub (CIH), a £13.9m public–private programme funded by Welsh Government and the Cardiff Capital Region. CIH brings together academia, industry and Government within a single governance framework, creating a nationally unique pathway that connects research, industry challenges and funded graduate entrepreneurs to build new cyber and AI start-ups rooted in Wales.
Through CIH, hundreds of individuals have accessed new routes into digital careers, including people from under-represented backgrounds and those reskilling from declining sectors. New start-ups have been created, private investment has been attracted, and a sustainable regional cyber cluster has begun to emerge. This work represents a significant contribution to regional regeneration and national digital resilience.
National Policy Leadership
My expertise and civic leadership have been recognised at national level. I was appointed to the UK Government’s AI Council, where I advised on the development of the UK’s first national AI strategy, influencing long-term public investment and policy direction.
I currently chair the EPSRC Digital Security and Resilience Strategic Advisory Team, which shapes national research priorities and funding in areas critical to the UK’s security and economic future.
Board, Governance & Entrepreneurship
I am a Board Director and Co-Founder of Nisien, a VC-backed online safety company translating publicly funded research into commercial platforms that detect and mitigate online harms.
I also serve as a Non-Executive Director of Business in Focus Ltd, supporting enterprise, innovation and economic development across Wales.
I hold the Institute of Directors Certificate in Company Direction, reflecting my commitment to effective governance and board practice.
Civic Leadership
Across all of these roles, I have consistently aimed to apply my expertise in service of wider society. My work has strengthened national digital resilience, supported economic growth, created opportunities for others, and demonstrated how universities can act as civic anchors for innovation and public value.
My experience supporting government in the design of national and regional AI and cyber strategies and innovation ecosystems enables organisations to align technological ambition with societal trust, regulatory readiness and long-term resilience.
Board & Advisory Focus
AI governance • Cyber risk oversight • Digital resilience • Regulated sectors • Public–private innovation • Trusted AI deployment
Publication
2026
- Vyas, S. et al. 2026. Beyond training-time poisoning: Component-level and post-training backdoors in deep reinforcement learning. Presented at: AAAI Conference on Artificial Intelligence Conference Singapore 20-27 January 2026.
2025
- Awan, M. S. K. et al. 2025. Modelling spatio-temporal progression of cyberattacks in data networks. Presented at: 2025 7th International Conference on Blockchain Computing and Applications (BCCA) Dubrovnic, Croatia 14-17 October 2025. 2025 7th International Conference on Blockchain Computing and Applications (BCCA). IEEE. , pp.882-888. (10.1109/BCCA66705.2025.11229708)
- Ieropoulos, V. et al. 2025. Collaborative intrusion detection in resource-constrained IoT environments: Challenges, methods, and future directions a review. Journal of Information Security and Applications 93 104127. (10.1016/j.jisa.2025.104127)
- Williams, L. and Burnap, P. 2025. The emotional landscape of technological innovation: a data driven case study of ChatGPT's launch. Informatics 12 (3) 58. (10.3390/informatics12030058)
- Vyas, S. et al. 2025. Towards the deployment of realistic autonomous cyber network defence: A systematic review. ACM Computing Surveys 58 (1) 5. (10.1145/3729213)
- Kayan, H. et al. 2025. Real-time anomaly detection for industrial robotic arms using edge computing. IEEE Internet of Things Journal 12 (15), pp.29696-29712. (10.1109/jiot.2025.3569780)
- Mohammed, A. S. et al. 2025. STADe: An unsupervised time-windows method of detecting anomalies in oil and gas Industrial Cyber-Physical Systems (ICPS) networks. International Journal of Critical Infrastructure Protection 49 100762. (10.1016/j.ijcip.2025.100762)
- Williams, L. , Khan, H. and Burnap, P. 2025. The evolution of digital security by design using temporal network analysis. Informatics 12 (1) 8. (10.3390/informatics12010008)
- Wang, X. , Li, S. and Burnap, P. 2025. SHAP-RM : An XAI framework for evaluating machine learning reliability. Presented at: The 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2025) Gold Coast, Australia 19-22 October, 2025.
2024
- Rotibi, A. , Saxena, N. and Burnap, P. 2024. Winning the battle with cyber risk identification tools in industrial control systems: A review. IET Cyber-Physical Systems: Theory & Applications 9 (4), pp.350-365. (10.1049/cps2.12105)
- Williams, L. , Anthi, E. and Burnap, P. 2024. Uncovering key factors that drive the impressions of online emerging technology narratives. Information 15 (11) 706. (10.3390/info15110706)
- Alrowaili, Y. , Saxena, N. and Burnap, P. 2024. Towards developing an asset-criticality identification framework in smart grids. Presented at: IEEE International Conference on Cyber Security and Resilience (CSR) Workshop on Security, Privacy and Resilience of Critical Assets in Critical Infrastructure (SPARC) London, UK 2-4 Sept 2024. 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE. , pp.720-725. (10.1109/CSR61664.2024.10679477)
- Nunes, M. et al. 2024. Exploiting user-centred design to secure industrial control systems. Frontiers in the Internet of Things 3 1436023. (10.3389/friot.2024.1436023)
- Kayan, H. et al. 2024. CASPER: Context-aware IoT anomaly detection system for industrial robotic arms. ACM Transactions on Internet of Things 18 , pp.1-36. (10.1145/3670414)
- Rotibi, A. et al. 2024. System-level operational cyber risks identification in industrial control systems. Cyber-Physical Systems (10.1080/23335777.2024.2373388)
- Burnap, P. et al. 2024. Mapping automated cyber attack intelligence to context-based impact on system-level goals. Journal of Cybersecurity and Privacy 4 (2), pp.340-356. (10.3390/jcp4020017)
- Williams, L. et al. 2024. Topic modelling: Going beyond token outputs. Big Data and Cognitive Computing 8 (5) 44. (10.3390/bdcc8050044)
- Williams, L. , Anthi, E. and Burnap, P. 2024. A scalable and automated framework for tracking the likely adoption of emerging technologies. Information 15 (4) 237. (10.3390/info15040237)
- Williams, L. , Anthi, E. and Burnap, P. 2024. Comparing hierarchical approaches to enhance supervised emotive text classification. Big Data and Cognitive Computing 8 (4)(10.3390/bdcc8040038)
2023
- Shaked, A. et al. 2023. Operations-informed incident response playbooks. Computers and Security 134 103454. (10.1016/j.cose.2023.103454)
- Nafees, M. N. et al. 2023. Smart grid cyber-physical situational awareness of complex operational technology attacks: A review. ACM Computing Surveys 55 (10), pp.1-36. 215. (10.1145/3565570)
- Alrowaili, Y. et al. 2023. Review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification. IET Cyber-Physical Systems: Theory & Applications 8 (3), pp.160-185. (10.1049/cps2.12059)
- Williams, M. L. et al. 2023. The effect of the Brexit vote on the variation in race and religious hate crimes in England, Wales, Scotland and Northern Ireland. The British Journal of Criminology: An International Review of Crime and Society 63 (4), pp.1003-1023. (10.1093/bjc/azac071)
- Foster, B. , Williams, M. and Burnap, P. 2023. Combatting community tensions in Wales: Mapping the cooperation space for multi-agency cohesion delivery. British Journal of Community Justice 19 (1), pp.55-81. (10.48411/eq13-km71)
- Asiri, M. et al. 2023. Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective. ACM transactions on cyber-physical systems 7 (2), pp.1-33. (10.1145/3587255)
- Agyepong, E. et al. 2023. A systematic method for measuring the performance of a cyber security operations centre analyst. Computers and Security 124 102959. (10.1016/j.cose.2022.102959)
- Mohammed, A. S. et al. 2023. Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication. Computers and Security 124 103007. (10.1016/j.cose.2022.103007)
- Asiri, M. , Saxena, N. and Burnap, P. 2023. Advancing resilience of cyber-physical smart grid: An integrated co-simulation approach incorporating indicators of compromise. Presented at: International Workshop on Re-design Industrial Control Systems with Security (RICSS) in conjunction with IEEE EuroS&P Delft, Netherlands 3-7 July 2023. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE. , pp.370-378. (10.1109/eurospw59978.2023.00047)
- Ikwu, R. et al. 2023. Digital fingerprinting for identifying malicious collusive groups on Twitter. Journal of Cybersecurity 9 (1) tyad014. (10.1093/cybsec/tyad014)
- Kayan, H. et al. 2023. CASPER: Context-aware anomaly detection system for industrial robotic arms. Presented at: The 21st International Conference on Pervasive Computing and Communications (PerCom 2023) Atlanta, USA 13-17 March 2023.
- Nafees, M. N. , Saxena, N. and Burnap, P. 2023. POSTER: Adaptive moving target defense: Enhancing dynamic perturbation through voltage sensitivity analysis in power systems. Presented at: 21st International Conference on Applied Cryptography and Network Security (ACNS 2023) Kyoto, Japan 19-22 June 2023. 21st International Conference on Applied Cryptography and Network Security (ACNS 2023) Proceedings.
- Rotibi, A. et al. 2023. Extended dependency modelling technique for cyber risk identification in ICS. IEEE Access 11 , pp.37229-37242. (10.1109/ACCESS.2023.3263671)
- Rotibi, A. , Saxena, N. and Burnap, P. 2023. Poster: Using causal inference to extract hidden information from dependency modelling. Presented at: IEEE European Symposium on Security and Privacy (Euro S&P) Delft, Netherlands 3-7 July 2023.
2022
- Nafees, M. N. , Saxena, N. and Burnap, P. 2022. On the efficacy of physics-informed context-based anomaly detection for power system. Presented at: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids Singapore 25-28 October 2022. 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE(10.1109/SmartGridComm52983.2022.9961034)
- Nafees, M. N. , Saxena, N. and Burnap, P. 2022. Physics-informed augmentation for contextual anomaly detection in smart grid. Presented at: ACM CCS Los Angeles, USA 7-11 November 2022. CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. ACM. , pp.3427-3429. (10.1145/3548606.3563533)
- Aloraini, F. et al. 2022. Adversarial machine learning in IoT from an insider point of view. Journal of Information Security and Applications 70 103341. (10.1016/j.jisa.2022.103341)
- Shaked, A. , Cherdantseva, Y. and Burnap, P. 2022. Model-based incident response playbooks. Presented at: 17th International Conference on Availability, Reliability and Security Vienna, Austia 23-26 August 2022. ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security. ACM. , pp.1-7. (10.1145/3538969.3538976)
- Javed, A. et al. 2022. Disrupting drive-by download networks on Twitter.. Social Network Analysis and Mining 12 (117)
- Mohammed, A. S. et al. 2022. Cybersecurity challenges in the offshore oil and gas Industry: An Industrial Cyber-Physical Systems (ICPS) perspective. ACM transactions on cyber-physical systems 6 (3), pp.1-27. 27. (10.1145/3548691)
- Nunes, M. et al. 2022. Bane or boon: measuring the effect of evasive malware on system call classifiers. Journal of Information Security and Applications 67 103202. (10.1016/j.jisa.2022.103202)
- Cherdantseva, Y. et al. 2022. A configurable dependency model of a SCADA system for goal-oriented risk assessment. Applied Sciences 12 (10) 4880. (10.3390/app12104880)
- Javed, A. et al. 2022. Security analytics for real-time forecasting of cyberattacks. Software: Practice and Experience 52 (3), pp.788-804. (10.1002/spe.2822)
- Alorainy, W. et al. 2022. Disrupting networks of hate: Characterising hateful networks and removing critical nodes. Social Network Analysis and Mining 12 27. (10.1007/s13278-021-00818-z)
- Kayan, H. et al. 2022. Cybersecurity of industrial cyber-physical systems: a review. ACM Computing Surveys 54 (11s) 229. (10.1145/3510410)
2021
- Rhode, M. , Burnap, P. and Wedgbury, A. 2021. Real-time malware process detection and automated process killing. Security and Communication Networks 2021 8933681. (10.1155/2021/8933681)
- Nafees, M. N. , Saxena, N. and Burnap, P. 2021. Optimized predictive control for AGC cyber resiliency. Presented at: 2021 ACM Conference on Computer and Communications Security (CCS) Seoul, South Korea 14-19 November 2021. CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM. , pp.2450-2452. (10.1145/3460120.3485358)
- Anthi, E. et al. 2021. Hardening machine learning Denial of Service (DoS) defences against adversarial attacks in IoT smart home networks. Computers and Security 108 102352. (10.1016/j.cose.2021.102352)
- Asiri, M. , Saxena, N. and Burnap, P. 2021. Investigating usable indicators against cyber-attacks in industrial control systems. Presented at: 17th Symposium on Usable Privacy and Security (USENIX Security 2021) Online 8-10 August 2021. USENIX Symposium on Usable Privacy and Security (SOUPS) 2021. USENIX
- Lakoju, M. et al., 2021. Unsupervised learning for product use activity recognition: an exploratory study of a “Chatty Device”. Sensors 21 (15) 4991. (10.3390/s21154991)
- Radanliev, P. et al., 2021. Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge. Environment Systems and Decisions 41 , pp.236-247. (10.1007/s10669-020-09792-x)
- Anthi, E. et al. 2021. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. Journal of Information Security and Applications 58 102717. (10.1016/j.jisa.2020.102717)
- Nafees, M. N. , Saxena, N. and Burnap, P. 2021. Specification-based process control attack detection in substation automation. Presented at: 42nd IEEE Symposium on Security and Privacy 2021 Virtual 23-27 May 2021.
- Aliwa, E. et al. 2021. Cyberattacks and countermeasures for in-vehicle networks. ACM Computing Surveys 54 (1) 21. (10.1145/3431233)
- Lakoju, M. et al. 2021. "Chatty Devices” and edge-based activity classification. Discover Internet of Things 1 5. (10.1007/s43926-021-00004-9)
- Alrowaili, Y. , Saxena, N. and Burnap, P. 2021. Determining asset criticality in cyber-physical smart grid. Presented at: 26th European Symposium on Research in Computer Security (ESORICS 2021) Online 4-8 October 2021.
- Anthi, E. et al. 2021. A three-tiered intrusion detection system for Industrial Control Systems (ICS). Journal of Cybersecurity 7 (1) tyab006. (10.1093/cybsec/tyab006)
2020
- Nafees, M. N. et al. 2020. Impact of energy consumption attacks on LoRaWAN-enabled devices in industrial context. Presented at: ACM Conference on Computer and Communications Security (CCS 2020) Virtual 9-13 November 2020. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: Association for Computing Machinery. , pp.2117-2119. (10.1145/3372297)
- Al Baghal, T. et al., 2020. Linking Twitter and survey data: the impact of survey mode and demographics on consent rates across three UK studies. Social Science Computer Review 38 (5), pp.517-532. (10.1177/0894439319828011)
- Saxena, N. et al. 2020. Impact and key challenges of insider threats on organizations and critical businesses. Electronics 9 (9) 1460. (10.3390/electronics9091460)
- Bérubé, M. et al., 2020. Social media forensics applied to assessment of post–critical incident social reaction: The case of the 2017 Manchester Arena terrorist attack. Forensic Science International 313 110364. (10.1016/j.forsciint.2020.110364)
- Javed, A. et al. 2020. Emotions behind drive-by download propagation on Twitter. ACM Transactions on the Web 14 (4) 16. (10.1145/3408894)
- Pratomo, B. , Burnap, P. and Theodorakopoulos, G. 2020. BLATTA: early exploit setection on network traffic with recurrent neural networks. Security and Communication Networks 2020 8826038. (10.1155/2020/8826038)
- Saxena, N. et al. 2020. PharmaCrypt: blockchain for critical pharmaceutical industry to counterfeit drugs. Computer 53 (7), pp.29-44. (10.1109/MC.2020.2989238)
- Agyepong, E. et al. 2020. Towards a framework for measuring the performance of a security operations center analyst. Presented at: IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020) Dublin, Ireland 15-17 June 2020. Proceedings of the International Conference on Cyber Security and Protection of Digital Services. IEEE. , pp.1-8. (10.1109/CyberSecurity49315.2020.9138872)
- Radanliev, P. et al., 2020. Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecurity 3 13. (10.1186/s42400-020-00052-8)
- Liu, H. et al. 2020. Scmhl5 at TRAC-2 shared task on aggression identification: bert based ensemble learning approach. Presented at: Second Workshop on Trolling, Aggression and Cyberbullying Marseille, France 16 May 2020. Proceedings of the Second Workshop on Trolling, Aggression and Cyberbullying. European Language Resources Association. , pp.62-68.
- Agyepong, E. et al. 2020. Cyber security operations centre concepts and implementation. In: Yaokumah, W. et al., Modern Theories and Practices for Cyber Ethics and Security Compliance. IGI Global. , pp.88-104. (10.4018/978-1-7998-3149-5.ch006)
- Ozalp, S. et al. 2020. Antisemitism on twitter: collective efficacy and the role of community organisations in challenging online hate speech. Social Media and Society 6 (2), pp.1-20. (10.1177/2056305120916850)
- Williams, M. L. et al. 2020. Hate in the machine: anti-black and anti-Muslim social media posts as predictors of offline racially and religiously aggravated crime. British Journal of Criminology 60 (1), pp.93-117. (10.1093/bjc/azz049)
- Agyepong, E. et al. 2020. Challenges and performance metrics for security operations center analysts: a systematic review. Journal of Cyber Security Technology 4 (3), pp.125-152. (10.1080/23742917.2019.1698178)
- Nafees, M. N. et al. 2020. Towards distance relay attack discrimination for situational awareness-based anomaly detection. Presented at: Annual Computer Security Applications Conference (ACSAC 2020) Virtual 7-11 December 2020.
- Scourfield, J. et al. 2020. Are youth suicide memorial sites on Facebook different from those for other sudden deaths?. Death Studies 44 (12), pp.793-801. (10.1080/07481187.2019.1614109)
2019
- Alorainy, W. et al. 2019. 'The enemy among us': detecting cyber hate speech with threats-based othering language embeddings. ACM Transactions on the Web 13 (3) 14. (10.1145/3324997)
- Anthi, E. et al. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things 6 (5), pp.9042-9053. (10.1109/JIOT.2019.2926365)
- Nunes, M. et al. 2019. Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis. Journal of Information Security and Applications 48 102365. (10.1016/j.jisa.2019.102365)
- Williams, M. L. et al. 2019. Under the corporate radar: examining insider business cybercrime victimization through an application of routine activities theory. Deviant Behavior 40 (9), pp.1119-1131. (10.1080/01639625.2018.1461786)
- Rhode, M. et al. 2019. LAB to SOC: Robust Features for Dynamic Malware Detection. Presented at: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2019) Portland, OR, USA 24-27 June 2019. 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Industry Track. IEEE. , pp.13-16. (10.1109/DSN-Industry.2019.00010)
- Javed, A. , Burnap, P. and Rana, O. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56 (3), pp.1133-1145. (10.1016/j.ipm.2018.02.003)
- Liu, H. et al. 2019. Fuzzy multi-task learning for hate speech type identification. Presented at: The Web Conference 2019 San Francisco, CA, USA 13-17 May 2019. WWW '19 The World Wide Web Conference. ACM. , pp.3006-3012. (10.1145/3308558.3313546)
- Liu, H. et al. 2019. A fuzzy approach to text classification with two-stage training for ambiguous instances. IEEE Transactions on Computational Social Systems 6 (2), pp.227-240. (10.1109/TCSS.2019.2892037)
- Aldmour, R. , Burnap, P. and Lakoju, M. 2019. Risk assessment methods for converged IoT and SCADA systems: review and recommendations. Presented at: Living in the Internet of Things (IoT 2019) London, UK 1-2 May 2019. Living in the Internet of Things (IoT 2019). IET. , pp.5-10. (10.1049/cp.2019.0130)
- Barati, M. et al. 2019. Privacy-aware cloud ecosystems and GDPR compliance. Presented at: 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud) 26-28 August 2019 Istanbul, Turkey. 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE. , pp.117. (10.1109/FiCloud.2019.00024)
- Burnap, P. et al. 2019. Chatty factories: a vision for the future of product design and manufacture with IoT. Presented at: Living in the Internet of Things (IoT 2019) London, UK 1-2 May 2019. Living in the Internet of Things (IoT 2019). IET. , pp.4 (6 pp.). (10.1049/cp.2019.0129)
- Procter, R. et al., 2019. A study of cyber hate on Twitter with implications for social media governance strategies. arxiv.org (Cornell University)
- Scourfield, J. et al. 2019. The number and characteristics of newspaper and Twitter reports on suicides and road traffic deaths in young people. Archives of Suicide Research 23 (3), pp.507-522. (10.1080/13811118.2018.1479321)
2018
- Alorainy, W. et al. 2018. Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample. Presented at: International Conference on Machine Learning and Cybernetics Chengdu, China 15-18 July 2018. 2018 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE. , pp.581-586. (10.1109/ICMLC.2018.8527001)
- Radanliev, P. et al., 2018. Future developments in cyber risk assessment for the internet of things. Computers in Industry 102 , pp.14-22. (10.1016/j.compind.2018.08.002)
- Anthi, E. et al. 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78 , pp.477-490. (10.1016/j.cose.2018.07.016)
- Rhode, M. , Burnap, P. and Jones, K. 2018. Early-stage malware prediction using recurrent neural networks. Computers and Security 77 , pp.578-594. (10.1016/j.cose.2018.05.010)
- Burnap, P. et al. 2018. Malware classification using self organising feature maps and machine activity data. Computers and Security 73 , pp.399-410. (10.1016/j.cose.2017.11.016)
- Housley, W. et al. 2018. Interaction and transformation on social media: the case of Twitter campaigns. Social Media and Society 4 (1), pp.1-12. (10.1177/2056305117750721)
2017
- Williams, M. L. et al. 2017. Users' views of ethics in social media research: informed consent, anonymity and harm. In: Woodfield, K. ed. The Ethics of Online Research. Vol. 2, Advances in Research Ethics and Integrity Emerald Publishing. , pp.27-52. (10.1108/S2398-601820180000002002)
- Williams, M. L. , Burnap, P. and Sloan, L. 2017. Towards an ethical framework for publishing Twitter data in social research: taking into account users’ views, online context and algorithmic estimation. Sociology 51 (6), pp.1149-1168. (10.1177/0038038517708140)
- Thomas, L. et al. 2017. Automation of the supplier role in the GB power system using blockchain based smart contracts. CIRED - Open Access Proceedings Journal 2017 (1), pp.2619-2623. (10.1049/oap-cired.2017.0987)
- Burnap, P. et al. 2017. Multi-class machine classification of suicide-related communication on Twitter. Online Social Networks and Media 2 , pp.32-44. (10.1016/j.osnem.2017.08.001)
- Webb, H. et al., 2017. The ethical challenges of publishing Twitter data for research dissemination. Presented at: WebSci'17: ACM Web Science Conference Troy, NY, USA 25-28 June 2017. Proceedings of the 2017 ACM on Web Science Conference. ACM. , pp.339-348. (10.1145/3091478.3091489)
- Baylis, R. et al. 2017. Private lenders' demand for audit. Journal of Accounting and Economics 64 (1), pp.78-97. (10.1016/j.jacceco.2017.06.001)
- Alsaedi, N. , Burnap, P. and Rana, O. 2017. Can we predict a riot? Disruptive event detection using Twitter. ACM Transactions on Internet Technology 17 (2) 18. (10.1145/2996183)
- Eden, P. et al., 2017. SCADA system forensic analysis within IIoT. In: Thames, L. and Schaefer, D. eds. Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing. Springer Series in Advanced Manufacturing , pp.73-101. (10.1007/978-3-319-50660-9_4)
- Burnap, P. et al. 2017. Determining and sharing risk data in distributed interdependent systems. IEEE Computer 50 (4), pp.72-79. (10.1109/MC.2017.108)
- Williams, M. L. , Burnap, P. and Sloan, L. 2017. Crime sensing with big data: the affordances and limitations of using open-source communications to estimate crime patterns. British Journal of Criminology 57 (2), pp.320-340. (10.1093/bjc/azw031)
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2017. Temporal TF-IDF: a high performance approach for event summarization in Twitter. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence Omaha, Nebraska, USA 13-16 October 2016. 2016 IEEE/WIC/ACM International Conference on Web Intelligence. IEEE. , pp.515-521. (10.1109/WI.2016.0087)
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2017. Sensing real-world events using social media data and a classification-clustering framework. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence Omaha, Nebraska, USA 13-16 October 2016. 2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI). IEEE. , pp.216-223. (10.1109/WI.2016.0039)
- Thomas, L. et al. 2017. Automation of the supplier role in the GB power system using blockchain based smart contracts. Presented at: CIRED 2017 - International Conference on Electricity Distribution Glasgow, UK 12-15 June 2017.
- Williams, M. L. and Burnap, P. 2017. Detecting crime events using social media. Presented at: Home Office Crime and Policing Analysis Unit Seminar Series Westminster, London, UK July, 2017. , pp.-.
- Burnap, P. and Williams, M. L. 2017. Classifying and modeling cyber hate speech: research and opportunities for practical intervention. Presented at: 1st International Conference on Cyber Deviance Detection (CyberDD) in conjunction with 10th ACM International Conference on Web Search and Data Mining (WSDM 2017) Cambridge, UK 10 Feb 2017.
- Williams, M. and Burnap, P. 2017. Online extremism and hate speech: definition, measurement & regulation. Presented at: Internet Leadership Academy Oxford Internet Institute, University of Oxford, UK 26 September 2017.
- Williams, M. L. and Burnap, P. 2017. Data science solutions for detecting and monitoring Brexit related online hate speech. Presented at: UK Government Data Science Community Interest Workshop ONS Data Science Campus, Newport, Wales, UK 4 September 2017.
- Williams, M. L. and Burnap, P. 2017. Social data science & criminology: machine classification and modelling of cyberhate in online social networks. Presented at: Cambridge Institute of Criminology Seminar Series University of Cambridge, UK 9 February 2017.
2016
- Scourfield, J. B. et al. 2016. The response in Twitter to an assisted suicide in a television soap opera. Crisis: The Journal of Crisis Intervention and Suicide Prevention 37 (5), pp.392-395. (10.1027/0227-5910/a000377)
- Burnap, P. and Williams, M. L. 2016. Computational human and cyber security analytics for government and policy. Presented at: Data Science and Government Conference Oxford, UK 22 June 2016.
- Webb, H. et al., 2016. Digital wildfires: propagation, verification, regulation, and responsible innovation. ACM Transactions on Information Systems 34 (3) 15. (10.1145/2893478)
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2016. Automatic summarization of real world events using Twitter. Presented at: International AAAI Conference on Web and Social Media (ICWSM) Cologne, Germany 17-20 May 2016. Proceedings of the Tenth International AAAI Confe. AAAI. , pp.511-514.
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2016. Sensing real-world events using Arabic Twitter posts. Presented at: International AAAI Conference on Web and Social Media (ICWSM) Cologne, Germany 17-20 May 2016. Proceedings of the Tenth International AAAI Conference on Web and Social Media (ICWSM 2016). AAAI. , pp.515-518.
- Williams, M. L. and Burnap, P. 2016. Cyberhate on social media in the aftermath of Woolwich: a case study in computational criminology and big data. British Journal of Criminology 56 (2), pp.211-238. (10.1093/bjc/azv059)
- Awan, M. S. K. , Burnap, P. and Rana, O. F. 2016. Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. Computers and Security 57 , pp.31-46. (10.1016/j.cose.2015.11.003)
- Burnap, P. et al. 2016. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Electoral Studies 41 , pp.230-233. (10.1016/j.electstud.2015.11.017)
- Cherdantseva, Y. et al. 2016. A review of cyber security risk assessment methods for SCADA systems. Computers and Security 56 , pp.1-27. (10.1016/j.cose.2015.09.009)
- Conejero, J. et al., 2016. Analysing Hadoop power consumption and impact on application QoS. Future Generation Computer Systems 55 , pp.213-223. (10.1016/j.future.2015.03.009)
- Burnap, P. and Williams, M. L. 2016. Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science 5 11. (10.1140/epjds/s13688-016-0072-6)
- Eden, P. et al., 2016. Forensic readiness for SCADA/ICS incident response. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research Queen's University Belfast, Belfast, UK 23-25 August 2016.
2015
- Burnap, P. , Colombo, G. and Scourfield, J. B. 2015. Machine classification and analysis of suicide-related communication on Twitter. Presented at: 26th ACM Conference on Hypertext & Social Media Cyprus 1-4 September 2015. HT '15- Proceedings of the 26th ACM Conference on Hypertext & Social Media. Association for Computing Machinery. , pp.75-84.
- Webb, H. et al., 2015. Digital wildfires: hyper-connectivity, havoc, and a global ethos to govern social media. Computers and Society 45 (3), pp.193-201.
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2015. Identifying disruptive events from social media to enhance situational awareness. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) Paris, France 24-27 August 2015. ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM. , pp.934-941. (10.1145/2808797.2808879)
- Burnap, P. et al. 2015. Real-time classification of malicious URLs on Twitter using Machine Activity Data. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) Paris, France 25-27 August 2015. 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). ACM. , pp.970-977. (10.1145/2808797.2809281)
- Williams, M. L. and Burnap, P. 2015. Combating cyber-hate on social media throughcounter-speech. Presented at: Symposium on Anti-Muslim Hate Crime University of Cambridge, Cambridge, UK 16 June 2015.
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7 (2), pp.223-242. (10.1002/poi3.85)
- Alsaedi, N. and Burnap, P. 2015. Arabic event detection in social media. Presented at: 16th International Conference on Intelligent Text Processing and Computational Linguistics Cairo, Egypt 14-20 April 2015. Published in: Gelbukh, A. ed. Computational Linguistics and Intelligent Text Processing: 16th International Conference, CICLing 2015, Cairo, Egypt, April 14-20, 2015, Proceedings, Part I. Vol. 9041.Lecture Notes in Computer Science Springer Verlag. , pp.384-401. (10.1007/978-3-319-18111-0_29)
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: an application of machine classification and statistical modeling for policy and decision making. Presented at: ICWSM Workshop on Religion and Social Media University of Oxford, Oxford, UK 26 May 2015.
- Williams, M. L. and Burnap, P. 2015. Cyber-hate on social media in the aftermath of Woolwich. Presented at: Government Hate Crime Seminar London, UK 11 March 2015.
- Sloan, L. et al. 2015. Who tweets? Deriving the demographic characteristics of age, occupation and social class from Twitter user meta-data. PLoS ONE 10 (3) e0115545. (10.1371/journal.pone.0115545)
- Colombo, G. B. et al. 2015. Analysing the connectivity and communication of suicidal users on Twitter. Computer Communications 73 (B), pp.291-300. (10.1016/j.comcom.2015.07.018)
- Al Said, T. , Rana, O. F. and Burnap, P. 2015. VMInformant: an instrumented virtual machine to support trustworthy cloud computing. International Journal of High Performance Computing and Networking 8 (3), pp.222-234. IJHPCN080303. (10.1504/IJHPCN.2015.071257)
- Awan, M. , Burnap, P. and Rana, O. F. 2015. An empirical risk management framework for monitoring network security. Presented at: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), Liverpool, UK 26-28 October 2015. Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on. IEEE. , pp.1764-1771. (10.1109/CIT/IUCC/DASC/PICOM.2015.266)
- Awan, M. S. K. et al. 2015. A classification framework for distinct cyber-attacks based on occurrence patterns. Presented at: The 9th International Conference on Security of Information and Networks Soch, Russia 8-10 September 2015. Proceedings of the 8th International Conference on Security of Information and Networks. ACM. , pp.165-168. (10.1145/2799979.2800037)
- Awan, M. S. K. et al. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC New York City, NY, USA 24-26 August 2015. High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE. , pp.1442-1447. (10.1109/HPCC-CSS-ICESS.2015.224)
- Awan, M. S. , Burnap, P. and Rana, O. F. 2015. Estimating risk boundaries for persistent and stealthy cyber-attacks. Presented at: 22nd ACM Conference on Computer and Communications Security Denver Colorado, USA 12-16 October 2015. SafeConfig '15 Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense. ACM. , pp.15-20. (10.1145/2809826.2809830)
- Burnap, P. et al. 2015. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Working paper. Cardiff University.
- Burnap, P. et al. 2015. COSMOS: Towards an integrated and scalable service for analysing social media on demand. International Journal of Parallel, Emergent and Distributed Systems 30 (2), pp.80-100. (10.1080/17445760.2014.902057)
- Burnap, P. et al. 2015. Detecting tension in online communities with computational Twitter analysis. Technological Forecasting & Social Change 95 , pp.96-108. (10.1016/j.techfore.2013.04.013)
- Burnap, P. and Williams, M. L. 2015. Plenary: Computational & social security analytics using Big Data. Presented at: International Conference on Computational Social Science Helsinki, Finland 8-11 June 2015.
- Eden, P. et al., 2015. A cyber forensic taxonomy for SCADA systems in critical infrastructure. Presented at: The 10th International Conference on Critical Information Infrastructures Security 2015 (CRITIS 2015) Berlin, Germany 5-7 October 2015.
- Eden, P. et al., 2015. A forensic taxonomy of SCADA systems and approach to incident response. Presented at: The 3rd International Symposium for ICS and SCADA Cyber Security Research 2015 (ICS-CSR 2015) Ingolstadt, Germany 17 - 18 September 2015. (10.14236/ewic/ICS2015.5)
- Rahulamathavan, Y. et al., 2015. Assessing data breach risk in cloud systems. Presented at: 7th International Conference on Cloud Computing Technology and Science (CloudCom) Vancouver, BC, Canada 30 Nov-3 Dec 2015. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE. , pp.363-370. (10.1109/CloudCom.2015.58)
- Williams, M. L. and Burnap, P. 2015. Economic and Social Research Council Trans-Atlantic Platform Workshop. Presented at: Digital Scholarship in the Social Sciences and Humanities: New Forms of Data for Research Washington DC, USA 28-29 Jan 2015.
- Williams, M. L. and Burnap, P. 2015. Using big social data and real-time analytics to inform policy. Presented at: Policy-Making in the Big Data Era: Opportunities and Challenges University of Cambridge, Cambridge, UK 15-17 June 2015.
2014
- Burnap, P. et al. 2014. Towards real-time probabilistic risk assessment by sensing disruptive events from streamed news feeds. Presented at: 8th IEEE International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2014) Birmingham City University, Birmingham, UK. 2-4 July 2014. , pp.-.
- Sloan, L. , Williams, M. L. and Burnap, P. 2014. Deriving demographic variables from twitter data. Presented at: Office for National Statistics Big Data Project Workshop Titchfield, England 21 July 2014. , pp.-.
- Williams, M. L. and Burnap, P. 2014. Hate speech, tension monitoring and social media. Presented at: Wales Hate Crime Criminal Justice Board Cardiff, Wales 23 July 2014. , pp.-.
- Burnap, P. et al. 2014. Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4 206. (10.1007/s13278-014-0206-4)
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2014. A combined classification-clustering framework for identifying disruptive events. Presented at: ASE SocialCom Conference Stanford University, CA., USA May 27-21 2014.
- Burnap, P. and Williams, M. L. 2014. Big social data analysis panel. Presented at: Web Science Trust Web Science Summer School National University of Singapore, Singapore, Malaysia 8-12 December 2014.
- Burnap, P. and Williams, M. L. 2014. Hate speech, machine classification and statistical modelling of information flows on Twitter: interpretation and communication for policy decision making. Presented at: Internet, Policy & Politics Oxford, UK 26 September 2014.
- Housley, W. et al. 2014. Big and broad social data and the sociological imagination: a collaborative response. Big Data & Society 1 (2)(10.1177/2053951714545135)
- Rahulamathavan, Y. et al., 2014. Analysing security requirements in cloud-based service level agreements. Presented at: SIN '14 The 7th International Conference on Security of Information and Networks Glasgow 9 - 11 September 2014. Proceedings of the 7th International Conference on Security of Information and Networks. New York, NY: ACM. , pp.73-77. (10.1145/2659651.2659735)
- Williams, M. and Burnap, P. L. 2014. Human security analytics. Presented at: Web Science Trust Web Science Summer School National University of Singapore, Singapore, Malaysia 8-12 December 2014.
2013
- Burnap, P. , Avis, N. J. and Rana, O. F. 2013. Making sense of self-reported socially significant data using computational methods. International Journal of Social Research Methodology 16 (3), pp.215-230. (10.1080/13645579.2013.774174)
- Burnap, P. et al. 2013. Collaborative online social media observatory. Presented at: Web Observatory Launch, Royal Society London, UK 2013.
- Burnap, P. et al. 2013. Detecting tension in social media. Presented at: Third International Conference on Social Computing and its Applications Karlsruhe, Germany 30 Sept - 2 Oct 2013.
- Conejero, J. et al., 2013. Scaling archived social media data analysis using a hadoop cloud. Presented at: IEEE 6th International Conference on Cloud Computing (CLOUD) Santa Clara, CA, USA 27 June - 2 July 2013. IEEE
- Conejero, J. et al., 2013. Characterising the power consumption of Hadoop Clouds: A social media analysis case study. Presented at: CLOSER 2013: 3rd International Conference on Cloud Computing and Services Science Aachen, Germany 8-10 May 2013. (10.5220/0004373502330243)
- Housley, W. et al. 2013. COSMOS: theory, method and data. Presented at: Centre for Interdisciplinary Methodologies, University of Warwick Warwick, UK 2013.
- Rob, P. et al., 2013. Enabling social media research through citizen social science. Presented at: 13th European Conference on Computer Supported Cooperative Work Paphos, Cyprus 21-25 September 2013.
- Sloan, L. et al. 2013. Knowing the Tweeters: Deriving sociologically relevant demographics from Twitter. Sociological Research Online 18 (3) 7. (10.5153/sro.3001)
- Sloan, L. et al. 2013. The Collaborative Online Social Media Observatory. Presented at: ESRC Seminar Series: New Social Media, New Social Science? Blurring the Boundaries: One Year On London, UK 2013.
- Sloan, L. et al. 2013. Using social media with survey data. Presented at: ESRC Seminar Series: New Social Media, New Social Science? London, UK 2013.
- Williams, M. L. et al. 2013. Policing cyber-neighbourhoods: Tension monitoring and social media networks. Policing and Society 23 (4), pp.461-481. (10.1080/10439463.2013.780225)
- Williams, M. L. et al. 2013. Collaborative online social media observatory. Presented at: COSMOS Launch London, England 2013.
2012
- Spasic, I. et al. 2012. A naïve Bayes approach to classifying topics in suicide notes. Biomedical Informatics Insights 5 (Supp 1), pp.87-97. (10.4137/BII.S8945)
- Burnap, P. et al. 2012. Social media analysis, Twitter and the London Olympics (a research note). Working paper. Cardiff: Cardiff University.
- Burnap, P. et al. 2012. Working paper 153: social media analysis, Twitter and the London Olympics 2012 [working paper]. Working paper. Cardiff: School of Social Sciences, Cardiff University. Available at: http://www.cardiff.ac.uk/socsi/resources/Working%20Paper%20153%20-%20Burnap%20et%20al.%20(2013)%20Social%20Media%20Analysis,%20Twitter%20and%20the%20London%20Olympics%202012%20-%20A%20Research%20Note.pdf.
- Burnap, P. et al. 2012. Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information. Presented at: 2012 International Conference on Collaboration Technologies and Systems (CTS) Denver, CO, USA 21-25 May 2012. Published in: Smari, W. W. and Charles, F. eds. 2012 International Conference on Collaboration Technologies and Systems (CTS). Vol. 14.Los Alamitos, CA: IEEE. , pp.490-497. (10.1109/CTS.2012.6261095)
- Edwards, A. M. et al. 2012. Mining tension and cohesion using the Cardiff Online Social Media Observatory. Presented at: NCRM, Research Methods Festival,St Catherine's College, University of Oxford Oxford, UK 2012.
- Housley, W. et al. 2012. Supporting empirical digital social research for the social sciences. Presented at: Digital Research 2012 Conference, St Catherines College, University of Oxford Oxford, UK 2012.
- Williams, M. D. et al. 2012. Computational social science and methodological innovation: surrogacy, augmentation or reorientation. Presented at: ESRC Seminar Series: Blurring the boundaries: New social media, new social science? London, UK 2012.
- Williams, M. L. et al. 2012. Treating social media as data: computational sociological Methods, data analysis and the Cardiff online social media Observatory. Presented at: NCRM, Research Methods Festival, St Catherine's College, University of Oxford Oxford, UK 2012.
- Williams, M. L. et al. 2012. Computational and transformational social science. Presented at: Digital Social Research Experts Meeting, Keble College, University of Oxford Oxford, UK 2012.
2010
- Alsalamah, S. , Hilton, J. C. and Burnap, P. 2010. Towards information sharing in virtual organisations: The development of an icon-based information control model. Presented at: The UK All Hands Meeting (AHM) Cardiff, UK 13- 16 September 2010.
2009
- Burnap, P. 2009. Advanced access control in support and distributed collaborative working and de-perimeterization. PhD Thesis , Cardiff University.
- Burnap, P. and Hilton, J. C. 2009. Self protecting data for de-perimeterised information sharing. Presented at: Third International Conference on Digital Society ICDS '09 Cancun, Mexico 1-7 February 2009. Digital Society, 2009. ICDS '09. Third International Conference on. IEEE. , pp.65-70. (10.1109/ICDS.2009.41)
2008
- Burnap, P. and Hilton, J. C. 2008. Information assurance for collaborative working in deperimeterised environments. Presented at: UK e-Science All Hands Meeting Edinburgh, UK 8-11 September 2008.
2006
- Gray, W. A. et al. 2006. MDSSF - A Federated Architecture for Product Procurement. Lecture Notes in Computer Science 4080 , pp.812-821. (10.1007/11827405_79)
- Pahwa, J. S. et al. 2006. MDSSF- A federated architecture for product procurement. Presented at: 17th International Conference on Database and Expert Systems Applications (DEXA '06) Krakov, Poland
2005
- Burnap, P. et al. 2005. Worldwide messaging support for high performance real-time collaboration. Presented at: 4th UK e-Science Programme All Hands Meeting Nottingham, UK 19-22 September 2005. Published in: Cox, S. J. and Walker, D. W. eds. Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC. , pp.395.
- Burnap, P. et al. 2005. A service oriented infrastructure to facilitate trust in collaborative working. Presented at: 4th UK e-Science Programme All Hands Meeting Nottingham, UK 19-22 September 2005. Published in: Cox, S. J. and Walker, D. W. eds. Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC. , pp.346.
- Burnap, P. et al. 2005. Grid based E-procurement. Proceedings of the ASCE , pp.1-11. (10.1061/40794(179)156)
- Rana, O. F. et al. 2005. Secure virtual organisations: Protocols and requirements. Presented at: Information Security Solutions Europe (ISSE) 2005 - The Independent European ICT Security Conference and Exhibition Budapest, Hungary 27-29 September 2005. Published in: Paulus, S. , Pohlmann, N. and Reimer, H. eds. ISSE 2005 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2005 Conference. Berlin: Springer. , pp.422-432.
2004
- Burnap, P. et al. 2004. Security user and data management for collaborative virtual teams in a grid environment supporting consortia in the construction industry. Presented at: Proceedings of the Workshop on Requirements Capture for Collaboration in e-Science Edinburgh, UK, pp.54-60.
- Joita, L. et al. 2004. Supporting collaborative virtual organisations in the construction industry via the grid. Presented at: UK e-Science all Hands Meeting (AHM2004) Nottingham, UK 31 August - 3 September 2004. Published in: Cox, S. J. ed. Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC
- Joita, L. et al. 2004. A grid-enabled security framework for collaborative virtual organisations. Presented at: 5th IFIP Working Conference on Virtual Enterprises (PRO-VE) Toulouse, France 22-27 August 2004.
- Joita, L. et al. 2004. A grid enabled security framework for collaborative virtual organisations. Presented at: Proceedings of Virtual Enterprises and Collaborative Networks IFIP 18th World Computer congressTC5/WG5.5 5th Working Conference on Virtual Enterprises Toulouse, UK, pp.22-27.
- Miles, J. C. et al. 2004. Collaborative engineering Virtual Teams in a Grid Environment Supporting Consortia in the Construction Industry. Presented at: 10th International Conference on Computing in Civil and Building Engineering (ICCCBE) Weimar, Germany 2-4 June 2004.
- Pahwa, J. S. et al. 2004. Creating a virtual distributed database - data definition and search model for collaborative virtual teams in the construction industry. Presented at: Proceedings 21st Annual British National Conference on Databases (BNCOD2004) Edinburgh, UK
Articles
- Ieropoulos, V. et al. 2025. Collaborative intrusion detection in resource-constrained IoT environments: Challenges, methods, and future directions a review. Journal of Information Security and Applications 93 104127. (10.1016/j.jisa.2025.104127)
- Williams, L. and Burnap, P. 2025. The emotional landscape of technological innovation: a data driven case study of ChatGPT's launch. Informatics 12 (3) 58. (10.3390/informatics12030058)
- Vyas, S. et al. 2025. Towards the deployment of realistic autonomous cyber network defence: A systematic review. ACM Computing Surveys 58 (1) 5. (10.1145/3729213)
- Kayan, H. et al. 2025. Real-time anomaly detection for industrial robotic arms using edge computing. IEEE Internet of Things Journal 12 (15), pp.29696-29712. (10.1109/jiot.2025.3569780)
- Mohammed, A. S. et al. 2025. STADe: An unsupervised time-windows method of detecting anomalies in oil and gas Industrial Cyber-Physical Systems (ICPS) networks. International Journal of Critical Infrastructure Protection 49 100762. (10.1016/j.ijcip.2025.100762)
- Williams, L. , Khan, H. and Burnap, P. 2025. The evolution of digital security by design using temporal network analysis. Informatics 12 (1) 8. (10.3390/informatics12010008)
- Rotibi, A. , Saxena, N. and Burnap, P. 2024. Winning the battle with cyber risk identification tools in industrial control systems: A review. IET Cyber-Physical Systems: Theory & Applications 9 (4), pp.350-365. (10.1049/cps2.12105)
- Williams, L. , Anthi, E. and Burnap, P. 2024. Uncovering key factors that drive the impressions of online emerging technology narratives. Information 15 (11) 706. (10.3390/info15110706)
- Nunes, M. et al. 2024. Exploiting user-centred design to secure industrial control systems. Frontiers in the Internet of Things 3 1436023. (10.3389/friot.2024.1436023)
- Kayan, H. et al. 2024. CASPER: Context-aware IoT anomaly detection system for industrial robotic arms. ACM Transactions on Internet of Things 18 , pp.1-36. (10.1145/3670414)
- Rotibi, A. et al. 2024. System-level operational cyber risks identification in industrial control systems. Cyber-Physical Systems (10.1080/23335777.2024.2373388)
- Burnap, P. et al. 2024. Mapping automated cyber attack intelligence to context-based impact on system-level goals. Journal of Cybersecurity and Privacy 4 (2), pp.340-356. (10.3390/jcp4020017)
- Williams, L. et al. 2024. Topic modelling: Going beyond token outputs. Big Data and Cognitive Computing 8 (5) 44. (10.3390/bdcc8050044)
- Williams, L. , Anthi, E. and Burnap, P. 2024. A scalable and automated framework for tracking the likely adoption of emerging technologies. Information 15 (4) 237. (10.3390/info15040237)
- Williams, L. , Anthi, E. and Burnap, P. 2024. Comparing hierarchical approaches to enhance supervised emotive text classification. Big Data and Cognitive Computing 8 (4)(10.3390/bdcc8040038)
- Shaked, A. et al. 2023. Operations-informed incident response playbooks. Computers and Security 134 103454. (10.1016/j.cose.2023.103454)
- Nafees, M. N. et al. 2023. Smart grid cyber-physical situational awareness of complex operational technology attacks: A review. ACM Computing Surveys 55 (10), pp.1-36. 215. (10.1145/3565570)
- Alrowaili, Y. et al. 2023. Review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification. IET Cyber-Physical Systems: Theory & Applications 8 (3), pp.160-185. (10.1049/cps2.12059)
- Williams, M. L. et al. 2023. The effect of the Brexit vote on the variation in race and religious hate crimes in England, Wales, Scotland and Northern Ireland. The British Journal of Criminology: An International Review of Crime and Society 63 (4), pp.1003-1023. (10.1093/bjc/azac071)
- Foster, B. , Williams, M. and Burnap, P. 2023. Combatting community tensions in Wales: Mapping the cooperation space for multi-agency cohesion delivery. British Journal of Community Justice 19 (1), pp.55-81. (10.48411/eq13-km71)
- Asiri, M. et al. 2023. Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective. ACM transactions on cyber-physical systems 7 (2), pp.1-33. (10.1145/3587255)
- Agyepong, E. et al. 2023. A systematic method for measuring the performance of a cyber security operations centre analyst. Computers and Security 124 102959. (10.1016/j.cose.2022.102959)
- Mohammed, A. S. et al. 2023. Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication. Computers and Security 124 103007. (10.1016/j.cose.2022.103007)
- Ikwu, R. et al. 2023. Digital fingerprinting for identifying malicious collusive groups on Twitter. Journal of Cybersecurity 9 (1) tyad014. (10.1093/cybsec/tyad014)
- Rotibi, A. et al. 2023. Extended dependency modelling technique for cyber risk identification in ICS. IEEE Access 11 , pp.37229-37242. (10.1109/ACCESS.2023.3263671)
- Aloraini, F. et al. 2022. Adversarial machine learning in IoT from an insider point of view. Journal of Information Security and Applications 70 103341. (10.1016/j.jisa.2022.103341)
- Javed, A. et al. 2022. Disrupting drive-by download networks on Twitter.. Social Network Analysis and Mining 12 (117)
- Mohammed, A. S. et al. 2022. Cybersecurity challenges in the offshore oil and gas Industry: An Industrial Cyber-Physical Systems (ICPS) perspective. ACM transactions on cyber-physical systems 6 (3), pp.1-27. 27. (10.1145/3548691)
- Nunes, M. et al. 2022. Bane or boon: measuring the effect of evasive malware on system call classifiers. Journal of Information Security and Applications 67 103202. (10.1016/j.jisa.2022.103202)
- Cherdantseva, Y. et al. 2022. A configurable dependency model of a SCADA system for goal-oriented risk assessment. Applied Sciences 12 (10) 4880. (10.3390/app12104880)
- Javed, A. et al. 2022. Security analytics for real-time forecasting of cyberattacks. Software: Practice and Experience 52 (3), pp.788-804. (10.1002/spe.2822)
- Alorainy, W. et al. 2022. Disrupting networks of hate: Characterising hateful networks and removing critical nodes. Social Network Analysis and Mining 12 27. (10.1007/s13278-021-00818-z)
- Kayan, H. et al. 2022. Cybersecurity of industrial cyber-physical systems: a review. ACM Computing Surveys 54 (11s) 229. (10.1145/3510410)
- Rhode, M. , Burnap, P. and Wedgbury, A. 2021. Real-time malware process detection and automated process killing. Security and Communication Networks 2021 8933681. (10.1155/2021/8933681)
- Anthi, E. et al. 2021. Hardening machine learning Denial of Service (DoS) defences against adversarial attacks in IoT smart home networks. Computers and Security 108 102352. (10.1016/j.cose.2021.102352)
- Lakoju, M. et al., 2021. Unsupervised learning for product use activity recognition: an exploratory study of a “Chatty Device”. Sensors 21 (15) 4991. (10.3390/s21154991)
- Radanliev, P. et al., 2021. Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge. Environment Systems and Decisions 41 , pp.236-247. (10.1007/s10669-020-09792-x)
- Anthi, E. et al. 2021. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. Journal of Information Security and Applications 58 102717. (10.1016/j.jisa.2020.102717)
- Aliwa, E. et al. 2021. Cyberattacks and countermeasures for in-vehicle networks. ACM Computing Surveys 54 (1) 21. (10.1145/3431233)
- Lakoju, M. et al. 2021. "Chatty Devices” and edge-based activity classification. Discover Internet of Things 1 5. (10.1007/s43926-021-00004-9)
- Anthi, E. et al. 2021. A three-tiered intrusion detection system for Industrial Control Systems (ICS). Journal of Cybersecurity 7 (1) tyab006. (10.1093/cybsec/tyab006)
- Al Baghal, T. et al., 2020. Linking Twitter and survey data: the impact of survey mode and demographics on consent rates across three UK studies. Social Science Computer Review 38 (5), pp.517-532. (10.1177/0894439319828011)
- Saxena, N. et al. 2020. Impact and key challenges of insider threats on organizations and critical businesses. Electronics 9 (9) 1460. (10.3390/electronics9091460)
- Bérubé, M. et al., 2020. Social media forensics applied to assessment of post–critical incident social reaction: The case of the 2017 Manchester Arena terrorist attack. Forensic Science International 313 110364. (10.1016/j.forsciint.2020.110364)
- Javed, A. et al. 2020. Emotions behind drive-by download propagation on Twitter. ACM Transactions on the Web 14 (4) 16. (10.1145/3408894)
- Pratomo, B. , Burnap, P. and Theodorakopoulos, G. 2020. BLATTA: early exploit setection on network traffic with recurrent neural networks. Security and Communication Networks 2020 8826038. (10.1155/2020/8826038)
- Saxena, N. et al. 2020. PharmaCrypt: blockchain for critical pharmaceutical industry to counterfeit drugs. Computer 53 (7), pp.29-44. (10.1109/MC.2020.2989238)
- Radanliev, P. et al., 2020. Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecurity 3 13. (10.1186/s42400-020-00052-8)
- Ozalp, S. et al. 2020. Antisemitism on twitter: collective efficacy and the role of community organisations in challenging online hate speech. Social Media and Society 6 (2), pp.1-20. (10.1177/2056305120916850)
- Williams, M. L. et al. 2020. Hate in the machine: anti-black and anti-Muslim social media posts as predictors of offline racially and religiously aggravated crime. British Journal of Criminology 60 (1), pp.93-117. (10.1093/bjc/azz049)
- Agyepong, E. et al. 2020. Challenges and performance metrics for security operations center analysts: a systematic review. Journal of Cyber Security Technology 4 (3), pp.125-152. (10.1080/23742917.2019.1698178)
- Scourfield, J. et al. 2020. Are youth suicide memorial sites on Facebook different from those for other sudden deaths?. Death Studies 44 (12), pp.793-801. (10.1080/07481187.2019.1614109)
- Alorainy, W. et al. 2019. 'The enemy among us': detecting cyber hate speech with threats-based othering language embeddings. ACM Transactions on the Web 13 (3) 14. (10.1145/3324997)
- Anthi, E. et al. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things 6 (5), pp.9042-9053. (10.1109/JIOT.2019.2926365)
- Nunes, M. et al. 2019. Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis. Journal of Information Security and Applications 48 102365. (10.1016/j.jisa.2019.102365)
- Williams, M. L. et al. 2019. Under the corporate radar: examining insider business cybercrime victimization through an application of routine activities theory. Deviant Behavior 40 (9), pp.1119-1131. (10.1080/01639625.2018.1461786)
- Javed, A. , Burnap, P. and Rana, O. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56 (3), pp.1133-1145. (10.1016/j.ipm.2018.02.003)
- Liu, H. et al. 2019. A fuzzy approach to text classification with two-stage training for ambiguous instances. IEEE Transactions on Computational Social Systems 6 (2), pp.227-240. (10.1109/TCSS.2019.2892037)
- Procter, R. et al., 2019. A study of cyber hate on Twitter with implications for social media governance strategies. arxiv.org (Cornell University)
- Scourfield, J. et al. 2019. The number and characteristics of newspaper and Twitter reports on suicides and road traffic deaths in young people. Archives of Suicide Research 23 (3), pp.507-522. (10.1080/13811118.2018.1479321)
- Radanliev, P. et al., 2018. Future developments in cyber risk assessment for the internet of things. Computers in Industry 102 , pp.14-22. (10.1016/j.compind.2018.08.002)
- Anthi, E. et al. 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78 , pp.477-490. (10.1016/j.cose.2018.07.016)
- Rhode, M. , Burnap, P. and Jones, K. 2018. Early-stage malware prediction using recurrent neural networks. Computers and Security 77 , pp.578-594. (10.1016/j.cose.2018.05.010)
- Burnap, P. et al. 2018. Malware classification using self organising feature maps and machine activity data. Computers and Security 73 , pp.399-410. (10.1016/j.cose.2017.11.016)
- Housley, W. et al. 2018. Interaction and transformation on social media: the case of Twitter campaigns. Social Media and Society 4 (1), pp.1-12. (10.1177/2056305117750721)
- Williams, M. L. , Burnap, P. and Sloan, L. 2017. Towards an ethical framework for publishing Twitter data in social research: taking into account users’ views, online context and algorithmic estimation. Sociology 51 (6), pp.1149-1168. (10.1177/0038038517708140)
- Thomas, L. et al. 2017. Automation of the supplier role in the GB power system using blockchain based smart contracts. CIRED - Open Access Proceedings Journal 2017 (1), pp.2619-2623. (10.1049/oap-cired.2017.0987)
- Burnap, P. et al. 2017. Multi-class machine classification of suicide-related communication on Twitter. Online Social Networks and Media 2 , pp.32-44. (10.1016/j.osnem.2017.08.001)
- Baylis, R. et al. 2017. Private lenders' demand for audit. Journal of Accounting and Economics 64 (1), pp.78-97. (10.1016/j.jacceco.2017.06.001)
- Alsaedi, N. , Burnap, P. and Rana, O. 2017. Can we predict a riot? Disruptive event detection using Twitter. ACM Transactions on Internet Technology 17 (2) 18. (10.1145/2996183)
- Burnap, P. et al. 2017. Determining and sharing risk data in distributed interdependent systems. IEEE Computer 50 (4), pp.72-79. (10.1109/MC.2017.108)
- Williams, M. L. , Burnap, P. and Sloan, L. 2017. Crime sensing with big data: the affordances and limitations of using open-source communications to estimate crime patterns. British Journal of Criminology 57 (2), pp.320-340. (10.1093/bjc/azw031)
- Scourfield, J. B. et al. 2016. The response in Twitter to an assisted suicide in a television soap opera. Crisis: The Journal of Crisis Intervention and Suicide Prevention 37 (5), pp.392-395. (10.1027/0227-5910/a000377)
- Webb, H. et al., 2016. Digital wildfires: propagation, verification, regulation, and responsible innovation. ACM Transactions on Information Systems 34 (3) 15. (10.1145/2893478)
- Williams, M. L. and Burnap, P. 2016. Cyberhate on social media in the aftermath of Woolwich: a case study in computational criminology and big data. British Journal of Criminology 56 (2), pp.211-238. (10.1093/bjc/azv059)
- Awan, M. S. K. , Burnap, P. and Rana, O. F. 2016. Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. Computers and Security 57 , pp.31-46. (10.1016/j.cose.2015.11.003)
- Burnap, P. et al. 2016. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Electoral Studies 41 , pp.230-233. (10.1016/j.electstud.2015.11.017)
- Cherdantseva, Y. et al. 2016. A review of cyber security risk assessment methods for SCADA systems. Computers and Security 56 , pp.1-27. (10.1016/j.cose.2015.09.009)
- Conejero, J. et al., 2016. Analysing Hadoop power consumption and impact on application QoS. Future Generation Computer Systems 55 , pp.213-223. (10.1016/j.future.2015.03.009)
- Burnap, P. and Williams, M. L. 2016. Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science 5 11. (10.1140/epjds/s13688-016-0072-6)
- Webb, H. et al., 2015. Digital wildfires: hyper-connectivity, havoc, and a global ethos to govern social media. Computers and Society 45 (3), pp.193-201.
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7 (2), pp.223-242. (10.1002/poi3.85)
- Sloan, L. et al. 2015. Who tweets? Deriving the demographic characteristics of age, occupation and social class from Twitter user meta-data. PLoS ONE 10 (3) e0115545. (10.1371/journal.pone.0115545)
- Colombo, G. B. et al. 2015. Analysing the connectivity and communication of suicidal users on Twitter. Computer Communications 73 (B), pp.291-300. (10.1016/j.comcom.2015.07.018)
- Al Said, T. , Rana, O. F. and Burnap, P. 2015. VMInformant: an instrumented virtual machine to support trustworthy cloud computing. International Journal of High Performance Computing and Networking 8 (3), pp.222-234. IJHPCN080303. (10.1504/IJHPCN.2015.071257)
- Burnap, P. et al. 2015. COSMOS: Towards an integrated and scalable service for analysing social media on demand. International Journal of Parallel, Emergent and Distributed Systems 30 (2), pp.80-100. (10.1080/17445760.2014.902057)
- Burnap, P. et al. 2015. Detecting tension in online communities with computational Twitter analysis. Technological Forecasting & Social Change 95 , pp.96-108. (10.1016/j.techfore.2013.04.013)
- Burnap, P. et al. 2014. Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4 206. (10.1007/s13278-014-0206-4)
- Housley, W. et al. 2014. Big and broad social data and the sociological imagination: a collaborative response. Big Data & Society 1 (2)(10.1177/2053951714545135)
- Burnap, P. , Avis, N. J. and Rana, O. F. 2013. Making sense of self-reported socially significant data using computational methods. International Journal of Social Research Methodology 16 (3), pp.215-230. (10.1080/13645579.2013.774174)
- Sloan, L. et al. 2013. Knowing the Tweeters: Deriving sociologically relevant demographics from Twitter. Sociological Research Online 18 (3) 7. (10.5153/sro.3001)
- Williams, M. L. et al. 2013. Policing cyber-neighbourhoods: Tension monitoring and social media networks. Policing and Society 23 (4), pp.461-481. (10.1080/10439463.2013.780225)
- Spasic, I. et al. 2012. A naïve Bayes approach to classifying topics in suicide notes. Biomedical Informatics Insights 5 (Supp 1), pp.87-97. (10.4137/BII.S8945)
- Gray, W. A. et al. 2006. MDSSF - A Federated Architecture for Product Procurement. Lecture Notes in Computer Science 4080 , pp.812-821. (10.1007/11827405_79)
- Burnap, P. et al. 2005. Grid based E-procurement. Proceedings of the ASCE , pp.1-11. (10.1061/40794(179)156)
Book sections
- Agyepong, E. et al. 2020. Cyber security operations centre concepts and implementation. In: Yaokumah, W. et al., Modern Theories and Practices for Cyber Ethics and Security Compliance. IGI Global. , pp.88-104. (10.4018/978-1-7998-3149-5.ch006)
- Williams, M. L. et al. 2017. Users' views of ethics in social media research: informed consent, anonymity and harm. In: Woodfield, K. ed. The Ethics of Online Research. Vol. 2, Advances in Research Ethics and Integrity Emerald Publishing. , pp.27-52. (10.1108/S2398-601820180000002002)
- Eden, P. et al., 2017. SCADA system forensic analysis within IIoT. In: Thames, L. and Schaefer, D. eds. Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing. Springer Series in Advanced Manufacturing , pp.73-101. (10.1007/978-3-319-50660-9_4)
Conferences
- Vyas, S. et al. 2026. Beyond training-time poisoning: Component-level and post-training backdoors in deep reinforcement learning. Presented at: AAAI Conference on Artificial Intelligence Conference Singapore 20-27 January 2026.
- Awan, M. S. K. et al. 2025. Modelling spatio-temporal progression of cyberattacks in data networks. Presented at: 2025 7th International Conference on Blockchain Computing and Applications (BCCA) Dubrovnic, Croatia 14-17 October 2025. 2025 7th International Conference on Blockchain Computing and Applications (BCCA). IEEE. , pp.882-888. (10.1109/BCCA66705.2025.11229708)
- Wang, X. , Li, S. and Burnap, P. 2025. SHAP-RM : An XAI framework for evaluating machine learning reliability. Presented at: The 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2025) Gold Coast, Australia 19-22 October, 2025.
- Alrowaili, Y. , Saxena, N. and Burnap, P. 2024. Towards developing an asset-criticality identification framework in smart grids. Presented at: IEEE International Conference on Cyber Security and Resilience (CSR) Workshop on Security, Privacy and Resilience of Critical Assets in Critical Infrastructure (SPARC) London, UK 2-4 Sept 2024. 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE. , pp.720-725. (10.1109/CSR61664.2024.10679477)
- Asiri, M. , Saxena, N. and Burnap, P. 2023. Advancing resilience of cyber-physical smart grid: An integrated co-simulation approach incorporating indicators of compromise. Presented at: International Workshop on Re-design Industrial Control Systems with Security (RICSS) in conjunction with IEEE EuroS&P Delft, Netherlands 3-7 July 2023. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE. , pp.370-378. (10.1109/eurospw59978.2023.00047)
- Kayan, H. et al. 2023. CASPER: Context-aware anomaly detection system for industrial robotic arms. Presented at: The 21st International Conference on Pervasive Computing and Communications (PerCom 2023) Atlanta, USA 13-17 March 2023.
- Nafees, M. N. , Saxena, N. and Burnap, P. 2023. POSTER: Adaptive moving target defense: Enhancing dynamic perturbation through voltage sensitivity analysis in power systems. Presented at: 21st International Conference on Applied Cryptography and Network Security (ACNS 2023) Kyoto, Japan 19-22 June 2023. 21st International Conference on Applied Cryptography and Network Security (ACNS 2023) Proceedings.
- Rotibi, A. , Saxena, N. and Burnap, P. 2023. Poster: Using causal inference to extract hidden information from dependency modelling. Presented at: IEEE European Symposium on Security and Privacy (Euro S&P) Delft, Netherlands 3-7 July 2023.
- Nafees, M. N. , Saxena, N. and Burnap, P. 2022. On the efficacy of physics-informed context-based anomaly detection for power system. Presented at: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids Singapore 25-28 October 2022. 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE(10.1109/SmartGridComm52983.2022.9961034)
- Nafees, M. N. , Saxena, N. and Burnap, P. 2022. Physics-informed augmentation for contextual anomaly detection in smart grid. Presented at: ACM CCS Los Angeles, USA 7-11 November 2022. CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. ACM. , pp.3427-3429. (10.1145/3548606.3563533)
- Shaked, A. , Cherdantseva, Y. and Burnap, P. 2022. Model-based incident response playbooks. Presented at: 17th International Conference on Availability, Reliability and Security Vienna, Austia 23-26 August 2022. ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security. ACM. , pp.1-7. (10.1145/3538969.3538976)
- Nafees, M. N. , Saxena, N. and Burnap, P. 2021. Optimized predictive control for AGC cyber resiliency. Presented at: 2021 ACM Conference on Computer and Communications Security (CCS) Seoul, South Korea 14-19 November 2021. CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM. , pp.2450-2452. (10.1145/3460120.3485358)
- Asiri, M. , Saxena, N. and Burnap, P. 2021. Investigating usable indicators against cyber-attacks in industrial control systems. Presented at: 17th Symposium on Usable Privacy and Security (USENIX Security 2021) Online 8-10 August 2021. USENIX Symposium on Usable Privacy and Security (SOUPS) 2021. USENIX
- Nafees, M. N. , Saxena, N. and Burnap, P. 2021. Specification-based process control attack detection in substation automation. Presented at: 42nd IEEE Symposium on Security and Privacy 2021 Virtual 23-27 May 2021.
- Alrowaili, Y. , Saxena, N. and Burnap, P. 2021. Determining asset criticality in cyber-physical smart grid. Presented at: 26th European Symposium on Research in Computer Security (ESORICS 2021) Online 4-8 October 2021.
- Nafees, M. N. et al. 2020. Impact of energy consumption attacks on LoRaWAN-enabled devices in industrial context. Presented at: ACM Conference on Computer and Communications Security (CCS 2020) Virtual 9-13 November 2020. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: Association for Computing Machinery. , pp.2117-2119. (10.1145/3372297)
- Agyepong, E. et al. 2020. Towards a framework for measuring the performance of a security operations center analyst. Presented at: IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020) Dublin, Ireland 15-17 June 2020. Proceedings of the International Conference on Cyber Security and Protection of Digital Services. IEEE. , pp.1-8. (10.1109/CyberSecurity49315.2020.9138872)
- Liu, H. et al. 2020. Scmhl5 at TRAC-2 shared task on aggression identification: bert based ensemble learning approach. Presented at: Second Workshop on Trolling, Aggression and Cyberbullying Marseille, France 16 May 2020. Proceedings of the Second Workshop on Trolling, Aggression and Cyberbullying. European Language Resources Association. , pp.62-68.
- Nafees, M. N. et al. 2020. Towards distance relay attack discrimination for situational awareness-based anomaly detection. Presented at: Annual Computer Security Applications Conference (ACSAC 2020) Virtual 7-11 December 2020.
- Rhode, M. et al. 2019. LAB to SOC: Robust Features for Dynamic Malware Detection. Presented at: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2019) Portland, OR, USA 24-27 June 2019. 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Industry Track. IEEE. , pp.13-16. (10.1109/DSN-Industry.2019.00010)
- Liu, H. et al. 2019. Fuzzy multi-task learning for hate speech type identification. Presented at: The Web Conference 2019 San Francisco, CA, USA 13-17 May 2019. WWW '19 The World Wide Web Conference. ACM. , pp.3006-3012. (10.1145/3308558.3313546)
- Aldmour, R. , Burnap, P. and Lakoju, M. 2019. Risk assessment methods for converged IoT and SCADA systems: review and recommendations. Presented at: Living in the Internet of Things (IoT 2019) London, UK 1-2 May 2019. Living in the Internet of Things (IoT 2019). IET. , pp.5-10. (10.1049/cp.2019.0130)
- Barati, M. et al. 2019. Privacy-aware cloud ecosystems and GDPR compliance. Presented at: 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud) 26-28 August 2019 Istanbul, Turkey. 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE. , pp.117. (10.1109/FiCloud.2019.00024)
- Burnap, P. et al. 2019. Chatty factories: a vision for the future of product design and manufacture with IoT. Presented at: Living in the Internet of Things (IoT 2019) London, UK 1-2 May 2019. Living in the Internet of Things (IoT 2019). IET. , pp.4 (6 pp.). (10.1049/cp.2019.0129)
- Alorainy, W. et al. 2018. Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample. Presented at: International Conference on Machine Learning and Cybernetics Chengdu, China 15-18 July 2018. 2018 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE. , pp.581-586. (10.1109/ICMLC.2018.8527001)
- Webb, H. et al., 2017. The ethical challenges of publishing Twitter data for research dissemination. Presented at: WebSci'17: ACM Web Science Conference Troy, NY, USA 25-28 June 2017. Proceedings of the 2017 ACM on Web Science Conference. ACM. , pp.339-348. (10.1145/3091478.3091489)
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2017. Temporal TF-IDF: a high performance approach for event summarization in Twitter. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence Omaha, Nebraska, USA 13-16 October 2016. 2016 IEEE/WIC/ACM International Conference on Web Intelligence. IEEE. , pp.515-521. (10.1109/WI.2016.0087)
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2017. Sensing real-world events using social media data and a classification-clustering framework. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence Omaha, Nebraska, USA 13-16 October 2016. 2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI). IEEE. , pp.216-223. (10.1109/WI.2016.0039)
- Thomas, L. et al. 2017. Automation of the supplier role in the GB power system using blockchain based smart contracts. Presented at: CIRED 2017 - International Conference on Electricity Distribution Glasgow, UK 12-15 June 2017.
- Williams, M. L. and Burnap, P. 2017. Detecting crime events using social media. Presented at: Home Office Crime and Policing Analysis Unit Seminar Series Westminster, London, UK July, 2017. , pp.-.
- Burnap, P. and Williams, M. L. 2017. Classifying and modeling cyber hate speech: research and opportunities for practical intervention. Presented at: 1st International Conference on Cyber Deviance Detection (CyberDD) in conjunction with 10th ACM International Conference on Web Search and Data Mining (WSDM 2017) Cambridge, UK 10 Feb 2017.
- Williams, M. and Burnap, P. 2017. Online extremism and hate speech: definition, measurement & regulation. Presented at: Internet Leadership Academy Oxford Internet Institute, University of Oxford, UK 26 September 2017.
- Williams, M. L. and Burnap, P. 2017. Data science solutions for detecting and monitoring Brexit related online hate speech. Presented at: UK Government Data Science Community Interest Workshop ONS Data Science Campus, Newport, Wales, UK 4 September 2017.
- Williams, M. L. and Burnap, P. 2017. Social data science & criminology: machine classification and modelling of cyberhate in online social networks. Presented at: Cambridge Institute of Criminology Seminar Series University of Cambridge, UK 9 February 2017.
- Burnap, P. and Williams, M. L. 2016. Computational human and cyber security analytics for government and policy. Presented at: Data Science and Government Conference Oxford, UK 22 June 2016.
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2016. Automatic summarization of real world events using Twitter. Presented at: International AAAI Conference on Web and Social Media (ICWSM) Cologne, Germany 17-20 May 2016. Proceedings of the Tenth International AAAI Confe. AAAI. , pp.511-514.
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2016. Sensing real-world events using Arabic Twitter posts. Presented at: International AAAI Conference on Web and Social Media (ICWSM) Cologne, Germany 17-20 May 2016. Proceedings of the Tenth International AAAI Conference on Web and Social Media (ICWSM 2016). AAAI. , pp.515-518.
- Eden, P. et al., 2016. Forensic readiness for SCADA/ICS incident response. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research Queen's University Belfast, Belfast, UK 23-25 August 2016.
- Burnap, P. , Colombo, G. and Scourfield, J. B. 2015. Machine classification and analysis of suicide-related communication on Twitter. Presented at: 26th ACM Conference on Hypertext & Social Media Cyprus 1-4 September 2015. HT '15- Proceedings of the 26th ACM Conference on Hypertext & Social Media. Association for Computing Machinery. , pp.75-84.
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2015. Identifying disruptive events from social media to enhance situational awareness. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) Paris, France 24-27 August 2015. ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM. , pp.934-941. (10.1145/2808797.2808879)
- Burnap, P. et al. 2015. Real-time classification of malicious URLs on Twitter using Machine Activity Data. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) Paris, France 25-27 August 2015. 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). ACM. , pp.970-977. (10.1145/2808797.2809281)
- Williams, M. L. and Burnap, P. 2015. Combating cyber-hate on social media throughcounter-speech. Presented at: Symposium on Anti-Muslim Hate Crime University of Cambridge, Cambridge, UK 16 June 2015.
- Alsaedi, N. and Burnap, P. 2015. Arabic event detection in social media. Presented at: 16th International Conference on Intelligent Text Processing and Computational Linguistics Cairo, Egypt 14-20 April 2015. Published in: Gelbukh, A. ed. Computational Linguistics and Intelligent Text Processing: 16th International Conference, CICLing 2015, Cairo, Egypt, April 14-20, 2015, Proceedings, Part I. Vol. 9041.Lecture Notes in Computer Science Springer Verlag. , pp.384-401. (10.1007/978-3-319-18111-0_29)
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: an application of machine classification and statistical modeling for policy and decision making. Presented at: ICWSM Workshop on Religion and Social Media University of Oxford, Oxford, UK 26 May 2015.
- Williams, M. L. and Burnap, P. 2015. Cyber-hate on social media in the aftermath of Woolwich. Presented at: Government Hate Crime Seminar London, UK 11 March 2015.
- Awan, M. , Burnap, P. and Rana, O. F. 2015. An empirical risk management framework for monitoring network security. Presented at: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), Liverpool, UK 26-28 October 2015. Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on. IEEE. , pp.1764-1771. (10.1109/CIT/IUCC/DASC/PICOM.2015.266)
- Awan, M. S. K. et al. 2015. A classification framework for distinct cyber-attacks based on occurrence patterns. Presented at: The 9th International Conference on Security of Information and Networks Soch, Russia 8-10 September 2015. Proceedings of the 8th International Conference on Security of Information and Networks. ACM. , pp.165-168. (10.1145/2799979.2800037)
- Awan, M. S. K. et al. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC New York City, NY, USA 24-26 August 2015. High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE. , pp.1442-1447. (10.1109/HPCC-CSS-ICESS.2015.224)
- Awan, M. S. , Burnap, P. and Rana, O. F. 2015. Estimating risk boundaries for persistent and stealthy cyber-attacks. Presented at: 22nd ACM Conference on Computer and Communications Security Denver Colorado, USA 12-16 October 2015. SafeConfig '15 Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense. ACM. , pp.15-20. (10.1145/2809826.2809830)
- Burnap, P. and Williams, M. L. 2015. Plenary: Computational & social security analytics using Big Data. Presented at: International Conference on Computational Social Science Helsinki, Finland 8-11 June 2015.
- Eden, P. et al., 2015. A cyber forensic taxonomy for SCADA systems in critical infrastructure. Presented at: The 10th International Conference on Critical Information Infrastructures Security 2015 (CRITIS 2015) Berlin, Germany 5-7 October 2015.
- Eden, P. et al., 2015. A forensic taxonomy of SCADA systems and approach to incident response. Presented at: The 3rd International Symposium for ICS and SCADA Cyber Security Research 2015 (ICS-CSR 2015) Ingolstadt, Germany 17 - 18 September 2015. (10.14236/ewic/ICS2015.5)
- Rahulamathavan, Y. et al., 2015. Assessing data breach risk in cloud systems. Presented at: 7th International Conference on Cloud Computing Technology and Science (CloudCom) Vancouver, BC, Canada 30 Nov-3 Dec 2015. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE. , pp.363-370. (10.1109/CloudCom.2015.58)
- Williams, M. L. and Burnap, P. 2015. Economic and Social Research Council Trans-Atlantic Platform Workshop. Presented at: Digital Scholarship in the Social Sciences and Humanities: New Forms of Data for Research Washington DC, USA 28-29 Jan 2015.
- Williams, M. L. and Burnap, P. 2015. Using big social data and real-time analytics to inform policy. Presented at: Policy-Making in the Big Data Era: Opportunities and Challenges University of Cambridge, Cambridge, UK 15-17 June 2015.
- Burnap, P. et al. 2014. Towards real-time probabilistic risk assessment by sensing disruptive events from streamed news feeds. Presented at: 8th IEEE International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2014) Birmingham City University, Birmingham, UK. 2-4 July 2014. , pp.-.
- Sloan, L. , Williams, M. L. and Burnap, P. 2014. Deriving demographic variables from twitter data. Presented at: Office for National Statistics Big Data Project Workshop Titchfield, England 21 July 2014. , pp.-.
- Williams, M. L. and Burnap, P. 2014. Hate speech, tension monitoring and social media. Presented at: Wales Hate Crime Criminal Justice Board Cardiff, Wales 23 July 2014. , pp.-.
- Alsaedi, N. , Burnap, P. and Rana, O. F. 2014. A combined classification-clustering framework for identifying disruptive events. Presented at: ASE SocialCom Conference Stanford University, CA., USA May 27-21 2014.
- Burnap, P. and Williams, M. L. 2014. Big social data analysis panel. Presented at: Web Science Trust Web Science Summer School National University of Singapore, Singapore, Malaysia 8-12 December 2014.
- Burnap, P. and Williams, M. L. 2014. Hate speech, machine classification and statistical modelling of information flows on Twitter: interpretation and communication for policy decision making. Presented at: Internet, Policy & Politics Oxford, UK 26 September 2014.
- Rahulamathavan, Y. et al., 2014. Analysing security requirements in cloud-based service level agreements. Presented at: SIN '14 The 7th International Conference on Security of Information and Networks Glasgow 9 - 11 September 2014. Proceedings of the 7th International Conference on Security of Information and Networks. New York, NY: ACM. , pp.73-77. (10.1145/2659651.2659735)
- Williams, M. and Burnap, P. L. 2014. Human security analytics. Presented at: Web Science Trust Web Science Summer School National University of Singapore, Singapore, Malaysia 8-12 December 2014.
- Burnap, P. et al. 2013. Collaborative online social media observatory. Presented at: Web Observatory Launch, Royal Society London, UK 2013.
- Burnap, P. et al. 2013. Detecting tension in social media. Presented at: Third International Conference on Social Computing and its Applications Karlsruhe, Germany 30 Sept - 2 Oct 2013.
- Conejero, J. et al., 2013. Scaling archived social media data analysis using a hadoop cloud. Presented at: IEEE 6th International Conference on Cloud Computing (CLOUD) Santa Clara, CA, USA 27 June - 2 July 2013. IEEE
- Conejero, J. et al., 2013. Characterising the power consumption of Hadoop Clouds: A social media analysis case study. Presented at: CLOSER 2013: 3rd International Conference on Cloud Computing and Services Science Aachen, Germany 8-10 May 2013. (10.5220/0004373502330243)
- Housley, W. et al. 2013. COSMOS: theory, method and data. Presented at: Centre for Interdisciplinary Methodologies, University of Warwick Warwick, UK 2013.
- Rob, P. et al., 2013. Enabling social media research through citizen social science. Presented at: 13th European Conference on Computer Supported Cooperative Work Paphos, Cyprus 21-25 September 2013.
- Sloan, L. et al. 2013. The Collaborative Online Social Media Observatory. Presented at: ESRC Seminar Series: New Social Media, New Social Science? Blurring the Boundaries: One Year On London, UK 2013.
- Sloan, L. et al. 2013. Using social media with survey data. Presented at: ESRC Seminar Series: New Social Media, New Social Science? London, UK 2013.
- Williams, M. L. et al. 2013. Collaborative online social media observatory. Presented at: COSMOS Launch London, England 2013.
- Burnap, P. et al. 2012. Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information. Presented at: 2012 International Conference on Collaboration Technologies and Systems (CTS) Denver, CO, USA 21-25 May 2012. Published in: Smari, W. W. and Charles, F. eds. 2012 International Conference on Collaboration Technologies and Systems (CTS). Vol. 14.Los Alamitos, CA: IEEE. , pp.490-497. (10.1109/CTS.2012.6261095)
- Edwards, A. M. et al. 2012. Mining tension and cohesion using the Cardiff Online Social Media Observatory. Presented at: NCRM, Research Methods Festival,St Catherine's College, University of Oxford Oxford, UK 2012.
- Housley, W. et al. 2012. Supporting empirical digital social research for the social sciences. Presented at: Digital Research 2012 Conference, St Catherines College, University of Oxford Oxford, UK 2012.
- Williams, M. D. et al. 2012. Computational social science and methodological innovation: surrogacy, augmentation or reorientation. Presented at: ESRC Seminar Series: Blurring the boundaries: New social media, new social science? London, UK 2012.
- Williams, M. L. et al. 2012. Treating social media as data: computational sociological Methods, data analysis and the Cardiff online social media Observatory. Presented at: NCRM, Research Methods Festival, St Catherine's College, University of Oxford Oxford, UK 2012.
- Williams, M. L. et al. 2012. Computational and transformational social science. Presented at: Digital Social Research Experts Meeting, Keble College, University of Oxford Oxford, UK 2012.
- Alsalamah, S. , Hilton, J. C. and Burnap, P. 2010. Towards information sharing in virtual organisations: The development of an icon-based information control model. Presented at: The UK All Hands Meeting (AHM) Cardiff, UK 13- 16 September 2010.
- Burnap, P. and Hilton, J. C. 2009. Self protecting data for de-perimeterised information sharing. Presented at: Third International Conference on Digital Society ICDS '09 Cancun, Mexico 1-7 February 2009. Digital Society, 2009. ICDS '09. Third International Conference on. IEEE. , pp.65-70. (10.1109/ICDS.2009.41)
- Burnap, P. and Hilton, J. C. 2008. Information assurance for collaborative working in deperimeterised environments. Presented at: UK e-Science All Hands Meeting Edinburgh, UK 8-11 September 2008.
- Pahwa, J. S. et al. 2006. MDSSF- A federated architecture for product procurement. Presented at: 17th International Conference on Database and Expert Systems Applications (DEXA '06) Krakov, Poland
- Burnap, P. et al. 2005. Worldwide messaging support for high performance real-time collaboration. Presented at: 4th UK e-Science Programme All Hands Meeting Nottingham, UK 19-22 September 2005. Published in: Cox, S. J. and Walker, D. W. eds. Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC. , pp.395.
- Burnap, P. et al. 2005. A service oriented infrastructure to facilitate trust in collaborative working. Presented at: 4th UK e-Science Programme All Hands Meeting Nottingham, UK 19-22 September 2005. Published in: Cox, S. J. and Walker, D. W. eds. Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC. , pp.346.
- Rana, O. F. et al. 2005. Secure virtual organisations: Protocols and requirements. Presented at: Information Security Solutions Europe (ISSE) 2005 - The Independent European ICT Security Conference and Exhibition Budapest, Hungary 27-29 September 2005. Published in: Paulus, S. , Pohlmann, N. and Reimer, H. eds. ISSE 2005 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2005 Conference. Berlin: Springer. , pp.422-432.
- Burnap, P. et al. 2004. Security user and data management for collaborative virtual teams in a grid environment supporting consortia in the construction industry. Presented at: Proceedings of the Workshop on Requirements Capture for Collaboration in e-Science Edinburgh, UK, pp.54-60.
- Joita, L. et al. 2004. Supporting collaborative virtual organisations in the construction industry via the grid. Presented at: UK e-Science all Hands Meeting (AHM2004) Nottingham, UK 31 August - 3 September 2004. Published in: Cox, S. J. ed. Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC
- Joita, L. et al. 2004. A grid-enabled security framework for collaborative virtual organisations. Presented at: 5th IFIP Working Conference on Virtual Enterprises (PRO-VE) Toulouse, France 22-27 August 2004.
- Joita, L. et al. 2004. A grid enabled security framework for collaborative virtual organisations. Presented at: Proceedings of Virtual Enterprises and Collaborative Networks IFIP 18th World Computer congressTC5/WG5.5 5th Working Conference on Virtual Enterprises Toulouse, UK, pp.22-27.
- Miles, J. C. et al. 2004. Collaborative engineering Virtual Teams in a Grid Environment Supporting Consortia in the Construction Industry. Presented at: 10th International Conference on Computing in Civil and Building Engineering (ICCCBE) Weimar, Germany 2-4 June 2004.
- Pahwa, J. S. et al. 2004. Creating a virtual distributed database - data definition and search model for collaborative virtual teams in the construction industry. Presented at: Proceedings 21st Annual British National Conference on Databases (BNCOD2004) Edinburgh, UK
Monographs
- Burnap, P. et al. 2015. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Working paper. Cardiff University.
- Burnap, P. et al. 2012. Social media analysis, Twitter and the London Olympics (a research note). Working paper. Cardiff: Cardiff University.
- Burnap, P. et al. 2012. Working paper 153: social media analysis, Twitter and the London Olympics 2012 [working paper]. Working paper. Cardiff: School of Social Sciences, Cardiff University. Available at: http://www.cardiff.ac.uk/socsi/resources/Working%20Paper%20153%20-%20Burnap%20et%20al.%20(2013)%20Social%20Media%20Analysis,%20Twitter%20and%20the%20London%20Olympics%202012%20-%20A%20Research%20Note.pdf.
Thesis
- Burnap, P. 2009. Advanced access control in support and distributed collaborative working and de-perimeterization. PhD Thesis , Cardiff University.
Research
To date I have been involved in more than 33 research grants, amounting to over £23 million (FEC), with over £10m of this coming to Cardiff University. Funding has been secured from a variety of sources including UKRI (EPSRC/ESRC/InnovateUK), JISC, US Department of Justice, UK DoH, and industry partners (e.g. Airbus, Admiral). I was/am currently Principal Investigator on 16 of these grants (including a £1.8m EPSRC grant on secure ‘Factories of the Future’).
Selected grants include:
Cyber Range and Immersive Cyber Attack Environment (research infrastructure)
* Funded by HEFCW
* £1,272,000 (Burnap)
Demystifying AI for Cybersecurity
* Funded by InnovateUK (/w Airbus)
* £394,784 (Burnap)
PETRAS 2
* Funded by EPSRC
* £290,291 to CU (Burnap, Perera et al.)
Academic Centre of Excellence in Cyber Security Research (ACE-CSR)
* Funded by EPSRC
* £64,989 (Burnap)
PACE: Privacy-aware cloud ecosystems
* Funded by EPSRC
* £757,817 (Rana, Theodorakopoulos, Burnap)
Data innovation accelerator
* Funded by ERDF
* £3,553,220 (funded at 52%) (Burnap & Whitaker).
How Online Technologies are Transforming Transnational Organised Crime (Cyber-TNOC)
* Funded by ESRC.
* £352,862 (Levi, Giommoni, Williams, Burnap)
Hate crime after Brexit: Linking terrestrial and new forms of data to inform governance
* Funded by ESRC
* £253,041 (Williams, Burnap, Sloan)
New Industrial Systems: Chatty Factories
* Funded by EPSRC
* £1,805,111 (Burnap, Murray-Rust, Richards, Preston, Branson)
Identifying Attack Vectors for Network Intrusion via IoT devices Developing a Goal-Oriented Approach to Determining Impact Across Threat Surfaces (IoT Depends)
* Funded by EPSRC PETRAS Hub
* £136,205 (Burnap)
SCADA Cyber Security Lifecycle (SCADA-CSL) 2
* Funded by Foundation Wales – Welsh Government and Airbus Innovations.
* £760,000 (Burnap, Cherdantseva and Theodorakopolous)
Centre for Cyberhate Research & Policy: Real-Time Scalable Methods & Infrastructure for Modelling the Spread of Cyberhate on Social Media
* Funded by ESRC
* £781,243 (Williams & Burnap)
Social Data Science Lab – Methods and Infrastructure Development for Open Data Analytics in Social Research
* Funded by ESRC
* £705.050 (Burnap, Williams, Sloan & Rana)
Understanding Online Hate Speech as a Motivator for Hate Crime
* Funded by National Institute for Justice, US Department of Justice
* £683,152 (Williams & Burnap in partnership with Rand US & Europe)
Event Detection using Open Source Communications
* Funded by Endeavr Wales
* £973,760 (Burnap & Williams in partnership with Airbus Endeavor Wales)
SCADA Cyber Security Lifecycle (SCADA-CSL)
* Funded by Foundation Wales – Welsh Government and Airbus Innovations
* £1,250,000 (Jones, Burnap, Blyth & Stoddart)
Identifying and Modelling Victim, Business, Regulatory and Malware Behaviours in a Changing Cyberthreat Landscape
* Funded by EPSRC under the Global Uncertainties Consortia for Exploratory Research in Security (CEReS) call
* £1,200,000 (Rana, Burnap, Williams, Levi, Matthews, Clarke, Furnell, Ganis, Rajarajan & Wall)
Improving Driver Risk Modeling with Big Data Analytics
* Knowledge Transfer Partnership with Admiral Insurance
* £378,648 (Burnap)
Investigating the link between social media activity and reporting crime
* Funded by Metropolitan Police Service Centre for Scientific and Engineering Excellence
* £49,950 (Burnap & Williams)
Estimating the Propagation of Anti-Semitic Content on Twitter
* Funded by Community Security Trust and the Lewis Trust Group
* £35,000 (Williams & Burnap)
Impact Acceleration Award – Embedding Open Source Intelligence Analytics within the Metropolitan Police Service
* Funded by ESRC
* £25,000 (Burnap, Williams, Rana & Sloan)
Evaluating the Utility of Social Media Analytics for International Development
* Funded by Department for International Development
* £7,500 (Williams & Burnap)
Impact Acceleration Award – Assessing the Market Interest in Big Social Data Analytics
* Funded by EPSRC
* £7,500 (Burnap, Williams, Rana & Sloan)
Digital Wildfire: (Mis)information flows, propagation and responsible governance
* Funded by ESRC (Global Uncertainties)
* £196,333 (Jirotka, Burnap, Williams, Rana, Procter, Housley, Edwards & Stahl)
Detecting Tension and Cohesion in Local Communities with Social Media
* Funded by Airbus Group
* £51,040 (Rana, Burnap, Sloan & Williams)
Social Media and Prediction: Crime Sensing, Data Integration & Statistical Modelling
* Funded by ESRC under the NCRM Methods Innovation Call
* £194,138 (Williams, Burnap, Sloan, Rana, Housley, Edwards, Procter & Voss)
Hate Speech and Social Media: Understanding Users, Networks and Information Flows
* Funded by ESRC and Google
* £124, 986 (Housley, Williams, Burnap, Edwards, Rana, Procter, Voss & Knight)
Digital Social Research Tools, Tension Indicators and Safer Communities: A Demonstration of COSMOS
* Funded by ESRC
* £97,506 (Williams, Rana, Avis, Housley, Edwards & Burnap)
The 2016 Welsh Election Study: A Study of the 2016 Election to the National Assembly for Wales
* Funded by ESRC
* £257,148 (Scully, Jones, Cutts, Sloan, Burnap & Williams)
Digital Social Research Tools, Tension Indicators and Safer Communities: A Demonstration of COSMOS
* Funded by ESRC
* £97,506 (Williams, Rana, Avis, Housley, Edwards & Burnap)
Public perceptions of the UK food system: public understanding and engagement, and the impact of crises and scares
* Funded by ESRC and the Food Standards Agency
* £291,200 (Roberts, Dowler, Draper, Sloan, Williams & Burnap)
Understanding the Role of Social Media in the Aftermath of Youth Suicides
* Funded Department of Health
* £200,000 (Scourfield, Burnap, Williams, Housley & Edwards)
Scaling the Computational Analysis of “Big Social Data” & Massive Temporal Social Media Datasets
* Funded by High Performance Computing Wales
* £45,000 (Burnap, Rana, Sloan & Williams)
Small items of research equipment at Cardiff University
* Funded by EPSRC
* £620,000 (Burnap)
Supporting Empirical Digital Social Research for the Social Sciences with a Virtual Research Environment
* Funded by JISC
* £55,519 (Burnap, Williams, Housley, Rana, Edwards & Avis)
Requirements Analysis for Social Media Analysis Research Tools
* Funded by ESRC
* £5,000 (Burnap, Rana, Avis, Williams, Housley & Edwards)
Sensing Data from the Web to Inform Probabilistic Risk Models. Funded by Welsh European Funding Office (Part of the Smart Operation for a Low Carbon Energy Region (SOLCER) project). £50,000
miConsent: Patient Controlled Access to Distributed Medical Records.
Funded by Technology Strategy Board with Abies Ltd and IMS Maxims. £54,000