Professor Pete Burnap
Professor of Data Science & Cybersecurity
School of Computer Science and Informatics
- Media commentator
Overview
I am Professor of Data Science & Cybersecurity in the School of Computer Science & Informatics. I am Director of the Cardiff Centre for Cyber Security Research, which is recognised as an Academic Centre of Excellence in Cyber Security Research (ACE-CSR) by the National Cyber Security Centre and EPSRC.
I am the founding Director of the Wales Cyber Innovation Hub (CIH). Initially funded with £13.8m from Welsh Government and Cardiff Capital Region City Deal (CCRD), CIH is intended to help Wales become a global leader in cybersecurity. The CIH consortium led by Cardiff University with Airbus, Alacrity Cyber, CGI, Thales NDEC, Tramshed Tech, and the University of South Wales aims to boost the number of cyber security businesses anchored in South East Wales, and enhance cybersecurity skills to widen and diversify the cybersecurity talent pool. By 2030, the Hub aims to have:
- Created 25+ cybersecurity start-ups through translation of world leading IP into commercial ventures;
- Attracted more than £20m in private equity investment;
- Upskilled and reskilled approx. 1750 individuals with hands-on cybersecurity skills via bitesize, practical CPD activities.
I have been involved in research grants worth in excess of £23m, leading large awards from EPSRC, ESRC and industry on the topic of cyber security analytics – the fusion of artificial intelligence, cybersecurity and risk.
My work, developed in collaboration with key partners and collaborators, focusses on the development of novel approaches to automated cyber defence. Examples include the development of the first peer reviewed approach to machine-learning based prediction of cyber attack behaviour, within seconds of its execution. Subsequent work focussed on how to capture and kill the computational processes behind the cyber attack. In the case of Ransomware, our method reduced file encryption by 92%. This work is also applicable in the context of critical national infrastructure - including industrial control systems of the kind that operate manufacturing and energy systems.
In addition to AI approaches for enhanced cybersecurity, I put a great deal of emphasis on interrogating the potential harms of AI if inappropriately deployed - i.e. without thorough verification or long-term management. In this context, I have pioneered work in the security of AI in the context of cyber defence. Examples include understanding how attackers can manipulate their behaviour to evade detection by AI-based cyber defence techniques. We have demonstrated the vulnerabilities of AI-based cyber defences, and how to improve the resilience of AI-driven cyber defences in an IoT context as well as for safety critical industrial control systems.
We have also shown that the performance of machine learning models must be subject to enhanced interrogation over time. For example, our work has demonstrated that while data-driven cyber defence approaches work well in lab conditions, they can perform poorly in real-world settings. Moreover, we demonstrated that machine learning models can actually be using "hidden" features within the data used to train them to make decisions - such as malware being detected by its evasive behaviour rather than its actual malicious payload.
I believe research should be driven by real-world problems. I led AI for cybersecurity research at Airbus Cyber Innovation on a part-time secondment basis from 2016 to 2021, and I am still heavily invovled with Airbus' research agenda. I am director of Airbus' only global Centre of Excellence in Cyber Security Analytics. This has led to advanced malware detection algorithms as well as novel models for goal-oriented risk assessment being integrated into the business. Since 2012 we have established an interdisciplinary research team of technical and social researchers. Our collaborative projects have received more than £5m in funding from UK Research Councils (EPSRC, ESRC), Welsh Government (Endeavr Wales) and Industry (Airbus).
I lead the Safety Critical Systems theme in the £14m PETRAS National Centre of Excellence for Internet of Things Systems Cybersecurity, led out of UCL.
I was previously co-director of the WEFO-funded Data Innovation Accelerator (DIA) – a £3.75m investment in upskilling SMEs in South Wales to develop innovative AI-driven products and services.
I sit on the UK Government's AI Council, advising on the implementation of the industrial strategy in AI and the Data Economy.
I also have a strong interest in socio-technical security and the understanding of risks to society from cyber-enabled systems. I work very closely with the Criminology team at the Cardiff School of Social Sciences. We have pioneered innovation in AI for the modelling and understanding of risks to social safety and security in online social networks (e.g. production and propagation of cyber hate speech, suicidal ideation and malicious Web links). We have developed methods to understand the emotional factors contributing to propagation of harmful content, as well as network modeling methods to support the management of online harms. This research is organised under the banner of the Social Data Science Lab and HateLab within which I am a director and the computational lead. The Labs' core funding comes from ESRC and forms part of the £64m ‘Big Data Network’
ACM Keywords: Security and Protection; Human-centered computing; Modeling structured, textual and multimedia data; Data mining; Machine learning
Publication
2024
- Rotibi, A., Saxena, N. and Burnap, P. 2024. Winning the battle with cyber risk identification tools in industrial control systems: A review. IET Cyber-Physical Systems: Theory & Applications (10.1049/cps2.12105)
- Williams, L., Anthi, E. and Burnap, P. 2024. Uncovering key factors that drive the impressions of online emerging technology narratives. Information 15(11), article number: 706. (10.3390/info15110706)
- Alrowaili, Y., Saxena, N. and Burnap, P. 2024. Towards developing an asset-criticality identification framework in smart grids. Presented at: IEEE International Conference on Cyber Security and Resilience (CSR) Workshop on Security, Privacy and Resilience of Critical Assets in Critical Infrastructure (SPARC), London, UK, 2-4 Sept 20242024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE pp. 720-725., (10.1109/CSR61664.2024.10679477)
- Nunes, M., Kayan, H., Burnap, P., Perera, C. and Dykes, J. 2024. Exploiting user-centred design to secure industrial control systems. Frontiers in the Internet of Things 3, article number: 1436023. (10.3389/friot.2024.1436023)
- Kayan, H., Heartfield, R., Rana, O., Burnap, P. and Perera, C. 2024. CASPER: Context-aware IoT anomaly detection system for industrial robotic arms. ACM Transactions on Internet of Things 18, pp. 1-36. (10.1145/3670414)
- Rotibi, A., Saxena, N., Burnap, P. and Reed, C. 2024. System-level operational cyber risks identification in industrial control systems. Cyber-Physical Systems (10.1080/23335777.2024.2373388)
- Burnap, P., Anthi, E., Reineckea, P., Williams, L., Caoa, F., Aldmoura, R. and Jones, K. 2024. Mapping automated cyber attack intelligence to context-based impact on system-level goals. Journal of Cybersecurity and Privacy 4(2), pp. 340-356. (10.3390/jcp4020017)
- Williams, L., Anthi, E., Arman, L. and Burnap, P. 2024. Topic modelling: Going beyond token outputs. Big Data and Cognitive Computing 8(5), article number: 44. (10.3390/bdcc8050044)
- Williams, L., Anthi, E. and Burnap, P. 2024. A scalable and automated framework for tracking the likely adoption of emerging technologies. Information 15(4), article number: 237. (10.3390/info15040237)
- Williams, L., Anthi, E. and Burnap, P. 2024. Comparing hierarchical approaches to enhance supervised emotive text classification. Big Data and Cognitive Computing 8(4) (10.3390/bdcc8040038)
2023
- Shaked, A., Cherdantseva, Y., Burnap, P. and Maynard, P. 2023. Operations-informed incident response playbooks. Computers and Security 134, article number: 103454. (10.1016/j.cose.2023.103454)
- Nafees, M. N., Saxena, N., Cardenas, A., Grijalva, S. and Burnap, P. 2023. Smart grid cyber-physical situational awareness of complex operational technology attacks: A review. ACM Computing Surveys 55(10), pp. 1-36., article number: 215. (10.1145/3565570)
- Alrowaili, Y., Saxena, N., Srivastava, A., Conti, M. and Burnap, P. 2023. Review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification. IET Cyber-Physical Systems: Theory & Applications 8(3), pp. 160-185. (10.1049/cps2.12059)
- Williams, M. L. et al. 2023. The effect of the Brexit vote on the variation in race and religious hate crimes in England, Wales, Scotland and Northern Ireland. The British Journal of Criminology: An International Review of Crime and Society 63(4), pp. 1003-1023. (10.1093/bjc/azac071)
- Foster, B., Williams, M. and Burnap, P. 2023. Combatting community tensions in Wales: Mapping the cooperation space for multi-agency cohesion delivery. British Journal of Community Justice 19(1), pp. 55-81. (10.48411/eq13-km71)
- Asiri, M., Saxena, N., Gjomemo, R. and Burnap, P. 2023. Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective. ACM transactions on cyber-physical systems 7(2), pp. 1-33. (10.1145/3587255)
- Agyepong, E., Cherdantseva, Y., Reinecke, P. and Burnap, P. 2023. A systematic method for measuring the performance of a cyber security operations centre analyst. Computers and Security 124, article number: 102959. (10.1016/j.cose.2022.102959)
- Mohammed, A. S., Anthi, E., Rana, O., Saxena, N. and Burnap, P. 2023. Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication. Computers and Security 124, article number: 103007. (10.1016/j.cose.2022.103007)
- Kayan, H., Rana, O., Burnap, P. and Perera, C. 2023. CASPER: Context-aware anomaly detection system for industrial robotic arms. Presented at: The 21st International Conference on Pervasive Computing and Communications (PerCom 2023), Atlanta, USA, 13-17 March 2023.
- Rotibi, A., Saxena, N., Burnap, P. and Tartar, A. 2023. Extended dependency modelling technique for cyber risk identification in ICS. IEEE Access 11, pp. 37229-37242. (10.1109/ACCESS.2023.3263671)
- Nafees, M. N., Saxena, N. and Burnap, P. 2023. POSTER: Adaptive moving target defense: Enhancing dynamic perturbation through voltage sensitivity analysis in power systems. Presented at: 21st International Conference on Applied Cryptography and Network Security (ACNS 2023), Kyoto, Japan, 19-22 June 202321st International Conference on Applied Cryptography and Network Security (ACNS 2023) Proceedings.
- Asiri, M., Saxena, N. and Burnap, P. 2023. Advancing resilience of cyber-physical smart grid: An integrated co-simulation approach incorporating indicators of compromise. Presented at: International Workshop on Re-design Industrial Control Systems with Security (RICSS) in conjunction with IEEE EuroS&P, Delft, Netherlands, 3-7 July 20232023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE pp. 370-378., (10.1109/eurospw59978.2023.00047)
- Rotibi, A., Saxena, N. and Burnap, P. 2023. Poster: Using causal inference to extract hidden information from dependency modelling. Presented at: IEEE European Symposium on Security and Privacy (Euro S&P), Delft, Netherlands, 3-7 July 2023.
- Ikwu, R., Giommoni, L., Javed, A., Burnap, P. and Williams, M. 2023. Digital fingerprinting for identifying malicious collusive groups on Twitter. Journal of Cybersecurity 9(1), article number: tyad014. (10.1093/cybsec/tyad014)
2022
- Nafees, M. N., Saxena, N. and Burnap, P. 2022. On the efficacy of physics-informed context-based anomaly detection for power system. Presented at: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, Singapore, 25-28 October 20222022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, (10.1109/SmartGridComm52983.2022.9961034)
- Nafees, M. N., Saxena, N. and Burnap, P. 2022. Physics-informed augmentation for contextual anomaly detection in smart grid. Presented at: ACM CCS, Los Angeles, USA, 7-11 November 2022CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. ACM pp. 3427-3429., (10.1145/3548606.3563533)
- Aloraini, F., Javed, A., Rana, O. and Burnap, P. 2022. Adversarial machine learning in IoT from an insider point of view. Journal of Information Security and Applications 70, article number: 103341. (10.1016/j.jisa.2022.103341)
- Shaked, A., Cherdantseva, Y. and Burnap, P. 2022. Model-based incident response playbooks. Presented at: 17th International Conference on Availability, Reliability and Security, Vienna, Austia, 23-26 August 2022ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security. ACM pp. 1-7., (10.1145/3538969.3538976)
- Shaked, A., Cherdantseva, Y. and Burnap, P. 2022. Model-based incident response playbooks. Presented at: ARES 2022: The 17th International Conference on Availability, Reliability and Security, 23-26 August 2022ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security. New York: Association for Computing Machinery, (10.1145/3538969.3538976)
- Javed, A., Ikwu, R., Burnap, P., Giommoni, L. and Williams, M. 2022. Disrupting drive-by download networks on Twitter.. Social Network Analysis and Mining 12(117)
- Mohammed, A. S., Reinecke, P., Burnap, P., Rana, O. and Anthi, E. 2022. Cybersecurity challenges in the offshore oil and gas Industry: An Industrial Cyber-Physical Systems (ICPS) perspective. ACM transactions on cyber-physical systems 6(3), pp. 1-27., article number: 27. (10.1145/3548691)
- Nunes, M., Burnap, P., Reinecke, P. and Lloyd, K. 2022. Bane or boon: measuring the effect of evasive malware on system call classifiers. Journal of Information Security and Applications 67, article number: 103202. (10.1016/j.jisa.2022.103202)
- Cherdantseva, Y., Burnap, P., Nadjm-Tehrani, S. and Jones, K. 2022. A configurable dependency model of a SCADA system for goal-oriented risk assessment. Applied Sciences 12(10), article number: 4880. (10.3390/app12104880)
- Javed, A., Lakoju, M., Burnap, P. and Rana, O. 2022. Security analytics for real-time forecasting of cyberattacks. Software: Practice and Experience 52(3), pp. 788-804. (10.1002/spe.2822)
- Alorainy, W., Burnap, P., Liu, H., Williams, M. and Giommoni, L. 2022. Disrupting networks of hate: Characterising hateful networks and removing critical nodes. Social Network Analysis and Mining 12, article number: 27. (10.1007/s13278-021-00818-z)
- Kayan, H., Nunes, M., Rana, O., Burnap, P. and Perera, C. 2022. Cybersecurity of industrial cyber-physical systems: a review. ACM Computing Surveys 54(11s), article number: 229. (10.1145/3510410)
2021
- Rhode, M., Burnap, P. and Wedgbury, A. 2021. Real-time malware process detection and automated process killing. Security and Communication Networks 2021, article number: 8933681. (10.1155/2021/8933681)
- Nafees, M. N., Saxena, N. and Burnap, P. 2021. Optimized predictive control for AGC cyber resiliency. Presented at: 2021 ACM Conference on Computer and Communications Security (CCS), Seoul, South Korea, 14-19 November 2021CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM pp. 2450-2452., (10.1145/3460120.3485358)
- Anthi, E., Williams, L., Javed, A. and Burnap, P. 2021. Hardening machine learning Denial of Service (DoS) defences against adversarial attacks in IoT smart home networks. Computers and Security 108, article number: 102352. (10.1016/j.cose.2021.102352)
- Asiri, M., Saxena, N. and Burnap, P. 2021. Investigating usable indicators against cyber-attacks in industrial control systems. Presented at: 17th Symposium on Usable Privacy and Security (USENIX Security 2021), Virtual, 08-10 August 2021USENIX Symposium on Usable Privacy and Security (SOUPS) 2021. USENIX
- Lakoju, M., Ajienka, N., Khanesar, M., Burnap, P. and Branson, D. 2021. Unsupervised learning for product use activity recognition: an exploratory study of a “Chatty Device”. Sensors 21(15), article number: 4991. (10.3390/s21154991)
- Radanliev, P. et al. 2021. Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge. Environment Systems and Decisions 41, pp. 236-247. (10.1007/s10669-020-09792-x)
- Anthi, E., Williams, L., Rhode, M., Burnap, P. and Wedgbury, A. 2021. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. Journal of Information Security and Applications 58, article number: 102717. (10.1016/j.jisa.2020.102717)
- Nafees, M. N., Saxena, N. and Burnap, P. 2021. Specification-based process control attack detection in substation automation. Presented at: 42nd IEEE Symposium on Security and Privacy 2021, Virtual, 23-27 May 2021.
- Aliwa, E., Rana, O., Perera, C. and Burnap, P. 2021. Cyberattacks and countermeasures for in-vehicle networks. ACM Computing Surveys 54(1), article number: 21. (10.1145/3431233)
- Lakoju, M., Javed, A., Rana, O., Burnap, P., Atiba, S. and Cherkaoui, S. 2021. "Chatty Devices” and edge-based activity classification. Discover Internet of Things 1, article number: 5. (10.1007/s43926-021-00004-9)
- Anthi, E., Williams, L., Burnap, P. and Jones, K. 2021. A three-tiered intrusion detection system for Industrial Control Systems (ICS). Journal of Cybersecurity 7(1), article number: tyab006. (10.1093/cybsec/tyab006)
- Alrowaili, Y., Saxena, N. and Burnap, P. 2021. Determining asset criticality in cyber-physical smart grid. Presented at: 26th European Symposium on Research in Computer Security (ESORICS 2021), Virtual, 04-08 October 2021.
2020
- Al Baghal, T., Sloan, L., Jessop, C., Williams, M. L. and Burnap, P. 2020. Linking Twitter and survey data: the impact of survey mode and demographics on consent rates across three UK studies. Social Science Computer Review 38(5), pp. 517-532. (10.1177/0894439319828011)
- Saxena, N., Hayes, E., Bertino, E., Ojo, P., Choo, K. R. and Burnap, P. 2020. Impact and key challenges of insider threats on organizations and critical businesses. Electronics 9(9), article number: 1460. (10.3390/electronics9091460)
- Javed, A., Burnap, P., Williams, M. L. and Rana, O. F. 2020. Emotions behind drive-by download propagation on Twitter. ACM Transactions on the Web 14(4), article number: 16. (10.1145/3408894)
- Bérubé, M., Tang, T., Fortin, F., Ozlap, S., Williams, M. L. and Burnap, P. 2020. Social media forensics applied to assessment of post–critical incident social reaction: The case of the 2017 Manchester Arena terrorist attack. Forensic Science International 313, article number: 110364. (10.1016/j.forsciint.2020.110364)
- Pratomo, B., Burnap, P. and Theodorakopoulos, G. 2020. BLATTA: early exploit setection on network traffic with recurrent neural networks. Security and Communication Networks 2020, article number: 8826038. (10.1155/2020/8826038)
- Saxena, N., Thomas, I., Gope, P., Burnap, P. and Kumar, N. 2020. PharmaCrypt: blockchain for critical pharmaceutical industry to counterfeit drugs. Computer 53(7), pp. 29-44. (10.1109/MC.2020.2989238)
- Radanliev, P. et al. 2020. Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecurity 3, article number: 13. (10.1186/s42400-020-00052-8)
- Agyepong, E., Cherdantseva, Y., Reinecke, P. and Burnap, P. 2020. Cyber security operations centre concepts and implementation. In: Yaokumah, W. et al. eds. Modern Theories and Practices for Cyber Ethics and Security Compliance. IGI Global, pp. 88-104., (10.4018/978-1-7998-3149-5.ch006)
- Ozalp, S., Williams, M. L., Burnap, P., Liu, H. and Mostafa, M. 2020. Antisemitism on twitter: collective efficacy and the role of community organisations in challenging online hate speech. Social Media and Society 6(2), pp. 1-20. (10.1177/2056305120916850)
- Williams, M. L., Burnap, P., Javed, A., Liu, H. and Ozalp, S. 2020. Hate in the machine: anti-black and anti-Muslim social media posts as predictors of offline racially and religiously aggravated crime. British Journal of Criminology 60(1), pp. 93-117. (10.1093/bjc/azz049)
- Scourfield, J., Evans, R., Colombo, G., Burrows, D., Jacob, N., Williams, M. and Burnap, P. 2020. Are youth suicide memorial sites on Facebook different from those for other sudden deaths?. Death Studies 44(12), pp. 793-801. (10.1080/07481187.2019.1614109)
- Liu, H., Burnap, P., Alorainy, W. and Williams, M. 2020. Scmhl5 at TRAC-2 shared task on aggression identification: bert based ensemble learning approach. Presented at: Second Workshop on Trolling, Aggression and Cyberbullying, Marseille, France, 16 May 2020.
- Agyepong, E., Cherdantseva, Y., Reinecke, P. and Burnap, P. 2020. Challenges and performance metrics for security operations center analysts: a systematic review. Journal of Cyber Security Technology 4(3), pp. 125-152. (10.1080/23742917.2019.1698178)
- Agyepong, E., Cherdantseva, Y., Reinecke, P. and Burnap, P. 2020. Towards a framework for measuring the performance of a security operations center analyst. Presented at: IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020), Dublin, Ireland, 15-17 June 2020.
- Nafees, M. N., Saxena, N., Burnap, P. and Choi, B. J. 2020. Impact of energy consumption attacks on LoRaWAN-enabled devices in industrial context. Presented at: ACM Conference on Computer and Communications Security (CCS 2020), Virtual, 9-13 November 2020.
- Nafees, M. N., Saxena, N., Khan, R. and Burnap, P. 2020. Towards distance relay attack discrimination for situational awareness-based anomaly detection. Presented at: Annual Computer Security Applications Conference (ACSAC 2020), Virtual, 7-11 December 2020.
2019
- Alorainy, W., Burnap, P., Liu, H. and Williams, M. L. 2019. 'The enemy among us': detecting cyber hate speech with threats-based othering language embeddings. ACM Transactions on the Web 13(3), article number: 14. (10.1145/3324997)
- Anthi, E., Williams, L., Malgorzata, S., Theodorakopoulos, G. and Burnap, P. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things 6(5), pp. 9042-9053. (10.1109/JIOT.2019.2926365)
- Nunes, M., Burnap, P., Rana, O., Reinecke, P. and Lloyd, K. 2019. Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis. Journal of Information Security and Applications 48, article number: 102365. (10.1016/j.jisa.2019.102365)
- Williams, M. L., Levi, M., Burnap, P. and Gundur, R. V. 2019. Under the corporate radar: examining insider business cybercrime victimization through an application of routine activities theory. Deviant Behavior 40(9), pp. 1119-1131. (10.1080/01639625.2018.1461786)
- Rhode, M., Tuson, L., Burnap, P. and Jones, K. 2019. LAB to SOC: Robust Features for Dynamic Malware Detection. Presented at: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2019), Portland, OR, USA, 24-27 June 20192019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Industry Track. IEEE pp. 13-16., (10.1109/DSN-Industry.2019.00010)
- Javed, A., Burnap, P. and Rana, O. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56(3), pp. 1133-1145. (10.1016/j.ipm.2018.02.003)
- Liu, H., Burnap, P., Alorainy, W. and Williams, M. L. 2019. Fuzzy multi-task learning for hate speech type identification. Presented at: The Web Conference 2019, San Francisco, CA, USA, 13-17 May 2019WWW '19 The World Wide Web Conference. ACM pp. 3006-3012., (10.1145/3308558.3313546)
- Liu, H., Burnap, P., Alorainy, W. and Williams, M. L. 2019. A fuzzy approach to text classification with two-stage training for ambiguous instances. IEEE Transactions on Computational Social Systems 6(2), pp. 227-240. (10.1109/TCSS.2019.2892037)
- Scourfield, J., Colombo, G., Burnap, P., Evans, R., Jacob, N., Williams, M. and Caul, S. 2019. The number and characteristics of newspaper and Twitter reports on suicides and road traffic deaths in young people. Archives of Suicide Research 23(3), pp. 507-522. (10.1080/13811118.2018.1479321)
- Procter, R., Webb, H., Jirotka, M., Burnap, P., Housley, W., Edwards, A. and Williams, M. 2019. A study of cyber hate on Twitter with implications for social media governance strategies. [Online]. arXiv. Available at: https://arxiv.org/abs/1908.11732
- Burnap, P. et al. 2019. Chatty factories: a vision for the future of product design and manufacture with IoT. Presented at: Living in the Internet of Things (IoT 2019), London, UK, 1-2 May 2019Living in the Internet of Things (IoT 2019). IET pp. 4 (6 pp.)., (10.1049/cp.2019.0129)
- Aldmour, R., Burnap, P. and Lakoju, M. 2019. Risk assessment methods for converged IoT and SCADA systems: review and recommendations. Presented at: Living in the Internet of Things (IoT 2019), London, UK, 1-2 May 2019Living in the Internet of Things (IoT 2019). IET pp. 5-10., (10.1049/cp.2019.0130)
- Barati, M., Rana, O., Theodorakopoulos, G. and Burnap, P. 2019. Privacy-aware cloud ecosystems and GDPR compliance. Presented at: 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud), 26-28 August 2019, Istanbul, Turkey2019 7th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE pp. 117., (10.1109/FiCloud.2019.00024)
2018
- Alorainy, W., Burnap, P., Liu, H., Javed, A. and Williams, M. 2018. Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample. Presented at: International Conference on Machine Learning and Cybernetics, Chengdu, China, 15-18 July 20182018 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE pp. 581-586., (10.1109/ICMLC.2018.8527001)
- Radanliev, P., De Roure, D., Nicolescu, R., Huth, M., Mantilla, R., Cannady, S. and Burnap, P. 2018. Future developments in cyber risk assessment for the internet of things. Computers in Industry 102, pp. 14-22. (10.1016/j.compind.2018.08.002)
- Anthi, E., Ahmad, S., Rana, O., Burnap, P. and Theodorakopoulos, G. 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78, pp. 477-490. (10.1016/j.cose.2018.07.016)
- Rhode, M., Burnap, P. and Jones, K. 2018. Early-stage malware prediction using recurrent neural networks. Computers and Security 77, pp. 578-594. (10.1016/j.cose.2018.05.010)
- Burnap, P., French, R., Turner, F. and Jones, K. 2018. Malware classification using self organising feature maps and machine activity data. Computers and Security 73, pp. 399-410. (10.1016/j.cose.2017.11.016)
- Housley, W. et al. 2018. Interaction and transformation on social media: the case of Twitter campaigns. Social Media and Society 4(1), pp. 1-12. (10.1177/2056305117750721)
2017
- Williams, M. L., Burnap, P., Sloan, L., Jessop, C. and Lepps, H. 2017. Users' views of ethics in social media research: informed consent, anonymity and harm. In: Woodfield, K. ed. The Ethics of Online Research., Vol. 2. Advances in Research Ethics and Integrity Emerald Publishing, pp. 27-52., (10.1108/S2398-601820180000002002)
- Williams, M. L., Burnap, P. and Sloan, L. 2017. Towards an ethical framework for publishing Twitter data in social research: taking into account users’ views, online context and algorithmic estimation. Sociology 51(6), pp. 1149-1168. (10.1177/0038038517708140)
- Thomas, L., Long, C., Burnap, P., Wu, J. and Jenkins, N. 2017. Automation of the supplier role in the GB power system using blockchain based smart contracts. CIRED - Open Access Proceedings Journal 2017(1), pp. 2619-2623. (10.1049/oap-cired.2017.0987)
- Burnap, P., Colombo, G., Amery, R., Hodorog, A. and Scourfield, J. 2017. Multi-class machine classification of suicide-related communication on Twitter. Online Social Networks and Media 2, pp. 32-44. (10.1016/j.osnem.2017.08.001)
- Webb, H. et al. 2017. The ethical challenges of publishing Twitter data for research dissemination. Presented at: WebSci'17: ACM Web Science Conference, Troy, NY, USA, 25-28 June 2017Proceedings of the 2017 ACM on Web Science Conference. ACM pp. 339-348., (10.1145/3091478.3091489)
- Baylis, R., Burnap, P., Clatworthy, M. A., Gad, M. A. and Pong, C. K. M. 2017. Private lenders' demand for audit. Journal of Accounting and Economics 64(1), pp. 78-97. (10.1016/j.jacceco.2017.06.001)
- Alsaedi, N., Burnap, P. and Rana, O. 2017. Can we predict a riot? Disruptive event detection using Twitter. ACM Transactions on Internet Technology 17(2), article number: 18. (10.1145/2996183)
- Eden, P., Blyth, A., Jones, K., Soulsby, H., Burnap, P., Cherdantseva, Y. and Stoddart, K. 2017. SCADA system forensic analysis within IIoT. In: Thames, L. and Schaefer, D. eds. Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing. Springer Series in Advanced Manufacturing, pp. 73-101., (10.1007/978-3-319-50660-9_4)
- Burnap, P., Cherdantseva, Y., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K. 2017. Determining and sharing risk data in distributed interdependent systems. IEEE Computer 50(4), pp. 72-79. (10.1109/MC.2017.108)
- Williams, M. L., Burnap, P. and Sloan, L. 2017. Crime sensing with big data: the affordances and limitations of using open-source communications to estimate crime patterns. British Journal of Criminology 57(2), pp. 320-340. (10.1093/bjc/azw031)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2017. Temporal TF-IDF: a high performance approach for event summarization in Twitter. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence, Omaha, Nebraska, USA, 13-16 October 20162016 IEEE/WIC/ACM International Conference on Web Intelligence. IEEE pp. 515-521., (10.1109/WI.2016.0087)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2017. Sensing real-world events using social media data and a classification-clustering framework. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence, Omaha, Nebraska, USA, 13-16 October 20162016 IEEE/WIC/ACM International Conference on Web Intelligence (WI). IEEE pp. 216-223., (10.1109/WI.2016.0039)
- Williams, M. L. and Burnap, P. 2017. Detecting crime events using social media. Presented at: Home Office Crime and Policing Analysis Unit Seminar Series, Westminster, London, UK, July, 2017. pp. -.
- Burnap, P. and Williams, M. L. 2017. Classifying and modeling cyber hate speech: research and opportunities for practical intervention. Presented at: 1st International Conference on Cyber Deviance Detection (CyberDD) in conjunction with 10th ACM International Conference on Web Search and Data Mining (WSDM 2017), Cambridge, UK, 10 Feb 2017.
- Williams, M. L. and Burnap, P. 2017. Social data science & criminology: machine classification and modelling of cyberhate in online social networks. Presented at: Cambridge Institute of Criminology Seminar Series, University of Cambridge, UK, 9 February 2017.
- Williams, M. L. and Burnap, P. 2017. Data science solutions for detecting and monitoring Brexit related online hate speech. Presented at: UK Government Data Science Community Interest Workshop, ONS Data Science Campus, Newport, Wales, UK, 4 September 2017.
- Williams, M. and Burnap, P. 2017. Online extremism and hate speech: definition, measurement & regulation. Presented at: Internet Leadership Academy, Oxford Internet Institute, University of Oxford, UK, 26 September 2017.
2016
- Scourfield, J. B. et al. 2016. The response in Twitter to an assisted suicide in a television soap opera. Crisis: The Journal of Crisis Intervention and Suicide Prevention 37(5), pp. 392-395. (10.1027/0227-5910/a000377)
- Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Soulsby, H. and Stoddart, K. 2016. Forensic readiness for SCADA/ICS incident response. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research, Queen's University Belfast, Belfast, UK, 23-25 August 2016.
- Burnap, P. and Williams, M. L. 2016. Computational human and cyber security analytics for government and policy. Presented at: Data Science and Government Conference, Oxford, UK, 22 June 2016.
- Webb, H. et al. 2016. Digital wildfires: propagation, verification, regulation, and responsible innovation. ACM Transactions on Information Systems 34(3), article number: 15. (10.1145/2893478)
- Williams, M. L. and Burnap, P. 2016. Cyberhate on social media in the aftermath of Woolwich: a case study in computational criminology and big data. British Journal of Criminology 56(2), pp. 211-238. (10.1093/bjc/azv059)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2016. Sensing real-world events using Arabic Twitter posts. Presented at: International AAAI Conference on Web and Social Media (ICWSM), Cologne, Germany, 17-20 May 2016Proceedings of the Tenth International AAAI Conference on Web and Social Media (ICWSM 2016). AAAI pp. 515-518.
- Alsaedi, N., Burnap, P. and Rana, O. F. 2016. Automatic summarization of real world events using Twitter. Presented at: International AAAI Conference on Web and Social Media (ICWSM), Cologne, Germany, 17-20 May 2016Proceedings of the Tenth International AAAI Confe. AAAI pp. 511-514.
- Awan, M. S. K., Burnap, P. and Rana, O. F. 2016. Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. Computers and Security 57, pp. 31-46. (10.1016/j.cose.2015.11.003)
- Burnap, P., Gibson, R., Sloan, L., Southern, R. and Williams, M. L. 2016. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Electoral Studies 41, pp. 230-233. (10.1016/j.electstud.2015.11.017)
- Conejero, J., Rana, O. F., Burnap, P., Morgan, J., Caminero, B. and Carrión, C. 2016. Analysing Hadoop power consumption and impact on application QoS. Future Generation Computer Systems 55, pp. 213-223. (10.1016/j.future.2015.03.009)
- Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K. 2016. A review of cyber security risk assessment methods for SCADA systems. Computers and Security 56, pp. 1-27. (10.1016/j.cose.2015.09.009)
- Burnap, P. and Williams, M. L. 2016. Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science 5, article number: 11. (10.1140/epjds/s13688-016-0072-6)
2015
- Burnap, P., Colombo, G. and Scourfield, J. B. 2015. Machine classification and analysis of suicide-related communication on Twitter. Presented at: 26th ACM Conference on Hypertext & Social Media, Cyprus, 1-4 September 2015HT '15- Proceedings of the 26th ACM Conference on Hypertext & Social Media. Association for Computing Machinery pp. 75-84.
- Webb, H. et al. 2015. Digital wildfires: hyper-connectivity, havoc, and a global ethos to govern social media. Computers and Society 45(3), pp. 193-201.
- Burnap, P., Javed, A., Rana, O. F. and Awan, M. 2015. Real-time classification of malicious URLs on Twitter using Machine Activity Data. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 25-27 August 20152015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). ACM pp. 970-977., (10.1145/2808797.2809281)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2015. Identifying disruptive events from social media to enhance situational awareness. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 24-27 August 2015ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM pp. 934-941., (10.1145/2808797.2808879)
- Williams, M. L. and Burnap, P. 2015. Combating cyber-hate on social media throughcounter-speech. Presented at: Symposium on Anti-Muslim Hate Crime, University of Cambridge, Cambridge, UK, 16 June 2015.
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7(2), pp. 223-242. (10.1002/poi3.85)
- Burnap, P. et al. 2015. Detecting tension in online communities with computational Twitter analysis. Technological Forecasting & Social Change 95, pp. 96-108. (10.1016/j.techfore.2013.04.013)
- Burnap, P. and Williams, M. L. 2015. Plenary: Computational & social security analytics using Big Data. Presented at: International Conference on Computational Social Science, Helsinki, Finland, 8-11 June 2015.
- Williams, M. L. and Burnap, P. 2015. Using big social data and real-time analytics to inform policy. Presented at: Policy-Making in the Big Data Era: Opportunities and Challenges, University of Cambridge, Cambridge, UK, 15-17 June 2015.
- Alsaedi, N. and Burnap, P. 2015. Arabic event detection in social media. Presented at: 16th International Conference on Intelligent Text Processing and Computational Linguistics, Cairo, Egypt, 14-20 April 2015 Presented at Gelbukh, A. ed.Computational Linguistics and Intelligent Text Processing: 16th International Conference, CICLing 2015, Cairo, Egypt, April 14-20, 2015, Proceedings, Part I, Vol. 9041. Lecture Notes in Computer Science Springer Verlag pp. 384-401., (10.1007/978-3-319-18111-0_29)
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: an application of machine classification and statistical modeling for policy and decision making. Presented at: ICWSM Workshop on Religion and Social Media, University of Oxford, Oxford, UK, 26 May 2015.
- Williams, M. L. and Burnap, P. 2015. Cyber-hate on social media in the aftermath of Woolwich. Presented at: Government Hate Crime Seminar, London, UK, 11 March 2015.
- Sloan, L., Morgan, J., Burnap, P. and Williams, M. 2015. Who tweets? Deriving the demographic characteristics of age, occupation and social class from Twitter user meta-data. PLoS ONE 10(3), article number: e0115545. (10.1371/journal.pone.0115545)
- Colombo, G. B., Burnap, P., Hodorog, A. and Scourfield, J. B. 2015. Analysing the connectivity and communication of suicidal users on Twitter. Computer Communications 73(B), pp. 291-300. (10.1016/j.comcom.2015.07.018)
- Williams, M. L. and Burnap, P. 2015. Economic and Social Research Council Trans-Atlantic Platform Workshop. Presented at: Digital Scholarship in the Social Sciences and Humanities: New Forms of Data for Research, Washington DC, USA, 28-29 Jan 2015.
- Burnap, P. et al. 2015. COSMOS: Towards an integrated and scalable service for analysing social media on demand. International Journal of Parallel, Emergent and Distributed Systems 30(2), pp. 80-100. (10.1080/17445760.2014.902057)
- Burnap, P., Gibson, R., Sloan, L., Southern, R. and Williams, M. L. 2015. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Working paper. Cardiff University.
- Al Said, T., Rana, O. F. and Burnap, P. 2015. VMInformant: an instrumented virtual machine to support trustworthy cloud computing. International Journal of High Performance Computing and Networking 8(3), pp. 222-234., article number: IJHPCN080303. (10.1504/IJHPCN.2015.071257)
- Awan, M. S. K., AlGhamdi, M., AlMotiri, S., Burnap, P. and Rana, O. F. 2015. A classification framework for distinct cyber-attacks based on occurrence patterns. Presented at: The 9th International Conference on Security of Information and Networks, Soch, Russia, 8-10 September 2015Proceedings of the 8th International Conference on Security of Information and Networks. ACM pp. 165-168., (10.1145/2799979.2800037)
- Awan, M. S., Burnap, P. and Rana, O. F. 2015. Estimating risk boundaries for persistent and stealthy cyber-attacks. Presented at: 22nd ACM Conference on Computer and Communications Security, Denver Colorado, USA, 12-16 October 2015SafeConfig '15 Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense. ACM pp. 15-20., (10.1145/2809826.2809830)
- Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Hugh, S. and Kristan, S. 2015. A cyber forensic taxonomy for SCADA systems in critical infrastructure. Presented at: The 10th International Conference on Critical Information Infrastructures Security 2015 (CRITIS 2015), Berlin, Germany, 5-7 October 2015.
- Eden, P., Blyth, A., Burnap, P., Jones, K. and Stoddart, K. 2015. A forensic taxonomy of SCADA systems and approach to incident response. Presented at: The 3rd International Symposium for ICS and SCADA Cyber Security Research 2015 (ICS-CSR 2015), Ingolstadt, Germany, 17 - 18 September 2015. , (10.14236/ewic/ICS2015.5)
- Awan, M. S. K., Burnap, P., Rana, O. F. and Javed, A. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC, New York City, NY, USA, 24-26 August 2015High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE pp. 1442-1447., (10.1109/HPCC-CSS-ICESS.2015.224)
- Awan, M., Burnap, P. and Rana, O. F. 2015. An empirical risk management framework for monitoring network security. Presented at: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM),, Liverpool, UK, 26-28 October 2015Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on. IEEE pp. 1764-1771., (10.1109/CIT/IUCC/DASC/PICOM.2015.266)
- Rahulamathavan, Y., Rajarajan, M., Rana, O. F., Awan, M., Burnap, P. and Das, S. K. 2015. Assessing data breach risk in cloud systems. Presented at: 7th International Conference on Cloud Computing Technology and Science (CloudCom), Vancouver, BC, Canada, 30 Nov-3 Dec 20152015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE pp. 363-370., (10.1109/CloudCom.2015.58)
2014
- Williams, M. and Burnap, P. L. 2014. Human security analytics. Presented at: Web Science Trust Web Science Summer School, National University of Singapore, Singapore, Malaysia, 8-12 December 2014.
- Burnap, P. and Williams, M. L. 2014. Big social data analysis panel. Presented at: Web Science Trust Web Science Summer School, National University of Singapore, Singapore, Malaysia, 8-12 December 2014.
- Williams, M. L. and Burnap, P. 2014. Hate speech, tension monitoring and social media. Presented at: Wales Hate Crime Criminal Justice Board, Cardiff, Wales, 23 July 2014. pp. -.
- Sloan, L., Williams, M. L. and Burnap, P. 2014. Deriving demographic variables from twitter data. Presented at: Office for National Statistics Big Data Project Workshop, Titchfield, England, 21 July 2014. pp. -.
- Burnap, P., Rana, O. F., Pauran, N. and Bowen, P. J. 2014. Towards real-time probabilistic risk assessment by sensing disruptive events from streamed news feeds. Presented at: 8th IEEE International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2014), Birmingham City University, Birmingham, UK., 2-4 July 2014. pp. -.
- Burnap, P. et al. 2014. Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4, article number: 206. (10.1007/s13278-014-0206-4)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2014. A combined classification-clustering framework for identifying disruptive events. Presented at: ASE SocialCom Conference, Stanford University, CA., USA, May 27-21 2014.
- Housley, W. et al. 2014. Big and broad social data and the sociological imagination: a collaborative response. Big Data & Society 1(2) (10.1177/2053951714545135)
- Burnap, P. and Williams, M. L. 2014. Hate speech, machine classification and statistical modelling of information flows on Twitter: interpretation and communication for policy decision making. Presented at: Internet, Policy & Politics, Oxford, UK, 26 September 2014.
- Rahulamathavan, Y., Pawar, P. S., Burnap, P., Rajarajan, M., Rana, O. F. and Spanoudakis, G. 2014. Analysing security requirements in cloud-based service level agreements. Presented at: SIN '14 The 7th International Conference on Security of Information and Networks, Glasgow, 9 - 11 September 2014Proceedings of the 7th International Conference on Security of Information and Networks. New York, NY: ACM pp. 73-77., (10.1145/2659651.2659735)
2013
- Sloan, L., Morgan, J., Housley, W., Williams, M. L., Edwards, A. M., Burnap, P. and Rana, O. F. 2013. Knowing the Tweeters: Deriving sociologically relevant demographics from Twitter. Sociological Research Online 18(3), article number: 7. (10.5153/sro.3001)
- Conejero, J., Rana, O. F., Burnap, P., Morgan, J., Carrion, C. and Caminero, B. 2013. Characterising the power consumption of Hadoop Clouds: A social media analysis case study. Presented at: CLOSER 2013: 3rd International Conference on Cloud Computing and Services Science, Aachen, Germany, 8-10 May 2013. , (10.5220/0004373502330243)
- Burnap, P., Avis, N. J. and Rana, O. F. 2013. Making sense of self-reported socially significant data using computational methods. International Journal of Social Research Methodology 16(3), pp. 215-230. (10.1080/13645579.2013.774174)
- Williams, M. L. et al. 2013. Policing cyber-neighbourhoods: Tension monitoring and social media networks. Policing and Society 23(4), pp. 461-481. (10.1080/10439463.2013.780225)
- Conejero, J., Burnap, P., Rana, O. F. and Morgan, J. 2013. Scaling archived social media data analysis using a hadoop cloud. Presented at: IEEE 6th International Conference on Cloud Computing (CLOUD), Santa Clara, CA, USA, 27 June - 2 July 2013. IEEE
- Williams, M. L., Procter, R., Housley, W., Edwards, A. M., Burnap, P., Sloan, L. and Voss, A. 2013. Collaborative online social media observatory. Presented at: COSMOS Launch, London, England, 2013.
- Housley, W., Williams, M. L., Burnap, P. and Procter, R. 2013. COSMOS: theory, method and data. Presented at: Centre for Interdisciplinary Methodologies, University of Warwick, Warwick, UK, 2013.
- Sloan, L., Rob, P., Williams, M. L., Housley, W., Edwards, A. M., Burnap, P. and Rana, O. F. 2013. The Collaborative Online Social Media Observatory. Presented at: ESRC Seminar Series: New Social Media, New Social Science? Blurring the Boundaries: One Year On, London, UK, 2013.
- Sloan, L., Williams, M. L., Burnap, P., Housley, W., Edwards, A. M. and Rana, O. F. 2013. Using social media with survey data. Presented at: ESRC Seminar Series: New Social Media, New Social Science?, London, UK, 2013.
- Burnap, P. et al. 2013. Collaborative online social media observatory. Presented at: Web Observatory Launch, Royal Society, London, UK, 2013.
- Rob, P. et al. 2013. Enabling social media research through citizen social science. Presented at: 13th European Conference on Computer Supported Cooperative Work, Paphos, Cyprus, 21-25 September 2013.
- Burnap, P., Williams, M. L., Housley, W., Edwards, A. M., Sloan, L. and Rana, O. F. 2013. Detecting tension in social media. Presented at: Third International Conference on Social Computing and its Applications, Karlsruhe, Germany, 30 Sept - 2 Oct 2013.
2012
- Burnap, P., Spasic, I., Gray, W. A., Hilton, J. C., Rana, O. F. and Elwyn, G. 2012. Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information. Presented at: 2012 International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, USA, 21-25 May 2012 Presented at Smari, W. W. and Charles, F. eds.2012 International Conference on Collaboration Technologies and Systems (CTS), Vol. 14. Los Alamitos, CA: IEEE pp. 490-497., (10.1109/CTS.2012.6261095)
- Spasic, I., Burnap, P., Greenwood, M. and Arribas-Ayllon, M. 2012. A naïve Bayes approach to classifying topics in suicide notes. Biomedical Informatics Insights 5(Supp 1), pp. 87-97. (10.4137/BII.S8945)
- Burnap, P. et al. 2012. Working paper 153: social media analysis, Twitter and the London Olympics 2012 [working paper]. Working paper. Cardiff: School of Social Sciences, Cardiff University. Available at: http://www.cardiff.ac.uk/socsi/resources/Working%20Paper%20153%20-%20Burnap%20et%20al.%20(2013)%20Social%20Media%20Analysis,%20Twitter%20and%20the%20London%20Olympics%202012%20-%20A%20Research%20Note.pdf
- Williams, M. L., Housley, W., Edwards, A. M., Burnap, P., Rana, O. F. and Avis, N. 2012. Computational and transformational social science. Presented at: Digital Social Research Experts Meeting, Keble College, University of Oxford, Oxford, UK, 2012.
- Housley, W., Edwards, A. M., Williams, M. L., Burnap, P., Rana, O. F. and Avis, N. 2012. Supporting empirical digital social research for the social sciences. Presented at: Digital Research 2012 Conference, St Catherines College, University of Oxford, Oxford, UK, 2012.
- Williams, M. L., Burnap, P., Housley, W., Edwards, A. M., Rana, O. F. and Avis, N. 2012. Treating social media as data: computational sociological Methods, data analysis and the Cardiff online social media Observatory. Presented at: NCRM, Research Methods Festival, St Catherine's College, University of Oxford, Oxford, UK, 2012.
- Williams, M. D., Housley, W., Edwards, A. M., Williams, M. L., Burnap, P., Rana, O. F. and Avis, N. 2012. Computational social science and methodological innovation: surrogacy, augmentation or reorientation. Presented at: ESRC Seminar Series: Blurring the boundaries: New social media, new social science?, London, UK, 2012.
- Edwards, A. M., Williams, M. L., Housley, W., Burnap, P., Rana, O. F. and Avis, N. 2012. Mining tension and cohesion using the Cardiff Online Social Media Observatory. Presented at: NCRM, Research Methods Festival,St Catherine's College, University of Oxford, Oxford, UK, 2012.
- Burnap, P. et al. 2012. Social media analysis, Twitter and the London Olympics (a research note). Working paper. Cardiff: Cardiff University.
2010
- Alsalamah, S., Hilton, J. C. and Burnap, P. 2010. Towards information sharing in virtual organisations: The development of an icon-based information control model. Presented at: The UK All Hands Meeting (AHM), Cardiff, UK, 13- 16 September 2010.
2009
- Burnap, P. and Hilton, J. C. 2009. Self protecting data for de-perimeterised information sharing. Presented at: Third International Conference on Digital Society ICDS '09, Cancun, Mexico, 1-7 February 2009Digital Society, 2009. ICDS '09. Third International Conference on. IEEE pp. 65-70., (10.1109/ICDS.2009.41)
- Burnap, P. 2009. Advanced access control in support and distributed collaborative working and de-perimeterization. PhD Thesis, Cardiff University.
2008
- Burnap, P. and Hilton, J. C. 2008. Information assurance for collaborative working in deperimeterised environments. Presented at: UK e-Science All Hands Meeting, Edinburgh, UK, 8-11 September 2008.
2006
- Gray, W. A., Burnap, P., Miles, J. C. and Pahwa, J. S. 2006. MDSSF - A Federated Architecture for Product Procurement. Lecture Notes in Computer Science 4080, pp. 812-821. (10.1007/11827405_79)
- Pahwa, J. S., Burnap, P., Gray, W. A. and Miles, J. C. 2006. MDSSF- A federated architecture for product procurement. Presented at: 17th International Conference on Database and Expert Systems Applications (DEXA '06), Krakov, Poland.
2005
- Burnap, P. et al. 2005. Worldwide messaging support for high performance real-time collaboration. Presented at: 4th UK e-Science Programme All Hands Meeting, Nottingham, UK, 19-22 September 2005 Presented at Cox, S. J. and Walker, D. W. eds.Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC pp. 395.
- Burnap, P., Gray, W. A., Miles, J. C. and Rana, O. F. 2005. A service oriented infrastructure to facilitate trust in collaborative working. Presented at: 4th UK e-Science Programme All Hands Meeting, Nottingham, UK, 19-22 September 2005 Presented at Cox, S. J. and Walker, D. W. eds.Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC pp. 346.
- Rana, O. F., Hilton, J. C., Joita, L., Burnap, P., Pahwa, J. S., Miles, J. C. and Gray, W. A. 2005. Secure virtual organisations: Protocols and requirements. Presented at: Information Security Solutions Europe (ISSE) 2005 - The Independent European ICT Security Conference and Exhibition, Budapest, Hungary, 27-29 September 2005 Presented at Paulus, S., Pohlmann, N. and Reimer, H. eds.ISSE 2005 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2005 Conference. Berlin: Springer pp. 422-432.
- Burnap, P., Pahwa, J. S., Joita, L., Gray, W. . A., Rana, O. . F. and Miles, J. C. 2005. Grid based E-procurement. Proceedings of the ASCE, pp. 1-11. (10.1061/40794(179)156)
2004
- Joita, L., Pahwa, J. S., Burnap, P., Gray, W. A., Rana, O. F. and Miles, J. C. 2004. Supporting collaborative virtual organisations in the construction industry via the grid. Presented at: UK e-Science all Hands Meeting (AHM2004), Nottingham, UK, 31 August - 3 September 2004 Presented at Cox, S. J. ed.Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC
- Joita, L., Rana, O., Burnap, P., Pahwa, J. S., Gray, W. A. and Miles, J. C. 2004. A grid-enabled security framework for collaborative virtual organisations. Presented at: 5th IFIP Working Conference on Virtual Enterprises (PRO-VE), Toulouse, France, 22-27 August 2004.
- Miles, J. C., Joita, L., Pahwa, J. S., Burnap, P., Gray, W. A. and Rana, O. F. 2004. Collaborative engineering Virtual Teams in a Grid Environment Supporting Consortia in the Construction Industry. Presented at: 10th International Conference on Computing in Civil and Building Engineering (ICCCBE), Weimar, Germany, 2-4 June 2004.
- Pahwa, J. S., Burnap, P., Joita, L., Gray, W. A., Rana, O. F. and Miles, J. C. 2004. Creating a virtual distributed database - data definition and search model for collaborative virtual teams in the construction industry. Presented at: Proceedings 21st Annual British National Conference on Databases (BNCOD2004), Edinburgh, UK.
- Burnap, P., Joita, L., Pahwa, J. S., Gray, W. A., Rana, O. F. and Miles, J. C. 2004. Security user and data management for collaborative virtual teams in a grid environment supporting consortia in the construction industry. Presented at: Proceedings of the Workshop on Requirements Capture for Collaboration in e-Science, Edinburgh, UK. pp. 54-60.
- Joita, L., Rana, O. F., Burnap, P., Pahwa, J. S., Gray, W. A. and Miles, J. C. 2004. A grid enabled security framework for collaborative virtual organisations. Presented at: Proceedings of Virtual Enterprises and Collaborative Networks IFIP 18th World Computer congressTC5/WG5.5 5th Working Conference on Virtual Enterprises, Toulouse, UK. pp. 22-27.
Articles
- Rotibi, A., Saxena, N. and Burnap, P. 2024. Winning the battle with cyber risk identification tools in industrial control systems: A review. IET Cyber-Physical Systems: Theory & Applications (10.1049/cps2.12105)
- Williams, L., Anthi, E. and Burnap, P. 2024. Uncovering key factors that drive the impressions of online emerging technology narratives. Information 15(11), article number: 706. (10.3390/info15110706)
- Nunes, M., Kayan, H., Burnap, P., Perera, C. and Dykes, J. 2024. Exploiting user-centred design to secure industrial control systems. Frontiers in the Internet of Things 3, article number: 1436023. (10.3389/friot.2024.1436023)
- Kayan, H., Heartfield, R., Rana, O., Burnap, P. and Perera, C. 2024. CASPER: Context-aware IoT anomaly detection system for industrial robotic arms. ACM Transactions on Internet of Things 18, pp. 1-36. (10.1145/3670414)
- Rotibi, A., Saxena, N., Burnap, P. and Reed, C. 2024. System-level operational cyber risks identification in industrial control systems. Cyber-Physical Systems (10.1080/23335777.2024.2373388)
- Burnap, P., Anthi, E., Reineckea, P., Williams, L., Caoa, F., Aldmoura, R. and Jones, K. 2024. Mapping automated cyber attack intelligence to context-based impact on system-level goals. Journal of Cybersecurity and Privacy 4(2), pp. 340-356. (10.3390/jcp4020017)
- Williams, L., Anthi, E., Arman, L. and Burnap, P. 2024. Topic modelling: Going beyond token outputs. Big Data and Cognitive Computing 8(5), article number: 44. (10.3390/bdcc8050044)
- Williams, L., Anthi, E. and Burnap, P. 2024. A scalable and automated framework for tracking the likely adoption of emerging technologies. Information 15(4), article number: 237. (10.3390/info15040237)
- Williams, L., Anthi, E. and Burnap, P. 2024. Comparing hierarchical approaches to enhance supervised emotive text classification. Big Data and Cognitive Computing 8(4) (10.3390/bdcc8040038)
- Shaked, A., Cherdantseva, Y., Burnap, P. and Maynard, P. 2023. Operations-informed incident response playbooks. Computers and Security 134, article number: 103454. (10.1016/j.cose.2023.103454)
- Nafees, M. N., Saxena, N., Cardenas, A., Grijalva, S. and Burnap, P. 2023. Smart grid cyber-physical situational awareness of complex operational technology attacks: A review. ACM Computing Surveys 55(10), pp. 1-36., article number: 215. (10.1145/3565570)
- Alrowaili, Y., Saxena, N., Srivastava, A., Conti, M. and Burnap, P. 2023. Review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification. IET Cyber-Physical Systems: Theory & Applications 8(3), pp. 160-185. (10.1049/cps2.12059)
- Williams, M. L. et al. 2023. The effect of the Brexit vote on the variation in race and religious hate crimes in England, Wales, Scotland and Northern Ireland. The British Journal of Criminology: An International Review of Crime and Society 63(4), pp. 1003-1023. (10.1093/bjc/azac071)
- Foster, B., Williams, M. and Burnap, P. 2023. Combatting community tensions in Wales: Mapping the cooperation space for multi-agency cohesion delivery. British Journal of Community Justice 19(1), pp. 55-81. (10.48411/eq13-km71)
- Asiri, M., Saxena, N., Gjomemo, R. and Burnap, P. 2023. Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective. ACM transactions on cyber-physical systems 7(2), pp. 1-33. (10.1145/3587255)
- Agyepong, E., Cherdantseva, Y., Reinecke, P. and Burnap, P. 2023. A systematic method for measuring the performance of a cyber security operations centre analyst. Computers and Security 124, article number: 102959. (10.1016/j.cose.2022.102959)
- Mohammed, A. S., Anthi, E., Rana, O., Saxena, N. and Burnap, P. 2023. Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication. Computers and Security 124, article number: 103007. (10.1016/j.cose.2022.103007)
- Rotibi, A., Saxena, N., Burnap, P. and Tartar, A. 2023. Extended dependency modelling technique for cyber risk identification in ICS. IEEE Access 11, pp. 37229-37242. (10.1109/ACCESS.2023.3263671)
- Ikwu, R., Giommoni, L., Javed, A., Burnap, P. and Williams, M. 2023. Digital fingerprinting for identifying malicious collusive groups on Twitter. Journal of Cybersecurity 9(1), article number: tyad014. (10.1093/cybsec/tyad014)
- Aloraini, F., Javed, A., Rana, O. and Burnap, P. 2022. Adversarial machine learning in IoT from an insider point of view. Journal of Information Security and Applications 70, article number: 103341. (10.1016/j.jisa.2022.103341)
- Javed, A., Ikwu, R., Burnap, P., Giommoni, L. and Williams, M. 2022. Disrupting drive-by download networks on Twitter.. Social Network Analysis and Mining 12(117)
- Mohammed, A. S., Reinecke, P., Burnap, P., Rana, O. and Anthi, E. 2022. Cybersecurity challenges in the offshore oil and gas Industry: An Industrial Cyber-Physical Systems (ICPS) perspective. ACM transactions on cyber-physical systems 6(3), pp. 1-27., article number: 27. (10.1145/3548691)
- Nunes, M., Burnap, P., Reinecke, P. and Lloyd, K. 2022. Bane or boon: measuring the effect of evasive malware on system call classifiers. Journal of Information Security and Applications 67, article number: 103202. (10.1016/j.jisa.2022.103202)
- Cherdantseva, Y., Burnap, P., Nadjm-Tehrani, S. and Jones, K. 2022. A configurable dependency model of a SCADA system for goal-oriented risk assessment. Applied Sciences 12(10), article number: 4880. (10.3390/app12104880)
- Javed, A., Lakoju, M., Burnap, P. and Rana, O. 2022. Security analytics for real-time forecasting of cyberattacks. Software: Practice and Experience 52(3), pp. 788-804. (10.1002/spe.2822)
- Alorainy, W., Burnap, P., Liu, H., Williams, M. and Giommoni, L. 2022. Disrupting networks of hate: Characterising hateful networks and removing critical nodes. Social Network Analysis and Mining 12, article number: 27. (10.1007/s13278-021-00818-z)
- Kayan, H., Nunes, M., Rana, O., Burnap, P. and Perera, C. 2022. Cybersecurity of industrial cyber-physical systems: a review. ACM Computing Surveys 54(11s), article number: 229. (10.1145/3510410)
- Rhode, M., Burnap, P. and Wedgbury, A. 2021. Real-time malware process detection and automated process killing. Security and Communication Networks 2021, article number: 8933681. (10.1155/2021/8933681)
- Anthi, E., Williams, L., Javed, A. and Burnap, P. 2021. Hardening machine learning Denial of Service (DoS) defences against adversarial attacks in IoT smart home networks. Computers and Security 108, article number: 102352. (10.1016/j.cose.2021.102352)
- Lakoju, M., Ajienka, N., Khanesar, M., Burnap, P. and Branson, D. 2021. Unsupervised learning for product use activity recognition: an exploratory study of a “Chatty Device”. Sensors 21(15), article number: 4991. (10.3390/s21154991)
- Radanliev, P. et al. 2021. Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge. Environment Systems and Decisions 41, pp. 236-247. (10.1007/s10669-020-09792-x)
- Anthi, E., Williams, L., Rhode, M., Burnap, P. and Wedgbury, A. 2021. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. Journal of Information Security and Applications 58, article number: 102717. (10.1016/j.jisa.2020.102717)
- Aliwa, E., Rana, O., Perera, C. and Burnap, P. 2021. Cyberattacks and countermeasures for in-vehicle networks. ACM Computing Surveys 54(1), article number: 21. (10.1145/3431233)
- Lakoju, M., Javed, A., Rana, O., Burnap, P., Atiba, S. and Cherkaoui, S. 2021. "Chatty Devices” and edge-based activity classification. Discover Internet of Things 1, article number: 5. (10.1007/s43926-021-00004-9)
- Anthi, E., Williams, L., Burnap, P. and Jones, K. 2021. A three-tiered intrusion detection system for Industrial Control Systems (ICS). Journal of Cybersecurity 7(1), article number: tyab006. (10.1093/cybsec/tyab006)
- Al Baghal, T., Sloan, L., Jessop, C., Williams, M. L. and Burnap, P. 2020. Linking Twitter and survey data: the impact of survey mode and demographics on consent rates across three UK studies. Social Science Computer Review 38(5), pp. 517-532. (10.1177/0894439319828011)
- Saxena, N., Hayes, E., Bertino, E., Ojo, P., Choo, K. R. and Burnap, P. 2020. Impact and key challenges of insider threats on organizations and critical businesses. Electronics 9(9), article number: 1460. (10.3390/electronics9091460)
- Javed, A., Burnap, P., Williams, M. L. and Rana, O. F. 2020. Emotions behind drive-by download propagation on Twitter. ACM Transactions on the Web 14(4), article number: 16. (10.1145/3408894)
- Bérubé, M., Tang, T., Fortin, F., Ozlap, S., Williams, M. L. and Burnap, P. 2020. Social media forensics applied to assessment of post–critical incident social reaction: The case of the 2017 Manchester Arena terrorist attack. Forensic Science International 313, article number: 110364. (10.1016/j.forsciint.2020.110364)
- Pratomo, B., Burnap, P. and Theodorakopoulos, G. 2020. BLATTA: early exploit setection on network traffic with recurrent neural networks. Security and Communication Networks 2020, article number: 8826038. (10.1155/2020/8826038)
- Saxena, N., Thomas, I., Gope, P., Burnap, P. and Kumar, N. 2020. PharmaCrypt: blockchain for critical pharmaceutical industry to counterfeit drugs. Computer 53(7), pp. 29-44. (10.1109/MC.2020.2989238)
- Radanliev, P. et al. 2020. Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecurity 3, article number: 13. (10.1186/s42400-020-00052-8)
- Ozalp, S., Williams, M. L., Burnap, P., Liu, H. and Mostafa, M. 2020. Antisemitism on twitter: collective efficacy and the role of community organisations in challenging online hate speech. Social Media and Society 6(2), pp. 1-20. (10.1177/2056305120916850)
- Williams, M. L., Burnap, P., Javed, A., Liu, H. and Ozalp, S. 2020. Hate in the machine: anti-black and anti-Muslim social media posts as predictors of offline racially and religiously aggravated crime. British Journal of Criminology 60(1), pp. 93-117. (10.1093/bjc/azz049)
- Scourfield, J., Evans, R., Colombo, G., Burrows, D., Jacob, N., Williams, M. and Burnap, P. 2020. Are youth suicide memorial sites on Facebook different from those for other sudden deaths?. Death Studies 44(12), pp. 793-801. (10.1080/07481187.2019.1614109)
- Agyepong, E., Cherdantseva, Y., Reinecke, P. and Burnap, P. 2020. Challenges and performance metrics for security operations center analysts: a systematic review. Journal of Cyber Security Technology 4(3), pp. 125-152. (10.1080/23742917.2019.1698178)
- Alorainy, W., Burnap, P., Liu, H. and Williams, M. L. 2019. 'The enemy among us': detecting cyber hate speech with threats-based othering language embeddings. ACM Transactions on the Web 13(3), article number: 14. (10.1145/3324997)
- Anthi, E., Williams, L., Malgorzata, S., Theodorakopoulos, G. and Burnap, P. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things 6(5), pp. 9042-9053. (10.1109/JIOT.2019.2926365)
- Nunes, M., Burnap, P., Rana, O., Reinecke, P. and Lloyd, K. 2019. Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis. Journal of Information Security and Applications 48, article number: 102365. (10.1016/j.jisa.2019.102365)
- Williams, M. L., Levi, M., Burnap, P. and Gundur, R. V. 2019. Under the corporate radar: examining insider business cybercrime victimization through an application of routine activities theory. Deviant Behavior 40(9), pp. 1119-1131. (10.1080/01639625.2018.1461786)
- Javed, A., Burnap, P. and Rana, O. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56(3), pp. 1133-1145. (10.1016/j.ipm.2018.02.003)
- Liu, H., Burnap, P., Alorainy, W. and Williams, M. L. 2019. A fuzzy approach to text classification with two-stage training for ambiguous instances. IEEE Transactions on Computational Social Systems 6(2), pp. 227-240. (10.1109/TCSS.2019.2892037)
- Scourfield, J., Colombo, G., Burnap, P., Evans, R., Jacob, N., Williams, M. and Caul, S. 2019. The number and characteristics of newspaper and Twitter reports on suicides and road traffic deaths in young people. Archives of Suicide Research 23(3), pp. 507-522. (10.1080/13811118.2018.1479321)
- Radanliev, P., De Roure, D., Nicolescu, R., Huth, M., Mantilla, R., Cannady, S. and Burnap, P. 2018. Future developments in cyber risk assessment for the internet of things. Computers in Industry 102, pp. 14-22. (10.1016/j.compind.2018.08.002)
- Anthi, E., Ahmad, S., Rana, O., Burnap, P. and Theodorakopoulos, G. 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78, pp. 477-490. (10.1016/j.cose.2018.07.016)
- Rhode, M., Burnap, P. and Jones, K. 2018. Early-stage malware prediction using recurrent neural networks. Computers and Security 77, pp. 578-594. (10.1016/j.cose.2018.05.010)
- Burnap, P., French, R., Turner, F. and Jones, K. 2018. Malware classification using self organising feature maps and machine activity data. Computers and Security 73, pp. 399-410. (10.1016/j.cose.2017.11.016)
- Housley, W. et al. 2018. Interaction and transformation on social media: the case of Twitter campaigns. Social Media and Society 4(1), pp. 1-12. (10.1177/2056305117750721)
- Williams, M. L., Burnap, P. and Sloan, L. 2017. Towards an ethical framework for publishing Twitter data in social research: taking into account users’ views, online context and algorithmic estimation. Sociology 51(6), pp. 1149-1168. (10.1177/0038038517708140)
- Thomas, L., Long, C., Burnap, P., Wu, J. and Jenkins, N. 2017. Automation of the supplier role in the GB power system using blockchain based smart contracts. CIRED - Open Access Proceedings Journal 2017(1), pp. 2619-2623. (10.1049/oap-cired.2017.0987)
- Burnap, P., Colombo, G., Amery, R., Hodorog, A. and Scourfield, J. 2017. Multi-class machine classification of suicide-related communication on Twitter. Online Social Networks and Media 2, pp. 32-44. (10.1016/j.osnem.2017.08.001)
- Baylis, R., Burnap, P., Clatworthy, M. A., Gad, M. A. and Pong, C. K. M. 2017. Private lenders' demand for audit. Journal of Accounting and Economics 64(1), pp. 78-97. (10.1016/j.jacceco.2017.06.001)
- Alsaedi, N., Burnap, P. and Rana, O. 2017. Can we predict a riot? Disruptive event detection using Twitter. ACM Transactions on Internet Technology 17(2), article number: 18. (10.1145/2996183)
- Burnap, P., Cherdantseva, Y., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K. 2017. Determining and sharing risk data in distributed interdependent systems. IEEE Computer 50(4), pp. 72-79. (10.1109/MC.2017.108)
- Williams, M. L., Burnap, P. and Sloan, L. 2017. Crime sensing with big data: the affordances and limitations of using open-source communications to estimate crime patterns. British Journal of Criminology 57(2), pp. 320-340. (10.1093/bjc/azw031)
- Scourfield, J. B. et al. 2016. The response in Twitter to an assisted suicide in a television soap opera. Crisis: The Journal of Crisis Intervention and Suicide Prevention 37(5), pp. 392-395. (10.1027/0227-5910/a000377)
- Webb, H. et al. 2016. Digital wildfires: propagation, verification, regulation, and responsible innovation. ACM Transactions on Information Systems 34(3), article number: 15. (10.1145/2893478)
- Williams, M. L. and Burnap, P. 2016. Cyberhate on social media in the aftermath of Woolwich: a case study in computational criminology and big data. British Journal of Criminology 56(2), pp. 211-238. (10.1093/bjc/azv059)
- Awan, M. S. K., Burnap, P. and Rana, O. F. 2016. Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. Computers and Security 57, pp. 31-46. (10.1016/j.cose.2015.11.003)
- Burnap, P., Gibson, R., Sloan, L., Southern, R. and Williams, M. L. 2016. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Electoral Studies 41, pp. 230-233. (10.1016/j.electstud.2015.11.017)
- Conejero, J., Rana, O. F., Burnap, P., Morgan, J., Caminero, B. and Carrión, C. 2016. Analysing Hadoop power consumption and impact on application QoS. Future Generation Computer Systems 55, pp. 213-223. (10.1016/j.future.2015.03.009)
- Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K. 2016. A review of cyber security risk assessment methods for SCADA systems. Computers and Security 56, pp. 1-27. (10.1016/j.cose.2015.09.009)
- Burnap, P. and Williams, M. L. 2016. Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science 5, article number: 11. (10.1140/epjds/s13688-016-0072-6)
- Webb, H. et al. 2015. Digital wildfires: hyper-connectivity, havoc, and a global ethos to govern social media. Computers and Society 45(3), pp. 193-201.
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7(2), pp. 223-242. (10.1002/poi3.85)
- Burnap, P. et al. 2015. Detecting tension in online communities with computational Twitter analysis. Technological Forecasting & Social Change 95, pp. 96-108. (10.1016/j.techfore.2013.04.013)
- Sloan, L., Morgan, J., Burnap, P. and Williams, M. 2015. Who tweets? Deriving the demographic characteristics of age, occupation and social class from Twitter user meta-data. PLoS ONE 10(3), article number: e0115545. (10.1371/journal.pone.0115545)
- Colombo, G. B., Burnap, P., Hodorog, A. and Scourfield, J. B. 2015. Analysing the connectivity and communication of suicidal users on Twitter. Computer Communications 73(B), pp. 291-300. (10.1016/j.comcom.2015.07.018)
- Burnap, P. et al. 2015. COSMOS: Towards an integrated and scalable service for analysing social media on demand. International Journal of Parallel, Emergent and Distributed Systems 30(2), pp. 80-100. (10.1080/17445760.2014.902057)
- Al Said, T., Rana, O. F. and Burnap, P. 2015. VMInformant: an instrumented virtual machine to support trustworthy cloud computing. International Journal of High Performance Computing and Networking 8(3), pp. 222-234., article number: IJHPCN080303. (10.1504/IJHPCN.2015.071257)
- Burnap, P. et al. 2014. Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4, article number: 206. (10.1007/s13278-014-0206-4)
- Housley, W. et al. 2014. Big and broad social data and the sociological imagination: a collaborative response. Big Data & Society 1(2) (10.1177/2053951714545135)
- Sloan, L., Morgan, J., Housley, W., Williams, M. L., Edwards, A. M., Burnap, P. and Rana, O. F. 2013. Knowing the Tweeters: Deriving sociologically relevant demographics from Twitter. Sociological Research Online 18(3), article number: 7. (10.5153/sro.3001)
- Burnap, P., Avis, N. J. and Rana, O. F. 2013. Making sense of self-reported socially significant data using computational methods. International Journal of Social Research Methodology 16(3), pp. 215-230. (10.1080/13645579.2013.774174)
- Williams, M. L. et al. 2013. Policing cyber-neighbourhoods: Tension monitoring and social media networks. Policing and Society 23(4), pp. 461-481. (10.1080/10439463.2013.780225)
- Spasic, I., Burnap, P., Greenwood, M. and Arribas-Ayllon, M. 2012. A naïve Bayes approach to classifying topics in suicide notes. Biomedical Informatics Insights 5(Supp 1), pp. 87-97. (10.4137/BII.S8945)
- Gray, W. A., Burnap, P., Miles, J. C. and Pahwa, J. S. 2006. MDSSF - A Federated Architecture for Product Procurement. Lecture Notes in Computer Science 4080, pp. 812-821. (10.1007/11827405_79)
- Burnap, P., Pahwa, J. S., Joita, L., Gray, W. . A., Rana, O. . F. and Miles, J. C. 2005. Grid based E-procurement. Proceedings of the ASCE, pp. 1-11. (10.1061/40794(179)156)
Book sections
- Agyepong, E., Cherdantseva, Y., Reinecke, P. and Burnap, P. 2020. Cyber security operations centre concepts and implementation. In: Yaokumah, W. et al. eds. Modern Theories and Practices for Cyber Ethics and Security Compliance. IGI Global, pp. 88-104., (10.4018/978-1-7998-3149-5.ch006)
- Williams, M. L., Burnap, P., Sloan, L., Jessop, C. and Lepps, H. 2017. Users' views of ethics in social media research: informed consent, anonymity and harm. In: Woodfield, K. ed. The Ethics of Online Research., Vol. 2. Advances in Research Ethics and Integrity Emerald Publishing, pp. 27-52., (10.1108/S2398-601820180000002002)
- Eden, P., Blyth, A., Jones, K., Soulsby, H., Burnap, P., Cherdantseva, Y. and Stoddart, K. 2017. SCADA system forensic analysis within IIoT. In: Thames, L. and Schaefer, D. eds. Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing. Springer Series in Advanced Manufacturing, pp. 73-101., (10.1007/978-3-319-50660-9_4)
Conferences
- Alrowaili, Y., Saxena, N. and Burnap, P. 2024. Towards developing an asset-criticality identification framework in smart grids. Presented at: IEEE International Conference on Cyber Security and Resilience (CSR) Workshop on Security, Privacy and Resilience of Critical Assets in Critical Infrastructure (SPARC), London, UK, 2-4 Sept 20242024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE pp. 720-725., (10.1109/CSR61664.2024.10679477)
- Kayan, H., Rana, O., Burnap, P. and Perera, C. 2023. CASPER: Context-aware anomaly detection system for industrial robotic arms. Presented at: The 21st International Conference on Pervasive Computing and Communications (PerCom 2023), Atlanta, USA, 13-17 March 2023.
- Nafees, M. N., Saxena, N. and Burnap, P. 2023. POSTER: Adaptive moving target defense: Enhancing dynamic perturbation through voltage sensitivity analysis in power systems. Presented at: 21st International Conference on Applied Cryptography and Network Security (ACNS 2023), Kyoto, Japan, 19-22 June 202321st International Conference on Applied Cryptography and Network Security (ACNS 2023) Proceedings.
- Asiri, M., Saxena, N. and Burnap, P. 2023. Advancing resilience of cyber-physical smart grid: An integrated co-simulation approach incorporating indicators of compromise. Presented at: International Workshop on Re-design Industrial Control Systems with Security (RICSS) in conjunction with IEEE EuroS&P, Delft, Netherlands, 3-7 July 20232023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE pp. 370-378., (10.1109/eurospw59978.2023.00047)
- Rotibi, A., Saxena, N. and Burnap, P. 2023. Poster: Using causal inference to extract hidden information from dependency modelling. Presented at: IEEE European Symposium on Security and Privacy (Euro S&P), Delft, Netherlands, 3-7 July 2023.
- Nafees, M. N., Saxena, N. and Burnap, P. 2022. On the efficacy of physics-informed context-based anomaly detection for power system. Presented at: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, Singapore, 25-28 October 20222022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, (10.1109/SmartGridComm52983.2022.9961034)
- Nafees, M. N., Saxena, N. and Burnap, P. 2022. Physics-informed augmentation for contextual anomaly detection in smart grid. Presented at: ACM CCS, Los Angeles, USA, 7-11 November 2022CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. ACM pp. 3427-3429., (10.1145/3548606.3563533)
- Shaked, A., Cherdantseva, Y. and Burnap, P. 2022. Model-based incident response playbooks. Presented at: 17th International Conference on Availability, Reliability and Security, Vienna, Austia, 23-26 August 2022ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security. ACM pp. 1-7., (10.1145/3538969.3538976)
- Shaked, A., Cherdantseva, Y. and Burnap, P. 2022. Model-based incident response playbooks. Presented at: ARES 2022: The 17th International Conference on Availability, Reliability and Security, 23-26 August 2022ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security. New York: Association for Computing Machinery, (10.1145/3538969.3538976)
- Nafees, M. N., Saxena, N. and Burnap, P. 2021. Optimized predictive control for AGC cyber resiliency. Presented at: 2021 ACM Conference on Computer and Communications Security (CCS), Seoul, South Korea, 14-19 November 2021CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM pp. 2450-2452., (10.1145/3460120.3485358)
- Asiri, M., Saxena, N. and Burnap, P. 2021. Investigating usable indicators against cyber-attacks in industrial control systems. Presented at: 17th Symposium on Usable Privacy and Security (USENIX Security 2021), Virtual, 08-10 August 2021USENIX Symposium on Usable Privacy and Security (SOUPS) 2021. USENIX
- Nafees, M. N., Saxena, N. and Burnap, P. 2021. Specification-based process control attack detection in substation automation. Presented at: 42nd IEEE Symposium on Security and Privacy 2021, Virtual, 23-27 May 2021.
- Alrowaili, Y., Saxena, N. and Burnap, P. 2021. Determining asset criticality in cyber-physical smart grid. Presented at: 26th European Symposium on Research in Computer Security (ESORICS 2021), Virtual, 04-08 October 2021.
- Liu, H., Burnap, P., Alorainy, W. and Williams, M. 2020. Scmhl5 at TRAC-2 shared task on aggression identification: bert based ensemble learning approach. Presented at: Second Workshop on Trolling, Aggression and Cyberbullying, Marseille, France, 16 May 2020.
- Agyepong, E., Cherdantseva, Y., Reinecke, P. and Burnap, P. 2020. Towards a framework for measuring the performance of a security operations center analyst. Presented at: IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020), Dublin, Ireland, 15-17 June 2020.
- Nafees, M. N., Saxena, N., Burnap, P. and Choi, B. J. 2020. Impact of energy consumption attacks on LoRaWAN-enabled devices in industrial context. Presented at: ACM Conference on Computer and Communications Security (CCS 2020), Virtual, 9-13 November 2020.
- Nafees, M. N., Saxena, N., Khan, R. and Burnap, P. 2020. Towards distance relay attack discrimination for situational awareness-based anomaly detection. Presented at: Annual Computer Security Applications Conference (ACSAC 2020), Virtual, 7-11 December 2020.
- Rhode, M., Tuson, L., Burnap, P. and Jones, K. 2019. LAB to SOC: Robust Features for Dynamic Malware Detection. Presented at: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2019), Portland, OR, USA, 24-27 June 20192019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Industry Track. IEEE pp. 13-16., (10.1109/DSN-Industry.2019.00010)
- Liu, H., Burnap, P., Alorainy, W. and Williams, M. L. 2019. Fuzzy multi-task learning for hate speech type identification. Presented at: The Web Conference 2019, San Francisco, CA, USA, 13-17 May 2019WWW '19 The World Wide Web Conference. ACM pp. 3006-3012., (10.1145/3308558.3313546)
- Burnap, P. et al. 2019. Chatty factories: a vision for the future of product design and manufacture with IoT. Presented at: Living in the Internet of Things (IoT 2019), London, UK, 1-2 May 2019Living in the Internet of Things (IoT 2019). IET pp. 4 (6 pp.)., (10.1049/cp.2019.0129)
- Aldmour, R., Burnap, P. and Lakoju, M. 2019. Risk assessment methods for converged IoT and SCADA systems: review and recommendations. Presented at: Living in the Internet of Things (IoT 2019), London, UK, 1-2 May 2019Living in the Internet of Things (IoT 2019). IET pp. 5-10., (10.1049/cp.2019.0130)
- Barati, M., Rana, O., Theodorakopoulos, G. and Burnap, P. 2019. Privacy-aware cloud ecosystems and GDPR compliance. Presented at: 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud), 26-28 August 2019, Istanbul, Turkey2019 7th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE pp. 117., (10.1109/FiCloud.2019.00024)
- Alorainy, W., Burnap, P., Liu, H., Javed, A. and Williams, M. 2018. Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample. Presented at: International Conference on Machine Learning and Cybernetics, Chengdu, China, 15-18 July 20182018 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE pp. 581-586., (10.1109/ICMLC.2018.8527001)
- Webb, H. et al. 2017. The ethical challenges of publishing Twitter data for research dissemination. Presented at: WebSci'17: ACM Web Science Conference, Troy, NY, USA, 25-28 June 2017Proceedings of the 2017 ACM on Web Science Conference. ACM pp. 339-348., (10.1145/3091478.3091489)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2017. Temporal TF-IDF: a high performance approach for event summarization in Twitter. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence, Omaha, Nebraska, USA, 13-16 October 20162016 IEEE/WIC/ACM International Conference on Web Intelligence. IEEE pp. 515-521., (10.1109/WI.2016.0087)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2017. Sensing real-world events using social media data and a classification-clustering framework. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence, Omaha, Nebraska, USA, 13-16 October 20162016 IEEE/WIC/ACM International Conference on Web Intelligence (WI). IEEE pp. 216-223., (10.1109/WI.2016.0039)
- Williams, M. L. and Burnap, P. 2017. Detecting crime events using social media. Presented at: Home Office Crime and Policing Analysis Unit Seminar Series, Westminster, London, UK, July, 2017. pp. -.
- Burnap, P. and Williams, M. L. 2017. Classifying and modeling cyber hate speech: research and opportunities for practical intervention. Presented at: 1st International Conference on Cyber Deviance Detection (CyberDD) in conjunction with 10th ACM International Conference on Web Search and Data Mining (WSDM 2017), Cambridge, UK, 10 Feb 2017.
- Williams, M. L. and Burnap, P. 2017. Social data science & criminology: machine classification and modelling of cyberhate in online social networks. Presented at: Cambridge Institute of Criminology Seminar Series, University of Cambridge, UK, 9 February 2017.
- Williams, M. L. and Burnap, P. 2017. Data science solutions for detecting and monitoring Brexit related online hate speech. Presented at: UK Government Data Science Community Interest Workshop, ONS Data Science Campus, Newport, Wales, UK, 4 September 2017.
- Williams, M. and Burnap, P. 2017. Online extremism and hate speech: definition, measurement & regulation. Presented at: Internet Leadership Academy, Oxford Internet Institute, University of Oxford, UK, 26 September 2017.
- Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Soulsby, H. and Stoddart, K. 2016. Forensic readiness for SCADA/ICS incident response. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research, Queen's University Belfast, Belfast, UK, 23-25 August 2016.
- Burnap, P. and Williams, M. L. 2016. Computational human and cyber security analytics for government and policy. Presented at: Data Science and Government Conference, Oxford, UK, 22 June 2016.
- Alsaedi, N., Burnap, P. and Rana, O. F. 2016. Sensing real-world events using Arabic Twitter posts. Presented at: International AAAI Conference on Web and Social Media (ICWSM), Cologne, Germany, 17-20 May 2016Proceedings of the Tenth International AAAI Conference on Web and Social Media (ICWSM 2016). AAAI pp. 515-518.
- Alsaedi, N., Burnap, P. and Rana, O. F. 2016. Automatic summarization of real world events using Twitter. Presented at: International AAAI Conference on Web and Social Media (ICWSM), Cologne, Germany, 17-20 May 2016Proceedings of the Tenth International AAAI Confe. AAAI pp. 511-514.
- Burnap, P., Colombo, G. and Scourfield, J. B. 2015. Machine classification and analysis of suicide-related communication on Twitter. Presented at: 26th ACM Conference on Hypertext & Social Media, Cyprus, 1-4 September 2015HT '15- Proceedings of the 26th ACM Conference on Hypertext & Social Media. Association for Computing Machinery pp. 75-84.
- Burnap, P., Javed, A., Rana, O. F. and Awan, M. 2015. Real-time classification of malicious URLs on Twitter using Machine Activity Data. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 25-27 August 20152015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). ACM pp. 970-977., (10.1145/2808797.2809281)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2015. Identifying disruptive events from social media to enhance situational awareness. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 24-27 August 2015ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM pp. 934-941., (10.1145/2808797.2808879)
- Williams, M. L. and Burnap, P. 2015. Combating cyber-hate on social media throughcounter-speech. Presented at: Symposium on Anti-Muslim Hate Crime, University of Cambridge, Cambridge, UK, 16 June 2015.
- Burnap, P. and Williams, M. L. 2015. Plenary: Computational & social security analytics using Big Data. Presented at: International Conference on Computational Social Science, Helsinki, Finland, 8-11 June 2015.
- Williams, M. L. and Burnap, P. 2015. Using big social data and real-time analytics to inform policy. Presented at: Policy-Making in the Big Data Era: Opportunities and Challenges, University of Cambridge, Cambridge, UK, 15-17 June 2015.
- Alsaedi, N. and Burnap, P. 2015. Arabic event detection in social media. Presented at: 16th International Conference on Intelligent Text Processing and Computational Linguistics, Cairo, Egypt, 14-20 April 2015 Presented at Gelbukh, A. ed.Computational Linguistics and Intelligent Text Processing: 16th International Conference, CICLing 2015, Cairo, Egypt, April 14-20, 2015, Proceedings, Part I, Vol. 9041. Lecture Notes in Computer Science Springer Verlag pp. 384-401., (10.1007/978-3-319-18111-0_29)
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: an application of machine classification and statistical modeling for policy and decision making. Presented at: ICWSM Workshop on Religion and Social Media, University of Oxford, Oxford, UK, 26 May 2015.
- Williams, M. L. and Burnap, P. 2015. Cyber-hate on social media in the aftermath of Woolwich. Presented at: Government Hate Crime Seminar, London, UK, 11 March 2015.
- Williams, M. L. and Burnap, P. 2015. Economic and Social Research Council Trans-Atlantic Platform Workshop. Presented at: Digital Scholarship in the Social Sciences and Humanities: New Forms of Data for Research, Washington DC, USA, 28-29 Jan 2015.
- Awan, M. S. K., AlGhamdi, M., AlMotiri, S., Burnap, P. and Rana, O. F. 2015. A classification framework for distinct cyber-attacks based on occurrence patterns. Presented at: The 9th International Conference on Security of Information and Networks, Soch, Russia, 8-10 September 2015Proceedings of the 8th International Conference on Security of Information and Networks. ACM pp. 165-168., (10.1145/2799979.2800037)
- Awan, M. S., Burnap, P. and Rana, O. F. 2015. Estimating risk boundaries for persistent and stealthy cyber-attacks. Presented at: 22nd ACM Conference on Computer and Communications Security, Denver Colorado, USA, 12-16 October 2015SafeConfig '15 Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense. ACM pp. 15-20., (10.1145/2809826.2809830)
- Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Hugh, S. and Kristan, S. 2015. A cyber forensic taxonomy for SCADA systems in critical infrastructure. Presented at: The 10th International Conference on Critical Information Infrastructures Security 2015 (CRITIS 2015), Berlin, Germany, 5-7 October 2015.
- Eden, P., Blyth, A., Burnap, P., Jones, K. and Stoddart, K. 2015. A forensic taxonomy of SCADA systems and approach to incident response. Presented at: The 3rd International Symposium for ICS and SCADA Cyber Security Research 2015 (ICS-CSR 2015), Ingolstadt, Germany, 17 - 18 September 2015. , (10.14236/ewic/ICS2015.5)
- Awan, M. S. K., Burnap, P., Rana, O. F. and Javed, A. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC, New York City, NY, USA, 24-26 August 2015High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE pp. 1442-1447., (10.1109/HPCC-CSS-ICESS.2015.224)
- Awan, M., Burnap, P. and Rana, O. F. 2015. An empirical risk management framework for monitoring network security. Presented at: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM),, Liverpool, UK, 26-28 October 2015Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on. IEEE pp. 1764-1771., (10.1109/CIT/IUCC/DASC/PICOM.2015.266)
- Rahulamathavan, Y., Rajarajan, M., Rana, O. F., Awan, M., Burnap, P. and Das, S. K. 2015. Assessing data breach risk in cloud systems. Presented at: 7th International Conference on Cloud Computing Technology and Science (CloudCom), Vancouver, BC, Canada, 30 Nov-3 Dec 20152015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE pp. 363-370., (10.1109/CloudCom.2015.58)
- Williams, M. and Burnap, P. L. 2014. Human security analytics. Presented at: Web Science Trust Web Science Summer School, National University of Singapore, Singapore, Malaysia, 8-12 December 2014.
- Burnap, P. and Williams, M. L. 2014. Big social data analysis panel. Presented at: Web Science Trust Web Science Summer School, National University of Singapore, Singapore, Malaysia, 8-12 December 2014.
- Williams, M. L. and Burnap, P. 2014. Hate speech, tension monitoring and social media. Presented at: Wales Hate Crime Criminal Justice Board, Cardiff, Wales, 23 July 2014. pp. -.
- Sloan, L., Williams, M. L. and Burnap, P. 2014. Deriving demographic variables from twitter data. Presented at: Office for National Statistics Big Data Project Workshop, Titchfield, England, 21 July 2014. pp. -.
- Burnap, P., Rana, O. F., Pauran, N. and Bowen, P. J. 2014. Towards real-time probabilistic risk assessment by sensing disruptive events from streamed news feeds. Presented at: 8th IEEE International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2014), Birmingham City University, Birmingham, UK., 2-4 July 2014. pp. -.
- Alsaedi, N., Burnap, P. and Rana, O. F. 2014. A combined classification-clustering framework for identifying disruptive events. Presented at: ASE SocialCom Conference, Stanford University, CA., USA, May 27-21 2014.
- Burnap, P. and Williams, M. L. 2014. Hate speech, machine classification and statistical modelling of information flows on Twitter: interpretation and communication for policy decision making. Presented at: Internet, Policy & Politics, Oxford, UK, 26 September 2014.
- Rahulamathavan, Y., Pawar, P. S., Burnap, P., Rajarajan, M., Rana, O. F. and Spanoudakis, G. 2014. Analysing security requirements in cloud-based service level agreements. Presented at: SIN '14 The 7th International Conference on Security of Information and Networks, Glasgow, 9 - 11 September 2014Proceedings of the 7th International Conference on Security of Information and Networks. New York, NY: ACM pp. 73-77., (10.1145/2659651.2659735)
- Conejero, J., Rana, O. F., Burnap, P., Morgan, J., Carrion, C. and Caminero, B. 2013. Characterising the power consumption of Hadoop Clouds: A social media analysis case study. Presented at: CLOSER 2013: 3rd International Conference on Cloud Computing and Services Science, Aachen, Germany, 8-10 May 2013. , (10.5220/0004373502330243)
- Conejero, J., Burnap, P., Rana, O. F. and Morgan, J. 2013. Scaling archived social media data analysis using a hadoop cloud. Presented at: IEEE 6th International Conference on Cloud Computing (CLOUD), Santa Clara, CA, USA, 27 June - 2 July 2013. IEEE
- Williams, M. L., Procter, R., Housley, W., Edwards, A. M., Burnap, P., Sloan, L. and Voss, A. 2013. Collaborative online social media observatory. Presented at: COSMOS Launch, London, England, 2013.
- Housley, W., Williams, M. L., Burnap, P. and Procter, R. 2013. COSMOS: theory, method and data. Presented at: Centre for Interdisciplinary Methodologies, University of Warwick, Warwick, UK, 2013.
- Sloan, L., Rob, P., Williams, M. L., Housley, W., Edwards, A. M., Burnap, P. and Rana, O. F. 2013. The Collaborative Online Social Media Observatory. Presented at: ESRC Seminar Series: New Social Media, New Social Science? Blurring the Boundaries: One Year On, London, UK, 2013.
- Sloan, L., Williams, M. L., Burnap, P., Housley, W., Edwards, A. M. and Rana, O. F. 2013. Using social media with survey data. Presented at: ESRC Seminar Series: New Social Media, New Social Science?, London, UK, 2013.
- Burnap, P. et al. 2013. Collaborative online social media observatory. Presented at: Web Observatory Launch, Royal Society, London, UK, 2013.
- Rob, P. et al. 2013. Enabling social media research through citizen social science. Presented at: 13th European Conference on Computer Supported Cooperative Work, Paphos, Cyprus, 21-25 September 2013.
- Burnap, P., Williams, M. L., Housley, W., Edwards, A. M., Sloan, L. and Rana, O. F. 2013. Detecting tension in social media. Presented at: Third International Conference on Social Computing and its Applications, Karlsruhe, Germany, 30 Sept - 2 Oct 2013.
- Burnap, P., Spasic, I., Gray, W. A., Hilton, J. C., Rana, O. F. and Elwyn, G. 2012. Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information. Presented at: 2012 International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, USA, 21-25 May 2012 Presented at Smari, W. W. and Charles, F. eds.2012 International Conference on Collaboration Technologies and Systems (CTS), Vol. 14. Los Alamitos, CA: IEEE pp. 490-497., (10.1109/CTS.2012.6261095)
- Williams, M. L., Housley, W., Edwards, A. M., Burnap, P., Rana, O. F. and Avis, N. 2012. Computational and transformational social science. Presented at: Digital Social Research Experts Meeting, Keble College, University of Oxford, Oxford, UK, 2012.
- Housley, W., Edwards, A. M., Williams, M. L., Burnap, P., Rana, O. F. and Avis, N. 2012. Supporting empirical digital social research for the social sciences. Presented at: Digital Research 2012 Conference, St Catherines College, University of Oxford, Oxford, UK, 2012.
- Williams, M. L., Burnap, P., Housley, W., Edwards, A. M., Rana, O. F. and Avis, N. 2012. Treating social media as data: computational sociological Methods, data analysis and the Cardiff online social media Observatory. Presented at: NCRM, Research Methods Festival, St Catherine's College, University of Oxford, Oxford, UK, 2012.
- Williams, M. D., Housley, W., Edwards, A. M., Williams, M. L., Burnap, P., Rana, O. F. and Avis, N. 2012. Computational social science and methodological innovation: surrogacy, augmentation or reorientation. Presented at: ESRC Seminar Series: Blurring the boundaries: New social media, new social science?, London, UK, 2012.
- Edwards, A. M., Williams, M. L., Housley, W., Burnap, P., Rana, O. F. and Avis, N. 2012. Mining tension and cohesion using the Cardiff Online Social Media Observatory. Presented at: NCRM, Research Methods Festival,St Catherine's College, University of Oxford, Oxford, UK, 2012.
- Alsalamah, S., Hilton, J. C. and Burnap, P. 2010. Towards information sharing in virtual organisations: The development of an icon-based information control model. Presented at: The UK All Hands Meeting (AHM), Cardiff, UK, 13- 16 September 2010.
- Burnap, P. and Hilton, J. C. 2009. Self protecting data for de-perimeterised information sharing. Presented at: Third International Conference on Digital Society ICDS '09, Cancun, Mexico, 1-7 February 2009Digital Society, 2009. ICDS '09. Third International Conference on. IEEE pp. 65-70., (10.1109/ICDS.2009.41)
- Burnap, P. and Hilton, J. C. 2008. Information assurance for collaborative working in deperimeterised environments. Presented at: UK e-Science All Hands Meeting, Edinburgh, UK, 8-11 September 2008.
- Pahwa, J. S., Burnap, P., Gray, W. A. and Miles, J. C. 2006. MDSSF- A federated architecture for product procurement. Presented at: 17th International Conference on Database and Expert Systems Applications (DEXA '06), Krakov, Poland.
- Burnap, P. et al. 2005. Worldwide messaging support for high performance real-time collaboration. Presented at: 4th UK e-Science Programme All Hands Meeting, Nottingham, UK, 19-22 September 2005 Presented at Cox, S. J. and Walker, D. W. eds.Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC pp. 395.
- Burnap, P., Gray, W. A., Miles, J. C. and Rana, O. F. 2005. A service oriented infrastructure to facilitate trust in collaborative working. Presented at: 4th UK e-Science Programme All Hands Meeting, Nottingham, UK, 19-22 September 2005 Presented at Cox, S. J. and Walker, D. W. eds.Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC pp. 346.
- Rana, O. F., Hilton, J. C., Joita, L., Burnap, P., Pahwa, J. S., Miles, J. C. and Gray, W. A. 2005. Secure virtual organisations: Protocols and requirements. Presented at: Information Security Solutions Europe (ISSE) 2005 - The Independent European ICT Security Conference and Exhibition, Budapest, Hungary, 27-29 September 2005 Presented at Paulus, S., Pohlmann, N. and Reimer, H. eds.ISSE 2005 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2005 Conference. Berlin: Springer pp. 422-432.
- Joita, L., Pahwa, J. S., Burnap, P., Gray, W. A., Rana, O. F. and Miles, J. C. 2004. Supporting collaborative virtual organisations in the construction industry via the grid. Presented at: UK e-Science all Hands Meeting (AHM2004), Nottingham, UK, 31 August - 3 September 2004 Presented at Cox, S. J. ed.Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC
- Joita, L., Rana, O., Burnap, P., Pahwa, J. S., Gray, W. A. and Miles, J. C. 2004. A grid-enabled security framework for collaborative virtual organisations. Presented at: 5th IFIP Working Conference on Virtual Enterprises (PRO-VE), Toulouse, France, 22-27 August 2004.
- Miles, J. C., Joita, L., Pahwa, J. S., Burnap, P., Gray, W. A. and Rana, O. F. 2004. Collaborative engineering Virtual Teams in a Grid Environment Supporting Consortia in the Construction Industry. Presented at: 10th International Conference on Computing in Civil and Building Engineering (ICCCBE), Weimar, Germany, 2-4 June 2004.
- Pahwa, J. S., Burnap, P., Joita, L., Gray, W. A., Rana, O. F. and Miles, J. C. 2004. Creating a virtual distributed database - data definition and search model for collaborative virtual teams in the construction industry. Presented at: Proceedings 21st Annual British National Conference on Databases (BNCOD2004), Edinburgh, UK.
- Burnap, P., Joita, L., Pahwa, J. S., Gray, W. A., Rana, O. F. and Miles, J. C. 2004. Security user and data management for collaborative virtual teams in a grid environment supporting consortia in the construction industry. Presented at: Proceedings of the Workshop on Requirements Capture for Collaboration in e-Science, Edinburgh, UK. pp. 54-60.
- Joita, L., Rana, O. F., Burnap, P., Pahwa, J. S., Gray, W. A. and Miles, J. C. 2004. A grid enabled security framework for collaborative virtual organisations. Presented at: Proceedings of Virtual Enterprises and Collaborative Networks IFIP 18th World Computer congressTC5/WG5.5 5th Working Conference on Virtual Enterprises, Toulouse, UK. pp. 22-27.
Monographs
- Burnap, P., Gibson, R., Sloan, L., Southern, R. and Williams, M. L. 2015. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Working paper. Cardiff University.
- Burnap, P. et al. 2012. Working paper 153: social media analysis, Twitter and the London Olympics 2012 [working paper]. Working paper. Cardiff: School of Social Sciences, Cardiff University. Available at: http://www.cardiff.ac.uk/socsi/resources/Working%20Paper%20153%20-%20Burnap%20et%20al.%20(2013)%20Social%20Media%20Analysis,%20Twitter%20and%20the%20London%20Olympics%202012%20-%20A%20Research%20Note.pdf
- Burnap, P. et al. 2012. Social media analysis, Twitter and the London Olympics (a research note). Working paper. Cardiff: Cardiff University.
Thesis
- Burnap, P. 2009. Advanced access control in support and distributed collaborative working and de-perimeterization. PhD Thesis, Cardiff University.
Websites
- Procter, R., Webb, H., Jirotka, M., Burnap, P., Housley, W., Edwards, A. and Williams, M. 2019. A study of cyber hate on Twitter with implications for social media governance strategies. [Online]. arXiv. Available at: https://arxiv.org/abs/1908.11732
Research
To date I have been involved in more than 33 research grants, amounting to over £23 million (FEC), with over £10m of this coming to Cardiff University. Funding has been secured from a variety of sources including UKRI (EPSRC/ESRC/InnovateUK), JISC, US Department of Justice, UK DoH, and industry partners (e.g. Airbus, Admiral). I was/am currently Principal Investigator on 16 of these grants (including a £1.8m EPSRC grant on secure ‘Factories of the Future’).
Selected grants include:
Cyber Range and Immersive Cyber Attack Environment (research infrastructure)
* Funded by HEFCW
* £1,272,000 (Burnap)
Demystifying AI for Cybersecurity
* Funded by InnovateUK (/w Airbus)
* £394,784 (Burnap)
PETRAS 2
* Funded by EPSRC
* £290,291 to CU (Burnap, Perera et al.)
Academic Centre of Excellence in Cyber Security Research (ACE-CSR)
* Funded by EPSRC
* £64,989 (Burnap)
PACE: Privacy-aware cloud ecosystems
* Funded by EPSRC
* £757,817 (Rana, Theodorakopoulos, Burnap)
Data innovation accelerator
* Funded by ERDF
* £3,553,220 (funded at 52%) (Burnap & Whitaker).
How Online Technologies are Transforming Transnational Organised Crime (Cyber-TNOC)
* Funded by ESRC.
* £352,862 (Levi, Giommoni, Williams, Burnap)
Hate crime after Brexit: Linking terrestrial and new forms of data to inform governance
* Funded by ESRC
* £253,041 (Williams, Burnap, Sloan)
New Industrial Systems: Chatty Factories
* Funded by EPSRC
* £1,805,111 (Burnap, Murray-Rust, Richards, Preston, Branson)
Identifying Attack Vectors for Network Intrusion via IoT devices Developing a Goal-Oriented Approach to Determining Impact Across Threat Surfaces (IoT Depends)
* Funded by EPSRC PETRAS Hub
* £136,205 (Burnap)
SCADA Cyber Security Lifecycle (SCADA-CSL) 2
* Funded by Foundation Wales – Welsh Government and Airbus Innovations.
* £760,000 (Burnap, Cherdantseva and Theodorakopolous)
Centre for Cyberhate Research & Policy: Real-Time Scalable Methods & Infrastructure for Modelling the Spread of Cyberhate on Social Media
* Funded by ESRC
* £781,243 (Williams & Burnap)
Social Data Science Lab – Methods and Infrastructure Development for Open Data Analytics in Social Research
* Funded by ESRC
* £705.050 (Burnap, Williams, Sloan & Rana)
Understanding Online Hate Speech as a Motivator for Hate Crime
* Funded by National Institute for Justice, US Department of Justice
* £683,152 (Williams & Burnap in partnership with Rand US & Europe)
Event Detection using Open Source Communications
* Funded by Endeavr Wales
* £973,760 (Burnap & Williams in partnership with Airbus Endeavor Wales)
SCADA Cyber Security Lifecycle (SCADA-CSL)
* Funded by Foundation Wales – Welsh Government and Airbus Innovations
* £1,250,000 (Jones, Burnap, Blyth & Stoddart)
Identifying and Modelling Victim, Business, Regulatory and Malware Behaviours in a Changing Cyberthreat Landscape
* Funded by EPSRC under the Global Uncertainties Consortia for Exploratory Research in Security (CEReS) call
* £1,200,000 (Rana, Burnap, Williams, Levi, Matthews, Clarke, Furnell, Ganis, Rajarajan & Wall)
Improving Driver Risk Modeling with Big Data Analytics
* Knowledge Transfer Partnership with Admiral Insurance
* £378,648 (Burnap)
Investigating the link between social media activity and reporting crime
* Funded by Metropolitan Police Service Centre for Scientific and Engineering Excellence
* £49,950 (Burnap & Williams)
Estimating the Propagation of Anti-Semitic Content on Twitter
* Funded by Community Security Trust and the Lewis Trust Group
* £35,000 (Williams & Burnap)
Impact Acceleration Award – Embedding Open Source Intelligence Analytics within the Metropolitan Police Service
* Funded by ESRC
* £25,000 (Burnap, Williams, Rana & Sloan)
Evaluating the Utility of Social Media Analytics for International Development
* Funded by Department for International Development
* £7,500 (Williams & Burnap)
Impact Acceleration Award – Assessing the Market Interest in Big Social Data Analytics
* Funded by EPSRC
* £7,500 (Burnap, Williams, Rana & Sloan)
Digital Wildfire: (Mis)information flows, propagation and responsible governance
* Funded by ESRC (Global Uncertainties)
* £196,333 (Jirotka, Burnap, Williams, Rana, Procter, Housley, Edwards & Stahl)
Detecting Tension and Cohesion in Local Communities with Social Media
* Funded by Airbus Group
* £51,040 (Rana, Burnap, Sloan & Williams)
Social Media and Prediction: Crime Sensing, Data Integration & Statistical Modelling
* Funded by ESRC under the NCRM Methods Innovation Call
* £194,138 (Williams, Burnap, Sloan, Rana, Housley, Edwards, Procter & Voss)
Hate Speech and Social Media: Understanding Users, Networks and Information Flows
* Funded by ESRC and Google
* £124, 986 (Housley, Williams, Burnap, Edwards, Rana, Procter, Voss & Knight)
Digital Social Research Tools, Tension Indicators and Safer Communities: A Demonstration of COSMOS
* Funded by ESRC
* £97,506 (Williams, Rana, Avis, Housley, Edwards & Burnap)
The 2016 Welsh Election Study: A Study of the 2016 Election to the National Assembly for Wales
* Funded by ESRC
* £257,148 (Scully, Jones, Cutts, Sloan, Burnap & Williams)
Digital Social Research Tools, Tension Indicators and Safer Communities: A Demonstration of COSMOS
* Funded by ESRC
* £97,506 (Williams, Rana, Avis, Housley, Edwards & Burnap)
Public perceptions of the UK food system: public understanding and engagement, and the impact of crises and scares
* Funded by ESRC and the Food Standards Agency
* £291,200 (Roberts, Dowler, Draper, Sloan, Williams & Burnap)
Understanding the Role of Social Media in the Aftermath of Youth Suicides
* Funded Department of Health
* £200,000 (Scourfield, Burnap, Williams, Housley & Edwards)
Scaling the Computational Analysis of “Big Social Data” & Massive Temporal Social Media Datasets
* Funded by High Performance Computing Wales
* £45,000 (Burnap, Rana, Sloan & Williams)
Small items of research equipment at Cardiff University
* Funded by EPSRC
* £620,000 (Burnap)
Supporting Empirical Digital Social Research for the Social Sciences with a Virtual Research Environment
* Funded by JISC
* £55,519 (Burnap, Williams, Housley, Rana, Edwards & Avis)
Requirements Analysis for Social Media Analysis Research Tools
* Funded by ESRC
* £5,000 (Burnap, Rana, Avis, Williams, Housley & Edwards)
Sensing Data from the Web to Inform Probabilistic Risk Models. Funded by Welsh European Funding Office (Part of the Smart Operation for a Low Carbon Energy Region (SOLCER) project). £50,000
miConsent: Patient Controlled Access to Distributed Medical Records.
Funded by Technology Strategy Board with Abies Ltd and IMS Maxims. £54,000
Supervisions
Current supervision
Miah Thompson
Research student
Sanyam Vyas
Research student
Vasilis Ieropoulos
Research student
Iryna Bernyk
Research student