Budi Arief

ORCID: 0000-0002-1830-1587
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Cybercrime and Law Enforcement Studies
  • Information and Cyber Security
  • Network Security and Intrusion Detection
  • User Authentication and Security Systems
  • Spam and Phishing Detection
  • Privacy, Security, and Data Protection
  • Software Engineering Research
  • Digital and Cyber Forensics
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Authentication Protocols Security
  • Cybersecurity and Cyber Warfare Studies
  • Service-Oriented Architecture and Web Services
  • Privacy-Preserving Technologies in Data
  • Distributed systems and fault tolerance
  • Mobile Agent-Based Network Management
  • Open Source Software Innovations
  • Video Surveillance and Tracking Methods
  • Stalking, Cyberstalking, and Harassment
  • Advanced Software Engineering Methodologies
  • Anomaly Detection Techniques and Applications
  • Sexuality, Behavior, and Technology
  • Urban Transport Systems Analysis
  • Energy Efficient Wireless Sensor Networks
  • Bluetooth and Wireless Communication Technologies

University of Kent
2017-2025

Pakuan University
2021-2024

Universitas Islam Nusantara
2024

Institut Bisnis Nusantara
2024

Newcastle University
2004-2015

Institution of Engineering and Technology
2006

Ransomware incidents have increased dramatically in the past few years. The number of ransomware variants is also increasing, which means signature and heuristic-based detection techniques are becoming harder to achieve, due ever changing pattern attack vectors. Therefore, order combat ransomware, we need a better understanding on how being deployed, its characteristics, as well potential victims may react incidents. This paper aims address this challenge by carrying out an investigation 18...

10.1186/s40163-019-0097-9 article EN cc-by Crime Science 2019-02-12

Many software development methodologies are called "open source." However simply stating that a project is open source doesn't precisely describe the approach used to support project. A multidisciplinary viewpoint can help determine those characteristics common projects and vary among projects. These form basis for taxonomy of that's useful analyzing setting up They also provide starting point understanding what source" means.

10.1109/ms.2004.1259206 article EN IEEE Software 2004-01-01

10.1016/j.cose.2003.09.002 article EN Computers & Security 2004-02-27

Dekarbonisasi angkutan barang di Indonesia penuh dengan tantangan dan peluang untuk mencapai tujuan perkembangan berkelanjutan yang sejalan visi emas 2045. Salah satu sektor penting dalam ekonomi adalah perpindahan barang, dimana saat ini didominasi oleh ketergantungan akan sistem berbahan fosil signifikan berkontribusi terhadap gas emisi karbon dioksida (CO2). Penelitian bertujuan menjelaskan transportasi rendah didapatkan menerapkan dekarbonisasi pada barang. Kajian literatur digunakan...

10.62603/konteks.v2i6.262 article ID other-oa Deleted Journal 2025-01-08

This study examines ransomware crime through the lens of neutralisation theory, and explores techniques used by alleged offenders to justify their involvement in attacks. work focuses on highly organised groups that not only conduct attacks but also operate as Ransomware-as-a-Service businesses. The interview data ( n = 9) this research were collected several media cyber security companies. Drawing Kaptein Van Helvoort model techniques, we discovered interviewees – reported distorted facts...

10.1177/14773708251320464 article EN European Journal of Criminology 2025-03-19

10.1007/s10207-025-01015-1 article EN cc-by International Journal of Information Security 2025-04-03

The prevalence and significance of web services in our daily lives make it imperative to ensure that they are – as much possible free from vulnerabilities. However, developing a complex piece software any security vulnerabilities is hard, if not impossible. One way progress towards achieving this holy grail by using static code analysis tools root out common or known may accidentally be introduced during the development process. Static have significantly contributed addressing problem above,...

10.1145/3590777.3590780 article EN cc-by-nd 2023-05-27

In this paper we present an attack, which allows fraudulent transactions to be collected from EMV contactless credit and debit cards without the knowledge of cardholder. The attack exploits a previously unreported vulnerability in protocol, approve unlimited value cardholder's PIN when transaction is carried out foreign currency. For example, have found that Visa will currency for any amount up ∈999,999.99 PIN, side-steps £20 limit UK. This outlines our analysis methodology identified flaw...

10.1145/2660267.2660312 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2014-11-03

An extensive study of the current practice online payment using credit and debit cards reveals intrinsic security challenges caused by differences in how sites operate.In this article, we present landscape detail. In particular, aim to highlight different manners which is performed varying measures put place merchants-from checking only card number expiry date fully fledged centralized bank mechanisms such as 3D Secure.

10.1109/msp.2017.27 article EN IEEE Security & Privacy 2017-03-01

Although cybercrime is rampant, there no authoritative definition of the term and all that it implies. A comprehensive model taxonomy cybercrime, including its stakeholders, would contribute to better cybersecurity. Part one this two-part series explores attackers their motives in detail.

10.1109/msp.2015.19 article EN IEEE Security & Privacy 2015-01-01

The popularity of the Internet Things (IoT) devices makes it increasingly important to be able fingerprint them, for example in order detect if there are misbehaving or even malicious IoT one's network. However, many challenges faced task fingerprinting devices, mainly due huge variety involved. At same time, can potentially improved by applying machine learning techniques better accuracy and efficiency. aim this paper is provide a systematic categorisation augmented that used devices. This...

10.1145/3417313.3429384 article EN 2020-11-05

Ransomware remains one of the most prevalent cyberthreats to individuals and businesses alike. Psychological techniques are often employed by attackers when infecting victims’ devices with ransomware in an attempt increase likelihood victims paying ransom demand. At same time, cybersecurity researchers continually putting effort find new ways prevent infections victimisation from happening. Since employees contractors considered be frequent well-known attack vectors, it makes sense focus on...

10.1145/3568994 article EN Digital Threats Research and Practice 2022-10-26

Privacy is a concept with real life ties and implications. infringement has the potential to lead serious consequences for stakeholders involved, hence researchers organisations have developed various privacy enhancing techniques tools. However, there no solution that fits all, are instances where solutions could be misused, example hide nefarious activities. Therefore, it important provide suitable measures make necessary design tradeoffs in order avoid such misuse. This short paper aims...

10.1145/2665943.2665965 article EN 2014-11-03

C yberattacks are increasingly threatening the safety of cyberspace, as underscored by recent attacks on Sony Pictures, Anthem, and Home Depot, to name just a few.Although most tangible consequence attack was leak confidential information, ranging from embarrassing email exchanges between executives copies unreleased films, 1 it more than data breach.Many stakeholders were affected, individual level organizational even international level, with resulting strain US North Korea.More...

10.1109/msp.2015.44 article EN IEEE Security & Privacy 2015-03-01

In this paper, we present the concept of "Ben-ware" as a beneficial software system capable identifying anomalous human behaviour within 'closed' organisation's IT infrastructure. We note that may be malicious (for example, an employee is seeking to act against best interest organisation by stealing confidential information) or benign applying some workaround complete their job). To help distinguish between users who are intentionally and those benign, use modelling along with Artificial...

10.1145/2808783.2808785 article EN 2015-10-06

Dalam rangka mewujudkan cita-cita Indonesia menjadi negara maju, pembangunan Ibu Kota
 Nusantara (IKN) siap tonggak penting yang selaras dengan Visi Emas 2045. pintar salah satu kluster pendukung IKN sebagai pusat dan inovasi di masa
 depan. Di masa ditandai pertumbuhan kota pesat, tantangan mobilitas menjadi
 perhatian utama bagi pemerintah. Kota erat hubungannya saling terkait
 karena keduanya berfokus pada perbaikan kualitas hidup dalam ruang lingkup perkotaan...

10.62603/konteks.v1i4.73 article ID Deleted Journal 2024-02-16

The paper introduces the Cama (Context-Aware Mobile Agents) framework intended for developing large-scale mobile applications using agent paradigm. provides a powerful set of abstractions, supporting middleware and an adaptation layer allowing developers to address main characteristics applications: openness, asynchronous anonymous communication, fault tolerance, device mobility. It ensures recursive system structuring location, scope, role abstractions. supports tolerance through exception...

10.1145/1138063.1138070 article EN 2006-05-22
Coming Soon ...