Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Arief, Budi
add a person with the name Arief, Budi
 

Other publications of authors with the same name

Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors., , and . APF, volume 8319 of Lecture Notes in Computer Science, page 203-214. Springer, (2012)Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse., , , and . WPES, page 201-204. ACM, (2014)On Developing Open Mobile Fault Tolerant Agent Systems., , and . SELMAS, volume 4408 of Lecture Notes in Computer Science, page 21-40. Springer, (2006)Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1-Attackers., , and . IEEE Security & Privacy, 13 (1): 71-76 (2015)A Roadmap for Improving the Impact of Anti-ransomware Research., , , , and . NordSec, volume 11875 of Lecture Notes in Computer Science, page 137-154. Springer, (2019)Using Eyetracker to Find Ways to Mitigate Ransomware., , , and . ICISSP, page 448-456. SCITEPRESS, (2020)Security Analysis of Contiki IoT Operating System., , and . EWSN, page 278-283. Junction Publishing, Canada/ ACM, (2018)Investigating the impact of ransomware splash screens., , , and . J. Inf. Secur. Appl., (2021)On the Effectiveness of Ransomware Decryption Tools., , , and . Comput. Secur., (2021)Why Current Statistical Approaches to Ransomware Detection Fail., , and . ISC, volume 12472 of Lecture Notes in Computer Science, page 199-216. Springer, (2020)