
Yr Athro Pete Burnap
Lecturer
Yr Ysgol Cyfrifiadureg a Gwybodeg
- Email:
- p.burnap@cs.cardiff.ac.uk
- Telephone:
- +44 (0)29 2087 6249
- Sylwebydd y cyfryngau
I am a Reader in Data Science & Cyber Analytics in the School of Computer Science & Informatics, and Social Computing research priority area lead in the Complex Systems research group. I have developed a reputation for data-driven, innovative, and interdisciplinary research that broadly contributes to the growing field of Data Science, working closely with the Cardiff School of Social Sciences and School of Engineering. I am an applied computer scientist with a principal focus on data and computational methods to improve understanding, operations and decision making outside of academia, while contributing to the academic fields of Social Computing, Web Science and Cybersecurity.
These three fields are integrated within my research through the analysis and understanding of Web-enabled human and software behaviour, with a particular interest in emerging and future risks posed to civil society, business (economies) and governments. I achieve this using computational methods such as machine learning and statistical data modelling, and interaction and behaviour mining, opinion mining and sentiment analysis to derive key features of interest.
My research outcomes, which include more than 60 academic articles – stemming from funded research projects worth over £7.2million, are organised and disseminated via two research units:
The Social Data Science Lab, within which I am a director and the computational lead. The Lab’s core funding comes from a £450k ESRC grant and it forms part of the £64m ‘Big Data Network’. Core funding runs between 2017 and 2020, during which time the Lab will host 6 post-doctoral researchers and 9 PhD students, all studying topics related to Risk, Safety & Human/Cybersecurity.
The Airbus Centre of Excellence in Cyber Security Analytics, within which I am the director. The centre works across industry, academia and government to provide a focus for cyber security analytics in the UK. Cyber security is a priority research area at Cardiff University, supported with strategic investment. Since 2012 we have established an interdisciplinary research team of technical and social researchers. Our collaborative projects have received more than £5m in funding from UK Research Councils (EPSRC, ESRC), Welsh Government (Endeavr Wales) and Industry (Airbus).
ACM Keywords: Security and Protection; Human-centered computing; Modeling structured, textual and multimedia data; Data mining; Machine learning
Education and qualifications
- 2010: PhD (Cyber Security in Collaborative Distributed Systems), Cardiff University
- 2002: BSc Computer Science. Cardiff University
Career overview
- 2017 - present: Reader, Cardiff School of Computer Science & Informatics
- 2016 - 2017: Senior Lecturer, Cardiff School of Computer Science & Informatics
- 2012 - 2016: Lecturer, Cardiff School of Computer Science & Informatics
Anrhydeddau a Dyfarniadau
- Lloyds Science of Risk Prize Runner Up, 2015
2019
- Anthi, E.et al. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things 6(5), pp. 9042-9053. (10.1109/JIOT.2019.2926365)
- Nunes, M.et al. 2019. Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis. Journal of Information Security and Applications 48, article number: 102365. (10.1016/j.jisa.2019.102365)
- Williams, M. L.et al. 2019. Hate in the machine: Anti-black and anti-Muslim social media posts as predictors of offline racially and religiously aggravated crime. British Journal of Criminology (10.1093/bjc/azz049)
- Liu, H.et al. 2019. Fuzzy multi-task learning for hate speech type identification. Presented at: The Web Conference 2019, San Francisco, CA, USA, 13-17 May 2019WWW '19 The World Wide Web Conference. ACM pp. 3006-3012., (10.1145/3308558.3313546)
- Javed, A., Burnap, P. and Rana, O. F. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56(3), pp. 1133-1145. (10.1016/j.ipm.2018.02.003)
- Liu, H.et al. 2019. A fuzzy approach to text classification with two stage training for ambiguous instances. IEEE Transactions on Computational Social Systems 6(2), pp. 227-240. (10.1109/TCSS.2019.2892037)
- Williams, M. L.et al. 2019. Under the corporate radar: Examining insider business cybercrime victimization through an application of routine activities theory. Deviant Behavior 40(9), pp. 1119-1131. (10.1080/01639625.2018.1461786)
- Scourfield, J.et al. 2019. The number and characteristics of newspaper and Twitter reports on suicides and road traffic deaths in young people. Archives of Suicide Research 23(3), pp. 507-522. (10.1080/13811118.2018.1479321)
- Al Baghal, T.et al. 2019. Linking Twitter and survey data: The impact of survey mode and demographics on consent rates across three UK studies. Social Science Computer Review (10.1177/0894439319828011)
- Scourfield, J.et al. 2019. Are youth suicide memorial sites on Facebook different from those for other sudden deaths?. Death Studies (10.1080/07481187.2019.1614109)
- Burnap, P.et al. 2019. Chatty factories: a vision for the future of product design and manufacture with IoT. Presented at: Living in the Internet of Things (IoT 2019), London, UK, 1-2 May 2019Living in the Internet of Things (IoT 2019). IET pp. 4 (6 pp.)., (10.1049/cp.2019.0129)
- Aldmour, R., Burnap, P. and Lakoju, M. 2019. Risk assessment methods for converged IoT and SCADA systems: review and recommendations. Presented at: Living in the Internet of Things (IoT 2019), London, UK, 1-2 May 2019Living in the Internet of Things (IoT 2019). IET pp. 5-10., (10.1049/cp.2019.0130)
- Procter, R.et al. 2019. A study of cyber hate on twitter with implications for social media governance strategies. arxiv.org (Cornell University)
2018
- Alorainy, W.et al. 2018. Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample. Presented at: International Conference on Machine Learning and Cybernetics, Chengdu, China, 15-18 July 20182018 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE pp. 581-586., (10.1109/ICMLC.2018.8527001)
- Radanliev, P.et al. 2018. Future developments in cyber risk assessment for the internet of things. Computers in Industry 102, pp. 14-22. (10.1016/j.compind.2018.08.002)
- Anthi, E.et al. 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78, pp. 477-490. (10.1016/j.cose.2018.07.016)
- Rhode, M., Burnap, P. and Jones, K. 2018. Early-Stage malware prediction using recurrent neural networks. Computers and Security 77, pp. 578-594. (10.1016/j.cose.2018.05.010)
- Burnap, P.et al. 2018. Malware classification using self organising feature maps and machine activity data. Computers and Security 73, pp. 399-410. (10.1016/j.cose.2017.11.016)
- Housley, W.et al. 2018. Interaction and transformation on social media: the case of Twitter campaigns. Social Media and Society 4(1), pp. 1-12. (10.1177/2056305117750721)
- Alorainy, W.et al. 2018. ‘The enemy among us’: Detecting cyber hate speech with threats-based othering language embeddings. ACM Transactions on the Web 9(4), article number: 39.
2017
- Williams, M. L.et al. 2017. Users' view's of ethics in social media research: informed consent, anonymity and harm. In: Woodfield, K. ed. The Ethics of Online Research., Vol. 2. Advances in Research Ethics and Integrity Emerald Publishing, pp. 27-51., (10.1108/S2398-601820180000002002)
- Williams, M. L., Burnap, P. and Sloan, L. 2017. Towards an ethical framework for publishing Twitter data in social research: taking into account users’ views, online context and algorithmic estimation. Sociology 51(6), pp. 1149-1168. (10.1177/0038038517708140)
- Thomas, L.et al. 2017. Automation of the supplier role in the GB power system using blockchain based smart contracts. CIRED - Open Access Proceedings Journal 2017(1), pp. 2619-2623. (10.1049/oap-cired.2017.0987)
- Burnap, P.et al. 2017. Multi-class machine classification of suicide-related communication on Twitter. Online Social Networks and Media 2, pp. 32-44. (10.1016/j.osnem.2017.08.001)
- Baylis, R.et al. 2017. Private lenders' demand for audit. Journal of Accounting and Economics 64(1), pp. 78-97. (10.1016/j.jacceco.2017.06.001)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2017. Can we predict a riot? Disruptive event detection using Twitter. ACM Transactions on Internet Technology 17(2), article number: 18. (10.1145/2996183)
- Eden, P.et al. 2017. SCADA system forensic analysis within IIoT. In: Thames, L. and Schaefer, D. eds. Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing.. Springer Series in Advanced Manufacturing, pp. 73-101., (10.1007/978-3-319-50660-9_4)
- Burnap, P.et al. 2017. Determining and sharing risk data in distributed interdependent systems. IEEE Computer 50(4), pp. 72-79. (10.1109/MC.2017.108)
- Williams, M. L., Burnap, P. and Sloan, L. 2017. Crime sensing with big data: the affordances and limitations of using open source communications to estimate crime patterns. British Journal of Criminology 57(2), pp. 320-340. (10.1093/bjc/azw031)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2017. Temporal TF-IDF: a high performance approach for event summarization in Twitter. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence, Omaha, Nebraska, USA, 13-16 October 20162016 IEEE/WIC/ACM International Conference on Web Intelligence. IEEE pp. 515-521., (10.1109/WI.2016.0087)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2017. Sensing real-world events using social media data and a classification-clustering framework. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence, Omaha, Nebraska, USA, 13-16 October 20162016 IEEE/WIC/ACM International Conference on Web Intelligence (WI). IEEE pp. 216-223., (10.1109/WI.2016.0039)
- Williams, M. L. and Burnap, P. 2017. Detecting crime events using social media. Presented at: Home Office Crime and Policing Analysis Unit Seminar Series, Westminster, London, UK, July, 2017. pp. -.
- Webb, H.et al. 2017. The ethical challenges of publishing Twitter data for research dissemination. Presented at: WebSci'17, Troy, NY, 25-28 June 2017Proceedings of the 2017 ACM on Web Science Conference. pp. 339-348., (10.1145/3091478.3091489)
- Williams, M. L. and Burnap, P. 2017. Social data science & criminology: machine classification and modelling of cyberhate in online social networks. Presented at: Cambridge Institute of Criminology Seminar Series, University of Cambridge, UK, 9 February 2017.
- Williams, M. and Burnap, P. 2017. Online extremism and hate speech: definition, measurement & regulation. Presented at: Internet Leadership Academy, Oxford Internet Institute, University of Oxford, UK, 26 September 2017.
- Burnap, P. and Williams, M. L. 2017. Classifying and modeling cyber hate speech: research and opportunities for practical intervention. Presented at: 1st International Conference on Cyber Deviance Detection (CyberDD) in conjunction with 10th ACM International Conference on Web Search and Data Mining (WSDM 2017), Cambridge, UK, 10 Feb 2017.
- Williams, M. L. and Burnap, P. 2017. Data science solutions for detecting and monitoring Brexit related online hate speech. Presented at: UK Government Data Science Community Interest Workshop, ONS Data Science Campus, Newport, Wales, UK, 4 September 2017.
2016
- Scourfield, J. B.et al. 2016. The response in Twitter to an assisted suicide in a television soap opera. Crisis: The Journal of Crisis Intervention and Suicide Prevention 37(5), pp. 392-395. (10.1027/0227-5910/a000377)
- Eden, P.et al. 2016. Forensic readiness for SCADA/ICS incident response. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research, Queen's University Belfast, Belfast, UK, 23-25 August 2016.
- Burnap, P. and Williams, M. L. 2016. Computational human and cyber security analytics for government and policy. Presented at: Data Science and Government Conference, Oxford, UK, 22 June 2016.
- Webb, H.et al. 2016. Digital wildfires: propagation, verification, regulation, and responsible innovation. ACM Transactions on Information Systems 34(3), article number: 15. (10.1145/2893478)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2016. Sensing real-world events using Arabic Twitter posts. Presented at: International AAAI Conference on Web and Social Media (ICWSM), Cologne, Germany, 17-20 May 2016Proceedings of the Tenth International AAAI Conference on Web and Social Media (ICWSM 2016). AAAI pp. 515-518.
- Alsaedi, N., Burnap, P. and Rana, O. F. 2016. Automatic summarization of real world events using Twitter. Presented at: International AAAI Conference on Web and Social Media (ICWSM), Cologne, Germany, 17-20 May 2016Proceedings of the Tenth International AAAI Confe. AAAI pp. 511-514.
- Awan, M. S. K., Burnap, P. and Rana, O. F. 2016. Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. Computers and Security 57, pp. 31-46. (10.1016/j.cose.2015.11.003)
- Burnap, P.et al. 2016. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Electoral Studies 41, pp. 230-233. (10.1016/j.electstud.2015.11.017)
- Williams, M. L. and Burnap, P. 2016. Cyberhate on social media in the aftermath of Woolwich: A case study in computational criminology and big data. British Journal of Criminology 56(2), pp. 211-238. (10.1093/bjc/azv059)
- Cherdantseva, Y.et al. 2016. A review of cyber security risk assessment methods for SCADA systems. Computers and Security 56, pp. 1-27. (10.1016/j.cose.2015.09.009)
- Conejero, J.et al. 2016. Analysing Hadoop power consumption and impact on application QoS. Future Generation Computer Systems 55, pp. 213-223. (10.1016/j.future.2015.03.009)
- Burnap, P. and Williams, M. L. 2016. Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science 5, article number: 11. (10.1140/epjds/s13688-016-0072-6)
2015
- Burnap, P., Colombo, G. and Scourfield, J. B. 2015. Machine classification and analysis of suicide-related communication on Twitter. Presented at: 26th ACM Conference on Hypertext & Social Media, Cyprus, 1-4 September 2015HT '15- Proceedings of the 26th ACM Conference on Hypertext & Social Media. Association for Computing Machinery pp. 75-84.
- Webb, H.et al. 2015. Digital wildfires: hyper-connectivity, havoc, and a global ethos to govern social media. Computers and Society 45(3), pp. 193-201.
- Burnap, P.et al. 2015. Real-time classification of malicious URLs on Twitter using Machine Activity Data. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 25-27 August 2015. ACM
- Alsaedi, N., Burnap, P. and Rana, O. F. 2015. Identifying disruptive events from social media to enhance situational awareness. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 24-27 August 2015ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM pp. 934-941., (10.1145/2808797.2808879)
- Williams, M. L. and Burnap, P. 2015. Combating cyber-hate on social media throughcounter-speech. Presented at: Symposium on Anti-Muslim Hate Crime, University of Cambridge, Cambridge, UK, 16 June 2015.
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7(2), pp. 223-242. (10.1002/poi3.85)
- Burnap, P. and Williams, M. L. 2015. Plenary: Computational & social security analytics using Big Data. Presented at: International Conference on Computational Social Science, Helsinki, Finland, 8-11 June 2015.
- Williams, M. L. and Burnap, P. 2015. Using big social data and real-time analytics to inform policy. Presented at: Policy-Making in the Big Data Era: Opportunities and Challenges, University of Cambridge, Cambridge, UK, 15-17 June 2015.
- Burnap, P.et al. 2015. Detecting tension in online communities with computational Twitter analysis. Technological Forecasting & Social Change 95, pp. 96-108. (10.1016/j.techfore.2013.04.013)
- Alsaedi, N. and Burnap, P. 2015. Arabic event detection in social media. Presented at: 16th International Conference on Intelligent Text Processing and Computational Linguistics, Cairo, Egypt, 14-20 April 2015 Presented at Gelbukh, A. ed.Computational Linguistics and Intelligent Text Processing: 16th International Conference, CICLing 2015, Cairo, Egypt, April 14-20, 2015, Proceedings, Part I, Vol. 9041. Lecture Notes in Computer Science Springer Verlag pp. 384-401., (10.1007/978-3-319-18111-0_29)
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: an application of machine classification and statistical modeling for policy and decision making. Presented at: ICWSM Workshop on Religion and Social Media, University of Oxford, Oxford, UK, 26 May 2015.
- Williams, M. L. and Burnap, P. 2015. Cyber-hate on social media in the aftermath of Woolwich. Presented at: Government Hate Crime Seminar, London, UK, 11 March 2015.
- Colombo, G. B.et al. 2015. Analysing the connectivity and communication of suicidal users on Twitter. Computer Communications 73(B), pp. 291-300. (10.1016/j.comcom.2015.07.018)
- Williams, M. L. and Burnap, P. 2015. Economic and Social Research Council Trans-Atlantic Platform Workshop. Presented at: Digital Scholarship in the Social Sciences and Humanities: New Forms of Data for Research, Washington DC, USA, 28-29 Jan 2015.
- Awan, M., Burnap, P. and Rana, O. F. 2015. An empirical risk management framework for monitoring network security. Presented at: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM),, Liverpool, UK, 26-28 October 2015Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on. IEEE pp. 1764-1771., (10.1109/CIT/IUCC/DASC/PICOM.2015.266)
- Rahulamathavan, Y.et al. 2015. Assessing data breach risk in cloud systems. Presented at: 7th International Conference on Cloud Computing Technology and Science (CloudCom), Vancouver, BC, Canada, 30 Nov-3 Dec 20152015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE pp. 363-370., (10.1109/CloudCom.2015.58)
- Eden, P.et al. 2015. A cyber forensic taxonomy for SCADA systems in critical infrastructure. Presented at: The 10th International Conference on Critical Information Infrastructures Security 2015 (CRITIS 2015), Berlin, Germany, 5-7 October 2015.
- Eden, P.et al. 2015. A forensic taxonomy of SCADA systems and approach to incident response. Presented at: The 3rd International Symposium for ICS and SCADA Cyber Security Research 2015 (ICS-CSR 2015), Ingolstadt, Germany, 17 - 18 September 2015. , (10.14236/ewic/ICS2015.5)
- Awan, M. S. K.et al. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC, New York City, NY, USA, 24-26 August 2015High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE pp. 1442-1447., (10.1109/HPCC-CSS-ICESS.2015.224)
- Sloan, L.et al. 2015. Who tweets? Deriving the demographic characteristics of age, occupation and social class from Twitter user meta-data. Plos One 10(3), article number: e0115545. (10.1371/journal.pone.0115545)
- Burnap, P.et al. 2015. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Working paper. Cardiff University.
- Al Said, T., Rana, O. F. and Burnap, P. 2015. VMInformant: an instrumented virtual machine to support trustworthy cloud computing. International Journal of High Performance Computing and Networking 8(3), pp. 222-234., article number: IJHPCN080303. (10.1504/IJHPCN.2015.071257)
- Awan, M. S. K.et al. 2015. A classification framework for distinct cyber-attacks based on occurrence patterns. Presented at: The 9th International Conference on Security of Information and Networks, Soch, Russia, 8-10 September 2015Proceedings of the 8th International Conference on Security of Information and Networks. ACM pp. 165-168., (10.1145/2799979.2800037)
- Awan, M. S., Burnap, P. and Rana, O. F. 2015. Estimating risk boundaries for persistent and stealthy cyber-attacks. Presented at: 22nd ACM Conference on Computer and Communications Security, Denver Colorado, USA, 12-16 October 2015SafeConfig '15 Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense. ACM pp. 15-20., (10.1145/2809826.2809830)
- Burnap, P.et al. 2015. COSMOS: Towards an integrated and scalable service for analysing social media on demand. International Journal of Parallel, Emergent and Distributed Systems 30(2), pp. 80-100. (10.1080/17445760.2014.902057)
2014
- Williams, M. and Burnap, P. L. 2014. Human security analytics. Presented at: Web Science Trust Web Science Summer School, National University of Singapore, Singapore, Malaysia, 8-12 December 2014.
- Burnap, P. and Williams, M. L. 2014. Big social data analysis panel. Presented at: Web Science Trust Web Science Summer School, National University of Singapore, Singapore, Malaysia, 8-12 December 2014.
- Burnap, P.et al. 2014. Towards real-time probabilistic risk assessment by sensing disruptive events from streamed news feeds. Presented at: 8th IEEE International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2014), Birmingham City University, Birmingham, UK., 2-4 July 2014. pp. -.
- Williams, M. L. and Burnap, P. 2014. Hate speech, tension monitoring and social media. Presented at: Wales Hate Crime Criminal Justice Board, Cardiff, Wales, 23 July 2014. pp. -.
- Sloan, L., Williams, M. L. and Burnap, P. 2014. Deriving demographic variables from twitter data. Presented at: Office for National Statistics Big Data Project Workshop, Titchfield, England, 21 July 2014. pp. -.
- Burnap, P.et al. 2014. Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4, pp. 206. (10.1007/s13278-014-0206-4)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2014. A combined classification-clustering framework for identifying disruptive events. Presented at: ASE SocialCom Conference, Stanford University, CA., USA, May 27-21 2014.
- Rahulamathavan, Y.et al. 2014. Analysing security requirements in cloud-based service level agreements. Presented at: SIN '14 The 7th International Conference on Security of Information and Networks, Glasgow, 9 - 11 September 2014Proceedings of the 7th International Conference on Security of Information and Networks. New York, NY: ACM pp. 73-77., (10.1145/2659651.2659735)
- Housley, W.et al. 2014. Big and broad social data and the sociological imagination: a collaborative response. Big Data & Society 1(2) (10.1177/2053951714545135)
- Burnap, P. and Williams, M. L. 2014. Hate speech, machine classification and statistical modelling of information flows on Twitter: interpretation and communication for policy decision making. Presented at: Internet, Policy & Politics, Oxford, UK, 26 September 2014.
2013
- Sloan, L.et al. 2013. Knowing the Tweeters: Deriving sociologically relevant demographics from Twitter. Sociological Research Online 18(3), article number: 7. (10.5153/sro.3001)
- Conejero, J.et al. 2013. Characterising the power consumption of Hadoop Clouds: A social media analysis case study. Presented at: CLOSER 2013: 3rd International Conference on Cloud Computing and Services Science, Aachen, Germany, 8-10 May 2013. , (10.5220/0004373502330243)
- Burnap, P., Avis, N. J. and Rana, O. F. 2013. Making sense of self-reported socially significant data using computational methods. International Journal of Social Research Methodology 16(3), pp. 215-230. (10.1080/13645579.2013.774174)
- Williams, M. L.et al. 2013. Policing cyber-neighbourhoods: Tension monitoring and social media networks. Policing and Society 23(4), pp. 461-481. (10.1080/10439463.2013.780225)
- Conejero, J.et al. 2013. Scaling archived social media data analysis using a hadoop cloud. Presented at: IEEE 6th International Conference on Cloud Computing (CLOUD), Santa Clara, CA, USA, 27 June - 2 July 2013. IEEE
- Williams, M. L.et al. 2013. Collaborative online social media observatory. Presented at: COSMOS Launch, London, England, 2013.
- Housley, W.et al. 2013. COSMOS: theory, method and data. Presented at: Centre for Interdisciplinary Methodologies, University of Warwick, Warwick, UK, 2013.
- Sloan, L.et al. 2013. The Collaborative Online Social Media Observatory. Presented at: ESRC Seminar Series: New Social Media, New Social Science? Blurring the Boundaries: One Year On, London, UK, 2013.
- Sloan, L.et al. 2013. Using social media with survey data. Presented at: ESRC Seminar Series: New Social Media, New Social Science?, London, UK, 2013.
- Burnap, P.et al. 2013. Collaborative online social media observatory. Presented at: Web Observatory Launch, Royal Society, London, UK, 2013.
- Rob, P.et al. 2013. Enabling social media research through citizen social science. Presented at: 13th European Conference on Computer Supported Cooperative Work, Paphos, Cyprus, 21-25 September 2013.
- Burnap, P.et al. 2013. Detecting tension in social media. Presented at: Third International Conference on Social Computing and its Applications, Karlsruhe, Germany, 30 Sept - 2 Oct 2013.
2012
- Burnap, P.et al. 2012. Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information. Presented at: 2012 International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, USA, 21-25 May 2012 Presented at Smari, W. W. and Charles, F. eds.2012 International Conference on Collaboration Technologies and Systems (CTS), Vol. 14. Los Alamitos, CA: IEEE pp. 490-497., (10.1109/CTS.2012.6261095)
- Spasic, I.et al. 2012. A naïve Bayes approach to classifying topics in suicide notes. Biomedical Informatics Insights 5(Supp 1), pp. 87-97. (10.4137/BII.S8945)
- Burnap, P.et al. 2012. Social media analysis, Twitter and the London Olympics (a research note). Working paper. Cardiff: Cardiff University.
- Burnap, P.et al. 2012. Working paper 153: social media analysis, Twitter and the London Olympics 2012 [working paper]. Working paper. Cardiff: School of Social Sciences, Cardiff University. Available at: http://www.cardiff.ac.uk/socsi/resources/Working%20Paper%20153%20-%20Burnap%20et%20al.%20(2013)%20Social%20Media%20Analysis,%20Twitter%20and%20the%20London%20Olympics%202012%20-%20A%20Research%20Note.pdf
- Williams, M. D.et al. 2012. Computational social science and methodological innovation: surrogacy, augmentation or reorientation. Presented at: ESRC Seminar Series: Blurring the boundaries: New social media, new social science?, London, UK, 2012.
- Williams, M. L.et al. 2012. Computational and transformational social science. Presented at: Digital Social Research Experts Meeting, Keble College, University of Oxford, Oxford, UK, 2012.
- Housley, W.et al. 2012. Supporting empirical digital social research for the social sciences. Presented at: Digital Research 2012 Conference, St Catherines College, University of Oxford, Oxford, UK, 2012.
- Williams, M. L.et al. 2012. Treating social media as data: computational sociological Methods, data analysis and the Cardiff online social media Observatory. Presented at: NCRM, Research Methods Festival, St Catherine's College, University of Oxford, Oxford, UK, 2012.
- Edwards, A. M.et al. 2012. Mining tension and cohesion using the Cardiff Online Social Media Observatory. Presented at: NCRM, Research Methods Festival,St Catherine's College, University of Oxford, Oxford, UK, 2012.
2010
- Alsalamah, S., Hilton, J. C. and Burnap, P. 2010. Towards information sharing in virtual organisations: The development of an icon-based information control model. Presented at: The UK All Hands Meeting (AHM), Cardiff, UK, 13- 16 September 2010.
2009
- Burnap, P. and Hilton, J. C. 2009. Self protecting data for de-perimeterised information sharing. Presented at: Third International Conference on Digital Society ICDS '09, Cancun, Mexico, 1-7 February 2009Digital Society, 2009. ICDS '09. Third International Conference on. IEEE pp. 65-70., (10.1109/ICDS.2009.41)
2008
- Burnap, P. and Hilton, J. C. 2008. Information assurance for collaborative working in deperimeterised environments. Presented at: UK e-Science All Hands Meeting, Edinburgh, UK, 8-11 September 2008.
2006
- Gray, W. A.et al. 2006. MDSSF - A Federated Architecture for Product Procurement. Lecture Notes in Computer Science 4080, pp. 812-821. (10.1007/11827405_79)
- Pahwa, J. S.et al. 2006. MDSSF- A federated architecture for product procurement. Presented at: 17th International Conference on Database and Expert Systems Applications (DEXA '06), Krakov, Poland.
2005
- Burnap, P.et al. 2005. Worldwide messaging support for high performance real-time collaboration. Presented at: 4th UK e-Science Programme All Hands Meeting, Nottingham, UK, 19-22 September 2005 Presented at Cox, S. J. and Walker, D. W. eds.Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC pp. 395.
- Burnap, P.et al. 2005. A service oriented infrastructure to facilitate trust in collaborative working. Presented at: 4th UK e-Science Programme All Hands Meeting, Nottingham, UK, 19-22 September 2005 Presented at Cox, S. J. and Walker, D. W. eds.Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC pp. 346.
- Rana, O. F.et al. 2005. Secure virtual organisations: Protocols and requirements. Presented at: Information Security Solutions Europe (ISSE) 2005 - The Independent European ICT Security Conference and Exhibition, Budapest, Hungary, 27-29 September 2005 Presented at Paulus, S., Pohlmann, N. and Reimer, H. eds.ISSE 2005 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2005 Conference. Berlin: Springer pp. 422-432.
- Burnap, P.et al. 2005. Grid based E-procurement. Proceedings of the ASCE, pp. 1-11. (10.1061/40794(179)156)
2004
- Joita, L.et al. 2004. Supporting collaborative virtual organisations in the construction industry via the grid. Presented at: UK e-Science all Hands Meeting (AHM2004), Nottingham, UK, 31 August - 3 September 2004 Presented at Cox, S. J. ed.Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC
- Joita, L.et al. 2004. A grid-enabled security framework for collaborative virtual organisations. Presented at: 5th IFIP Working Conference on Virtual Enterprises (PRO-VE), Toulouse, France, 22-27 August 2004.
- Miles, J. C.et al. 2004. Collaborative engineering Virtual Teams in a Grid Environment Supporting Consortia in the Construction Industry. Presented at: 10th International Conference on Computing in Civil and Building Engineering (ICCCBE), Weimar, Germany, 2-4 June 2004.
- Pahwa, J. S.et al. 2004. Creating a virtual distributed database - data definition and search model for collaborative virtual teams in the construction industry. Presented at: Proceedings 21st Annual British National Conference on Databases (BNCOD2004), Edinburgh, UK.
- Burnap, P.et al. 2004. Security user and data management for collaborative virtual teams in a grid environment supporting consortia in the construction industry. Presented at: Proceedings of the Workshop on Requirements Capture for Collaboration in e-Science, Edinburgh, UK. pp. 54-60.
- Joita, L.et al. 2004. A grid enabled security framework for collaborative virtual organisations. Presented at: Proceedings of Virtual Enterprises and Collaborative Networks IFIP 18th World Computer congressTC5/WG5.5 5th Working Conference on Virtual Enterprises, Toulouse, UK. pp. 22-27.
Research interests include:
- Social Media Analysis: Developing new algorithms and implementing computational analysis tools (often informed by social theory) to better understand online social interaction and behaviour;
- Supporting Decision Making: Building systems to support intelligence gathering, risk assessment, and decision making - "extracting knowledge from data";
- Big Data and Text Mining: Collation, storage and analysis of text information and massive datasets ("Big Data") using natural language processing, pattern matching and machine learning techniques;
- Information Security: Developing methods to better understand the behaviour, spread and evolution of malicious software, informing policy requirements, and building secure information sharing technology;
- Distributed systems: Building secure and distributed information sharing and retrieval systems.
Goruchwyliaeth gyfredol
