
Professor Pete Burnap
Professor of Data Science & Cybersecurity
School of Computer Science and Informatics
- Media commentator
Overview
I am Professor of Data Science & Cybersecurity in the School of Computer Science & Informatics. I am Director of the Cardiff Centre for Cyber Security Research, which is one of 19 Centres in the UK to be recognised as an Academic Centre of Excellence in Cyber Security Research (ACE-CSR) by the National Cyber Security Centre and EPSRC.
I have been involved in grants worth in excess of £19m, leading large awards from EPSRC, ESRC and industry on the topic of cyber security analytics – the fusion of artificial intelligence, cybersecurity and risk.
I lead AI for cybersecurity research at Airbus Cyber Innovation on a part-time secondment basis. I am director of Airbus' only global Centre of Excellence in Cyber Security Analytics. This has led to advanced malware detection algorithms as well as novel models for goal-oriented risk assessment being integrated into the business. Since 2012 we have established an interdisciplinary research team of technical and social researchers. Our collaborative projects have received more than £5m in funding from UK Research Councils (EPSRC, ESRC), Welsh Government (Endeavr Wales) and Industry (Airbus).
I lead the Safety Critical Systems theme in the £14m PETRAS National Centre of Excellence for Internet of Things Systems Cybersecurity, led out of UCL.
I am co-director of the WEFO-funded Data Innovation Accelerator (DIA) – a £3.75m investment in upskilling SMEs in South Wales to develop innovative AI-driven products and services.
I sit on the UK Government's AI Council, advising on the implementation of the industrial strategy in AI and the Data Economy.
I have a strong interest in socio-technical security and the understanding of risks to society from cyber-enabled systems. I work very closely with the Criminology team at the Cardiff School of Social Sciences. We have pioneered innovation in AI for the modelling and understanding of risks to social safety and security in online social networks (e.g. production and propagation of cyber hate speech, suicidal ideation and malicious Web links). This research is organised under the banner of the Social Data Science Lab, within which I am a director and the computational lead. The Lab’s core funding comes from a £450k ESRC grant and it forms part of the £64m ‘Big Data Network’. Core funding runs between 2017 and 2021.
ACM Keywords: Security and Protection; Human-centered computing; Modeling structured, textual and multimedia data; Data mining; Machine learning
Publications
2021
- Anthi, E.et al. 2021. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. Journal of Information Security and Applications 58, article number: 102717. (10.1016/j.jisa.2020.102717)
- Lakoju, M.et al. 2021. "Chatty Devices” and edge-based activity classification. Discover Internet of Things 1, article number: 5. (10.1007/s43926-021-00004-9)
- Anthi, E.et al. 2021. A three-tiered intrusion detection system for Industrial Control Systems (ICS). Journal of Cybersecurity
2020
- Al Baghal, T.et al. 2020. Linking Twitter and survey data: the impact of survey mode and demographics on consent rates across three UK studies. Social Science Computer Review 38(5) (10.1177/0894439319828011)
- Saxena, N.et al. 2020. Impact and key challenges of insider threats on organizations and critical businesses. Electronics 9(9), article number: 1460. (10.3390/electronics9091460)
- Bérubé, M.et al. 2020. Social media forensics applied to assessment of post–critical incident social reaction: The case of the 2017 Manchester Arena terrorist attack. Forensic Science International 313, article number: 110364. (10.1016/j.forsciint.2020.110364)
- Javed, A.et al. 2020. Emotions behind drive-by download propagation on Twitter. ACM Transactions on the Web 14(4), article number: 16. (10.1145/3408894)
- Pratomo, B., Burnap, P. and Theodorakopoulos, G. 2020. BLATTA: early exploit setection on network traffic with recurrent neural networks. Security and Communication Networks 2020, article number: 8826038. (10.1155/2020/8826038)
- Saxena, N.et al. 2020. PharmaCrypt: blockchain for critical pharmaceutical industry to counterfeit drugs. Computer 53(7), pp. 29-44. (10.1109/MC.2020.2989238)
- Radanliev, P.et al. 2020. Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecurity 3, article number: 13. (10.1186/s42400-020-00052-8)
- Agyepong, E.et al. 2020. Cyber security operations centre concepts and implementation. In: Modern Theories and Practices for Cyber Ethics and Security Compliance. IGI Global, pp. 88-104., (10.4018/978-1-7998-3149-5.ch006)
- Javed, A.et al. 2020. Security analytics for real-time forecasting of cyberattacks. Software: Practice and Experience (10.1002/spe.2822)
- Ozalp, S.et al. 2020. Antisemitism on twitter: collective efficacy and the role of community organisations in challenging online hate speech. Social Media and Society 6(2), pp. 1-20. (10.1177/2056305120916850)
- Williams, M. L.et al. 2020. Hate in the machine: anti-black and anti-Muslim social media posts as predictors of offline racially and religiously aggravated crime. British Journal of Criminology 60(1), pp. 93-117. (10.1093/bjc/azz049)
- Barati, M.et al. 2020. Privacy-aware cloud ecosystems and GDPR compliance. Presented at: 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud), 26-28 August 2019, Istanbul, Turkey2019 7th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE pp. 117., (10.1109/FiCloud.2019.00024)
- Nafees, M. N.et al. 2020. Impact of energy consumption attacks on LoRaWAN-enabled devices in industrial context. Presented at: ACM Conference on Computer and Communications Security (CCS 2020), Virtual, 9-13 November 2020.
- Agyepong, E.et al. 2020. Challenges and performance metrics for security operations center analysts: a systematic review. Journal of Cyber Security Technology 4(3), pp. 125-152. (10.1080/23742917.2019.1698178)
- Scourfield, J.et al. 2020. Are youth suicide memorial sites on Facebook different from those for other sudden deaths?. Death Studies 44(12), pp. 793-801. (10.1080/07481187.2019.1614109)
- Liu, H.et al. 2020. Scmhl5 at TRAC-2 shared task on aggression identification: bert based ensemble learning approach. Presented at: Second Workshop on Trolling, Aggression and Cyberbullying, Marseille, France, 16 May 2020.
- Agyepong, E.et al. 2020. Towards a framework for measuring the performance of a security operations center analyst. Presented at: IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020), Dublin, Ireland, 15-17 June 2020.
- Nafees, M. N.et al. 2020. Towards distance relay attack discrimination for situational awareness-based anomaly detection. Presented at: Annual Computer Security Applications Conference (ACSAC 2020), Virtual, 7-11 December 2020.
2019
- Anthi, E.et al. 2019. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things 6(5), pp. 9042-9053. (10.1109/JIOT.2019.2926365)
- Nunes, M.et al. 2019. Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis. Journal of Information Security and Applications 48, article number: 102365. (10.1016/j.jisa.2019.102365)
- Williams, M. L.et al. 2019. Under the corporate radar: examining insider business cybercrime victimization through an application of routine activities theory. Deviant Behavior 40(9) (10.1080/01639625.2018.1461786)
- Rhode, M.et al. 2019. LAB to SOC: Robust Features for Dynamic Malware Detection. Presented at: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2019), Portland, OR, USA, 24-27 June 20192019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Industry Track. IEEE pp. 13-16., (10.1109/DSN-Industry.2019.00010)
- Alorainy, W.et al. 2019. 'The enemy among us': detecting cyber hate speech with threats-based othering language embeddings. ACM Transactions on the Web 13(3), article number: 14. (10.1145/3324997)
- Javed, A., Burnap, P. and Rana, O. 2019. Prediction of drive-by download attacks on Twitter. Information Processing and Management 56(3), pp. 1133-1145. (10.1016/j.ipm.2018.02.003)
- Liu, H.et al. 2019. Fuzzy multi-task learning for hate speech type identification. Presented at: The Web Conference 2019, San Francisco, CA, USA, 13-17 May 2019WWW '19 The World Wide Web Conference. ACM pp. 3006-3012., (10.1145/3308558.3313546)
- Liu, H.et al. 2019. A fuzzy approach to text classification with two-stage training for ambiguous instances. IEEE Transactions on Computational Social Systems 6(2), pp. 227-240. (10.1109/TCSS.2019.2892037)
- Procter, R.et al. 2019. A study of cyber hate on twitter with implications for social media governance strategies. arxiv.org (Cornell University)
- Scourfield, J.et al. 2019. The number and characteristics of newspaper and Twitter reports on suicides and road traffic deaths in young people. Archives of Suicide Research 23(3), pp. 507-522. (10.1080/13811118.2018.1479321)
- Burnap, P.et al. 2019. Chatty factories: a vision for the future of product design and manufacture with IoT. Presented at: Living in the Internet of Things (IoT 2019), London, UK, 1-2 May 2019Living in the Internet of Things (IoT 2019). IET pp. 4 (6 pp.)., (10.1049/cp.2019.0129)
- Aldmour, R., Burnap, P. and Lakoju, M. 2019. Risk assessment methods for converged IoT and SCADA systems: review and recommendations. Presented at: Living in the Internet of Things (IoT 2019), London, UK, 1-2 May 2019Living in the Internet of Things (IoT 2019). IET pp. 5-10., (10.1049/cp.2019.0130)
2018
- Alorainy, W.et al. 2018. Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample. Presented at: International Conference on Machine Learning and Cybernetics, Chengdu, China, 15-18 July 20182018 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE pp. 581-586., (10.1109/ICMLC.2018.8527001)
- Radanliev, P.et al. 2018. Future developments in cyber risk assessment for the internet of things. Computers in Industry 102, pp. 14-22. (10.1016/j.compind.2018.08.002)
- Anthi, E.et al. 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78, pp. 477-490. (10.1016/j.cose.2018.07.016)
- Rhode, M., Burnap, P. and Jones, K. 2018. Early-stage malware prediction using recurrent neural networks. Computers and Security 77, pp. 578-594. (10.1016/j.cose.2018.05.010)
- Burnap, P.et al. 2018. Malware classification using self organising feature maps and machine activity data. Computers and Security 73, pp. 399-410. (10.1016/j.cose.2017.11.016)
- Housley, W.et al. 2018. Interaction and transformation on social media: the case of Twitter campaigns. Social Media and Society 4(1), pp. 1-12. (10.1177/2056305117750721)
2017
- Williams, M. L.et al. 2017. Users' view's of ethics in social media research: informed consent, anonymity and harm. In: Woodfield, K. ed. The Ethics of Online Research., Vol. 2. Advances in Research Ethics and Integrity Emerald Publishing, pp. 27-51., (10.1108/S2398-601820180000002002)
- Williams, M. L., Burnap, P. and Sloan, L. 2017. Towards an ethical framework for publishing Twitter data in social research: taking into account users’ views, online context and algorithmic estimation. Sociology 51(6), pp. 1149-1168. (10.1177/0038038517708140)
- Thomas, L.et al. 2017. Automation of the supplier role in the GB power system using blockchain based smart contracts. CIRED - Open Access Proceedings Journal 2017(1), pp. 2619-2623. (10.1049/oap-cired.2017.0987)
- Burnap, P.et al. 2017. Multi-class machine classification of suicide-related communication on Twitter. Online Social Networks and Media 2, pp. 32-44. (10.1016/j.osnem.2017.08.001)
- Webb, H.et al. 2017. The ethical challenges of publishing Twitter data for research dissemination. Presented at: WebSci'17: ACM Web Science Conference, Troy, NY, USA, 25-28 June 2017Proceedings of the 2017 ACM on Web Science Conference. ACM pp. 339-348., (10.1145/3091478.3091489)
- Baylis, R.et al. 2017. Private lenders' demand for audit. Journal of Accounting and Economics 64(1), pp. 78-97. (10.1016/j.jacceco.2017.06.001)
- Alsaedi, N., Burnap, P. and Rana, O. 2017. Can we predict a riot? Disruptive event detection using Twitter. ACM Transactions on Internet Technology 17(2), article number: 18. (10.1145/2996183)
- Eden, P.et al. 2017. SCADA system forensic analysis within IIoT. In: Thames, L. and Schaefer, D. eds. Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing. Springer Series in Advanced Manufacturing, pp. 73-101., (10.1007/978-3-319-50660-9_4)
- Burnap, P.et al. 2017. Determining and sharing risk data in distributed interdependent systems. IEEE Computer 50(4), pp. 72-79. (10.1109/MC.2017.108)
- Williams, M. L., Burnap, P. and Sloan, L. 2017. Crime sensing with big data: the affordances and limitations of using open-source communications to estimate crime patterns. British Journal of Criminology 57(2), pp. 320-340. (10.1093/bjc/azw031)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2017. Temporal TF-IDF: a high performance approach for event summarization in Twitter. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence, Omaha, Nebraska, USA, 13-16 October 20162016 IEEE/WIC/ACM International Conference on Web Intelligence. IEEE pp. 515-521., (10.1109/WI.2016.0087)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2017. Sensing real-world events using social media data and a classification-clustering framework. Presented at: IEEE/WIC/ACM International Conference on Web Intelligence, Omaha, Nebraska, USA, 13-16 October 20162016 IEEE/WIC/ACM International Conference on Web Intelligence (WI). IEEE pp. 216-223., (10.1109/WI.2016.0039)
- Williams, M. L. and Burnap, P. 2017. Detecting crime events using social media. Presented at: Home Office Crime and Policing Analysis Unit Seminar Series, Westminster, London, UK, July, 2017. pp. -.
- Williams, M. L. and Burnap, P. 2017. Social data science & criminology: machine classification and modelling of cyberhate in online social networks. Presented at: Cambridge Institute of Criminology Seminar Series, University of Cambridge, UK, 9 February 2017.
- Williams, M. and Burnap, P. 2017. Online extremism and hate speech: definition, measurement & regulation. Presented at: Internet Leadership Academy, Oxford Internet Institute, University of Oxford, UK, 26 September 2017.
- Burnap, P. and Williams, M. L. 2017. Classifying and modeling cyber hate speech: research and opportunities for practical intervention. Presented at: 1st International Conference on Cyber Deviance Detection (CyberDD) in conjunction with 10th ACM International Conference on Web Search and Data Mining (WSDM 2017), Cambridge, UK, 10 Feb 2017.
- Williams, M. L. and Burnap, P. 2017. Data science solutions for detecting and monitoring Brexit related online hate speech. Presented at: UK Government Data Science Community Interest Workshop, ONS Data Science Campus, Newport, Wales, UK, 4 September 2017.
2016
- Scourfield, J. B.et al. 2016. The response in Twitter to an assisted suicide in a television soap opera. Crisis: The Journal of Crisis Intervention and Suicide Prevention 37(5), pp. 392-395. (10.1027/0227-5910/a000377)
- Eden, P.et al. 2016. Forensic readiness for SCADA/ICS incident response. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research, Queen's University Belfast, Belfast, UK, 23-25 August 2016.
- Burnap, P. and Williams, M. L. 2016. Computational human and cyber security analytics for government and policy. Presented at: Data Science and Government Conference, Oxford, UK, 22 June 2016.
- Webb, H.et al. 2016. Digital wildfires: propagation, verification, regulation, and responsible innovation. ACM Transactions on Information Systems 34(3), article number: 15. (10.1145/2893478)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2016. Sensing real-world events using Arabic Twitter posts. Presented at: International AAAI Conference on Web and Social Media (ICWSM), Cologne, Germany, 17-20 May 2016Proceedings of the Tenth International AAAI Conference on Web and Social Media (ICWSM 2016). AAAI pp. 515-518.
- Alsaedi, N., Burnap, P. and Rana, O. F. 2016. Automatic summarization of real world events using Twitter. Presented at: International AAAI Conference on Web and Social Media (ICWSM), Cologne, Germany, 17-20 May 2016Proceedings of the Tenth International AAAI Confe. AAAI pp. 511-514.
- Williams, M. L. and Burnap, P. 2016. Cyberhate on social media in the aftermath of Woolwich: a case study in computational criminology and big data. British Journal of Criminology 56(2), pp. 211-238. (10.1093/bjc/azv059)
- Awan, M. S. K., Burnap, P. and Rana, O. F. 2016. Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. Computers and Security 57, pp. 31-46. (10.1016/j.cose.2015.11.003)
- Burnap, P.et al. 2016. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Electoral Studies 41, pp. 230-233. (10.1016/j.electstud.2015.11.017)
- Cherdantseva, Y.et al. 2016. A review of cyber security risk assessment methods for SCADA systems. Computers and Security 56, pp. 1-27. (10.1016/j.cose.2015.09.009)
- Conejero, J.et al. 2016. Analysing Hadoop power consumption and impact on application QoS. Future Generation Computer Systems 55, pp. 213-223. (10.1016/j.future.2015.03.009)
- Burnap, P. and Williams, M. L. 2016. Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science 5, article number: 11. (10.1140/epjds/s13688-016-0072-6)
2015
- Burnap, P., Colombo, G. and Scourfield, J. B. 2015. Machine classification and analysis of suicide-related communication on Twitter. Presented at: 26th ACM Conference on Hypertext & Social Media, Cyprus, 1-4 September 2015HT '15- Proceedings of the 26th ACM Conference on Hypertext & Social Media. Association for Computing Machinery pp. 75-84.
- Webb, H.et al. 2015. Digital wildfires: hyper-connectivity, havoc, and a global ethos to govern social media. Computers and Society 45(3), pp. 193-201.
- Burnap, P.et al. 2015. Real-time classification of malicious URLs on Twitter using Machine Activity Data. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 25-27 August 2015. ACM
- Alsaedi, N., Burnap, P. and Rana, O. F. 2015. Identifying disruptive events from social media to enhance situational awareness. Presented at: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 24-27 August 2015ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM pp. 934-941., (10.1145/2808797.2808879)
- Williams, M. L. and Burnap, P. 2015. Combating cyber-hate on social media throughcounter-speech. Presented at: Symposium on Anti-Muslim Hate Crime, University of Cambridge, Cambridge, UK, 16 June 2015.
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: An application of machine classification and statistical modeling for policy and decision making. Policy & Internet 7(2), pp. 223-242. (10.1002/poi3.85)
- Burnap, P. and Williams, M. L. 2015. Plenary: Computational & social security analytics using Big Data. Presented at: International Conference on Computational Social Science, Helsinki, Finland, 8-11 June 2015.
- Williams, M. L. and Burnap, P. 2015. Using big social data and real-time analytics to inform policy. Presented at: Policy-Making in the Big Data Era: Opportunities and Challenges, University of Cambridge, Cambridge, UK, 15-17 June 2015.
- Burnap, P.et al. 2015. Detecting tension in online communities with computational Twitter analysis. Technological Forecasting & Social Change 95, pp. 96-108. (10.1016/j.techfore.2013.04.013)
- Alsaedi, N. and Burnap, P. 2015. Arabic event detection in social media. Presented at: 16th International Conference on Intelligent Text Processing and Computational Linguistics, Cairo, Egypt, 14-20 April 2015 Presented at Gelbukh, A. ed.Computational Linguistics and Intelligent Text Processing: 16th International Conference, CICLing 2015, Cairo, Egypt, April 14-20, 2015, Proceedings, Part I, Vol. 9041. Lecture Notes in Computer Science Springer Verlag pp. 384-401., (10.1007/978-3-319-18111-0_29)
- Burnap, P. and Williams, M. L. 2015. Cyber hate speech on Twitter: an application of machine classification and statistical modeling for policy and decision making. Presented at: ICWSM Workshop on Religion and Social Media, University of Oxford, Oxford, UK, 26 May 2015.
- Williams, M. L. and Burnap, P. 2015. Cyber-hate on social media in the aftermath of Woolwich. Presented at: Government Hate Crime Seminar, London, UK, 11 March 2015.
- Sloan, L.et al. 2015. Who tweets? Deriving the demographic characteristics of age, occupation and social class from Twitter user meta-data. PLoS ONE 10(3), article number: e0115545. (10.1371/journal.pone.0115545)
- Colombo, G. B.et al. 2015. Analysing the connectivity and communication of suicidal users on Twitter. Computer Communications 73(B), pp. 291-300. (10.1016/j.comcom.2015.07.018)
- Williams, M. L. and Burnap, P. 2015. Economic and Social Research Council Trans-Atlantic Platform Workshop. Presented at: Digital Scholarship in the Social Sciences and Humanities: New Forms of Data for Research, Washington DC, USA, 28-29 Jan 2015.
- Awan, M., Burnap, P. and Rana, O. F. 2015. An empirical risk management framework for monitoring network security. Presented at: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM),, Liverpool, UK, 26-28 October 2015Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on. IEEE pp. 1764-1771., (10.1109/CIT/IUCC/DASC/PICOM.2015.266)
- Rahulamathavan, Y.et al. 2015. Assessing data breach risk in cloud systems. Presented at: 7th International Conference on Cloud Computing Technology and Science (CloudCom), Vancouver, BC, Canada, 30 Nov-3 Dec 20152015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE pp. 363-370., (10.1109/CloudCom.2015.58)
- Eden, P.et al. 2015. A cyber forensic taxonomy for SCADA systems in critical infrastructure. Presented at: The 10th International Conference on Critical Information Infrastructures Security 2015 (CRITIS 2015), Berlin, Germany, 5-7 October 2015.
- Eden, P.et al. 2015. A forensic taxonomy of SCADA systems and approach to incident response. Presented at: The 3rd International Symposium for ICS and SCADA Cyber Security Research 2015 (ICS-CSR 2015), Ingolstadt, Germany, 17 - 18 September 2015. , (10.14236/ewic/ICS2015.5)
- Awan, M. S. K.et al. 2015. Continuous monitoring and assessment of cybersecurity risks in large computing infrastructures. Presented at: 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC, New York City, NY, USA, 24-26 August 2015High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE pp. 1442-1447., (10.1109/HPCC-CSS-ICESS.2015.224)
- Burnap, P.et al. 2015. 140 characters to victory?: Using Twitter to predict the UK 2015 General Election. Working paper. Cardiff University.
- Al Said, T., Rana, O. F. and Burnap, P. 2015. VMInformant: an instrumented virtual machine to support trustworthy cloud computing. International Journal of High Performance Computing and Networking 8(3), pp. 222-234., article number: IJHPCN080303. (10.1504/IJHPCN.2015.071257)
- Awan, M. S. K.et al. 2015. A classification framework for distinct cyber-attacks based on occurrence patterns. Presented at: The 9th International Conference on Security of Information and Networks, Soch, Russia, 8-10 September 2015Proceedings of the 8th International Conference on Security of Information and Networks. ACM pp. 165-168., (10.1145/2799979.2800037)
- Awan, M. S., Burnap, P. and Rana, O. F. 2015. Estimating risk boundaries for persistent and stealthy cyber-attacks. Presented at: 22nd ACM Conference on Computer and Communications Security, Denver Colorado, USA, 12-16 October 2015SafeConfig '15 Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense. ACM pp. 15-20., (10.1145/2809826.2809830)
- Burnap, P.et al. 2015. COSMOS: Towards an integrated and scalable service for analysing social media on demand. International Journal of Parallel, Emergent and Distributed Systems 30(2), pp. 80-100. (10.1080/17445760.2014.902057)
2014
- Williams, M. and Burnap, P. L. 2014. Human security analytics. Presented at: Web Science Trust Web Science Summer School, National University of Singapore, Singapore, Malaysia, 8-12 December 2014.
- Burnap, P. and Williams, M. L. 2014. Big social data analysis panel. Presented at: Web Science Trust Web Science Summer School, National University of Singapore, Singapore, Malaysia, 8-12 December 2014.
- Burnap, P.et al. 2014. Towards real-time probabilistic risk assessment by sensing disruptive events from streamed news feeds. Presented at: 8th IEEE International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2014), Birmingham City University, Birmingham, UK., 2-4 July 2014. pp. -.
- Williams, M. L. and Burnap, P. 2014. Hate speech, tension monitoring and social media. Presented at: Wales Hate Crime Criminal Justice Board, Cardiff, Wales, 23 July 2014. pp. -.
- Sloan, L., Williams, M. L. and Burnap, P. 2014. Deriving demographic variables from twitter data. Presented at: Office for National Statistics Big Data Project Workshop, Titchfield, England, 21 July 2014. pp. -.
- Burnap, P.et al. 2014. Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4, article number: 206. (10.1007/s13278-014-0206-4)
- Alsaedi, N., Burnap, P. and Rana, O. F. 2014. A combined classification-clustering framework for identifying disruptive events. Presented at: ASE SocialCom Conference, Stanford University, CA., USA, May 27-21 2014.
- Rahulamathavan, Y.et al. 2014. Analysing security requirements in cloud-based service level agreements. Presented at: SIN '14 The 7th International Conference on Security of Information and Networks, Glasgow, 9 - 11 September 2014Proceedings of the 7th International Conference on Security of Information and Networks. New York, NY: ACM pp. 73-77., (10.1145/2659651.2659735)
- Housley, W.et al. 2014. Big and broad social data and the sociological imagination: a collaborative response. Big Data & Society 1(2) (10.1177/2053951714545135)
- Burnap, P. and Williams, M. L. 2014. Hate speech, machine classification and statistical modelling of information flows on Twitter: interpretation and communication for policy decision making. Presented at: Internet, Policy & Politics, Oxford, UK, 26 September 2014.
2013
- Sloan, L.et al. 2013. Knowing the Tweeters: Deriving sociologically relevant demographics from Twitter. Sociological Research Online 18(3), article number: 7. (10.5153/sro.3001)
- Conejero, J.et al. 2013. Characterising the power consumption of Hadoop Clouds: A social media analysis case study. Presented at: CLOSER 2013: 3rd International Conference on Cloud Computing and Services Science, Aachen, Germany, 8-10 May 2013. , (10.5220/0004373502330243)
- Burnap, P., Avis, N. J. and Rana, O. F. 2013. Making sense of self-reported socially significant data using computational methods. International Journal of Social Research Methodology 16(3), pp. 215-230. (10.1080/13645579.2013.774174)
- Williams, M. L.et al. 2013. Policing cyber-neighbourhoods: Tension monitoring and social media networks. Policing and Society 23(4), pp. 461-481. (10.1080/10439463.2013.780225)
- Conejero, J.et al. 2013. Scaling archived social media data analysis using a hadoop cloud. Presented at: IEEE 6th International Conference on Cloud Computing (CLOUD), Santa Clara, CA, USA, 27 June - 2 July 2013. IEEE
- Williams, M. L.et al. 2013. Collaborative online social media observatory. Presented at: COSMOS Launch, London, England, 2013.
- Housley, W.et al. 2013. COSMOS: theory, method and data. Presented at: Centre for Interdisciplinary Methodologies, University of Warwick, Warwick, UK, 2013.
- Sloan, L.et al. 2013. The Collaborative Online Social Media Observatory. Presented at: ESRC Seminar Series: New Social Media, New Social Science? Blurring the Boundaries: One Year On, London, UK, 2013.
- Sloan, L.et al. 2013. Using social media with survey data. Presented at: ESRC Seminar Series: New Social Media, New Social Science?, London, UK, 2013.
- Burnap, P.et al. 2013. Collaborative online social media observatory. Presented at: Web Observatory Launch, Royal Society, London, UK, 2013.
- Rob, P.et al. 2013. Enabling social media research through citizen social science. Presented at: 13th European Conference on Computer Supported Cooperative Work, Paphos, Cyprus, 21-25 September 2013.
- Burnap, P.et al. 2013. Detecting tension in social media. Presented at: Third International Conference on Social Computing and its Applications, Karlsruhe, Germany, 30 Sept - 2 Oct 2013.
2012
- Burnap, P.et al. 2012. Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information. Presented at: 2012 International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, USA, 21-25 May 2012 Presented at Smari, W. W. and Charles, F. eds.2012 International Conference on Collaboration Technologies and Systems (CTS), Vol. 14. Los Alamitos, CA: IEEE pp. 490-497., (10.1109/CTS.2012.6261095)
- Spasic, I.et al. 2012. A naïve Bayes approach to classifying topics in suicide notes. Biomedical Informatics Insights 5(Supp 1), pp. 87-97. (10.4137/BII.S8945)
- Burnap, P.et al. 2012. Social media analysis, Twitter and the London Olympics (a research note). Working paper. Cardiff: Cardiff University.
- Burnap, P.et al. 2012. Working paper 153: social media analysis, Twitter and the London Olympics 2012 [working paper]. Working paper. Cardiff: School of Social Sciences, Cardiff University. Available at: http://www.cardiff.ac.uk/socsi/resources/Working%20Paper%20153%20-%20Burnap%20et%20al.%20(2013)%20Social%20Media%20Analysis,%20Twitter%20and%20the%20London%20Olympics%202012%20-%20A%20Research%20Note.pdf
- Williams, M. D.et al. 2012. Computational social science and methodological innovation: surrogacy, augmentation or reorientation. Presented at: ESRC Seminar Series: Blurring the boundaries: New social media, new social science?, London, UK, 2012.
- Williams, M. L.et al. 2012. Computational and transformational social science. Presented at: Digital Social Research Experts Meeting, Keble College, University of Oxford, Oxford, UK, 2012.
- Housley, W.et al. 2012. Supporting empirical digital social research for the social sciences. Presented at: Digital Research 2012 Conference, St Catherines College, University of Oxford, Oxford, UK, 2012.
- Williams, M. L.et al. 2012. Treating social media as data: computational sociological Methods, data analysis and the Cardiff online social media Observatory. Presented at: NCRM, Research Methods Festival, St Catherine's College, University of Oxford, Oxford, UK, 2012.
- Edwards, A. M.et al. 2012. Mining tension and cohesion using the Cardiff Online Social Media Observatory. Presented at: NCRM, Research Methods Festival,St Catherine's College, University of Oxford, Oxford, UK, 2012.
2010
- Alsalamah, S., Hilton, J. C. and Burnap, P. 2010. Towards information sharing in virtual organisations: The development of an icon-based information control model. Presented at: The UK All Hands Meeting (AHM), Cardiff, UK, 13- 16 September 2010.
2009
- Burnap, P. and Hilton, J. C. 2009. Self protecting data for de-perimeterised information sharing. Presented at: Third International Conference on Digital Society ICDS '09, Cancun, Mexico, 1-7 February 2009Digital Society, 2009. ICDS '09. Third International Conference on. IEEE pp. 65-70., (10.1109/ICDS.2009.41)
2008
- Burnap, P. and Hilton, J. C. 2008. Information assurance for collaborative working in deperimeterised environments. Presented at: UK e-Science All Hands Meeting, Edinburgh, UK, 8-11 September 2008.
2006
- Gray, W. A.et al. 2006. MDSSF - A Federated Architecture for Product Procurement. Lecture Notes in Computer Science 4080, pp. 812-821. (10.1007/11827405_79)
- Pahwa, J. S.et al. 2006. MDSSF- A federated architecture for product procurement. Presented at: 17th International Conference on Database and Expert Systems Applications (DEXA '06), Krakov, Poland.
2005
- Burnap, P.et al. 2005. Worldwide messaging support for high performance real-time collaboration. Presented at: 4th UK e-Science Programme All Hands Meeting, Nottingham, UK, 19-22 September 2005 Presented at Cox, S. J. and Walker, D. W. eds.Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC pp. 395.
- Burnap, P.et al. 2005. A service oriented infrastructure to facilitate trust in collaborative working. Presented at: 4th UK e-Science Programme All Hands Meeting, Nottingham, UK, 19-22 September 2005 Presented at Cox, S. J. and Walker, D. W. eds.Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC pp. 346.
- Rana, O. F.et al. 2005. Secure virtual organisations: Protocols and requirements. Presented at: Information Security Solutions Europe (ISSE) 2005 - The Independent European ICT Security Conference and Exhibition, Budapest, Hungary, 27-29 September 2005 Presented at Paulus, S., Pohlmann, N. and Reimer, H. eds.ISSE 2005 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2005 Conference. Berlin: Springer pp. 422-432.
- Burnap, P.et al. 2005. Grid based E-procurement. Proceedings of the ASCE, pp. 1-11. (10.1061/40794(179)156)
2004
- Joita, L.et al. 2004. Supporting collaborative virtual organisations in the construction industry via the grid. Presented at: UK e-Science all Hands Meeting (AHM2004), Nottingham, UK, 31 August - 3 September 2004 Presented at Cox, S. J. ed.Proceedings of the 4th UK e-Science Programme All Hands Meeting. Swindon: EPSRC
- Joita, L.et al. 2004. A grid-enabled security framework for collaborative virtual organisations. Presented at: 5th IFIP Working Conference on Virtual Enterprises (PRO-VE), Toulouse, France, 22-27 August 2004.
- Miles, J. C.et al. 2004. Collaborative engineering Virtual Teams in a Grid Environment Supporting Consortia in the Construction Industry. Presented at: 10th International Conference on Computing in Civil and Building Engineering (ICCCBE), Weimar, Germany, 2-4 June 2004.
- Pahwa, J. S.et al. 2004. Creating a virtual distributed database - data definition and search model for collaborative virtual teams in the construction industry. Presented at: Proceedings 21st Annual British National Conference on Databases (BNCOD2004), Edinburgh, UK.
- Burnap, P.et al. 2004. Security user and data management for collaborative virtual teams in a grid environment supporting consortia in the construction industry. Presented at: Proceedings of the Workshop on Requirements Capture for Collaboration in e-Science, Edinburgh, UK. pp. 54-60.
- Joita, L.et al. 2004. A grid enabled security framework for collaborative virtual organisations. Presented at: Proceedings of Virtual Enterprises and Collaborative Networks IFIP 18th World Computer congressTC5/WG5.5 5th Working Conference on Virtual Enterprises, Toulouse, UK. pp. 22-27.
To date I have been involved in more than 33 research grants, amounting to over £19 million (FEC), with over £10m of this coming to Cardiff University. Funding has been secured from a variety of sources including UKRI (EPSRC/ESRC/InnovateUK), JISC, US Department of Justice, UK DoH, and industry partners (e.g. Airbus, Admiral). I was/am currently Principal Investigator on 16 of these grants (including a £1.8m EPSRC grant on secure ‘Factories of the Future’).
Selected grants include:
Cyber Range and Immersive Cyber Attack Environment (research infrastructure)
• Funded by HEFCW
• £1,272,000 (Burnap)
Demystifying AI for Cybersecurity
• Funded by InnovateUK (/w Airbus)
• £394,784 (Burnap)
PETRAS 2
• Funded by EPSRC
• £290,291 to CU (Burnap, Perera et al.)
Academic Centre of Excellence in Cyber Security Research (ACE-CSR)
• Funded by EPSRC
• £64,989 (Burnap)
PACE: Privacy-aware cloud ecosystems
• Funded by EPSRC
• £757,817 (Rana, Theodorakopoulos, Burnap)
Data innovation accelerator
• Funded by ERDF
• £3,553,220 (funded at 52%) (Burnap & Whitaker)
How Online Technologies are Transforming Transnational Organised Crime (Cyber-TNOC)
• Funded by ESRC
• £352,862 (Levi, Giommoni, Williams, Burnap)
Hate crime after Brexit: Linking terrestrial and new forms of data to inform governance
• Funded by ESRC
• £253,041 (Williams, Burnap, Sloan)
New Industrial Systems: Chatty Factories
• Funded by EPSRC
• £1,805,111 (Burnap, Murray-Rust, Richards, Preston, Branson)
Identifying Attack Vectors for Network Intrusion via IoT devices Developing a Goal-Oriented Approach to Determining Impact Across Threat Surfaces (IoT Depends)
• Funded by EPSRC PETRAS Hub
• £136,205 (Burnap)
SCADA Cyber Security Lifecycle (SCADA-CSL) 2
• Funded by Foundation Wales – Welsh Government and Airbus Innovations.
• £760,000 (Burnap, Cherdantseva and Theodorakopolous)
Centre for Cyberhate Research & Policy: Real-Time Scalable Methods & Infrastructure for Modelling the Spread of Cyberhate on Social Media
• Funded by ESRC
• £781,243 (Williams & Burnap)
Social Data Science Lab – Methods and Infrastructure Development for Open Data Analytics in Social Research
• Funded by ESRC
• £705.050 (Burnap, Williams, Sloan & Rana)
Understanding Online Hate Speech as a Motivator for Hate Crime
• Funded by National Institute for Justice, US Department of Justice
• £683,152 (Williams & Burnap in partnership with Rand US & Europe)
Event Detection using Open Source Communications
• Funded by Endeavr Wales
• £973,760 (Burnap & Williams in partnership with Airbus Endeavor Wales)
SCADA Cyber Security Lifecycle (SCADA-CSL)
• Funded by Foundation Wales – Welsh Government and Airbus Innovations
• £1,250,000 (Jones, Burnap, Blyth & Stoddart)
Identifying and Modelling Victim, Business, Regulatory and Malware Behaviours in a Changing Cyberthreat Landscape
• Funded by EPSRC under the Global Uncertainties Consortia for Exploratory Research in Security (CEReS) call
• £1,200,000 (Rana, Burnap, Williams, Levi, Matthews, Clarke, Furnell, Ganis, Rajarajan & Wall)
Improving Driver Risk Modeling with Big Data Analytics
• Knowledge Transfer Partnership with Admiral Insurance
• £378,648 (Burnap)
Investigating the link between social media activity and reporting crime
• Funded by Metropolitan Police Service Centre for Scientific and Engineering Excellence
• £49,950 (Burnap & Williams)
Estimating the Propagation of Anti-Semitic Content on Twitter
• Funded by Community Security Trust and the Lewis Trust Group
• £35,000 (Williams & Burnap)
Impact Acceleration Award – Embedding Open Source Intelligence Analytics within the Metropolitan Police Service
• Funded by ESRC
• £25,000 (Burnap, Williams, Rana & Sloan)
Evaluating the Utility of Social Media Analytics for International Development
• Funded by Department for International Development
• £7,500 (Williams & Burnap)
Impact Acceleration Award – Assessing the Market Interest in Big Social Data Analytics
• Funded by EPSRC
• £7,500 (Burnap, Williams, Rana & Sloan)
Digital Wildfire: (Mis)information flows, propagation and responsible governance
• Funded by ESRC (Global Uncertainties)
• £196,333 (Jirotka, Burnap, Williams, Rana, Procter, Housley, Edwards & Stahl)
Detecting Tension and Cohesion in Local Communities with Social Media
• Funded by Airbus Group
• £51,040 (Rana, Burnap, Sloan & Williams)
Social Media and Prediction: Crime Sensing, Data Integration & Statistical Modelling
• Funded by ESRC under the NCRM Methods Innovation Call
• £194,138 (Williams, Burnap, Sloan, Rana, Housley, Edwards, Procter & Voss)
Hate Speech and Social Media: Understanding Users, Networks and Information Flows
• Funded by ESRC and Google
• £124, 986 (Housley, Williams, Burnap, Edwards, Rana, Procter, Voss & Knight)
Digital Social Research Tools, Tension Indicators and Safer Communities: A Demonstration of COSMOS
• Funded by ESRC
• £97,506 (Williams, Rana, Avis, Housley, Edwards & Burnap)
The 2016 Welsh Election Study: A Study of the 2016 Election to the National Assembly for Wales
• Funded by ESRC
• £257,148 (Scully, Jones, Cutts, Sloan, Burnap & Williams)
Digital Social Research Tools, Tension Indicators and Safer Communities: A Demonstration of COSMOS
• Funded by ESRC
• £97,506 (Williams, Rana, Avis, Housley, Edwards & Burnap)
Public perceptions of the UK food system: public understanding and engagement, and the impact of crises and scares
• Funded by ESRC and the Food Standards Agency
• £291,200 (Roberts, Dowler, Draper, Sloan, Williams & Burnap)
Understanding the Role of Social Media in the Aftermath of Youth Suicides
• Funded Department of Health
• £200,000 (Scourfield, Burnap, Williams, Housley & Edwards)
Scaling the Computational Analysis of “Big Social Data” & Massive Temporal Social Media Datasets
• Funded by High Performance Computing Wales
• £45,000 (Burnap, Rana, Sloan & Williams)
Small items of research equipment at Cardiff University
• Funded by EPSRC
• £620,000 (Burnap)
Supporting Empirical Digital Social Research for the Social Sciences with a Virtual Research Environment
• Funded by JISC
• £55,519 (Burnap, Williams, Housley, Rana, Edwards & Avis)
Requirements Analysis for Social Media Analysis Research Tools
• Funded by ESRC
• £5,000 (Burnap, Rana, Avis, Williams, Housley & Edwards)
Sensing Data from the Web to Inform Probabilistic Risk Models. Funded by Welsh European Funding Office (Part of the Smart Operation for a Low Carbon Energy Region (SOLCER) project). £50,000
miConsent: Patient Controlled Access to Distributed Medical Records.
Funded by Technology Strategy Board with Abies Ltd and IMS Maxims. £54,000
Supervision
Current supervision
Past projects
- Dr. Amir Javed (Understanding Malware Behaviour in Online Social Networks & Predicting Cyber Attacks)
- Dr. Matthew Nunes (Self-Healing Approaches to Network Intrusion Detection) - EPSRC Scholarship
- Dr. Taimur Al Said (Security of Virtual Machines in the Cloud)
- Dr. Nasser Alsaedi (Mining Disruptive Events from Social Media)