Oliver Buckley
Oliver Buckley
Verified email at uea.ac.uk
TitleCited byYear
Understanding insider threat: A framework for characterising attacks
OB Nurse, PA Legg, M Goldsmith, S Creese, GRT Wright, M Whitty
IEEE Security and Privacy Workshops (SPW). IEEE, 2014
1382014
Automated insider threat detection system using user and role-based profile assessment
P Legg, O Buckley, M Goldsmith, S Creese
Systems Journal, Publication pending, 2015
622015
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
332015
Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE International Symposium on Technologies for Homeland Security, 2015
312015
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
International Conference on Human Aspects of Information Security, Privacy …, 2014
242014
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat
O Buckley, JRC Nurse, PA Legg, M Goldsmith, S Creese
Workshop on Socio-Technical Aspects in Security and Trust, 2014
82014
Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis.
PA Legg, O Buckley, M Goldsmith, S Creese
J. Internet Serv. Inf. Secur. 4 (4), 1-13, 2014
62014
Reconstructing what you said: Text Inference using Smartphone Motion
D Hodges, O Buckley
IEEE Transactions on Mobile Computing 18 (4), 947-959, 2018
52018
Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem
JRC Nurse, O Buckley
Human-centric Computing and Information Sciences 7 (1), 40, 2017
52017
Efficient Soft Tissue Modelling Using Charged Particle Control Points.
O Buckley, NW John
Eurographics (Short Papers), 9-12, 2008
22008
Efficient modelling of soft tissue using particle systems
O Buckley, NW John
Studies in Health Technology and Informatics 125, 55, 2007
22007
Keystroke inference using smartphone kinematics
O Buckley, D Hodges, M Hadgkiss, S Morris
International Conference on Human Aspects of Information Security, Privacy …, 2017
12017
The language of biometrics: Analysing public perceptions
O Buckley, JRC Nurse
Journal of Information Security and Applications 47, 112-119, 2019
2019
Deconstructing who you play: Character choice in online gaming
D Hodges, O Buckley
Entertainment Computing 27, 170-178, 2018
2018
Its not all about the money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals
D Hodges, O Buckley
International Conference on Human Aspects of Information Security, Privacy …, 2017
2017
User identification using games
O Buckley, D Hodges
International Conference on Human Aspects of Information Security, Privacy …, 2016
2016
A critical reflection on the threat from human insiders− its nature ‚industry perceptions ‚and detection approaches
I Agrafiotis, O Buckley, S Creese, M Goldsmith, P Legg, J Nurse, M Whitty
2014
Computational requirements of the virtual patient
N John, CJ Hughes, S Pop, F Vidal, O Buckley
1st International Conference on Mathematical and Computational Biomedical …, 2009
2009
Efficient Haptic and Visual Soft Tissue Deformation using a Particle-Based Approach
O Buckley
University of Wales, Bangor, 2009
2009
Particle Methods for a Virtual Patient.
O Buckley, CJ Hughes, NW John, SR Pop
First International Conference on Computational and Mathematical Biomedical …, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–20