Oliver Buckley
Oliver Buckley
Vahvistettu sähköpostiosoite verkkotunnuksessa uea.ac.uk
Understanding insider threat: A framework for characterising attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
2014 IEEE Security and Privacy Workshops, 214-228, 2014
Automated insider threat detection system using user and role-based profile assessment
P Legg, O Buckley, M Goldsmith, S Creese
Systems Journal, Publication pending, 2015
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE International Symposium on Technologies for Homeland Security, 2015
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
International Conference on Human Aspects of Information Security, Privacy …, 2014
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat
O Buckley, JRC Nurse, PA Legg, M Goldsmith, S Creese
Workshop on Socio-Technical Aspects in Security and Trust, 2014
Reconstructing what you said: Text inference using smartphone motion
D Hodges, O Buckley
IEEE Transactions on Mobile Computing 18 (4), 947-959, 2018
The language of biometrics: Analysing public perceptions
O Buckley, JRC Nurse
Journal of Information Security and Applications 47, 112-119, 2019
Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem
JRC Nurse, O Buckley
Human-centric Computing and Information Sciences 7 (1), 1-21, 2017
Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis.
PA Legg, O Buckley, M Goldsmith, S Creese
J. Internet Serv. Inf. Secur. 4 (4), 1-13, 2014
Efficient modelling of soft tissue using particle systems
O Buckley, NW John
Studies in Health Technology and Informatics 125, 55, 2007
Deconstructing who you play: Character choice in online gaming
D Hodges, O Buckley
Entertainment Computing 27, 170-178, 2018
Efficient Soft Tissue Modelling Using Charged Particle Control Points.
O Buckley, NW John
Eurographics (Short Papers), 9-12, 2008
Keystroke inference using smartphone kinematics
O Buckley, D Hodges, M Hadgkiss, S Morris
International Conference on Human Aspects of Information Security, Privacy …, 2017
User identification using games
O Buckley, D Hodges
International Conference on Human Aspects of Information Security, Privacy …, 2016
Computational requirements of the virtual patient
N John, CJ Hughes, S Pop, F Vidal, O Buckley
1st International Conference on Mathematical and Computational Biomedical …, 2009
Particle Methods for a Virtual Patient.
O Buckley, CJ Hughes, NW John, SR Pop
First International Conference on Computational and Mathematical Biomedical …, 2009
Efficient soft tissue deformation using charged particles.
O Buckley, NW John
Studies in health technology and informatics 132, 53-55, 2008
Sharing Secrets with Agents: Improving Sensitive Disclosures using Chatbots
O Buckley, JRC Nurse, N Wyer, H Dawes, D Hodges, S Earl, ...
Board Games as a Behavioural Collection Method
T Sidorenko, D Hodges, O Buckley
Cranfield Online Research Data (CORD), 2020
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20