Follow
Oliver Buckley
Title
Cited by
Cited by
Year
Understanding insider threat: A framework for characterising attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
2014 IEEE security and privacy workshops, 214-228, 2014
2822014
Automated insider threat detection system using user and role-based profile assessment
P Legg, O Buckley, M Goldsmith, S Creese
Systems Journal, Publication pending, 2015
1712015
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
732015
Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE International Symposium on Technologies for Homeland Security, 2015
702015
The language of biometrics: Analysing public perceptions
O Buckley, JRC Nurse
Journal of Information Security and Applications 47, 112-119, 2019
442019
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
392014
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat
O Buckley, JRC Nurse, PA Legg, M Goldsmith, S Creese
Workshop on Socio-Technical Aspects in Security and Trust, 2014
222014
Reconstructing what you said: Text inference using smartphone motion
D Hodges, O Buckley
IEEE Transactions on Mobile Computing 18 (4), 947-959, 2018
162018
Deconstructing who you play: Character choice in online gaming
D Hodges, O Buckley
Entertainment Computing 27, 170-178, 2018
112018
Understanding Insider Threat: A Framework for Characterising Attacks, 2014 IEEE Security and Privacy Workshops URL: https://www. ieee-security. org/TC/SPW2014/papers/5103a214
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
PDF Start the discussion, 2014
112014
Towards supply chain 5.0: redesigning supply chains as resilient, sustainable, and human-centric systems in a post-pandemic world
A Villar, S Paladini, O Buckley
Operations Research Forum 4 (3), 60, 2023
102023
Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem
JRC Nurse, O Buckley
Human-centric Computing and Information Sciences 7, 1-21, 2017
92017
Visual analytics of e-mail sociolinguistics for user behavioural analysis.
PA Legg, O Buckley, M Goldsmith, S Creese
J. Internet Serv. Inf. Secur. 4 (4), 1-13, 2014
72014
Identifying soft biometric features from a combination of keystroke and mouse dynamics
S Earl, J Campbell, O Buckley
International Conference on Applied Human Factors and Ergonomics, 184-190, 2021
52021
Understanding insider threat attacks using natural language processing: Automatically mapping organic narrative reports to existing insider threat frameworks
K Paxton-Fear, D Hodges, O Buckley
International Conference on Human-Computer Interaction, 619-636, 2020
52020
CLICKA: Collecting and leveraging identity cues with keystroke dynamics
O Buckley, D Hodges, J Windle, S Earl
Computers & Security 120, 102780, 2022
42022
Efficient modelling of soft tissue using particle systems
O Buckley, NW John
Studies in Health Technology and Informatics 125, 55, 2007
32007
Investigating what you share: privacy perceptions of behavioural biometrics
S Earl, J Campbell, O Buckley
International Conference on Human-Computer Interaction, 408-415, 2021
22021
Its not all about the money: Self-efficacy and motivation in defensive and offensive cyber security professionals
D Hodges, O Buckley
Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017
22017
Computational requirements of the virtual patient
N John, CJ Hughes, S Pop, F Vidal, O Buckley
1st International Conference on Mathematical and Computational Biomedical …, 2009
22009
The system can't perform the operation now. Try again later.
Articles 1–20