1. 2020
  2. Published

    Understanding Insider Threat Attacks using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks

    Paxton-Fear, K., Hodges, D. & Buckley, O., 2020, HCI for Cybersecurity, Privacy and Trust.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 2019
  4. Published

    The Language of Biometrics: Analysing Public Perceptions

    Buckley, O. & Nurse, J. RC., 1 Aug 2019, In : Journal of Information Security and Applications. 47, p. 112-119

    Research output: Contribution to journalArticle

  5. Published

    Reconstructing what you said: Text Inference using Smartphone Motion

    Hodges, D. & Buckley, O., 1 Apr 2019, In : IEEE Transactions on Mobile Computing. 18, 4, p. 947-959 13 p., 8401706.

    Research output: Contribution to journalArticle

  6. 2018
  7. Published

    Deconstructing who you play: Character choice in Online Gaming

    Hodges, D. & Buckley, O., Aug 2018, In : Entertainment Computing. 27, p. 170-178 9 p.

    Research output: Contribution to journalArticle

  8. 2017
  9. Published
  10. Published

    Automated Insider Threat Detection System Using User and Role-Based Profile Assessment

    Legg, P. A., Buckley, O., Goldsmith, M. & Creese, S., Jun 2017, In : IEEE Systems Journal. 11, 2, p. 503-512 10 p.

    Research output: Contribution to journalArticle

  11. Published

    Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals

    Hodges, D. & Buckley, O., 2017, International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS): HAS 2017: Human Aspects of Information Security, Privacy and Trust. Springer, Vol. 10292. p. 494-506 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Keystroke Inference Using Smartphone Kinematics

    Buckley, O., Hodges, D., Hadgkiss, M. & Morris, S., 2017, International Conference on Human Aspects of Information Security, Privacy, and Trust: HAS 2017: Human Aspects of Information Security, Privacy and Trust. Tryfonas, T. (ed.). Springer, Vol. 10292. p. 226-238 13 p. (Lecture Notes on Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. 2016
  14. Published

    Caught in the act of an insider attack: detection and assessment of insider threat

    Legg, P. A., Buckley, O., Goldsmith, M. & Creese, S., 4 Apr 2016, IEEE International Symposium on Technologies for Homeland Security. IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    User Identification Using Games

    Buckley, O. & Hodges, D., 2016, International Conference on Human Aspects of Information Security, Privacy, and Trust: HAS 2016: Human Aspects of Information Security, Privacy, and Trust. Tryfonas, T. (ed.). Springer, Vol. 9750. p. 3-14 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 Next

ID: 124599031