1. 2019
  2. Published

    The Language of Biometrics: Analysing Public Perceptions

    Buckley, O. & Nurse, J. RC., 1 Aug 2019, In : Journal of Information Security and Applications. 47, p. 112-119

    Research output: Contribution to journalArticle

  3. Published

    Reconstructing what you said: Text Inference using Smartphone Motion

    Hodges, D. & Buckley, O., 1 Apr 2019, In : IEEE Transactions on Mobile Computing. 18, 4, p. 947-959

    Research output: Contribution to journalArticle

  4. 2018
  5. Published

    Deconstructing who you play: Character choice in Online Gaming

    Hodges, D. & Buckley, O., Aug 2018, In : Entertainment Computing. 27, p. 170-178 9 p.

    Research output: Contribution to journalArticle

  6. 2017
  7. Published
  8. Published

    Automated Insider Threat Detection System Using User and Role-Based Profile Assessment

    Legg, P. A., Buckley, O., Goldsmith, M. & Creese, S., Jun 2017, In : IEEE Systems Journal. 11, 2, p. 503-512 10 p.

    Research output: Contribution to journalArticle

  9. Published

    Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals

    Hodges, D. & Buckley, O., 2017, International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS): HAS 2017: Human Aspects of Information Security, Privacy and Trust. Springer, Vol. 10292. p. 494-506 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Keystroke Inference Using Smartphone Kinematics

    Buckley, O., Hodges, D., Hadgkiss, M. & Morris, S., 2017, International Conference on Human Aspects of Information Security, Privacy, and Trust: HAS 2017: Human Aspects of Information Security, Privacy and Trust. Tryfonas, T. (ed.). Springer, Vol. 10292. p. 226-238 13 p. (Lecture Notes on Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. 2016
  12. Published

    Caught in the act of an insider attack: detection and assessment of insider threat

    Legg, P. A., Buckley, O., Goldsmith, M. & Creese, S., 4 Apr 2016, IEEE International Symposium on Technologies for Homeland Security. IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    User Identification Using Games

    Buckley, O. & Hodges, D., 2016, International Conference on Human Aspects of Information Security, Privacy, and Trust: HAS 2016: Human Aspects of Information Security, Privacy, and Trust. Tryfonas, T. (ed.). Springer, Vol. 9750. p. 3-14 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. 2015
  15. Published

    Identifying attack patterns for insider threat detection

    Agrafiotis, I., Nurse, J. RC., Buckley, O., Legg, P., Creese, S. & Goldsmith, M., Jul 2015, In : Computer Fraud & Security. 2015, 7, p. 9-17 9 p.

    Research output: Contribution to journalArticle

Previous 1 2 Next

ID: 124599031