Oliver Buckley : Publications
Journal papers
-
[1]
Efficient soft tissue deformation using charged particles.
Oliver Buckley and Nigel W John
In Studies in health technology and informatics. Vol. 132. Pages 53. 2008.
Details about Efficient soft tissue deformation using charged particles. | BibTeX data for Efficient soft tissue deformation using charged particles.
-
[2]
Efficient modelling of soft tissue using particle systems
Oliver Buckley and Nigel W John
In Stud Health Technol Inform. Vol. 125. Pages 55–57. 2007.
Details about Efficient modelling of soft tissue using particle systems | BibTeX data for Efficient modelling of soft tissue using particle systems
Conference papers
-
[1]
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat
Oliver Buckley‚ Jason R. C. Nurse‚ Philip A. Legg‚ Michael Goldsmith and Sadie Creese
In Workshop on Socio−Technical Aspects in Security and Trust (STAST) associated with 27th IEEE Computer Security Foundations Symposium (CSF). IEEE. 2014.
Details about Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | BibTeX data for Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | Download (pdf) of Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | DOI (10.1109/STAST.2014.10)
-
[2]
Understanding Insider Threat: A Framework for Characterising Attacks
Jason R.C. Nurse‚ Oliver Buckley‚ Philip A. Legg‚ Michael Goldsmith‚ Sadie Creese‚ Gordon R.T. Wright and Monica Whitty
In Workshop on Research for Insider Threat (WRIT) held as part of the IEEE Computer Society Security and Privacy Workshops (SPW14)‚ in conjunction with the IEEE Symposium on Security and Privacy (SP).. IEEE. 2014.
Details about Understanding Insider Threat: A Framework for Characterising Attacks | BibTeX data for Understanding Insider Threat: A Framework for Characterising Attacks | Download of Understanding Insider Threat: A Framework for Characterising Attacks | DOI (10.1109/SPW.2014.38) | Link to Understanding Insider Threat: A Framework for Characterising Attacks
-
[3]
A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches
Jason R.C. Nurse‚ Philip A. Legg‚ Oliver Buckley‚ Ioannis Agrafiotis‚ Gordon Wright‚ Monica Whitty‚ David Upton‚ Michael Goldsmith and Sadie Creese
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 16th International Conference on Human−Computer Interaction (HCI). Springer. 2014.
Details about A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | BibTeX data for A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | Download (pdf) of A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | DOI (10.1007/978-3-319-07620-1_24)
-
[4]
Computational Requirements of the Virtual Patient.
NW John‚ C Hughes‚ S Pop‚ FP Vidal and O Buckley
In CMBE09. First International Conference on Computational and Mathematical Biomedical Engineering (CMBE09)‚ Swansea June 2009.. 2009.
Details about Computational Requirements of the Virtual Patient. | BibTeX data for Computational Requirements of the Virtual Patient.
-
[5]
Particle Methods for a Virtual Patient.
O Buckley‚ C Hughes‚ NW John and S Pop
In CMBE09. First International Conference on Computational and Mathematical Biomedical Engineering (CMBE09)‚ Swansea June 2009.. 2009.
Details about Particle Methods for a Virtual Patient. | BibTeX data for Particle Methods for a Virtual Patient.