Biography

Dr. Oli Buckley holds a BSc Computer from the University of Liverpool and a Ph.D. degree in Computer Science from the University of Wales, Bangor. Oli’s PhD, titled ‘Efficient Haptic and Visual Soft Tissue Deformation using a Particle-Based Approach’, focused on creating a soft tissue deformation model, using particle systems, which was both haptically and visually convincing. 

Following the completion of his PhD, he worked as a KTP Research Fellow at Oxford Brookes University in collaboration with Nominet. The project focused on identifying anomalous activity within Nominet’s WHOIS service. Additionally, Oli has worked as a software engineer across a variety of organisations including: Diamond Light Source, eMediaTrack and The National Trust developing a range of software such as web applications, cloud computing tools and virtualisation software.

After his time in industry he took a role as a postdoctoral researcher at the University of Oxford as part of the Cyber Security Centre. During this time he was a part of the Corporate Insider Threat Detection project. Oli was appointed as a lecturer at Cranfield University as part of Cranfield Defence and Security in 2014 where he was a member of the Information Operations research group. At the beginning of 2018 Oli was appointed as a Lecturer in Software Engineering at UEA. 

 

All Publications

Hodges, D., Buckley, O.

(2018)

Deconstructing who you play: Character choice in Online Gaming,

in Entertainment Computing

Full Text UEA Repository

(Article)

(E-pub ahead of print)


Nurse, J. R., Buckley, O.

(2017)

Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem,

in Human-Centric Computing and Information Sciences

7

(1)

article no. 40

Full Text UEA Repository

(Article)

(Published)


Legg, P. A., Buckley, O., Goldsmith, M., Creese, S.

(2017)

Automated Insider Threat Detection System Using User and Role-Based Profile Assessment,

in IEEE Systems Journal

11

(2)

pp. 503-512

Full Text UEA Repository

(Article)

(Published)


Buckley, O., Hodges, D., Hadgkiss, M., Morris, S.

(2017)

Keystroke Inference Using Smartphone Kinematics,

in International Conference on Human Aspects of Information Security, Privacy, and Trust : HAS 2017: Human Aspects of Information Security, Privacy and Trust.

Springer

pp. 226-238

ISBN 978-3-319-58459-1

Full Text UEA Repository

(Conference contribution)

(Published)


Hodges, D., Buckley, O.

(2017)

Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals,

in International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS) : HAS 2017: Human Aspects of Information Security, Privacy and Trust.

Springer

pp. 494-506

ISBN 978-3-319-58459-1

Full Text UEA Repository

(Conference contribution)

(Published)


Legg, P. A., Buckley, O., Goldsmith, M., Creese, S.

(2016)

Caught in the act of an insider attack: detection and assessment of insider threat,

in IEEE International Symposium on Technologies for Homeland Security.

IEEE Press

Full Text UEA Repository

(Conference contribution)

(Published)


Buckley, O., Hodges, D.

(2016)

User Identification Using Games,

in International Conference on Human Aspects of Information Security, Privacy, and Trust : HAS 2016: Human Aspects of Information Security, Privacy, and Trust.

Springer

pp. 3-14

ISBN 978-3-319-39380-3

Full Text UEA Repository

(Conference contribution)

(Published)


Agrafiotis, I., Nurse, J. R., Buckley, O., Legg, P., Creese, S., Goldsmith, M.

(2015)

Identifying attack patterns for insider threat detection,

in Computer Fraud & Security

2015

(7)

pp. 9-17

Full Text UEA Repository

(Article)

(Published)


Buckley, O., Nurse, J. R. C., Legg, P. A., Goldsmith, M., Creese, S.

(2014)

Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat,

in Workshop on Socio-Technical Aspects in Security and Trust.

IEEE Conference Publications

Full Text UEA Repository

(Conference contribution)

(Published)


Nurse, J. R., Buckley, O., Legg, P. A., Goldsmith, M., Creese, S., Wright, G. R., Whitty, M.

(2014)

Understanding Insider Threat: A Framework for Characterising Attacks,

in Security and Privacy Workshops (SPW), 2014 IEEE : IEEE Security & Privacy.

IEEE Press

pp. 214-228

Full Text UEA Repository

(Conference contribution)

(Published)


Legg, P., Buckley, O., Goldsmith, M., Creese, S.

(2014)

Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis,

in Journal of Internet Services and Information Security

4

(4)

Full Text UEA Repository

(Article)

(Published)


Nurse, J. R., Legg, P. A., Buckley, O., Agrafiotis, I., Wright, G., Whitty, M., Upton, D., Goldsmith, M., Creese, S.

(2014)

A Critical Reflection on the Threat from Human Insiders – Its Nature, Industry Perceptions, and Detection Approaches,

in International Conference on Human Aspects of Information Security, Privacy, and Trust : HAS 2014: Human Aspects of Information Security, Privacy, and Trust.

Springer

pp. 270-281

ISBN 978-3-319-07619-5

Full Text UEA Repository

(Conference contribution)

(Published)


John, N. W., Hughes, C. J., Pop, S. R., Vidal, F. P., Buckley, O.

(2009)

Computational Requirements of the Virtual Patient,

in CMBE09.

Full Text UEA Repository

(Conference contribution)

(Published)


Buckley, O., Hughes, C., John, N. W., Pop, S.

(2009)

Particle Methods for a Virtual Patient,

in First International Conference on Computational and Mathematical Biomedical Engineering.

pp. 144-148

Full Text UEA Repository

(Conference contribution)

(Published)


Buckley, O., John, N. W.

(2008)

Efficient Soft Tissue Deformation Using Charged Particles,

in Studies in Health Technology and Informatics

132

pp. 53-55

Full Text UEA Repository

(Article)

(Published)


Buckley, O., John, N. W.

(2007)

Efficient modelling of soft tissue using particle systems,

in Studies in Health Technology and Informatics

125

pp. 55-57

Full Text UEA Repository

(Article)

(Published)


Key Research Interests

Current research interests include cyber security, behavioural biometrics, digital identity, privacy, trust, data leakage, insider threat detection, and the application of machine learning and visualisation within cyber security. For any discussions around Oli’s research areas please get in touch via email (o.buckley@uea.ac.uk). Oli would welcome applications from potential PhD students with their own sources funding in any of the research areas mentioned.