Follow
Phil Legg
Phil Legg
Professor in Cyber Security, University of the West of England
Verified email at uwe.ac.uk - Homepage
Title
Cited by
Cited by
Year
Understanding insider threat: A framework for characterising attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
2014 IEEE security and privacy workshops, 214-228, 2014
2852014
Automated insider threat detection system using user and role-based profile assessment
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Systems Journal 11 (2), 503-512, 2015
1762015
Turn costs change the value of animal search paths
RP Wilson, IW Griffiths, PA Legg, MI Friswell, OR Bidder, LG Halsey, ...
Ecology letters 16 (9), 1145-1150, 2013
1402013
MatchPad: Interactive Glyph‐Based Visualization for Real‐Time Sports Performance Analysis
PA Legg, DHS Chung, ML Parry, MW Jones, R Long, IW Griffiths, M Chen
Computer graphics forum 31 (3pt4), 1255-1264, 2012
1202012
Towards a conceptual model and reasoning structure for insider threat detection
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
1142013
Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation
PA Legg, PL Rosin, D Marshall, JE Morgan
Computerized Medical Imaging and Graphics 37 (7-8), 597-606, 2013
792013
Glyph sorting: Interactive visualization for multi-dimensional data
DHS Chung, PA Legg, ML Parry, R Bown, IW Griffiths, RS Laramee, ...
Information Visualization 14 (1), 76-90, 2015
742015
Visualizing the insider threat: challenges and tools for identifying malicious user activity
PA Legg
2015 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-7, 2015
732015
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
732015
Caught in the act of an insider attack: detection and assessment of insider threat
PA Legg, O Buckley, M Goldsmith, S Creese
2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015
702015
Hierarchical event selection for video storyboards with a case study on snooker video visualization
ML Parry, PA Legg, DHS Chung, IW Griffiths, M Chen
IEEE Transactions on Visualization and Computer Graphics 17 (12), 1747-1756, 2011
532011
Feature neighbourhood mutual information for multi-modal image registration: an application to eye fundus imaging
PA Legg, PL Rosin, D Marshall, JE Morgan
Pattern Recognition 48 (6), 1937-1946, 2015
482015
Improving accuracy and efficiency of registration by mutual information using Sturges’ histogram rule
PA Legg, PL Rosin, D Marshall, JE Morgan
Proc. Med. Image Understand. Anal, 26-30, 2007
442007
Deep learning‐based security behaviour analysis in IoT environments: a survey
Y Yue, S Li, P Legg, F Li
Security and communication Networks 2021 (1), 8873195, 2021
422021
Transformation of an uncertain video search pipeline to a sketch-based visual analytics loop
PA Legg, DHS Chung, ML Parry, R Bown, MW Jones, IW Griffiths, M Chen
IEEE transactions on Visualization and Computer Graphics 19 (12), 2109-2118, 2013
412013
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
402014
Using internet activity profiling for insider-threat detection
BA Alahmadi, PA Legg, JRC Nurse
Special Session on Security in Information Systems 2, 709-720, 2015
382015
Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey
A McCarthy, E Ghadafi, P Andriotis, P Legg
Journal of Cybersecurity and Privacy 2 (1), 154-190, 2022
312022
A robust solution to multi-modal image registration by combining mutual information with multi-scale derivatives
PA Legg, PL Rosin, D Marshall, JE Morgan
Medical Image Computing and Computer-Assisted Intervention–MICCAI 2009: 12th …, 2009
312009
Enhancing cyber situation awareness for non-expert users using visual analytics
PA Legg
2016 International Conference On Cyber Situational Awareness, Data Analytics …, 2016
272016
The system can't perform the operation now. Try again later.
Articles 1–20