Follow
Phil Legg
Phil Legg
Professor in Cyber Security, University of the West of England
Verified email at uwe.ac.uk - Homepage
Title
Cited by
Cited by
Year
Understanding insider threat: A framework for characterising attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
2014 IEEE security and privacy workshops, 214-228, 2014
2862014
Automated insider threat detection system using user and role-based profile assessment
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Systems Journal 11 (2), 503-512, 2015
1762015
Turn costs change the value of animal search paths
RP Wilson, IW Griffiths, PA Legg, MI Friswell, OR Bidder, LG Halsey, ...
Ecology letters 16 (9), 1145-1150, 2013
1402013
MatchPad: Interactive Glyph‐Based Visualization for Real‐Time Sports Performance Analysis
PA Legg, DHS Chung, ML Parry, MW Jones, R Long, IW Griffiths, M Chen
Computer graphics forum 31 (3pt4), 1255-1264, 2012
1202012
Towards a conceptual model and reasoning structure for insider threat detection
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
1142013
Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation
PA Legg, PL Rosin, D Marshall, JE Morgan
Computerized Medical Imaging and Graphics 37 (7-8), 597-606, 2013
802013
Glyph sorting: Interactive visualization for multi-dimensional data
DHS Chung, PA Legg, ML Parry, R Bown, IW Griffiths, RS Laramee, ...
Information Visualization 14 (1), 76-90, 2015
742015
Visualizing the insider threat: challenges and tools for identifying malicious user activity
PA Legg
2015 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-7, 2015
732015
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
732015
Caught in the act of an insider attack: detection and assessment of insider threat
PA Legg, O Buckley, M Goldsmith, S Creese
2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015
702015
Hierarchical event selection for video storyboards with a case study on snooker video visualization
ML Parry, PA Legg, DHS Chung, IW Griffiths, M Chen
IEEE Transactions on Visualization and Computer Graphics 17 (12), 1747-1756, 2011
532011
Feature neighbourhood mutual information for multi-modal image registration: an application to eye fundus imaging
PA Legg, PL Rosin, D Marshall, JE Morgan
Pattern Recognition 48 (6), 1937-1946, 2015
482015
Improving accuracy and efficiency of registration by mutual information using Sturges’ histogram rule
PA Legg, PL Rosin, D Marshall, JE Morgan
Proc. Med. Image Understand. Anal, 26-30, 2007
442007
Deep learning‐based security behaviour analysis in IoT environments: a survey
Y Yue, S Li, P Legg, F Li
Security and communication Networks 2021 (1), 8873195, 2021
422021
Transformation of an uncertain video search pipeline to a sketch-based visual analytics loop
PA Legg, DHS Chung, ML Parry, R Bown, MW Jones, IW Griffiths, M Chen
IEEE transactions on Visualization and Computer Graphics 19 (12), 2109-2118, 2013
412013
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
402014
Using internet activity profiling for insider-threat detection
BA Alahmadi, PA Legg, JRC Nurse
Special Session on Security in Information Systems 2, 709-720, 2015
382015
Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey
A McCarthy, E Ghadafi, P Andriotis, P Legg
Journal of Cybersecurity and Privacy 2 (1), 154-190, 2022
312022
A robust solution to multi-modal image registration by combining mutual information with multi-scale derivatives
PA Legg, PL Rosin, D Marshall, JE Morgan
Medical Image Computing and Computer-Assisted Intervention–MICCAI 2009: 12th …, 2009
312009
Efficient and interpretable real-time malware detection using random-forest
A Mills, T Spyridopoulos, P Legg
International conference on Cyber Situational Awareness, Data Analytics and …, 2019
272019
The system can't perform the operation now. Try again later.
Articles 1–20