Phil Legg
Phil Legg
Associate Professor in Cyber Security, University of the West of England
Verified email at uwe.ac.uk - Homepage
Title
Cited by
Cited by
Year
Understanding insider threat: A framework for characterising attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
2014 IEEE Security and Privacy Workshops, 214-228, 2014
1612014
Turn costs change the value of animal search paths
RP Wilson, IW Griffiths, PA Legg, MI Friswell, OR Bidder, LG Halsey, ...
Ecology Letters 16 (9), 1145-1150, 2013
802013
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Systems Journal, 2015
792015
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection.
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
742013
MatchPad: Interactive Glyph‐Based Visualization for Real‐Time Sports Performance Analysis
PA Legg, DHS Chung, ML Parry, MW Jones, R Long, IW Griffiths, M Chen
Computer Graphics Forum 31 (3pt4), 1255-1264, 2012
742012
Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation
PA Legg, PL Rosin, D Marshall, JE Morgan
Computerized Medical Imaging and Graphics 37 (7-8), 597-606, 2013
512013
Glyph sorting: Interactive visualization for multi-dimensional data
DHS Chung, PA Legg, ML Parry, R Bown, IW Griffiths, RS Laramee, ...
Information Visualization 14 (1), 76-90, 2015
462015
Improving accuracy and efficiency of registration by mutual information using Sturges’ histogram rule
PA Legg, PL Rosin, D Marshall, JE Morgan
Medical Imaging Understanding and Analysis, 26-30, 2007
412007
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
402015
Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Symposium on Technologies for Homeland Security 2015, 2015
392015
Visualizing the insider threat: challenges and tools for identifying malicious user activity
PA Legg
Visualization for Cyber Security (VizSec), 2015 IEEE Symposium on, 2015
352015
Feature Neighbourhood Mutual Information for multi-modal image registration: An application to eye fundus imaging
PA Legg, PL Rosin, D Marshall, JE Morgan
Pattern Recognition 48 (6), 1937-1946, 2015
342015
Hierarchical event selection for video storyboards with a case study on snooker video visualization
ML Parry, PA Legg, DHS Chung, IW Griffiths, M Chen
IEEE Transactions on Visualization and Computer Graphics 17 (12), 1747-1756, 2011
342011
Transformation of an uncertain video search pipeline to a sketch-based visual analytics loop
PA Legg, DHS Chung, ML Parry, R Bown, MW Jones, IW Griffiths, M Chen
IEEE transactions on Visualization and Computer Graphics 19 (12), 2109-2118, 2013
282013
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
International Conference on Human Aspects of Information Security, Privacy …, 2014
262014
A robust solution to multi-modal image registration by combining mutual information with multi-scale derivatives
PA Legg, PL Rosin, D Marshall, JE Morgan
International Conference on Medical Image Computing and Computer-Assisted …, 2009
242009
Using Internet Activity Profiling for Insider-Threat Detection
BA Alahmadi, PA Legg, JRC Nurse
Workshop on Security in Information Systems (WOSIS), 2015
202015
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat
O Buckley, JRC Nurse, PA Legg, M Goldsmith, S Creese
Workshop on Socio-Technical Aspects in Security and Trust (STAST) associated …, 2014
142014
Incorporating neighbourhood feature derivatives with mutual information to improve accuracy of multi-modal image registration
P Legg, P Rosin, D Marshall, J Morgan
Medical Imaging Understanding and Analysis, 39-43, 2008
112008
Knowledge-Assisted Ranking: A Visual Analytic Application for Sport Event Data
D Chung, P Legg, M Parry, R Bown, I Griffiths, R Laramee, M Chen
IEEE Computer Graphics and Applications 36 (3), 72-82, 2015
102015
The system can't perform the operation now. Try again later.
Articles 1–20