Phil Legg
Phil Legg
Associate Professor in Cyber Security, University of the West of England
Verified email at uwe.ac.uk - Homepage
TitleCited byYear
Understanding insider threat: A framework for characterising attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
2014 IEEE Security and Privacy Workshops, 214-228, 2014
1442014
Turn costs change the value of animal search paths
RP Wilson, IW Griffiths, PA Legg, MI Friswell, OR Bidder, LG Halsey, ...
Ecology Letters 16 (9), 1145-1150, 2013
732013
MatchPad: Interactive Glyph‐Based Visualization for Real‐Time Sports Performance Analysis
PA Legg, DHS Chung, ML Parry, MW Jones, R Long, IW Griffiths, M Chen
Computer Graphics Forum 31 (3pt4), 1255-1264, 2012
732012
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection.
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
692013
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Systems Journal, 2015
662015
Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation
PA Legg, PL Rosin, D Marshall, JE Morgan
Computerized Medical Imaging and Graphics 37 (7-8), 597-606, 2013
482013
Glyph sorting: Interactive visualization for multi-dimensional data
DHS Chung, PA Legg, ML Parry, R Bown, IW Griffiths, RS Laramee, ...
Information Visualization 14 (1), 76-90, 2015
442015
Improving accuracy and efficiency of registration by mutual information using Sturges’ histogram rule
PA Legg, PL Rosin, D Marshall, JE Morgan
Medical Imaging Understanding and Analysis, 26-30, 2007
39*2007
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
372015
Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Symposium on Technologies for Homeland Security 2015, 2015
352015
Visualizing the insider threat: challenges and tools for identifying malicious user activity
PA Legg
Visualization for Cyber Security (VizSec), 2015 IEEE Symposium on, 2015
342015
Hierarchical event selection for video storyboards with a case study on snooker video visualization
ML Parry, PA Legg, DHS Chung, IW Griffiths, M Chen
IEEE Transactions on Visualization and Computer Graphics 17 (12), 1747-1756, 2011
332011
Feature Neighbourhood Mutual Information for multi-modal image registration: An application to eye fundus imaging
PA Legg, PL Rosin, D Marshall, JE Morgan
Pattern Recognition 48 (6), 1937-1946, 2015
282015
Transformation of an uncertain video search pipeline to a sketch-based visual analytics loop
PA Legg, DHS Chung, ML Parry, R Bown, MW Jones, IW Griffiths, M Chen
IEEE transactions on Visualization and Computer Graphics 19 (12), 2109-2118, 2013
272013
A robust solution to multi-modal image registration by combining mutual information with multi-scale derivatives
PA Legg, PL Rosin, D Marshall, JE Morgan
International Conference on Medical Image Computing and Computer-Assisted …, 2009
232009
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
International Conference on Human Aspects of Information Security, Privacy …, 2014
222014
Using Internet Activity Profiling for Insider-Threat Detection
BA Alahmadi, PA Legg, JRC Nurse
Workshop on Security in Information Systems (WOSIS), 2015
172015
Incorporating neighbourhood feature derivatives with mutual information to improve accuracy of multi-modal image registration
P Legg, P Rosin, D Marshall, J Morgan
Medical Imaging Understanding and Analysis, 39-43, 2008
112008
Intelligent filtering by semantic importance for single-view 3D reconstruction from Snooker video
PA Legg, ML Parry, DHS Chung, RM Jiang, A Morris, IW Griffiths, ...
2011 18th IEEE International Conference on Image Processing, 2385-2388, 2011
102011
Enhancing Cyber Situation Awareness for Non-Expert Users using Visual Analytics
PA Legg
International conference on Cyber Situational Awareness, Data Analytics and …, 2016
92016
The system can't perform the operation now. Try again later.
Articles 1–20