Phil Legg
Phil Legg
Associate Professor in Cyber Security, University of the West of England
Verified email at - Homepage
TitleCited byYear
Understanding insider threat: A framework for characterising attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
2014 IEEE Security and Privacy Workshops, 214-228, 2014
Turn costs change the value of animal search paths
RP Wilson, IW Griffiths, PA Legg, MI Friswell, OR Bidder, LG Halsey, ...
Ecology Letters 16 (9), 1145-1150, 2013
MatchPad: Interactive Glyph‐Based Visualization for Real‐Time Sports Performance Analysis
PA Legg, DHS Chung, ML Parry, MW Jones, R Long, IW Griffiths, M Chen
Computer Graphics Forum 31 (3pt4), 1255-1264, 2012
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection.
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Systems Journal, 2015
Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation
PA Legg, PL Rosin, D Marshall, JE Morgan
Computerized Medical Imaging and Graphics 37 (7-8), 597-606, 2013
Glyph sorting: Interactive visualization for multi-dimensional data
DHS Chung, PA Legg, ML Parry, R Bown, IW Griffiths, RS Laramee, ...
Information Visualization 14 (1), 76-90, 2015
Improving accuracy and efficiency of registration by mutual information using Sturges’ histogram rule
PA Legg, PL Rosin, D Marshall, JE Morgan
Medical Imaging Understanding and Analysis, 26-30, 2007
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Symposium on Technologies for Homeland Security 2015, 2015
Visualizing the insider threat: challenges and tools for identifying malicious user activity
PA Legg
Visualization for Cyber Security (VizSec), 2015 IEEE Symposium on, 2015
Hierarchical event selection for video storyboards with a case study on snooker video visualization
ML Parry, PA Legg, DHS Chung, IW Griffiths, M Chen
IEEE Transactions on Visualization and Computer Graphics 17 (12), 1747-1756, 2011
Feature Neighbourhood Mutual Information for multi-modal image registration: An application to eye fundus imaging
PA Legg, PL Rosin, D Marshall, JE Morgan
Pattern Recognition 48 (6), 1937-1946, 2015
Transformation of an uncertain video search pipeline to a sketch-based visual analytics loop
PA Legg, DHS Chung, ML Parry, R Bown, MW Jones, IW Griffiths, M Chen
IEEE transactions on Visualization and Computer Graphics 19 (12), 2109-2118, 2013
A robust solution to multi-modal image registration by combining mutual information with multi-scale derivatives
PA Legg, PL Rosin, D Marshall, JE Morgan
International Conference on Medical Image Computing and Computer-Assisted …, 2009
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
International Conference on Human Aspects of Information Security, Privacy …, 2014
Using Internet Activity Profiling for Insider-Threat Detection
BA Alahmadi, PA Legg, JRC Nurse
Workshop on Security in Information Systems (WOSIS), 2015
Incorporating neighbourhood feature derivatives with mutual information to improve accuracy of multi-modal image registration
P Legg, P Rosin, D Marshall, J Morgan
Medical Imaging Understanding and Analysis, 39-43, 2008
Intelligent filtering by semantic importance for single-view 3D reconstruction from Snooker video
PA Legg, ML Parry, DHS Chung, RM Jiang, A Morris, IW Griffiths, ...
2011 18th IEEE International Conference on Image Processing, 2385-2388, 2011
Enhancing Cyber Situation Awareness for Non-Expert Users using Visual Analytics
PA Legg
International conference on Cyber Situational Awareness, Data Analytics and …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20