Follow
Phil Legg
Phil Legg
Professor in Cyber Security, University of the West of England
Verified email at uwe.ac.uk - Homepage
Title
Cited by
Cited by
Year
Understanding insider threat: A framework for characterising attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
2014 IEEE security and privacy workshops, 214-228, 2014
2852014
Automated insider threat detection system using user and role-based profile assessment
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Systems Journal 11 (2), 503-512, 2015
1672015
Turn costs change the value of animal search paths
RP Wilson, IW Griffiths, PA Legg, MI Friswell, OR Bidder, LG Halsey, ...
Ecology letters 16 (9), 1145-1150, 2013
1342013
MatchPad: Interactive Glyph‐Based Visualization for Real‐Time Sports Performance Analysis
PA Legg, DHS Chung, ML Parry, MW Jones, R Long, IW Griffiths, M Chen
Computer graphics forum 31 (3pt4), 1255-1264, 2012
1162012
Towards a conceptual model and reasoning structure for insider threat detection
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
1132013
Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation
PA Legg, PL Rosin, D Marshall, JE Morgan
Computerized Medical Imaging and Graphics 37 (7-8), 597-606, 2013
762013
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
742015
Visualizing the insider threat: challenges and tools for identifying malicious user activity
PA Legg
2015 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-7, 2015
732015
Glyph sorting: Interactive visualization for multi-dimensional data
DHS Chung, PA Legg, ML Parry, R Bown, IW Griffiths, RS Laramee, ...
Information Visualization 14 (1), 76-90, 2015
722015
Caught in the act of an insider attack: detection and assessment of insider threat
PA Legg, O Buckley, M Goldsmith, S Creese
2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015
692015
Hierarchical event selection for video storyboards with a case study on snooker video visualization
ML Parry, PA Legg, DHS Chung, IW Griffiths, M Chen
IEEE Transactions on Visualization and Computer Graphics 17 (12), 1747-1756, 2011
532011
Feature neighbourhood mutual information for multi-modal image registration: an application to eye fundus imaging
PA Legg, PL Rosin, D Marshall, JE Morgan
Pattern Recognition 48 (6), 1937-1946, 2015
482015
Improving accuracy and efficiency of registration by mutual information using Sturges’ histogram rule
PA Legg, PL Rosin, D Marshall, JE Morgan
Proc. Med. Image Understand. Anal, 26-30, 2007
432007
Transformation of an uncertain video search pipeline to a sketch-based visual analytics loop
PA Legg, DHS Chung, ML Parry, R Bown, MW Jones, IW Griffiths, M Chen
IEEE transactions on Visualization and Computer Graphics 19 (12), 2109-2118, 2013
402013
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
392014
Using internet activity profiling for insider-threat detection
BA Alahmadi, PA Legg, JRC Nurse
Special Session on Security in Information Systems 2, 709-720, 2015
382015
Deep learning-based security behaviour analysis in IoT environments: A survey
Y Yue, S Li, P Legg, F Li
Security and communication Networks 2021, 1-13, 2021
352021
A robust solution to multi-modal image registration by combining mutual information with multi-scale derivatives
PA Legg, PL Rosin, D Marshall, JE Morgan
Medical Image Computing and Computer-Assisted Intervention–MICCAI 2009: 12th …, 2009
302009
Enhancing cyber situation awareness for non-expert users using visual analytics
PA Legg
2016 International Conference On Cyber Situational Awareness, Data Analytics …, 2016
272016
Investigating anti-evasion malware triggers using automated sandbox reconfiguration techniques
A Mills, P Legg
Journal of Cybersecurity and Privacy 1 (1), 19-39, 2020
252020
The system can't perform the operation now. Try again later.
Articles 1–20