Follow
Phil Legg
Phil Legg
Professor in Cyber Security, University of the West of England
Verified email at uwe.ac.uk - Homepage
Title
Cited by
Cited by
Year
Understanding insider threat: A framework for characterising attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
2014 IEEE security and privacy workshops, 214-228, 2014
2252014
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Systems Journal, 2015
1292015
Turn costs change the value of animal search paths
RP Wilson, IW Griffiths, PA Legg, MI Friswell, OR Bidder, LG Halsey, ...
Ecology letters 16 (9), 1145-1150, 2013
1162013
MatchPad: Interactive Glyph‐Based Visualization for Real‐Time Sports Performance Analysis
PA Legg, DHS Chung, ML Parry, MW Jones, R Long, IW Griffiths, M Chen
Computer graphics forum 31 (3pt4), 1255-1264, 2012
972012
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection.
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
962013
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
622015
Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation
PA Legg, PL Rosin, D Marshall, JE Morgan
Computerized Medical Imaging and Graphics 37 (7-8), 597-606, 2013
622013
Glyph sorting: Interactive visualization for multi-dimensional data
DHS Chung, PA Legg, ML Parry, R Bown, IW Griffiths, RS Laramee, ...
Information Visualization 14 (1), 76-90, 2015
602015
Visualizing the insider threat: challenges and tools for identifying malicious user activity
PA Legg
Visualization for Cyber Security (VizSec), 2015 IEEE Symposium on, 2015
572015
Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Symposium on Technologies for Homeland Security 2015, 2015
512015
Feature Neighbourhood Mutual Information for multi-modal image registration: An application to eye fundus imaging
PA Legg, PL Rosin, D Marshall, JE Morgan
Pattern Recognition 48 (6), 1937-1946, 2015
452015
Hierarchical event selection for video storyboards with a case study on snooker video visualization
ML Parry, PA Legg, DHS Chung, IW Griffiths, M Chen
IEEE Transactions on Visualization and Computer Graphics 17 (12), 1747-1756, 2011
452011
Improving accuracy and efficiency of registration by mutual information using Sturges’ histogram rule
PA Legg, PL Rosin, D Marshall, JE Morgan
Medical Imaging Understanding and Analysis, 26-30, 2007
392007
Transformation of an uncertain video search pipeline to a sketch-based visual analytics loop
PA Legg, DHS Chung, ML Parry, R Bown, MW Jones, IW Griffiths, M Chen
IEEE transactions on Visualization and Computer Graphics 19 (12), 2109-2118, 2013
362013
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
International Conference on Human Aspects of Information Security, Privacy …, 2014
312014
A robust solution to multi-modal image registration by combining mutual information with multi-scale derivatives
PA Legg, PL Rosin, D Marshall, JE Morgan
International Conference on Medical Image Computing and Computer-Assisted …, 2009
292009
Using Internet Activity Profiling for Insider-Threat Detection
BA Alahmadi, PA Legg, JRC Nurse
Workshop on Security in Information Systems (WOSIS), 2015
262015
Enhancing Cyber Situation Awareness for Non-Expert Users using Visual Analytics
PA Legg
International conference on Cyber Situational Awareness, Data Analytics and …, 2016
232016
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat
O Buckley, JRC Nurse, PA Legg, M Goldsmith, S Creese
Workshop on Socio-Technical Aspects in Security and Trust (STAST) associated …, 2014
192014
Knowledge-Assisted Ranking: A Visual Analytic Application for Sport Event Data
D Chung, P Legg, M Parry, R Bown, I Griffiths, R Laramee, M Chen
IEEE Computer Graphics and Applications 36 (3), 72-82, 2015
152015
The system can't perform the operation now. Try again later.
Articles 1–20