Phil Legg
Phil Legg
Professor in Cyber Security, University of the West of England
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Understanding insider threat: A framework for characterising attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
2014 IEEE security and privacy workshops, 214-228, 2014
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Systems Journal, 2015
Turn costs change the value of animal search paths
RP Wilson, IW Griffiths, PA Legg, MI Friswell, OR Bidder, LG Halsey, ...
Ecology letters 16 (9), 1145-1150, 2013
MatchPad: Interactive Glyph‐Based Visualization for Real‐Time Sports Performance Analysis
PA Legg, DHS Chung, ML Parry, MW Jones, R Long, IW Griffiths, M Chen
Computer graphics forum 31 (3pt4), 1255-1264, 2012
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection.
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation
PA Legg, PL Rosin, D Marshall, JE Morgan
Computerized Medical Imaging and Graphics 37 (7-8), 597-606, 2013
Glyph sorting: Interactive visualization for multi-dimensional data
DHS Chung, PA Legg, ML Parry, R Bown, IW Griffiths, RS Laramee, ...
Information Visualization 14 (1), 76-90, 2015
Visualizing the insider threat: challenges and tools for identifying malicious user activity
PA Legg
Visualization for Cyber Security (VizSec), 2015 IEEE Symposium on, 2015
Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Symposium on Technologies for Homeland Security 2015, 2015
Feature Neighbourhood Mutual Information for multi-modal image registration: An application to eye fundus imaging
PA Legg, PL Rosin, D Marshall, JE Morgan
Pattern Recognition 48 (6), 1937-1946, 2015
Hierarchical event selection for video storyboards with a case study on snooker video visualization
ML Parry, PA Legg, DHS Chung, IW Griffiths, M Chen
IEEE Transactions on Visualization and Computer Graphics 17 (12), 1747-1756, 2011
Improving accuracy and efficiency of registration by mutual information using Sturges’ histogram rule
PA Legg, PL Rosin, D Marshall, JE Morgan
Medical Imaging Understanding and Analysis, 26-30, 2007
Transformation of an uncertain video search pipeline to a sketch-based visual analytics loop
PA Legg, DHS Chung, ML Parry, R Bown, MW Jones, IW Griffiths, M Chen
IEEE transactions on Visualization and Computer Graphics 19 (12), 2109-2118, 2013
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
International Conference on Human Aspects of Information Security, Privacy …, 2014
A robust solution to multi-modal image registration by combining mutual information with multi-scale derivatives
PA Legg, PL Rosin, D Marshall, JE Morgan
International Conference on Medical Image Computing and Computer-Assisted …, 2009
Using Internet Activity Profiling for Insider-Threat Detection
BA Alahmadi, PA Legg, JRC Nurse
Workshop on Security in Information Systems (WOSIS), 2015
Enhancing Cyber Situation Awareness for Non-Expert Users using Visual Analytics
PA Legg
International conference on Cyber Situational Awareness, Data Analytics and …, 2016
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat
O Buckley, JRC Nurse, PA Legg, M Goldsmith, S Creese
Workshop on Socio-Technical Aspects in Security and Trust (STAST) associated …, 2014
Venue2vec: An efficient embedding model for fine-grained user location prediction in geo-social networks
S Xu, J Cao, P Legg, B Liu, S Li
IEEE Systems Journal 14 (2), 1740-1751, 2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20