Theo dõi
Phil Legg
Phil Legg
Professor in Cyber Security, University of the West of England
Email được xác minh tại uwe.ac.uk - Trang chủ
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Understanding insider threat: A framework for characterising attacks
JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ...
2014 IEEE security and privacy workshops, 214-228, 2014
3082014
Automated insider threat detection system using user and role-based profile assessment
PA Legg, O Buckley, M Goldsmith, S Creese
IEEE Systems Journal 11 (2), 503-512, 2015
1912015
Turn costs change the value of animal search paths
RP Wilson, IW Griffiths, PA Legg, MI Friswell, OR Bidder, LG Halsey, ...
Ecology letters 16 (9), 1145-1150, 2013
1502013
MatchPad: Interactive Glyph‐Based Visualization for Real‐Time Sports Performance Analysis
PA Legg, DHS Chung, ML Parry, MW Jones, R Long, IW Griffiths, M Chen
Computer graphics forum 31 (3pt4), 1255-1264, 2012
1292012
Towards a conceptual model and reasoning structure for insider threat detection
PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ...
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013
1182013
Identifying attack patterns for insider threat detection
I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith
Computer Fraud & Security 2015 (7), 9-17, 2015
832015
Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation
PA Legg, PL Rosin, D Marshall, JE Morgan
Computerized Medical Imaging and Graphics 37 (7-8), 597-606, 2013
832013
Glyph sorting: Interactive visualization for multi-dimensional data
DHS Chung, PA Legg, ML Parry, R Bown, IW Griffiths, RS Laramee, ...
Information Visualization 14 (1), 76-90, 2015
802015
Caught in the act of an insider attack: detection and assessment of insider threat
PA Legg, O Buckley, M Goldsmith, S Creese
2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015
762015
Visualizing the insider threat: challenges and tools for identifying malicious user activity
PA Legg
2015 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-7, 2015
742015
Hierarchical event selection for video storyboards with a case study on snooker video visualization
ML Parry, PA Legg, DHS Chung, IW Griffiths, M Chen
IEEE Transactions on Visualization and Computer Graphics 17 (12), 1747-1756, 2011
552011
Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey
A McCarthy, E Ghadafi, P Andriotis, P Legg
Journal of Cybersecurity and Privacy 2 (1), 154-190, 2022
532022
Deep Learning‐Based Security Behaviour Analysis in IoT Environments: A Survey
Y Yue, S Li, P Legg, F Li
Security and communication Networks 2021 (1), 8873195, 2021
532021
Feature neighbourhood mutual information for multi-modal image registration: an application to eye fundus imaging
PA Legg, PL Rosin, D Marshall, JE Morgan
Pattern Recognition 48 (6), 1937-1946, 2015
522015
Improving accuracy and efficiency of registration by mutual information using Sturges’ histogram rule
PA Legg, PL Rosin, D Marshall, JE Morgan
Proc. Med. Image Understand. Anal, 26-30, 2007
482007
Using internet activity profiling for insider-threat detection
BA Alahmadi, PA Legg, JRC Nurse
Special Session on Security in Information Systems 2, 709-720, 2015
432015
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ...
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
432014
Transformation of an uncertain video search pipeline to a sketch-based visual analytics loop
PA Legg, DHS Chung, ML Parry, R Bown, MW Jones, IW Griffiths, M Chen
IEEE transactions on Visualization and Computer Graphics 19 (12), 2109-2118, 2013
432013
Investigating anti-evasion malware triggers using automated sandbox reconfiguration techniques
A Mills, P Legg
Journal of Cybersecurity and Privacy 1 (1), 19-39, 2020
352020
Efficient and interpretable real-time malware detection using random-forest
A Mills, T Spyridopoulos, P Legg
International conference on Cyber Situational Awareness, Data Analytics and …, 2019
342019
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20