default search action
Philip A. Legg
Person information
- affiliation: University of the West of England, Bristol, Department of Computer Science
- affiliation: University of Oxford, Department of Computer Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Sadegh Bamohabbat Chafjiri, Phil Legg, Jun Hong, Michail-Antisthenis I. Tsompanas:
Vulnerability detection through machine learning-based fuzzing: A systematic review. Comput. Secur. 143: 103903 (2024) - [j27]Alan Mills, Jonathan White, Phil Legg:
GoibhniUWE: A Lightweight and Modular Container-Based Cyber Range. J. Cybersecur. Priv. 4(3): 615-628 (2024) - [c25]James Barrett, Phil Legg, Jim Smith, Chip Boyle:
Analyst-Driven XAI for Time Series Forecasting: Analytics for Telecoms Maintenance. ICMLT 2024: 30-35 - [c24]Alan Mills, Jonathan White, Phil Legg:
Cyber Funfair: Creating Immersive and Educational Experiences for Teaching Cyber Physical Systems Security. SIGCSE (1) 2024: 847-852 - [i3]Shakil Ibne Ahsan, Phil Legg, S. M. Iftekharul Alam:
Privacy-Preserving Intrusion Detection in Software-defined VANET using Federated Learning with BERT. CoRR abs/2401.07343 (2024) - 2023
- [j26]Alan Mills, Jonathan White, Phil Legg:
Longitudinal risk-based security assessment of docker software container images. Comput. Secur. 135: 103478 (2023) - [j25]Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis, Phil Legg:
Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification. J. Inf. Secur. Appl. 72: 103398 (2023) - [i2]Shakil Ibne Ahsan, Phil Legg, S. M. Iftekharul Alam:
A stacked ensemble learning IDS model for Software-defined VANET. CoRR abs/2312.04956 (2023) - 2022
- [j24]Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis, Phil Legg:
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey. J. Cybersecur. Priv. 2(1): 154-190 (2022) - [j23]Jacob Williams, Phil Legg:
Investigating Malware Propagation and Behaviour Using System and Network Pixel-Based Visualisation. SN Comput. Sci. 3(1): 53 (2022) - [c23]Alan Mills, Jonathan White, Phil Legg:
OGMA: Visualisation for Software Container Security Analysis and Automated Remediation. CSR 2022: 76-81 - 2021
- [j22]Yawei Yue, Shancang Li, Phil Legg, Fuzhong Li:
Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey. Secur. Commun. Networks 2021: 8873195:1-8873195:13 (2021) - [c22]Phil Legg, Thomas Higgs, Pennie Spruhan, Jonathan White, Ian Johnson:
"Hacking an IoT Home": New opportunities for cyber security education combining remote learning with cyber-physical systems. CyberSA 2021: 1-4 - [c21]Andrew McCarthy, Panagiotis Andriotis, Essam Ghadafi, Phil Legg:
Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks. CyberSA 2021: 1-8 - [c20]Jonathan White, Phil Legg:
Unsupervised One-Class Learning for Anomaly Detection on Home IoT Network Devices. CyberSA 2021: 1-8 - 2020
- [j21]Alan Mills, Phil Legg:
Investigating Anti-Evasion Malware Triggers Using Automated Sandbox Reconfiguration Techniques. J. Cybersecur. Priv. 1(1): 19-39 (2020) - [j20]Shuai Xu, Jiuxin Cao, Phil Legg, Bo Liu, Shancang Li:
Venue2Vec: An Efficient Embedding Model for Fine-Grained User Location Prediction in Geo-Social Networks. IEEE Syst. J. 14(2): 1740-1751 (2020) - [c19]Fiona Carroll, Phil Legg, Bastian Bønkel:
The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User. CyberSA 2020: 1-7 - [c18]Andrew McCarthy, Benedict R. Gaster, Phil Legg:
Shouting Through Letterboxes: A study on attack susceptibility of voice assistants. Cyber Security 2020: 1-8 - [c17]Gwyn Wilkinson, Phil Legg:
"What did you say?": Extracting unintentional secrets from predictive text learning systems. Cyber Security 2020: 1-8
2010 – 2019
- 2019
- [j19]Phil Legg, Jim Smith, Alexander Downing:
Visual analytics for collaborative human-machine confidence in human-centric active learning tasks. Hum. centric Comput. Inf. Sci. 9: 5 (2019) - [j18]Phil Legg, Jim Smith, Alexander Downing:
Correction to: Visual analytics for collaborative human-machine confidence in human-centric active learning tasks. Hum. centric Comput. Inf. Sci. 9: 11 (2019) - [c16]Fiona Carroll, Adam Chakof, Phil Legg:
What Makes for Effective Visualisation in Cyber Situational Awareness for Non-Expert Users? CyberSA 2019: 1-8 - [c15]Phil Legg, Tim Blackman:
Tools and Techniques for Improving Cyber Situational Awareness of Targeted Phishing Attacks. CyberSA 2019: 1-4 - [c14]Alan Mills, Theodoros Spyridopoulos, Phil Legg:
Efficient and Interpretable Real-Time Malware Detection Using Random-Forest. CyberSA 2019: 1-8 - 2018
- [j17]Jim Smith, Phil Legg, Milos Matovic, Kristofer Kinsey:
Predicting User Confidence During Visual Decision Making. ACM Trans. Interact. Intell. Syst. 8(2): 10:1-10:30 (2018) - 2017
- [j16]Philip A. Legg, Eamonn Maguire, Simon J. Walton, Min Chen:
Glyph Visualization: A Fail-Safe Design Scheme Based on Quasi-Hamming Distances. IEEE Computer Graphics and Applications 37(2): 31-41 (2017) - [j15]Philip A. Legg, Oliver Buckley, Michael Goldsmith, Sadie Creese:
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment. IEEE Syst. J. 11(2): 503-512 (2017) - [c13]Arnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese, Philip A. Legg:
RicherPicture: Semi-automated cyber defence using context-aware data analytics. CyberSA 2017: 1-8 - [c12]Emmanuel M. Smith, Jim Smith, Phil Legg, Simon Francis:
Predicting the Occurrence of World News Events Using Recurrent Neural Networks and Auto-Regressive Moving Average Models. UKCI 2017: 191-202 - 2016
- [j14]David H. S. Chung, Matthew L. Parry, Iwan W. Griffiths, Robert S. Laramee, Rhodri Bown, Philip A. Legg, Min Chen:
Knowledge-Assisted Ranking: A Visual Analytic Application for Sports Event Data. IEEE Computer Graphics and Applications 36(3): 72-82 (2016) - [j13]Philip A. Legg:
Visual Analytics for Non-Expert Users in Cyber Situation Awareness. Int. J. Cyber Situational Aware. 1(1): 54-73 (2016) - [c11]Philip A. Legg:
Enhancing cyber situation awareness for Non-Expert Users using visual analytics. CyberSA 2016: 1-8 - 2015
- [j12]David H. S. Chung, Philip A. Legg, Matthew L. Parry, Rhodri Bown, Iwan W. Griffiths, Robert S. Laramee, Min Chen:
Glyph sorting: Interactive visualization for multi-dimensional data. Inf. Vis. 14(1): 76-90 (2015) - [j11]Philip A. Legg, Paul L. Rosin, A. David Marshall, James E. Morgan:
Feature Neighbourhood Mutual Information for multi-modal image registration: An application to eye fundus imaging. Pattern Recognit. 48(6): 1937-1946 (2015) - [c10]Bushra A. AlAhmadi, Philip A. Legg, Jason R. C. Nurse:
Using Internet Activity Profiling for Insider-threat Detection. ICEIS (2) 2015: 709-720 - [c9]Philip A. Legg:
Visualizing the insider threat: challenges and tools for identifying malicious user activity. VizSEC 2015: 1-7 - 2014
- [j10]Philip A. Legg, Oliver Buckley, Michael Goldsmith, Sadie Creese:
Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis. J. Internet Serv. Inf. Secur. 4(4): 1-13 (2014) - [j9]Ioannis Agrafiotis, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection. J. Internet Serv. Inf. Secur. 4(4): 127-137 (2014) - [j8]William R. Claycomb, Philip A. Legg, Dieter Gollmann:
Guest Editorial: Emerging Trends in Research for Insider Threat Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(2): 1-6 (2014) - [c8]Jason R. C. Nurse, Philip A. Legg, Oliver Buckley, Ioannis Agrafiotis, Gordon R. T. Wright, Monica T. Whitty, David Upton, Michael Goldsmith, Sadie Creese:
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches. HCI (24) 2014: 270-281 - [c7]Jason R. C. Nurse, Oliver Buckley, Philip A. Legg, Michael Goldsmith, Sadie Creese, Gordon R. T. Wright, Monica T. Whitty:
Understanding Insider Threat: A Framework for Characterising Attacks. IEEE Symposium on Security and Privacy Workshops 2014: 214-228 - [c6]Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. STAST 2014: 8-15 - 2013
- [j7]Philip A. Legg, Paul L. Rosin, A. David Marshall, James E. Morgan:
Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation. Comput. Medical Imaging Graph. 37(7-8): 597-606 (2013) - [j6]Philip A. Legg, Nick Moffat, Jason R. C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 20-37 (2013) - [j5]Richard Jiang, Matthew L. Parry, Philip A. Legg, David H. S. Chung, Iwan W. Griffiths:
Automated 3-D Animation From Snooker Videos With Information-Theoretical Optimization. IEEE Trans. Comput. Intell. AI Games 5(4): 337-345 (2013) - [j4]Philip A. Legg, David H. S. Chung, Matthew L. Parry, Rhodri Bown, Mark W. Jones, Iwan W. Griffiths, Min Chen:
Transformation of an Uncertain Video Search Pipeline to a Sketch-Based Visual Analytics Loop. IEEE Trans. Vis. Comput. Graph. 19(12): 2109-2118 (2013) - [c5]Rita Borgo, Min Chen, Markus Höferlin, Kuno Kurzhals, Philip A. Legg, Simon J. Walton, Daniel Weiskopf:
Video Visualization. Eurographics (Tutorials) 2013 - [c4]Rick Walker, Philip A. Legg, Serban R. Pop, Zhao Geng, Robert S. Laramee, Jonathan C. Roberts:
Force-Directed Parallel Coordinates. IV 2013: 36-44 - [i1]David H. S. Chung, Philip A. Legg, Matthew L. Parry, Rhodri Bown, Iwan W. Griffiths, Robert S. Laramee, Min Chen:
Glyph Sorting: Interactive Visualization for Multi-dimensional Data. CoRR abs/1304.2889 (2013) - 2012
- [j3]Philip A. Legg, David H. S. Chung, Matthew L. Parry, Mark W. Jones, R. Long, Iwan W. Griffiths, Min Chen:
MatchPad: Interactive Glyph-Based Visualization for Real-Time Sports Performance Analysis. Comput. Graph. Forum 31(3pt4): 1255-1264 (2012) - [j2]David H. S. Chung, Matthew L. Parry, Philip A. Legg, Iwan W. Griffiths, Robert S. Laramee, Min Chen:
Visualizing multiple error-sensitivity fields for single camera positioning. Comput. Vis. Sci. 15(6): 303-317 (2012) - 2011
- [j1]Matthew L. Parry, Philip A. Legg, David H. S. Chung, Iwan W. Griffiths, Min Chen:
Hierarchical Event Selection for Video Storyboards with a Case Study on Snooker Video Visualization. IEEE Trans. Vis. Comput. Graph. 17(12): 1747-1756 (2011) - [c3]Philip A. Legg, Matthew L. Parry, David H. S. Chung, Richard M. Jiang, Adrian Morris, Iwan W. Griffiths, A. David Marshall, Min Chen:
From Video to Animated 3D Reconstruction: A Computer Graphics Application for Snooker Skills Training. Eurographics (Posters) 2011: 39-40 - [c2]Philip A. Legg, Matthew L. Parry, David H. S. Chung, Richard M. Jiang, Adrian Morris, Iwan W. Griffiths, A. David Marshall, Min Chen:
Intelligent filtering by semantic importance for single-view 3D reconstruction from Snooker video. ICIP 2011: 2385-2388
2000 – 2009
- 2009
- [c1]Philip A. Legg, Paul L. Rosin, A. David Marshall, James E. Morgan:
A Robust Solution to Multi-modal Image Registration by Combining Mutual Information with Multi-scale Derivatives. MICCAI (1) 2009: 616-623
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint