Understanding insider threat: A framework for characterising attacks JRC Nurse, O Buckley, PA Legg, M Goldsmith, S Creese, GRT Wright, ... 2014 IEEE security and privacy workshops, 214-228, 2014 | 290 | 2014 |
Automated insider threat detection system using user and role-based profile assessment PA Legg, O Buckley, M Goldsmith, S Creese IEEE Systems Journal 11 (2), 503-512, 2015 | 175 | 2015 |
Turn costs change the value of animal search paths RP Wilson, IW Griffiths, PA Legg, MI Friswell, OR Bidder, LG Halsey, ... Ecology letters 16 (9), 1145-1150, 2013 | 140 | 2013 |
MatchPad: Interactive Glyph‐Based Visualization for Real‐Time Sports Performance Analysis PA Legg, DHS Chung, ML Parry, MW Jones, R Long, IW Griffiths, M Chen Computer graphics forum 31 (3pt4), 1255-1264, 2012 | 120 | 2012 |
Towards a conceptual model and reasoning structure for insider threat detection PA Legg, N Moffat, JRC Nurse, J Happa, I Agrafiotis, M Goldsmith, ... Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2013 | 112 | 2013 |
Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation PA Legg, PL Rosin, D Marshall, JE Morgan Computerized Medical Imaging and Graphics 37 (7-8), 597-606, 2013 | 80 | 2013 |
Identifying attack patterns for insider threat detection I Agrafiotis, JRC Nurse, O Buckley, P Legg, S Creese, M Goldsmith Computer Fraud & Security 2015 (7), 9-17, 2015 | 77 | 2015 |
Glyph sorting: Interactive visualization for multi-dimensional data DHS Chung, PA Legg, ML Parry, R Bown, IW Griffiths, RS Laramee, ... Information Visualization 14 (1), 76-90, 2015 | 74 | 2015 |
Visualizing the insider threat: challenges and tools for identifying malicious user activity PA Legg 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-7, 2015 | 73 | 2015 |
Caught in the act of an insider attack: detection and assessment of insider threat PA Legg, O Buckley, M Goldsmith, S Creese 2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015 | 71 | 2015 |
Hierarchical event selection for video storyboards with a case study on snooker video visualization ML Parry, PA Legg, DHS Chung, IW Griffiths, M Chen IEEE Transactions on Visualization and Computer Graphics 17 (12), 1747-1756, 2011 | 54 | 2011 |
Feature neighbourhood mutual information for multi-modal image registration: an application to eye fundus imaging PA Legg, PL Rosin, D Marshall, JE Morgan Pattern Recognition 48 (6), 1937-1946, 2015 | 48 | 2015 |
Improving accuracy and efficiency of registration by mutual information using Sturges’ histogram rule PA Legg, PL Rosin, D Marshall, JE Morgan Proc. Med. Image Understand. Anal, 26-30, 2007 | 45 | 2007 |
Deep Learning‐Based Security Behaviour Analysis in IoT Environments: A Survey Y Yue, S Li, P Legg, F Li Security and communication Networks 2021 (1), 8873195, 2021 | 43 | 2021 |
Using internet activity profiling for insider-threat detection BA Alahmadi, PA Legg, JRC Nurse Special Session on Security in Information Systems 2, 709-720, 2015 | 42 | 2015 |
Transformation of an uncertain video search pipeline to a sketch-based visual analytics loop PA Legg, DHS Chung, ML Parry, R Bown, MW Jones, IW Griffiths, M Chen IEEE transactions on Visualization and Computer Graphics 19 (12), 2109-2118, 2013 | 42 | 2013 |
A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches JRC Nurse, PA Legg, O Buckley, I Agrafiotis, G Wright, M Whitty, D Upton, ... Human Aspects of Information Security, Privacy, and Trust: Second …, 2014 | 40 | 2014 |
Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey A McCarthy, E Ghadafi, P Andriotis, P Legg Journal of Cybersecurity and Privacy 2 (1), 154-190, 2022 | 31 | 2022 |
A robust solution to multi-modal image registration by combining mutual information with multi-scale derivatives PA Legg, PL Rosin, D Marshall, JE Morgan Medical Image Computing and Computer-Assisted Intervention–MICCAI 2009: 12th …, 2009 | 31 | 2009 |
Efficient and interpretable real-time malware detection using random-forest A Mills, T Spyridopoulos, P Legg International conference on Cyber Situational Awareness, Data Analytics and …, 2019 | 28 | 2019 |