Philip A. Legg

Orcid: 0000-0003-3460-5609

Affiliations:
  • University of the West of England, Bristol, Department of Computer Science
  • University of Oxford, Department of Computer Science


According to our database1, Philip A. Legg authored at least 52 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Preserving Intrusion Detection in Software-defined VANET using Federated Learning with BERT.
CoRR, 2024

Cyber Funfair: Creating Immersive and Educational Experiences for Teaching Cyber Physical Systems Security.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

2023
Longitudinal risk-based security assessment of docker software container images.
Comput. Secur., December, 2023

Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification.
J. Inf. Secur. Appl., 2023

A stacked ensemble learning IDS model for Software-defined VANET.
CoRR, 2023

2022
Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey.
J. Cybersecur. Priv., March, 2022

Investigating Malware Propagation and Behaviour Using System and Network Pixel-Based Visualisation.
SN Comput. Sci., 2022

OGMA: Visualisation for Software Container Security Analysis and Automated Remediation.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey.
Secur. Commun. Networks, 2021

Unsupervised One-Class Learning for Anomaly Detection on Home IoT Network Devices.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

"Hacking an IoT Home": New opportunities for cyber security education combining remote learning with cyber-physical systems.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

2020
Investigating Anti-Evasion Malware Triggers Using Automated Sandbox Reconfiguration Techniques.
J. Cybersecur. Priv., November, 2020

Venue2Vec: An Efficient Embedding Model for Fine-Grained User Location Prediction in Geo-Social Networks.
IEEE Syst. J., 2020

"What did you say?": Extracting unintentional secrets from predictive text learning systems.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

Shouting Through Letterboxes: A study on attack susceptibility of voice assistants.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

2019
Correction to: Visual analytics for collaborative human-machine confidence in human-centric active learning tasks.
Hum. centric Comput. Inf. Sci., 2019

Visual analytics for collaborative human-machine confidence in human-centric active learning tasks.
Hum. centric Comput. Inf. Sci., 2019

Efficient and Interpretable Real-Time Malware Detection Using Random-Forest.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

Tools and Techniques for Improving Cyber Situational Awareness of Targeted Phishing Attacks.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

What Makes for Effective Visualisation in Cyber Situational Awareness for Non-Expert Users?
Proceedings of the International Conference on Cyber Situational Awareness, 2019

2018
Predicting User Confidence During Visual Decision Making.
ACM Trans. Interact. Intell. Syst., 2018

2017
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment.
IEEE Syst. J., 2017

Glyph Visualization: A Fail-Safe Design Scheme Based on Quasi-Hamming Distances.
IEEE Computer Graphics and Applications, 2017

Predicting the Occurrence of World News Events Using Recurrent Neural Networks and Auto-Regressive Moving Average Models.
Proceedings of the Advances in Computational Intelligence Systems, 2017

RicherPicture: Semi-automated cyber defence using context-aware data analytics.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

2016
Visual Analytics for Non-Expert Users in Cyber Situation Awareness.
Int. J. Cyber Situational Aware., 2016

Knowledge-Assisted Ranking: A Visual Analytic Application for Sports Event Data.
IEEE Computer Graphics and Applications, 2016

Enhancing cyber situation awareness for Non-Expert Users using visual analytics.
Proceedings of the 2016 International Conference On Cyber Situational Awareness, 2016

2015
Feature Neighbourhood Mutual Information for multi-modal image registration: An application to eye fundus imaging.
Pattern Recognit., 2015

Glyph sorting: Interactive visualization for multi-dimensional data.
Inf. Vis., 2015

Visualizing the insider threat: challenges and tools for identifying malicious user activity.
Proceedings of the 12th IEEE Symposium on Visualization for Cyber Security, 2015

Using Internet Activity Profiling for Insider-threat Detection.
Proceedings of the ICEIS 2015, 2015

2014
Guest Editorial: Emerging Trends in Research for Insider Threat Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis.
J. Internet Serv. Inf. Secur., 2014

Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection.
J. Internet Serv. Inf. Secur., 2014

Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat.
Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014

Understanding Insider Threat: A Framework for Characterising Attacks.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
Transformation of an Uncertain Video Search Pipeline to a Sketch-Based Visual Analytics Loop.
IEEE Trans. Vis. Comput. Graph., 2013

Automated 3-D Animation From Snooker Videos With Information-Theoretical Optimization.
IEEE Trans. Comput. Intell. AI Games, 2013

Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation.
Comput. Medical Imaging Graph., 2013

Force-Directed Parallel Coordinates.
Proceedings of the 17th International Conference on Information Visualisation, 2013

Video Visualization.
Proceedings of the 34th Annual Conference of the European Association for Computer Graphics, 2013

2012
Visualizing multiple error-sensitivity fields for single camera positioning.
Comput. Vis. Sci., 2012

<i>MatchPad</i>: Interactive Glyph-Based Visualization for Real-Time Sports Performance Analysis.
Comput. Graph. Forum, 2012

2011
Hierarchical Event Selection for Video Storyboards with a Case Study on Snooker Video Visualization.
IEEE Trans. Vis. Comput. Graph., 2011

Intelligent filtering by semantic importance for single-view 3D reconstruction from Snooker video.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

From Video to Animated 3D Reconstruction: A Computer Graphics Application for Snooker Skills Training.
Proceedings of the 32nd Annual Conference of the European Association for Computer Graphics, 2011

2009
A Robust Solution to Multi-modal Image Registration by Combining Mutual Information with Multi-scale Derivatives.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention, 2009


  Loading...