Prof. Phil Legg

phil-square.jpg

Office 4Q59

Frenchay Campus, UWE

Bristol, UK

Phil Legg is a Professor of Cyber Security at the University of the West of England (UWE Bristol), UK, in recognition of “Advancing Teaching and Learning” and “Research with Impact”. He is Co-Director of the UWEcyber Academic Centre of Excellence in Cyber Security Education (ACE-CSE), as recognised by the National Cyber Security Centre (NCSC), and he leads the Cyber Security research theme within the University’s Computer Science Research Centre (CSRC). Previously, he was Programme Leader for the NCSC-certified MSc Cyber Security at UWE since it first launched in 2018, and then joined the Programme Leadership team for the BSc Cyber Security and Digital Forensics programme in 2024 to further support on industry partnership and external engagement.

His research intersects across Cyber Security, looking at how machine learning, visual analytics, and human-computer interaction are adopted within cyber security, to improve interpretability and understanding of risk, and to improve robustness and trust of modern security technologies. His early research addresses the robustness of machine learning and computer vision systems, as well as how such models can be utilised for insider threat detection and cyber situational awareness. He has also worked on developing mitigations against adversarial machine learning techniques, as well as investigation container-based security vulnerabilities. More recently, he is interested in how human-machine teaming can help to establish confidence and trust in human-machine agents, and how active learning techniques can be used to interrogate model robustness and identify security vulnerabilities such as adversarial learning cases. Further details on the Cyber Security research theme is available here.

He is a Senior Fellow of the Higher Education Academy (SFHEA) and completed his Postgraduate Certificate in Teaching and Learning for Higher Education in 2016. He holds CompTIA certifications SecurityX (formerly CASP+), PenTest+, and Security+, as well as Microsoft Azure, Security, Data, and AI certifications (AZ-900, SC-900, DP-900,AI-900), and is a certified instructor for Palo Alto Networks. He is recognised as a Full Member of the Chartered Institute of Information Security (MCIIS), as well as a member of the Council of Professors and Heads of Computing (CPHC). He is also a co-founder and co-director of the community interest group and cyber security education network, CSE Connect.

He began his academic career at Cardiff University, where he completed his BSc Computer Science (2006), and went on to study for a PhD in Computer Science (2010), whilst also working as an academic support tutor (2006-2010) and as a post-doctoral researcher (2010). He has also held post-doctoral research and teaching roles at Swansea University (2010-2013) and the University of Oxford (2013-2015), working with a variety of stakeholders across both industry and government. He joined UWE Bristol in 2015 as a Senior Lecturer in Computer Science, and was appointed as Associate Professor of Cyber Security in October 2018, and most recently, Professor of Cyber Security in January 2022.

For more details of my most recent activities please visit LinkedIn, for my publications please visit Google Scholar, or for blog articles please visit Medium.

selected publications

  1. 2026lo.jpg
    LOTL-hunter: Detecting multi-stage living-off-the-land attacks in cyber-physical systems using decision fusion techniques with digital twins
    Carol Lo, Thu Yein Win, Zeinab Rezaeifar, Zaheer Khan, and Phil Legg
    Future Generation Computer Systems, 2026
  2. 2026leggcse.jpg
    Advances in Teaching and Learning for Cyber Security Education
    Phil Legg, Natalie Coull, Charles Clarke, Harjinder Lallie, and Hany Atlam
    2026
  3. 2024lotrist.jpg
    TRIST: Towards a Container-Based ICS Testbed for Cyber Threat Simulation and Anomaly Detection
    C. Lo, J. Christie, T.Y. Win, Z. Rezaeifar, Z. Khan, and P Legg
    In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media (Cyber Science 2024), 2025
  4. 2025legg.jpg
    Machine Learning and Data Analytics for Cyber Security
    Phil Legg and Giorgio Giacinto
    2025
  5. 2025jailbreakingllm.jpg
    Jailbreaking LLMs Through Tense Manipulation in Multi-Turn Dialogues
    Michael Tchuindjang, Nathan Duran, Phil Legg, and Faiza Medjek
    In Advances in Computational Intelligence Systems: Contributions Presented at the 24th UK Workshop on Computational Intelligence, September 3-5, 2025, Edinburgh, UK, 2025
  6. 2025zafar.jpg
    Federated Learning with Adversarial Optimisation for Secure and Efficient 5G Edge Computing Networks
    Saniya Zafar, Jonathan White, and Phil Legg
    Big Data and Cognitive Computing, 2025
  7. 2024leggadvances.jpg
    Advances in Teaching and Learning for Cyber Security Education
    Phil Legg, Natalie Coull, and Charles Clarke
    2024
  8. 2025leggllm.jpg
    Privacy-Based Triage of Suspicious Activity Reports Using Offline Large Language Models
    Phil Legg, Nicholas Ryder, Samantha Bourton, Diana Johnson, and Reuben Walker
    In Advancements in Cyber Crime Investigations and Modern Data Analytics, 2024
  9. 2024millscyberfunfair.jpg
    Cyber Funfair: Creating Immersive and Educational Experiences for Teaching Cyber Physical Systems Security
    Alan Mills, Jonathan White, and Phil Legg
    In SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024
  10. 2024bamohabbat.jpg
    Vulnerability detection through machine learning-based fuzzing: A systematic review
    Sadegh Bamohabbat Chafjiri, Phil Legg, Jun Hong, and Michail-Antisthenis Tsompanas
    Computers & Security, 2024
  11. 2023mills.jpg
    Longitudinal Risk-based Security Assessment of Docker Software Container Images
    Alan Mills, Jonathan White, and Phil Legg
    Computers and Security, 2023
  12. 2022mccarthydefending.jpg
    Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification
    Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis, and Phil Legg
    Journal of Information Security and Applications, 2022