A. Mills, J. White and P. Legg.Longitudinal Risk-based Security Assessment of Docker Software Container Images. Computers and Security, 2023. [pdf]
A. McCarthy, E. Ghadafi, P. Andriotis and P. Legg.Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification. Journal of Information Security and Applications, Vol 72, 2023. [pdf]
J. White and P. Legg.Federated Learning: Data privacy and cyber security in edge-based machine learning. Data Protection in a Post-Pandemic Society – Best Practices, Laws, Regulations, and Recent Solutions, Springer, 2023. [pdf]
A. McCarthy, E. Ghadafi, P. Andriotis and P. Legg.Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey. Journal of Cybersecurity and Privacy, 2(1), pp. 154-190, 2022. [pdf]
J. Williams and P. Legg.Investigating malware propagation and behaviour using system and network pixel-based visualisation. Springer Nature Computer Science, December 2021. [pdf]
A. Mills and P. Legg.Investigating anti-evasion malware triggers using automated sandbox reconfiguration techniques. Journal of Cybersecurity and Privacy, 1, pp. 19-39, 2021. [pdf]
S. Xu, J. Cao, S. Li, P. Legg and B. Liu. Deep learning-based security behaviour analysis in IoT environments: A survey. Secure Communcations and Networks, December 2020. [pdf]
P. Legg, J. Smith and A. Downing. Visual analytics for collaborative human-machine confidence in human-centric active learning tasks. Human-centric Computing and Information Sciences, Vol. 9, Number 1, 2019. [pdf]
S Xu, J Cao, P Legg, B Liu and S Li. Venue2Vec: An efficient embedding model for fine-grained user location prediction in geo-social networks. IEEE Systems Journal, 2019. [pdf]
J. Smith, P. Legg, M. Matovic and K. Kinsey. Predicting User's Confidence during Visual Decision Making. ACM Transactions on Interactive Intelligent Systems (TiiS), 2018. [pdf]
P.A. Legg. Human-Machine Decision Support Systems for Insider Threat Detection. Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications, Springer, 2017. [pdf]
P.A. Legg. Visual Analytics for Non-Expert Users in Cyber Situation Awareness. International Journal on Cyber Situational Awareness, 1(1), 2016, pp.54-73. [pdf]
P.A. Legg, E. Maguire, S. Walton and M. Chen. Glyph Visualization – A fail-safe design scheme based on quasi-Hamming distances. IEEE Computer Graphics and Applications, 37(2), 2017, pp.31-41. [pdf]
W. S. Ng, P. A. Legg, V. Avadhanam, K. Aye, S. H. P. Evans, R. V. North, A. D. Marshall, P. Rosin, J. E. Morgan. Automated Registration of Multimodal Optic Disc Images: Clinical Assessment of Alignment Accuracy. Journal of Glaucoma, 25(4) 2016, pp. 397-402. [pdf]
I. Agrafiotis, J.R.C. Nurse, O. Buckley, P.A. Legg, S. Creese and M. Goldsmith. Identifying attack patterns for insider threat detection. Computer Fraud and Security, 2015(7), pp. 9-17. [pdf]
D. Chung, P.A. Legg, M.L. Parry, R. Bown, I. Griffiths, R. Laramee, M. Chen. Knowledge-Assisted Ranking: A Visual Analytic Application for Sport Event Data. IEEE Computer Graphics and Applications, 36(3) 2015, pp. 72-82. [pdf]
P.A. Legg, O. Buckley, M. Goldsmith and S. Creese. Automated Insider Threat Detection System Using User and Role-Based Profile Assessment. IEEE Systems Journal, 2015. [pdf]
D. Chung, P.A. Legg, M.L. Parry, R. Bown, I. Griffiths, R. Laramee and M. Chen. Glyph sorting: Interactive Visualization for Multi-dimensional data. Information Visualization, 14(1) 2015, pp. 76-90. [pdf]
P.A. Legg, P.L. Rosin, D. Marshall and J.E. Morgan. Feature Neighbourhood Mutual Information for multi-modal image registration: An application to eye fundus imaging. Pattern Recognition, 48(6) 2015, pp. 1937-1946. [pdf]
I. Agrafiotis, P.A. Legg, M. Goldsmith and S. Creese. Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection. Journal of Internet Services and Information Security (JISIS), 4(4) 2014, pp. 127-137. [pdf]
P.A. Legg, O. Buckley, M. Goldsmith and S. Creese. Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis. Journal of Internet Services and Information Security (JISIS), 4(4) 2014, pp. 1-13 [MIST 2014 Best Paper]. [pdf]
D. Chung, I. Griffiths, P.A. Legg, M.L. Parry, A. Morris, M. Chen, W. Griffiths and A. Thomas. Systematic Snooker Skills Test to Analyze Player Performance. International Journal of Sports Science and Coaching, 9(5) 2014, pp. 1083-1106. [pdf]
P.A. Legg, P.L. Rosin, D. Marshall and J.E. Morgan. Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation. Computerized Medical Imaging and Graphics, 37(7) 2013, pp. 597-606. [pdf]
R. Jiang, M.L. Parry, P.A. Legg, D.H.S. Chung, I.W. Griffiths. Automated 3-D Animation From Snooker Videos With Information-Theoretical Optimization. IEEE Transactions on Computational Intelligence and AI in Games, 5(4) 2013, pp. 337-345. [pdf]
P.A. Legg, N. Moffat, J.R.C. Nurse, J. Happa, I. Agrafiotis, M. Goldsmith and S. Creese. Towards a conceptual model and reasoning structure for insider threat detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4(4) 2013, pp. 20-37. [pdf]
P.A. Legg, D.H.S. Chung, M.L. Parry, R. Bown, M.W. Jones, I.W. Griffiths and M. Chen. Transformation of an uncertain video search pipeline to a sketch-based visual analytics loop. IEEE Transactions on Visualization and Computer Graphics, 19(12) 2013, pp. 2109-2118. [pdf]
R.P. Wilson, I.W. Griffiths, P.A. Legg, M.I. Friswell, O.R. Bidder, L.G. Halsey, S.A. Lambertucci and E.L.C. Shepard. Turn costs change the value of animal search paths. Ecology letters, 16(9) 2013, pp. 1145-1150. [pdf]
D.H.S. Chung, M.L. Parry, P.A. Legg, I.W. Griffiths, R.S. Laramee and M. Chen. Visualizing multiple error-sensitivity fields for single camera positioning. Computing and Visualization in Science, 15(6) 2012, pp. 303-317. [pdf]
P.A. Legg, D.H.S. Chung, M.L. Parry, M.W. Jones, R. Long, I.W. Griffiths and M. Chen. MatchPad: Interactive Glyph‐Based Visualization for Real‐Time Sports Performance Analysis. Computer Graphics Forum, 31(3pt4) 2012, pp. 1255-1264. [pdf]
M.L. Parry, P.A. Legg, D.H.S. Chung, I.W. Griffiths and M. Chen. Hierarchical event selection for video storyboards with a case study on snooker video visualization. IEEE Transactions on Visualization and Computer Graphics, 17(12) 2011, pp. 1747-1756. [pdf]
P.A. Legg, P.L. Rosin, D. Marshall and J.E. Morgan. A robust solution to multi-modal image registration by combining mutual information with multi-scale derivatives. Medical Image Computing and Computer-Assisted Intervention (MICCAI) 2009, pp. 616-623. [pdf]
G. Wilkinson and P. Legg. ‘What did you say?’: Extracting unintentional secrets from predictive text learning systems. International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2020. [pdf]
A. McCarthy, B. Gaster and P. Legg. Shouting through letterboxes: A study on attack susceptibility to voice assistants. International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2020.[pdf]
F. Carroll, P. Legg and B. Bonkel. The visual design of network data to enhance the cyber security awareness of the everyday internet user. International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2020. [pdf]
A. Mills, T. Spyridopoulos and P. Legg. Efficient and interpretable real-time malware detection using random-forest. International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2019. [pdf]
P. Legg and T. Blackman. Tools and techniques for improving cyber situational awareness of spearphishing attacks. International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2019. [pdf]
F. Carroll, P. Legg and A. Chakof. What makes for effective visualisation in cyber situational awareness for non-expert users. International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2019. [pdf]
E. M. Smith, J. Smith, P. A. Legg and S. Francis. Predicting the Occurrence of World News Events using Recurrent Neural Networks and Auto-Regressive Moving Average Models. Advances in Computational Intelligence Systems (UK Workshop on Computational Intelligence), pp. 191-202, 2017. [pdf]
A. Erola, I. Agrafiotis, J. Happa, M. Goldsmith, S. Creese and P. A. Legg. RicherPicture: Semi-automated cyber defence using context-aware data analytics. International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2017. [pdf]
P.A. Legg. Enhancing Cyber Situation Awareness for Non-Expert Users using Visual Analytics. International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) [CyberSA Best Paper], 2016. [pdf]
P.A. Legg. Visualizing the insider threat: challenges and tools for identifying malicious user activity. IEEE International Symposium on Visualization for Cyber Security (VizSec), 2015. [pdf]
P.A. Legg, O. Buckley, M. Goldsmith and S. Creese. Caught in the Action of an Insider Attack: Detection and Assessment of Insider Threat. IEEE International Symposium on Technologies for Homeland Security (HST), 2015. [pdf]
B.A. Alahmadi, P.A. Legg and J.R.C. Nurse. Using Internet Activity Profiling for Insider-Threat Detection. Workshop on Security in Information Systems (WOSIS), 2015. [pdf]
J.R.C. Nurse, O. Buckley, P.A. Legg, M. Goldsmith, S. Creese, G.R.T. Wright and M. Whitty. Understanding insider threat: A framework for characterising attacks. IEEE Security and Privacy Workshops (SPW), 2014, pp. 214-228. [pdf]
O. Buckley, J.R.C. Nurse, P.A. Legg, M. Goldsmith and S. Creese. Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. Workshop on Socio-Technical Aspects in Security and Trust (STAST) / IEEE Computer Security Foundations (CSF) Symposium, 52014, pp. 616-623. [pdf]
J.R.C. Nurse, P.A. Legg, O. Buckley, I. Agrafiotis, G.R.T. Wright, M. Whitty, D. Upton, M. Goldsmith and S. Creese. A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches. Human Aspects of Information Security Privacy and Trust, 2014, pp. 270-281. [pdf]
R. Walker, P.A. Legg, S. Pop, Z. Geng, R.S. Laramee and J.C. Roberts. Force-Directed Parallel Coordinates. 17th International Conference on Information Visualisation (IV), 2013, pp. 36-44. [pdf]
P.A. Legg, M.L. Parry, D.H.S. Chung, R.M. Jiang, A. Morris, I.W. Griffiths, D. Marshall and M. Chen. Intelligent filtering by semantic importance for single-view 3d reconstruction from snooker video. IEEE International Conference on Image Processing (ICIP) 2011, pp. 2385-2388. [pdf]
P.A. Legg, P.L. Rosin, D. Marshall and J.E. Morgan. Non-rigid elastic registration of retinal images using local window mutual information. Medical Imaging Understanding and Analysis (MIUA) 2009, pp. 144-148. [pdf]
P.A. Legg, P.L. Rosin, D. Marshall and J.E. Morgan. Incorporating neighbourhood feature derivatives with mutual information to improve accuracy of multi-modal image registration. Medical Imaging Understanding and Analysis (MIUA) 2008, pp. 39-43. [pdf]
P.A. Legg, P.L. Rosin, D. Marshall and J.E. Morgan. Improving accuracy and efficiency of registration by mutual information using Sturges’ histogram rule. Medical Imaging Understanding and Analysis (MIUA) 2007, pp. 26-30. [pdf]
E. M. Smith, J. Smith, P. Legg and S. Francis. Visualising State Space Representations of LSTM Networks. Workshop on Visualization for AI Explainability, IEEE VIS, Berlin, 2018
P.A. Legg, E. Maguire, S. Walton and M. Chen. Quasi-Hamming distances: An overarching concept for measuring glyph similarity. Eurographics UK Computer Graphics and Visual Computing, 2015
W.R. Claycomb, P.A. Legg and D. Gollmann. Guest Editorial: Emerging Trends in Research for Insider Threat Detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5(2) 2014, pp. 1-6
D.H.S. Chung, P.A. Legg, M.L. Parry, I.W. Griffiths, R. Bown, R.S. Laramee and M. Chen. Visual Analytics for Multivariate Sorting of Sport Event Data. 1st Workshop on Sports Data Visualization, 2013
R. Borgo, M. Chen, M. Hoferlin, K. Kurzhals, P. Legg, S. Walton and D. Weiskopf. Video Visualization Workshop. IEEE VIS, 2013
R. Borgo, M. Chen, M. Hoferlin, K. Kurzhals, P. Legg, S. Walton and D. Weiskopf. Video Visualization Workshop. Eurographics, 2013
S. Ng, P. A. Legg, K. H. Aye and J. E. Morgan. Evaluation of FNMI algorithm in multi-modal registration of optic disc images. Oxford Ophthalmological Congress, 2011
P.A. Legg, M. L. Parry, D. H. S. Chung, R. M. Jiang, A. Morris, I. W. Griffiths, D. Marshall and M. Chen. From Video to 3D Animated Reconstruction: A Computer Graphics Application for Snooker Skills Training. Eurographics, Bangor, 2011
K. H. Aye, P. A. Legg, A. Jones, V. Avadhanam, R. V. North, D. Marshall, P. L. Rosin and J. E. Morgan. Demarcation of the optic disc margin: a comparison of photographic and laser tomographic methods. Oxford Ophthalmological Congress, 2010
P.A. Legg. Multi-modal image registration: approaches for improving the accuracy and efficiency of Mutual Information. Visual Computing in Wales Workshop (VCWW), Aberystwyth, 2009
P.A. Legg, R. V. North, P. L. Rosin, D. Marshall and J. E. Morgan. Multi-modal retinal imaging: new strategies in the analysis of optic nerve head images. United Kingdom and Eire Glaucoma Society (UKEGS), Cardiff, 2007
P.A. Legg. Multi-modal Retinal Imaging: Improving Accuracy and Efficiency of Image Registration using Mutual Information. PhD thesis, School of Computer Science, Cardiff University, 2010. [pdf]
P.A. Legg. Multi-player Internet Game: Chinese Checkers. BSc Computer Science Final Year Project, School of Computer Science, Cardiff University, 2006. [pdf]
Visual Analytics and Human-Machine Collaboration for Insider Threat Detection (Guest Lecture), University of Bristol, December 2017.
Data-Driven Decisions using Visual Analytics, Data-Led Decision Support (Guest Lecture), Cranfield University, April 2016.
Visualizing Cyber Security, vLunch, Cardiff University, March 2016.
Visualization: What is it good for?, Software Engineering Research Group workshop, UWE Bristol, March 2015.
Insider Threat Research Workshop, Cyber Security Centre, Oxford University, March 2015.
CITD: Corporate Insider Threat Detection, SMi Oil and Gas Cyber Security conference, Oslo, June 2014.
Generating Data for Insider Threat Research Workshop, Cyber Security Centre, Oxford University, April 2014. (Co-Organiser).
CIFAS Annual conference, London, June 2013.
Sports Informatics Symposium, Loughborough University, June 2012.
Sports Video Visualization Workshop, Swansea Football Club, Liberty Stadium, April 2012. (Co-Organiser)
Interactive Glyph-Based Visualization for Real-Time Sports Performance Analysis, Glyph-Based Visualization Workshop, Oxford University, May 2012.
Sports Video Visualization, Sports Video Visualization Workshop, Vale of Glamorgan Hotel, April 2011. (Co-Organiser)
Sports Video Visualization, vLunch, Cardiff University, October 2011.
P. Legg. Shared Collaborative Project Planning in Secure Federated Learning Environments. PhD 50-50 Studentship with Techmodal Ltd., October 2019-September 2022.
P. Legg. Building Trust through Interactive Inspection of Adversarial Machine Learning Attacks. PhD 50-50 Studentship with Techmodal Ltd., October 2019-September 2022.
P. Legg, J. Smith and R. Preen. HASTE: Human-centric Active-learning for decision Support in Threat Exploration. DSTL Accelerator (ACC103103), February 2018-July 2018.
J. Smith and P. Legg. Creating Machine Intelligence with Intelligent Interactive Visualisation. PhD 50-50 Studentship with Montvieux Ltd., October 2016-September 2019.
J. Happa, P.A. Legg, A. Erola, I. Agrafiotis, M. Goldsmith and S. Creese. Automated network defence through business and threat-led machine learning (Phase 2). DSTL, April 2016 - March 2017.
P.A. Legg. Enhanced personal situational awareness through network and systems visualization. Vice-Chancellor's Early Career Researcher Award, University of the West of England, 2015-16.
P.A. Legg. CSCT Researcher of the Year Award. University of the West of England, July 2015.
J. Happa, P.A. Legg, I. Agrafiotis, M. Goldsmith and S. Creese. Automated network defence through business and threat-led machine learning. DSTL Centre for Defence Enterprise (CDE37775), April 2015 - September 2015.
P.A. Legg. Professor Richard Whipp PhD Scholarship Award. Cardiff University, September 2006.