publications

Publications in reversed chronological order

2026

  1. 2026lo.jpg
    LOTL-hunter: Detecting multi-stage living-off-the-land attacks in cyber-physical systems using decision fusion techniques with digital twins
    Carol Lo, Thu Yein Win, Zeinab Rezaeifar, Zaheer Khan, and Phil Legg
    Future Generation Computer Systems, 2026
  2. 2026leggcse.jpg
    Advances in Teaching and Learning for Cyber Security Education
    Phil Legg, Natalie Coull, Charles Clarke, Harjinder Lallie, and Hany Atlam
    2026

2025

  1. 2025ahsan.jpg
    An Explainable Ensemble-based Intrusion Detection System for Software-Defined Vehicle Ad-hoc Networks
    Shakil Ibne Ahsan, Phil Legg, and S M Iftekharul Alam
    Cyber Security and Applications, 2025
  2. 2025bamohabbat.jpg
    Leveraging activation and optimisation layers as dynamic strategies in the multi-task fuzzing scheme
    Sadegh Bamohabbat Chafjiri, Phil Legg, Michail-Antisthenis Tsompanas, and Jun Hong
    Computer Standards & Interfaces, 2025
  3. 2024lotrist.jpg
    TRIST: Towards a Container-Based ICS Testbed for Cyber Threat Simulation and Anomaly Detection
    C. Lo, J. Christie, T.Y. Win, Z. Rezaeifar, Z. Khan, and P Legg
    In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media (Cyber Science 2024), 2025
  4. 2025legg.jpg
    Machine Learning and Data Analytics for Cyber Security
    Phil Legg and Giorgio Giacinto
    2025
  5. gh0stEdit: Exploiting Layer-Based Access Vulnerability Within Docker Container Images
    Alan Mills, Jonathan White, and Phil Legg
    arXiv, 2025
  6. Examining the Role of Online Communities in the Prevention of Child Sexual Abuse
    Nick Addis, Ella Rees, Ian Johnson, Phil Legg, and Maggie Brennan
    2025
  7. 2025jailbreakingllm.jpg
    Jailbreaking LLMs Through Tense Manipulation in Multi-Turn Dialogues
    Michael Tchuindjang, Nathan Duran, Phil Legg, and Faiza Medjek
    In Advances in Computational Intelligence Systems: Contributions Presented at the 24th UK Workshop on Computational Intelligence, September 3-5, 2025, Edinburgh, UK, 2025
  8. 2025zafar.jpg
    Federated Learning with Adversarial Optimisation for Secure and Efficient 5G Edge Computing Networks
    Saniya Zafar, Jonathan White, and Phil Legg
    Big Data and Cognitive Computing, 2025

2024

  1. Cyber Security Unplugged: Teaching Security Management Through Immersive Gameplay
    Alan Mills, Ian Caple, Phil Legg, Sophie Fenn, and Aida Abzhaparova
    In Advances in Teaching and Learning for Cyber Security Education, 2024
  2. 2024leggadvances.jpg
    Advances in Teaching and Learning for Cyber Security Education
    Phil Legg, Natalie Coull, and Charles Clarke
    2024
  3. 2025leggllm.jpg
    Privacy-Based Triage of Suspicious Activity Reports Using Offline Large Language Models
    Phil Legg, Nicholas Ryder, Samantha Bourton, Diana Johnson, and Reuben Walker
    In Advancements in Cyber Crime Investigations and Modern Data Analytics, 2024
  4. Privacy-preserving intrusion detection in software-defined VANET using federated learning with BERT
    Shakil Ibne Ahsan, Phil Legg, and SM Alam
    arXiv preprint arXiv:2401.07343, 2024
  5. 2024millscyberfunfair.jpg
    Cyber Funfair: Creating Immersive and Educational Experiences for Teaching Cyber Physical Systems Security
    Alan Mills, Jonathan White, and Phil Legg
    In SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024
  6. 2024bamohabbat.jpg
    Vulnerability detection through machine learning-based fuzzing: A systematic review
    Sadegh Bamohabbat Chafjiri, Phil Legg, Jun Hong, and Michail-Antisthenis Tsompanas
    Computers & Security, 2024
  7. 2022bamohabbatimproving.jpg
    Improving Search Space Analysis of Fuzzing Mutators Using Cryptographic Structures
    Sadegh Bamohabbat Chafjiri, Phil Legg, Michail-Antisthenis Tsompanas, and Jun Hong
    In Proceedings of Ninth International Conference on Cyber Security, Privacy in Communication Networks (ICCS 2023), 2024
  8. 2024millsgoibhniuwe.jpg
    GoibhniUWE: A Lightweight and Modular Container-Based Cyber Range
    Alan Mills, Jonathan White, and Phil Legg
    Journal of Cybersecurity and Privacy, 2024
  9. 2024lo.jpg
    Digital twins of cyber physical systems in smart manufacturing for threat simulation and detection with deep learning for time series classification
    Carol Lo, Thu Yein Win, Zeinab Rezaeifar, Zaheer Khan, and Phil Legg
    In 29th International Conference on Automation and Computing (ICAC2024), University of Sunderland, UK, 2024
  10. 2024barrett.jpg
    Analyst-driven XAI for time series forecasting: Analytics for telecoms maintenance
    James Barrett, Phil Legg, Jim Smith, and Chip Boyle
    In ACM 9th International Conference on Machine Learning Technologies (ICMLT) 2024, 2024
  11. 2022white.jpg
    Evaluating data distribution strategies in federated learning: A trade-off analysis between privacy and performance for IoT security
    Jonathan White and Phil Legg
    In Proceedings of Ninth International Conference on Cyber Security, Privacy in Communication Networks (ICCS 2023), 2024
  12. Trends and Challenges in Data Analytics and Machine Learning Using Call Detail Records in Telecom Systems
    James Barrett, Phil Legg, Jim Smith, Tim Barnes, and Charles Boyle
    Preprints, 2024

2023

  1. 2022bamohabbatimproving.jpg
    Improving Search Space Analysis of Fuzzing Mutators Using Cryptographic Structures
    Sadegh Bamohabbat Chafjiri, Phil Legg, Michail-Antisthenis Tsompanas, and Jun Hong
    In International Conference on Cyber Security, Privacy in Communication Networks, 2023
  2. Federated Learning: Data Privacy and Cyber Security in Edge-Based Machine Learning
    Jonathan White and Phil Legg
    In Data Protection in a Post-Pandemic Society, 2023
  3. 2023mills.jpg
    Longitudinal Risk-based Security Assessment of Docker Software Container Images
    Alan Mills, Jonathan White, and Phil Legg
    Computers and Security, 2023

2022

  1. 2021williams.jpg
    Investigating Malware Propagation and Behaviour Using System and Network Pixel-Based Visualisation
    Jacob Williams and Phil Legg
    SN Computer Science, 2022
  2. 2022mccarthyfunctionality.jpg
    Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey
    Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis, and Phil Legg
    Journal of Cybersecurity and Privacy, 2022
  3. 2022millsogma.jpg
    OGMA: visualisation for software container security analysis and automated remediation
    Alan Mills, Jonathan White, and Phil Legg
    In 2022 IEEE International Conference on Cyber Security and Resilience (CSR), 2022
  4. 2023legg.jpg
    Teaching Offensive and Defensive Cyber Security in Schools using a Raspberry Pi Cyber Range
    Phil Legg, Alan Mills, and Ian Johnson
    In Colloquium on Information Systems Security Education (CISSE), 2022
  5. 2022mccarthydefending.jpg
    Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification
    Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis, and Phil Legg
    Journal of Information Security and Applications, 2022
  6. 2023white.jpg
    Interactive cyber-physical system hacking: Engaging students early using Scalextric
    Jonathan White, Phil Legg, and Alan Mills
    In Colloquium on Information Systems Security Education (CISSE), 2022

2021

  1. 2021yue.jpg
    Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey
    Yawei Yue, Shancang Li, Phil Legg, and Fuzhong Li
    Security and communication Networks, 2021
  2. 2021mccarthy.jpg
    Feature vulnerability and robustness assessment against adversarial machine learning attacks
    Andrew McCarthy, Panagiotis Andriotis, Essam Ghadafi, and Phil Legg
    In 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2021
  3. 2021legg.jpg
    “Hacking an IoT Home”: New opportunities for cyber security education combining remote learning with cyber-physical systems
    Phil Legg, Thomas Higgs, Pennie Spruhan, Jonathan White, and Ian Johnson
    In 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2021
  4. 2021white.jpg
    Unsupervised one-class learning for anomaly detection on home IoT network devices
    Jonathan White and Phil Legg
    In 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2021

2020

  1. The visual design of network data to enhance cyber security awareness of the everyday internet user
    Fiona Carroll, Phil Legg, and Bastian Bønkel
    In 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2020
  2. Shouting Through Letterboxes: A study on attack susceptibility of voice assistants
    Andrew McCarthy, Benedict R Gaster, and Phil Legg
    In 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2020
  3. “What did you say?”: Extracting unintentional secrets from predictive text learning systems
    Gwyn Wilkinson and Phil Legg
    In 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2020
  4. 2020mills.jpg
    Investigating anti-evasion malware triggers using automated sandbox reconfiguration techniques
    Alan Mills and Phil Legg
    Journal of Cybersecurity and Privacy, 2020

2019

  1. What makes for effective visualisation in cyber situational awareness for non-expert users?
    Fiona Carroll, Phil Legg, and Adam Chakof
    In International conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2019
  2. Venue2vec: An efficient embedding model for fine-grained user location prediction in geo-social networks
    Shuai Xu, Jiuxin Cao, Phil Legg, Bo Liu, and Shancang Li
    IEEE Systems Journal, 2019
  3. Tools and techniques for improving cyber situational awareness of targeted phishing attacks
    Phil Legg and Tim Blackman
    In International conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2019
  4. Efficient and interpretable real-time malware detection using random-forest
    Alan Mills, Theodoros Spyridopoulos, and Phil Legg
    In International conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2019
  5. Visual analytics for collaborative human-machine confidence in human-centric active learning tasks
    Phil Legg, Jim Smith, and Alexander Downing
    Human-centric computing and information sciences, 2019

2018

  1. Predicting the occurrence of world news events using recurrent neural networks and auto-regressive moving average models
    Emmanuel M Smith, Jim Smith, Phil Legg, and Simon Francis
    In Advances in Computational Intelligence Systems: Contributions Presented at the 17th UK Workshop on Computational Intelligence, September 6-8, 2017, Cardiff, UK, 2018
  2. Visualising state space representations of LSTM networks
    Emmanuel M Smith, Jim Smith, Phil Legg, and Simon Francis
    In Workshop on Visualization for AI Explainability (VISxAI), 2018
  3. Predicting user confidence during visual decision making
    Jim Smith, Phil Legg, Milos Matovic, and Kristofer Kinsey
    ACM Transactions on Interactive Intelligent Systems (TiiS), 2018

2017

  1. Human-machine decision support systems for insider threat detection
    Philip A Legg
    Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications, 2017
  2. RicherPicture: Semi-automated cyber defence using context-aware data analytics
    Arnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese, and Philip A Legg
    In 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2017

2016

  1. Automated registration of multimodal optic disc images: clinical assessment of alignment accuracy
    Wai Siene Ng, Phil Legg, Venkat Avadhanam, Kyaw Aye, Steffan HP Evans, Rachel V North, Andrew D Marshall, Paul Rosin, and James E Morgan
    Journal of Glaucoma, 2016
  2. Enhancing cyber situation awareness for non-expert users using visual analytics
    Philip A Legg
    In 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 2016
  3. Glyph visualization: A fail-safe design scheme based on quasi-hamming distances
    Philip A Legg, Eamonn Maguire, Simon Walton, and Min Chen
    IEEE computer graphics and applications, 2016
  4. Visual Analytics for Non-Expert Users in Cyber Situation Awareness
    Philip A Legg
    Int. J. Cyber Situational Aware., 2016

2015

  1. Glyph sorting: Interactive visualization for multi-dimensional data
    David HS Chung, Philip A Legg, Matthew L Parry, Rhodri Bown, Iwan W Griffiths, Robert S Laramee, and Min Chen
    Information Visualization, 2015
  2. Identifying attack patterns for insider threat detection
    Ioannis Agrafiotis, Jason RC Nurse, Oliver Buckley, Phil Legg, Sadie Creese, and Michael Goldsmith
    Computer Fraud & Security, 2015
  3. Knowledge-assisted ranking: A visual analytic application for sports event data
    David HS Chung, Matthew L Parry, Iwan W Griffiths, Robert S Laramee, Rhodri Bown, Philip A Legg, and Min Chen
    IEEE Computer Graphics and Applications, 2015
  4. Using internet activity profiling for insider-threat detection
    Bushra A Alahmadi, Philip A Legg, and Jason RC Nurse
    In Special Session on Security in Information Systems, 2015
  5. Visualizing the insider threat: challenges and tools for identifying malicious user activity
    Philip A Legg
    In 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), 2015
  6. Quasi-Hamming distances: An overarching concept for measuring glyph similarity
    Philip A Legg, Eamonn Maguire, Simon Walton, and Min Chen
    Computer Graphics and Visual Computing: Extended Abstract, 2015
  7. Caught in the act of an insider attack: detection and assessment of insider threat
    Philip A Legg, Oliver Buckley, Michael Goldsmith, and Sadie Creese
    In 2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015
  8. Feature neighbourhood mutual information for multi-modal image registration: an application to eye fundus imaging
    Philip A Legg, Paul L Rosin, Dave Marshall, and James E Morgan
    Pattern Recognition, 2015
  9. Automated insider threat detection system using user and role-based profile assessment
    Philip A Legg, Oliver Buckley, Michael Goldsmith, and Sadie Creese
    IEEE Systems Journal, 2015

2014

  1. Systematic snooker skills test to analyze player performance
    David HS Chung, Iwan W Griffiths, Phil A Legg, Matthew L Parry, A Morris, Min Chen, W Griffiths, and Alex Thomas
    International Journal of Sports Science & Coaching, 2014
  2. Reflecting on the ability of enterprise security policy to address accidental insider threat
    Oliver Buckley, Jason RC Nurse, Philip A Legg, Michael Goldsmith, and Sadie Creese
    In 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014
  3. Guest Editorial: Emerging Trends in Research for Insider Threat Detection.
    William R Claycomb, Philip A Legg, and Dieter Gollmann
    J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
  4. Understanding insider threat: A framework for characterising attacks
    Jason RC Nurse, Oliver Buckley, Philip A Legg, Michael Goldsmith, Sadie Creese, Gordon RT Wright, and Monica Whitty
    In 2014 IEEE security and privacy workshops, 2014
  5. Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection.
    Ioannis Agrafiotis, Philip A Legg, Michael Goldsmith, and Sadie Creese
    J. Internet Serv. Inf. Secur., 2014
  6. A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches
    Jason RC Nurse, Philip A Legg, Oliver Buckley, Ioannis Agrafiotis, Gordon Wright, Monica Whitty, David Upton, Michael Goldsmith, and Sadie Creese
    In Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings 2, 2014
  7. Deep Focus: Increasing User" Depth of Field" to Improve Threat Detection (Oxford workshop poster)
    William R Claycomb, Roy Maxion, Jason Clark, Bronwyn Woods, Brian Lindauer, David Jensen, Joshua Neil, Alex Kent, Sadie Creese, and Phil Legg
    2014
  8. Visual analytics of e-mail sociolinguistics for user behavioural analysis
    Philip A Legg, Oliver Buckley, Michael Goldsmith, and Sadie Creese
    J. Internet Serv. Inf. Secur., 2014

2013

  1. Force-directed parallel coordinates
    Rick Walker, Philip A Legg, Serban Pop, Zhao Geng, Robert S Laramee, and Jonathan C Roberts
    In 2013 17th International Conference on Information Visualisation, 2013
  2. Transformation of an uncertain video search pipeline to a sketch-based visual analytics loop
    Philip A Legg, David HS Chung, Matthew L Parry, Rhodri Bown, Mark W Jones, Iwan W Griffiths, and Min Chen
    IEEE transactions on Visualization and Computer Graphics, 2013
  3. Visual analytics for multivariate sorting of sport event data
    D Chung, P Legg, M Parry, I Griffiths, R Brown, R Laramee, and M Chen
    In Workshop on sports data visualization, 2013
  4. Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation
    Philip A Legg, Paul L Rosin, David Marshall, and James E Morgan
    Computerized Medical Imaging and Graphics, 2013
  5. Turn costs change the value of animal search paths
    RP Wilson, IW Griffiths, PA Legg, MI Friswell, OR Bidder, LG Halsey, Sergio Agustin Lambertucci, and ELC Shepard
    Ecology letters, 2013
  6. Towards a conceptual model and reasoning structure for insider threat detection
    Philip A Legg, Nick Moffat, Jason RC Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, and Sadie Creese
    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2013
  7. Video Visualization
    Rita Borgo, Min Chen, Markus Höferlin, Kuno Kurzhals, Phil Legg, Simon Walton, and Daniel Weiskopf
    2013

2012

  1. Visualizing multiple error-sensitivity fields for single camera positioning
    David HS Chung, Matthew L Parry, Philip A Legg, Iwan W Griffiths, Robert S Laramee, and Min Chen
    Computing and Visualization in Science, 2012
  2. MatchPad: interactive glyph-based visualization for real-time sports performance analysis
    Philip A Legg, David HS Chung, Matthew L Parry, Mark W Jones, Rhys Long, Iwan W Griffiths, and Min Chen
    In Computer graphics forum, 2012

2011

  1. From Video to Animated 3D Reconstruction: A Computer Graphics Application for Snooker Skills Training.
    Philip A Legg, Matthew L Parry, David HS Chung, Richard M Jiang, Adrian Morris, Iwan W Griffiths, A David Marshall, and Min Chen
    In Eurographics (Posters), 2011
  2. Intelligent filtering by semantic importance for single-view 3D reconstruction from Snooker video
    Philip A Legg, Matthew L Parry, David HS Chung, Richard M Jiang, Adrian Morris, Iwan W Griffiths, David Marshall, and Min Chen
    In 2011 18th IEEE international conference on image processing, 2011
  3. Hierarchical event selection for video storyboards with a case study on snooker video visualization
    Matthew L Parry, Philip A Legg, David HS Chung, Iwan W Griffiths, and Min Chen
    IEEE Transactions on Visualization and Computer Graphics, 2011

2010

  1. Multimodal retinal imaging: Improving accuracy and efficiency of image registration using Mutual Information
    Philip A Legg
    Cardiff University (United Kingdom), 2010

2009

  1. A robust solution to multi-modal image registration by combining mutual information with multi-scale derivatives
    Philip A Legg, Paul L Rosin, David Marshall, and James E Morgan
    In Medical Image Computing and Computer-Assisted Intervention–MICCAI 2009: 12th International Conference, London, UK, September 20-24, 2009, Proceedings, Part I 12, 2009
  2. Non-rigid elastic registration of retinal images using local window mutual information
    Philip A Legg, Paul L Rosin, David Marshall, and James E Morgan
    Proc. Med. Image Understand. Anal. (MIUA 2009), 2009

2008

  1. Incorporating neighbourhood feature derivatives with mutual information to improve accuracy of multi-modal image registration
    Philip A Legg, Paul L Rosin, David Marshall, and James E Morgan
    Proc. Med. Image Understand. Anal. (MIUA 2008), 2008

2007

  1. Improving accuracy and efficiency of registration by mutual information using Sturges’ histogram rule
    Philip A Legg, Paul L Rosin, David Marshall, and James E Morgan
    Proc. Med. Image Understand. Anal. (MIUA 2007), 2007