Refereed Journal Publications


    2016

  1. P.A. Legg. Visual Analytics for Non-Expert Users in Cyber Situation Awareness. International Journal on Cyber Situational Awareness, 1(1), 2016, pp.54-73.
  2. P.A. Legg, E. Maguire, S. Walton and M. Chen. Glyph Visualization – A fail-safe design scheme based on quasi-Hamming distances. IEEE Computer Graphics and Applications, 37(2), 2017, pp.31-41.
  3. W. S. Ng, P. A. Legg, V. Avadhanam, K. Aye, S. H. P. Evans, R. V. North, A. D. Marshall, P. Rosin, J. E. Morgan. Automated Registration of Multimodal Optic Disc Images: Clinical Assessment of Alignment Accuracy. Journal of Glaucoma, 25(4) 2016, pp. 397-402

  4. 2015

  5. I. Agrafiotis, J.R.C. Nurse, O. Buckley, P.A. Legg, S. Creese and M. Goldsmith. Identifying attack patterns for insider threat detection. Computer Fraud & Security, 2015(7), pp. 9-17
  6. D. Chung, P.A. Legg, M.L. Parry, R. Bown, I. Griffiths, R. Laramee, M. Chen. Knowledge-Assisted Ranking: A Visual Analytic Application for Sport Event Data. IEEE Computer Graphics and Applications, 36(3) 2015, pp. 72-82
  7. P.A. Legg, O. Buckley, M. Goldsmith and S. Creese. Automated Insider Threat Detection System Using User and Role-Based Profile Assessment. IEEE Systems Journal, 2015
  8. D. Chung, P.A. Legg, M.L. Parry, R. Bown, I. Griffiths, R. Laramee and M. Chen. Glyph sorting: Interactive Visualization for Multi-dimensional data. Information Visualization, 14(1) 2015, pp. 76-90
  9. P.A. Legg, P.L. Rosin, D. Marshall and J.E. Morgan. Feature Neighbourhood Mutual Information for multi-modal image registration: An application to eye fundus imaging. Pattern Recognition, 48(6) 2015, pp. 1937-1946

  10. 2014

  11. I. Agrafiotis, P.A. Legg, M. Goldsmith and S. Creese. Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection. Journal of Internet Services and Information Security (JISIS), 4(4) 2014, pp. 127-137
  12. P.A. Legg, O. Buckley, M. Goldsmith and S. Creese. Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis. Journal of Internet Services and Information Security (JISIS), 4(4) 2014, pp. 1-13 [MIST 2014 Best Paper]
  13. D. Chung, I. Griffiths, P.A. Legg, M.L. Parry, A. Morris, M. Chen, W. Griffiths and A. Thomas. Systematic Snooker Skills Test to Analyze Player Performance. International Journal of Sports Science & Coaching, 9(5) 2014, pp. 1083-1106

  14. 2013

  15. P.A. Legg, P.L. Rosin, D. Marshall and J.E. Morgan. Improving accuracy and efficiency of mutual information for multi-modal retinal image registration using adaptive probability density estimation. Computerized Medical Imaging and Graphics, 37(7) 2013, pp. 597-606
  16. R. Jiang, M.L. Parry, P.A. Legg, D.H.S. Chung, I.W. Griffiths. Automated 3-D Animation From Snooker Videos With Information-Theoretical Optimization. IEEE Transactions on Computational Intelligence and AI in Games, 5(4) 2013, pp. 337-345
  17. P.A. Legg, N. Moffat, J.R.C. Nurse, J. Happa, I. Agrafiotis, M. Goldsmith and S. Creese. Towards a conceptual model and reasoning structure for insider threat detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4(4) 2013, pp. 20-37
  18. P.A. Legg, D.H.S. Chung, M.L. Parry, R. Bown, M.W. Jones, I.W. Griffiths and M. Chen. Transformation of an uncertain video search pipeline to a sketch-based visual analytics loop. IEEE Transactions on Visualization and Computer Graphics, 19(12) 2013, pp. 2109-2118
  19. R.P. Wilson, I.W. Griffiths, P.A. Legg, M.I. Friswell, O.R. Bidder, L.G. Halsey, S.A. Lambertucci and E.L.C. Shepard. Turn costs change the value of animal search paths. Ecology letters, 16(9) 2013, pp. 1145-1150

  20. 2012

  21. D.H.S. Chung, M.L. Parry, P.A. Legg, I.W. Griffiths, R.S. Laramee and M. Chen. Visualizing multiple error-sensitivity fields for single camera positioning. Computing and Visualization in Science, 15(6) 2012, pp. 303-317
  22. P.A. Legg, D.H.S. Chung, M.L. Parry, M.W. Jones, R. Long, I.W. Griffiths and M. Chen. MatchPad: Interactive Glyph‐Based Visualization for Real‐Time Sports Performance Analysis. Computer Graphics Forum, 31(3pt4) 2012, pp. 1255-1264

  23. 2011

  24. M.L. Parry, P.A. Legg, D.H.S. Chung, I.W. Griffiths and M. Chen. Hierarchical event selection for video storyboards with a case study on snooker video visualization. IEEE Transactions on Visualization and Computer Graphics, 17(12) 2011, pp. 1747-1756

  25. 2009

  26. P.A. Legg, P.L. Rosin, D. Marshall and J.E. Morgan. A robust solution to multi-modal image registration by combining mutual information with multi-scale derivatives. Medical Image Computing and Computer-Assisted Intervention (MICCAI) 2009, pp. 616-623

Refereed Conference Publications


    2016

  1. P.A. Legg. Enhancing Cyber Situation Awareness for Non-Expert Users using Visual Analytics. International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2016 [CyberSA 2016 Best Paper]

  2. 2015

  3. P.A. Legg. Visualizing the insider threat: challenges and tools for identifying malicious user activity. IEEE International Symposium on Visualization for Cyber Security (VizSec), 2015
  4. P.A. Legg, O. Buckley, M. Goldsmith and S. Creese. Caught in the Action of an Insider Attack: Detection and Assessment of Insider Threat. IEEE International Symposium on Technologies for Homeland Security (HST), 2015
  5. B.A. Alahmadi, P.A. Legg and J.R.C. Nurse. Using Internet Activity Profiling for Insider-Threat Detection. Workshop on Security in Information Systems (WOSIS), 2015

  6. 2014

  7. J.R.C. Nurse, O. Buckley, P.A. Legg, M. Goldsmith, S. Creese, G.R.T. Wright and M. Whitty. Understanding insider threat: A framework for characterising attacks. IEEE Security and Privacy Workshops (SPW), 2014, pp. 214-228
  8. O. Buckley, J.R.C. Nurse, P.A. Legg, M. Goldsmith and S. Creese. Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. Workshop on Socio-Technical Aspects in Security and Trust (STAST) / IEEE Computer Security Foundations (CSF) Symposium, 52014, pp. 616-623
  9. J.R.C. Nurse, P.A. Legg, O. Buckley, I. Agrafiotis, G.R.T. Wright, M. Whitty, D. Upton, M. Goldsmith and S. Creese. A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches. Human Aspects of Information Security Privacy and Trust, 2014, pp. 270-281

  10. 2013

  11. R. Walker, P.A. Legg, S. Pop, Z. Geng, R.S. Laramee and J.C. Roberts. Force-Directed Parallel Coordinates. 17th International Conference on Information Visualisation (IV), 2013, pp. 36-44

  12. 2011

  13. P.A. Legg, M.L. Parry, D.H.S. Chung, R.M. Jiang, A. Morris, I.W. Griffiths, D. Marshall and M. Chen. Intelligent filtering by semantic importance for single-view 3d reconstruction from snooker video. IEEE International Conference on Image Processing (ICIP) 2011, pp. 2385-2388

  14. 2009

  15. P.A. Legg, P.L. Rosin, D. Marshall and J.E. Morgan. Non-rigid elastic registration of retinal images using local window mutual information. Medical Imaging Understanding and Analysis (MIUA) 2009, pp. 144-148

  16. 2008

  17. P.A. Legg, P.L. Rosin, D. Marshall and J.E. Morgan. Incorporating neighbourhood feature derivatives with mutual information to improve accuracy of multi-modal image registration. Medical Imaging Understanding and Analysis (MIUA) 2008, pp. 39-43

  18. 2007

  19. P.A. Legg, P.L. Rosin, D. Marshall and J.E. Morgan. Improving accuracy and efficiency of registration by mutual information using Sturges’ histogram rule. Medical Imaging Understanding and Analysis (MIUA) 2007, pp. 26-30

Short Papers and Misc.

  1. P.A. Legg, E. Maguire, S. Walton and M. Chen. Quasi-Hamming distances: An overarching concept for measuring glyph similarity. Eurographics UK Computer Graphics and Visual Computing, 2015
  2. W.R. Claycomb, P.A. Legg and D. Gollmann. Guest Editorial: Emerging Trends in Research for Insider Threat Detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5(2) 2014, pp. 1-6
  3. D.H.S. Chung, P.A. Legg, M.L. Parry, I.W. Griffiths, R. Bown, R.S. Laramee and M. Chen. Visual Analytics for Multivariate Sorting of Sport Event Data. 1st Workshop on Sports Data Visualization, 2013
  4. R. Borgo, M. Chen, M. Hoferlin, K. Kurzhals, P. Legg, S. Walton and D. Weiskopf. Video Visualization Workshop. IEEE VIS, 2013
  5. R. Borgo, M. Chen, M. Hoferlin, K. Kurzhals, P. Legg, S. Walton and D. Weiskopf. Video Visualization Workshop. Eurographics, 2013
  6. S. Ng, P. A. Legg, K. H. Aye and J. E. Morgan. Evaluation of FNMI algorithm in multi-modal registration of optic disc images. Oxford Ophthalmological Congress, 2011
  7. P.A. Legg, M. L. Parry, D. H. S. Chung, R. M. Jiang, A. Morris, I. W. Griffiths, D. Marshall and M. Chen. From Video to 3D Animated Reconstruction: A Computer Graphics Application for Snooker Skills Training. Eurographics, Bangor, 2011
  8. K. H. Aye, P. A. Legg, A. Jones, V. Avadhanam, R. V. North, D. Marshall, P. L. Rosin and J. E. Morgan. Demarcation of the optic disc margin: a comparison of photographic and laser tomographic methods. Oxford Ophthalmological Congress, 2010
  9. P.A. Legg. Multi-modal image registration: approaches for improving the accuracy and efficiency of Mutual Information. Visual Computing in Wales Workshop (VCWW), Aberystwyth, 2009
  10. P.A. Legg, R. V. North, P. L. Rosin, D. Marshall and J. E. Morgan. Multi-modal retinal imaging: new strategies in the analysis of optic nerve head images. United Kingdom and Eire Glaucoma Society (UKEGS), Cardiff, 2007

Thesis

  • P.A. Legg. Multi-modal Retinal Imaging: Improving Accuracy and Efficiency of Image Registration using Mutual Information. PhD thesis, School of Computer Science, Cardiff University, 2010
  • P.A. Legg. Multi-player Internet Game: Chinese Checkers. BSc Computer Science Final Year Project, School of Computer Science, Cardiff University, 2006
  • Other Invited Talks and Seminars

  • Data-Driven Decisions using Visual Analytics, Data-Led Decision Support (Guest Lecture), Cranfield University, April 2016.
  • Visualizing Cyber Security, vLunch, Cardiff University, March 2016.
  • Visualization: What is it good for?, Software Engineering Research Group workshop, UWE Bristol, March 2015.
  • Insider Threat Research Workshop, Cyber Security Centre, Oxford University, March 2015.
  • CITD: Corporate Insider Threat Detection, SMi Oil and Gas Cyber Security conference, Oslo, June 2014.
  • Generating Data for Insider Threat Research Workshop, Cyber Security Centre, Oxford University, April 2014. (Co-Organiser).
  • CIFAS Annual conference, London, June 2013.
  • Sports Informatics Symposium, Loughborough University, June 2012.
  • Sports Video Visualization Workshop, Swansea Football Club, Liberty Stadium, April 2012. (Co-Organiser)
  • Interactive Glyph-Based Visualization for Real-Time Sports Performance Analysis, Glyph-Based Visualization Workshop, Oxford University, May 2012.
  • Sports Video Visualization, Sports Video Visualization Workshop, Vale of Glamorgan Hotel, April 2011. (Co-Organiser)
  • Sports Video Visualization, vLunch, Cardiff University, October 2011.
  • Grants and Awards

  • J. Happa (PI), P.A. Legg, A. Erola, I. Agrafiotis, M. Goldsmith and S. Creese. Automated network defence through business and threat-led machine learning (Phase 2). DSTL, April 2016 - March 2017. Total award: £280k
  • P.A. Legg. Enhanced personal situational awareness through network and systems visualization. Vice-Chancellor's Early Career Researcher Award, University of the West of England, 2015-16. Total award: £13k
  • P.A. Legg. CSCT Researcher of the Year Award. University of the West of England, July 2015. Total award: £1k
  • J. Happa (PI), P.A. Legg, I. Agrafiotis, M. Goldsmith and S. Creese. Automated network defence through business and threat-led machine learning. DSTL Centre for Defence Enterprise (CDE37775), April 2015 - September 2015. Total award: £108k
  • P.A. Legg. Professor Richard Whipp PhD Scholarship Award. Cardiff University, September 2006.
  • Other academic duties

    • Reviewer for various journals and conferences:
      • IEEE VAST / IEEE Visualization and Computer Graphics journal (2011-).
      • CompBioMed conference (2011).
      • EuroVis conference / Computer Graphics Forum journal (2012-).
      • Shape Analysis and Deformable Modelling conference (2012).
      • IEEE Symposium on Security and Privacy Workshop - Workshop on Research for Insider Threat (WRIT) (2014-).
      • Managing Insider Security Threats (MIST) conference (2014-).
      • The Visual Computer journal (2015-).
      • IEEE Systems journal (2015-).
      • IET Image Processing (2015-).
      • IEEE Medical Imaging (2015-).
      • IEEE Computer Graphics and Application (2016-)
      • Information Sciences (2016-)
      • IEEE COMPSAC (2016-)
    • Program Committee Member:
      • Managing Insider Security Threats (MIST) conference (2014-).
      • IEEE Symposium on Security and Privacy Workshop - Workshop on Research for Insider Threat (2015-).
      • IEEE COMPSAC 2016 – Symposium on Security, Privacy and Trust in Computing (SEPT) (2016-)
      • International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, (2016, PCM and Publicity Chair).
      • Eurographics UK Computer Graphics and Visual Computing (CGVC) conference (2016-).
      • IEEE Visualization for Cyber Security (VizSec) (2016-).
    • Editorial Review Board:
      • International Journal of Mobile Human Computer Interaction (2012-).
    • Conference organisation:
      • Co-organiser of the "Sports Video Visualization Workshop” with Dr. Iwan Griffiths (Swansea University) and Welsh Rugby Union, held at Vale of Glamorgan Hotel, Cardiff 2011.
      • Co-organiser of the "Sports Video Visualization Workshop” with Dr. Iwan Griffiths (Swansea University) and Swansea Football Club, held at Swansea Football Club, Liberty Stadium, Swansea 2012.
      • Co-organiser of the "Generating Data for Insider Threat Research Workshop" with Dr. William R. Claycomb (Carnegie Mellon University), held at the University of Oxford, Cyber Security Centre, 2014.
    • IEEE Professional Membership
    • British Computer Society (BCS) Professional Membership