Skip to main content

Research Repository

Advanced Search

All Outputs (2)

Automated insider threat detection system using user and role-based profile assessment (2015)
Journal Article
Legg, P. A., Buckley, O., Goldsmith, M., & Creese, S. (2017). Automated insider threat detection system using user and role-based profile assessment. IEEE Systems Journal, 11(2), 503-512. https://doi.org/10.1109/JSYST.2015.2438442

© 2007-2012 IEEE. Organizations are experiencing an ever-growing concern of how to identify and defend against insider threats. Those who have authorized access to sensitive organizational data are placed in a position of power that could well be abu... Read More about Automated insider threat detection system using user and role-based profile assessment.

Knowledge-assisted ranking: A visual analytic application for sports event data (2015)
Journal Article
Chung, D. H., Parry, M. L., Griffiths, I. W., Laramee, R. S., Bown, R., Legg, P. A., & Chen, M. (2016). Knowledge-assisted ranking: A visual analytic application for sports event data. IEEE Computer Graphics and Applications, 36(3), 72-82. https://doi.org/10.1109/MCG.2015.25

© 2016 IEEE. Organizing sports video data for performance analysis can be challenging, especially in cases involving multiple attributes and when the criteria for sorting frequently changes depending on the user's task. The proposed visual analytic s... Read More about Knowledge-assisted ranking: A visual analytic application for sports event data.