Skip to main content

Research Repository

Advanced Search

All Outputs (15)

Interactive cyber-physical system hacking: Engaging students early using Scalextric (2022)
Presentation / Conference
White, J., Legg, P., & Mills, A. (2022, November). Interactive cyber-physical system hacking: Engaging students early using Scalextric. Paper presented at Colloquium on Information Systems Security Education, 2022, Online

Cyber Security as an education discipline covers a variety of topics that can be challenging and complex for students who are new to the subject domain. With this in mind, it is crucial that new students are motivated by understanding both the techni... Read More about Interactive cyber-physical system hacking: Engaging students early using Scalextric.

Teaching offensive and defensive cyber security in schools using a Raspberry Pi Cyber Range (2022)
Presentation / Conference
Legg, P., Mills, A., & Johnson, I. (2022, November). Teaching offensive and defensive cyber security in schools using a Raspberry Pi Cyber Range. Paper presented at Colloquium on Information Systems Security Education, Online

Computer Science as a subject is now appearing in more school curricula for GCSE and A level, with a growing demand for cyber security to be embedded within this teaching. Yet, teachers face challenges with limited time and resource for preparing pra... Read More about Teaching offensive and defensive cyber security in schools using a Raspberry Pi Cyber Range.

The visual design of network data to enhance cyber security awareness of the everyday internet user (2020)
Presentation / Conference
Carroll, F., Legg, P., & Bønkel, B. (2020, June). The visual design of network data to enhance cyber security awareness of the everyday internet user. Paper presented at IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber Science 2020)

Technology and the use of online services are very prevalent across much of our everyday lives. As our digital interactions continue to grow, there is a need to improve public awareness of the risks to our personal online privacy and security. Design... Read More about The visual design of network data to enhance cyber security awareness of the everyday internet user.

Shouting through letterboxes: A study on attack susceptibility of voice assistants (2020)
Presentation / Conference
Mccarthy, A., Gaster, B., & Legg, P. (2020, June). Shouting through letterboxes: A study on attack susceptibility of voice assistants. Paper presented at IEEE International Conference on Cyber Security and the Protection of Digital Services (Cyber Science 2020)

Voice assistants such as Amazon Echo and Google Home have become increasingly popular for many home users, for home automation, entertainment, and convenience. These devices process speech commands from a user to execute some action, such as playing... Read More about Shouting through letterboxes: A study on attack susceptibility of voice assistants.

"What did you say?": Extracting unintentional secrets from predictive text learning systems (2020)
Presentation / Conference
Wilkinson, G., & Legg, P. (2020, June). "What did you say?": Extracting unintentional secrets from predictive text learning systems. Paper presented at IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Science 2020)

As a primary form of communication, text is used widely in applications including e-mail conversations, mobile text messaging, chatrooms, and forum discussions. Modern systems include facilities such as predictive text, recently implemented using dee... Read More about "What did you say?": Extracting unintentional secrets from predictive text learning systems.

RicherPicture: Semi-automated cyber defence using context-aware data analytics (2017)
Presentation / Conference
Erola, A., Agrafiotis, I., Happa, J., Goldsmith, M., Creese, S., & Legg, P. (2017, June). RicherPicture: Semi-automated cyber defence using context-aware data analytics. Paper presented at International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2017), London

In a continually evolving cyber-threat landscape, the detection and prevention of cyber attacks has become a complex task. Technological developments have led organisations to digitise the majority of their operations. This practice, however, has its... Read More about RicherPicture: Semi-automated cyber defence using context-aware data analytics.

Enhancing cyber situation awareness for non-expert users using visual analytics (2016)
Presentation / Conference
Legg, P. (2016, June). Enhancing cyber situation awareness for non-expert users using visual analytics. Paper presented at International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA 2016), London, UK

Situation awareness is often described as the perception and comprehension of the current situation, and the projection of future status. Whilst this may be understood in an organisational cybersecurity context, there is a strong case to be made for... Read More about Enhancing cyber situation awareness for non-expert users using visual analytics.

Visualizing the insider threat: Challenges and tools for identifying malicious user activity (2015)
Presentation / Conference
Legg, P. (2015, October). Visualizing the insider threat: Challenges and tools for identifying malicious user activity. Paper presented at IEEE Symposium on Visualization for Cyber Security, Chicago, Illinois, USA

One of the greatest challenges for managing organisational cyber security is the threat that comes from those who operate within the organisation. With entitled access and knowledge of organisational processes, insiders who choose to attack have the... Read More about Visualizing the insider threat: Challenges and tools for identifying malicious user activity.

Quasi-Hamming distances: An overarching concept for measuring glyph similarity (2015)
Presentation / Conference
Legg, P. A., Maguire, E., Walton, S., & Chen, M. (2015, September). Quasi-Hamming distances: An overarching concept for measuring glyph similarity. Paper presented at EGUK Computer Graphics and Visual Computing 2015, UCL, London, UK

In many applications of spatial or temporal visualization, glyphs provide an effective means for encoding mul- tivariate data objects. However, because glyphs are typically small, they are vulnerable to various perceptual errors. In data communicatio... Read More about Quasi-Hamming distances: An overarching concept for measuring glyph similarity.

Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat (2015)
Presentation / Conference
Legg, P. A., Buckley, O., Goldsmith, M., & Creese, S. (2015, April). Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat. Paper presented at IEEE International Symposium on Technologies for Homeland Security, Waltham, USA

The greatest asset that any organisation has are its people, but they may also be the greatest threat. Those who are within the organisation may have authorised access to vast amounts of sensitive company records that are essential for maintaining co... Read More about Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat.

Understanding insider threat: A framework for characterising attacks (2014)
Presentation / Conference
Nurse, J., Buckley, O., Legg, P., Goldsmith, M., Creese, S., Wright, G., & Whitty, M. (2014, May). Understanding insider threat: A framework for characterising attacks. Paper presented at Workshop on Research for Insider Threat (Security and Privacy Workshops at IEEE Symposium on Security and Privacy)

The threat that insiders pose to businesses, institu- tions and governmental organisations continues to be of serious concern. Recent industry surveys and academic literature provide unequivocal evidence to support the significance of this threat and... Read More about Understanding insider threat: A framework for characterising attacks.

Visualising state space representations of LSTM networks
Presentation / Conference
Smith, E. M., Smith, J., Legg, P., & Francis, S. Visualising state space representations of LSTM networks. Presented at Workshop on Visualization for AI Explainability, Berlin, Germany

Long Short-Term Memory (LSTM) networks have proven to be one of the most effective models for making predictions on sequence-based tasks. These models work by capturing, remembering, and forgetting information relevant to their future predictions. Th... Read More about Visualising state space representations of LSTM networks.

Non-rigid elastic registration of retinal images using local window mutual information
Presentation / Conference
Legg, P., Rosin, P., Marshall, D., & Morgan, J. Non-rigid elastic registration of retinal images using local window mutual information

In this paper we consider the problem of non-rigid retinal image registration between colour fundus photographs and Scanning Laser Ophthalmoscope (SLO) images. Registration would allow for cross-comparison between modalities, giving both appearence a... Read More about Non-rigid elastic registration of retinal images using local window mutual information.

Incorporating neighbourhood feature derivatives with Mutual Information to improve accuracy of multi-modal image registration
Presentation / Conference
Legg, P., Rosin, P., Marshall, D., & Morgan, J. Incorporating neighbourhood feature derivatives with Mutual Information to improve accuracy of multi-modal image registration

In this paper we present an improved method for performing image registration of different modalities. Russakoff [1] proposed the method of Regional Mutual Information (RMI) which allows neighbourhood information to be considered in the Mutual Inform... Read More about Incorporating neighbourhood feature derivatives with Mutual Information to improve accuracy of multi-modal image registration.

Improving accuracy and efficiency of registration by mutual information using Sturges’ Histogram Rule
Presentation / Conference
Legg, P., Rosin, P., Marshall, D., & Morgan, J. Improving accuracy and efficiency of registration by mutual information using Sturges’ Histogram Rule

Mutual Information is a common technique for image registration in the medical domain, in particular where images of different modalities are to be registered. In this paper, we wish to demonstrate the benefits of applying a common method known in st... Read More about Improving accuracy and efficiency of registration by mutual information using Sturges’ Histogram Rule.