Skip to main content

Research Repository

Advanced Search

All Outputs (5)

Visualizing the insider threat: Challenges and tools for identifying malicious user activity (2015)
Presentation / Conference
Legg, P. (2015, October). Visualizing the insider threat: Challenges and tools for identifying malicious user activity. Paper presented at IEEE Symposium on Visualization for Cyber Security, Chicago, Illinois, USA

One of the greatest challenges for managing organisational cyber security is the threat that comes from those who operate within the organisation. With entitled access and knowledge of organisational processes, insiders who choose to attack have the... Read More about Visualizing the insider threat: Challenges and tools for identifying malicious user activity.

Quasi-Hamming distances: An overarching concept for measuring glyph similarity (2015)
Presentation / Conference
Legg, P. A., Maguire, E., Walton, S., & Chen, M. (2015, September). Quasi-Hamming distances: An overarching concept for measuring glyph similarity. Paper presented at EGUK Computer Graphics and Visual Computing 2015, UCL, London, UK

In many applications of spatial or temporal visualization, glyphs provide an effective means for encoding mul- tivariate data objects. However, because glyphs are typically small, they are vulnerable to various perceptual errors. In data communicatio... Read More about Quasi-Hamming distances: An overarching concept for measuring glyph similarity.

Automated insider threat detection system using user and role-based profile assessment (2015)
Journal Article
Legg, P. A., Buckley, O., Goldsmith, M., & Creese, S. (2017). Automated insider threat detection system using user and role-based profile assessment. IEEE Systems Journal, 11(2), 503-512. https://doi.org/10.1109/JSYST.2015.2438442

© 2007-2012 IEEE. Organizations are experiencing an ever-growing concern of how to identify and defend against insider threats. Those who have authorized access to sensitive organizational data are placed in a position of power that could well be abu... Read More about Automated insider threat detection system using user and role-based profile assessment.

Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat (2015)
Presentation / Conference
Legg, P. A., Buckley, O., Goldsmith, M., & Creese, S. (2015, April). Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat. Paper presented at IEEE International Symposium on Technologies for Homeland Security, Waltham, USA

The greatest asset that any organisation has are its people, but they may also be the greatest threat. Those who are within the organisation may have authorised access to vast amounts of sensitive company records that are essential for maintaining co... Read More about Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat.

Knowledge-assisted ranking: A visual analytic application for sports event data (2015)
Journal Article
Chung, D. H., Parry, M. L., Griffiths, I. W., Laramee, R. S., Bown, R., Legg, P. A., & Chen, M. (2016). Knowledge-assisted ranking: A visual analytic application for sports event data. IEEE Computer Graphics and Applications, 36(3), 72-82. https://doi.org/10.1109/MCG.2015.25

© 2016 IEEE. Organizing sports video data for performance analysis can be challenging, especially in cases involving multiple attributes and when the criteria for sorting frequently changes depending on the user's task. The proposed visual analytic s... Read More about Knowledge-assisted ranking: A visual analytic application for sports event data.