Matthew Edwards
Title
Cited by
Cited by
Year
Panning for gold: Automatically analysing online social engineering attack surfaces
M Edwards, R Larson, B Green, A Rashid, A Baron
Computers & Security 69, 18-34, 2017
612017
Data exfiltration: A review of external attack vectors and countermeasures
F Ullah, M Edwards, R Ramdhany, R Chitchyan, MA Babar, A Rashid
Journal of Network and Computer Applications, 2017
522017
A systematic survey of online data mining technology intended for law enforcement
M Edwards, A Rashid, P Rayson
ACM Computing Surveys 48 (1), 2015
272015
Discovering unknown known security requirements
A Rashid, SAA Naqvi, R Ramdhany, M Edwards, R Chitchyan, MA Babar
Proceedings of the 38th International Conference on Software Engineering …, 2016
222016
Detecting and preventing data exfiltration
A Rashid, R Ramdhany, M Edwards, SM Kibirige, A Babar, D Hutchison, ...
Technical Report, 2014
182014
Automatically dismantling online dating fraud
G Suarez-Tangil, M Edwards, C Peersman, G Stringhini, A Rashid, ...
Transactions on Information Forensics and Security 15, 1128-1137, 2019
152019
Scamming the scammers: Towards automatic detection of persuasion in advance fee frauds
MJ Edwards, C Peersman, A Rashid
Second International Workshop on Computational Methods for CyberSafety …, 2017
142017
The geography of online dating fraud
M Edwards, G Suarez-Tangil, C Peersman, G Stringhini, A Rashid, ...
Workshop on Technology and Consumer Protection, 2018
112018
Sampling labelled profile data for identity resolution
M Edwards, S Wattam, P Rayson, A Rashid
2016 IEEE International Conference on Big Data, 2016
92016
A service-independent model for linking online user profile information
M Edwards, A Rashid, P Rayson
IEEE Joint Intelligence and Security Informatics Conference (JISIC) 2014, 2014
82014
Inferring semantic mapping between policies and code: The clue is in the language
P Anthonysamy, M Edwards, C Weichel, A Rashid
International Symposium on Engineering Secure Software and Systems, 233-250, 2016
72016
Identifying unintended harms of cybersecurity countermeasures
YT Chua, S Parkin, M Edwards, D Oliveira, S Schiffner, G Tyson, ...
Symposium on Electronic Crime Research (eCrime), 2019
62019
Data, data, everywhere: quantifying software developers’ privacy attitudes
D van der Linden, I Hadar, M Edwards, A Rashid
9th International Workshop on Socio-Technical Aspects in Security (STAST), 2019
32019
Pets without PETs: on pet owners’ under-estimation of privacy concerns in pet wearables
D van der Linden, M Edwards, I Hadar, A Zamansky
Proceedings on Privacy Enhancing Technologies 2020 (1), 143-164, 2020
22020
Collaborative filtering as an investigative tool for peer-to-peer filesharing networks
M Edwards, A Rashid
ASE Science Journal 1 (2), 67-79, 2012
22012
“So if Mr Blue Head here clicks the link...” Risk thinking in cyber security decision making
B Shreeve, J Hallett, M Edwards, P Anthonysamy, S Frey, A Rashid
ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-29, 2020
12020
The best laid plans or lack thereof: Security decision-making of different stakeholder groups
B Shreeve, J Hallett, M Edwards, KM Ramokapane, R Atkins, A Rashid
IEEE Transactions on Software Engineering, 2020
12020
Ethical and social challenges with developing automated methods to detect and warn potential victims of mass-marketing fraud
MT Whitty, M Edwards, M Levi, C Peersman, A Rashid, A Sasse, T Sorell, ...
Second International Workshop on Computational Methods for CyberSafety …, 2017
12017
Resource networks of pet scam websites
B Price, M Edwards
Symposium on Electronic Crime Research (eCrime), 2020
2020
Data quality measures for identity resolution
M Edwards
Lancaster University, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20