Follow
Matthew Edwards
Title
Cited by
Cited by
Year
Data exfiltration: A review of external attack vectors and countermeasures
F Ullah, M Edwards, R Ramdhany, R Chitchyan, MA Babar, A Rashid
Journal of Network and Computer Applications, 2017
1762017
Panning for gold: Automatically analysing online social engineering attack surfaces
M Edwards, R Larson, B Green, A Rashid, A Baron
Computers & Security 69, 18-34, 2017
1282017
Automatically dismantling online dating fraud
G Suarez-Tangil, M Edwards, C Peersman, G Stringhini, A Rashid, ...
Transactions on Information Forensics and Security 15, 1128-1137, 2019
1022019
A systematic survey of online data mining technology intended for law enforcement
M Edwards, A Rashid, P Rayson
ACM Computing Surveys 48 (1), 2015
632015
The persuasive effects of political microtargeting in the age of generative artificial intelligence
A Simchon, M Edwards, S Lewandowsky
PNAS Nexus 3 (2), pgae035, 2024
572024
The geography of online dating fraud
M Edwards, G Suarez-Tangil, C Peersman, G Stringhini, A Rashid, ...
Workshop on Technology and Consumer Protection, 2018
382018
Discovering unknown known security requirements
A Rashid, SAA Naqvi, R Ramdhany, M Edwards, R Chitchyan, MA Babar
Proceedings of the 38th International Conference on Software Engineering …, 2016
342016
Scamming the scammers: Towards automatic detection of persuasion in advance fee frauds
MJ Edwards, C Peersman, A Rashid
Second International Workshop on Computational Methods for CyberSafety …, 2017
322017
Identifying unintended harms of cybersecurity countermeasures
YT Chua, S Parkin, M Edwards, D Oliveira, S Schiffner, G Tyson, ...
APWG Symposium on Electronic Crime Research (eCrime), 2019
272019
Detecting and preventing data exfiltration
A Rashid, R Ramdhany, M Edwards, SM Kibirige, A Babar, D Hutchison, ...
Technical Report, 2014
242014
“So if Mr Blue Head here clicks the link...” Risk thinking in cyber security decision making
B Shreeve, J Hallett, M Edwards, P Anthonysamy, S Frey, A Rashid
ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-29, 2020
212020
The best laid plans or lack thereof: Security decision-making of different stakeholder groups
B Shreeve, J Hallett, M Edwards, KM Ramokapane, R Atkins, A Rashid
IEEE Transactions on Software Engineering, 2020
202020
Pets without PETs: on pet owners’ under-estimation of privacy concerns in pet wearables
D van der Linden, M Edwards, I Hadar, A Zamansky
Proceedings on Privacy Enhancing Technologies 2020 (1), 143-164, 2020
182020
“I have only checked after the event”: Consumer approaches to safe online shopping
JM Whittaker, M Edwards, C Cross, M Button
Victims & Offenders, 1-23, 2022
142022
Data, data, everywhere: quantifying software developers’ privacy attitudes
D van der Linden, I Hadar, M Edwards, A Rashid
9th International Workshop on Socio-Technical Aspects in Security (STAST), 2019
142019
Sampling labelled profile data for identity resolution
M Edwards, S Wattam, P Rayson, A Rashid
2016 IEEE International Conference on Big Data, 2016
132016
Inferring semantic mapping between policies and code: The clue is in the language
P Anthonysamy, M Edwards, C Weichel, A Rashid
International Symposium on Engineering Secure Software and Systems, 233-250, 2016
132016
Characterising cybercriminals: A review
M Edwards, E Williams, C Peersman, A Rashid
arXiv preprint arXiv:2202.07419, 2022
112022
Online reading habits can reveal personality traits: Towards detecting psychological microtargeting
A Simchon, A Sutton, M Edwards, S Lewandowsky
PNAS Nexus, pgad191, 2023
92023
A service-independent model for linking online user profile information
M Edwards, A Rashid, P Rayson
IEEE Joint Intelligence and Security Informatics Conference (JISIC) 2014, 2014
92014
The system can't perform the operation now. Try again later.
Articles 1–20