Home > Research > Researchers > Mr Matthew Edwards > Publications

Matthew Edwards

Research student

  1. 2018
  2. Published

    Data Exfiltration: A Review of External Attack Vectors and Countermeasures

    Ullah, F., Edwards, M., Ramdhany, R., Chitchyan, R., Babar, M. A. & Rashid, A., 1/01/2018, In : Journal of Network and Computer Applications. 101, p. 18-54 37 p.

    Research output: Contribution to journalJournal article

  3. Published

    Data quality measures for identity resolution

    Edwards, M., 2018, Lancaster University. 252 p.

    Research output: ThesisDoctoral Thesis

  4. 2017
  5. Published

    Panning for gold: automatically analysing online social engineering attack surfaces

    Edwards, M., Larson, R., Green, B., Rashid, A. & Baron, A., 08/2017, In : Computers and Security. 69, p. 18-34 17 p.

    Research output: Contribution to journalJournal article

  6. Published

    Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)

    Whitty, M., Edwards, M. J., Levi, M., Peersman, C., Rashid, A., Sasse, A., Sorell, T. & Stringhini, G., 3/04/2017, Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017), co-located with the International Conference on World Wide Web (WWW). New York: ACM, p. 1311-1314 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  7. Published

    Scamming the scammers: towards automatic detection of persuasion in advance fee frauds

    Edwards, M. J., Peersman, C. & Rashid, A., 3/04/2017, Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017) co-located with International Conference on World Wide Web (WWW). New York: ACM, p. 1291-1299 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  8. 2016
  9. Published

    Sampling labelled profile data for identity resolution

    Edwards, M., Wattam, S. M., Rayson, P. E. & Rashid, A., 5/12/2016, Proceedings of IEEE International Conference on Big Data (IEEE BigData 2016). IEEE, p. 540-547 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  10. Published

    Discovering “unknown known” security requirements

    Rashid, A., Naqvi, A., Ramdhany, R., Edwards, M., Chitchyan, R. & Ali Babar, M., 14/05/2016, ICSE '16 Proceedings of the 38th International Conference on Software Engineering Austin, TX, May 14 - 22, 2016. New York: ACM, p. 866-876 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  11. Published

    Inferring semantic mapping between policies and code: the clue is in the language

    Anthonysamy, P., Edwards, M., Weichel, C. & Rashid, A., 29/03/2016, Engineering Secure Software and Systems : 8th International Symposium, ESSoS 2016, London, United Kingdom, April 6-8, 2016. Proceedings.. Caballero, J., Bodden, E. & Athanasopoulos, E. (eds.). Springer, p. 233-250 18 p. (Lecture Notes in Computer Science; vol. 9639).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  12. 2015
  13. Published

    A systematic survey of online data mining technology intended for law enforcement

    Edwards, M., Rashid, A. & Rayson, P., 09/2015, In : ACM Computing Surveys. 48, 1

    Research output: Contribution to journalJournal article

  14. Published

    Sonar phishing: pinpointing highly vulnerable victims for social engineering attacks

    Larson, R., Edwards, M., Baron, A. & Rashid, A., 2015, 36th IEEE Symposium on Security and Privacy Posters. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  15. 2014
  16. Published

    Detecting and Preventing Data Exfiltration

    Rashid, A., Ramdhany, R., Edwards, M., Kibirige Mukisa, S., Ali Babar, M., Hutchison, D. & Chitchyan, R., 04/2014, Lancaster: Lancaster University. 40 p.

    Research output: Book/Report/ProceedingsOther report

  17. Published

    A service-independent model for linking online user profile information

    Edwards, M., Rashid, A. & Rayson, P., 2014, IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014. IEEE, p. 280-283 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  18. 2012
  19. Published

    Collaborative Filtering as an Investigative Tool for Peer-to-Peer Filesharing Networks

    Edwards, M. & Rashid, A., 2012, International Conference on Cyber Security.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

Back to top