Home > Research > Researchers > Mr Matthew Edwards > Publications

Matthew Edwards

Research student

  1. 2018
  2. Published

    Data Exfiltration: A Review of External Attack Vectors and Countermeasures

    Ullah, F., Edwards, M., Ramdhany, R., Chitchyan, R., Babar, M. A. & Rashid, A. 1/01/2018 In : Journal of Network and Computer Applications. 101, p. 18-54 37 p.

    Research output: Contribution to journalJournal article

  3. 2017
  4. Published

    Panning for gold: automatically analysing online social engineering attack surfaces

    Edwards, M., Larson, R., Green, B., Rashid, A. & Baron, A. 08/2017 In : Computers and Security. 69, p. 18-34 17 p.

    Research output: Contribution to journalJournal article

  5. Published

    Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)

    Whitty, M., Edwards, M. J., Levi, M., Peersman, C., Rashid, A., Sasse, A., Sorell, T. & Stringhini, G. 3/04/2017 Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017), co-located with the International Conference on World Wide Web (WWW). New York: ACM, p. 1311-1314 4 p.

    Research output: Contribution in Book/Report/ProceedingsConference contribution

  6. Published

    Scamming the scammers: towards automatic detection of persuasion in advance fee frauds

    Edwards, M. J., Peersman, C. & Rashid, A. 3/04/2017 Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017) co-located with International Conference on World Wide Web (WWW). New York: ACM, p. 1291-1299 9 p.

    Research output: Contribution in Book/Report/ProceedingsConference contribution

  7. 2016
  8. Published

    Sampling labelled profile data for identity resolution

    Edwards, M., Wattam, S. M., Rayson, P. E. & Rashid, A. 5/12/2016 Proceedings of IEEE International Conference on Big Data (IEEE BigData 2016). IEEE, p. 540-547 8 p.

    Research output: Contribution in Book/Report/ProceedingsConference contribution

  9. Published

    Discovering “unknown known” security requirements

    Rashid, A., Naqvi, A., Ramdhany, R., Edwards, M., Chitchyan, R. & Ali Babar, M. 14/05/2016 ICSE '16 Proceedings of the 38th International Conference on Software Engineering Austin, TX, May 14 - 22, 2016. New York: ACM, p. 866-876 11 p.

    Research output: Contribution in Book/Report/ProceedingsConference contribution

  10. Published

    Inferring semantic mapping between policies and code: the clue is in the language

    Anthonysamy, P., Edwards, M., Weichel, C. & Rashid, A. 29/03/2016 Engineering Secure Software and Systems : 8th International Symposium, ESSoS 2016, London, United Kingdom, April 6-8, 2016. Proceedings.. Caballero, J., Bodden, E. & Athanasopoulos, E. (eds.). Springer, p. 233-250 18 p. (Lecture Notes in Computer Science; vol. 9639)

    Research output: Contribution in Book/Report/ProceedingsConference contribution

  11. 2015
  12. Published

    A systematic survey of online data mining technology intended for law enforcement

    Edwards, M., Rashid, A. & Rayson, P. 09/2015 In : ACM Computing Surveys. 48, 1

    Research output: Contribution to journalJournal article

  13. Published

    Sonar phishing: pinpointing highly vulnerable victims for social engineering attacks

    Larson, R., Edwards, M., Baron, A. & Rashid, A. 2015 36th IEEE Symposium on Security and Privacy Posters. IEEE

    Research output: Contribution in Book/Report/ProceedingsConference contribution

  14. 2014
  15. Published

    A service-independent model for linking online user profile information

    Edwards, M., Rashid, A. & Rayson, P. 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014. IEEE, p. 280-283 4 p.

    Research output: Contribution in Book/Report/ProceedingsPaper

  16. 2012
  17. Published

    Collaborative Filtering as an Investigative Tool for Peer-to-Peer Filesharing Networks

    Edwards, M. & Rashid, A. 2012 International Conference on Cyber Security.

    Research output: Contribution in Book/Report/ProceedingsConference contribution

Back to top