Home > Research > Researchers > Mr Matthew Edwards > Publications

Matthew Edwards

Research student

  1. Published

    A service-independent model for linking online user profile information

    Edwards, M., Rashid, A. & Rayson, P., 2014, IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014. IEEE, p. 280-283 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  2. Published

    A systematic survey of online data mining technology intended for law enforcement

    Edwards, M., Rashid, A. & Rayson, P., 09/2015, In : ACM Computing Surveys. 48, 1

    Research output: Contribution to journalJournal article

  3. Published

    Collaborative Filtering as an Investigative Tool for Peer-to-Peer Filesharing Networks

    Edwards, M. & Rashid, A., 2012, International Conference on Cyber Security.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  4. Published

    Data Exfiltration: A Review of External Attack Vectors and Countermeasures

    Ullah, F., Edwards, M., Ramdhany, R., Chitchyan, R., Babar, M. A. & Rashid, A., 1/01/2018, In : Journal of Network and Computer Applications. 101, p. 18-54 37 p.

    Research output: Contribution to journalJournal article

  5. Published

    Data quality measures for identity resolution

    Edwards, M., 2018, Lancaster University. 252 p.

    Research output: ThesisDoctoral Thesis

  6. Published

    Detecting and Preventing Data Exfiltration

    Rashid, A., Ramdhany, R., Edwards, M., Kibirige Mukisa, S., Ali Babar, M., Hutchison, D. & Chitchyan, R., 04/2014, Lancaster: Lancaster University. 40 p.

    Research output: Book/Report/ProceedingsOther report

  7. Published

    Discovering “unknown known” security requirements

    Rashid, A., Naqvi, A., Ramdhany, R., Edwards, M., Chitchyan, R. & Ali Babar, M., 14/05/2016, ICSE '16 Proceedings of the 38th International Conference on Software Engineering Austin, TX, May 14 - 22, 2016. New York: ACM, p. 866-876 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  8. Published

    Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)

    Whitty, M., Edwards, M. J., Levi, M., Peersman, C., Rashid, A., Sasse, A., Sorell, T. & Stringhini, G., 3/04/2017, Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017), co-located with the International Conference on World Wide Web (WWW). New York: ACM, p. 1311-1314 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  9. Published

    Inferring semantic mapping between policies and code: the clue is in the language

    Anthonysamy, P., Edwards, M., Weichel, C. & Rashid, A., 29/03/2016, Engineering Secure Software and Systems : 8th International Symposium, ESSoS 2016, London, United Kingdom, April 6-8, 2016. Proceedings.. Caballero, J., Bodden, E. & Athanasopoulos, E. (eds.). Springer, p. 233-250 18 p. (Lecture Notes in Computer Science; vol. 9639).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  10. Published

    Panning for gold: automatically analysing online social engineering attack surfaces

    Edwards, M., Larson, R., Green, B., Rashid, A. & Baron, A., 08/2017, In : Computers and Security. 69, p. 18-34 17 p.

    Research output: Contribution to journalJournal article

Previous 1 2 Next

Back to top