Follow
Matthew Edwards
Title
Cited by
Cited by
Year
Data exfiltration: A review of external attack vectors and countermeasures
F Ullah, M Edwards, R Ramdhany, R Chitchyan, MA Babar, A Rashid
Journal of Network and Computer Applications, 2017
1422017
Panning for gold: Automatically analysing online social engineering attack surfaces
M Edwards, R Larson, B Green, A Rashid, A Baron
Computers & Security 69, 18-34, 2017
1212017
Automatically dismantling online dating fraud
G Suarez-Tangil, M Edwards, C Peersman, G Stringhini, A Rashid, ...
Transactions on Information Forensics and Security 15, 1128-1137, 2019
812019
A systematic survey of online data mining technology intended for law enforcement
M Edwards, A Rashid, P Rayson
ACM Computing Surveys 48 (1), 2015
582015
The geography of online dating fraud
M Edwards, G Suarez-Tangil, C Peersman, G Stringhini, A Rashid, ...
Workshop on Technology and Consumer Protection, 2018
322018
Discovering unknown known security requirements
A Rashid, SAA Naqvi, R Ramdhany, M Edwards, R Chitchyan, MA Babar
Proceedings of the 38th International Conference on Software Engineering …, 2016
322016
Scamming the scammers: Towards automatic detection of persuasion in advance fee frauds
MJ Edwards, C Peersman, A Rashid
Second International Workshop on Computational Methods for CyberSafety …, 2017
262017
Detecting and preventing data exfiltration
A Rashid, R Ramdhany, M Edwards, SM Kibirige, A Babar, D Hutchison, ...
Technical Report, 2014
222014
Identifying unintended harms of cybersecurity countermeasures
YT Chua, S Parkin, M Edwards, D Oliveira, S Schiffner, G Tyson, ...
APWG Symposium on Electronic Crime Research (eCrime), 2019
202019
The best laid plans or lack thereof: Security decision-making of different stakeholder groups
B Shreeve, J Hallett, M Edwards, KM Ramokapane, R Atkins, A Rashid
IEEE Transactions on Software Engineering, 2020
172020
“So if Mr Blue Head here clicks the link...” Risk thinking in cyber security decision making
B Shreeve, J Hallett, M Edwards, P Anthonysamy, S Frey, A Rashid
ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-29, 2020
162020
Pets without PETs: on pet owners’ under-estimation of privacy concerns in pet wearables
D van der Linden, M Edwards, I Hadar, A Zamansky
Proceedings on Privacy Enhancing Technologies 2020 (1), 143-164, 2020
142020
Data, data, everywhere: quantifying software developers’ privacy attitudes
D van der Linden, I Hadar, M Edwards, A Rashid
9th International Workshop on Socio-Technical Aspects in Security (STAST), 2019
132019
Sampling labelled profile data for identity resolution
M Edwards, S Wattam, P Rayson, A Rashid
2016 IEEE International Conference on Big Data, 2016
132016
Inferring semantic mapping between policies and code: The clue is in the language
P Anthonysamy, M Edwards, C Weichel, A Rashid
International Symposium on Engineering Secure Software and Systems, 233-250, 2016
112016
A service-independent model for linking online user profile information
M Edwards, A Rashid, P Rayson
IEEE Joint Intelligence and Security Informatics Conference (JISIC) 2014, 2014
92014
“I have only checked after the event”: Consumer approaches to safe online shopping
JM Whittaker, M Edwards, C Cross, M Button
Victims & Offenders, 1-23, 2022
82022
Characterising cybercriminals: A review
M Edwards, E Williams, C Peersman, A Rashid
arXiv preprint arXiv:2202.07419, 2022
72022
The impact of adverse events in darknet markets: An anomaly detection approach
Z Ursani, C Peersman, M Edwards, C Chen, A Rashid
Workshop on Attackers and Cyber-Crime Operations (WACCO), 2021
72021
Resource networks of pet scam websites
B Price, M Edwards
APWG Symposium on Electronic Crime Research (eCrime), 2020
72020
The system can't perform the operation now. Try again later.
Articles 1–20