[go: up one dir, main page]

Follow
Matthew Edwards
Title
Cited by
Cited by
Year
Data exfiltration: A review of external attack vectors and countermeasures
F Ullah, M Edwards, R Ramdhany, R Chitchyan, MA Babar, A Rashid
Journal of Network and Computer Applications, 2017
2422017
The persuasive effects of political microtargeting in the age of generative artificial intelligence
A Simchon, M Edwards, S Lewandowsky
PNAS Nexus 3 (2), pgae035, 2024
1782024
Panning for gold: Automatically analysing online social engineering attack surfaces
M Edwards, R Larson, B Green, A Rashid, A Baron
Computers & Security 69, 18-34, 2017
1412017
Automatically dismantling online dating fraud
G Suarez-Tangil, M Edwards, C Peersman, G Stringhini, A Rashid, ...
Transactions on Information Forensics and Security 15, 1128-1137, 2019
1312019
A systematic survey of online data mining technology intended for law enforcement
M Edwards, A Rashid, P Rayson
ACM Computing Surveys 48 (1), 2015
642015
The geography of online dating fraud
M Edwards, G Suarez-Tangil, C Peersman, G Stringhini, A Rashid, ...
Workshop on Technology and Consumer Protection, 2018
472018
Scamming the scammers: Towards automatic detection of persuasion in advance fee frauds
MJ Edwards, C Peersman, A Rashid
Second International Workshop on Computational Methods for CyberSafety …, 2017
432017
Identifying unintended harms of cybersecurity countermeasures
YT Chua, S Parkin, M Edwards, D Oliveira, S Schiffner, G Tyson, ...
APWG Symposium on Electronic Crime Research (eCrime), 2019
372019
Discovering unknown known security requirements
A Rashid, SAA Naqvi, R Ramdhany, M Edwards, R Chitchyan, MA Babar
Proceedings of the 38th International Conference on Software Engineering …, 2016
362016
The best laid plans or lack thereof: Security decision-making of different stakeholder groups
B Shreeve, J Hallett, M Edwards, KM Ramokapane, R Atkins, A Rashid
IEEE Transactions on Software Engineering, 2020
352020
“So if Mr Blue Head here clicks the link...” Risk thinking in cyber security decision making
B Shreeve, J Hallett, M Edwards, P Anthonysamy, S Frey, A Rashid
ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-29, 2020
342020
Detecting and preventing data exfiltration
A Rashid, R Ramdhany, M Edwards, SM Kibirige, A Babar, D Hutchison, ...
Technical Report, 2014
242014
Online reading habits can reveal personality traits: Towards detecting psychological microtargeting
A Simchon, A Sutton, M Edwards, S Lewandowsky
PNAS Nexus, pgad191, 2023
232023
Pets without PETs: on pet owners’ under-estimation of privacy concerns in pet wearables
D van der Linden, M Edwards, I Hadar, A Zamansky
Proceedings on Privacy Enhancing Technologies 2020 (1), 143-164, 2020
222020
Fraudsters target the elderly: Behavioural evidence from randomised controlled scam-baiting experiments
J Robinson, M Edwards
Security Journal 37 (4), 1173-1196, 2024
202024
“I have only checked after the event”: Consumer approaches to safe online shopping
JM Whittaker, M Edwards, C Cross, M Button
Victims & Offenders, 1-23, 2022
192022
Data, data, everywhere: quantifying software developers’ privacy attitudes
D van der Linden, I Hadar, M Edwards, A Rashid
9th International Workshop on Socio-Technical Aspects in Security (STAST), 2019
172019
Characterising cybercriminals: A review
M Edwards, E Williams, C Peersman, A Rashid
arXiv preprint arXiv:2202.07419, 2022
162022
Warning people that they are being microtargeted fails to eliminate persuasive advantage
F Carrella, A Simchon, M Edwards, S Lewandowsky
Communications Psychology, 2025
142025
Active countermeasures for email fraud
W Chen, F Wang, M Edwards
Proceedings of the 8th IEEE European Symposium on Security and Privacy …, 2023
142023
The system can't perform the operation now. Try again later.
Articles 1–20