Matthew Edwards

Senior Research Associate, PhD student

Data Exfiltration: A Review of External Attack Vectors and Countermeasures
Ullah, F., Edwards, M., Ramdhany, R., Chitchyan, R., Babar, M.A., Rashid, A. expected in 2018 In: Journal of Network and Computer Applications. 101, p. 18-54. 37 p.
Journal article

Panning for gold: automatically analysing online social engineering attack surfaces
Edwards, M., Larson, R., Green, B., Rashid, A., Baron, A. 08/2017 In: Computers and Security. 69, p. 18-34. 17 p.
Journal article

Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)
Whitty, M., Edwards, M.J., Levi, M., Peersman, C., Rashid, A., Sasse, A., Sorell, T., Stringhini, G. 3/04/2017 In: Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017), co-located with the International Conference on World Wide Web (WWW). New York : ACM p. 1311-1314. 4 p. ISBN: 9781450349147.
Conference contribution

Scamming the scammers: towards automatic detection of persuasion in advance fee frauds
Edwards, M.J., Peersman, C., Rashid, A. 3/04/2017 In: Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017) co-located with International Conference on World Wide Web (WWW). New York : ACM p. 1291-1299. 9 p. ISBN: 9781450349147.
Conference contribution

Sampling labelled profile data for identity resolution
Edwards, M., Wattam, S.M., Rayson, P.E., Rashid, A. 5/12/2016 In: Proceedings of IEEE International Conference on Big Data (IEEE BigData 2016). IEEE p. 540-547. 8 p. ISBN: 9781467390064. Electronic ISBN: 9781467390057.
Conference contribution

Discovering “unknown known” security requirements
Rashid, A., Naqvi, A., Ramdhany, R., Edwards, M., Chitchyan, R., Ali Babar, M. 14/05/2016 In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering Austin, TX, May 14 - 22, 2016. New York : ACM p. 866-876. 11 p. ISBN: 9781450339001.
Conference contribution

Inferring semantic mapping between policies and code: the clue is in the language
Anthonysamy, P., Edwards, M., Weichel, C., Rashid, A. 29/03/2016 In: Engineering Secure Software and Systems . Springer p. 233-250. 18 p. ISBN: 9783319308050. Electronic ISBN: 9783319308067.
Conference contribution

A systematic survey of online data mining technology intended for law enforcement
Edwards, M., Rashid, A., Rayson, P. 09/2015 In: ACM Computing Surveys. 48, 1
Journal article

Sonar phishing: pinpointing highly vulnerable victims for social engineering attacks
Larson, R., Edwards, M., Baron, A., Rashid, A. 2015 In: 36th IEEE Symposium on Security and Privacy Posters. IEEE
Conference contribution

A service-independent model for linking online user profile information
Edwards, M., Rashid, A., Rayson, P. 1/06/2014 In: IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014. IEEE p. 280-283. 4 p.

Collaborative Filtering as an Investigative Tool for Peer-to-Peer Filesharing Networks
Edwards, M., Rashid, A. 2012 In: International Conference on Cyber Security.
Conference contribution