default search action
Matthew Edwards 0001
Person information
- affiliation: University of Bristol, UK
- affiliation (PhD): Lancaster University, UK
Other persons with the same name
- Matthew Edwards — disambiguation page
- Matthew Edwards 0002 — GenXComm Incorporation, Austin, TX, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Ellie Prosser, Matthew Edwards:
Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention. EICC 2024: 1-10 - [c17]Partha Das Chowdhury, Mohammad Tahaei, Matthew Edwards, Claudia Peersman, Lata Nautiyal, Kopo Marvin Ramokapane, Awais Rashid:
Community Security Champions: Studying the Most Influential Users on Security Stack Exchange. SecDev 2024: 93-104 - 2023
- [c16]James Stevenson, Matthew Edwards, Awais Rashid:
Analysing The Activities Of Far-Right Extremists On The Parler Social Network. ASONAM 2023: 392-399 - [c15]Josh Clough, Matthew Edwards:
Pump, Dump, and then What? The Long-Term Impact of Cryptocurrency Pump-and-Dump Schemes. eCrime 2023: 1-17 - [c14]Wentao Chen, Fuzhou Wang, Matthew Edwards:
Active Countermeasures for Email Fraud. EuroS&P 2023: 39-55 - [c13]Harrison Bullock, Matthew Edwards:
Temporal Constraints in Online Dating Fraud Classification. ICISSP 2023: 535-542 - [c12]Piyush Bajaj, Matthew Edwards:
Automatic Scam-Baiting Using ChatGPT. TrustCom 2023: 1941-1946 - [i9]Joshua Clough, Matthew Edwards:
Pump, Dump, and then What? The Long-Term Impact of Cryptocurrency Pump-and-Dump Schemes. CoRR abs/2309.06608 (2023) - 2022
- [j7]Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Kopo M. Ramokapane, Richard Atkins, Awais Rashid:
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups. IEEE Trans. Software Eng. 48(5): 1515-1528 (2022) - [i8]Matthew Edwards, Emma J. Williams, Claudia Peersman, Awais Rashid:
Characterising Cybercriminals: A Review. CoRR abs/2202.07419 (2022) - [i7]Andrew C. Dwyer, Joseph Hallett, Claudia Peersman, Matthew Edwards, Brittany I. Davidson, Awais Rashid:
How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces. CoRR abs/2203.08557 (2022) - [i6]Claudia Peersman, Emma J. Williams, Matthew Edwards, Awais Rashid:
Understanding motivations and characteristics of financially-motivated cybercriminals. CoRR abs/2203.08642 (2022) - [i5]Claudia Peersman, Matthew Edwards, Emma J. Williams, Awais Rashid:
Automatic User Profiling in Darknet Markets: a Scalability Study. CoRR abs/2203.13179 (2022) - [i4]Wentao Chen, Fuzhou Wang, Matthew Edwards:
Active Countermeasures for Email Fraud. CoRR abs/2210.15043 (2022) - [i3]Claudia Peersman, Matthew Edwards, Emma J. Williams, Awais Rashid:
A Survey of Relevant Text Mining Technology. CoRR abs/2211.15784 (2022) - 2021
- [c11]Chao Chen, Claudia Peersman, Matthew Edwards, Ziauddin Ursani, Awais Rashid:
AMoC: A Multifaceted Machine Learning-based Toolkit for Analysing Cybercriminal Communities on the Darknet. IEEE BigData 2021: 2516-2524 - [c10]Ziauddin Ursani, Claudia Peersman, Matthew Edwards, Chao Chen, Awais Rashid:
The Impact of Adverse Events in Darknet Markets: an Anomaly Detection Approach. EuroS&P Workshops 2021: 227-238 - [i2]Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Kopo M. Ramokapane, Richard Atkins, Awais Rashid:
The best laid plans or lack thereof: Security decision-making of different stakeholder groups. CoRR abs/2104.00284 (2021) - 2020
- [j6]Dirk van der Linden, Matthew Edwards, Irit Hadar, Anna Zamansky:
Pets without PETs: on pet owners' under-estimation of privacy concerns in pet wearables. Proc. Priv. Enhancing Technol. 2020(1): 143-164 (2020) - [j5]Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica T. Whitty:
Automatically Dismantling Online Dating Fraud. IEEE Trans. Inf. Forensics Secur. 15: 1128-1137 (2020) - [j4]Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Pauline Anthonysamy, Sylvain Frey, Awais Rashid:
"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making. ACM Trans. Priv. Secur. 24(1): 5:1-5:29 (2020) - [c9]Benjamin Price, Matthew Edwards:
Resource Networks of Pet Scam Websites. eCrime 2020: 1-10
2010 – 2019
- 2019
- [c8]Yi Ting Chua, Simon Parkin, Matthew Edwards, Daniela Oliveira, Stefan Schiffner, Gareth Tyson, Alice Hutchings:
Identifying Unintended Harms of Cybersecurity Countermeasures. eCrime 2019: 1-15 - [c7]Dirk van der Linden, Irit Hadar, Matthew Edwards, Awais Rashid:
Data, Data, Everywhere: Quantifying Software Developers' Privacy Attitudes. STAST 2019: 47-65 - [i1]Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica T. Whitty:
Automatically Dismantling Online Dating Fraud. CoRR abs/1905.12593 (2019) - 2018
- [b1]Matthew Edwards:
Data quality measures for identity resolution. Lancaster University, UK, 2018 - [j3]Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, Muhammad Ali Babar, Awais Rashid:
Data exfiltration: A review of external attack vectors and countermeasures. J. Netw. Comput. Appl. 101: 18-54 (2018) - 2017
- [j2]Matthew Edwards, Robert Larson, Benjamin Green, Awais Rashid, Alistair Baron:
Panning for gold: Automatically analysing online social engineering attack surfaces. Comput. Secur. 69: 18-34 (2017) - [c6]Matthew Edwards, Claudia Peersman, Awais Rashid:
Scamming the Scammers: Towards Automatic Detection of Persuasion in Advance Fee Frauds. WWW (Companion Volume) 2017: 1291-1299 - [c5]Monica T. Whitty, Matthew Edwards, Michael Levi, Claudia Peersman, Awais Rashid, M. Angela Sasse, Tom Sorell, Gianluca Stringhini:
Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF). WWW (Companion Volume) 2017: 1311-1314 - 2016
- [c4]Matthew Edwards, Stephen Wattam, Paul Rayson, Awais Rashid:
Sampling labelled profile data for identity resolution. IEEE BigData 2016: 540-547 - [c3]Pauline Anthonysamy, Matthew Edwards, Christian Weichel, Awais Rashid:
Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language. ESSoS 2016: 233-250 - [c2]Awais Rashid, Syed Asad Ali Naqvi, Rajiv Ramdhany, Matthew Edwards, Ruzanna Chitchyan, Muhammad Ali Babar:
Discovering "unknown known" security requirements. ICSE 2016: 866-876 - 2015
- [j1]Matthew Edwards, Awais Rashid, Paul Rayson:
A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement. ACM Comput. Surv. 48(1): 15:1-15:54 (2015) - 2014
- [c1]Matthew John Edwards, Awais Rashid, Paul Rayson:
A Service-Indepenent Model for Linking Online User Profile Information. JISIC 2014: 280-283
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint