Fingerprint
Dive into the research topics where Matthew Collinson is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
- 1 Similar Profiles
Collaborations and top research areas from the last five years
Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
Research output
-
A Quantitative Field Study of a Persuasive Security Technology in the Wild
Vargheese, J. P. (Corresponding Author), Collinson, M. & Masthoff, J., 12 Oct 2022, Social Informatics: 13th International Conference, SocInfo 2022, Proceedings. Hopfgartner, F., Jaidka, K., Mayr, P., Jose, J. & Breitsohl, J. (eds.). Cham: Springer , p. 211-232 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13618 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Published conference contribution
Open AccessFile2 Link opens in a new tab Citations (Scopus) -
Modelling Security Risk Scenarios Using Subjective Attack Trees
Al-Hadhrami, N., Collinson, M. & Oren, N., 12 Feb 2021, Risks and Security of Internet and Systems: CRiSIS 2020. Garcia Alfaro, J., Leneutre, J., Cuppens, N. & Yaich, R. (eds.). Springer Nature Switzerland AG, Vol. 12528. p. 201-218 18 p. (Lecture Notes in Computer Science; vol. 12528).Research output: Chapter in Book/Report/Conference proceeding › Published conference contribution
Open AccessFile3 Link opens in a new tab Citations (Scopus)64 Downloads (Pure) -
Security Analysis Using Subjective Attack Trees
Al-Hadhrami, N., Collinson, M. & Oren, N., 4 Feb 2021, Innovative Security Solutions for Information Technology and Communications: SecITC 2020. Lecture Notes in Computer Science. Maimut, D., Oprina, A.-G. & Sauveron, D. (eds.). Springer , Vol. 12596. p. 288-301 14 p. (Lecture Notes in Computer Science; vol. 12596).Research output: Chapter in Book/Report/Conference proceeding › Published conference contribution
Open AccessFile49 Downloads (Pure) -
A Subjective Network Approach for Cybersecurity Risk Assessment
Al-Hadhrami, N., Collinson, M. & Oren, N., 6 Nov 2020, 13th International Conference on Security of Information and Networks. Ors, B. & Elci, A. (eds.). New York, NY, USA: Association for Computing Machinery, p. 1-8 8 p. 1. (SIN 2020).Research output: Chapter in Book/Report/Conference proceeding › Published conference contribution
1 Link opens in a new tab Citation (Scopus) -
Exploring Susceptibility Measures to Persuasion
Vargheese, J. (Corresponding Author), Collinson, M. & Masthoff, J., 2020, Persuasive Technology. Designing for Future Change - 15th International Conference on Persuasive Technology, PERSUASIVE 2020, Proceedings: Proceedings of the 15th International Conference on Persuasive Technologies. Gram-Hansen, S., Svarre, T. & Midden, C. (eds.). Springer , p. 16-29 14 p. (Lecture Notes in Computer Science; vol. 12064).Research output: Chapter in Book/Report/Conference proceeding › Published conference contribution
Open AccessFile12 Link opens in a new tab Citations (Scopus)60 Downloads (Pure)