• 197
    Citations
20082022

Research activity per year

Fingerprint

Dive into the research topics where Matthew Collinson is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • A Quantitative Field Study of a Persuasive Security Technology in the Wild

    Vargheese, J. P., Collinson, M. & Masthoff, J., 12 Oct 2022, Social Informatics: 13th International Conference, SocInfo 2022, Proceedings. Hopfgartner, F., Jaidka, K., Mayr, P., Jose, J. & Breitsohl, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 211-232 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13618 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    1 Citation (Scopus)
  • Modelling Security Risk Scenarios Using Subjective Attack Trees

    Al-Hadhrami, N., Collinson, M. & Oren, N., 12 Feb 2021, Risks and Security of Internet and Systems: CRiSIS 2020. Garcia Alfaro, J., Leneutre, J., Cuppens, N. & Yaich, R. (eds.). Springer Nature Switzerland AG, Vol. 12528. p. 201-218 18 p. (Lecture Notes in Computer Science; vol. 12528).

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    Open Access
    File
    54 Downloads (Pure)
  • Security Analysis Using Subjective Attack Trees

    Al-Hadhrami, N., Collinson, M. & Oren, N., 4 Feb 2021, Innovative Security Solutions for Information Technology and Communications: SecITC 2020. Lecture Notes in Computer Science. Maimut, D., Oprina, A-G. & Sauveron, D. (eds.). Springer , Vol. 12596. p. 288-301 14 p. (Lecture Notes in Computer Science; vol. 12596).

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    Open Access
    File
    39 Downloads (Pure)
  • A Subjective Network Approach for Cybersecurity Risk Assessment

    Al-Hadhrami, N., Collinson, M. & Oren, N., 6 Nov 2020, 13th International Conference on Security of Information and Networks. Ors, B. & Elci, A. (eds.). New York, NY, USA: Association for Computing Machinery, p. 1-8 8 p. 1. (SIN 2020).

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

  • Exploring Susceptibility Measures to Persuasion

    Vargheese, J., Collinson, M. & Masthoff, J., 2020, Persuasive Technology. Designing for Future Change - 15th International Conference on Persuasive Technology, PERSUASIVE 2020, Proceedings: Proceedings of the 15th International Conference on Persuasive Technologies. Gram-Hansen, S., Svarre, T. & Midden, C. (eds.). Springer , p. 16-29 14 p. (Lecture Notes in Computer Science; vol. 12064).

    Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

    Open Access
    File
    5 Citations (Scopus)
    41 Downloads (Pure)