A Quantitative Field Study of a Persuasive Security Technology in the Wild
2022 - Published
Vargheese, J. P., Collinson, M. , Masthoff, J.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
Modelling Security Risk Scenarios Using Subjective Attack Trees
2021 - Published
Al-Hadhrami, N., Collinson, M. , Oren, N.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
Security Analysis Using Subjective Attack Trees
2021 - Published
Al-Hadhrami, N., Collinson, M. , Oren, N.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
A Subjective Network Approach for Cybersecurity Risk Assessment
2020 - Published
Al-Hadhrami, N., Collinson, M. , Oren, N.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
Exploring Susceptibility Measures to Persuasion
2020 - Published
Vargheese, J., Collinson, M. , Masthoff, J.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
A Stable Variational Autoencoder for Text Modelling
2019 - Published
Li, R., Li, X., Lin, C., Collinson, M. , Mao, R.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
A Stable Variational Autoencoder for Text Modelling
2019 - Published
Li, R., Li, X., Lin, C., Collinson, M. , Mao, R.
Contributions to Conferences: Oral Presentations
A Dual-Attention Hierarchical Recurrent Neural Network for Dialogue Act Classification
2019 - Published
Li, R., Lin, C., Collinson, M. , Li, X., Chen, G.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
A logic of hypothetical conjunction
2019 - Published
Collinson, M.
Journal of Logic and Computation , vol. 29, no. 6, pp. 975–1009
Contributions to Journals: Articles
Caught by phishing emails? How can argumentation schemes be used to protect users?
2018 - Published
Thomas, R. J., Collinson, M. , Masthoff, J.
Contributions to Conferences: Papers
How can persuasion reduce user cyber security vulnerabilities?
2018 - Published
Vargheese, J. P., Collinson, M. , Masthoff, J.
Contributions to Conferences: Papers
Erratum to: A substructural logic for layered graphs
2017 - Published
Collinson, M. , McDonald, K., Docherty, S., Pym, D.
Journal of Logic and Computation , vol. 27, no. 1, pp. 413-414
Contributions to Journals: Articles
Layered graph logic as an assertion language for access control policy models
2017 - Published
Collinson, M. , McDonald, K., Pym, D.
Journal of Logic and Computation , vol. 27, no. 1, pp. 41-80
Contributions to Journals: Articles
Economic Impacts of Rules-based vs Risk-based Cybersecurity Regulations in Critical Infrastructure Providers
2016 - Published
Massacci, F., Ruprai, R., Collinson, M. , Williams, J.
IEEE Security and Privacy , vol. 14, no. 3, pp. 52-60
Contributions to Journals: Articles
A substructural logic for layered graphs
2014 - Published
Collinson, M. , McDonald, K., Pym, D.
Journal of Logic and Computation , vol. 24, no. 4, pp. 953-988
Contributions to Journals: Articles
Utility-based Decision-making in Distributed Systems Modelling [Extended Abstract]
2013 - Published
Anderson, G., Collinson, M. , Pym, D.
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
Trust Domains: An Algebraic, Logical, and Utility-theoretic Approach
2013 - Published
Anderson, G., Collinson, M. , Pym, D.
Trust and Trustworthy Computing: 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings . Huth, M., Asokan, N., Čapkun, S., Flechais, I., Coles-Kemp, L. (eds.). Springer, pp. 232-249, 18 pages
Chapters in Books, Reports and Conference Proceedings: Chapters
A Discipline of Mathematical Systems Modelling
2012 - Published
Collinson, M. , Monahan, B., Pym, D.
College Publications, London. 290 pages
Books and Reports: Books
A Framework for Modelling Security Architectures in Services Ecosystems
2012 - Published
Collinson, M. , Pym, D., Taylor, B.
Service-Oriented and Cloud Computing: First European Conference, ESOCC 2012, Bertinoro, Italy, September 19-21, 2012. Proceedings . De Paoli, F., Pimentel, E., Zavaratto, G. (eds.). Springer, pp. 64-79, 15 pages
Chapters in Books, Reports and Conference Proceedings: Chapters
Algebra and logic for access control
2010 - Published
Collinson, M. , Pym, D.
Formal Aspects of Computing , vol. 22, no. 2, pp. 83-104
Contributions to Journals: Articles
Semantics for structured systems modelling and simulation
2010 - Published
Pym, D. J., Collinson, M. J. , Monahan, B.
Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques: SESSION: Simulation methods . ICST
Chapters in Books, Reports and Conference Proceedings: Chapters
A Logical and Computational Theory of Located Resource
2009 - Published
Collinson, M. , Monahan, B., Pym, D.
Journal of Logic and Computation , vol. 19, no. 6, pp. 1207-1244
Contributions to Journals: Articles
Algebra and Logic for Resource-based Systems Modelling
2009 - Published
Collinson, M. , Pym, D.
Mathematical Structures in Computer Science , vol. 19, no. 5, pp. 959-1027
Contributions to Journals: Articles
Bunched Polymorphism
2008 - Published
Collinson, M. , Pym, D., Robinson, E.
Mathematical Structures in Computer Science , vol. 18, no. 6, pp. 1091-1132
Contributions to Journals: Articles