BSc. MSc. PhD.
Senior Lecturer
- About
-
- Email Address
- matthew.collinson@abdn.ac.uk
- Office Address
Computing Science, Meston Building, Meston Walk, University of Aberdeen, AB24 3UE
- School/Department
- School of Natural and Computing Sciences
Biography
Head of Computing Science, and Academic Line Manager.
Qualifications
- BSc Mathematics1997 - University of Edinburgh
- MSc Mathematical Logic1998 - University of Manchester
- PhD  2003 - University of Manchester
Logic, Stone-type dualities.
- Research
-
Research Overview
Logic, mathematical foundations of computer science, information security.
I keep more information on my personal web pages. I may be found by search engine.
Research Areas
Accepting PhDs
I am currently accepting PhDs in Computing Science.
Please get in touch if you would like to discuss your research ideas further.
Research Specialisms
- Computer Science
- Computer and Information Security
Our research specialisms are based on the Higher Education Classification of Subjects (HECoS) which is HESA open data, published under the Creative Commons Attribution 4.0 International licence.
- Teaching
-
Teaching Responsibilities
These change frequently. The relevant content is hosted on the myAberdeen Blackboard "Virtual Learning Environment." If you are enrolled on a course that I am teaching, then you will see this in the VLE course area. I have taught a wide range of subjects at a wide range of levels, and both undergraduates and postgraduates.
- Publications
-
Page 1 of 1 Results 1 to 24 of 24
A Quantitative Field Study of a Persuasive Security Technology in the Wild
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-031-19097-1_13
- [ONLINE] http://www.dcs.gla.ac.uk/socinfo2022/papers.html
Modelling Security Risk Scenarios Using Subjective Attack Trees
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsSecurity Analysis Using Subjective Attack Trees
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsA Subjective Network Approach for Cybersecurity Risk Assessment
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1145/3433174.3433175
Exploring Susceptibility Measures to Persuasion
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsA Stable Variational Autoencoder for Text Modelling
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.18653/v1/W19-8673
- [ONLINE] https://aclweb.org/anthology/
- [ONLINE] View publication in Scopus
A Stable Variational Autoencoder for Text Modelling
Contributions to Conferences: Oral PresentationsA Dual-Attention Hierarchical Recurrent Neural Network for Dialogue Act Classification
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] https://www.aclweb.org/anthology/K19-1036.pdf
- [ONLINE] DOI: https://doi.org/10.18653/v1/K19-1036
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/13116/2/1810.09154v3.pdf
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/13116/3/Li_etal_Dual_Attention_VOR.pdf
- [ONLINE] https://www.aclweb.org/anthology/K19-1/
A logic of hypothetical conjunction
Journal of Logic and Computation, vol. 29, no. 6, pp. 975–1009Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.1093/logcom/exz018
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/15377/1/cck.pdf
Caught by phishing emails? How can argumentation schemes be used to protect users?
Contributions to Conferences: Papers- [ONLINE] View publication in Scopus
How can persuasion reduce user cyber security vulnerabilities?
Contributions to Conferences: Papers- [ONLINE] View publication in Scopus
Erratum to: A substructural logic for layered graphs
Journal of Logic and Computation, vol. 27, no. 1, pp. 413-414Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.1093/logcom/exv019
Layered graph logic as an assertion language for access control policy models
Journal of Logic and Computation, vol. 27, no. 1, pp. 41-80Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.1093/logcom/exv020
Economic Impacts of Rules-based vs Risk-based Cybersecurity Regulations in Critical Infrastructure Providers
IEEE Security and Privacy, vol. 14, no. 3, pp. 52-60Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.1109/MSP.2016.48
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/6165/1/15858c.pdf
A substructural logic for layered graphs
Journal of Logic and Computation, vol. 24, no. 4, pp. 953-988Contributions to Journals: ArticlesUtility-based Decision-making in Distributed Systems Modelling [Extended Abstract]
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] http://arxiv.org/abs/1310.6405
- [ONLINE] View publication in Scopus
Trust Domains: An Algebraic, Logical, and Utility-theoretic Approach
Trust and Trustworthy Computing: 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings. Huth, M., Asokan, N., Čapkun, S., Flechais, I., Coles-Kemp, L. (eds.). Springer, pp. 232-249, 18 pagesChapters in Books, Reports and Conference Proceedings: Chapters- [ONLINE] DOI: https://doi.org/10.1007/978-3-642-38908-5
A Discipline of Mathematical Systems Modelling
College Publications, London. 290 pagesBooks and Reports: BooksA Framework for Modelling Security Architectures in Services Ecosystems
Service-Oriented and Cloud Computing: First European Conference, ESOCC 2012, Bertinoro, Italy, September 19-21, 2012. Proceedings. De Paoli, F., Pimentel, E., Zavaratto, G. (eds.). Springer, pp. 64-79, 15 pagesChapters in Books, Reports and Conference Proceedings: Chapters- [ONLINE] DOI: https://doi.org/10.1007/978-3-642-33427-6_5
Algebra and logic for access control
Formal Aspects of Computing, vol. 22, no. 2, pp. 83-104Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.1007/s00165-009-0107-x
Semantics for structured systems modelling and simulation
Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques: SESSION: Simulation methods. ICSTChapters in Books, Reports and Conference Proceedings: Chapters- [ONLINE] DOI: https://doi.org/10.4108/ICST.SIMUTOOLS2010.8631
A Logical and Computational Theory of Located Resource
Journal of Logic and Computation, vol. 19, no. 6, pp. 1207-1244Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.1093/logcom/exp021
Algebra and Logic for Resource-based Systems Modelling
Mathematical Structures in Computer Science, vol. 19, no. 5, pp. 959-1027Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.1017/S0960129509990077
Bunched Polymorphism
Mathematical Structures in Computer Science, vol. 18, no. 6, pp. 1091-1132Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.1017/S0960129508007159