BSc. MSc. PhD.
Senior Lecturer
- About
-
- Email Address
- matthew.collinson@abdn.ac.uk
- Office Address
Computing Science, Meston Building, Meston Walk, University of Aberdeen, AB24 3UE
- School/Department
- School of Natural and Computing Sciences
Biography
Head of Computing Science, and Academic Line Manager.
Qualifications
- BSc Mathematics1997 - University of Edinburgh
- MSc Mathematical Logic1998 - University of Manchester
- PhD  2003 - University of Manchester
Logic, Stone-type dualities.
- Research
-
Research Overview
Logic, mathematical foundations of computer science, information security.
I keep more information on my personal web pages. I may be found by search engine.
Research Areas
Accepting PhDs
I am currently accepting PhDs in Computing Science.
Please get in touch if you would like to discuss your research ideas further.
Research Specialisms
- Computer Science
- Computer and Information Security
Our research specialisms are based on the Higher Education Classification of Subjects (HECoS) which is HESA open data, published under the Creative Commons Attribution 4.0 International licence.
- Teaching
-
Teaching Responsibilities
These change frequently. The relevant content is hosted on the myAberdeen Blackboard "Virtual Learning Environment." If you are enrolled on a course that I am teaching, then you will see this in the VLE course area. I have taught a wide range of subjects at a wide range of levels, and both undergraduates and postgraduates.
- Publications
-
Page 1 of 3 Results 1 to 10 of 24
A Quantitative Field Study of a Persuasive Security Technology in the Wild
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-031-19097-1_13
- [ONLINE] http://www.dcs.gla.ac.uk/socinfo2022/papers.html
Modelling Security Risk Scenarios Using Subjective Attack Trees
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsSecurity Analysis Using Subjective Attack Trees
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsA Subjective Network Approach for Cybersecurity Risk Assessment
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1145/3433174.3433175
Exploring Susceptibility Measures to Persuasion
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsA Stable Variational Autoencoder for Text Modelling
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.18653/v1/W19-8673
- [ONLINE] https://aclweb.org/anthology/
- [ONLINE] View publication in Scopus
A Stable Variational Autoencoder for Text Modelling
Contributions to Conferences: Oral PresentationsA Dual-Attention Hierarchical Recurrent Neural Network for Dialogue Act Classification
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] https://www.aclweb.org/anthology/K19-1036.pdf
- [ONLINE] DOI: https://doi.org/10.18653/v1/K19-1036
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/13116/2/1810.09154v3.pdf
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/13116/3/Li_etal_Dual_Attention_VOR.pdf
- [ONLINE] https://www.aclweb.org/anthology/K19-1/
A logic of hypothetical conjunction
Journal of Logic and Computation, vol. 29, no. 6, pp. 975–1009Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.1093/logcom/exz018
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/15377/1/cck.pdf
Caught by phishing emails? How can argumentation schemes be used to protect users?
Contributions to Conferences: Papers- [ONLINE] View publication in Scopus