BSc. MSc. PhD.
Senior Lecturer
- About
-
- Email Address
- matthew.collinson@abdn.ac.uk
- Office Address
Computing Science, Meston Building, Meston Walk, University of Aberdeen, AB24 3UE
- School/Department
- School of Natural and Computing Sciences
Biography
Previously:
- Research Scientist, HP Labs, Bristol, UK (2006-2010)
- Head of Computing Science (2021-2024)
Qualifications
- BSc Mathematics1997 - University of Edinburgh
- MSc Mathematical Logic1998 - University of Manchester
- PhD -2003 - University of Manchester
- Research
-
Research Overview
Logic, mathematical foundations of computer science, information security.
I keep more information on my personal web pages. I may be found by search engine.
Research Areas
Accepting PhDs
I am currently accepting PhDs in Computing Science.
Please get in touch if you would like to discuss your research ideas further.

Research Specialisms
- Computer Science
- Computer and Information Security
Our research specialisms are based on the Higher Education Classification of Subjects (HECoS) which is HESA open data, published under the Creative Commons Attribution 4.0 International licence.
- Teaching
-
Teaching Responsibilities
These change frequently. The relevant content is hosted on the myAberdeen Blackboard "Virtual Learning Environment." If you are enrolled on a course that I am teaching, then you will see this in the VLE course area. I have taught a wide range of subjects at a wide range of levels, and both undergraduates and postgraduates.
Some courses in which I have been involved in teaching:
- CS552N Security Management
- CS552F Information Governance, Data Security and Privacy
- CS502M Security Analytics with Artificial Intelligence
- CS502L Cybersecurity Fundamentals
- CS502D Artificial Intelligence, Privacy and Security
- CS502C Enterprise Security Architecture
- CS5099 Information Security
- CS5095 Data Management and Security
- CS4028 Security
- CS30/35.. Distribute Systems and Security
- CCS3518 languages and Computability
- CS30../CS3523 AI for Computer Games
- CS2013 Mathematics for Computer Science
- CS25.. Algorithmic Problems Solving
- CS2009/CS5038 The Electronic Society
- CS1029 Modelling and Problem Solving for Computing.
Supervision of projects as part of taught degree programmes:
- CS5... MSc Cybersecurity Project
- CS5... MSc Artificial intelligence Project
- CS5... MSc Information Technology Project
- CS5... MEng informatics (Computing Science) Project
- CS45.. Single Honours Computing Project (BSc, MA)
- CS45.. Joint Honours Computing project (BSc, MA)
- CS30/35.. Software Engineering team projects
- Publications
-
Page 1 of 3 Results 1 to 10 of 24
A Quantitative Field Study of a Persuasive Security Technology in the Wild
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsModelling Security Risk Scenarios Using Subjective Attack Trees
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsSecurity Analysis Using Subjective Attack Trees
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsA Subjective Network Approach for Cybersecurity Risk Assessment
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1145/3433174.3433175
Exploring Susceptibility Measures to Persuasion
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-030-45712-9_2
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstreams/49dfe7d5-928d-40d5-88a7-d558ae75eeb4/download
- [ONLINE] View publication in Scopus
A Stable Variational Autoencoder for Text Modelling
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.18653/v1/W19-8673
- [ONLINE] https://aclweb.org/anthology/
- [ONLINE] View publication in Scopus
A Stable Variational Autoencoder for Text Modelling
Contributions to Conferences: Oral PresentationsA Dual-Attention Hierarchical Recurrent Neural Network for Dialogue Act Classification
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] https://www.aclweb.org/anthology/K19-1036.pdf
- [ONLINE] DOI: https://doi.org/10.18653/v1/K19-1036
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstreams/8d367dfa-014a-4a2f-96a2-94f1aa4b10ae/download
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstreams/2c4d61b7-f512-4b1d-982f-bbdb85e52c33/download
- [ONLINE] https://www.aclweb.org/anthology/K19-1/
A logic of hypothetical conjunction
Journal of Logic and Computation, vol. 29, no. 6, pp. 975–1009Contributions to Journals: ArticlesCaught by phishing emails? How can argumentation schemes be used to protect users?
Contributions to Conferences: Papers- [ONLINE] View publication in Scopus