Follow
Matthew Bradbury
Matthew Bradbury
School of Computing and Communications, Lancaster University
Verified email at lancaster.ac.uk - Homepage
Title
Cited by
Cited by
Year
A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis
C Maple, M Bradbury, AT Le, K Ghirardello
Applied Sciences 9 (23), 5101, 2019
512019
Hybrid online protocols for source location privacy in wireless sensor networks
M Bradbury, A Jhumka, M Leeke
Journal of Parallel and Distributed Computing 115, 67-81, 2018
452018
Fake source‐based source location privacy in wireless sensor networks
A Jhumka, M Bradbury, M Leeke
Concurrency and Computation: Practice and Experience 27 (12), 2999-3020, 2015
412015
A dynamic fake source algorithm for source location privacy in wireless sensor networks
M Bradbury, M Leeke, A Jhumka
2015 IEEE Trustcom/BigDataSE/ISPA 1, 531-538, 2015
322015
Towards understanding source location privacy in wireless sensor networks through fake sources
A Jhumka, M Bradbury, M Leeke
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
322012
A near-optimal source location privacy scheme for wireless sensor networks
M Bradbury, A Jhumka
IEEE TrustCom 2017, 2017
232017
Assessing the performance of phantom routing on source location privacy in wireless sensor networks
C Gu, M Bradbury, A Jhumka, M Leeke
2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015
222015
Source location privacy-aware data aggregation scheduling for wireless sensor networks
J Kirton, M Bradbury, A Jhumka
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
212017
Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks
A Jhumka, M Bradbury, S Saginbekov
Journal of Parallel and Distributed Computing 74 (1), 1789-1801, 2014
202014
Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy
A Thomason, M Leeke, M Bradbury, A Jhumka
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
192013
Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures
M Bradbury, C Maple, H Yuan, UI Atmaca, S Cannizzaro
2020 IEEE Aerospace Conference, 1-20, 2020
182020
A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks
C Gu, M Bradbury, J Kirton, A Jhumka
Future Generation Computer Systems 87, 514-526, 2018
182018
Towards fake sources for source location privacy in wireless sensor networks with multiple sources
JF Laikin, M Bradbury, C Gu, M Leeke
182016
Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks
J Kirton, M Bradbury, A Jhumka
Computer Networks 146, 125-137, 2018
152018
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things
M Bradbury, A Jhumka, T Watson, D Flores, J Burton, M Butler
ACM Transactions on Sensor Networks (TOSN) 18 (2), 1-41, 2022
132022
Security-Minded Verification of Space Systems
C Maple, M Bradbury, H Yuan, M Farrell, C Dixon, M Fisher, UI Atmaca
2020 IEEE Aerospace Conference, 1-13, 2020
132020
Using threat analysis techniques to guide formal verification: A case study of cooperative awareness messages
M Farrell, M Bradbury, M Fisher, LA Dennis, C Dixon, H Yuan, C Maple
Software Engineering and Formal Methods: 17th International Conference, SEFM …, 2019
132019
Trust Trackers for Computation Offloading in Edge-Based IoT Networks
M Bradbury, A Jhumka, T Watson
IEEE INFOCOM, 2021
112021
Understanding source location privacy protocols in sensor networks via perturbation of time series
M Bradbury, A Jhumka
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
112017
Privacy Challenges With Protecting Live Vehicular Location Context
M Bradbury, P Taylor, UI Atmaca, C Maple, N Griffiths
IEEE Access 8, 207465-207484, 2020
102020
The system can't perform the operation now. Try again later.
Articles 1–20