Follow
Matthew Bradbury
Matthew Bradbury
School of Computing and Communications, Lancaster University
Verified email at lancaster.ac.uk - Homepage
Title
Cited by
Cited by
Year
Hybrid online protocols for source location privacy in wireless sensor networks
M Bradbury, A Jhumka, M Leeke
Journal of Parallel and Distributed Computing 115, 67-81, 2018
57*2018
Fake source‐based source location privacy in wireless sensor networks
A Jhumka, M Bradbury, M Leeke
Concurrency and Computation: Practice and Experience 27 (12), 2999-3020, 2015
54*2015
A near-optimal source location privacy scheme for wireless sensor networks
M Bradbury, A Jhumka
IEEE TrustCom 2017, 2017
212017
A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis
C Maple, M Bradbury, AT Le, K Ghirardello
Applied Sciences 9 (23), 5101, 2019
202019
Source location privacy-aware data aggregation scheduling for wireless sensor networks
J Kirton, M Bradbury, A Jhumka
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
202017
Assessing the performance of phantom routing on source location privacy in wireless sensor networks
C Gu, M Bradbury, A Jhumka, M Leeke
2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015
202015
Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks
A Jhumka, M Bradbury, S Saginbekov
Journal of Parallel and Distributed Computing 74 (1), 1789-1801, 2014
192014
Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy
A Thomason, M Leeke, M Bradbury, A Jhumka
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
172013
Towards fake sources for source location privacy in wireless sensor networks with multiple sources
JF Laikin, M Bradbury, C Gu, M Leeke
152016
A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks
C Gu, M Bradbury, J Kirton, A Jhumka
Future Generation Computer Systems 87, 514-526, 2018
142018
Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks
C Gu, M Bradbury, A Jhumka
Concurrency and Computation: Practice and Experience 31 (20), e5304, 2019
11*2019
Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks
J Kirton, M Bradbury, A Jhumka
Computer Networks 146, 125-137, 2018
102018
Understanding source location privacy protocols in sensor networks via perturbation of Time Series
M Bradbury, A Jhumka
IEEE INFOCOM 2017, 2017
102017
Security-Minded Verification of Space Systems
C Maple, M Bradbury, H Yuan, M Farrell, C Dixon, M Fisher, UI Atmaca
2020 IEEE Aerospace Conference, 1-13, 2020
72020
Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures
M Bradbury, C Maple, H Yuan, UI Atmaca, S Cannizzaro
2020 IEEE Aerospace Conference, 1-20, 2020
72020
Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages
M Farrell, M Bradbury, M Fisher, LA Dennis, C Dixon, H Yuan, C Maple
International Conference on Software Engineering and Formal Methods, 471-490, 2019
72019
Deconstructing source location privacy-aware routing protocols
A Jhumka, M Bradbury
Proceedings of the Symposium on Applied Computing, 431-436, 2017
72017
The impact of decreasing transmit power levels on FlockLab to achieve a sparse network
M Bradbury, A Jhumka, C Maple
Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and …, 2019
42019
PNT Cyber Resilience: a Lab2Live Observer Based Approach, Report 1: GNSS Resilience and Identified Vulnerabilities
E Adegoke, M Bradbury, E Kampert, M Higgins, T Watson, P Jennings, ...
32020
PNT Cyber Resilience: a Lab2Live Observer Based Approach, Report 2: Specifications for Cyber Testing Facilities
M Bradbury, E Adegoke, E Kampert, M Higgins, T Watson, P Jennings, ...
32020
The system can't perform the operation now. Try again later.
Articles 1–20