default search action
Matthew Bradbury
Person information
- affiliation: University of Warwick, Coventry, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments. IEEE Trans. Cloud Comput. 12(1): 319-336 (2024) - [j12]Marie Farrell, Matthew Bradbury, Rafael C. Cardoso, Michael Fisher, Louise A. Dennis, Clare Dixon, Al Tariq Sheik, Hu Yuan, Carsten Maple:
Security-Minded Verification of Cooperative Awareness Messages. IEEE Trans. Dependable Secur. Comput. 21(4): 4048-4065 (2024) - 2023
- [c22]Sam Maesschalck, Matthew Bradbury, Vasileios Giotsas:
Into the Heat of the Debate: Simulating a Program Committee Within Computer Science Education. EDUCON 2023: 1-5 - 2022
- [j11]Matthew Bradbury, Arshad Jhumka, Tim Watson:
Information management for trust computation on resource-constrained IoT devices. Future Gener. Comput. Syst. 135: 348-363 (2022) - [j10]Matthew Bradbury, Arshad Jhumka:
Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss. IEEE Trans. Inf. Forensics Secur. 17: 3890-3905 (2022) - [j9]Matthew Bradbury, Arshad Jhumka, Tim Watson, Denys A. Flores, Jonathan Burton, Matthew Butler:
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things. ACM Trans. Sens. Networks 18(2): 29:1-29:41 (2022) - [c21]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud. CCS 2022: 3415-3417 - [c20]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
Poster: Multi-Layer Threat Analysis of the Cloud. CCS 2022: 3419-3421 - [c19]Matthew Bradbury, Daniel Prince, Victoria Marcinkiewicz, Tim Watson:
Attributes and Dimensions of Trust in Secure Systems. IOT 2022: 179-186 - [c18]Yiqun Chen, Matthew Bradbury, Neeraj Suri:
Towards Effective Performance Fuzzing. ISSRE Workshops 2022: 128-129 - [c17]Yiqun Chen, Oliver Schwahn, Roberto Natella, Matthew Bradbury, Neeraj Suri:
SlowCoach: Mutating Code to Simulate Performance Bugs. ISSRE 2022: 274-285 - [i1]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
ThreatPro: Multi-Layer Threat Analysis in the Cloud. CoRR abs/2209.14795 (2022) - 2021
- [c16]Matthew Bradbury, Arshad Jhumka, Tim Watson:
Trust Trackers for Computation Offloading in Edge-Based IoT Networks. INFOCOM 2021: 1-10 - [c15]Matthew Bradbury, Arshad Jhumka, Tim Watson:
Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes. SAC 2021: 184-193 - 2020
- [j8]Matthew Bradbury, Phillip Taylor, Ugur-Ilker Atmaca, Carsten Maple, Nathan Griffiths:
Privacy Challenges With Protecting Live Vehicular Location Context. IEEE Access 8: 207465-207484 (2020) - [j7]Matthew Bradbury, Arshad Jhumka, Carsten Maple:
A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks. ACM Trans. Internet Things 2(1): 4:1-4:32 (2020)
2010 – 2019
- 2019
- [j6]Chen Gu, Matthew Bradbury, Arshad Jhumka:
Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks. Concurr. Comput. Pract. Exp. 31(20) (2019) - [c14]Matthew Bradbury, Arshad Jhumka, Carsten Maple:
The impact of decreasing transmit power levels on FlockLab to achieve a sparse network. Bench@CPSIoTWeek 2019: 7-12 - [c13]Jasmine Grosso, Arshad Jhumka, Matthew Bradbury:
Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation. EDCC 2019: 111-118 - [c12]Marie Farrell, Matthew Bradbury, Michael Fisher, Louise A. Dennis, Clare Dixon, Hu Yuan, Carsten Maple:
Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages. SEFM 2019: 471-490 - [c11]Hu Yuan, Matthew Bradbury, Carsten Maple, Chen Gu:
Throughput Aware Authentication Prioritisation for Vehicular Communication Networks. VTC Fall 2019: 1-5 - 2018
- [b1]Matthew Bradbury:
Near optimal routing protocols for source location privacy in wireless sensor networks: modelling, design and evaluation. University of Warwick, Coventry, UK, 2018 - [j5]Jack Kirton, Matthew Bradbury, Arshad Jhumka:
Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks. Comput. Networks 146: 125-137 (2018) - [j4]Chen Gu, Matthew Bradbury, Jack Kirton, Arshad Jhumka:
A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks. Future Gener. Comput. Syst. 87: 514-526 (2018) - [j3]Matthew Bradbury, Arshad Jhumka, Matthew Leeke:
Hybrid online protocols for source location privacy in wireless sensor networks. J. Parallel Distributed Comput. 115: 67-81 (2018) - 2017
- [c10]Jack Kirton, Matthew Bradbury, Arshad Jhumka:
Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks. ICDCS 2017: 2200-2205 - [c9]Matthew Bradbury, Arshad Jhumka:
Understanding source location privacy protocols in sensor networks via perturbation of time series. INFOCOM 2017: 1-9 - [c8]Arshad Jhumka, Matthew Bradbury:
Deconstructing source location privacy-aware routing protocols. SAC 2017: 431-436 - [c7]Chen Gu, Matthew Bradbury, Arshad Jhumka:
Phantom walkabouts in wireless sensor networks. SAC 2017: 609-616 - [c6]Matthew Bradbury, Arshad Jhumka:
A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks. TrustCom/BigDataSE/ICESS 2017: 409-416 - 2016
- [c5]Joanna F. Laikin, Matthew Bradbury, Chen Gu, Matthew Leeke:
Towards fake sources for source location privacy in wireless sensor networks with multiple sources. ICCS 2016: 1-6 - 2015
- [j2]Arshad Jhumka, Matthew Bradbury, Matthew Leeke:
Fake source-based source location privacy in wireless sensor networks. Concurr. Comput. Pract. Exp. 27(12): 2999-3020 (2015) - [c4]Chen Gu, Matthew Bradbury, Arshad Jhumka, Matthew Leeke:
Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks. PRDC 2015: 99-108 - [c3]Matthew Bradbury, Matthew Leeke, Arshad Jhumka:
A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks. TrustCom/BigDataSE/ISPA (1) 2015: 531-538 - 2014
- [j1]Arshad Jhumka, Matthew Bradbury, Sain Saginbekov:
Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks. J. Parallel Distributed Comput. 74(1): 1789-1801 (2014) - 2013
- [c2]Alasdair Thomason, Matthew Leeke, Matthew Bradbury, Arshad Jhumka:
Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. TrustCom/ISPA/IUCC 2013: 667-674 - 2012
- [c1]Arshad Jhumka, Matthew Bradbury, Matthew Leeke:
Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. TrustCom 2012: 760-768
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint