Seguir
Matthew Bradbury
Matthew Bradbury
School of Computing and Communications, Lancaster University
Dirección de correo verificada de lancaster.ac.uk - Página principal
Título
Citado por
Citado por
Año
A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis
C Maple, M Bradbury, AT Le, K Ghirardello
Applied Sciences 9 (23), 5101, 2019
522019
Hybrid online protocols for source location privacy in wireless sensor networks
M Bradbury, A Jhumka, M Leeke
Journal of Parallel and Distributed Computing 115, 67-81, 2018
472018
Fake source‐based source location privacy in wireless sensor networks
A Jhumka, M Bradbury, M Leeke
Concurrency and Computation: Practice and Experience 27 (12), 2999-3020, 2015
422015
A dynamic fake source algorithm for source location privacy in wireless sensor networks
M Bradbury, M Leeke, A Jhumka
2015 IEEE Trustcom/BigDataSE/ISPA 1, 531-538, 2015
332015
Towards understanding source location privacy in wireless sensor networks through fake sources
A Jhumka, M Bradbury, M Leeke
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
332012
A near-optimal source location privacy scheme for wireless sensor networks
M Bradbury, A Jhumka
IEEE TrustCom 2017, 2017
242017
Assessing the performance of phantom routing on source location privacy in wireless sensor networks
C Gu, M Bradbury, A Jhumka, M Leeke
2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015
232015
Source location privacy-aware data aggregation scheduling for wireless sensor networks
J Kirton, M Bradbury, A Jhumka
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
222017
Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks
A Jhumka, M Bradbury, S Saginbekov
Journal of Parallel and Distributed Computing 74 (1), 1789-1801, 2014
202014
Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy
A Thomason, M Leeke, M Bradbury, A Jhumka
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
202013
Towards fake sources for source location privacy in wireless sensor networks with multiple sources
JF Laikin, M Bradbury, C Gu, M Leeke
192016
Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures
M Bradbury, C Maple, H Yuan, UI Atmaca, S Cannizzaro
2020 IEEE Aerospace Conference, 1-20, 2020
182020
A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks
C Gu, M Bradbury, J Kirton, A Jhumka
Future Generation Computer Systems 87, 514-526, 2018
182018
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things
M Bradbury, A Jhumka, T Watson, D Flores, J Burton, M Butler
ACM Transactions on Sensor Networks (TOSN) 18 (2), 1-41, 2022
172022
Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks
J Kirton, M Bradbury, A Jhumka
Computer Networks 146, 125-137, 2018
152018
Security-Minded Verification of Space Systems
C Maple, M Bradbury, H Yuan, M Farrell, C Dixon, M Fisher, UI Atmaca
2020 IEEE Aerospace Conference, 1-13, 2020
132020
Using threat analysis techniques to guide formal verification: A case study of cooperative awareness messages
M Farrell, M Bradbury, M Fisher, LA Dennis, C Dixon, H Yuan, C Maple
Software Engineering and Formal Methods: 17th International Conference, SEFM …, 2019
132019
Trust Trackers for Computation Offloading in Edge-Based IoT Networks
M Bradbury, A Jhumka, T Watson
IEEE INFOCOM, 2021
122021
Understanding source location privacy protocols in sensor networks via perturbation of time series
M Bradbury, A Jhumka
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
122017
Privacy Challenges With Protecting Live Vehicular Location Context
M Bradbury, P Taylor, UI Atmaca, C Maple, N Griffiths
IEEE Access 8, 207465-207484, 2020
112020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20