关注
Matthew Bradbury
Matthew Bradbury
School of Computing and Communications, Lancaster University
在 lancaster.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis
C Maple, M Bradbury, AT Le, K Ghirardello
Applied Sciences 9 (23), 5101, 2019
532019
Hybrid online protocols for source location privacy in wireless sensor networks
M Bradbury, A Jhumka, M Leeke
Journal of Parallel and Distributed Computing 115, 67-81, 2018
472018
Fake source‐based source location privacy in wireless sensor networks
A Jhumka, M Bradbury, M Leeke
Concurrency and Computation: Practice and Experience 27 (12), 2999-3020, 2015
422015
A dynamic fake source algorithm for source location privacy in wireless sensor networks
M Bradbury, M Leeke, A Jhumka
2015 IEEE Trustcom/BigDataSE/ISPA 1, 531-538, 2015
342015
Towards understanding source location privacy in wireless sensor networks through fake sources
A Jhumka, M Bradbury, M Leeke
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
332012
A near-optimal source location privacy scheme for wireless sensor networks
M Bradbury, A Jhumka
IEEE TrustCom 2017, 2017
252017
Assessing the performance of phantom routing on source location privacy in wireless sensor networks
C Gu, M Bradbury, A Jhumka, M Leeke
2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015
232015
Source location privacy-aware data aggregation scheduling for wireless sensor networks
J Kirton, M Bradbury, A Jhumka
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
222017
Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures
M Bradbury, C Maple, H Yuan, UI Atmaca, S Cannizzaro
2020 IEEE Aerospace Conference, 1-20, 2020
202020
Towards fake sources for source location privacy in wireless sensor networks with multiple sources
JF Laikin, M Bradbury, C Gu, M Leeke
202016
Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks
A Jhumka, M Bradbury, S Saginbekov
Journal of Parallel and Distributed Computing 74 (1), 1789-1801, 2014
202014
Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy
A Thomason, M Leeke, M Bradbury, A Jhumka
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
202013
A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks
C Gu, M Bradbury, J Kirton, A Jhumka
Future Generation Computer Systems 87, 514-526, 2018
182018
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things
M Bradbury, A Jhumka, T Watson, D Flores, J Burton, M Butler
ACM Transactions on Sensor Networks (TOSN) 18 (2), 1-41, 2022
172022
Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks
J Kirton, M Bradbury, A Jhumka
Computer Networks 146, 125-137, 2018
162018
Security-Minded Verification of Space Systems
C Maple, M Bradbury, H Yuan, M Farrell, C Dixon, M Fisher, UI Atmaca
2020 IEEE Aerospace Conference, 1-13, 2020
142020
Using threat analysis techniques to guide formal verification: A case study of cooperative awareness messages
M Farrell, M Bradbury, M Fisher, LA Dennis, C Dixon, H Yuan, C Maple
Software Engineering and Formal Methods: 17th International Conference, SEFM …, 2019
142019
Understanding source location privacy protocols in sensor networks via perturbation of time series
M Bradbury, A Jhumka
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
132017
Trust Trackers for Computation Offloading in Edge-Based IoT Networks
M Bradbury, A Jhumka, T Watson
IEEE INFOCOM, 2021
122021
Privacy Challenges With Protecting Live Vehicular Location Context
M Bradbury, P Taylor, UI Atmaca, C Maple, N Griffiths
IEEE Access 8, 207465-207484, 2020
112020
系统目前无法执行此操作,请稍后再试。
文章 1–20