A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis C Maple, M Bradbury, AT Le, K Ghirardello Applied Sciences 9 (23), 5101, 2019 | 53 | 2019 |
Hybrid online protocols for source location privacy in wireless sensor networks M Bradbury, A Jhumka, M Leeke Journal of Parallel and Distributed Computing 115, 67-81, 2018 | 47 | 2018 |
Fake source‐based source location privacy in wireless sensor networks A Jhumka, M Bradbury, M Leeke Concurrency and Computation: Practice and Experience 27 (12), 2999-3020, 2015 | 42 | 2015 |
A dynamic fake source algorithm for source location privacy in wireless sensor networks M Bradbury, M Leeke, A Jhumka 2015 IEEE Trustcom/BigDataSE/ISPA 1, 531-538, 2015 | 34 | 2015 |
Towards understanding source location privacy in wireless sensor networks through fake sources A Jhumka, M Bradbury, M Leeke 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 33 | 2012 |
A near-optimal source location privacy scheme for wireless sensor networks M Bradbury, A Jhumka IEEE TrustCom 2017, 2017 | 25 | 2017 |
Assessing the performance of phantom routing on source location privacy in wireless sensor networks C Gu, M Bradbury, A Jhumka, M Leeke 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015 | 23 | 2015 |
Source location privacy-aware data aggregation scheduling for wireless sensor networks J Kirton, M Bradbury, A Jhumka 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 22 | 2017 |
Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures M Bradbury, C Maple, H Yuan, UI Atmaca, S Cannizzaro 2020 IEEE Aerospace Conference, 1-20, 2020 | 20 | 2020 |
Towards fake sources for source location privacy in wireless sensor networks with multiple sources JF Laikin, M Bradbury, C Gu, M Leeke | 20 | 2016 |
Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks A Jhumka, M Bradbury, S Saginbekov Journal of Parallel and Distributed Computing 74 (1), 1789-1801, 2014 | 20 | 2014 |
Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy A Thomason, M Leeke, M Bradbury, A Jhumka 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | 20 | 2013 |
A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks C Gu, M Bradbury, J Kirton, A Jhumka Future Generation Computer Systems 87, 514-526, 2018 | 18 | 2018 |
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things M Bradbury, A Jhumka, T Watson, D Flores, J Burton, M Butler ACM Transactions on Sensor Networks (TOSN) 18 (2), 1-41, 2022 | 17 | 2022 |
Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks J Kirton, M Bradbury, A Jhumka Computer Networks 146, 125-137, 2018 | 16 | 2018 |
Security-Minded Verification of Space Systems C Maple, M Bradbury, H Yuan, M Farrell, C Dixon, M Fisher, UI Atmaca 2020 IEEE Aerospace Conference, 1-13, 2020 | 14 | 2020 |
Using threat analysis techniques to guide formal verification: A case study of cooperative awareness messages M Farrell, M Bradbury, M Fisher, LA Dennis, C Dixon, H Yuan, C Maple Software Engineering and Formal Methods: 17th International Conference, SEFM …, 2019 | 14 | 2019 |
Understanding source location privacy protocols in sensor networks via perturbation of time series M Bradbury, A Jhumka IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 13 | 2017 |
Trust Trackers for Computation Offloading in Edge-Based IoT Networks M Bradbury, A Jhumka, T Watson IEEE INFOCOM, 2021 | 12 | 2021 |
Privacy Challenges With Protecting Live Vehicular Location Context M Bradbury, P Taylor, UI Atmaca, C Maple, N Griffiths IEEE Access 8, 207465-207484, 2020 | 11 | 2020 |