Items where Author is "Bradbury, Matthew"
Rashid, Awais and Belguith, Sana and Bradbury, Matthew and Creese, Sadie and Flechais, Ivan and Suri, Neeraj (2025) <del>Security-by-design</del> Securing a compromised system. Rossfest Symposium. (In Press)
Bradbury, Matthew (2024) NewSpace, New Threats – Exploring the Influence of New Entrants to the Space Industry on Cybersecurity. In: Aerospace Conference :. IEEE. (In Press)
Farrell, Marie and Bradbury, Matthew and Cardoso, Rafael C. and Fisher, Michael and Dennis, Louise and Dixon, Clare and Sheik, Al Tariq and Yuan, Hu and Maple, Carsten (2024) Security-Minded Verification of Cooperative Awareness Messages. IEEE Transactions on Dependable and Secure Computing, 21 (4). pp. 4048-4065. ISSN 1545-5971
Manzoor, Salman and Gouglidis, Antonios and Bradbury, Matthew and Suri, Neeraj (2024) Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments. IEEE Transactions on Cloud Computing, 12 (1). pp. 319-336. ISSN 2168-7161
Maesschalck, Sam and Bradbury, Matthew and Giotsas, Vasileios (2023) Into the Heat of the Debate : Simulating a Program Committee Within Computer Science Education. In: IEEE Global Engineering Education Conference (EDUCON) :. IEEE. ISBN 9788350399431
Chen, Yiqun and Suri, Neeraj and Bradbury, Matthew (2023) Towards More Effective Performance Testing. PhD thesis, Lancaster University.
Bradbury, Matthew and Jhumka, Arshad (2022) Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss. IEEE Transactions on Information Forensics and Security, 17. pp. 3890-3905. ISSN 1556-6013
Chen, Yiqun and Bradbury, Matthew and Suri, Neeraj (2022) Towards Effective Performance Fuzzing. In: 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) :. Proceedings - 2022 IEEE International Symposium on Software Reliability Engineering Workshops, ISSREW 2022 . IEEE, USA, pp. 128-129. ISBN 9781665476799
Chen, Yiqun and Schwahn, Oliver and Natella, Roberto and Bradbury, Matthew and Suri, Neeraj (2022) SlowCoach : Mutating Code to Simulate Performance Bugs. In: 33rd IEEE International Symposium on Software Reliability Engineering :. 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE) . IEEE, New York, pp. 274-285. ISBN 9781665451338
Manzoor, Salman and Gouglidis, Antonios and Bradbury, Matthew and Suri, Neeraj (2022) Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud. In: CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security :. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security . ACM, USA, pp. 3415-3417. ISBN 9781450394505
Manzoor, Salman and Gouglidis, Antonios and Bradbury, Matthew and Suri, Neeraj (2022) Poster: Multi-Layer Threat Analysis of the Cloud. In: ACM Conference on Computer and Communications Security, 2022-11-07 - 2022-11-11.
Bradbury, Matthew and Jhumka, Arshad and Watson, Tim (2022) Information Management for Trust Computation on Resource-constrained IoT Devices. Future Generation Computer Systems, 135. pp. 348-363. ISSN 0167-739X
Bradbury, Matthew and Prince, Daniel and Marcinkiewicz, Victoria and Watson, Tim (2022) Attributes and Dimensions of Trust in Secure Systems. In: STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things :. ACM Transactions on Internet of Things . UNSPECIFIED, Delft, Netherlands. (In Press)
Manzoor, Salman and Gouglidis, Antonios and Bradbury, Matthew and Suri, Neeraj (2022) ThreatPro : Multi-Layer Threat Analysis in the Cloud. arXiv, abs/22. ISSN 2331-8422
Bradbury, Matthew and Jhumka, Arshad and Watson, Tim and Flores, Denys and Burton, Jonathan and Butler, Matthew (2022) Threat Modelling Guided Trust-based Task Offloading for Resource-constrained Internet of Things. ACM Transactions on Sensor Networks, 18 (2): 29. ISSN 1550-4859
Bradbury, Matthew and Jhumka, Arshad and Watson, Tim (2021) Trust Trackers for Computation Offloading in Edge-Based IoT Networks. In: IEEE International Conference on Computer Communications 2021 :. IEEE, CAN. ISBN 9781665431316
Bradbury, Matthew and Jhumka, Arshad and Watson, Tim (2021) Trust Assessment in 32 KiB of RAM: Multi-application Trust-based Task Offloading for Resource-constrained IoT Nodes. In: SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied Computing :. ACM, New York, pp. 184-193. ISBN 9781450381048
Bradbury, Matthew and Jhumka, Arshad and Maple, Carsten (2021) A Spatial Source Location Privacy-Aware Duty Cycle for Internet of Things Sensor Networks. ACM Transactions on Internet of Things, 2 (1): 4. pp. 1-32. ISSN 2691-1914
Bradbury, Matthew and Taylor, Phillip and Atmaca, Ugur Ilker and Maple, Carsten and Griffiths, Nathan (2020) Privacy Challenges with Protecting Live Vehicular Location Context. IEEE Access, 8. pp. 207465-207484. ISSN 2169-3536
Maple, Carsten and Bradbury, Matthew and Yuan, Hu and Farrell, Marie and Dixon, Clare and Fisher, Michael and Atmaca, Uger Ilker (2020) Security-Minded Verification of Space Systems. In: 2020 IEEE Aerospace Conference :. IEEE, Big Sky, Montana, USA. ISBN 9781728127354
Bradbury, Matthew and Maple, Carsten and Atmaca, Uger Ilker and Cannizzaro, Sara (2020) Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures. In: IEEE Aerospace Conference :. IEEE, USA.
Adegoke, Elijah and Bradbury, Matthew and Kampert, Erik and Higgins, Matthew and Watson, Tim and Jennings, Paul and Ford, Colin and Buesnel, Guy and Hickling, Steve (2020) PNT Cyber Resilience: a Lab2Live Observer Based Approach, Report 1: GNSS Resilience and Identified Vulnerabilities. Working Paper. UNSPECIFIED, Coventry, UK.
Bradbury, Matthew and Adegoke, Elijah and Kampert, Erik and Higgins, Matthew and Watson, Tim and Jennings, Paul and Ford, Colin and Buesnel, Guy and Hickling, Steve (2020) PNT Cyber Resilience: a Lab2Live Observer Based Approach, Report 2: Specifications for Cyber Testing Facilities. Working Paper. UNSPECIFIED, Coventry, UK.
Maple, Carsten and Bradbury, Matthew and Le, Anh Tuan and Ghirardello, Kevin (2019) A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis. Applied Sciences, 9 (23): 5101. ISSN 2076-3417
Yuan, Hu and Bradbury, Matthew and Maple, Carsten and Gu, Chen (2019) Throughput Aware Authentication Prioritisation for Vehicular Communication Networks. In: 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall) :. IEEE, pp. 1-5. ISBN 9781728112213
Gu, Chen and Bradbury, Matthew and Jhumka, Arshad (2019) Phantom walkabouts : A customisable source location privacy aware routing protocol for wireless sensor networks. Concurrency and Computation: Practice and Experience, 31 (20): e5304. ISSN 1532-0626
Grosso, Jasmine and Jhumka, Arshad and Bradbury, Matthew (2019) Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation. In: 15th European Dependable Computing Conference (EDCC) :. UNSPECIFIED, ITA, pp. 111-118. ISBN 9781728139296
Farrell, Marie and Bradbury, Matthew and Fisher, Michael and Dennis, Louise A. and Dixon, Clare and Yuan, Hu and Maple, Carsten (2019) Using Threat Analysis Techniques to Guide Formal Verification : A Case Study of Cooperative Awareness Messages. In: Software Engineering and Formal Methods : 17th International Conference, SEFM 2019, Oslo, Norway, September 18–20, 2019, Proceedings. Lecture Notes in Computer Science . Springer International Publishing, Cham, pp. 471-490. ISBN 9783030304454
Maple, Carsten and Bradbury, Matthew and Elsden, Miles and Cruickshank, Haitham and Yuan, Hu and Gu, Chen and Asuquo, Phillip (2019) IoT Transport and Mobility Demonstrator : Cyber Security Testing on National Infrastructure. Working Paper. UNSPECIFIED, Coventry, UK.
Bradbury, Matthew and Jhumka, Arshad and Maple, Carsten (2019) The Impact of Decreasing Transmit Power Levels on FlockLab To Achieve a Sparse Network. In: CPS-IoTBench '19 : Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things. ACM, New York, pp. 7-12. ISBN 9781450366939
Kirton, Jack and Bradbury, Matthew and Jhumka, Arshad (2018) Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks. Computer Networks, 146. pp. 125-137. ISSN 1389-1286
Gu, Chen and Bradbury, Matthew and Kirton, Jack and Jhumka, Arshad (2018) A Decision Theoretic Framework for Selecting Source Location Privacy Aware Routing Protocols in Wireless Sensor Networks. Future Generation Computer Systems, 87. pp. 514-526. ISSN 0167-739X
Bradbury, Matthew and Jhumka, Arshad and Leeke, Matthew (2018) Hybrid Online Protocols for Source Location Privacy in Wireless Sensor Networks. Journal of Parallel and Distributed Computing, 115. pp. 67-81. ISSN 0743-7315
Bradbury, Matthew (2018) Near optimal routing protocols for source location privacy in wireless sensor Networks : Modelling, design and evaluation. PhD thesis, Uni of warwick.
Bradbury, Matthew and Jhumka, Arshad (2017) Understanding Source Location Privacy Protocols in Sensor Networks via Perturbation of Time Series. In: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications :. IEEE, pp. 1611-1619. ISBN 9781509053377
Bradbury, Matthew and Jhumka, Arshad (2017) A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks. In: 2017 IEEE Trustcom/BigDataSE/ICESS :. IEEE, pp. 409-416. ISBN 97871509049066
Kirton, Jack and Bradbury, Matthew and Jhumka, Arshad (2017) Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) :. IEEE, pp. 2200-2205. ISBN 9781538617939
Jhumka, Arshad and Bradbury, Matthew (2017) Deconstructing Source Location Privacy-aware Routing Protocols. In: Proceedings of the Symposium on Applied Computing :. SAC'17 . ACM, MAR, pp. 431-436. ISBN 9781450344869
Gu, Chen and Bradbury, Matthew and Jhumka, Arshad (2017) Phantom Walkabouts in Wireless Sensor Networks. In: SAC '17: Proceedings of the Symposium on Applied Computing :. SAC'17 . ACM, Marrakech, Morocco, pp. 609-616. ISBN 9781450344869
Laikin, Joanna F. and Bradbury, Matthew and Gu, Chen and Leeke, Matthew (2017) Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources. In: 2016 IEEE International Conference on Communication Systems (ICCS) :. IEEE, pp. 1-6. ISBN 9781509034246
Gu, Chen and Bradbury, Matthew and Jhumka, Arshad and Leeke, Matthew (2016) Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks. In: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC) :. IEEE, pp. 99-108. ISBN 9781467393768
Bradbury, Matthew and Leeke, Matthew and Jhumka, Arshad (2015) A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks. In: 2015 IEEE Trustcom/BigDataSE/ISPA :. IEEE, pp. 531-538. ISBN 9781467379526
Jhumka, Arshad and Bradbury, Matthew and Leeke, Matthew (2015) Fake source-based source location privacy in wireless sensor networks. Concurrency and Computation: Practice and Experience, 27 (12). pp. 2999-3020. ISSN 1532-0634
Jhumka, Arshad and Bradbury, Matthew and Saginbekov, Sain (2014) Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks. Journal of Parallel and Distributed Computing, 74 (1). pp. 1789-1801. ISSN 0743-7315
Thomason, Alasdair and Leeke, Matthew and Bradbury, Matthew and Jhumka, Arshad (2013) Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) :. IEEE, pp. 667-674. ISBN 9780769550220
Jhumka, Arshad and Bradbury, Matthew and Leeke, Matthew (2012) Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications :. IEEE, pp. 760-768. ISBN 9781467321723