Matthew Bradbury

Orcid: 0000-0003-4661-000X

Affiliations:
  • University of Warwick, Coventry, UK


According to our database1, Matthew Bradbury authored at least 36 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments.
IEEE Trans. Cloud Comput., 2024

2023
Into the Heat of the Debate: Simulating a Program Committee Within Computer Science Education.
Proceedings of the IEEE Global Engineering Education Conference, 2023

2022
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things.
ACM Trans. Sens. Networks, 2022

Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss.
IEEE Trans. Inf. Forensics Secur., 2022

Information management for trust computation on resource-constrained IoT devices.
Future Gener. Comput. Syst., 2022

ThreatPro: Multi-Layer Threat Analysis in the Cloud.
CoRR, 2022

SlowCoach: Mutating Code to Simulate Performance Bugs.
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

Towards Effective Performance Fuzzing.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

Attributes and Dimensions of Trust in Secure Systems.
Proceedings of the 12th International Conference on the Internet of Things, 2022

Poster: Multi-Layer Threat Analysis of the Cloud.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Trust Trackers for Computation Offloading in Edge-Based IoT Networks.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2020
A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks.
ACM Trans. Internet Things, 2020

Privacy Challenges With Protecting Live Vehicular Location Context.
IEEE Access, 2020

2019
Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2019

Throughput Aware Authentication Prioritisation for Vehicular Communication Networks.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages.
Proceedings of the Software Engineering and Formal Methods - 17th International Conference, 2019

Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation.
Proceedings of the 15th European Dependable Computing Conference, 2019

The impact of decreasing transmit power levels on FlockLab to achieve a sparse network.
Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things, 2019

2018
Near optimal routing protocols for source location privacy in wireless sensor networks: modelling, design and evaluation.
PhD thesis, 2018

Hybrid online protocols for source location privacy in wireless sensor networks.
J. Parallel Distributed Comput., 2018

A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks.
Future Gener. Comput. Syst., 2018

Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks.
Comput. Networks, 2018

2017
A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Deconstructing source location privacy-aware routing protocols.
Proceedings of the Symposium on Applied Computing, 2017

Phantom walkabouts in wireless sensor networks.
Proceedings of the Symposium on Applied Computing, 2017

Understanding source location privacy protocols in sensor networks via perturbation of time series.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Towards fake sources for source location privacy in wireless sensor networks with multiple sources.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

2015
Fake source-based source location privacy in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015

A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

2014
Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks.
J. Parallel Distributed Comput., 2014

2013
Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources.
Proceedings of the 11th IEEE International Conference on Trust, 2012


  Loading...