Personal information

United Kingdom

Activities

Employment (3)

Lancaster University: Lancaster, Lancashire, GB

2021-04 to present | Lecturer (School of Computing and Communications)
Employment
Source: Self-asserted source
Matthew Bradbury

University of Warwick: Coventry, West Midlands, GB

2020-03 to 2021-03 | Research Fellow (Department of Computer Science)
Employment
Source: Self-asserted source
Matthew Bradbury

University of Warwick: Coventry, West Midlands, GB

2018-04 to 2020-03 | Research Fellow (WMG)
Employment
Source: Self-asserted source
Matthew Bradbury

Education and qualifications (2)

University of Warwick: Coventry, Warwickshire, GB

2014-09-29 to 2018-12-03 | PhD (Computer Science)
Education
Source: Self-asserted source
Matthew Bradbury

University of Warwick: Coventry, West Midlands, GB

2009-10 to 2013 | MEng (Department of Computer Science)
Education
Source: Self-asserted source
Matthew Bradbury

Works (36)

Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments

IEEE Transactions on Cloud Computing
2024 | Journal article
Contributors: Salman Manzoor; Antonios Gouglidis; Matthew Bradbury; Neeraj Suri
Source: check_circle
Crossref

Security-Minded Verification of Cooperative Awareness Messages

IEEE Transactions on Dependable and Secure Computing
2024-07 | Journal article
Contributors: Marie Farrell; Matthew Bradbury; Rafael C. Cardoso; Michael Fisher; Louise A. Dennis; Clare Dixon; Al Tariq Sheik; Hu Yuan; Carsten Maple
Source: check_circle
Crossref

Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss

IEEE Transactions on Information Forensics and Security
2022 | Journal article
Contributors: Matthew Bradbury; Arshad Jhumka
Source: check_circle
Crossref

Attributes and Dimensions of Trust in Secure Systems

2022-11-07 | Conference paper
Contributors: Matthew Bradbury; Daniel Prince; Victoria Marcinkiewicz; Tim Watson
Source: check_circle
Crossref

Information management for trust computation on resource-constrained IoT devices

Future Generation Computer Systems
2022-10 | Journal article
Contributors: Matthew Bradbury; Arshad Jhumka; Tim Watson
Source: check_circle
Crossref

Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things

ACM Transactions on Sensor Networks
2022-05-31 | Journal article
Contributors: Matthew Bradbury; Arshad Jhumka; Tim Watson; Denys Flores; Jonathan Burton; Matthew Butler
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Trust Assessment in 32 KiB of RAM: Multi-application Trust-based Task Offloading for Resource-constrained IoT Nodes

SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied Computing
2021-03-22 | Conference paper | Author
SOURCE-WORK-ID:

577d98a5-cf95-4b7e-a3fa-07838a0ff79c

EID:

2-s2.0-85104951509

Part of ISBN: 9781450381048
Contributors: Matthew Bradbury; Arshad Jhumka; Tim Watson
Source: check_circle
Lancaster University - Pure

A Spatial Source Location Privacy-Aware Duty Cycle for Internet of Things Sensor Networks

ACM Transactions on Internet of Things
2021-02-01 | Journal article | Author
SOURCE-WORK-ID:

1a71c015-cadb-421c-b95a-1716add64e14

Contributors: Matthew Bradbury; Arshad Jhumka; Carsten Maple
Source: check_circle
Lancaster University - Pure
grade
Preferred source (of 2)‎

Privacy Challenges With Protecting Live Vehicular Location Context

IEEE Access
2020 | Journal article
Part of ISSN: 2169-3536
Source: Self-asserted source
Matthew Bradbury
grade
Preferred source (of 3)‎

PNT Cyber Resilience: a Lab2Live Observer Based Approach, Report 1: GNSS Resilience and Identified Vulnerabilities

2020-04-01 | Working paper | Author
SOURCE-WORK-ID:

ca159b2d-117a-4c33-b655-64f545e97159

Contributors: Elijah Adegoke; Matthew Bradbury; Erik Kampert; Matthew Higgins; Tim Watson; Paul Jennings; Colin Ford; Guy Buesnel; Steve Hickling
Source: check_circle
Lancaster University - Pure

PNT Cyber Resilience: a Lab2Live Observer Based Approach, Report 2: Specifications for Cyber Testing Facilities

2020-04-01 | Working paper | Author
SOURCE-WORK-ID:

1e6b3116-7935-4081-936e-90d72d174a15

Contributors: Matthew Bradbury; Elijah Adegoke; Erik Kampert; Matthew Higgins; Tim Watson; Paul Jennings; Colin Ford; Guy Buesnel; Steve Hickling
Source: check_circle
Lancaster University - Pure

Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures

2020 IEEE Aerospace Conference
2020-03-07 | Conference paper
Source: Self-asserted source
Matthew Bradbury
grade
Preferred source (of 2)‎

Security-Minded Verification of Space Systems

2020 IEEE Aerospace Conference
2020-03-07 | Conference paper
Part of ISBN: 9781728127347
Source: Self-asserted source
Matthew Bradbury
grade
Preferred source (of 2)‎

The impact of decreasing transmit power levels on FlockLab to achieve a sparse network

Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things - CPS-IoTBench '19
2019 | Other
Contributors: Matthew Bradbury; Arshad Jhumka; Carsten Maple
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 2)‎

Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages

Software Engineering and Formal Methods
2019 | Book chapter
Part of ISBN: 9783030304454
Part of ISBN: 9783030304461
Part of ISSN: 0302-9743
Part of ISSN: 1611-3349
Source: Self-asserted source
Matthew Bradbury
grade
Preferred source (of 2)‎

A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis

Applied Sciences
2019-11 | Journal article | Author
Contributors: Carsten Maple; Matthew Bradbury; Anhtuan Le; Kevin Ghirardello
Source: check_circle
Multidisciplinary Digital Publishing Institute
grade
Preferred source (of 3)‎

Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks

Concurrency and Computation: Practice and Experience
2019-10-25 | Journal article
Part of ISSN: 1532-0626
Part of ISSN: 1532-0634
Source: Self-asserted source
Matthew Bradbury
grade
Preferred source (of 3)‎

Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation

2019 15th European Dependable Computing Conference (EDCC)
2019-09 | Conference paper
Source: Self-asserted source
Matthew Bradbury
grade
Preferred source (of 2)‎

Throughput Aware Authentication Prioritisation for Vehicular Communication Networks

2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall)
2019-09 | Conference paper
Source: Self-asserted source
Matthew Bradbury
grade
Preferred source (of 2)‎

IoT Transport and Mobility Demonstrator

2019-05-01 | Working paper | Author
SOURCE-WORK-ID:

c4507922-26f5-4da2-96da-cf9bef579d9b

Contributors: Carsten Maple; Matthew Bradbury; Miles Elsden; Haitham Cruickshank; Hu Yuan; Chen Gu; Phillip Asuquo
Source: check_circle
Lancaster University - Pure

A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks

Future Generation Computer Systems
2018 | Journal article
EID:

2-s2.0-85042052098

Contributors: Gu, C.; Bradbury, M.; Kirton, J.; Jhumka, A.
Source: Self-asserted source
Matthew Bradbury via Scopus - Elsevier
grade
Preferred source (of 3)‎

Near optimal routing protocols for source location privacy in wireless sensor Networks

2018 | Dissertation or Thesis | Author
SOURCE-WORK-ID:

0bc6d027-de40-424c-8c1b-66b4ad9be936

Contributors: Matthew Bradbury
Source: check_circle
Lancaster University - Pure

Towards Optimal Source Location Privacy-Aware TDMA Schedules in Wireless Sensor Networks

Computer Networks
2018-09 | Journal article
Part of ISSN: 1389-1286
Contributors: Jack Kirton; Matthew Bradbury; Arshad Jhumka
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 3)‎

Hybrid online protocols for source location privacy in wireless sensor networks

Journal of Parallel and Distributed Computing
2018-02 | Journal article
Part of ISSN: 0743-7315
Contributors: Matthew Bradbury; Arshad Jhumka; Matthew Leeke
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 4)‎

Deconstructing source location privacy-aware routing protocols

Proceedings of the Symposium on Applied Computing - SAC '17
2017 | Conference paper
Part of ISBN: 9781450344869
Contributors: Arshad Jhumka; Matthew Bradbury
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 2)‎

Phantom walkabouts in wireless sensor networks

Proceedings of the Symposium on Applied Computing - SAC '17
2017 | Conference paper
Part of ISBN: 9781450344869
Contributors: Chen Gu; Matthew Bradbury; Arshad Jhumka
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 3)‎

A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks

2017 IEEE Trustcom/BigDataSE/ICESS
2017-08 | Conference paper
Part of ISBN: 9781509049066
Contributors: Matthew Bradbury; Arshad Jhumka
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 3)‎

Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks

2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
2017-06 | Conference paper
Part of ISBN: 9781538617922
Contributors: Jack Kirton; Matthew Bradbury; Arshad Jhumka
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 3)‎

Understanding source location privacy protocols in sensor networks via perturbation of time series

IEEE INFOCOM 2017 - IEEE Conference on Computer Communications
2017-05 | Conference paper
Part of ISBN: 9781509053360
Contributors: Matthew Bradbury; Arshad Jhumka
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 3)‎

Towards fake sources for source location privacy in wireless sensor networks with multiple sources

2016 IEEE International Conference on Communication Systems (ICCS)
2016 | Conference paper
Contributors: Joanna F. Laikin; Matthew Bradbury; Chen Gu; Matthew Leeke
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 3)‎

Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks

2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC)
2015-11 | Conference paper
Contributors: Chen Gu; Matthew Bradbury; Arshad Jhumka; Matthew Leeke
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 3)‎

A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks

2015 IEEE Trustcom/BigDataSE/ISPA
2015-08 | Conference paper
Contributors: Matthew Bradbury; Matthew Leeke; Arshad Jhumka
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 3)‎

Fake source-based source location privacy in wireless sensor networks

Concurrency and Computation: Practice and Experience
2014-04-01 | Journal article
Contributors: Arshad Jhumka; Matthew Bradbury; Matthew Leeke
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 3)‎

Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks

Journal of Parallel and Distributed Computing
2014-01 | Journal article
Contributors: Arshad Jhumka; Matthew Bradbury; Sain Saginbekov
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 3)‎

Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy

2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
2013-07 | Conference paper
Contributors: Alasdair Thomason; Matthew Leeke; Matthew Bradbury; Arshad Jhumka
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 3)‎

Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources

2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
2012-06 | Conference paper
Contributors: Arshad Jhumka; Matthew Bradbury; Matthew Leeke
Source: Self-asserted source
Matthew Bradbury via Crossref Metadata Search
grade
Preferred source (of 3)‎