Home > Research > Researchers > Dr Matthew Bradbury > Publications

Dr Matthew Bradbury

Lecturer in Cyber Security

  1. 2024
  2. Forthcoming

    Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/02/2024, (Accepted/In press) In: IEEE Transactions on Cloud Computing.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. 2023
  4. E-pub ahead of print

    Security-Minded Verification of Cooperative Awareness Messages

    Farrell, M., Bradbury, M., Cardoso, R. C., Fisher, M., Dennis, L., Dixon, C., Sheik, A. T., Yuan, H. & Maple, C., 21/12/2023, (E-pub ahead of print) In: IEEE Transactions on Dependable and Secure Computing. 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Into the Heat of the Debate: Simulating a Program Committee Within Computer Science Education

    Maesschalck, S., Bradbury, M. & Giotsas, V., 22/05/2023, IEEE Global Engineering Education Conference (EDUCON). 2023 ed. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. 2022
  7. Published

    Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss

    Bradbury, M. & Jhumka, A., 31/12/2022, In: IEEE Transactions on Information Forensics and Security. 17, p. 3890-3905 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Towards Effective Performance Fuzzing

    Chen, Y., Bradbury, M. & Suri, N., 26/12/2022, 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, p. 128-129 2 p. (Proceedings - 2022 IEEE International Symposium on Software Reliability Engineering Workshops, ISSREW 2022).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    SlowCoach: Mutating Code to Simulate Performance Bugs

    Chen, Y., Schwahn, O., Natella, R., Bradbury, M. & Suri, N., 21/12/2022, 33rd IEEE International Symposium on Software Reliability Engineering. New York: IEEE, p. 274-285 12 p. (2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Yin, H. & Stavrou, A. (eds.). New York: ACM, p. 3415-3417 3 p. (Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Poster: Multi-Layer Threat Analysis of the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, p. 3419-3421. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  12. Published

    Information Management for Trust Computation on Resource-constrained IoT Devices

    Bradbury, M., Jhumka, A. & Watson, T., 31/10/2022, In: Future Generation Computer Systems. 135, p. 348-363 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Forthcoming

    Attributes and Dimensions of Trust in Secure Systems

    Bradbury, M., Prince, D., Marcinkiewicz, V. & Watson, T., 7/10/2022, (Accepted/In press) STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things. Delft, Netherlands, (ACM Transactions on Internet of Things).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    ThreatPro: Multi-Layer Threat Analysis in the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 29/09/2022, In: arXiv. abs/2209.14795, 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Threat Modelling Guided Trust-based Task Offloading for Resource-constrained Internet of Things

    Bradbury, M., Jhumka, A., Watson, T., Flores, D., Burton, J. & Butler, M., 1/05/2022, In: ACM Transactions on Sensor Networks. 18, 2, 41 p., 29.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. 2021
  17. Published

    Trust Trackers for Computation Offloading in Edge-Based IoT Networks

    Bradbury, M., Jhumka, A. & Watson, T., 26/07/2021, IEEE International Conference on Computer Communications 2021. IEEE, 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Trust Assessment in 32 KiB of RAM: Multi-application Trust-based Task Offloading for Resource-constrained IoT Nodes

    Bradbury, M., Jhumka, A. & Watson, T., 22/03/2021, SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied Computing. New York: ACM, p. 184-193 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    A Spatial Source Location Privacy-Aware Duty Cycle for Internet of Things Sensor Networks

    Bradbury, M., Jhumka, A. & Maple, C., 1/02/2021, In: ACM Transactions on Internet of Things. 2, 1, p. 1-32 32 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. 2020
  21. Published

    Privacy Challenges with Protecting Live Vehicular Location Context

    Bradbury, M., Taylor, P., Atmaca, U. I., Maple, C. & Griffiths, N., 27/11/2020, In: IEEE Access. 8, p. 207465-207484 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Security-Minded Verification of Space Systems

    Maple, C., Bradbury, M., Yuan, H., Farrell, M., Dixon, C., Fisher, M. & Atmaca, U. I., 21/08/2020, 2020 IEEE Aerospace Conference. Big Sky, Montana, USA: IEEE, 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures

    Bradbury, M., Maple, C., Atmaca, U. I. & Cannizzaro, S., 1/07/2020, IEEE Aerospace Conference. Big Sky, Montana, USA: IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    PNT Cyber Resilience: a Lab2Live Observer Based Approach, Report 1: GNSS Resilience and Identified Vulnerabilities

    Adegoke, E., Bradbury, M., Kampert, E., Higgins, M., Watson, T., Jennings, P., Ford, C., Buesnel, G. & Hickling, S., 1/04/2020, Coventry, UK.

    Research output: Working paper

  25. Published

    PNT Cyber Resilience: a Lab2Live Observer Based Approach, Report 2: Specifications for Cyber Testing Facilities

    Bradbury, M., Adegoke, E., Kampert, E., Higgins, M., Watson, T., Jennings, P., Ford, C., Buesnel, G. & Hickling, S., 1/04/2020, Coventry, UK.

    Research output: Working paper

  26. 2019
  27. Published

    A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis

    Maple, C., Bradbury, M., Le, A. T. & Ghirardello, K., 25/11/2019, In: Applied Sciences. 9, 23, 1 p., 5101.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Throughput Aware Authentication Prioritisation for Vehicular Communication Networks

    Yuan, H., Bradbury, M., Maple, C. & Gu, C., 7/11/2019, 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks

    Gu, C., Bradbury, M. & Jhumka, A., 25/10/2019, In: Concurrency and Computation: Practice and Experience. 31, 20, 17 p., e5304.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation

    Grosso, J., Jhumka, A. & Bradbury, M., 1/09/2019, 15th European Dependable Computing Conference (EDCC). p. 111-118 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages

    Farrell, M., Bradbury, M., Fisher, M., Dennis, L. A., Dixon, C., Yuan, H. & Maple, C., 1/09/2019, Software Engineering and Formal Methods: 17th International Conference, SEFM 2019, Oslo, Norway, September 18–20, 2019, Proceedings. Ölveczky, P. C. & Salaün, G. (eds.). Cham: Springer International Publishing, p. 471-490 20 p. (Lecture Notes in Computer Science ; vol. 11724).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    IoT Transport and Mobility Demonstrator: Cyber Security Testing on National Infrastructure

    Maple, C., Bradbury, M., Elsden, M., Cruickshank, H., Yuan, H., Gu, C. & Asuquo, P., 1/05/2019, Coventry, UK.

    Research output: Working paper

  33. Published

    The Impact of Decreasing Transmit Power Levels on FlockLab To Achieve a Sparse Network

    Bradbury, M., Jhumka, A. & Maple, C., 1/04/2019, CPS-IoTBench '19: Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things. New York : ACM, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. 2018
  35. Published

    Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks

    Kirton, J., Bradbury, M. & Jhumka, A., 9/12/2018, In: Computer Networks. 146, p. 125-137 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    A Decision Theoretic Framework for Selecting Source Location Privacy Aware Routing Protocols in Wireless Sensor Networks

    Gu, C., Bradbury, M., Kirton, J. & Jhumka, A., 1/10/2018, In: Future Generation Computer Systems. 87, p. 514-526 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Hybrid Online Protocols for Source Location Privacy in Wireless Sensor Networks

    Bradbury, M., Jhumka, A. & Leeke, M., 31/05/2018, In: Journal of Parallel and Distributed Computing. 115, p. 67-81 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published
  39. 2017
  40. Published

    Understanding Source Location Privacy Protocols in Sensor Networks via Perturbation of Time Series

    Bradbury, M. & Jhumka, A., 5/10/2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications. IEEE, p. 1611-1619 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks

    Bradbury, M. & Jhumka, A., 11/09/2017, 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, p. 409-416 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks

    Kirton, J., Bradbury, M. & Jhumka, A., 17/07/2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, p. 2200-2205 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Deconstructing Source Location Privacy-aware Routing Protocols

    Jhumka, A. & Bradbury, M., 1/04/2017, Proceedings of the Symposium on Applied Computing. Marrakech, Morocco : ACM, p. 431-436 6 p. (SAC'17).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Phantom Walkabouts in Wireless Sensor Networks

    Gu, C., Bradbury, M. & Jhumka, A., 1/04/2017, SAC '17: Proceedings of the Symposium on Applied Computing. Marrakech, Morocco: ACM, p. 609-616 8 p. (SAC'17).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources

    Laikin, J. F., Bradbury, M., Gu, C. & Leeke, M., 26/01/2017, 2016 IEEE International Conference on Communication Systems (ICCS). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. 2016
  47. Published

    Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks

    Gu, C., Bradbury, M., Jhumka, A. & Leeke, M., 7/01/2016, 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 99-108 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. 2015
  49. Published

    A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks

    Bradbury, M., Leeke, M. & Jhumka, A., 3/12/2015, 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 531-538 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Fake source-based source location privacy in wireless sensor networks

    Jhumka, A., Bradbury, M. & Leeke, M., 25/08/2015, In: Concurrency and Computation: Practice and Experience. 27, 12, p. 2999-3020 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. 2014
  52. Published

    Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks

    Jhumka, A., Bradbury, M. & Saginbekov, S., 31/01/2014, In: Journal of Parallel and Distributed Computing. 74, 1, p. 1789-1801 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  53. 2013
  54. Published

    Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy

    Thomason, A., Leeke, M., Bradbury, M. & Jhumka, A., 12/12/2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, p. 667-674 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. 2012
  56. Published

    Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources

    Jhumka, A., Bradbury, M. & Leeke, M., 6/09/2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 760-768 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top