Home > Research > Researchers > Dr Matthew Bradbury > Publications

Dr Matthew Bradbury

Lecturer in Cyber Security

  1. 2012
  2. Published

    Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources

    Jhumka, A., Bradbury, M. & Leeke, M., 6/09/2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 760-768 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. 2013
  4. Published

    Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy

    Thomason, A., Leeke, M., Bradbury, M. & Jhumka, A., 12/12/2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, p. 667-674 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. 2014
  6. Published

    Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks

    Jhumka, A., Bradbury, M. & Saginbekov, S., 31/01/2014, In: Journal of Parallel and Distributed Computing. 74, 1, p. 1789-1801 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. 2015
  8. Published

    Fake source-based source location privacy in wireless sensor networks

    Jhumka, A., Bradbury, M. & Leeke, M., 25/08/2015, In: Concurrency and Computation: Practice and Experience. 27, 12, p. 2999-3020 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks

    Bradbury, M., Leeke, M. & Jhumka, A., 3/12/2015, 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 531-538 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. 2016
  11. Published

    Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks

    Gu, C., Bradbury, M., Jhumka, A. & Leeke, M., 7/01/2016, 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 99-108 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. 2017
  13. Published

    Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources

    Laikin, J. F., Bradbury, M., Gu, C. & Leeke, M., 26/01/2017, 2016 IEEE International Conference on Communication Systems (ICCS). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Deconstructing Source Location Privacy-aware Routing Protocols

    Jhumka, A. & Bradbury, M., 1/04/2017, Proceedings of the Symposium on Applied Computing. Marrakech, Morocco : ACM, p. 431-436 6 p. (SAC'17).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Phantom Walkabouts in Wireless Sensor Networks

    Gu, C., Bradbury, M. & Jhumka, A., 1/04/2017, SAC '17: Proceedings of the Symposium on Applied Computing. Marrakech, Morocco: ACM, p. 609-616 8 p. (SAC'17).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks

    Kirton, J., Bradbury, M. & Jhumka, A., 17/07/2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, p. 2200-2205 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 Next

Back to top