Home > Research > Researchers > Dr Matthew Bradbury > Publications

Dr Matthew Bradbury

Senior Lecturer in Cyber Security

  1. 2020
  2. Published

    PNT Cyber Resilience: a Lab2Live Observer Based Approach, Report 1: GNSS Resilience and Identified Vulnerabilities

    Adegoke, E., Bradbury, M., Kampert, E., Higgins, M., Watson, T., Jennings, P., Ford, C., Buesnel, G. & Hickling, S., 1/04/2020, Coventry, UK.

    Research output: Working paper

  3. Published

    PNT Cyber Resilience: a Lab2Live Observer Based Approach, Report 2: Specifications for Cyber Testing Facilities

    Bradbury, M., Adegoke, E., Kampert, E., Higgins, M., Watson, T., Jennings, P., Ford, C., Buesnel, G. & Hickling, S., 1/04/2020, Coventry, UK.

    Research output: Working paper

  4. 2019
  5. Published

    A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis

    Maple, C., Bradbury, M., Le, A. T. & Ghirardello, K., 25/11/2019, In: Applied Sciences. 9, 23, 1 p., 5101.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Throughput Aware Authentication Prioritisation for Vehicular Communication Networks

    Yuan, H., Bradbury, M., Maple, C. & Gu, C., 7/11/2019, 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks

    Gu, C., Bradbury, M. & Jhumka, A., 25/10/2019, In: Concurrency and Computation: Practice and Experience. 31, 20, 17 p., e5304.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation

    Grosso, J., Jhumka, A. & Bradbury, M., 1/09/2019, 15th European Dependable Computing Conference (EDCC). p. 111-118 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages

    Farrell, M., Bradbury, M., Fisher, M., Dennis, L. A., Dixon, C., Yuan, H. & Maple, C., 1/09/2019, Software Engineering and Formal Methods: 17th International Conference, SEFM 2019, Oslo, Norway, September 18–20, 2019, Proceedings. Ölveczky, P. C. & Salaün, G. (eds.). Cham: Springer International Publishing, p. 471-490 20 p. (Lecture Notes in Computer Science ; vol. 11724).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    IoT Transport and Mobility Demonstrator: Cyber Security Testing on National Infrastructure

    Maple, C., Bradbury, M., Elsden, M., Cruickshank, H., Yuan, H., Gu, C. & Asuquo, P., 1/05/2019, Coventry, UK.

    Research output: Working paper

  11. Published

    The Impact of Decreasing Transmit Power Levels on FlockLab To Achieve a Sparse Network

    Bradbury, M., Jhumka, A. & Maple, C., 1/04/2019, CPS-IoTBench '19: Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things. New York : ACM, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. 2018
  13. Published

    Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks

    Kirton, J., Bradbury, M. & Jhumka, A., 9/12/2018, In: Computer Networks. 146, p. 125-137 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top