Publications

First page of Trust Trackers for Computation Offloading in Edge-Based IoT NetworksFirst page of Privacy Challenges with Protecting Live Vehicular Location ContextFirst page of A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks
Trust Trackers for Computation Offloading in Edge-Based IoT Networks (2021).Privacy Challenges with Protecting Live Vehicular Location Context (2020).A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks (2017).

Publication Map

The bibtex for all my publications is available from here.

2022

  • Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, and Neeraj Suri. Poster: Multi-Layer Threat Analysis of the Cloud. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS’22. Los Angeles, CA, USA, 7–11 November 2022. ACM. doi:10.1145/3548606.3563515.
    [ bibtex] [ file] [ poster] [ more details]
  • Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, and Neeraj Suri. Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS’22. Los Angeles, CA, USA, 7–11 November 2022. ACM. doi:10.1145/3548606.3563514.
    [ bibtex] [ file] [ poster] [ more details]
  • Matthew Bradbury, Daniel Prince, Victoria Marcinkiewicz, and Tim Watson. Attributes and Dimensions of Trust in Secure Systems. In Proceedings of the 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things, STaR-IoT’22. Delft, Netherlands, 7 November 2022. doi:10.1145/3567445.35711.
    [ bibtex] [ file] [ presentation] [ more details]
  • Yiqun Chen, Matthew Bradbury, and Neeraj Suri. Towards Effective Performance Fuzzing. In The 33rd IEEE International Symposium on Software Reliability Engineering Workshops, ISSREW. Charlotte, North Carolina, USA, 31 October – 3 November 2022.
    [ bibtex] [ file] [ presentation] [ dataset] [ more details]
  • Yiqun Chen, Oliver Schwahn, Roberto Natella, Matthew Bradbury, and Neeraj Suri. SlowCoach: Mutating Code to Simulate Performance Bugs. In The 33rd IEEE International Symposium on Software Reliability Engineering. Charlotte, North Carolina, USA, 31 October – 3 November 2022.
    [ bibtex] [ file] [ presentation] [ dataset] [ more details]
  • Matthew Bradbury and Arshad Jhumka. Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss. IEEE Transactions on Information Forensics and Security, 2022. doi:10.1109/TIFS.2022.3217385.
    [ bibtex] [ file] [ project] [ more details]
  • Matthew Bradbury, Arshad Jhumka, and Tim Watson. Information Management for Trust Computation on Resource-constrained IoT Devices. Future Generation Computer Systems, 135:348–363, 2022. doi:10.1016/j.future.2022.05.004.
    [ bibtex] [ file] [ dataset] [ project] [ more details]
  • Matthew Bradbury, Arshad Jhumka, Tim Watson, Denys Flores, Jonathan Burton, and Matthew Butler. Threat-Modeling-Guided Trust-Based Task Offloading for Resource-Constrained Internet of Things. ACM Transactions on Sensor Networks, 18(2):41, 2022. doi:10.1145/3510424.
    [ bibtex] [ file] [ presentation] [ dataset] [ project] [ more details]

2021

2020

  • Matthew Bradbury, Phillip Taylor, Ugur Ilker Atmaca, Carsten Maple, and Nathan Griffiths. Privacy Challenges with Protecting Live Vehicular Location Context. IEEE Access, 8:207465–207484, 2020. doi:10.1109/ACCESS.2020.3038533.
    [ bibtex] [ file] [ more details]
  • Carsten Maple, Matthew Bradbury, Hu Yuan, Marie Farrell, Clare Dixon, Michael Fisher, and Uger Ilker Atmaca. Security-Minded Verification of Space Systems. In IEEE Aerospace Conference. Big Sky, Montana, USA, 7–14 March 2020. IEEE. doi:10.1109/AERO47225.2020.9172563.
    [ bibtex] [ file] [ project]
  • Matthew Bradbury, Carsten Maple, Uger Ilker Atmaca, and Sara Cannizzaro. Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures. In IEEE Aerospace Conference. Big Sky, Montana, USA, 7–14 March 2020. IEEE. doi:10.1109/AERO47225.2020.9172785.
    [ bibtex] [ file] [ project]

2019

  • Carsten Maple, Matthew Bradbury, Anh Tuan Le, and Kevin Ghirardello. A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis. Applied Sciences, 9(23):5101, November 2019. doi:10.3390/app9235101.
    [ bibtex] [ file] [ project]
  • Hu Yuan, Matthew Bradbury, Carsten Maple, and Chen Gu. Throughput Aware Authentication Prioritisation for Vehicular Communication Networks. In 90th IEEE Vehicular Technology Conference (VTC2019-Fall), 1–5. Sep. 2019. doi:10.1109/VTCFall.2019.8891375.
    [ bibtex] [ file]
  • Jasmine Grosso, Arshad Jhumka, and Matthew Bradbury. Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation. In 15th European Dependable Computing Conference (EDCC), 111–118. September 2019. doi:10.1109/EDCC.2019.00030.
    [ bibtex] [ file]
  • Marie Farrell, Matthew Bradbury, Michael Fisher, Louise A. Dennis, Clare Dixon, Hu Yuan, and Carsten Maple. Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages. In Peter Csaba Ölveczky and Gwen Salaün, editors, Software Engineering and Formal Methods, 471–490. Cham, 2019. Springer International Publishing. doi:10.1007/978-3-030-30446-1 25.
    [ bibtex] [ file] [ project]
  • Matthew Bradbury, Arshad Jhumka, and Carsten Maple. The Impact of Decreasing Transmit Power Levels on FlockLab To Achieve a Sparse Network. In Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things, CPS-IoTBench ‘19, 7–12. New York, NY, USA, April 2019. ACM. doi:10.1145/3312480.3313171.
    [ bibtex] [ file] [ presentation] [ dataset] [ project] [ more details]
  • Chen Gu, Matthew Bradbury, and Arshad Jhumka. Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks. Concurrency and Computation: Practice and Experience, 31(20):e5304, 2019. doi:10.1002/cpe.5304.
    [ bibtex] [ file] [ project]

2018

  • Jack Kirton, Matthew Bradbury, and Arshad Jhumka. Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks. Computer Networks, 146:125–137, 2018. doi:10.1016/j.comnet.2018.09.010.
    [ bibtex] [ file] [ project]
  • Chen Gu, Matthew Bradbury, Jack Kirton, and Arshad Jhumka. A Decision Theoretic Framework for Selecting Source Location Privacy Aware Routing Protocols in Wireless Sensor Networks. Future Generation Computer Systems, 87:514–526, 2018. doi:10.1016/j.future.2018.01.046.
    [ bibtex] [ file] [ dataset] [ project]
  • Matthew Bradbury, Arshad Jhumka, and Matthew Leeke. Hybrid Online Protocols for Source Location Privacy in Wireless Sensor Networks. Journal of Parallel and Distributed Computing, 115:67–81, May 2018. doi:10.1016/j.jpdc.2018.01.006.
    [ bibtex] [ file] [ project]

2017

2016

  • Joanna F. Laikin, Matthew Bradbury, Chen Gu, and Matthew Leeke. Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources. In 15th IEEE International Conference on Communication Systems (ICCS’16), 1–6. December 2016. doi:10.1109/ICCS.2016.7833572.
    [ bibtex] [ file] [ project]

2015

  • Chen Gu, Matthew Bradbury, Arshad Jhumka, and Matthew Leeke. Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks. In 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), 99–108. November 2015. doi:10.1109/PRDC.2015.9.
    [ bibtex] [ file] [ project]
  • Arshad Jhumka, Matthew Bradbury, and Matthew Leeke. Fake source-based source location privacy in wireless sensor networks. Concurrency and Computation: Practice and Experience, 27(12):2999–3020, 2015. doi:10.1002/cpe.3242.
    [ bibtex] [ file] [ project]
  • Matthew Bradbury, Matthew Leeke, and Arshad Jhumka. A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks. In 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 531–538. August 2015. doi:10.1109/Trustcom.2015.416.
    [ bibtex] [ file] [ presentation] [ project]

2014

  • Arshad Jhumka, Matthew Bradbury, and Sain Saginbekov. Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks. Journal of Parallel and Distributed Computing, 74(1):1789–1801, 2014. doi:10.1016/j.jpdc.2013.09.011.
    [ bibtex] [ file]

2013

  • Alasdair Thomason, Matthew Leeke, Matthew Bradbury, and Arshad Jhumka. Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 667–674. July 2013. doi:10.1109/TrustCom.2013.81.
    [ bibtex] [ file] [ project]

2012

  • Arshad Jhumka, Matthew Bradbury, and Matthew Leeke. Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. In 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 760–768. June 2012. doi:10.1109/TrustCom.2012.281.
    [ bibtex] [ file] [ presentation] [ project]

PhD Thesis

Technical Reports

  • Matthew Bradbury, Elijah Adegoke, Erik Kampert, Matthew Higgins, Tim Watson, Paul Jennings, Colin Ford, Guy Buesnel, and Steve Hickling. PNT Cyber Resilience: a Lab2Live Observer Based Approach, Report 2: Specifications for Cyber Testing Facilities. Technical Report 2, University of Warwick, Coventry, UK, April 2020. Version 1.2. URL: https://wrap.warwick.ac.uk/139522/.
    [ bibtex] [ file] [ project] [ more details]
  • Elijah Adegoke, Matthew Bradbury, Erik Kampert, Matthew Higgins, Tim Watson, Paul Jennings, Colin Ford, Guy Buesnel, and Steve Hickling. PNT Cyber Resilience: a Lab2Live Observer Based Approach, Report 1: GNSS Resilience and Identified Vulnerabilities. Technical Report 1, University of Warwick, Coventry, UK, April 2020. Version 1.0. URL: https://wrap.warwick.ac.uk/139519/.
    [ bibtex] [ file] [ project] [ more details]
  • Carsten Maple, Matthew Bradbury, Miles Elsden, Haitham Cruickshank, Hu Yuan, Chen Gu, and Phillip Asuquo. IoT Transport and Mobility Demonstrator: Cyber Security Testing on National Infrastructure. Technical Report, University of Warwick, Coventry, UK, May 2019.
    [ bibtex] [ file] [ project]