The Library
Browse by Warwick Author
Up a level |
Number of items: 43.
Bradbury, Matthew S. and Jhumka, Arshad (2022) Quantifying source location privacy routing performance via divergence and information loss. IEEE Transactions on Information Forensics and Security, 17 . pp. 3890-3905. doi:10.1109/TIFS.2022.3217385 ISSN 1556-6013.
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2022) Information management for trust computation on resource-constrained IoT devices. Future Generation Computer Systems, 135 . pp. 348-363. doi:10.1016/j.future.2022.05.004 ISSN 0167-739X.
Bradbury, Matthew S., Jhumka, Arshad, Watson, Tim, Flores, Denys, Burton, Jonathan and Butler, Matthew (2022) Threat modelling guided trust-based task offloading for resource-constrained Internet of Things. Transactions on Sensor Networks, 18 (2). 29. doi:10.1145/3510424 ISSN 1550-4859.
Bradbury, Matthew S., Jhumka, Arshad, Watson, Tim, Flores, Denys, Burton, Jonathan and Butler, Matthew (2022) Threat-modeling-guided trust-based task offloading for resource-constrained Internet of Things. ACM Transactions on Sensor Networks, 18 (2). pp. 1-41. 29. doi:10.1145/3510424 ISSN 1550-4867.
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Trust trackers for computation offloading in edge-based IoT networks. In: INFOCOM, Virtual, 10-13 May 2021. Published in: IEEE INFOCOM 2021 - IEEE Conference on Computer Communications doi:10.1109/INFOCOM42981.2021.9488844 ISSN 0743-166X.
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Trust assessment in 32 KiB of RAM : multi-application trust-based task offloading for resource-constrained IoT nodes. In: Symposium on Applied Computing, Virtual conference, Republic of Korea, 22-26 Mar 2021. Published in: SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied Computing pp. 184-193. ISBN 9781450381048. doi:10.1145/3412841.3441898
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Data for Buffer management for trust computation in resource-constrained IoT networks. [Dataset]
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Data for Trust assessment in 32 KiB of RAM : multi-application trust-based task offloading for resource-constrained IoT nodes. [Dataset]
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Data for Trust trackers for computation offloading in edge-based IoT networks. [Dataset]
Bradbury, Matthew S., Jhumka, Arshad and Maple, Carsten (2021) A spatial source location privacy-aware duty cycle for internet of things sensor networks. ACM Transactions on Internet of Things, 2 (1). 4. doi:10.1145/3430379 ISSN 2691-1914.
Bradbury, Matthew S., Taylor, Phillip M., Atmaca, U. I., Maple, Carsten and Griffiths, Nathan (2020) Privacy challenges with protecting live vehicular location context. IEEE Access, 8 . pp. 207465-207484. doi:10.1109/ACCESS.2020.3038533 ISSN 2169-3536.
Bradbury, Matthew S., Maple, Carsten, Yuan, Hu, Atmaca, Ugur Ilker and Cannizzaro, Sara (2020) Identifying attack surfaces in the evolving space industry using reference architectures. In: IEEE Aerospace Conference 2020 (AeroConf 2020), Montana, USA, 7-14 Mar 2020. Published in: 2020 IEEE Aerospace Conference doi:10.1109/AERO47225.2020.9172785 ISSN 1095-323X.
Maple, Carsten, Bradbury, Matthew S., Yuan, Hu, Farrell, Marie, Dixon, Clare, Fisher, Michael and Atmaca, Ugur Ilker (2020) Security-minded verification of space systems. In: IEEE Aerospace Conference 2020 (AeroConf 2020), Montana, USA, 7-14 Mar 2020. Published in: 2020 IEEE Aerospace Conference doi:10.1109/AERO47225.2020.9172563 ISSN 1095-323X.
Adegoke, Elijah I., Bradbury, Matthew S., Kampert, Erik, Higgins, Matthew D., Watson, Tim, Jennings, Paul A., Ford, Col R., Buesnel, Guy and Hickling, Steve (2020) PNT cyber resilience : a Lab2Live observer based approach, Report 1 : GNSS resilience and identified vulnerabilities. Technical Report 1. Coventry: University of Warwick. (Unpublished)
Bradbury, Matthew S., Adegoke, Elijah I., Kampert, Erik, Higgins, Matthew D., Watson, Tim, Jennings, Paul A., Ford, Col R., Buesnel, Guy and Steve, Hickling (2020) PNT cyber resilience : a Lab2Live observer based approach, Report 2: specifications for cyber testing facilities. Technical report 2. Coventry: University of Warwick. (Unpublished)
Maple, Carsten, Bradbury, Matthew S., Le, Anhtuan and Ghirardello, Kevin (2019) A connected and autonomous vehicle reference architecture for attack surface analysis. Applied Sciences, 9 (23). 5101. doi:10.3390/app9235101 ISSN 2076-3417.
Grosso, Jasmine, Jhumka, Arshad and Bradbury, Matthew S. (2019) Reliable many-to-many routing in wireless sensor networks using ant colony optimisation. In: European Dependable Computing Conference, Naples, Italy, 17-20 Sep 2019. Published in: 2019 15th European Dependable Computing Conference (EDCC) ISBN 9781728139296. doi:10.1109/EDCC.2019.00030
Yuan, Hu, Bradbury, Matthew S., Maple, Carsten and Gu, Chen (2019) Throughput aware authentication prioritisation for vehicular communication networks. In: 2019 IEEE 90th Vehicular Technology Conference : VTC2019-Fall , Honolulu, Hawaii, 22–25 Sep 2019. Published in: 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall) pp. 1-5. ISBN 9781728112206. doi:10.1109/VTCFall.2019.8891375 ISSN 2577-2465.
Gu, Chen, Bradbury, Matthew S. and Jhumka, Arshad (2019) Phantom walkabouts : a customisable source location privacy aware routing protocol for wireless sensor networks. Concurrency and Computation: Practice and Experience, 31 (20). e5304. doi:10.1002/cpe.5304 ISSN 1532-0626.
Farrell, Marie, Bradbury, Matthew S., Fisher, Michael, Dennis, Louise A., Dixon, Claire, Yuan, Hu and Maple, Carsten (2019) Using threat analysis techniques to guide formal verification : a case study of cooperative awareness messages. In: SEFM 2019: 17th edition of the International Conference on Software Engineering and Formal Methods, Oslo, Norway, 16-20 Sep 2020. Published in: Software Engineering and Formal Methods. SEFM 2019, 11724 pp. 471-490. ISBN 9783030304454. doi:10.1007/978-3-030-30446-1_25
Watson, Gregory A., Steadman, Liam, Purser, David, Kirk, Richard, Kenny, Melissa and Bradbury, Matthew S. (2019) Organising a multidisciplinary postgraduate colloquium. Exchanges: The Interdisciplinary Research Journal, 6 (2). pp. 86-101. doi:10.31273/eirj.v6i2.348 ISSN 2053-9665.
Bradbury, Matthew S., Jhumka, Arshad and Maple, Carsten (2019) The impact of decreasing transmit power levels on FlockLab to achieve a sparse network. In: 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things, Montreal, Canada, 15 Apr 2019. Published in: CPS-IoTBench '19 : Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things pp. 7-12. ISBN 9781450366939. doi:10.1145/3312480.3313171
Grosso, Jasmine, Jhumka, Arshad and Bradbury, Matthew S. (2019) Data for Reliable many-to-many routing in wireless sensor networks using ant colony optimisation. [Dataset]
Bradbury, Matthew S. (2019) Data for FlockLab Testbed Profile. [Dataset]
Kirton, Jack, Bradbury, Matthew S. and Jhumka, Arshad (2018) Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks. Computer Networks, 146 . p. 125. doi:10.1016/j.comnet.2018.09.010 ISSN 1389-1286.
Gu, Chen, Bradbury, Matthew S., Kirton, Jack and Jhumka, Arshad (2018) A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks. Future Generation Computer Systems, 87 . pp. 514-526. doi:10.1016/j.future.2018.01.046 ISSN 0167-739X.
Bradbury, Matthew S., Jhumka, Arshad and Leeke, Matthew (2018) Hybrid online protocols for source location privacy in wireless sensor networks. Journal of Parallel and Distributed Computing, 115 . pp. 67-81. doi:10.1016/j.jpdc.2018.01.006 ISSN 0743-7315.
Bradbury, Matthew S. (2018) Near optimal routing protocols for source location privacy in wireless sensor networks: modelling, design and evaluation. PhD thesis, University of Warwick.
Bradbury, Matthew S. (2018) Data for Near optimal routing protocols for source location privacy in wireless sensor networks : modelling, design and evaluation. [Dataset]
Gu, Chen, Bradbury, Matthew S., Kirton, Jack and Jhumka, Arshad (2017) Data for Source location privacy aware routing protocols selection results. [Dataset]
Bradbury, Matthew S. and Jhumka, Arshad (2017) Understanding source location privacy protocols in sensor networks via perturbation of Time Series. In: IEEE International Conference on Computer Communications, Atlanta, GA, USA, 01-05 May 2017. Published in: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, 2017 pp. 1-9. ISBN 9781509053377. doi:10.1109/INFOCOM.2017.8057122 ISSN 0743-166X.
Bradbury, Matthew S. and Jhumka, Arshad (2017) A near-optimal source location privacy scheme for wireless sensor networks. In: 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17), Sydney, Australia, 1-4 Aug 2017. Published in: IEEE CPS Proceedings ISBN 9781509049066. ISSN 2324-9013.
Kirton, Jack, Bradbury, Matthew S. and Jhumka, Arshad (2017) Source location privacy-aware data aggregation scheduling for wireless sensor networks. In: 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), Atlanta, GA, 5–8 Jun 2017. Published in: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) doi:10.1109/ICDCS.2017.171 ISSN 1063-6927.
Bradbury, Matthew S. and Jhumka, Arshad (2017) Data for A near-optimal source location privacy scheme for wireless sensor networks. [Dataset]
Jhumka, Arshad and Bradbury, Matthew S. (2017) Deconstructing source location privacy-aware routing protocols. In: 32nd ACM SIGAPP Symposium On Applied Computing, Marrakech, Morocco, 3-7 April 2017. Published in: Proceedings of the Symposium on Applied Computing pp. 431-436. ISBN 9781450344869.
Gu, Chen, Bradbury, Matthew S. and Jhumka, Arshad (2017) Phantom walkabouts in wireless sensor networks. In: 32nd ACM SIGAPP Symposium On Applied Computing, Marrakech, Morocco, 3-7 April 2017. Published in: Proceedings of the Symposium on Applied Computing pp. 609-616. ISBN 9781450344869.
Laikin, Joanna F., Bradbury, Matthew S., Gu, Chen and Leeke, Matthew (2016) Towards fake sources for source location privacy in wireless sensor networks with multiple sources. In: 15th IEEE International Conference on Communication Systems (ICCS'16) , Shenzhen, China, 14-16 Dec 2016. Published in: 2016 IEEE International Conference on Communication Systems (ICCS), ISBN 9781509034239.
Jhumka, Arshad, Bradbury, Matthew S. and Leeke, Matthew (2015) Fake source-based source location privacy in wireless sensor networks. Concurrency and Computation: Practice and Experience, 27 (12). pp. 2999-3020. doi:10.1002/cpe.3242 ISSN 1532-0626.
Bradbury, Matthew S., Leeke, Matthew and Jhumka, Arshad (2015) A dynamic fake source algorithm for source location privacy in wireless sensor networks. In: 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, 20-22 Aug 2015. Published in: 2015 IEEE Trustcom/BigDataSE/ISPA, 1 pp. 531-538. doi:10.1109/Trustcom.2015.416
Gu, Chen, Bradbury, Matthew S., Jhumka, Arshad and Leeke, Matthew (2015) Assessing the performance of phantom routing on source location privacy in wireless sensor networks. In: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, 18-20 Nov 2015. Published in: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC) pp. 99-108. ISBN 9781467393751. doi:10.1109/PRDC.2015.9
Jhumka, Arshad, Bradbury, Matthew S. and Saginbekov, Sain (2014) Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks. Journal of Parallel and Distributed Computing, Volume 74 (Number 1). pp. 1789-1801. doi:10.1016/j.jpdc.2013.09.011 ISSN 0743-7315.
Thomason, Alasdair, Leeke, Matthew, Bradbury, Matthew S. and Jhumka, Arshad (2013) Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'13), Melbourne, Australia, 16-18 July 2013. Published in: Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013) pp. 667-674. doi:10.1109/TrustCom.2013.81
Jhumka, Arshad, Bradbury, Matthew S. and Leeke, Matthew (2012) Towards understanding source location privacy in wireless sensor networks through fake sources. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'12), Liverpool, UK, 25-27 Jun 2012 pp. 760-768. ISBN 9781467321723. doi:10.1109/TrustCom.2012.281
This list was generated on Tue Apr 23 13:32:01 2024 BST.