I pursue research in all aspects of dependable systems. A system is dependable if trust can be justifiably placed in its correct operation even in exceptional circumstances. Exceptional circumstances can be due to hardware faults (e.g., bit corruptions) or to software faults (e.g., bugs, configuration errors). These can lead to benign fault at a node level (e.g., crash fault) or malicious fault (e.g., Byzantine behaviours). Either way, systems must be designed to be fault-tolerant. I am interested in the design of such systems, from their specification to their verification and validation. Specifically, my group has interests in the following areas: 1. Design of (variants) of fault tolerance (formal methods). 2. Dependability in networked embedded systems, e.g., Wireless sensor networks, Internet of Things, cyber-physical systems. 3. Failure log analysis of High Performance Computing systems (e.g., clusters). 4. Computer security/Digital forensics. 5. Distributed systems including cloud computing, mobile Computing, edge/fog computing. An increasing interest in our research group is the use of artificial intelligence techniques to solve dependability problems.
I am an Associate Professor in the Department of Computer Science at the University of Warwick. I am a member of the Artificial Intelligence theme and I lead the Reliability and Fault Tolerance group.
- 'Bradbury, Matthew S., 'Jhumka, Arshad, 'Watson, Tim, 'Flores, Denys, 'Burton, Jonathan, 'Butler, Matthew, 2022. 'Threat-modeling-guided trust-based task offloading for resource-constrained Internet of Things. ACM Transactions on Sensor Networks, 18 (2), pp. 1-41
- 'Bradbury, Matthew S., 'Jhumka, Arshad, 'Watson, Tim, 'Flores, Denys, 'Burton, Jonathan, 'Butler, Matthew, 2022. 'Threat modelling guided trust-based task offloading for resource-constrained Internet of Things. Transactions on Sensor Networks, 18 (2)
- 'Bradbury, Matthew S., 'Jhumka, Arshad, 'Watson, Tim, 2022. 'Information management for trust computation on resource-constrained IoT devices. Future Generation Computer Systems, 135, pp. 348-363
- Bradbury, Matthew S., Jhumka, Arshad, Maple, Carsten, 2021. A spatial source location privacy-aware duty cycle for internet of things sensor networks. ACM Transactions on Internet of Things, 2 (1)
- Gu, Chen, Bradbury, Matthew S., Jhumka, Arshad, 2019. Phantom walkabouts : a customisable source location privacyaware routing protocol for wireless sensor networks. Concurrency and Computation: Practice and Experience, 31 (20)
- Bradbury, Matthew S., Jhumka, Arshad, Leeke, Matthew, 2018. Hybrid online protocols for source location privacy in wireless sensor networks. Journal of Parallel and Distributed Computing, 115, pp. 67-81
- Gu, Chen, Bradbury, Matthew S., Kirton, Jack, Jhumka, Arshad, 2018. A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks. Future Generation Computer Systems, 87, pp. 514-526
- Kirton, Jack, Bradbury, Matthew S., Jhumka, Arshad, 2018. Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks. Computer Networks, 146
- Kirton, Jack, Bradbury, Matthew S., Jhumka, Arshad, 2018. Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks. Computer Networks, 146, pp. 125-137
- Saginbekov, Sain, Jhumka, Arshad, 2017. Many-to-many data aggregation scheduling in wireless sensor networks with two sinks. Computer Networks, 123, pp. 184-199
- Lin, Yiyan, Kulkarni, Sandeep, Jhumka, Arshad, 2017. Automation of fault-tolerant graceful degradation. Distributed Computing
- Alhanahnah, Mohannad J., Jhumka, Arshad, Alouneh, Sahel, 2016. A multi-dimension taxonomy of insider threats in cloud computing. The Computer Journal, 59 (11), pp. 1612-1622
- Jhumka, Arshad, Mottola, Luca, 2016. Neighborhood view consistency in wireless sensor networks. ACM Transactions on Sensor Network, 12 (3)
- Jhumka, Arshad, Bradbury, Matthew S., Leeke, Matthew, 2015. Fake source-based source location privacy in wireless sensor networks. Concurrency and Computation: Practice and Experience, 27 (12), pp. 2999-3020
- Saginbekov, Sain, Jhumka, Arshad, 2014. Efficient code dissemination in wireless sensor networks. Future Generation Computer Systems, 39, pp. 111-119
- Saginbekov, Sain, Jhumka, Arshad, 2014. Towards efficient stabilizing code dissemination in wireless sensor networks. The Computer Journal, 57 (12), pp. 1790-1816
- Jhumka, Arshad, Bradbury, Matthew S., Saginbekov, Sain, 2014. Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks. Journal of Parallel and Distributed Computing, 74 (1), pp. 1789-1801
- Leeke, Matthew, Jhumka, Arshad, Anand, Sarabjot Singh, 2013. Towards the design of efficient error detection mechanisms for transient data errors. Computer Journal, 56 (6), pp. 674-692
- Franks, Henry P. W., Griffiths, Nathan, Jhumka, Arshad, 2012. Manipulating convention emergence using influencer agents. Autonomous Agents and Multi-Agent Systems, 26 (3), pp. 315-353
- Anand, Sarabjot Singh, Jhumka, Arshad, Wade, Kimberley A., 2011. Towards the ordering of events from multiple textual evidence sources. International Journal of Digital Crime and Forensics, Vol.3 (No.2), pp. 16-34
- Jhumka, Arshad, Leeke, Matthew, Shrestha, Sambid, 2011. On the use of fake sources for source location privacy : trade-offs between energy and privacy. The Computer Journal, 54 (6), pp. 860-874
- Suri, Neeraj, Jhumka, Arshad, Hiller, Martin, Pataricza, Andras, Islam, Shariful, Sarbu, Constantin, 2010. A software integration approach for designing and assessing dependable embedded systems. Journal of Systems and Software, Vol.83 (No.10), pp. 1780-1800
- Jhumka, Arshad, Freiling, F. C., Fetzer, C., Suri, N., 2006. An approach to synthesize safe systems. International Journal of Security and Networks, 1 (2), pp. 62-74
- Arumugam, M., Abujarad, F., Kulkarni, S. S., Jhumka, Arshad, 2009. Stabilizing inference-free slot assignment for wireless mesh networks. Misra, Sudip; Misra, Subhas Chandra; Woungang, Isaac (eds.), Guide to Wireless Mesh Networks, London, Springer
- Jhumka, Arshad, Kulkarni, Sandeep, 2007. On the design of mobility-tolerant TDMA-based media access control (MAC) protocol for mobile sensor networks. In Janowski, T.; Mohanty, H. (eds.), Distributed Computing and Internet Technology : 4th International Conference, ICDCIT 2007, Bangalore, India, December 17-20. Proceedings, Berlin, Springer-Verlag, pp. 42-53
- Alharbi, Jawaher, Jhumka, Arshad, 2023. To checkpoint or not to checkpoint : that is the question. International Conference on Embedded Wireless Systems and Networks (EWSN) 2023, Rende, Italy, 25-27 Sept 2023
- Alharbi, Jawaher, Jhumka, Arshad, 2023. Checkpointing in transiently powered IoT networks. The 22nd International Conference on Information Processing in Sensor Networks, San Antonio, TX, USA, 9-12 May 2023, Published in IPSN '23: Proceedings of the 22nd International Conference on Information Processing in Sensor Networks, pp. 316-317
- Alharthi, Khalid Ayed, Jhumka, Arshad, Di, Sheng, Gui, Lin, Cappello, Franck, McIntosh-Smith, Simon, 2023. Time machine : generative real-time model for failure (and lead time) prediction in HPC systems. 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network (IEEE IFIP DSN 2023), Porto, Portugal, 27-30 Jun 2023, Published in Proceedings of the DSN 2023, pp. 508-521
- Aldawood, Mansour, Jhumka, Arshad, Fahmy, Suhaib A., 2023. Toward secure VMs allocation : analysis of VMs allocation behaviours in the cloud computing environments. International Conference on Cloud Computing and Services Science. CLOSER 2021, Virtual, 28-30 Apr 2021, Published in Communications in Computer and Information Science, pp. 25-46
- 'Alhajaili, Sara, 'Jhumka, Arshad, 2022. 'Reliable logging in wireless IoT networks in the presence of Byzantine faults. 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20-22 Oct 2021, Published in 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 17-25
- 'Alharthi, Khalid, 'Jhumka, Arshad, 'Sheng, Di, 'Cappello, Franck, 2022. 'Clairvoyant : a log-based transformer-decoder for failure prediction in large-scale systems. ACM International Conference on Supercomputing, Virtual, 27-30 Jun 2022, Published in ICS '22: Proceedings of the 36th ACM International Conference on Supercomputing, pp. 1-14
- 'Chuah, Edward, 'Suri, Neeraj, 'Jhumka, Arshad, 'Alt, Samantha, 2022. 'Challenges in identifying network attacks using Netflow data. 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), Boston, MA, USA, 23-26 Nov 2021, Published in Proceedings of the 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), pp. 1-10
- 'Grosso, Jasmine, 'Jhumka, Arshad, 2022. 'Fault-tolerant ant colony based-routing in many-to-many IoT sensor networks. 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), Boston, MA, USA, 23-26 Nov 2021, Published in Proceedings of the 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), pp. 1-10
- 'Chuah, Edward, 'Jhumka, Arshad, 'Alt, Samantha, 'Evans, R. Todd, 'Suri, Neeraj, 2021. 'Failure diagnosis for cluster systems using partial correlations. 2021 IEEE Intl Conf on Parallel and Distributed Processing with Applications, Big Data and Cloud Computing, Sustainable Computing and Communications, Social Computing and Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, 30 Sept - 03 Oct 2021, Published in Proceedings of the 2021 IEEE Intl Conf on Parallel and Distributed Processing with Applications, Big Data and Cloud Computing, Sustainable Computing and Communications, Social Computing and Networking (ISPA/BDCloud/SocialCom/SustainCom), pp. 1091-1101
- 'Aldawood, Mansour, 'Jhumka, Arshad, 2021. 'Secure allocation for graph-based virtual machines in cloud environments. 2021 18th International Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 13-15 Dec 2021, Published in Proceedings of the Annual Conference on Privacy, Security and Trust (PST), pp. 1-7
- Bradbury, Matthew S., Jhumka, Arshad, Watson, Tim, 2021. Trust trackers for computation offloading in edge-based IoT networks. INFOCOM, Virtual, 10-13 May 2021, Published in IEEE INFOCOM 2021 - IEEE Conference on Computer Communications
- Bradbury, Matthew S., Jhumka, Arshad, Watson, Tim, 2021. Trust assessment in 32 KiB of RAM : multi-application trust-based task offloading for resource-constrained IoT nodes. Symposium on Applied Computing, Virtual conference, Republic of Korea, 22-26 Mar 2021, Published in SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied Computing, pp. 184-193
- Alharthi, Khalid, Jhumka, Arshad, Di, Sheng, Cappello, Franck, Chuah, Edward, 2021. Sentiment analysis based error detection for large-scale systems. 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (DSN'21), Taipei, Taiwan, 21-24 Jun 2021, Published in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
- Aldawood, Mansour, Jhumka, Arshad, Fahmy, Suhaib A., 2021. Sit here : placing virtual machines securely in cloud environments. 11th International Conference on Cloud Computing and Services Science, Virtual conference, 28-30 Apr 2021, Published in Proceedings of the 11th International Conference on Cloud Computing and Services Science, pp. 248-259
- Grosso, Jasmine, Jhumka, Arshad, Bradbury, Matthew S., 2019. Reliable many-to-many routing in wireless sensor networks using ant colony optimisation. European Dependable Computing Conference, Naples, Italy, 17-20 Sep 2019, Published in 2019 15th European Dependable Computing Conference (EDCC)
- Bradbury, Matthew S., Jhumka, Arshad, Maple, Carsten, 2019. The impact of decreasing transmit power levels on FlockLab to achieve a sparse network. 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things, Montreal, Canada, 15 Apr 2019, Published in CPS-IoTBench '19 : Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things, pp. 7-12
- Flores Armas, Denys, Jhumka, Arshad, 2019. Hybrid logical clocks for database forensics : filling the gap between chain of custody and database auditing. 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Rotorua, New Zealand, 5-8 Aug 2019, Published in 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
- Bradbury, Matthew S., Jhumka, Arshad, 2017. Understanding source location privacy protocols in sensor networks via perturbation of Time Series. IEEE International Conference on Computer Communications, Atlanta, GA, USA, 01-05 May 2017, Published in IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pp. 1-9
- Gu, Chen, Bradbury, Matthew S., Jhumka, Arshad, 2017. Phantom walkabouts in wireless sensor networks. 32nd ACM SIGAPP Symposium On Applied Computing, Marrakech, Morocco, 3-7 April 2017, Published in Proceedings of the Symposium on Applied Computing, pp. 609-616
- Jhumka, Arshad, Bradbury, Matthew S., 2017. Deconstructing source location privacy-aware routing protocols. 32nd ACM SIGAPP Symposium On Applied Computing, Marrakech, Morocco, 3-7 April 2017, Published in Proceedings of the Symposium on Applied Computing, pp. 431-436
- Bradbury, Matthew S., Jhumka, Arshad, 2017. A near-optimal source location privacy scheme for wireless sensor networks. 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17), Sydney, Australia, 1-4 Aug 2017, Published in IEEE CPS Proceedings
- Chuah, Edward, Jhumka, Arshad, Alt, Samantha, Damoulas, Theodoros, Gurumdimma, Nentawe, Sawley, Marie-Christine, Barth, William L., Minyard, Tommy, Browne, James C., 2017. Enabling dependability-driven resource use and message log-analysis for cluster system diagnosis. 24th IEEE International Conference on High Performance Computing, Data, and Analytics, Jaipur, India, 18-21 Dec 2017, Published in 2017 IEEE 24th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC)
- Chuah, Edward, Jhumka, Arshad, Alt, Samantha, Damoulas, Theodoros, Gurumdimma, Nentawe, Sawley, Marie-Christine, Barth, William L., Minyard, Tommy, Browne, James C., 2017. Case study of error recovery and error propagation on ranger. 24th IEEE International Conference on High Performance Computing, Data, and Analytics (HiPC 2017), Jaipur, India, 18-21 Dec 2017
- Chuah, Edward, Jhumka, Arshad, Browne, James C., Gurumdimma, Nentawe, Narasimhamurthy, Sai, Barth, Bill, 2017. Using message logs and resource use data for cluster failure diagnosis. 23rd annual IEEE International Conference on High Performance Computing, Data, and Analytics (HiPC 2016), Hyderabad, India, 19-22 Dec 2016
- Kirton, Jack, Bradbury, Matthew S., Jhumka, Arshad, 2017. Source location privacy-aware data aggregation scheduling for wireless sensor networks. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), Atlanta, GA, 5?8 Jun 2017, Published in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
- Flores Armas, Denys, Qazi, Farrukh, Jhumka, Arshad, 2016. Bring your own disclosure : analysing BYOD threats to corporate information. 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23-26 Aug 2016, Published in 2016 IEEE Trustcom/BigDataSE/I?SPA, pp. 1008-1015
- Bradbury, Matthew S., Leeke, Matthew, Jhumka, Arshad, 2015. A dynamic fake source algorithm for source location privacy in wireless sensor networks. 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, 20-22 Aug 2015, Published in 2015 IEEE Trustcom/BigDataSE/ISPA, pp. 531-538
- Gurumdimma, Nentawe, Jhumka, Arshad, Liakata, Maria, Chuah, Edward, Browne, James, 2015. Towards detecting patterns in failure logs of large-scale distributed systems. 2015 IEEE International Parallel and Distributed Processing Symposium Workshop (IPDPSW), Hyderabad, 25-29 May 2015, pp. 1052-1061
- Gu, Chen, Bradbury, Matthew S., Jhumka, Arshad, Leeke, Matthew, 2015. Assessing the performance of phantom routing on source location privacy in wireless sensor networks. 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, 18-20 Nov 2015, Published in 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 99-108
- Gurumdimma, Nentawe, Jhumka, Arshad, Liakata, Maria, Chuah, Edward, Browne, James, 2015. Towards increasing the error handling time window in large-scale distributed systems using console and resource usage logs. 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 20-22 Aug 2015, pp. 61-68
- Thomason, Alasdair, Leeke, Matthew, Bradbury, Matthew S., Jhumka, Arshad, 2013. Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'13), Melbourne, Australia, 16-18 July 2013, Published in Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), pp. 667-674
- Chuah, Edward, Jhumka, Arshad, Narasimhamurthy, Sai, Hammond, J., Browne, James C., Barth, Bill, 2013. Linking resource usage anomalies with system failures from cluster log data. 2013 IEEE 32nd International Symposium onReliable Distributed Systems (SRDS), Braga, 30 Sep - 3 Oct 2013, Published in Proceedings of the IEEE Symposium on Reliable Distributed Systems, pp. 111-120
- Franks, H., Griffiths, Nathan, Jhumka, Arshad, 2012. Robust reputation in decentralised markets. 1st ACM Workshop on Incentives and Trust in E-Commerce (WIT-EC 2012), Valencia, Spain, 4-6 Jun 2012, Published in Proceedings of the First Workshop on Incentives and Trust in E-Commerce (WIT-EC'12), in associateion with the 13th ACM Conference on Electronic Commerce (EC'12)
- Saginbekov, Sain, Jhumka, Arshad, 2012. Fast and efficient information dissemination in event-based wireless sensor networks. IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, England, 25-27 Jun 2012, pp. 1555-1561
- Jhumka, Arshad, Bradbury, Matthew S., Leeke, Matthew, 2012. Towards understanding source location privacy in wireless sensor networks through fake sources. 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'12), Liverpool, UK, 25-27 Jun 2012, pp. 760-768
- Jhumka, Arshad, Leeke, Matthew, 2011. The early identification of detector locations in dependable software. 22nd IEEE International Symposium on Software Reliability Engineering, Hiroshima, Japan, 29 Nov - 2 Dec 2011, Published in Proceedings of 22nd IEEE International Symposium on Software Reliability Engineering, pp. 40-49
- Chester, Adam P., Leeke, Matthew, Al-Ghamdi, M., Jhumka, Arshad, Jarvis, Stephen A., 2011. A framework for data center scale dynamic resource allocation algorithms. 11th IEEE International Conference on Computer and Information Technology (CIT), Pafos, Cyprus, 31st August - 2nd September 2011, Published in Proceedings of the 11th IEEE International Conference on Scalable Computing and Communications (SCALCOM'11), pp. 67-74
- 'Leeke, Matthew, 'Jhumka, Arshad, 2011. 'An automated wrapper-based approach to the design of dependable software. 4th International Conference on Dependability (DEPEND'11), Nice, France, 21-27 August 2011
- Leeke, Matthew, Arif, Saima, Jhumka, Arshad, Anand, Sarabjot Singh, 2011. A methodology for the generation of efficient error detection mechanisms. IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), Hong Kong, 27-30 June 2011, Published in Proceedings of the 41st International Conference on Dependable Systems and Networks, pp. 25-36
- Chester, Adam P., Leeke, Matthew, Al-Ghamdi, M., Jarvis, Stephen A., Jhumka, Arshad, 2011. A modular failure-aware resource allocation architecture for cloud computing. UK Performance Engineering Workshop (UKPEW'11), Bradford, United Kingdom, 7-8 July 2011
- Leeke, Matthew, Jhumka, Arshad, 2010. Towards understanding the importance of variables in dependable software. 8th European Dependable Computing Conference (EDCC'10), Valencia, Spain, 28-30 April 2010, Published in 2010 European Dependable Computing Conference (EDCC), pp. 85-94
- Franks, Henry P. W., Griffiths, Nathan, Jhumka, Arshad, 2010. Image scoring in ad-hoc networks : an investigation on realistic settings. 8th European Workshop on Multi-Agent Systems, Paris, France, 16-17 Dec 2010
- Shrestha, Sambid, Leeke, Matthew, Jhumka, Arshad, 2010. On the tradeoff between privacy and energy in wireless sensor networks. UK Performance Engineering Workshop (UKPEW'10), Coventry, UK, 9-10 July 2010, Published in Proceedings of the 26th UK Performance Engineering Workshop (UKPEW 2010), pp. 103-110
- Jhumka, Arshad, 2010. Crash-tolerant collision-free data aggregation scheduling for wireless sensor networks. 29th IEEE International Symposium on Reliable Distributed Systems, New Delhi, India, 31 Oct - 03 Nov 2010, Published in Symposium on Reliable Distributed Systems. Proceedings, pp. 44-53
- Levett, C., Jhumka, Arshad, Anand, Sarabjot Singh, 2010. Towards event ordering in digital forensics. 12th ACM Multimedia Security Workshop, Univ Studi Roma TRE, Roma, Italy, 09-10 Sep 2010, Published in MM&Sec '10 : proceedings of the 2010 ACM SIGMM Multimedia and Security Workshop ; September 9-10, 2010, Roma, Italy / sponsored by ACM SIGMM, pp. 35-42
- Leeke, Matthew, Jhumka, Arshad, 2009. Beyond the golden run : evaluating the use of reference run models in fault injection analysis. UK Performance Engineering Workshop (UKPEW 2009), Leeds, UK, 6-7 July 2009, Published in Proceedings of the 25th UK Performance Engineering Workshop, pp. 61-74
- Leeke, Matthew, Jhumka, Arshad, 2009. Evaluating the use of reference run models in fault injection analysis. 15th Pacific Rim International Symposium on Dependable Computing, Shanghai, People's Republic of China, November 16-18, 2009, Published in IEEE 15th Pacific Rim International Symposium on Dependable Computing, Proceedings, pp. 121-124
- Jhumka, Arshad, Leeke, Matthew, 2009. Issues on the design of efficient fail-safe fault tolerance. 20th International Symposium on Software Reliability Engineering, 2009. ISSRE '09, Mysuru, Karnataka, 16-19 Nov 2009, Published in International Symposium on Software Reliability Engineering. Proceedings, pp. 155-164
- Jhumka, Arshad, Mottola, Luca, 2009. On consistent neighborhood views in wireless sensor networks. 28th IEEE International Symposium on Reliable Distributed Systems, Niagara Falls, NY, September 27-30, 2009, Published in 2009 28th IEEE International Symposium on Reliable Distributed Systems, Proceedings, pp. 199-208
- Griffiths, Nathan, Jhumka, Arshad, Dawson, A. (Anthony), Myers, Richard, 2008. A simple trust model for on-demand routing in mobile ad-hoc networks. 2nd International Symposium on Intelligent and Distributed Computing (IDC 2008), Univ Catania, Catania, Italy, Sep 18-19 2008, Published in Studies in Computational Intelligence, pp. 105-114
- Jhumka, Arshad, Griffiths, Nathan, Dawson, A. (Anthony), Myers, Richard, 2008. An outlook on the impact of trust models on routing in mobile ad hoc networks (MANETs). Networking and Electronic Commerce Research Conference (NAEC 2008), Lake Garda, Italy, 25-28 Sep 2008
- Freiling, F. C., Jhumka, Arshad, 2007. Global predicate detection in distributed systems with small faults. 9th International Symposium on Stabilisation, Safety and Security of Distributed Systems, Paris, France, 14-16 Nov 2007, Published in Proceedings of the 9th International Symposium on Stabilisation, Safety and Security of Distributed Systems, pp. 296-310
- 'Bradbury, Matthew S., 'Jhumka, Arshad, 'Watson, Tim, 2021. 'Data for Buffer management for trust computation in resource-constrained IoT networks. University of Warwick, Department of Computer Science
- 'Bradbury, Matthew S., 'Jhumka, Arshad, 'Watson, Tim, 2021. 'Data for Trust assessment in 32 KiB of RAM : multi-application trust-based task offloading for resource-constrained IoT nodes. University of Warwick, Department of Computer Science
- 'Bradbury, Matthew S., 'Jhumka, Arshad, 'Watson, Tim, 2021. 'Data for Trust trackers for computation offloading in edge-based IoT networks. University of Warwick, Department of Computer Science
- Grosso, Jasmine, Jhumka, Arshad, Bradbury, Matthew S., 2019. Data for Reliable many-to-many routing in wireless sensor networks using ant colony optimisation. Zenodo
- 'Bradbury, Matthew S., 'Jhumka, Arshad, 2017. 'Data for A near-optimal source location privacy scheme for wireless sensor networks. University of Warwick, Department of Computer Science
- 'Gu, Chen, 'Bradbury, Matthew S., 'Kirton, Jack, 'Jhumka, Arshad, 2017. 'Data for Source location privacy aware routing protocols selection results. University of Warwick, Department of Computer Science
Title | Funder | Award start | Award end |
---|---|---|---|
Evaluating Trustworthiness of Edge-Based Multi-Tenanted IoT Devices | EPSRC | 02 Mar 2020 | 30 Jun 2022 |
Bayesian predictive models of violent extremist threat: the intelligent combination of expert judgements and observational data | Turing innovations Ltd | 01 Oct 2018 | 31 Mar 2019 |
Testbed Development for Secure Cyber-Physical Systems and Internet of Things Research and Teaching | Secretary of State for Foreign and Commonwealth Affairs | 30 Nov 2017 | 29 May 2018 |