Skip to main content

Publications

View Publications

View Journals        View Books and Chapters        View Conferences        View Other

Journals


  • Gu, Chen, Bradbury, Matthew S., Jhumka, Arshad. 2019. Phantom walkabouts : a customisable source location privacyaware routing protocol for wireless sensor networks. Concurrency and Computation: Practice and Experience, View
  • Bradbury, Matthew S., Jhumka, Arshad, Leeke, Matthew. 2018. Hybrid online protocols for source location privacy in wireless sensor networks. Journal of Parallel and Distributed Computing, View
  • Gu, Chen, Bradbury, Matthew S., Kirton, Jack, Jhumka, Arshad. 2018. A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks. Future Generation Computer Systems, 87, pp. 514-526, View
  • Kirton, Jack, Bradbury, Matthew S., Jhumka, Arshad. 2018. Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks. Computer Networks, View
  • Saginbekov, Sain, Jhumka, Arshad. 2017. Many-to-many data aggregation scheduling in wireless sensor networks with two sinks. Computer Networks, 123, pp. 184-199, View
  • Lin, Yiyan, Kulkarni, Sandeep, Jhumka, Arshad. 2017. Automation of fault-tolerant graceful degradation. Distributed Computing, View
  • Jhumka, Arshad, Mottola, Luca. 2016. Neighborhood view consistency in wireless sensor networks. ACM Transactions on Sensor Network, 12 (3), View
  • Alhanahnah, Mohannad J., Jhumka, Arshad, Alouneh, Sahel. 2016. A multi-dimension taxonomy of insider threats in cloud computing. The Computer Journal, 59 (11), pp. 1612-1622, View
  • Jhumka, Arshad, Bradbury, Matthew S., Leeke, Matthew. 2015. Fake source-based source location privacy in wireless sensor networks. Concurrency and Computation: Practice and Experience, 27 (12), pp. 2999-3020, View
  • Saginbekov, Sain, Jhumka, Arshad. 2014. Towards efficient stabilizing code dissemination in wireless sensor networks. The Computer Journal, Volume 57 (Number 12), pp. 1790-1816, View
  • Saginbekov, Sain, Jhumka, Arshad. 2014. Efficient code dissemination in wireless sensor networks. Future Generation Computer Systems, Volume 39, pp. 111-119, View
  • Jhumka, Arshad, Bradbury, Matthew S., Saginbekov, Sain. 2014. Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks. Journal of Parallel and Distributed Computing, Volume 74 (Number 1), pp. 1789-1801, View
  • Leeke, Matthew, Jhumka, Arshad, Anand, Sarabjot Singh. 2013. Towards the design of efficient error detection mechanisms for transient data errors. Computer Journal, Volume 56 (Number 6), pp. 674-692, View
  • Franks, Henry P. W., Griffiths, Nathan, Jhumka, Arshad. 2012. Manipulating convention emergence using influencer agents. Autonomous Agents and Multi-Agent Systems, Volume 26 (Number 3), pp. 315-353, View
  • Anand, Sarabjot Singh, Jhumka, Arshad, Wade, Kimberley A.. 2011. Towards the ordering of events from multiple textual evidence sources. International Journal of Digital Crime and Forensics, Vol.3 (No.2), pp. 16-34, View
  • Jhumka, Arshad, Leeke, Matthew, Shrestha, Sambid. 2011. On the use of fake sources for source location privacy : trade-offs between energy and privacy. The Computer Journal, Volume 54 (Number 6), pp. 860-874, View
  • Suri, Neeraj, Jhumka, Arshad, Hiller, Martin, Pataricza, Andras, Islam, Shariful, Sarbu, Constantin. 2010. A software integration approach for designing and assessing dependable embedded systems. Journal of Systems and Software, Vol.83 (No.10), pp. 1780-1800, View
  • Jhumka, Arshad, Freiling, F. C., Fetzer, C., Suri, N.. 2006. An approach to synthesize safe systems. International Journal of Security and Networks, Volume 1 (Number 2), pp. 62-74, View




Page 1 of 1