Dependable Systems
Dependability research within the Systems and Security (SAS) theme focuses on the development of approaches to analyse and augment software systems to increase the confidence that can justifiably be placed in their correct operation. This focus has led to the development and application of approaches across a broad spectrum of problem domains, including methods that use software metric and machine learning models to impart dependability in the context of distributed systems.
Efficient Error Detection and Correction
- Leeke, M. (2019) Simultaneous Fault Models for the Generation and Location of Efficient Error Detection Mechanisms, The Computer Journal, 63 (5), pp.758–773.
- Leeke, M. (2017) Simultaneous Fault Models for the Generation of Efficient Error Detection Mechanisms. In: 28th International Symposium on Software Reliability Engineering (ISSRE’17), 23rd–26th October, 2017, Toulouse, France.
- Fairbrother, J. and Leeke, M. (2017) On Basis Sets Variables for Efficient Error Detection. In: 15th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC'17), 6-11th November, 2017, Florida, USA.
- Leeke, M. and Jhumka, A. and Anand, S.S. (2013) Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors. The Computer Journal, 56 (6), pp.674–692.
- Leeke, M. and Arif, S. and Jhumka, A. and Anand, S.S. (2011) A Methodology for the Generation of Efficient Error Detection Mechanisms. In: 41st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'11), 27th-30th June 2011, Hong Kong, China.
- Jhumka, A. and Leeke, M. (2009) Issues on the Design of Efficient Fail-safe Fault Tolerance, In: 20th IEEE International Symposium on Software Reliability Engineering (ISSRE'09), November 18th, 2009, Bengaluru-Mysuru, India.
Source Location Privacy
- Bradbury, M. and Jhumka, A. and Leeke, M. (2018) Hybrid Online Protocols for Source Location Privacy in Wireless Sensor Networks. Journal of Parallel and Distributed Computing, 115 (5), pp.67-81.
- Laikin, J. and Bradbury, M. and Gu, C. and Leeke, M. (2016) Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources. In: 15th IEEE International Conference on Communication Systems (ICCS'16), 14-16th December, Shenzhen, China.
- Gu, C. and Bradbury, M. and Jhumka, A. and Leeke, M. (2015) Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks. In: 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'15), 18-20th November 2015, Zhangjiajie, China.
- Bradbury, M. and Jhumka, A. and Leeke, M. (2015) A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks. In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM'15), 22-24th August 2015, Helsinki, Finland.
- Jhumka, A. and Bradbury, M. and Leeke, M. (2015) Fake Source-based Source Location Privacy in Wireless Sensor Networks, Concurrency and Computation: Practice and Experience, 27 (12), pp.2999-3020.
- Thomason, A. and Leeke, M. and Jhumka, A. and Bradbury, M. (2013) Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy, In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM’13), July 16-18th, 2013, Melbourne, Australia.
- Jhumka, A. and Bradbury, M. and Leeke, M. (2012) Towards Understanding Source Location Privacy in Wireless Sensor Networks Through Fake Sources. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM'12), 25-27th June 2012, Liverpool, UK.
- Jhumka, A. and Leeke, M. and Shrestha, S. (2011) On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy. The Computer Journal, 54 (6), pp.860-874.
Data Distribution and Streaming Privacy
- Robinson, A. and Brown, F. and Hall, N. and Jackson, A. and Kemp, G. and Leeke, M. (2020) CASTLEGUARD: Anonymised Data Streams with Guaranteed Differential Privacy. In: 18th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC'20), 6-11th August, 2020, Calgary, Canada.
- Thomason, A. and Griffiths, N. and Leeke, M. (2014) Extracting Meaningful User Locations from Temporally Annotated Geospatial Data, In: International Conference on Mobility and Smart Cities (Mobility-IoT'14), 27-28th October 2014, Rome, Italy.
- Thomason, A. and Leeke, M. and Griffiths, N. (2014) Understanding the Impact of Data Sparsity and Duration for Location Prediction Applications, In: International Conference on Mobility and Smart Cities (Mobility-IoT'14), 27-28th October 2014, Rome, Italy.
- Coetzee, P. and Leeke, M. and Jarvis, S. (2014) Towards Unified Secure On- and Off-Line Analytics at Scale, Parallel Computing, 40 (10), pp.738-753.
Software Testing and Analysis
- Jhumka, A. and Leeke, M. (2011) The Early Identification of Detector Locations in Dependable Software. In: 22nd International Symposium on Software Reliability Engineering (ISSRE'11), November 29th-December 2nd 2011, Hiroshima, Japan.
- Leeke, M. and Jhumka, A. (2010) Towards Understanding the Importance of Variables in Dependable Software, In: 8th European Dependable Computing Conference (EDCC'10), April 28th, 2010, Valencia, Spain.
- Leeke, M. and Jhumka, A. (2009) Evaluating the Use of Reference Run Models in Fault Injection Analysis, In: 15th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'09), November 16th, 2009, Shanghai, China.
People
Our dependability research relies on the contributions of many individuals, both internal and external to the University of Warwick.
Current Team
- Dr. Matt Leeke (Head of Group)
- Ms. Aseel Alturki - PhD Candidate
- Mr. Zhihao Dai - PhD Candidate
Associates
- Dr. Arshad Jhumka - Warwick
- Dr. Sarbjot Singh Anand - Tatras
- Mr. Michael Gale - Warwick
- Mr. Jake Fairbrother - Apple
- Ms. Joanna Laikin - Amazon