Arshad Jhumka

Orcid: 0000-0003-0540-2845

Affiliations:
  • University of Warwick, Coventry, UK


According to our database1, Arshad Jhumka authored at least 105 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multilingual Sexism Identification via Fusion of Large Language Models.
Proceedings of the Working Notes of the Conference and Labs of the Evaluation Forum (CLEF 2024), 2024

2023
An empirical study of major page faults for failure diagnosis in cluster systems.
J. Supercomput., November, 2023

Towards Understanding Checkpointing in Transiently Powered IoT Networks.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Addressing a Malicious Tampering Attack on the Default Isolation Level in DBMS.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

OCC2T: An Early-Read Dual-Track OCC Algorithm For Mixed Mode Systems.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Poster Abstract: Checkpointing in Transiently Powered IoT Networks.
Proceedings of the 22nd International Conference on Information Processing in Sensor Networks, 2023

To Checkpoint or Not to Checkpoint: That is the Question.
Proceedings of the 2023 International Conference on embedded Wireless Systems and Networks, 2023

Transaction Fee Mechanism for Order-Sensitive Blockchain-Based Applications.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Time Machine: Generative Real-Time Model for Failure (and Lead Time) Prediction in HPC Systems.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things.
ACM Trans. Sens. Networks, 2022

Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss.
IEEE Trans. Inf. Forensics Secur., 2022

Information management for trust computation on resource-constrained IoT devices.
Future Gener. Comput. Syst., 2022

A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems.
IEEE Access, 2022

Clairvoyant: a log-based transformer-decoder for failure prediction in large-scale systems.
Proceedings of the ICS '22: 2022 International Conference on Supercomputing, Virtual Event, June 28, 2022

2021
Reliable Logging in Wireless IoT Networks in the Presence of Byzantine Faults.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Protocol transformation for transiently powered wireless sensor networks.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Secure Allocation for Graph-Based Virtual Machines in Cloud Environments.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Fault-Tolerant Ant Colony Based-Routing in Many-to-Many IoT Sensor Networks.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

Challenges in Identifying Network Attacks Using Netflow Data.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

Failure Diagnosis for Cluster Systems using Partial Correlations.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Trust Trackers for Computation Offloading in Edge-Based IoT Networks.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Sentiment Analysis based Error Detection for Large-Scale Systems.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Toward Secure VMs Allocation: Analysis of VMs Allocation Behaviours in the Cloud Computing Environments.
Proceedings of the Cloud Computing and Services Science - 11th International Conference, 2021

Sit Here: Placing Virtual Machines Securely in Cloud Environments.
Proceedings of the 11th International Conference on Cloud Computing and Services Science, 2021

2020
A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks.
ACM Trans. Internet Things, 2020

2019
Towards comprehensive dependability-driven resource use and message log-analysis for HPC systems diagnosis.
J. Parallel Distributed Comput., 2019

Automation of fault-tolerant graceful degradation.
Distributed Comput., 2019

Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2019

Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Auditability: An Approach to Ease Debugging of Reliable Distributed Systems.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

Using Resource Use Data and System Logs for HPC System Error Propagation and Recovery Diagnosis.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Scheduling Dependent Tasks in Edge Networks.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation.
Proceedings of the 15th European Dependable Computing Conference, 2019

The impact of decreasing transmit power levels on FlockLab to achieve a sparse network.
Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things, 2019

2018
Hybrid online protocols for source location privacy in wireless sensor networks.
J. Parallel Distributed Comput., 2018

A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks.
Future Gener. Comput. Syst., 2018

Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks.
Comput. Networks, 2018

2017
Many-to-many data aggregation scheduling in wireless sensor networks with two sinks.
Comput. Networks, 2017

Towards Automated Enforcement of Cloud SLA.
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Lower Bound on the Number of Nodes with Multiple Slots in Wireless Sensor Networks with Multiple Sinks.
Proceedings of the 6th International Conference on Sensor Networks (SENSORNETS 2017), 2017

Deconstructing source location privacy-aware routing protocols.
Proceedings of the Symposium on Applied Computing, 2017

Phantom walkabouts in wireless sensor networks.
Proceedings of the Symposium on Applied Computing, 2017

Detection of Recovery Patterns in Cluster Systems Using Resource Usage Data.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Understanding source location privacy protocols in sensor networks via perturbation of time series.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Enabling Dependability-Driven Resource Use and Message Log-Analysis for Cluster System Diagnosis.
Proceedings of the 24th IEEE International Conference on High Performance Computing, 2017

2016
Neighborhood View Consistency in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2016

A Multidimension Taxonomy of Insider Threats in Cloud Computing.
Comput. J., 2016

Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

CRUDE: Combining Resource Usage Data and Error Logs for Accurate Error Detection in Large-Scale Distributed Systems.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

Towards Energy-efficient Collision-free Data Aggregation Scheduling in Wireless Sensor Networks with Multiple Sinks.
Proceedings of the SENSORNETS 2016, 2016

Using Message Logs and Resource Use Data for Cluster Failure Diagnosis.
Proceedings of the 23rd IEEE International Conference on High Performance Computing, 2016

2015
Fake source-based source location privacy in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015

Towards Increasing the Error Handling Time Window in Large-Scale Distributed Systems Using Console and Resource Usage Logs.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Towards Detecting Patterns in Failure Logs of Large-Scale Distributed Systems.
Proceedings of the 2015 IEEE International Parallel and Distributed Processing Symposium Workshop, 2015

An Investigation of the Impact of Double Bit-Flip Error Variants on Program Execution.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Insights into the Diagnosis of System Failures from Cluster Message Logs.
Proceedings of the 11th European Dependable Computing Conference, 2015

2014
Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks.
J. Parallel Distributed Comput., 2014

Efficient code dissemination in wireless sensor networks.
Future Gener. Comput. Syst., 2014

Towards Efficient Stabilizing Code Dissemination in Wireless Sensor Networks.
Comput. J., 2014

2013
Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors.
Comput. J., 2013

Manipulating convention emergence using influencer agents.
Auton. Agents Multi Agent Syst., 2013

Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Linking Resource Usage Anomalies with System Failures from Cluster Log Data.
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013

2012
Fast and Efficient Information Dissemination in Event-Based Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Towards the Ordering of Events from Multiple Textual Evidence Sources.
Int. J. Digit. Crime Forensics, 2011

On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy.
Comput. J., 2011

The Early Identification of Detector Locations in Dependable Software.
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011

A methodology for the generation of efficient error detection mechanisms.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

A Framework for Data Center Scale Dynamic Resource Allocation Algorithms.
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011

2010
Dependability in Service-Oriented Computing.
Proceedings of the Agent-Based Service-Oriented Computing, 2010

A software integration approach for designing and assessing dependable embedded systems.
J. Syst. Softw., 2010

Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Towards event ordering in digital forensics.
Proceedings of the Multimedia and Security Workshop, 2010

Towards Understanding the Importance of Variables in Dependable Software.
Proceedings of the Eighth European Dependable Computing Conference, 2010

2009
Stabilizing Interference-Free Slot Assignment for Wireless Mesh Networks.
Proceedings of the Guide to Wireless Mesh Networks, 2009

On Consistent Neighborhood Views in Wireless Sensor Networks.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

Evaluating the Use of Reference Run Models in Fault Injection Analysis.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Issues on the Design of Efficient Fail-Safe Fault Tolerance.
Proceedings of the ISSRE 2009, 2009

2008
A Simple Trust model for On-Demand Routing in Mobile Ad-Hoc Networks.
Proceedings of the Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 2008

2007
Global Predicate Detection in Distributed Systems with Small Faults.
Proceedings of the Stabilization, 2007

On the Design of Mobility-Tolerant TDMA-Based Media Access Control (MAC) Protocol for Mobile Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2007

2006
An approach to synthesise safe systems.
Int. J. Secur. Networks, 2006

2005
Putting Detectors in Their Place.
Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 2005

Designing Efficient Fail-Safe Multitolerant Systems.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2005

A Dependability-Driven System-Level Design Approach for Embedded Systems.
Proceedings of the 2005 Design, 2005

2004
EPIC: Profiling the Propagation and Effect of Data Errors in Software.
IEEE Trans. Computers, 2004

On Enhancing the Robustness of Commercial Operating Systems.
Proceedings of the Service Availability, 2004

An Approach for Designing and Assessing Detectors for Dependable Component-Based Systems.
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004

Automating the Addition of Fail-Safe Fault-Tolerance: Beyond Fusion-Closed Specifications.
Proceedings of the Formal Techniques, 2004

2003
Automated design of efficient fail-safe fault tolerance.
PhD thesis, 2003

A Framework for the Design and Validation of Efficient Fail-Safe Fault-Tolerant Programs.
Proceedings of the Software and Compilers for Embedded Systems, 7th International Workshop, 2003

2002
On systematic design of globally consistent executable assertions in embedded software.
Proceedings of the 2002 Joint Conference on Languages, 2002

PROPANE: an environment for examining the propagation of errors in software.
Proceedings of the International Symposium on Software Testing and Analysis, 2002

An Approach to Specify and Test Component-Based Dependable Software.
Proceedings of the 7th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2002), 2002

Component-Based Synthesis of Dependable Embedded Software.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 2002

On the Placement of Software Mechanisms for Detection of Data Errors.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Assessing Inter-Modular Error Propagation in Distributed Software.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

An Approach for Analysing the Propagation of Data Errors in Software.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001


  Loading...