Matthew Leeke

Affiliations:
  • University of Warwick, Coventry, UK


According to our database1, Matthew Leeke authored at least 32 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Revealing Ongoing Sensor Attacks in Industrial Control System Via Setpoint Modification.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
Developing a GPT-3-Based Automated Victim for Advance Fee Fraud Disruption.
Proceedings of the 27th IEEE Pacific Rim International Symposium on Dependable Computing, 2022

Towards a Dependable Energy Market: Proof of Authority in a Blockchain-based Peer-to-Peer Microgrid.
Proceedings of the 27th IEEE Pacific Rim International Symposium on Dependable Computing, 2022

A Heterogeneous Redundant Architecture for Industrial Control System Security.
Proceedings of the 27th IEEE Pacific Rim International Symposium on Dependable Computing, 2022

2021
Reducing Model Complexity and Cost in the Generation of Efficient Error Detection Mechanisms.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
WolfGraph: The edge-centric graph processing on GPU.
Future Gener. Comput. Syst., 2020

Simultaneous Fault Models for the Generation and Location of Efficient Error Detection Mechanisms.
Comput. J., 2020

CASTLEGUARD: Anonymised Data Streams with Guaranteed Differential Privacy.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2018
Hybrid online protocols for source location privacy in wireless sensor networks.
J. Parallel Distributed Comput., 2018

2017
Simultaneous Fault Models for the Generation of Efficient Error Detection Mechanisms.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

On Basis Variables for Efficient Error Detection.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
Towards fake sources for source location privacy in wireless sensor networks with multiple sources.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

2015
Fake source-based source location privacy in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015

A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Convention Emergence and Influence in Dynamic Topologies.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

2014
Towards unified secure on- and off-line analytics at scale.
Parallel Comput., 2014

Destabilising Conventions: Characterising the Cost.
Proceedings of the Eighth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2014

Understanding the Impact of Data Sparsity and Duration for Location Prediction Applications.
Proceedings of the Internet of Things. IoT Infrastructures, 2014

Extracting Meaningful User Locations from Temporally Annotated Geospatial Data.
Proceedings of the Internet of Things. IoT Infrastructures, 2014

Destabilising Conventions Using Temporary Interventions.
Proceedings of the Coordination, Organizations, Institutions, and Norms in Agent Systems X, 2014

2013
Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors.
Comput. J., 2013

Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Towards the design of efficient error detection mechanisms.
PhD thesis, 2011

On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy.
Comput. J., 2011

The Early Identification of Detector Locations in Dependable Software.
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011

A methodology for the generation of efficient error detection mechanisms.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

A Framework for Data Center Scale Dynamic Resource Allocation Algorithms.
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011

2010
Towards Understanding the Importance of Variables in Dependable Software.
Proceedings of the Eighth European Dependable Computing Conference, 2010

2009
Evaluating the Use of Reference Run Models in Fault Injection Analysis.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Issues on the Design of Efficient Fail-Safe Fault Tolerance.
Proceedings of the ISSRE 2009, 2009


  Loading...