
Neeraj Suri
Person information
- affiliation: Lancaster University, Bailrigg, UK
- affiliation: Darmstadt University of Technology, Germany
- affiliation (PhD 1991): University of Massachusetts, Amherst, MA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j42]Patrick Metzler, Neeraj Suri, Georg Weissenbacher:
Extracting safe thread schedules from incomplete model checking results. Int. J. Softw. Tools Technol. Transf. 22(5): 565-581 (2020) - [j41]Roberto Natella
, Stefan Winter
, Domenico Cotroneo
, Neeraj Suri
:
Analyzing the Effects of Bugs on Software Interfaces. IEEE Trans. Software Eng. 46(3): 280-301 (2020) - [c180]Habib Saissi, Stefan Winter, Oliver Schwahn, Karthik Pattabiraman, Neeraj Suri:
TraceSanitizer - Eliminating the Effects of Non-Determinism on Error Propagation Analysis. DSN 2020: 52-63 - [c179]Ahmed Taha, Ahmed Zakaria, Dongseong Kim, Neeraj Suri:
Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure. IC2E 2020: 134-143 - [i5]Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri:
A Security Architecture for Railway Signalling. CoRR abs/2009.04207 (2020)
2010 – 2019
- 2019
- [j40]Kubilay Demir
, Ferdaus Nayyer, Neeraj Suri
:
MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems. Int. J. Crit. Infrastructure Prot. 25: 84-101 (2019) - [j39]Markus Heinrich
, Tsvetoslava Vateva-Gurova, Tolga Arul
, Stefan Katzenbeisser, Neeraj Suri
, Henk Birkholz, Andreas Fuchs, Christoph Krauß, Maria Zhdanova, Don Kuzhiyelil, Sergey Tverdyshev, Christian Schlehuber:
Security Requirements Engineering in Safety-Critical Railway Signalling Networks. Secur. Commun. Networks 2019: 8348925:1-8348925:14 (2019) - [j38]Feng Tan, Liansheng Liu, Stefan Winter, Qixin Wang
, Neeraj Suri
, Lei Bu, Yu Peng, Xue Liu, Xiyuan Peng:
Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS. ACM Trans. Cyber Phys. Syst. 3(1): 2:1-2:25 (2019) - [j37]Dan Dobre, Ghassan O. Karame
, Wenting Li
, Matthias Majuntke, Neeraj Suri
, Marko Vukolic:
Proofs of Writing for Robust Storage. IEEE Trans. Parallel Distributed Syst. 30(11): 2547-2566 (2019) - [c178]Nicolas Coppik, Oliver Schwahn, Neeraj Suri
:
MemFuzz: Using Memory Accesses to Guide Fuzzing. ICST 2019: 48-58 - [c177]Yiqun Chen, Stefan Winter, Neeraj Suri:
Inferring Performance Bug Patterns from Developer Commits. ISSRE 2019: 70-81 - [c176]Shujie Zhao, Yiqun Chen, Stefan Winter, Neeraj Suri:
Analyzing and Improving Customer-Side Cloud Security Certifiability. ISSRE Workshops 2019: 300-307 - [c175]Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri
:
Assessing the state and improving the art of parallel testing for C. ISSTA 2019: 123-133 - [c174]Patrick Metzler, Neeraj Suri
, Georg Weissenbacher:
Extracting Safe Thread Schedules from Incomplete Model Checking Results. SPIN 2019: 153-171 - [c173]Habib Saissi, Marco Serafini, Neeraj Suri:
Gyro: A Modular Scale-Out Layer for Single-Server DBMSs. SRDS 2019: 71-82 - 2018
- [j36]Kubilay Demir
, Hatem Ismail, Tsvetoslava Vateva-Gurova, Neeraj Suri
:
Securing the cloud-assisted smart grid. Int. J. Crit. Infrastructure Prot. 23: 100-111 (2018) - [j35]Oliver Schwahn
, Stefan Winter
, Nicolas Coppik
, Neeraj Suri
:
How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code. IEEE Trans. Dependable Secur. Comput. 15(6): 945-958 (2018) - [c172]Heng Zhang, Jesus Luna, Neeraj Suri
, Rubén Trapero:
Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services. ARES 2018: 5:1-5:10 - [c171]Henk Birkholz, Christoph Krauß, Maria Zhdanova, Don Kuzhiyelil, Tolga Arul
, Markus Heinrich
, Stefan Katzenbeisser, Neeraj Suri
, Tsvetoslava Vateva-Gurova, Christian Schlehuber:
A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems. MILS@DSN 2018 - [c170]Heng Zhang, Salman Manzoor, Neeraj Suri
:
Monitoring Path Discovery for Supporting Indirect Monitoring of Cloud Services. IC2E 2018: 274-277 - [c169]Salman Manzoor, Heng Zhang, Neeraj Suri
:
Threat Modeling and Analysis for the Cloud Ecosystem. IC2E 2018: 278-281 - [c168]Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Neeraj Suri
, Pang-Chieh Wang:
Exploring the Relationship Between Dimensionality Reduction and Private Data Release. PRDC 2018: 25-33 - [c167]Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, Neeraj Suri
:
InfoLeak: Scheduling-Based Information Leakage. PRDC 2018: 44-53 - [c166]Tsvetoslava Vateva-Gurova, Neeraj Suri
:
On the Detection of Side-Channel Attacks. PRDC 2018: 185-186 - [c165]Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri
:
FastFI: Accelerating Software Fault Injections. PRDC 2018: 193-202 - [c164]Tsvetoslava Vateva-Gurova, Salman Manzoor, Rubén Trapero, Neeraj Suri
:
Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level. IOSec@RAID 2018: 27-38 - [c163]Salman Manzoor, Tsvetoslava Vateva-Gurova, Rubén Trapero, Neeraj Suri
:
Threat Modeling the Cloud: An Ontology Based Approach. IOSec@RAID 2018: 61-72 - [c162]Heng Zhang, Jesus Luna, Rubén Trapero, Neeraj Suri
:
Whetstone: Reliable Monitoring of Cloud Services. SMARTCOMP 2018: 115-122 - [c161]Hatem Ismail, Stefanie Roos, Neeraj Suri
:
A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems. TrustCom/BigDataSE 2018: 456-464 - [c160]Hatem Ismail, Stefanie Roos, Neeraj Suri
:
A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems. WOWMOM 2018: 1-9 - [i4]Habib Saissi, Marco Serafini, Neeraj Suri
:
Scaling Out Acid Applications with Operation Partitioning. CoRR abs/1804.01942 (2018) - [i3]Ahmed Taha, Spyros Boukoros, Jesus Luna, Stefan Katzenbeisser, Neeraj Suri
:
QRES: Quantitative Reasoning on Encrypted Security SLAs. CoRR abs/1804.04426 (2018) - [i2]Patrick Metzler, Habib Saissi, Péter Bokor, Neeraj Suri
:
Safe Execution of Concurrent Programs by Enforcement of Scheduling Constraints. CoRR abs/1809.01955 (2018) - 2017
- [j34]Hatem Ismail, Daniel Germanus, Neeraj Suri
:
P2P routing table poisoning: A quorum-based sanitizing approach. Comput. Secur. 65: 283-299 (2017) - [j33]Rubén Trapero, Jolanda Modic
, Miha Stopar, Ahmed Taha, Neeraj Suri
:
A novel approach to manage cloud security SLA incidents. Future Gener. Comput. Syst. 72: 193-205 (2017) - [j32]Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri
:
Safety Verification Utilizing Model-based Development for Safety Critical Cyber-Physical Systems. J. Inf. Process. 25: 797-810 (2017) - [j31]Kubilay Demir
, Daniel Germanus, Neeraj Suri
:
Robust QoS-aware communication in the smart distribution grid. Peer Peer Netw. Appl. 10(1): 193-207 (2017) - [j30]Jesus Luna, Ahmed Taha, Rubén Trapero, Neeraj Suri
:
Quantitative Reasoning about Cloud Security Using Service Level Agreements. IEEE Trans. Cloud Comput. 5(3): 457-471 (2017) - [c159]Soha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri
:
C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties. ARES 2017: 36:1-36:6 - [c158]Kubilay Demir
, Neeraj Suri
:
Towards DDoS Attack Resilient Wide Area Monitoring Systems. ARES 2017: 99:1-99:7 - [c157]Heng Zhang, Rubén Trapero, Jesus Luna, Neeraj Suri
:
deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services. SCC 2017: 27-34 - [c156]Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri
:
A Framework for Ranking Cloud Security Services. SCC 2017: 322-329 - [c155]Salman Manzoor, Jesus Luna, Neeraj Suri
:
AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces. SCC 2017: 499-502 - [c154]Ahmed Taha, Salman Manzoor, Neeraj Suri
:
SLA-Based Service Selection for Multi-Cloud Environments. EDGE 2017: 65-72 - [c153]Christian Schlehuber, Markus Heinrich
, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri
:
Challenges and Approaches in Securing Safety-Relevant Railway Signalling. EuroS&P Workshops 2017: 139-145 - [c152]Abraham Chan, Stefan Winter, Habib Saissi, Karthik Pattabiraman, Neeraj Suri
:
IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants. ICST 2017: 184-195 - [c151]Nicolas Coppik, Oliver Schwahn
, Stefan Winter, Neeraj Suri
:
TrEKer: tracing error propagation in operating system kernels. ASE 2017: 377-387 - [c150]Patrick Metzler, Habib Saissi, Péter Bokor, Neeraj Suri
:
Quick verification of concurrent programs by iteratively relaxed scheduling. ASE 2017: 776-781 - [c149]Kubilay Demir
, Neeraj Suri
:
SeReCP: A Secure and Reliable Communication Platform for the Smart Grid. PRDC 2017: 175-184 - [c148]Christian Schlehuber, Markus Heinrich
, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri
:
A Security Architecture for Railway Signalling. SAFECOMP 2017: 320-328 - 2016
- [j29]Jolanda Modic
, Rubén Trapero, Ahmed Taha, Jesus Luna, Miha Stopar, Neeraj Suri
:
Novel efficient techniques for real-time cloud security assessment. Comput. Secur. 62: 1-18 (2016) - [j28]Divya Saxena, Vaskar Raychoudhury, Neeraj Suri
, Christian Becker
, Jiannong Cao
:
Named Data Networking: A survey. Comput. Sci. Rev. 19: 15-55 (2016) - [j27]Marco Platania, Daniel Obenshain, Thomas Tantillo, Yair Amir, Neeraj Suri
:
On Choosing Server- or Client-Side Solutions for BFT. ACM Comput. Surv. 48(4): 61:1-61:30 (2016) - [j26]Rubén Trapero, Jesus Luna, Neeraj Suri
:
Quantifiably Trusting the Cloud: Putting Metrics to Work. IEEE Secur. Priv. 14(3): 73-77 (2016) - [j25]Lei Yang, Jiannong Cao
, Shaojie Tang, Di Han
, Neeraj Suri
:
Run Time Application Repartitioning in Dynamic Mobile Cloud Environments. IEEE Trans. Cloud Comput. 4(3): 336-348 (2016) - [c147]Patrick Metzler, Habib Saissi, Péter Bokor, Robin Hesse, Neeraj Suri
:
Efficient Verification of Program Fragments: Eager POR. ATVA 2016: 375-391 - [c146]Ahmed Taha, Patrick Metzler, Rubén Trapero, Jesus Luna, Neeraj Suri
:
Identifying and Utilizing Dependencies Across Cloud Security Services. AsiaCCS 2016: 329-340 - [c145]Hatem Ismail, Daniel Germanus, Neeraj Suri
:
Malicious peers eviction for P2P overlays. CNS 2016: 216-224 - [c144]Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri
:
Practical Formal Verification for Model Based Development of Cyber-Physical Systems. CSE/EUC/DCABES 2016: 1-8 - [c143]Divya Saxena, Vaskar Raychoudhury, Christian Becker
, Neeraj Suri
:
Reliable Memory Efficient Name Forwarding in Named Data Networking. CSE/EUC/DCABES 2016: 48-55 - [c142]Stefan Winter, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo:
No PAIN, no gain? the utility of parallel fault injections. Software Engineering 2016: 45-46 - [c141]Salman Manzoor, Ahmed Taha, Neeraj Suri
:
Trust Validation of Cloud IaaS: A Customer-centric Approach. Trustcom/BigDataSE/ISPA 2016: 97-104 - [c140]Heng Zhang, Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri
:
SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats. Trustcom/BigDataSE/ISPA 2016: 465-472 - [e6]Joaquín García-Alfaro
, Guillermo Navarro-Arribas
, Alessandro Aldini
, Fabio Martinelli, Neeraj Suri
:
Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9481, Springer 2016, ISBN 978-3-319-29882-5 [contents] - [e5]Giovanni Livraga, Vicenç Torra, Alessandro Aldini, Fabio Martinelli, Neeraj Suri
:
Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Lecture Notes in Computer Science 9963, Springer 2016, ISBN 978-3-319-47071-9 [contents] - 2015
- [j24]Jesus Luna, Neeraj Suri
, Michaela Iorga, Anil Karmel:
Leveraging the Potential of Cloud Security Service-Level Agreements through Standards. IEEE Cloud Comput. 2(3): 32-40 (2015) - [j23]Azad Ali, Abdelmajid Khelil, Neeraj Suri
, Mohammadreza Mahmudimanesh:
Adaptive Hybrid Compression for Wireless Sensor Networks. ACM Trans. Sens. Networks 11(4): 53:1-53:36 (2015) - [j22]Feng Tan, Yufei Wang, Qixin Wang
, Lei Bu, Neeraj Suri
:
A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking. IEEE Trans. Parallel Distributed Syst. 26(10): 2630-2642 (2015) - [c139]Tsvetoslava Vateva-Gurova, Neeraj Suri
, Avi Mendelson:
The Impact of Hypervisor Scheduling on Compromising Virtualized Environments. CIT/IUCC/DASC/PICom 2015: 1910-1917 - [c138]Habib Saissi, Péter Bokor, Neeraj Suri
:
PBMC: Symbolic Slicing for the Verification of Concurrent Programs. ATVA 2015: 344-360 - [c137]Thorsten Piper, Stefan Winter, Neeraj Suri
, Thomas E. Fuhrman:
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms. EDCC 2015: 85-96 - [c136]Hatem Ismail, Daniel Germanus, Neeraj Suri
:
Detecting and Mitigating P2P Eclipse Attacks. ICPADS 2015: 224-231 - [c135]Stefan Winter, Thorsten Piper, Oliver Schwahn
, Roberto Natella
, Neeraj Suri
, Domenico Cotroneo:
GRINDER: On Reusability of Fault Injection Tools. AST@ICSE 2015: 75-79 - [c134]Stefan Winter, Oliver Schwahn
, Roberto Natella
, Neeraj Suri
, Domenico Cotroneo:
No PAIN, No Gain? The Utility of PArallel Fault INjections. ICSE (1) 2015: 494-505 - [c133]Thorsten Piper, Stefan Winter, Oliver Schwahn
, Suman Bidarahalli, Neeraj Suri
:
Mitigating Timing Error Propagation in Mixed-Criticality Automotive Systems. ISORC 2015: 102-109 - [c132]Anna Lanzaro, Roberto Natella, Stefan Winter, Domenico Cotroneo, Neeraj Suri:
Error models for the representative injection of software defects. Software Engineering & Management 2015: 118-119 - [c131]Daniel Germanus, Hatem Ismail, Neeraj Suri
:
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation. SRDS 2015: 74-83 - [c130]Azad Ali, Abdelmajid Khelil, Neeraj Suri
:
FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes. SRDS 2015: 140-145 - [c129]Giancarlo Pellegrino, Davide Balzarotti, Stefan Winter, Neeraj Suri:
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services. USENIX Security Symposium 2015: 801-816 - [p5]Gert Læssøe Mikkelsen, Kasper Damgård, Hans Guldager, Jonas Lindstrøm Jensen, Jesus Luna Garcia, Janus Dam Nielsen, Pascal Paillier, Giancarlo Pellegrino, Michael Bladt Stausholm, Neeraj Suri
, Heng Zhang:
Technical Implementation and Feasibility. Attribute-based Credentials for Trust 2015: 255-317 - [e4]Joaquín García-Alfaro
, Jordi Herrera-Joancomartí
, Emil Lupu, Joachim Posegga, Alessandro Aldini
, Fabio Martinelli, Neeraj Suri
:
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8872, Springer 2015, ISBN 978-3-319-17015-2 [contents] - 2014
- [j21]Hamza Ghani, Abdelmajid Khelil, Neeraj Suri
, György Csertán, László Gönczy, Gábor Urbanics, James Clarke:
Assessing the security of internet-connected critical infrastructures. Secur. Commun. Networks 7(12): 2713-2725 (2014) - [c128]Shin-Ying Huang, Yennun Huang, Neeraj Suri
:
Event Pattern Discovery on IDS Traces of Cloud Services. BDCloud 2014: 25-32 - [c127]Daniel Germanus, Stefanie Roos, Thorsten Strufe, Neeraj Suri
:
Mitigating Eclipse attacks in Peer-To-Peer networks. CNS 2014: 400-408 - [c126]Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri
:
Practical Use of Formal Verification for Safety Critical Cyber-Physical Systems: A Case Study. CPSNA 2014: 7-12 - [c125]Mohammadreza Mahmudimanesh, Neeraj Suri
:
Robust Compressive Data Gathering in Wireless Sensor Networks with Linear Topology. DCOSS 2014: 179-186 - [c124]Mohammadreza Mahmudimanesh, Amir Naseri, Neeraj Suri
:
Efficient Agile Sink Selection in Wireless Sensor Networks Based on Compressed Sensing. DCOSS 2014: 193-200 - [c123]Hamza Ghani, Jesus Luna Garcia, Ivaylo Petkov, Neeraj Suri
:
User-Centric Security Assessment of Software Configurations: A Case Study. ESSoS 2014: 196-212 - [c122]Feng Tan, Liansheng Liu, Stefan Winter, Qixin Wang
, Neeraj Suri
, Lei Bu, Yu Peng, Xue Liu, Xiyuan Peng:
WiP abstract: A framework on profiling cross-domain noise propagation in control CPS. ICCPS 2014: 224 - [c121]Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri
:
On the Feasibility of Side-Channel Attacks in a Virtualized Environment. ICETE (Selected Papers) 2014: 319-339 - [c120]Anna Lanzaro, Roberto Natella, Stefan Winter, Domenico Cotroneo, Neeraj Suri
:
An empirical study of injected versus actual interface errors. ISSTA 2014: 397-408 - [c119]Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri
:
Towards a Framework for Benchmarking Privacy-ABC Technologies. SEC 2014: 197-204 - [c118]Mohammadreza Mahmudimanesh, Neeraj Suri
:
Agile sink selection in wireless sensor networks. SECON 2014: 390-398 - [c117]Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri
:
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments. SECRYPT 2014: 113-124 - [c116]Kubilay Demir
, Daniel Germanus, Neeraj Suri
:
Robust and real-time communication on heterogeneous networks for smart distribution grid. SmartGridComm 2014: 386-391 - [c115]Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri
:
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security. TrustCom 2014: 284-291 - 2013
- [j20]Brahim Ayari, Abdelmajid Khelil, Neeraj Suri
:
GMTC: A Generalized Commit Approach for Hybrid Mobile Environments. IEEE Trans. Mob. Comput. 12(12): 2399-2411 (2013) - [c114]Dan Dobre, Ghassan Karame, Wenting Li, Matthias Majuntke, Neeraj Suri
, Marko Vukolic:
PoWerStore: proofs of writing for efficient and robust storage. CCS 2013: 285-298 - [c113]Jesus Luna, Tsvetoslava Vateva-Gurova, Neeraj Suri
, Massimiliano Rak
, Alessandra De Benedictis
:
SecLA-Based Negotiation and Brokering of Cloud Resources. CLOSER (Selected Papers) 2013: 1-18 - [c112]Jesus Luna Garcia, Tsvetoslava Vateva-Gurova, Neeraj Suri, Massimiliano Rak, Loredana Liccardo:
Negotiating and Brokering Cloud Resources based on Security Level Agreements. CLOSER 2013: 533-541 - [c111]Massimiliano Rak
, Neeraj Suri
, Jesus Luna, Dana Petcu
, Valentina Casola
, Umberto Villano:
Security as a Service Using an SLA-Based Approach via SPECS. CloudCom (2) 2013: 1-6 - [c110]Hamza Ghani, Jesus Luna, Abdelmajid Khelil, Najib Alkadri, Neeraj Suri
:
Predictive vulnerability scoring in the context of insufficient information availability. CRiSIS 2013: 1-8 - [c109]Hamza Ghani, Jesus Luna, Neeraj Suri
:
Quantitative assessment of software vulnerabilities based on economic-driven security metrics. CRiSIS 2013: 1-8 - [c108]Feng Tan, Yufei Wang, Qixin Wang
, Lei Bu, Rong Zheng, Neeraj Suri
:
Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach. DSN 2013: 1-12 - [c107]Stefan Winter, Michael Tretter, Benjamin Sattler, Neeraj Suri
:
simFI: From single to simultaneous software fault injections. DSN 2013: 1-12 - [c106]Vinay Sachidananda, Abdelmajid Khelil, Dhananjay Umap, Matthias Majuntke, Neeraj Suri
:
Trading transport timeliness and reliability for efficiency in wireless sensor networks. ICNSC 2013: 720-727 - [c105]Vinay Sachidananda, Abdelmajid Khelil, David Noack, Neeraj Suri
:
Information quality aware co-design of sampling and transport in wireless sensor networks. WMNC 2013: 1-8 - [c104]Daniel Germanus, Abdelmajid Khelil, Johannes Schwandke, Neeraj Suri
:
Coral: Reliable and low-latency P2P convergecast for critical sensor data collection. SmartGridComm 2013: 300-305 - [c103]Habib Saissi, Péter Bokor, Can Arda Muftuoglu, Neeraj Suri
, Marco Serafini:
Efficient Verification of Distributed Protocols Using Stateful Model Checking. SRDS 2013: 133-142 - [c102]Vinay Sachidananda, Abdelmajid Khelil, David Noack, Neeraj Suri
:
Sampling and transport co-design in Wireless Sensor Networks. WONS 2013: 98-100 - 2012
- [j19]Azad Ali, Abdelmajid Khelil, Faisal Karim Shaikh, Neeraj Suri
:
Efficient predictive monitoring of wireless sensor networks. Int. J. Auton. Adapt. Commun. Syst. 5(3): 233-254 (2012) - [c101]Jesus Luna Garcia, Robert Langenberg, Neeraj Suri
:
Benchmarking cloud security level agreements using quantitative policy trees. CCSW 2012: 103-112 - [c100]Jesus Luna Garcia, Neeraj Suri
, Ioannis Krontiris:
Privacy-by-design based on quantitative threat modeling. CRiSIS 2012: 1-8 - [c99]Thorsten Piper, Stefan Winter, Paul Manns, Neeraj Suri
:
Instrumenting AUTOSAR for dependability assessment: A guidance framework. DSN 2012: 1-12 - [c98]Mohammadreza Mahmudimanesh, Abdelmajid Khelil, Neeraj Suri
:
Balanced spatio-temporal compressive sensing for multi-hop wireless sensor networks. MASS 2012: 389-397 - [c97]Jesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri:
Quantitative Assessment of Cloud Security Level Agreements - A Case Study. SECRYPT 2012: 64-73 - [c96]James Clarke, Rodrigo Roman Castro, Abhishek Sharma, Javier López
, Neeraj Suri
:
Trust & security RTD in the internet of things: opportunities for international cooperation. SECURIT 2012: 172-178 - [c95]Daniel Germanus, Robert Langenberg, Abdelmajid Khelil, Neeraj Suri
:
Susceptibility Analysis of Structured P2P Systems to Localized Eclipse Attacks. SRDS 2012: 11-20 - [c94]Can Arda Muftuoglu, Péter Bokor, Neeraj Suri
:
Brief Announcement: MP-State: State-Aware Software Model Checking of Message-Passing Systems. SSS 2012: 183-186 - [c93]