default search action
Neeraj Suri
Person information
- affiliation: Lancaster University, Bailrigg, UK
- affiliation: Darmstadt University of Technology, Germany
- affiliation (PhD 1991): University of Massachusetts, Amherst, MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j48]Edward Chuah, Neeraj Suri:
An empirical study of reflection attacks using NetFlow data. Cybersecur. 7(1): 13 (2024) - [j47]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments. IEEE Trans. Cloud Comput. 12(1): 319-336 (2024) - 2023
- [j46]Yang Lu, Zhengxin Yu, Neeraj Suri:
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph. ACM Trans. Priv. Secur. 26(3): 33:1-33:39 (2023) - 2022
- [j45]Edward Chuah, Arshad Jhumka, Miroslaw Malek, Neeraj Suri:
A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems. IEEE Access 10: 133487-133503 (2022) - 2021
- [j44]Benjamin Green, Richard Derbyshire, Marina Krotofil, William Knowles, Daniel Prince, Neeraj Suri:
PCaaD: Towards automated determination and exploitation of industrial systems. Comput. Secur. 110: 102424 (2021) - 2020
- [j43]Patrick Metzler, Neeraj Suri, Georg Weissenbacher:
Extracting safe thread schedules from incomplete model checking results. Int. J. Softw. Tools Technol. Transf. 22(5): 565-581 (2020) - [j42]Roberto Natella, Stefan Winter, Domenico Cotroneo, Neeraj Suri:
Analyzing the Effects of Bugs on Software Interfaces. IEEE Trans. Software Eng. 46(3): 280-301 (2020) - 2019
- [j41]Kubilay Demir, Ferdaus Nayyer, Neeraj Suri:
MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems. Int. J. Crit. Infrastructure Prot. 25: 84-101 (2019) - [j40]Markus Heinrich, Tsvetoslava Vateva-Gurova, Tolga Arul, Stefan Katzenbeisser, Neeraj Suri, Henk Birkholz, Andreas Fuchs, Christoph Krauß, Maria Zhdanova, Don Kuzhiyelil, Sergey Tverdyshev, Christian Schlehuber:
Security Requirements Engineering in Safety-Critical Railway Signalling Networks. Secur. Commun. Networks 2019: 8348925:1-8348925:14 (2019) - [j39]Feng Tan, Liansheng Liu, Stefan Winter, Qixin Wang, Neeraj Suri, Lei Bu, Yu Peng, Xue Liu, Xiyuan Peng:
Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS. ACM Trans. Cyber Phys. Syst. 3(1): 2:1-2:25 (2019) - [j38]Dan Dobre, Ghassan O. Karame, Wenting Li, Matthias Majuntke, Neeraj Suri, Marko Vukolic:
Proofs of Writing for Robust Storage. IEEE Trans. Parallel Distributed Syst. 30(11): 2547-2566 (2019) - 2018
- [j37]Kubilay Demir, Hatem Ismail, Tsvetoslava Vateva-Gurova, Neeraj Suri:
Securing the cloud-assisted smart grid. Int. J. Crit. Infrastructure Prot. 23: 100-111 (2018) - [j36]Oliver Schwahn, Stefan Winter, Nicolas Coppik, Neeraj Suri:
How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code. IEEE Trans. Dependable Secur. Comput. 15(6): 945-958 (2018) - 2017
- [j35]Hatem Ismail, Daniel Germanus, Neeraj Suri:
P2P routing table poisoning: A quorum-based sanitizing approach. Comput. Secur. 65: 283-299 (2017) - [j34]Rubén Trapero, Jolanda Modic, Miha Stopar, Ahmed Taha, Neeraj Suri:
A novel approach to manage cloud security SLA incidents. Future Gener. Comput. Syst. 72: 193-205 (2017) - [j33]Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri:
Safety Verification Utilizing Model-based Development for Safety Critical Cyber-Physical Systems. J. Inf. Process. 25: 797-810 (2017) - [j32]Kubilay Demir, Daniel Germanus, Neeraj Suri:
Robust QoS-aware communication in the smart distribution grid. Peer-to-Peer Netw. Appl. 10(1): 193-207 (2017) - [j31]Jesus Luna, Ahmed Taha, Rubén Trapero, Neeraj Suri:
Quantitative Reasoning about Cloud Security Using Service Level Agreements. IEEE Trans. Cloud Comput. 5(3): 457-471 (2017) - 2016
- [j30]Jolanda Modic, Rubén Trapero, Ahmed Taha, Jesus Luna, Miha Stopar, Neeraj Suri:
Novel efficient techniques for real-time cloud security assessment. Comput. Secur. 62: 1-18 (2016) - [j29]Divya Saxena, Vaskar Raychoudhury, Neeraj Suri, Christian Becker, Jiannong Cao:
Named Data Networking: A survey. Comput. Sci. Rev. 19: 15-55 (2016) - [j28]Marco Platania, Daniel Obenshain, Thomas Tantillo, Yair Amir, Neeraj Suri:
On Choosing Server- or Client-Side Solutions for BFT. ACM Comput. Surv. 48(4): 61:1-61:30 (2016) - [j27]Rubén Trapero, Jesus Luna, Neeraj Suri:
Quantifiably Trusting the Cloud: Putting Metrics to Work. IEEE Secur. Priv. 14(3): 73-77 (2016) - [j26]Lei Yang, Jiannong Cao, Shaojie Tang, Di Han, Neeraj Suri:
Run Time Application Repartitioning in Dynamic Mobile Cloud Environments. IEEE Trans. Cloud Comput. 4(3): 336-348 (2016) - 2015
- [j25]Jesus Luna, Neeraj Suri, Michaela Iorga, Anil Karmel:
Leveraging the Potential of Cloud Security Service-Level Agreements through Standards. IEEE Cloud Comput. 2(3): 32-40 (2015) - [j24]Azad Ali, Abdelmajid Khelil, Neeraj Suri, Mohammadreza Mahmudimanesh:
Adaptive Hybrid Compression for Wireless Sensor Networks. ACM Trans. Sens. Networks 11(4): 53:1-53:36 (2015) - [j23]Feng Tan, Yufei Wang, Qixin Wang, Lei Bu, Neeraj Suri:
A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking. IEEE Trans. Parallel Distributed Syst. 26(10): 2630-2642 (2015) - 2014
- [j22]Hamza Ghani, Abdelmajid Khelil, Neeraj Suri, György Csertán, László Gönczy, Gábor Urbanics, James Clarke:
Assessing the security of internet-connected critical infrastructures. Secur. Commun. Networks 7(12): 2713-2725 (2014) - 2013
- [j21]Brahim Ayari, Abdelmajid Khelil, Neeraj Suri:
GMTC: A Generalized Commit Approach for Hybrid Mobile Environments. IEEE Trans. Mob. Comput. 12(12): 2399-2411 (2013) - 2012
- [j20]Azad Ali, Abdelmajid Khelil, Faisal Karim Shaikh, Neeraj Suri:
Efficient predictive monitoring of wireless sensor networks. Int. J. Auton. Adapt. Commun. Syst. 5(3): 233-254 (2012) - 2011
- [j19]Faisal Karim Shaikh, Abdelmajid Khelil, Azad Ali, Neeraj Suri:
Reliable congestion-aware information transport in wireless sensor networks. Int. J. Commun. Networks Distributed Syst. 7(1/2): 135-152 (2011) - [j18]Marco Serafini, Péter Bokor, Neeraj Suri, Jonny Vinter, Astrit Ademaj, Wolfgang Brandstätter, Fulvio Tagliabo, Jens Koch:
Application-Level Diagnostic and Membership Protocols for Generic Time-Triggered Systems. IEEE Trans. Dependable Secur. Comput. 8(2): 177-193 (2011) - [j17]Brahim Ayari, Abdelmajid Khelil, Neeraj Suri:
On the design of perturbation-resilient atomic commit protocols for mobile transactions. ACM Trans. Comput. Syst. 29(3): 7:1-7:36 (2011) - 2010
- [j16]Constantin Sârbu, Andréas Johansson, Neeraj Suri, Nachiappan Nagappan:
Profiling the operational behavior of OS device drivers. Empir. Softw. Eng. 15(4): 380-422 (2010) - [j15]Neeraj Suri, Arshad Jhumka, Martin Hiller, András Pataricza, Shariful Islam, Constantin Sârbu:
A software integration approach for designing and assessing dependable embedded systems. J. Syst. Softw. 83(10): 1780-1800 (2010) - [j14]Neeraj Suri, Purnendu Sinha:
A Pre-Injection Analysis for Identifying Fault-Injection Tests for Protocol Validation. J. Softw. 5(10): 1144-1161 (2010) - [j13]Avi Timor, Avi Mendelson, Yitzhak Birk, Neeraj Suri:
Using Underutilized CPU Resources to Enhance Its Reliability. IEEE Trans. Dependable Secur. Comput. 7(1): 94-109 (2010) - 2009
- [j12]Shariful Islam, Neeraj Suri, András Balogh, György Csertán, András Pataricza:
An optimization based design for integrated dependable real-time embedded systems. Des. Autom. Embed. Syst. 13(4): 245-285 (2009) - [j11]Salvatore D'Antonio, Luigi Romano, Abdelmajid Khelil, Neeraj Suri:
Increasing security and protection of SCADA systems through infrastructure resilience. Int. J. Syst. Syst. Eng. 1(4): 401-413 (2009) - [j10]Brahim Ayari, Abdelmajid Khelil, Neeraj Suri:
Exploring Delay-Aware Transactions in Heterogeneous Mobile Environments. J. Softw. 4(7): 634-643 (2009) - 2007
- [j9]Marco Serafini, Andrea Bondavalli, Neeraj Suri:
Online Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters. IEEE Trans. Dependable Secur. Comput. 4(4): 295-312 (2007) - 2006
- [j8]Arshad Jhumka, Felix C. Freiling, Christof Fetzer, Neeraj Suri:
An approach to synthesise safe systems. Int. J. Secur. Networks 1(1/2): 62-74 (2006) - 2004
- [j7]Martin Hiller, Arshad Jhumka, Neeraj Suri:
EPIC: Profiling the Propagation and Effect of Data Errors in Software. IEEE Trans. Computers 53(5): 512-530 (2004) - [j6]Vilgot Claesson, Henrik Lönn, Neeraj Suri:
An Efficient TDMA Start-Up and Restart Synchronization Approach for Distributed Embedded Systems. IEEE Trans. Parallel Distributed Syst. 15(8): 725-739 (2004) - 2003
- [j5]Chris J. Walter, Neeraj Suri:
The customizable fault/error model for dependable distributed systems. Theor. Comput. Sci. 290(2): 1223-1251 (2003) - 2001
- [j4]Neeraj Suri, Avi Mendelson:
Design of a parallel interconnect based on communication pattern considerations. Parallel Algorithms Appl. 16(4): 243-271 (2001) - 1999
- [j3]Neeraj Suri, Krithi Ramamritham:
Editorial: Special Section on Dependable Real-Time Systems. IEEE Trans. Parallel Distributed Syst. 10(6): 529-532 (1999) - 1997
- [j2]Chris J. Walter, Patrick Lincoln, Neeraj Suri:
Formally Verified On-Line Diagnosis. IEEE Trans. Software Eng. 23(11): 684-721 (1997) - 1994
- [j1]Neeraj Suri, Michelle M. Hugue, Chris J. Walter:
Synchronization issues in real-time systems. Proc. IEEE 82(1): 41-54 (1994)
Conference and Workshop Papers
- 2024
- [c202]Savvas Kastanakis, Vasileios Giotsas, Ioana Livadariu, Neeraj Suri:
Investigating Location-aware Advertisements in Anycast IP Networks. ANRW 2024 - [c201]Yi Li, Plamen Angelov, Zhengxin Yu, Alvaro Lopez Pellicer, Neeraj Suri:
Federated Adversarial Learning for Robust Autonomous Landing Runway Detection. ICANN (6) 2024: 159-173 - [c200]Yi Li, Plamen Angelov, Neeraj Suri:
Rethinking Self-supervised Learning for Cross-domain Adversarial Sample Recovery. IJCNN 2024: 1-7 - [c199]Alvaro Lopez Pellicer, Kittipos Giatgong, Yi Li, Neeraj Suri, Plamen Angelov:
UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification. IJCNN 2024: 1-8 - [c198]Ovini V. W. Gunasekera, Andrew Sogokon, Antonios Gouglidis, Neeraj Suri:
Real Arithmetic in TLAPM. NFM 2024: 136-143 - 2023
- [c197]Lewis Birch, William Hackett, Stefan Trawicki, Neeraj Suri, Peter Garraghan:
Model Leeching: An Extraction Attack Targeting LLMs. CAMLIS 2023: 91-104 - [c196]Ahmed Taha, Alexander Lawall, Neeraj Suri:
Cloud Security Requirement Based Threat Analysis. ICNC 2023: 506-510 - [c195]Yi Li, Plamen Angelov, Neeraj Suri:
Domain Generalization and Feature Fusion for Cross-domain Imperceptible Adversarial Attack Detection. IJCNN 2023: 1-8 - [c194]Savvas Kastanakis, Vasileios Giotsas, Ioana Livadariu, Neeraj Suri:
Replication: 20 Years of Inferring Interdomain Routing Policies. IMC 2023: 16-29 - [c193]Yi Li, Plamen Angelov, Neeraj Suri:
Fuzzy Detectors Against Adversarial Attacks. SSCI 2023: 306-311 - 2022
- [c192]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud. CCS 2022: 3415-3417 - [c191]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
Poster: Multi-Layer Threat Analysis of the Cloud. CCS 2022: 3419-3421 - [c190]Savvas Kastanakis, Vasileios Giotsas, Neeraj Suri:
Understanding the confounding factors of inter-domain routing modeling. IMC 2022: 758-759 - [c189]Yiqun Chen, Matthew Bradbury, Neeraj Suri:
Towards Effective Performance Fuzzing. ISSRE Workshops 2022: 128-129 - [c188]Yiqun Chen, Oliver Schwahn, Roberto Natella, Matthew Bradbury, Neeraj Suri:
SlowCoach: Mutating Code to Simulate Performance Bugs. ISSRE 2022: 274-285 - [c187]Zhengxin Yu, Yang Lu, Plamen Angelov, Neeraj Suri:
PPFM: An Adaptive and Hierarchical Peer-to-Peer Federated Meta-Learning Framework. MSN 2022: 502-509 - [c186]Eduardo A. Soares, Plamen Angelov, Neeraj Suri:
Similarity-based Deep Neural Network to Detect Imperceptible Adversarial Attacks. SSCI 2022: 1028-1035 - 2021
- [c185]Nicolas Coppik, Oliver Schwahn, Neeraj Suri:
Fast Kernel Error Propagation Analysis in Virtualized Environments. ICST 2021: 159-170 - [c184]Edward Chuah, Arshad Jhumka, Samantha Alt, R. Todd Evans, Neeraj Suri:
Failure Diagnosis for Cluster Systems using Partial Correlations. ISPA/BDCloud/SocialCom/SustainCom 2021: 1091-1101 - [c183]Edward Chuah, Neeraj Suri, Arshad Jhumka, Samantha Alt:
Challenges in Identifying Network Attacks Using Netflow Data. NCA 2021: 1-10 - 2020
- [c182]Habib Saissi, Stefan Winter, Oliver Schwahn, Karthik Pattabiraman, Neeraj Suri:
TraceSanitizer - Eliminating the Effects of Non-Determinism on Error Propagation Analysis. DSN 2020: 52-63 - [c181]Ahmed Taha, Ahmed Zakaria, Dong Seong Kim, Neeraj Suri:
Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure. IC2E 2020: 134-143 - 2019
- [c180]Nicolas Coppik, Oliver Schwahn, Neeraj Suri:
MemFuzz: Using Memory Accesses to Guide Fuzzing. ICST 2019: 48-58 - [c179]Yiqun Chen, Stefan Winter, Neeraj Suri:
Inferring Performance Bug Patterns from Developer Commits. ISSRE 2019: 70-81 - [c178]Shujie Zhao, Yiqun Chen, Stefan Winter, Neeraj Suri:
Analyzing and Improving Customer-Side Cloud Security Certifiability. ISSRE Workshops 2019: 300-307 - [c177]Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri:
Assessing the state and improving the art of parallel testing for C. ISSTA 2019: 123-133 - [c176]Patrick Metzler, Neeraj Suri, Georg Weissenbacher:
Extracting Safe Thread Schedules from Incomplete Model Checking Results. SPIN 2019: 153-171 - [c175]Habib Saissi, Marco Serafini, Neeraj Suri:
Gyro: A Modular Scale-Out Layer for Single-Server DBMSs. SRDS 2019: 71-82 - 2018
- [c174]Heng Zhang, Jesus Luna, Neeraj Suri, Rubén Trapero:
Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services. ARES 2018: 5:1-5:10 - [c173]Henk Birkholz, Christoph Krauß, Maria Zhdanova, Don Kuzhiyelil, Tolga Arul, Markus Heinrich, Stefan Katzenbeisser, Neeraj Suri, Tsvetoslava Vateva-Gurova, Christian Schlehuber:
A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems. MILS@DSN 2018 - [c172]Heng Zhang, Salman Manzoor, Neeraj Suri:
Monitoring Path Discovery for Supporting Indirect Monitoring of Cloud Services. IC2E 2018: 274-277 - [c171]Salman Manzoor, Heng Zhang, Neeraj Suri:
Threat Modeling and Analysis for the Cloud Ecosystem. IC2E 2018: 278-281 - [c170]Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Neeraj Suri, Pang-Chieh Wang:
Exploring the Relationship Between Dimensionality Reduction and Private Data Release. PRDC 2018: 25-33 - [c169]Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, Neeraj Suri:
InfoLeak: Scheduling-Based Information Leakage. PRDC 2018: 44-53 - [c168]Tsvetoslava Vateva-Gurova, Neeraj Suri:
On the Detection of Side-Channel Attacks. PRDC 2018: 185-186 - [c167]Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri:
FastFI: Accelerating Software Fault Injections. PRDC 2018: 193-202 - [c166]Tsvetoslava Vateva-Gurova, Salman Manzoor, Rubén Trapero, Neeraj Suri:
Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level. IOSec@RAID 2018: 27-38 - [c165]Salman Manzoor, Tsvetoslava Vateva-Gurova, Rubén Trapero, Neeraj Suri:
Threat Modeling the Cloud: An Ontology Based Approach. IOSec@RAID 2018: 61-72 - [c164]Heng Zhang, Jesus Luna, Rubén Trapero, Neeraj Suri:
Whetstone: Reliable Monitoring of Cloud Services. SMARTCOMP 2018: 115-122 - [c163]Hatem Ismail, Stefanie Roos, Neeraj Suri:
A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems. TrustCom/BigDataSE 2018: 456-464 - [c162]Hatem Ismail, Stefanie Roos, Neeraj Suri:
A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems. WOWMOM 2018: 1-9 - 2017
- [c161]Soha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri:
C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties. ARES 2017: 36:1-36:6 - [c160]Kubilay Demir, Neeraj Suri:
Towards DDoS Attack Resilient Wide Area Monitoring Systems. ARES 2017: 99:1-99:7 - [c159]Heng Zhang, Rubén Trapero, Jesus Luna, Neeraj Suri:
deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services. SCC 2017: 27-34 - [c158]Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri:
A Framework for Ranking Cloud Security Services. SCC 2017: 322-329 - [c157]Salman Manzoor, Jesus Luna, Neeraj Suri:
AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces. SCC 2017: 499-502 - [c156]Ahmed Taha, Salman Manzoor, Neeraj Suri:
SLA-Based Service Selection for Multi-Cloud Environments. EDGE 2017: 65-72 - [c155]Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri:
Challenges and Approaches in Securing Safety-Relevant Railway Signalling. EuroS&P Workshops 2017: 139-145 - [c154]Abraham Chan, Stefan Winter, Habib Saissi, Karthik Pattabiraman, Neeraj Suri:
IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants. ICST 2017: 184-195 - [c153]Nicolas Coppik, Oliver Schwahn, Stefan Winter, Neeraj Suri:
TrEKer: tracing error propagation in operating system kernels. ASE 2017: 377-387 - [c152]Patrick Metzler, Habib Saissi, Péter Bokor, Neeraj Suri:
Quick verification of concurrent programs by iteratively relaxed scheduling. ASE 2017: 776-781 - [c151]Kubilay Demir, Neeraj Suri:
SeReCP: A Secure and Reliable Communication Platform for the Smart Grid. PRDC 2017: 175-184 - [c150]Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri:
A Security Architecture for Railway Signalling. SAFECOMP 2017: 320-328 - 2016
- [c149]Patrick Metzler, Habib Saissi, Péter Bokor, Robin Hesse, Neeraj Suri:
Efficient Verification of Program Fragments: Eager POR. ATVA 2016: 375-391 - [c148]Ahmed Taha, Patrick Metzler, Rubén Trapero, Jesus Luna, Neeraj Suri:
Identifying and Utilizing Dependencies Across Cloud Security Services. AsiaCCS 2016: 329-340 - [c147]Hatem Ismail, Daniel Germanus, Neeraj Suri:
Malicious peers eviction for P2P overlays. CNS 2016: 216-224 - [c146]Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri:
Practical Formal Verification for Model Based Development of Cyber-Physical Systems. CSE/EUC/DCABES 2016: 1-8 - [c145]Divya Saxena, Vaskar Raychoudhury, Christian Becker, Neeraj Suri:
Reliable Memory Efficient Name Forwarding in Named Data Networking. CSE/EUC/DCABES 2016: 48-55 - [c144]Stefan Winter, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo:
No PAIN, no gain? the utility of parallel fault injections. Software Engineering 2016: 45-46 - [c143]Salman Manzoor, Ahmed Taha, Neeraj Suri:
Trust Validation of Cloud IaaS: A Customer-centric Approach. Trustcom/BigDataSE/ISPA 2016: 97-104 - [c142]Heng Zhang, Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri:
SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats. Trustcom/BigDataSE/ISPA 2016: 465-472 - 2015
- [c141]Tsvetoslava Vateva-Gurova, Neeraj Suri, Avi Mendelson:
The Impact of Hypervisor Scheduling on Compromising Virtualized Environments. CIT/IUCC/DASC/PICom 2015: 1910-1917 - [c140]Habib Saissi, Péter Bokor, Neeraj Suri:
PBMC: Symbolic Slicing for the Verification of Concurrent Programs. ATVA 2015: 344-360 - [c139]Thorsten Piper, Stefan Winter, Neeraj Suri, Thomas E. Fuhrman:
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms. EDCC 2015: 85-96 - [c138]Hatem Ismail, Daniel Germanus, Neeraj Suri:
Detecting and Mitigating P2P Eclipse Attacks. ICPADS 2015: 224-231 - [c137]Stefan Winter, Thorsten Piper, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo:
GRINDER: On Reusability of Fault Injection Tools. AST@ICSE 2015: 75-79 - [c136]Stefan Winter, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo:
No PAIN, No Gain? The Utility of PArallel Fault INjections. ICSE (1) 2015: 494-505 - [c135]Thorsten Piper, Stefan Winter, Oliver Schwahn, Suman Bidarahalli, Neeraj Suri:
Mitigating Timing Error Propagation in Mixed-Criticality Automotive Systems. ISORC 2015: 102-109 - [c134]Anna Lanzaro, Roberto Natella, Stefan Winter, Domenico Cotroneo, Neeraj Suri:
Error models for the representative injection of software defects. Software Engineering & Management 2015: 118-119 - [c133]Daniel Germanus, Hatem Ismail, Neeraj Suri:
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation. SRDS 2015: 74-83 - [c132]Azad Ali, Abdelmajid Khelil, Neeraj Suri:
FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes. SRDS 2015: 140-145 - [c131]Giancarlo Pellegrino, Davide Balzarotti, Stefan Winter, Neeraj Suri:
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services. USENIX Security Symposium 2015: 801-816 - 2014
- [c130]Shin-Ying Huang, Yennun Huang, Neeraj Suri:
Event Pattern Discovery on IDS Traces of Cloud Services. BDCloud 2014: 25-32 - [c129]Daniel Germanus, Stefanie Roos, Thorsten Strufe, Neeraj Suri:
Mitigating Eclipse attacks in Peer-To-Peer networks. CNS 2014: 400-408 - [c128]Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri:
Practical Use of Formal Verification for Safety Critical Cyber-Physical Systems: A Case Study. CPSNA 2014: 7-12 - [c127]Mohammadreza Mahmudimanesh, Neeraj Suri:
Robust Compressive Data Gathering in Wireless Sensor Networks with Linear Topology. DCOSS 2014: 179-186 - [c126]Mohammadreza Mahmudimanesh, Amir Naseri, Neeraj Suri:
Efficient Agile Sink Selection in Wireless Sensor Networks Based on Compressed Sensing. DCOSS 2014: 193-200 - [c125]Hamza Ghani, Jesus Luna Garcia, Ivaylo Petkov, Neeraj Suri:
User-Centric Security Assessment of Software Configurations: A Case Study. ESSoS 2014: 196-212 - [c124]Feng Tan, Liansheng Liu, Stefan Winter, Qixin Wang, Neeraj Suri, Lei Bu, Yu Peng, Xue Liu, Xiyuan Peng:
WiP abstract: A framework on profiling cross-domain noise propagation in control CPS. ICCPS 2014: 224 - [c123]Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri:
On the Feasibility of Side-Channel Attacks in a Virtualized Environment. ICETE (Selected Papers) 2014: 319-339 - [c122]Anna Lanzaro, Roberto Natella, Stefan Winter, Domenico Cotroneo, Neeraj Suri:
An empirical study of injected versus actual interface errors. ISSTA 2014: 397-408 - [c121]Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri:
Towards a Framework for Benchmarking Privacy-ABC Technologies. SEC 2014: 197-204 - [c120]Mohammadreza Mahmudimanesh, Neeraj Suri:
Agile sink selection in wireless sensor networks. SECON 2014: 390-398 - [c119]Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri:
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments. SECRYPT 2014: 113-124 - [c118]Kubilay Demir, Daniel Germanus, Neeraj Suri:
Robust and real-time communication on heterogeneous networks for smart distribution grid. SmartGridComm 2014: 386-391 - [c117]Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri:
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security. TrustCom 2014: 284-291 - 2013
- [c116]Dan Dobre, Ghassan Karame, Wenting Li, Matthias Majuntke, Neeraj Suri, Marko Vukolic:
PoWerStore: proofs of writing for efficient and robust storage. CCS 2013: 285-298 - [c115]Jesus Luna, Tsvetoslava Vateva-Gurova, Neeraj Suri, Massimiliano Rak, Alessandra De Benedictis:
SecLA-Based Negotiation and Brokering of Cloud Resources. CLOSER (Selected Papers) 2013: 1-18 - [c114]Jesus Luna Garcia, Tsvetoslava Vateva-Gurova, Neeraj Suri, Massimiliano Rak, Loredana Liccardo:
Negotiating and Brokering Cloud Resources based on Security Level Agreements. CLOSER 2013: 533-541 - [c113]Massimiliano Rak, Neeraj Suri, Jesus Luna, Dana Petcu, Valentina Casola, Umberto Villano:
Security as a Service Using an SLA-Based Approach via SPECS. CloudCom (2) 2013: 1-6 - [c112]Hamza Ghani, Jesus Luna, Abdelmajid Khelil, Najib Alkadri, Neeraj Suri:
Predictive vulnerability scoring in the context of insufficient information availability. CRiSIS 2013: 1-8 - [c111]Hamza Ghani, Jesus Luna, Neeraj Suri:
Quantitative assessment of software vulnerabilities based on economic-driven security metrics. CRiSIS 2013: 1-8 - [c110]Feng Tan, Yufei Wang, Qixin Wang, Lei Bu, Rong Zheng, Neeraj Suri:
Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach. DSN 2013: 1-12 - [c109]Stefan Winter, Michael Tretter, Benjamin Sattler, Neeraj Suri:
simFI: From single to simultaneous software fault injections. DSN 2013: 1-12 - [c108]Vinay Sachidananda, Abdelmajid Khelil, Dhananjay Umap, Matthias Majuntke, Neeraj Suri:
Trading transport timeliness and reliability for efficiency in wireless sensor networks. ICNSC 2013: 720-727 - [c107]Vinay Sachidananda, Abdelmajid Khelil, David Noack, Neeraj Suri:
Information quality aware co-design of sampling and transport in wireless sensor networks. WMNC 2013: 1-8 - [c106]Daniel Germanus, Abdelmajid Khelil, Johannes Schwandke, Neeraj Suri:
Coral: Reliable and low-latency P2P convergecast for critical sensor data collection. SmartGridComm 2013: 300-305 - [c105]Habib Saissi, Péter Bokor, Can Arda Muftuoglu, Neeraj Suri, Marco Serafini:
Efficient Verification of Distributed Protocols Using Stateful Model Checking. SRDS 2013: 133-142 - [c104]Vinay Sachidananda, Abdelmajid Khelil, David Noack, Neeraj Suri:
Sampling and transport co-design in Wireless Sensor Networks. WONS 2013: 98-100 - 2012
- [c103]Jesus Luna Garcia, Robert Langenberg, Neeraj Suri:
Benchmarking cloud security level agreements using quantitative policy trees. CCSW 2012: 103-112 - [c102]Jesus Luna Garcia, Neeraj Suri, Ioannis Krontiris:
Privacy-by-design based on quantitative threat modeling. CRiSIS 2012: 1-8 - [c101]Thorsten Piper, Stefan Winter, Paul Manns, Neeraj Suri:
Instrumenting AUTOSAR for dependability assessment: A guidance framework. DSN 2012: 1-12 - [c100]Mohammadreza Mahmudimanesh, Abdelmajid Khelil, Neeraj Suri:
Balanced spatio-temporal compressive sensing for multi-hop wireless sensor networks. MASS 2012: 389-397 - [c99]Jesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri:
Quantitative Assessment of Cloud Security Level Agreements - A Case Study. SECRYPT 2012: 64-73 - [c98]James Clarke, Rodrigo Roman Castro, Abhishek Sharma, Javier López, Neeraj Suri:
Trust & security RTD in the internet of things: opportunities for international cooperation. SECURIT 2012: 172-178 - [c97]Daniel Germanus, Robert Langenberg, Abdelmajid Khelil, Neeraj Suri:
Susceptibility Analysis of Structured P2P Systems to Localized Eclipse Attacks. SRDS 2012: 11-20 - [c96]Can Arda Muftuoglu, Péter Bokor, Neeraj Suri:
Brief Announcement: MP-State: State-Aware Software Model Checking of Message-Passing Systems. SSS 2012: 183-186 - [c95]Piotr Szczytowski, Abdelmajid Khelil, Neeraj Suri:
DKM: Distributed k-connectivity maintenance in Wireless Sensor Networks. WONS 2012: 83-90 - 2011
- [c94]James Clarke, Neeraj Suri, Michel Riguidel, Aljosa Pasic:
Building a Long Term Strategy for International Collaboration in Trustworthy ICT: Security, Privacy and Trust in Global Networks and Services. SysSec@DIMVA 2011: 90-93 - [c93]Péter Bokor, Johannes Kinder, Marco Serafini, Neeraj Suri:
Efficient model checking of fault-tolerant distributed protocols. DSN 2011: 73-84 - [c92]Stefan Winter, Constantin Sârbu, Neeraj Suri, Brendan Murphy:
The impact of fault models on software robustness evaluations. ICSE 2011: 51-60 - [c91]Abdelmajid Khelil, Hanbin Chang, Neeraj Suri:
Assessing the comparative effectiveness of map construction protocols in wireless sensor networks. IPCCC 2011: 1-6 - [c90]Péter Bokor, Johannes Kinder, Marco Serafini, Neeraj Suri:
Supporting domain-specific state space reductions through local partial-order reduction. ASE 2011: 113-122 - [c89]Azad Ali, Abdelmajid Khelil, Piotr Szczytowski, Neeraj Suri:
An adaptive and composite spatio-temporal data compression approach for wireless sensor networks. MSWiM 2011: 67-76 - [c88]Matthias Majuntke, Dan Dobre, Christian Cachin, Neeraj Suri:
Fork-Consistent Constructions from Registers. OPODIS 2011: 283-298 - [c87]Alexander Biedermann, Thorsten Piper, Lars Patzina, Sven Patzina, Sorin A. Huss, Andy Schürr, Neeraj Suri:
Enhancing FPGA Robustness via Generic Monitoring IP Cores. PECCS 2011: 379-386 - [c86]Dan Dobre, Rachid Guerraoui, Matthias Majuntke, Neeraj Suri, Marko Vukolic:
The complexity of robust atomic storage. PODC 2011: 59-68 - [c85]Matthias Majuntke, Dan Dobre, Neeraj Suri:
Fork-consistent constructions from registers. PODC 2011: 209-210 - [c84]Piotr Szczytowski, Abdelmajid Khelil, Azad Ali, Neeraj Suri:
TOM: Topology oriented maintenance in sparse Wireless Sensor Networks. SECON 2011: 548-556 - [c83]Jesus Luna Garcia, Hamza Ghani, Daniel Germanus, Neeraj Suri:
A Security Metrics Framework for the Cloud. SECRYPT 2011: 245-250 - 2010
- [c82]Marco Serafini, Péter Bokor, Dan Dobre, Matthias Majuntke, Neeraj Suri:
Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicas. DSN 2010: 353-362 - [c81]Dan Dobre, Matthias Majuntke, Marco Serafini, Neeraj Suri:
HP: Hybrid Paxos for WANs. EDCC 2010: 117-126 - [c80]Péter Bokor, Marco Serafini, Neeraj Suri:
On Efficient Models for Model Checking Message-Passing Distributed Protocols. FMOODS/FORTE 2010: 216-223 - [c79]Vinay Sachidananda, Abdelmajid Khelil, Neeraj Suri:
Quality of information in wireless sensor networks. ICIQ 2010 - [c78]Daniel Germanus, Abdelmajid Khelil, Neeraj Suri:
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays. ISARCS 2010: 161-178 - [c77]Piotr Szczytowski, Abdelmajid Khelil, Neeraj Suri:
LEHP: Localized energy hole profiling in Wireless Sensor Networks. ISCC 2010: 100-106 - [c76]Daniel Germanus, Ioanna Dionysiou, K. Harald Gjermundrød, Abdelmajid Khelil, Neeraj Suri, David E. Bakken, Carl Hauser:
Leveraging the next-generation power grid: Data sharing and associated partnerships. ISGT Europe 2010: 1-8 - [c75]Brahim Ayari, Abdelmajid Khelil, Neeraj Suri:
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs. Mobile Data Management 2010: 135-144 - [c74]Brahim Ayari, Abdelmajid Khelil, Kamel Saffar, Neeraj Suri:
Data-Based Agreement for Inter-vehicle Coordination. Mobile Data Management 2010: 279-280 - [c73]Abdelmajid Khelil, Sebastian Jeckel, Daniel Germanus, Neeraj Suri:
Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective. MOBILIGHT 2010: 400-414 - [c72]Marco Serafini, Dan Dobre, Matthias Majuntke, Péter Bokor, Neeraj Suri:
Eventually linearizable shared objects. PODC 2010: 95-104 - [c71]Andreas Eckel, Paul Milbredt, Zaid Al-Ars, Stefan Schneele, Bart Vermeulen, György Csertán, Christoph Scheerer, Neeraj Suri, Abdelmajid Khelil, Gerhard Fohler:
INDEXYS, a Logical Step beyond GENESYS. SAFECOMP 2010: 431-451 - [c70]Faisal Karim Shaikh, Abdelmajid Khelil, Brahim Ayari, Piotr Szczytowski, Neeraj Suri:
Generic Information Transport for Wireless Sensor Networks. SUTC/UMC 2010: 27-34 - [c69]Piotr Szczytowski, Abdelmajid Khelil, Neeraj Suri:
ASample: Adaptive Spatial Sampling in Wireless Sensor Networks. SUTC/UMC 2010: 35-42 - [c68]Mohammadreza Mahmudimanesh, Abdelmajid Khelil, Neeraj Suri:
Reordering for Better Compressibility: Efficient Spatial Sampling in Wireless Sensor Networks. SUTC/UMC 2010: 50-57 - [c67]Faisal Karim Shaikh, Abdelmajid Khelil, Azad Ali, Neeraj Suri:
TRCCIT: Tunable Reliability with Congestion Control for Information Transport in Wireless Sensor Networks. WICON 2010: 1-9 - 2009
- [c66]Azad Ali, Abdelmajid Khelil, Faisal Karim Shaikh, Neeraj Suri:
MPM: Map Based Predictive Monitoring for Wireless Sensor Networks. Autonomics 2009: 79-95 - [c65]Péter Bokor, Marco Serafini, Neeraj Suri, Helmut Veith:
Role-Based Symmetry Reduction of Fault-Tolerant Distributed Protocols with Language Support. ICFEM 2009: 147-166 - [c64]Faisal Karim Shaikh, Abdelmajid Khelil, Neeraj Suri:
AReIT: Adaptive Reliable Information Transport Protocol for Wireless Sensor Networks. ICWN 2009: 75-81 - [c63]Matthias Majuntke, Dan Dobre, Marco Serafini, Neeraj Suri:
Abortable Fork-Linearizable Storage. OPODIS 2009: 255-269 - [c62]Piotr Szczytowski, Abdelmajid Khelil, Neeraj Suri:
MAP++: support for map-based WSN modeling and design with OMNeT++. SimuTools 2009: 77 - [c61]Dan Dobre, Matthias Majuntke, Marco Serafini, Neeraj Suri:
Efficient Robust Storage Using Secret Tokens. SSS 2009: 269-283 - [c60]Péter Bokor, Marco Serafini, Neeraj Suri, Helmut Veith:
Brief Announcement: Efficient Model Checking of Fault-Tolerant Distributed Protocols Using Symmetry Reduction. DISC 2009: 289-290 - 2008
- [c59]Abdelmajid Khelil, Faisal Karim Shaikh, Brahim Ayari, Neeraj Suri:
MWM: a map-based world model for wireless sensor networks. Autonomics 2008: 5 - [c58]Salvatore D'Antonio, Luigi Romano, Abdelmajid Khelil, Neeraj Suri:
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project. CRITIS 2008: 109-118 - [c57]Neeraj Suri, Christof Fetzer, Jacob A. Abraham, Stefan Poledna, Avi Mendelson, Subhasish Mitra:
Dependable Embedded Systems Special Day Panel: Issues and Challenges in Dependable Embedded Systems. DATE 2008: 1394-1395 - [c56]Neeraj Suri:
Message from the DCCS program chair. DSN 2008 - [c55]Kohei Sakurai, Péter Bokor, Neeraj Suri:
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications. HASE 2008: 261-270 - [c54]Constantin Sârbu, Andréas Johansson, Neeraj Suri:
Execution Path Profiling for OS Device Drivers: Viability and Methodology. ISAS 2008: 90-109 - [c53]Constantin Sârbu, Andréas Johansson, Neeraj Suri, Nachiappan Nagappan:
Profiling the Operational Behavior of OS Device Drivers. ISSRE 2008: 127-136 - [c52]Dan Dobre, Matthias Majuntke, Neeraj Suri:
Low-latency access to robust amnesic storage. LADIS 2008: 12:1-12:3 - [c51]Marco Serafini, Neeraj Suri:
Reducing the costs of large-scale BFT replication. LADIS 2008: 14:1-14:5 - [c50]Dan Dobre, Matthias Majuntke, Neeraj Suri:
On the Time-Complexity of Robust and Amnesic Storage. OPODIS 2008: 197-216 - [c49]Brahim Ayari, Abdelmajid Khelil, Neeraj Suri:
Delay-Aware Mobile Transactions. SEUS 2008: 280-291 - [c48]Faisal Karim Shaikh, Abdelmajid Khelil, Neeraj Suri:
A comparative study of data transport protocols in wireless sensor networks. WOWMOM 2008: 1-9 - 2007
- [c47]Marco Serafini, Neeraj Suri, Jonny Vinter, Astrit Ademaj, Wolfgang Brandstätter, Fulvio Tagliabo, Jens Koch:
A Tunable Add-On Diagnostic Protocol for Time-Triggered Systems. DSN 2007: 164-174 - [c46]Andréas Johansson, Neeraj Suri, Brendan Murphy:
On the Selection of Error Model(s) for OS Robustness Evaluation. DSN 2007: 502-511 - [c45]Shariful Islam, Neeraj Suri:
A Multi Variable Optimization Approach for the Design of Integrated Dependable Real-Time Embedded Systems. EUC 2007: 517-530 - [c44]Péter Bokor, Marco Serafini, Áron Sisak, András Pataricza, Neeraj Suri:
Sustaining Property Verification of Synchronous Dependable Protocols Over Implementation. HASE 2007: 169-178 - [c43]Andréas Johansson, Neeraj Suri, Brendan Murphy:
On the Impact of Injection Triggers for OS Robustness Evaluation. ISSRE 2007: 127-126 - [c42]Abdelmajid Khelil, Neeraj Suri:
Gossiping: Adaptive and Reliable Broadcasting in MANETs. LADC 2007: 123-141 - [c41]Faisal Karim Shaikh, Abdelmajid Khelil, Neeraj Suri:
On Modeling the Reliability of Data Transport in Wireless Sensor Networks. PDP 2007: 395-402 - [c40]Marco Serafini, Neeraj Suri:
The Fail-Heterogeneous Architectural Model. SRDS 2007: 103-113 - [c39]Dan Dobre, HariGovind V. Ramasamy, Neeraj Suri:
On the Latency Efficiency of Message-Parsimonious Asynchronous Atomic Broadcast. SRDS 2007: 311-322 - 2006
- [c38]Dan Dobre, Neeraj Suri:
One-step Consensus with Zero-Degradation. DSN 2006: 137-146 - [c37]Constantin Sârbu, Andréas Johansson, Falk Fraikin, Neeraj Suri:
Improving Robustness Testing of COTS OS Extensions. ISAS 2006: 120-139 - [c36]Shariful Islam, Robert Lindstrom, Neeraj Suri:
Dependability Driven Integration of Mixed Criticality SW Components. ISORC 2006: 485-495 - [c35]Brahim Ayari, Abdelmajid Khelil, Neeraj Suri:
FT-PPTC: An Efficient and Fault-Tolerant Commit Protocol for Mobile Environments. SRDS 2006: 96-105 - 2005
- [c34]Andréas Johansson, Neeraj Suri:
Error Propagation Profiling of Operating Systems. DSN 2005: 86-95 - [c33]Arshad Jhumka, Neeraj Suri:
Designing Efficient Fail-Safe Multitolerant Systems. FORTE 2005: 428-442 - 2004
- [c32]Arshad Jhumka, Martin Hiller, Neeraj Suri:
An Approach for Designing and Assessing Detectors for Dependable Component-Based Systems. HASE 2004: 69-78 - [c31]Vilgot Claesson, Neeraj Suri:
TTET: Event-Triggered Channels on a Time-Triggered Base. ICECCS 2004: 39-46 - [c30]Andréas Johansson, Adina Sarbu, Arshad Jhumka, Neeraj Suri:
On Enhancing the Robustness of Commercial Operating Systems. ISAS 2004: 148-159 - [c29]Raphael R. Some, Algirdas Avizienis, Jiri Gaisler, Hirokazu Ihara, Shubu Mukherjee, Neeraj Suri:
Panel Summary Statements. PRDC 2004: 335-40 - [c28]K. H. (Kane) Kim, Paul D. Ezhilchelvan, Jörg Kaiser, Louise E. Moser, Edgar Nett, Neeraj Suri:
Why Have Progresses in Real-Time Fault Tolerant Computing Been Slow? SRDS 2004: 102 - [c27]Neeraj Suri:
Why Progress in (Composite) Fault Tolerant Real-Time Systems has been Slow (-er than Expected.. & What Can We Do About It?). SRDS 2004: 112-113 - [c26]Neeraj Suri:
On Dependability Driven Software and Hardware Integration. WSTFEUS 2004: 45-49 - 2003
- [c25]Hermann Kopetz, Neeraj Suri:
Compositional Design of RT Systems: A Conceptual Basis for Specification of Linking Interfaces. ISORC 2003: 51-60 - [c24]Vilgot Claesson, Cecilia Ekelin, Neeraj Suri:
The Event-Triggered and Time-Triggered Medium-Access Methods. ISORC 2003: 131-134 - [c23]Arshad Jhumka, Neeraj Suri, Martin Hiller:
A Framework for the Design and Validation of Efficient Fail-Safe Fault-Tolerant Programs. SCOPES 2003: 182-197 - [c22]Hermann Kopetz, Neeraj Suri:
On the Limits of the Precise Specification of Component Interfaces. WORDS Fall 2003: 26-27 - [c21]Christof Fetzer, Neeraj Suri:
Practical Aspects of IP Take-Over Mechanisms. WORDS Fall 2003: 250-254 - 2002
- [c20]Martin Hiller, Arshad Jhumka, Neeraj Suri:
On the Placement of Software Mechanisms for Detection of Data Errors. DSN 2002: 135-144 - [c19]Arshad Jhumka, Martin Hiller, Neeraj Suri:
Component-Based Synthesis of Dependable Embedded Software. FTRTFT 2002: 111-128 - [c18]Arshad Jhumka, Martin Hiller, Neeraj Suri:
An Approach to Specify and Test Component-Based Dependable Software. HASE 2002: 211-220 - [c17]Martin Hiller, Arshad Jhumka, Neeraj Suri:
PROPANE: an environment for examining the propagation of errors in software. ISSTA 2002: 81-85 - [c16]Arshad Jhumka, Martin Hiller, Vilgot Claesson, Neeraj Suri:
On systematic design of globally consistent executable assertions in embedded software. LCTES-SCOPES 2002: 75-84 - [c15]Örjan Askerdal, Magnus Gäfvert, Martin Hiller, Neeraj Suri:
A Control Theory Approach for Analyzing the Effects of Data Errors in Safety-Critical Control Systems. PRDC 2002: 105-116 - 2001
- [c14]Martin Hiller, Arshad Jhumka, Neeraj Suri:
An Approach for Analysing the Propagation of Data Errors in Software. DSN 2001: 161-172 - [c13]Purnendu Sinha, Neeraj Suri:
On Simplifying Modular Specification and Verification of Distributed Protocols. HASE 2001: 173-181 - [c12]Purnendu Sinha, Neeraj Suri:
Modular Composition of Redundancy Management Protocols in Distributed Systems: An Outlook on Simplifying Protocol Level Formal Specification & Verification. ICDCS 2001: 255-263 - [c11]Arshad Jhumka, Martin Hiller, Neeraj Suri:
Assessing Inter-Modular Error Propagation in Distributed Software. SRDS 2001: 152-161 - [c10]Vilgot Claesson, Henrik Lönn, Neeraj Suri:
Efficient TDMA Synchronization for Distributed Embedded Systems. SRDS 2001: 198-201 - 2000
- [c9]Chris J. Walter, Neeraj Suri, T. Monaghan:
Evaluating COTS Standards for Design of Dependable Systems. DSN 2000: 87-92 - [c8]Avi Mendelson, Neeraj Suri:
Designing High-Performance & Reliable Superscalar Architectures: The out of Order Reliable Superscalar (O3RS) Approach. DSN 2000: 473-481 - 1999
- [c7]Purnendu Sinha, Neeraj Suri:
Identification of Test Cases Using a Formal Approach. FTCS 1999: 314-321 - [c6]Purnendu Sinha, Neeraj Suri:
On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols. RTSS 1999: 126-135 - 1998
- [c5]Neeraj Suri, Purnendu Sinha:
On the Use of Formal Techniques for Validation. FTCS 1998: 390-399 - [c4]Neeraj Suri, Sunundu Ghosh, Thomas J. Marlowe:
A Framework for Dependability Driven Software Integration. ICDCS 1998: 406-415 - 1997
- [c3]Avi Mendelson, Neeraj Suri:
Cache based fault recovery for distributed systems. ICECCS 1997: 119-129 - 1992
- [c2]Neeraj Suri, Michelle M. Hugue, Chris J. Walter:
Reliability Modeling of Large Fault-Tolerant Systems. FTCS 1992: 212-220 - 1991
- [c1]Neeraj Suri, Avi Mendelson, Dhiraj K. Pradhan:
BDG-torus union graph-an efficient algorithmically specializedparallel interconnect. SPDP 1991: 407-414
Parts in Books or Collections
- 2015
- [p5]Gert Læssøe Mikkelsen, Kasper Damgård, Hans Guldager, Jonas Lindstrøm Jensen, Jesus Luna Garcia, Janus Dam Nielsen, Pascal Paillier, Giancarlo Pellegrino, Michael Bladt Stausholm, Neeraj Suri, Heng Zhang:
Technical Implementation and Feasibility. Attribute-based Credentials for Trust 2015: 255-317 - 2012
- [p4]Paulo Esteves Verssimo, László Gönczy, György Csertán, Gábor Urbanics, Hamza Ghani, Abdelmajid Khelil, Neeraj Suri:
Monitoring and Evaluation of Semantic Rooms. Collaborative Financial Infrastructure Protection 2012: 99-116 - [p3]Abdelmajid Khelil, Daniel Germanus, Neeraj Suri:
Protection of SCADA Communication Channels. Critical Infrastructure Protection 2012: 177-196 - 2011
- [p2]Abdelmajid Khelil, Faisal Karim Shaikh, Azad Ali, Neeraj Suri, Christian Reinl:
Delay Tolerant Monitoring of Mobility-Assisted WSN. Delay Tolerant Networks 2011: 189-222 - 2010
- [p1]Abdelmajid Khelil, Faisal Karim Shaikh, Piotr Szczytowski, Brahim Ayari, Neeraj Suri:
Map-based Design for Autonomic Wireless Sensor Networks. Autonomic Communication 2010: 309-326
Editorship
- 2016
- [e6]Joaquín García-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, Neeraj Suri:
Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9481, Springer 2016, ISBN 978-3-319-29882-5 [contents] - [e5]Giovanni Livraga, Vicenç Torra, Alessandro Aldini, Fabio Martinelli, Neeraj Suri:
Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Lecture Notes in Computer Science 9963, Springer 2016, ISBN 978-3-319-47071-9 [contents] - 2015
- [e4]Joaquín García-Alfaro, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, Neeraj Suri:
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8872, Springer 2015, ISBN 978-3-319-17015-2 [contents] - 2012
- [e3]Michael J. Freedman, Neeraj Suri:
Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, Hollywood, CA, USA, October 7, 2012. USENIX Association 2012 [contents] - [e2]Neeraj Suri, Michael Waidner:
Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt. LNI P-195, GI 2012, ISBN 978-3-88579-289-5 [contents] - 2005
- [e1]Miroslaw Malek, Edgar Nett, Neeraj Suri:
Service Availability, Second International Service Availability Symposium, ISAS 2005, Berlin, Germany, April 25-26, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3694, Springer 2005, ISBN 3-540-29103-2 [contents]
Informal and Other Publications
- 2024
- [i17]Yi Li, Plamen Angelov, Zhengxin Yu, Alvaro Lopez Pellicer, Neeraj Suri:
Federated Adversarial Learning for Robust Autonomous Landing Runway Detection. CoRR abs/2406.15925 (2024) - [i16]Alvaro Lopez Pellicer, Kittipos Giatgong, Yi Li, Neeraj Suri, Plamen Angelov:
UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification. CoRR abs/2406.16501 (2024) - [i15]Yi Li, Plamen Angelov, Neeraj Suri:
Self-Supervised Representation Learning for Adversarial Attack Detection. CoRR abs/2407.04382 (2024) - 2023
- [i14]Andrew Sogokon, Burak Yuksek, Gökhan Inalhan, Neeraj Suri:
Specifying Autonomous System Behaviour. CoRR abs/2302.10087 (2023) - [i13]Lewis Birch, William Hackett, Stefan Trawicki, Neeraj Suri, Peter Garraghan:
Model Leeching: An Extraction Attack Targeting LLMs. CoRR abs/2309.10544 (2023) - [i12]Stefan Trawicki, William Hackett, Lewis Birch, Neeraj Suri, Peter Garraghan:
Compilation as a Defense: Enhancing DL Model Attack Robustness via Tensor Optimization. CoRR abs/2309.16577 (2023) - [i11]Stefan Winter, Abraham Chan, Habib Saissi, Karthik Pattabiraman, Neeraj Suri:
Error Propagation Analysis for Multithreaded Programs: An Empirical Approach. CoRR abs/2312.16791 (2023) - 2022
- [i10]Vijay Varadharajan, Neeraj Suri:
Security Challenges when Space Merges with Cyberspace. CoRR abs/2207.10798 (2022) - [i9]William Hackett, Stefan Trawicki, Zhengxin Yu, Neeraj Suri, Peter Garraghan:
PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models. CoRR abs/2209.06300 (2022) - [i8]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
ThreatPro: Multi-Layer Threat Analysis in the Cloud. CoRR abs/2209.14795 (2022) - [i7]Yang Lu, Zhengxin Yu, Neeraj Suri:
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph. CoRR abs/2210.00325 (2022) - 2021
- [i6]Benjamin Green, William Knowles, Marina Krotofil, Richard Derbyshire, Daniel Prince, Neeraj Suri:
PCaaD: Towards Automated Determination and Exploitation of Industrial Processes. CoRR abs/2102.10049 (2021) - 2020
- [i5]Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri:
A Security Architecture for Railway Signalling. CoRR abs/2009.04207 (2020) - 2018
- [i4]Habib Saissi, Marco Serafini, Neeraj Suri:
Scaling Out Acid Applications with Operation Partitioning. CoRR abs/1804.01942 (2018) - [i3]Ahmed Taha, Spyros Boukoros, Jesus Luna, Stefan Katzenbeisser, Neeraj Suri:
QRES: Quantitative Reasoning on Encrypted Security SLAs. CoRR abs/1804.04426 (2018) - [i2]Patrick Metzler, Habib Saissi, Péter Bokor, Neeraj Suri:
Safe Execution of Concurrent Programs by Enforcement of Scheduling Constraints. CoRR abs/1809.01955 (2018) - 2012
- [i1]Dan Dobre, Ghassan Karame, Wenting Li, Matthias Majuntke, Neeraj Suri, Marko Vukolic:
Proofs of Writing for Efficient and Robust Storage. CoRR abs/1212.3555 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 22:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint