Home > Research > Researchers > Professor Neeraj Suri > Publications

Professor Neeraj Suri

Chair in Cyber Security

  1. Chapter
  2. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 2/10/2019, Model Checking Software: 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings. Springer, p. 153-171 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (ed.) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    Delay tolerant monitoring of mobility-assisted WSN

    Khelil, A., Shaikh, F. K., Ali, A., Suri, N. & Reinl, C., 2016, Delay Tolerant Networks: Protocols and Applications. Vasilakos, A. V. (ed.). CRC Press, p. 189-221 33 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    Technical implementation and feasibility

    Mikkelsen, G. L., Damgård, K., Guldager, H., Jensen, J. L., Luna, J. G., Nielsen, J. D., Paillier, P., Pellegrino, G., Stausholm, M. B., Suri, N. & Zhang, H., 2015, Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, p. 255-318 64 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    On the feasibility of side-channel attacks in a virtualized environment

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 2015, E-Business and Telecommunications: 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers. Springer-Verlag, Vol. 554. p. 319-339 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    PBMC: Symbolic slicing for the verification of concurrent programs

    Saissi, H., Bokor, P. & Suri, N., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer-Verlag, Vol. 9364. p. 344-360 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  8. Published

    Error models for the representative injection of software defects

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 2015, Software-engineering and management. Assmann, U. (ed.). Gesellschaft für Informatik, p. 118-119 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    SecLA-based negotiation and brokering of cloud resources

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & De Benedictis, A., 2014, Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Springer-Verlag, Vol. 453. p. 1-18 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  10. Published

    Towards a framework for benchmarking privacy-ABC technologies

    Veseli, F., Vateva-Gurova, T., Krontiris, I., Rannenberg, K. & Suri, N., 2014, IFIP Advances in Information and Communication Technology: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer New York LLC, Vol. 428. p. 197-204 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  11. Published

    Security issues in cloud federations

    Rak, M., Ghani, H., Ficco, M., Suri, N., Luna, J., Panica, S. & Petcu, D., 2012, Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice. IGI Global, p. 176-194 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  12. Published

    Compressive sensing for wireless sensor networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 2012, Intelligent Sensor Networks: The Integration of Sensor Networks, Signal Processing and Machine Learning. CRC Press, p. 379-396 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  13. Published

    Monitoring and evaluation of semantic rooms

    Gönczy, L., Csertán, G., Urbanics, G., Ghani, H., Khelil, A. & Suri, N., 2012, Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware. Springer Berlin / Heidelberg, p. 99-116 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  14. Published

    Brief announcement: MP-state: State-aware software model checking of message-passing systems

    Muftuoglu, C. A., Bokor, P. & Suri, N., 2012, Stabilization, Safety, and Security of Distributed Systems: 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings. Vol. 7596 LNCS. p. 183-186 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  15. Published

    Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    Khelil, A., Germanus, D. & Suri, N., 2012, Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer, Vol. 7130. p. 177-196 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  16. Published

    Wireless Sensor Cooperation for a Sustainable Quality of Information

    Khelil, A., Reinl, C., Ayari, B., Shaikh, F. K., Szczytowski, P., Ali, A. & Suri, N., 2011, Pervasive Computing and Networking. John Wiley and Sons, p. 71-100 30 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  17. Published

    Fork-consistent constructions from registers

    Majuntke, M., Dobre, D., Cachin, C. & Suri, N., 2011, Principles of Distributed Systems: 15th International Conference, OPODIS 2011, Toulouse, France, December 13-16, 2011. Proceedings. Vol. 7109 LNCS. p. 283-298 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  18. Published

    Increasing the resilience of critical SCADA systems using peer-to-peer overlays

    Germanus, D., Khelil, A. & Suri, N., 2010, Architecting Critical Systems: First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings. Springer, Vol. 6150 LNCS. p. 161-178 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  19. Published

    INDEXYS, a logical step beyond GENESYS

    Eckel, A., Milbredt, P., Al-Ars, Z., Schneele, S., Vermeulen, B., Csertán, G., Scheerer, C., Suri, N., Khelil, A., Fohler, G., Obermaisser, R. & Fidi, C., 2010, Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings. Springer, Vol. 6351 LNCS. p. 431-451 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  20. Published

    MPM: Map based Predictive Monitoring for Wireless Sensor Networks

    Ali, A., Khelil, A., Shaikh, F. K. & Suri, N., 2010, Autonomic Computing and Communications Systems: Third International ICST Conference, Autonomics 2009, Limassol, Cyprus, September 9-11, 2009, Revised Selected Papers. Springer, Vol. 23 LNICST. p. 79-95 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  21. Published

    On efficient models for model checking message-passing distributed protocols

    Bokor, P., Serafini, M. & Suri, N., 2010, Formal Techniques for Distributed Systems: Joint 12th IFIP WG 6.1 International Conference, FMOODS 2010 and 30th IFIP WG 6.1 International Conference, FORTE 2010, Amsterdam, The Netherlands, June 7-9, 2010. Proceedings. Springer, Vol. 6117 LNCS. p. 216-223 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  22. Published

    Towards benchmarking of P2P technologies from a SCADA systems protection perspective

    Khelil, A., Jeckel, S., Germanus, D. & Suri, N., 2010, Mobile Lightweight Wireless Systems: Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. Springer, Vol. 45 LNICST. p. 400-414 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  23. Published

    Map-based design for autonomic wireless sensor networks

    Khelil, A., Shaikh, F. K., Szczytowski, P., Ayari, B. & Suri, N., 2009, Autonomic Communication. Tsinghua University Press & Springer-Verlag, p. 309-326 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  24. Published

    Abortable fork-linearizable storage

    Majuntke, M., Dobre, D., Serafini, M. & Suri, N., 2009, Principles of Distributed Systems: 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings. Springer, Vol. 5923 LNCS. p. 255-269 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    Efficient robust storage using secret tokens

    Dobre, D., Majuntke, M., Serafini, M. & Suri, N., 2009, Stabilization, Safety, and Security of Distributed Systems: 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings. Springer, Vol. 5873 LNCS. p. 269-283 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  26. Published

    INcreasing security and protection through infrastructure REsilience: The INSPIRE project

    D'Antonio, S., Romano, L., Khelil, A. & Suri, N., 2009, Critical Information Infrastructure Security: Third International Workshop, CRITIS 2008, Rome, Italy, October13-15, 2008. Revised Papers. Springer, Vol. 5508 LNCS. p. 109-118 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  27. Published

    Role-based symmetry reduction of fault-tolerant distributed protocols with language support

    Bokor, P., Serafini, M., Suri, N. & Veith, H., 2009, Formal Methods and Software Engineering: 11th International Conference on Formal Engineering Methods ICFEM 2009, Rio de Janeiro, Brazil, December 9-12, 2009. Proceedings. Springer, Vol. 5885 LNCS. p. 147-166 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  28. Published

    Brief Announcement: Efficient Model Checking of Fault-Tolerant Distributed Protocols Using Symmetry Reduction

    Bokor, P., Serafini, M., Suri, N. & Veith, H., 2009, Distributed Computing: 23rd International Symposium, DISC 2009, Elche, Spain, September 23-25, 2009. Proceedings. Springer, p. 289-290 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  29. Published

    Robustness Evaluation of Operating Systems

    Johansson, A. & Suri, N., 2008, Information Assurance: The Morgan Kaufmann Series in Networking. Elsevier Inc., p. 349-375 27 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  30. Published

    Delay-aware mobile transactions

    Ayari, B., Khelil, A. & Suri, N., 2008, Software Technologies for Embedded and Ubiquitous Systems: 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedings. Springer, Vol. 5287 LNCS. p. 280-291 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  31. Published

    Execution path profiling for OS device drivers: Viability and methodology

    Sârbu, C., Johansson, A. & Suri, N., 2008, Service Availability: 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedings. Vol. 5017 LNCS. p. 90-109 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  32. Published

    On the time-complexity of robust and amnesic storage

    Dobre, D., Majuntke, M. & Suri, N., 2008, Principles of Distributed Systems: 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedings. Springer, Vol. 5401 LNCS. p. 197-216 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  33. Published

    A multi variable optimization approach for the design of integrated dependable real-time embedded systems

    Islam, S. & Suri, N., 2007, Embedded and Ubiquitous Computing: International Conference, EUC 2007, Taipei, Taiwan, December 17-20, 2007. Proceedings. Springer, Vol. 4808 LNCS. p. 517-530 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  34. Published

    Gossiping: Adaptive and reliable broadcasting in MANETs

    Khelil, A. & Suri, N., 2007, Dependable Computing: Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedings. Springer, Vol. 4746 LNCS. p. 123-141 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  35. Published

    Improving robustness testing of COTS OS extensions

    Sârbu, C., Johansson, A., Fraikin, F. & Suri, N., 2006, Service Availability: Third International Service Availability Symposium, ISAS 2006, Helsinki, Finland, May 15-16, 2006. Revised Selected Papers. Springer-Verlag, Vol. 4328 LNCS. p. 120-139 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  36. Published

    Designing efficient fail-safe multitolerant systems

    Jhumka, A. & Suri, N., 2005, Formal Techniques for Networked and Distributed Systems - FORTE 2005 . Springer, Vol. 3731 LNCS. p. 428-422 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  37. Published

    On enhancing the robustness of commercial operating systems

    Johansson, A., Sârbu, A., Jhumka, A. & Suri, N., 2005, Service Availability: First International Service Availability Symposium, ISAS 2004, Munich, Germany, May 13-14, 2004, Revised Selected Papers. Springer, p. 148-159 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  38. Published

    A framework for the design and validation of efficient fail-safe fault-tolerant programs

    Jhumka, A., Suri, N. & Hiller, M., 2003, Software and Compilers for Embedded Systems . Springer-Verlag, Vol. 2826. p. 182-197 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  39. Published

    Component-based synthesis of dependable embedded software

    Jhumka, A., Hiller, M. & Suri, N., 2002, Formal Techniques in Real-Time and Fault-Tolerant Systems. Springer-Verlag, Vol. 2469. p. 111-128 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  40. Conference contribution/Paper
  41. Published

    Assessing the state and improving the art of parallel testing for C

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 15/07/2019, ISSTA 2019 Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, p. 123-133 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  42. Published

    MemFuzz: Using memory accesses to guide fuzzing

    Coppik, N., Schwahn, O. & Suri, N., 24/04/2019, 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). IEEE, p. 48-58 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  43. Published

    InfoLeak: Scheduling-based information leakage

    Vateva-Gurova, T., Manzoor, S., Huang, Y. & Suri, N., 11/02/2019, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 44-53 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  44. Published

    Threat Modeling the Cloud: An Ontology Based Approach

    Manzoor, S., Vateva-Gurova, T., Trapero, R. & Suri, N., 30/01/2019, IOSec 2018: Information and Operational Technology Security Systems . Fournaris, A., Lampropoulos, K. & Marin Tordera, E. (eds.). Cham: Springer-Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science; vol. 11398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  45. Published

    Exploring the relationship between dimensionality reduction and private data release

    Tai, B-C., Li, S-C., Huang, Y., Suri, N. & Wang, P-C., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 25-33 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  46. Published

    FastFI: Accelerating software fault injections

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 193-202 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  47. Published

    On the detection of side-channel attacks

    Vateva-Gurova, T. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 185-186 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  48. Published

    Flashlight: A novel monitoring path identification schema for securing cloud services

    Zhang, H., Luna, J., Suri, N. & Trapero, R., 27/08/2018, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, 10 p. 5

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  49. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  50. Published

    Whetstone: Reliable monitoring of cloud services

    Zhang, H., Luna, J., Trapero, R. & Suri, N., 18/06/2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, p. 115-122 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  51. Published

    A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

    Ismail, H., Roos, S. & Suri, N., 12/06/2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  52. Published

    Monitoring path discovery for supporting indirect monitoring of cloud services

    Zhang, H., Manzoor, S., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 274-277 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  53. Published

    Threat modeling and analysis for the cloud ecosystem

    Manzoor, S., Zhang, H., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 278-281 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  54. Published

    Quick verification of concurrent programs by iteratively relaxed scheduling

    Metzler, P., Saissi, H., Bokor, P., Suri, N., T.N., N. (ed.), G., R. (ed.) & M., D. P. (ed.), 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 776-781 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  55. Published

    TrEKer: Tracing error propagation in operating system kernels

    Coppik, N., Schwahn, O., Winter, S., Suri, N., T.N., N. (ed.), G., R. & M., D. P., 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 377-387 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  56. Published

    C'MON: Monitoring the compliance of cloud services to contracted properties

    Alboghdady, S., Winter, S., Taha, A., Zhang, H. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 6 36

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  57. Published

    Towards DDoS attack resilient wide area monitoring systems

    Demir, K. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, 7 p. 99

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  58. Published

    A security architecture for railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S., Suri, N., Bitsch, F. (ed.), Tonetta, S. (ed.) & Schoitsch, E. (ed.), 17/08/2017, Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings. Springer-Verlag, Vol. 10488 LNCS. p. 320-328 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  59. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  60. Published

    AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

    Manzoor, S., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 499-502 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  61. Published

    DeQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services

    Zhang, H., Trapero, R., Luna, J., Suri, N., X., L. & U., B., 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  62. Published

    SLA-Based Service Selection for Multi-Cloud Environments

    Taha, A., Manzoor, S., Suri, N., A.M., G. (ed.) & M., L. (ed.), 25/06/2017, 2017 IEEE International Conference on Edge Computing (EDGE). IEEE, p. 65-72 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  63. Published

    Challenges and approaches in securing safety-relevant railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S. & Suri, N., 26/04/2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 139-145 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  64. Published

    IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants

    Chan, A., Winter, S., Saissi, H., Pattabiraman, K. & Suri, N., 13/03/2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). IEEE, p. 184-195 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  65. Published

    SeReCP: A secure and reliable communication platform for the smart grid

    Demir, K., Suri, N., M., K. (ed.), D.S., K. (ed.) & V., V. (ed.), 22/01/2017, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 175-184 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  66. Published

    Malicious peers eviction for P2P overlays

    Ismail, H., Germanus, D. & Suri, N., 17/10/2016, 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, p. 216-224 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  67. Published

    Efficient verification of program fragments: Eager POR

    Metzler, P., Saissi, H., Bokor, P., Hess, R., Suri, N., Artho, C. (ed.), Peled, D. (ed.) & Legay, A. (ed.), 22/09/2016, Automated Technology for Verification and Analysis: 14th International Symposium, ATVA 2016, Chiba, Japan, October 17-20, 2016, Proceedings. Springer-Verlag, Vol. 9938 LNCS. p. 375-391 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  68. Published

    Practical Formal Verification for Model Based Development of Cyber-Physical Systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  69. Published

    Reliable Memory Efficient Name Forwarding in Named Data Networking

    Saxena, D., Raychoudhury, V., Becker, C. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 48-55 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  70. Published

    SENTRY: A novel approach for mitigating application layer DDoS threats

    Zhang, H., Taha, A., Trapero, R., Luna, J. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 465-472 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  71. Published

    Trust validation of cloud IaaS: A customer-centric approach

    Manzoor, S., Taha, A. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 97-104 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  72. Published

    Identifying and utilizing dependencies across cloud security services

    Taha, A., Metzler, P., Trapero, R., Luna, J. & Suri, N., 30/05/2016, ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, p. 329-340 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  73. Published

    FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes

    Ali, A., Khelil, A. & Suri, N., 7/01/2016, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 140-145 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  74. Published

    Detecting and mitigating P2P eclipse attacks

    Ismail, H., Germanus, D. & Suri, N., 14/12/2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 224-231 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  75. Published

    The impact of hypervisor scheduling on compromising virtualized environments

    Vateva-Gurova, T., Suri, N., Mendelson, A., Atzori, L. (ed.), Jin, X. (ed.), Jarvis, S. (ed.), Liu, L. (ed.), Calvo, R. A. (ed.), Hu, J. (ed.), Min, G. (ed.), Georgalas, N. (ed.) & Wu, Y. (ed.), 26/10/2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, p. 1910-1917 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  76. Published

    PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation

    Germanus, D., Ismail, H. & Suri, N., 28/09/2015, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 74-83 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  77. Published

    On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms

    Piper, T., Winter, S., Suri, N. & Fuhrman, T. E., 7/09/2015, 2015 11th European Dependable Computing Conference (EDCC). IEEE, p. 85-96 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  78. Published

    GRINDER: On Reusability of Fault Injection Tools

    Winter, S., Piper, T., Schwahn, O., Natella, R., Suri, N. & Cotroneo, D., 23/05/2015, 2015 IEEE/ACM 10th International Workshop on Automation of Software Test. IEEE, p. 75-79 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  79. Published

    No PAIN, No Gain? The utility of parallel fault injections

    Winter, S., Schwahn, O., Natella, R., Suri, N., Cotroneo, D., J., K. (ed.) & U., Z. (ed.), 16/05/2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE, p. 494-505 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  80. Published

    Mitigating timing error propagation in mixed-criticality automotive systems

    Piper, T., Winter, S., Schwahn, O., Bidarahalli, S. & Suri, N., 13/04/2015, 2015 IEEE 18th International Symposium on Real-Time Distributed Computing. IEEE, p. 102-109 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  81. Published

    Event pattern discovery on IDS traces of cloud services

    Huang, S-Y., Huang, Y. & Suri, N., 3/12/2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. IEEE, p. 25-32 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  82. Published

    Robust and real-time communication on heterogeneous networks for smart distribution grid

    Demir, K., Germanus, D. & Suri, N., 3/11/2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 386-391 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  83. Published

    Mitigating eclipse attacks in peer-to-peer networks

    Germanus, D., Roos, S., Strufe, T. & Suri, N., 29/10/2014, 2014 IEEE Conference on Communications and Network Security. Springer-Verlag, p. 400-408 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  84. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  85. Published

    Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 28/08/2014, 2014 11th International Conference on Security and Cryptography (SECRYPT). IEEE, p. 113-124 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  86. Published

    Practical use of formal verification for safety critical cyber-physical systems: A case study

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 25/08/2014, 2014 IEEE International Conference on Cyber-Physical Systems, Networks, and Applications. IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  87. Published

    An empirical study of injected versus actual interface errors

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 21/07/2014, Proceedings of the 2014 International Symposium on Software Testing and Analysis. ACM, p. 397-408 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  88. Published

    Agile sink selection in wireless sensor networks

    Mahmudimanesh, M. & Suri, N., 30/06/2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, p. 390-398 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  89. Published

    Efficient agile sink selection in wireless sensor networks based on compressed sensing

    Mahmudimanesh, M., Naseri, A. & Suri, N., 26/05/2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems. IEEE, p. 193-200 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  90. Published

    Robust compressive data gathering in wireless sensor networks with linear topology

    Mahmudimanesh, M. & Suri, N., 26/05/2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems. IEEE, p. 179-186 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  91. Published

    WiP abstract: A framework on profiling cross-domain noise propagation in control CPS

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 14/04/2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS). IEEE, p. 224 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  92. Published

    User-centric security assessment of software configurations: A case study

    Ghani, H., Luna Garcia, J., Petkov, I. & Suri, N., 2014, Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Springer-Verlag, Vol. 8364 LNCS. p. 196-212 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  93. Published

    Security as a service using an SLA-based approach via SPECS

    Rak, M., Suri, N., Luna, J., Petcu, D., Casola, V. & Villano, U., 2/12/2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  94. Published

    PoWerStore: Proofs of writing for efficient and robust storage

    Dobre, D., Karame, G., Li, W., Majuntke, M., Suri, N. & Vukolić, M., 4/11/2013, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, p. 285-297 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  95. Published

    Predictive vulnerability scoring in the context of insufficient information availability

    Ghani, H., Luna, J., Khelil, A., Alkadri, N. & Suri, N., 23/10/2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  96. Published

    Quantitative assessment of software vulnerabilities based on economic-driven security metrics

    Ghani, H., Luna, J. & Suri, N., 23/10/2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  97. Published

    Coral: Reliable and low-latency P2P convergecast for critical sensor data collection

    Germanus, D., Khelil, A., Schwandke, J. & Suri, N., 21/10/2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 300-305 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  98. Published

    Efficient verification of distributed protocols using stateful model checking

    Saissi, H., Bokor, P., Muftuoglu, C. A., Suri, N. & Serafini, M., 30/09/2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems. IEEE, p. 133-142 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  99. Published

    Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach

    Tan, F., Wang, Y., Wang, Q., Bu, L., Zheng, R. & Suri, N., 24/06/2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  100. Published

    SimFI: From single to simultaneous software fault injections

    Winter, S., Tretter, M., Sattler, B. & Suri, N., 24/06/2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  101. Published

    Information quality aware co-design of sampling and transport in wireless sensor networks

    Sachidananda, V., Khelil, A., Noack, D. & Suri, N., 23/04/2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  102. Published

    Trading transport timeliness and reliability for efficiency in wireless sensor networks

    Sachidananda, V., Khelil, A., Umap, D., Majuntke, M. & Suri, N., 10/04/2013, 2013 10th IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC). I. B. Tauris, p. 720-727 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

Previous 1 2 3 Next

Back to top