Home > Research > Researchers > Professor Neeraj Suri > Publications

Professor Neeraj Suri

Distinguished Professor in Cyber Security, Distinguished Professor & Chair in Cyber Security

  1. Conference contribution/Paper
  2. Published

    An approach to specify and test component-based dependable software

    Jhumka, A., Hiller, M. & Suri, N., 23/10/2002, 7th IEEE International Symposium on High Assurance Systems Engineering, 2002. Proceedings.. IEEE, p. 211-220 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    PROPANE: An environment for examining the propagation of errors in software

    Hiller, M., Jhumka, A., Suri, N. & P.G., F. (Editor), 22/07/2002, Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis: ISSTA '02. ACM, p. 81-85 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    On the placement of software mechanisms for detection of data errors

    Hiller, M., Jhumka, A. & Suri, N., 23/06/2002, Proceedings International Conference on Dependable Systems and Networks. p. 135-144 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    On systematic design of globally consistent executable assertions in embedded software

    Jhumka, A., Hiller, M., Claesson, V. & Suri, N., 19/06/2002, Proceedings of the joint conference on Languages, compilers and tools for embedded systems: software and compilers for embedded systems. ACM, p. 75-84 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Assessing inter-modular error propagation in distributed software

    Jhumka, A., Hiller, M. & Suri, N., 31/10/2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems. IEEE, p. 152-161 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Efficient TDMA synchronization for distributed embedded systems

    Claesson, V., Lönn, H. & Suri, N., 31/10/2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems. IEEE, p. 198-201 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    On simplifying modular specification and verification of distributed protocols

    Sinha, P. & Suri, N., 22/10/2001, Proceedings Sixth IEEE International Symposium on High Assurance Systems Engineering: Special Topic: Impact of Networking. IEEE, p. 173-181 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    An approach for analysing the propagation of data errors in software

    Hiller, M., Jhumka, A., Suri, N. & D.C., Y. (Editor), 1/07/2001, 2001 International Conference on Dependable Systems and Networks. IEEE, p. 161-170 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Message from the conference chairs

    Torin, J., Suri, N. & D.C., Y. (Editor), 1/07/2001, Proceedings of the 2001 International Conference on Dependable Systems and Networks. ACM, p. xiii-xiv 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Designing high-performance & reliable superscalar architectures the out of order reliable superscalar (O3RS) approach

    Mendelson, A. & Suri, N., 25/06/2000, Proceeding International Conference on Dependable Systems and Networks. IEEE, p. 473-481 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Evaluating COTS standards for design of dependable systems

    Walter, C. J., Suri, N. & Monaghan, T., 25/06/2000, Proceeding International Conference on Dependable Systems and Networks.: DSN 2000. IEEE, p. 87-92 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    On the use of formal techniques for analyzing dependable real-time protocols

    Sinha, P. & Suri, N., 1/12/1999, Proceedings 20th IEEE Real-Time Systems Symposium. IEEE, p. 126-135 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Identification of test cases using a formal approach

    Sinha, P. & Suri, N., 15/06/1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing. IEEE, p. 314-321 8 p. (Proc Annu Int Conf Fault Tolerant Comput).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    A framework for dependability driven software integration

    Suri, N., Ghosh, S. & Marlowe, T., 29/05/1998, Proceedings. 18th International Conference on Distributed Computing Systems. IEEE, p. 406-415 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    On the use of formal techniques for validation

    Suri, N. & Sinha, P., 1998, Digest of Papers. Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing . IEEE, p. 1-10 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Cache based fault recovery for distributed systems

    Mendelson, A. & Suri, N., 8/09/1997, Proceedings. Third IEEE International Conference on Engineering of Complex Computer Systems. IEEE, p. 119-129 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Roll-forward recovery: the bidirectional cache approach

    Mendelson, A., Suri, N. & Zimmerman, O., 12/06/1996, Proceedings of IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems. IEEE, p. 59-68 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Reliability modeling of large fault-tolerant systems

    Suri, N., Hugue, M. M. & Walter, C. J., 1992, Digest of Papers. FTCS-22: The Twenty-Second International Symposium on Fault-Tolerant Computing. IEEE, p. 212-220 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    BDG-torus union graph-an efficient algorithmically specialized parallel interconnect

    Suri, N., Mendelson, A. & Pradhan, D. K., 2/12/1991, Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing. IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Foreword/postscript
  22. Published

    Message from the IC2E 2018 General Chairs

    Hua, K. A., Suri, N., J., L. (Editor), A., C. (Editor), T., G. (Editor) & Y., C. (Editor), 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. xiii 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  23. Published

    Foreword from the QASA 2015 chairs

    Aldini, A., Martinelli, F., Suri, N., G., N.-A. (Editor), A., A., F., M., N., S. & J., G.-A. (Editor), 21/09/2015, Data Privacy Management, and Security Assurance: 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papers. Springer-Verlag, Vol. 9481. 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  24. Published

    Foreword from the QASA 2014 program chairs

    Aldini, A., Martinelli, F., Suri, N., J., P. (Editor), N., S., E., L. (Editor), J., H.-J. (Editor), J., G.-A., F., M. & A., A., 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Springer-Verlag, Vol. 8872. 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  25. Published

    General and program chairs' message

    Malek, M. & Suri, N., 2005, Service Availability: Second International Service Availability Symposium, ISAS 2005. Springer-Verlag, Vol. 3694 LNCS. p. V-VI 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  26. Conference paper
  27. Published

    Replication: 20 Years of Inferring Interdomain Routing Policies

    Kastanakis, S., Giotsas, V., Livadariu, I. & Suri, N., 24/10/2023, p. 16-29. 14 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  28. Published

    Compilation as a Defense: Enhancing DL Model Attack Robustness via Tensor Optimization

    Trawicki, S., Hackett, W., Birch, L., Suri, N. & Garraghan, P., 20/10/2023. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  29. Published

    Model Leeching: An Extraction Attack Targeting LLMs

    Birch, L., Hackett, W., Trawicki, S., Suri, N. & Garraghan, P., 20/10/2023.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  30. Forthcoming

    Federated Meta Learning for Visual Navigation in GPS-denied Urban Airspace

    Yuksek, B., Yu, Z., Suri, N. & Inalhan, G., 22/04/2023, (Accepted/In press).

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  31. Published

    A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems

    Birkholz, H., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Arul, T., Heinrich, M., Katzenbeisser, S., Suri, N., Vateva-Gurova, T. & Schlehuber, C., 25/06/2018. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  32. Published

    In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services

    Pellegrino, G., Balzarotti, D., Winter, S. & Suri, N., 2015. 16 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  33. Published

    Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, Hollywood, CA, USA, October 7, 2012

    Freedman, M. J. (Editor) & Suri, N. (Editor), 2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  34. Published

    Quality of information in wireless sensor networks: A survey

    Sachidananda, V., Khelil, A. & Suri, N., 2010.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  35. Published

    TRCCIT: Tunable reliability with congestion control for information transport in wireless sensor networks

    Shaikh, F. K., Khelil, A., Ali, A. & Suri, N., 2010. 9 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  36. Published

    Dependable and cost-effective architecture for X-by-wire systems with membership middleware

    Sakurai, K., Matsubara, M., Serafini, M. & Suri, N., 2008, p. 160-169. 10 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  37. Published

    Modular composition of redundancy management protocols in distributed systems: An outlook on simplifying protocol level formal specification & verification

    Sinha, P. & Suri, N., 16/04/2001, p. 255-263. 9 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  38. Published

    Dependability issues in the reuse of standard components in open architectures

    Walter, C., Suri, N. & Monaghan, T., 1995, p. 443-453. 11 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  39. Poster
  40. Published

    Poster: Multi-Layer Threat Analysis of the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, p. 3419-3421. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  41. Other contribution
  42. Published
  43. Journal article
  44. Published

    An empirical study of reflection attacks using NetFlow data

    Chuah, E. & Suri, N., 1/07/2024, In: Cybersecurity. 7, 1, 13.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 31/03/2024, In: IEEE Transactions on Cloud Computing. 12, 1, p. 319-336 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph

    Lu, Y., Yu, Z. & Suri, N., 31/08/2023, In: ACM Transactions on Privacy and Security. 26, 3, p. 1-39 39 p., 33.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    Specifying Autonomous System Behaviour

    Sogokon, A., Yuksek, B., Inalhan, G. & Suri, N., 2023, In: CoRR. abs/2302.10087

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems

    Chuah, E., Jhumka, A., Malek, M. & Suri, N., 29/12/2022, In: IEEE Access. 10, p. 133487-133503 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph

    Lu, Y., Yu, Z. & Suri, N., 1/10/2022, In: arXiv. abs/2210.00325, 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    ThreatPro: Multi-Layer Threat Analysis in the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 29/09/2022, In: arXiv. abs/2209.14795, 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models.

    Hackett, W., Trawicki, S., Yu, Z., Suri, N. & Garraghan, P., 13/09/2022, In: arXiv. abs/2209.06300, 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    Pinch: An Adversarial Extraction Attack Framework for Deep Learning Models

    Hackett, W., Trawicki, S., Yu, Z., Suri, N. & Garraghan, P., 13/09/2022, In: arXiv.

    Research output: Contribution to Journal/MagazineJournal article

  53. Published

    PCaaD: Towards automated determination and exploitation of industrial systems

    Green, B., Derbyshire, R., Krotofil, M., Knowles, W., Prince, D. & Suri, N., 30/11/2021, In: Computers and Security. 110, 19 p., 102424.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 31/10/2020, In: International Journal on Software Tools for Technology Transfer. 22, p. 565-581 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  55. Published

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 1/03/2020, In: IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    Security Requirements Engineering in Safety-Critical Railway Signalling Networks.

    Heinrich, M., Vateva-Gurova, T., Arul, T., Katzenbeisser, S., Suri, N., Birkholz, H., Fuchs, A., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Tverdyshev, S. & Schlehuber, C., 14/07/2019, In: Security and Communication Networks. 2019, 14 p., 8348925.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems

    Demir, K., Nayyer, F. & Suri, N., 1/06/2019, In: International Journal of Critical Infrastructure Protection. 25, p. 84-101 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    Proofs of Writing for Robust Storage

    Dobre, D., Karame, G., Li, W., Majuntke, M., Suri, N. & Vukolic, M., 27/05/2019, In: IEEE Transactions on Parallel and Distributed Systems. 30, 11, p. 2547-2566 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Securing the cloud-assisted smart grid

    Demir, K., Ismail, H., Vateva-Gurova, T. & Suri, N., 1/12/2018, In: International Journal of Critical Infrastructure Protection. 23, p. 100-111 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  61. Published

    How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code

    Schwahn, O., Winter, S., Coppik, N. & Suri, N., 1/11/2018, In: IEEE Transactions on Dependable and Secure Computing. 15, 6, p. 945-958 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  62. Published

    Safety verification utilizing model-based development for safety critical cyber-physical systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 15/08/2017, In: Journal of Information Processing Systems. 25, p. 797-810 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  63. Published

    Quantitative Reasoning about Cloud Security Using Service Level Agreements

    Luna, J., Taha, A., Trapero, R. & Suri, N., 1/07/2017, In: IEEE Transactions on Cloud Computing. 5, 3, p. 457-471 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  64. Published

    A novel approach to manage cloud security SLA incidents

    Trapero, R., Modic, J., Stopar, M., Taha, A. & Suri, N., 1/07/2017, In: Future Generation Computer Systems. 72, p. 193-205 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  65. Published

    P2P routing table poisoning: A quorum-based sanitizing approach

    Ismail, H., Germanus, D. & Suri, N., 1/03/2017, In: Computers and Security. 65, p. 283-299 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  66. Published

    Robust QoS-aware communication in the smart distribution grid

    Demir, K., Germanus, D. & Suri, N., 1/01/2017, In: Peer-to-Peer Networking and Applications. 10, 1, p. 193-207 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. Published

    Novel efficient techniques for real-time cloud security assessment

    Modic, J., Trapero, R., Taha, A., Luna, J., Stopar, M. & Suri, N., 1/09/2016, In: Computers and Security. 62, p. 1-18 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    Run Time Application Repartitioning in Dynamic Mobile Cloud Environments

    Yang, L., Cao, J., Tang, S., Han, D. & Suri, N., 1/07/2016, In: IEEE Transactions on Cloud Computing. 4, 3, p. 336-348 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    Quantifiably Trusting the Cloud: Putting Metrics to Work

    Trapero, R., Luna, J. & Suri, N., 1/06/2016, In: IEEE Security and Privacy Magazine. 14, 3, p. 73-77 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  70. Published

    On choosing server-or client-side solutions for BFT

    Platania, M., Obenshain, D., Tantillo, T., Amir, Y. & Suri, N., 1/05/2016, In: ACM Computing Surveys. 48, 4, 30 p., 61.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    Named Data Networking: A survey

    Saxena, D., Raychoudhury, V., Suri, N., Becker, C. & Cao, J., 28/02/2016, In: Computer Science Review. 19, p. 15-55 41 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    Adaptive hybrid compression for wireless sensor networks

    Ali, A., Khelil, A., Suri, N. & Mahmudimanesh, M., 1/12/2015, In: ACM Transactions on Sensor Networks. 11, 4, 36 p., 53.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  73. Published

    Assessing privacy capabilities of cloud service providers

    Del Alamo, J. M., Trapero, R., Martin, Y. S., Yelmo, J. C. & Suri, N., 1/11/2015, In: IEEE Latin America Transactions. 13, 11, p. 3634-3641 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  74. Published

    A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking

    Tan, F., Wang, Y., Wang, Q., Bu, L. & Suri, N., 1/10/2015, In: IEEE Transactions on Parallel and Distributed Systems. 26, 10, p. 2630-2642 13 p., 6898840.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  75. Published

    Leveraging the Potential of Cloud Security Service-Level Agreements through Standards

    Luna, J., Suri, N., Iorga, M. & Karmel, A., 1/05/2015, In: IEEE Cloud Computing. 2, 3, p. 32-40 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  76. Published

    Assessing the security of internet-connected critical infrastructures

    Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G. & Clarke, J., 1/12/2014, In: Security and Communication Networks. 7, 12, p. 2713-2725 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    GMTC: A generalized commit approach for hybrid mobile environments

    Ayari, B., Khelil, A. & Suri, N., 1/12/2013, In: IEEE Transactions on Mobile Computing. 12, 12, p. 2399-2411 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  78. Published

    Efficient predictive monitoring of wireless sensor networks

    Ali, A., Khelil, A., Shaikh, F. K. & Suri, N., 2012, In: International Journal of Autonomous and Adaptive Communications Systems. 5, 3, p. 233-254 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  79. Published

    On the design of perturbation-resilient atomic commit protocols for mobile transactions

    Ayari, B., Khelil, A. & Suri, N., 1/08/2011, In: ACM Transactions on Computer Systems. 29, 3, 7.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  80. Published

    Reliable congestion-aware information transport in wireless sensor networks

    Shaikh, F. K., Khelil, A., Ali, A. & Suri, N., 1/07/2011, In: International Journal of Communication Networks and Distributed Systems. 7, 1-2, p. 135-152 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    Application-level diagnostic and membership protocols for generic time-triggered systems

    Serafini, M., Bokor, P., Suri, N., Vinter, J., Ademaj, A., Brandstätter, W., Tagliabo, F. & Koch, J., 1/03/2011, In: IEEE Transactions on Dependable and Secure Computing. 8, 2, p. 177-193 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  82. Published

    A software integration approach for designing and assessing dependable embedded systems

    Suri, N., Jhumka, A., Hiller, M., Pataricza, A., Islam, S. & Sârbu, C., 1/10/2010, In: Journal of Systems and Software. 83, 10, p. 1780-1800 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  83. Published

    Profiling the operational behavior of OS device drivers

    Sârbu, C., Johansson, A., Suri, N. & Nagappan, N., 1/08/2010, In: Empirical Software Engineering. 15, 4, p. 380-422 43 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  84. Published

    Using underutilized CPU resources to enhance its reliability

    Timor, A., Mendelson, A., Birk, Y. & Suri, N., 1/01/2010, In: IEEE Transactions on Dependable and Secure Computing. 7, 1, p. 94-109 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  85. Published

    A pre-injection analysis for identifying fault-injection tests for protocol validation

    Suri, N. & Sinha, P., 2010, In: Journal of Software. 5, 10, p. 1144-1161 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    An optimization based design for integrated dependable real-time embedded systems

    Islam, S., Suri, N., Balogh, A., Csertán, G. & Pataricza, A., 2009, In: Design Automation for Embedded Systems. 13, 4, p. 245-285 41 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  87. Published

    Exploring delay-aware transactions in heterogeneous mobile environments

    Ayari, B., Khelil, A. & Suri, N., 2009, In: Journal of Software. 4, 7, p. 634-643 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  88. Published

    Increasing security and protection of SCADA systems through infrastructure resilience

    D'Antonio, S., Romano, L., Khelil, A. & Suri, N., 2009, In: International Journal of System of Systems Engineering. 1, 4, p. 401-413 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  89. Published

    Design of an optimal Bayesian incentive compatible broadcast protocol for ad hoc networks with rational nodes

    Suri, N. & Narahari, Y., 2008, In: IEEE Journal on Selected Areas in Communications. 26, 7, p. 1138-1148 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  90. Published

    Online diagnosis and recovery: On the choice and impact of tuning parameters

    Serafini, M., Bondavalli, A. & Suri, N., 12/11/2007, In: IEEE Transactions on Dependable and Secure Computing. 4, 4, p. 295-312 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  91. Published

    An approach to synthesise safe systems

    Jhumka, A., Freiling, F., Fetzer, C. & Suri, N., 2006, In: International Journal of Security and Networks. 1, 1-2, p. 62-74 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  92. Published

    An efficient TDMA start-up and restart synchronization approach for distributed embedded systems

    Claesson, V., Lönn, H. & Suri, N., 13/09/2004, In: IEEE Transactions on Parallel and Distributed Systems. 15, 8, p. 725-739 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  93. Published

    EPIC: Profiling the propagation and effect of data errors in software

    Hiller, M., Jhumka, A. & Suri, N., 1/05/2004, In: IEEE Transactions on Computers. 53, 5, p. 512-530 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    The customizable fault/error model for dependable distributed systems

    Walter, C. J. & Suri, N., 2/01/2003, In: Theoretical Computer Science. 290, 2, p. 1223-1251 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  95. Published

    Analyzing the Impact of Data Errors in Safety-Critical Control Systems

    Askerdal, Ö., Gäfvert, M., Hiller, M. & Suri, N., 2003, In: IEICE Transactions on Information and Systems. E86-D, 12, p. 2623-2633 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  96. Published

    Design of a parallel interconnect based on communication pattern considerations.

    Suri, N. & Mendelson, A., 2001, In: Parallel Algorithms Appl.. 16, 4, p. 243-271 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  97. Published

    Editorial: Special Section on Dependable Real-Time Systems

    Suri, N. & Ramamritham, K., 1999, In: IEEE Transactions on Parallel and Distributed Systems. 10, 6, p. 529-532 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    Formally Verified On-Line Diagnosis

    Walter, C. J., Lincoln, P. & Suri, N., 1997, In: IEEE Trans. Software Eng.. 23, 11, p. 684-721 38 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    Synchronization Issues in Real Time Systems

    Suri, N., Hugue, M. M. & Walter, C. J., 1994, In: Proceedings of the IEEE. 82, 1, p. 41-54 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Editorial
  101. Published

    IEEE Transactions on Dependable an Secure Computing: Editorial

    Gligor, V. D., Meadows, C. & Suri, N., 8/02/2008, In: IEEE Transactions on Dependable and Secure Computing. 5, 1, p. 4-5 2 p.

    Research output: Contribution to Journal/MagazineEditorial

  102. Other
  103. Published

    Model-based development of distributed embedded real-time systems with the DECOS tool-chain

    Herzner, W., Schlick, R., Schlager, M., Leiner, B., Huber, B., Balogh, A., Csertan, G., Leguennec, A., Lesergent, T., Suri, N. & Islam, S., 2007, SAE International, (SAE Techni. Paper.).

    Research output: Working paperOther

  104. Book
  105. Published

    Foreword from the QASA 2016 program chairs

    Aldini, A., Martinelli, F., Suri, N., G., L. (Editor), A., A. (Editor), V., T. (Editor), F., M. (Editor) & N., S., 2016, Springer.

    Research output: Book/Report/ProceedingsBook

  106. Published

    Data privacy management, autonomous spontaneous security, and security assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Garcia-Alfaro, J. (Editor), Herrera-Joancomartí, J. (Editor), Lupu, E. (Editor), Posegga, J. (Editor), Aldini, A. (Editor), Martinelli, F. (Editor) & Suri, N. (Editor), 2015, Springer. 343 p. (Lecture Notes in Computer Science)

    Research output: Book/Report/ProceedingsBook

  107. Proceedings
  108. Published

    Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

    Livraga, G. (Editor), Torra, V. (Editor), Aldini, A. (Editor), Martinelli, F. (Editor) & Suri, N. (Editor), 2016, Springer.

    Research output: Book/Report/ProceedingsProceedings

  109. Published
  110. Published

    Service Availability: Second International Service Availability Symposium, ISAS 2005, Berlin, Germany, April 25-26, 2005, Revised Selected Papers

    Malek, M. (Editor), Nett, E. (Editor) & Suri, N. (Editor), 2005, Springer.

    Research output: Book/Report/ProceedingsProceedings

Back to top