Home > Research > Researchers > Professor Neeraj Suri > Publications

Professor Neeraj Suri

Chair in Cyber Security

  1. 2015
  2. Published

    The impact of hypervisor scheduling on compromising virtualized environments

    Vateva-Gurova, T., Suri, N., Mendelson, A., Atzori, L. (ed.), Jin, X. (ed.), Jarvis, S. (ed.), Liu, L. (ed.), Calvo, R. A. (ed.), Hu, J. (ed.), Min, G. (ed.), Georgalas, N. (ed.) & Wu, Y. (ed.), 26/10/2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, p. 1910-1917 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking

    Tan, F., Wang, Y., Wang, Q., Bu, L. & Suri, N., 1/10/2015, In: IEEE Transactions on Parallel and Distributed Systems. 26, 10, p. 2630-2642 13 p., 6898840.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation

    Germanus, D., Ismail, H. & Suri, N., 28/09/2015, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 74-83 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Foreword from the QASA 2015 chairs

    Aldini, A., Martinelli, F., Suri, N., G., N-A. (ed.), A., A., F., M., N., S. & J., G-A. (ed.), 21/09/2015, Data Privacy Management, and Security Assurance: 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papers. Springer-Verlag, Vol. 9481. 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  6. Published

    On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms

    Piper, T., Winter, S., Suri, N. & Fuhrman, T. E., 7/09/2015, 2015 11th European Dependable Computing Conference (EDCC). IEEE, p. 85-96 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    GRINDER: On Reusability of Fault Injection Tools

    Winter, S., Piper, T., Schwahn, O., Natella, R., Suri, N. & Cotroneo, D., 23/05/2015, 2015 IEEE/ACM 10th International Workshop on Automation of Software Test. IEEE, p. 75-79 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    No PAIN, No Gain? The utility of parallel fault injections

    Winter, S., Schwahn, O., Natella, R., Suri, N., Cotroneo, D., J., K. (ed.) & U., Z. (ed.), 16/05/2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE, p. 494-505 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Leveraging the Potential of Cloud Security Service-Level Agreements through Standards

    Luna, J., Suri, N., Iorga, M. & Karmel, A., 1/05/2015, In: IEEE Cloud Computing. 2, 3, p. 32-40 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Mitigating timing error propagation in mixed-criticality automotive systems

    Piper, T., Winter, S., Schwahn, O., Bidarahalli, S. & Suri, N., 13/04/2015, 2015 IEEE 18th International Symposium on Real-Time Distributed Computing. IEEE, p. 102-109 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Data privacy management, autonomous spontaneous security, and security assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Garcia-Alfaro, J. (ed.), Herrera-Joancomartí, J. (ed.), Lupu, E. (ed.), Posegga, J. (ed.), Aldini, A. (ed.), Martinelli, F. (ed.) & Suri, N. (ed.), 2015, Springer. 343 p. (Lecture Notes in Computer Science)

    Research output: Book/Report/ProceedingsBook

  12. Published

    Error models for the representative injection of software defects

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 2015, Software-engineering and management. Assmann, U. (ed.). Gesellschaft für Informatik, p. 118-119 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  13. Published

    Foreword from the QASA 2014 program chairs

    Aldini, A., Martinelli, F., Suri, N., J., P. (ed.), N., S., E., L. (ed.), J., H-J. (ed.), J., G-A., F., M. & A., A., 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Springer-Verlag, Vol. 8872. 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  14. Published

    In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services

    Pellegrino, G., Balzarotti, D., Winter, S. & Suri, N., 2015. 16 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  15. Published

    On the feasibility of side-channel attacks in a virtualized environment

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 2015, E-Business and Telecommunications: 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers. Springer-Verlag, Vol. 554. p. 319-339 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  16. Published

    PBMC: Symbolic slicing for the verification of concurrent programs

    Saissi, H., Bokor, P. & Suri, N., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer-Verlag, Vol. 9364. p. 344-360 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  17. Published

    Technical implementation and feasibility

    Mikkelsen, G. L., Damgård, K., Guldager, H., Jensen, J. L., Luna, J. G., Nielsen, J. D., Paillier, P., Pellegrino, G., Stausholm, M. B., Suri, N. & Zhang, H., 2015, Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, p. 255-318 64 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  18. 2014
  19. Published

    Event pattern discovery on IDS traces of cloud services

    Huang, S-Y., Huang, Y. & Suri, N., 3/12/2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. IEEE, p. 25-32 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Assessing the security of internet-connected critical infrastructures

    Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G. & Clarke, J., 1/12/2014, In: Security and Communication Networks. 7, 12, p. 2713-2725 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Robust and real-time communication on heterogeneous networks for smart distribution grid

    Demir, K., Germanus, D. & Suri, N., 3/11/2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 386-391 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Mitigating eclipse attacks in peer-to-peer networks

    Germanus, D., Roos, S., Strufe, T. & Suri, N., 29/10/2014, 2014 IEEE Conference on Communications and Network Security. Springer-Verlag, p. 400-408 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 28/08/2014, 2014 11th International Conference on Security and Cryptography (SECRYPT). IEEE, p. 113-124 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Practical use of formal verification for safety critical cyber-physical systems: A case study

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 25/08/2014, 2014 IEEE International Conference on Cyber-Physical Systems, Networks, and Applications. IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    An empirical study of injected versus actual interface errors

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 21/07/2014, Proceedings of the 2014 International Symposium on Software Testing and Analysis. ACM, p. 397-408 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Agile sink selection in wireless sensor networks

    Mahmudimanesh, M. & Suri, N., 30/06/2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, p. 390-398 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Efficient agile sink selection in wireless sensor networks based on compressed sensing

    Mahmudimanesh, M., Naseri, A. & Suri, N., 26/05/2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems. IEEE, p. 193-200 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Robust compressive data gathering in wireless sensor networks with linear topology

    Mahmudimanesh, M. & Suri, N., 26/05/2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems. IEEE, p. 179-186 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    WiP abstract: A framework on profiling cross-domain noise propagation in control CPS

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 14/04/2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS). IEEE, p. 224 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    SecLA-based negotiation and brokering of cloud resources

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & De Benedictis, A., 2014, Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Springer-Verlag, Vol. 453. p. 1-18 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  32. Published

    Towards a framework for benchmarking privacy-ABC technologies

    Veseli, F., Vateva-Gurova, T., Krontiris, I., Rannenberg, K. & Suri, N., 2014, IFIP Advances in Information and Communication Technology: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer New York LLC, Vol. 428. p. 197-204 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  33. Published

    User-centric security assessment of software configurations: A case study

    Ghani, H., Luna Garcia, J., Petkov, I. & Suri, N., 2014, Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Springer-Verlag, Vol. 8364 LNCS. p. 196-212 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. 2013
  35. Published

    Security as a service using an SLA-based approach via SPECS

    Rak, M., Suri, N., Luna, J., Petcu, D., Casola, V. & Villano, U., 2/12/2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    GMTC: A generalized commit approach for hybrid mobile environments

    Ayari, B., Khelil, A. & Suri, N., 1/12/2013, In: IEEE Transactions on Mobile Computing. 12, 12, p. 2399-2411 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    PoWerStore: Proofs of writing for efficient and robust storage

    Dobre, D., Karame, G., Li, W., Majuntke, M., Suri, N. & Vukolić, M., 4/11/2013, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, p. 285-297 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    Predictive vulnerability scoring in the context of insufficient information availability

    Ghani, H., Luna, J., Khelil, A., Alkadri, N. & Suri, N., 23/10/2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Quantitative assessment of software vulnerabilities based on economic-driven security metrics

    Ghani, H., Luna, J. & Suri, N., 23/10/2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Coral: Reliable and low-latency P2P convergecast for critical sensor data collection

    Germanus, D., Khelil, A., Schwandke, J. & Suri, N., 21/10/2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 300-305 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Efficient verification of distributed protocols using stateful model checking

    Saissi, H., Bokor, P., Muftuoglu, C. A., Suri, N. & Serafini, M., 30/09/2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems. IEEE, p. 133-142 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach

    Tan, F., Wang, Y., Wang, Q., Bu, L., Zheng, R. & Suri, N., 24/06/2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    SimFI: From single to simultaneous software fault injections

    Winter, S., Tretter, M., Sattler, B. & Suri, N., 24/06/2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Information quality aware co-design of sampling and transport in wireless sensor networks

    Sachidananda, V., Khelil, A., Noack, D. & Suri, N., 23/04/2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Trading transport timeliness and reliability for efficiency in wireless sensor networks

    Sachidananda, V., Khelil, A., Umap, D., Majuntke, M. & Suri, N., 10/04/2013, 2013 10th IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC). I. B. Tauris, p. 720-727 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Sampling and transport co-design in Wireless Sensor Networks

    Sachidananda, V., Khelil, A., Noack, D. & Suri, N., 18/03/2013, 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS). IEEE, p. 98-100 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Negotiating and brokering Cloud resources based on Security Level Agreements

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & Liccardo, L., 2013, Proceedings of the 3rd International Conference on Cloud Computing and Services Science - Volume 1. SciTePress, p. 533-541 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. 2012
  49. Published

    Benchmarking cloud security level agreements using quantitative policy trees

    Luna, J., Langenberg, R. & Suri, N., 19/10/2012, Proceedings of the 2012 ACM Workshop on Cloud computing security workshop. ACM, p. 103-112 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Privacy-by-design based on quantitative threat modeling

    Luna, J., Suri, N. & Krontiris, I., 10/10/2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Balanced spatio-temporal compressive sensing for multi-hop wireless sensor networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 8/10/2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012). IEEE, p. 389-397 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  52. Published

    Susceptibility analysis of structured P2P systems to localized eclipse attacks

    Germanus, D., Langenberg, R., Khelil, A. & Suri, N., 8/10/2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems. IEEE, p. 11-20 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Trust & security RTD in the internet of things: Opportunities for international cooperation

    Clarke, J., Sharma, A., Suri, N., Castro, R. R. & Lopez, J., 17/08/2012, Proceedings of the First International Conference on Security of Internet of Things. ACM, p. 172-178 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    Instrumenting AUTOSAR for dependability assessment: A guidance framework

    Piper, T., Winter, S., Manns, P. & Suri, N., 25/06/2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    DKM: Distributed k-connectivity maintenance in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 9/01/2012, 2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS). IEEE, p. 83-90 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    Brief announcement: MP-state: State-aware software model checking of message-passing systems

    Muftuoglu, C. A., Bokor, P. & Suri, N., 2012, Stabilization, Safety, and Security of Distributed Systems: 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings. Vol. 7596 LNCS. p. 183-186 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  57. Published

    Compressive sensing for wireless sensor networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 2012, Intelligent Sensor Networks: The Integration of Sensor Networks, Signal Processing and Machine Learning. CRC Press, p. 379-396 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  58. Published

    Efficient predictive monitoring of wireless sensor networks

    Ali, A., Khelil, A., Shaikh, F. K. & Suri, N., 2012, In: International Journal of Autonomous and Adaptive Communications Systems. 5, 3, p. 233-254 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    Monitoring and evaluation of semantic rooms

    Gönczy, L., Csertán, G., Urbanics, G., Ghani, H., Khelil, A. & Suri, N., 2012, Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware. Springer Berlin / Heidelberg, p. 99-116 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  60. Published

    Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, Hollywood, CA, USA, October 7, 2012

    Freedman, M. J. (ed.) & Suri, N. (ed.), 2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  61. Published

    Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    Khelil, A., Germanus, D. & Suri, N., 2012, Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer, Vol. 7130. p. 177-196 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  62. Published

    Quantitative assessment of Cloud Security Level Agreements: A case study

    Luna, J., Ghani, H., Vateva, T. & Suri, N., 2012, Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, 2012, Rome, Italy. SciTePress, p. 64-73 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    Security issues in cloud federations

    Rak, M., Ghani, H., Ficco, M., Suri, N., Luna, J., Panica, S. & Petcu, D., 2012, Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice. IGI Global, p. 176-194 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  64. Published
  65. 2011
  66. Published

    Assessing the comparative effectiveness of map construction protocols in wireless sensor networks

    Khelil, A., Chang, H. & Suri, N., 17/11/2011, 30th IEEE International Performance Computing and Communications Conference. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    Supporting domain-specific state space reductions through local partial-order reduction

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 6/11/2011, 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011). IEEE, p. 113-122 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    An adaptive and composite spatio-temporal data compression approach for wireless sensor networks

    Ali, A., Khelil, A., Szczytowski, P. & Suri, N., 31/10/2011, Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems. ACM, p. 67-76 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  69. Published

    MWM: A map-based world model for wireless sensor networks

    Khelil, A., Shaikh, F. K., Ayari, B. & Suri, N., 23/09/2011, Autonomics: 2nd International ICST Conference on Autonomic Computing and Communication Systems. EUDL, 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  70. Published

    On the design of perturbation-resilient atomic commit protocols for mobile transactions

    Ayari, B., Khelil, A. & Suri, N., 1/08/2011, In: ACM Transactions on Computer Systems. 29, 3, 7.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    A security metrics framework for the Cloud

    Luna, J., Ghani, H., Germanus, D. & Suri, N., 18/07/2011, Proceedings of the International Conference on Security and Cryptography 2011. IEEE, p. 245-250 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Building a long term strategy for international collaboration in trustworthy ICT: Security, privacy and trust in global networks and services

    Clarke, J., Suri, N., Riguidel, M. & Pasic, A., 6/07/2011, 2011 First SysSec Workshop. IEEE, p. 90-93 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    Reliable congestion-aware information transport in wireless sensor networks

    Shaikh, F. K., Khelil, A., Ali, A. & Suri, N., 1/07/2011, In: International Journal of Communication Networks and Distributed Systems. 7, 1-2, p. 135-152 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  74. Published

    Efficient model checking of fault-tolerant distributed protocols

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 27/06/2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN). IEEE, p. 73-84 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    TOM: Topology oriented maintenance in sparse Wireless Sensor Networks

    Szczytowski, P., Khelil, A., Ali, A. & Suri, N., 27/06/2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, p. 548-556 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    The complexity of robust atomic storage

    Dobre, D., Guerraoui, R., Majuntke, M., Suri, N. & Vukolić, M., 6/06/2011, PODC '11 Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing. ACM, p. 59-68 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    The impact of fault models on software robustness evaluations

    Winter, S., Sârbu, C., Suri, N. & Murphy, B., 21/05/2011, Proceedings of the 33rd International Conference on Software Engineering . ACM, p. 51-60 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    Application-level diagnostic and membership protocols for generic time-triggered systems

    Serafini, M., Bokor, P., Suri, N., Vinter, J., Ademaj, A., Brandstätter, W., Tagliabo, F. & Koch, J., 1/03/2011, In: IEEE Transactions on Dependable and Secure Computing. 8, 2, p. 177-193 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  79. Published

    Enhancing FPGA robustness via generic monitoring IP cores

    Biedermann, A., Piper, T., Patzina, L., Patzina, S., Huss, S. A., Schürr, A. & Suri, N., 2011, Proceedings of the 1st International Conference on Pervasive and Embedded Computing and Communication Systems - Volume 1: PECCS, 2011, Vilamoura, Algarve, Portugal. SciTePress, p. 379-386 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    Fork-consistent constructions from registers

    Majuntke, M., Dobre, D., Cachin, C. & Suri, N., 2011, Principles of Distributed Systems: 15th International Conference, OPODIS 2011, Toulouse, France, December 13-16, 2011. Proceedings. Vol. 7109 LNCS. p. 283-298 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  81. Published

    Wireless Sensor Cooperation for a Sustainable Quality of Information

    Khelil, A., Reinl, C., Ayari, B., Shaikh, F. K., Szczytowski, P., Ali, A. & Suri, N., 2011, Pervasive Computing and Networking. John Wiley and Sons, p. 71-100 30 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  82. 2010
  83. Published

    Leveraging the next-generation power grid: Data sharing and associated partnerships

    Germanus, D., Dionysiou, I., Gjermundrød, H., Khelil, A., Suri, N., Bakken, D. E. & Hauser, C., 11/10/2010, 2010 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    A software integration approach for designing and assessing dependable embedded systems

    Suri, N., Jhumka, A., Hiller, M., Pataricza, A., Islam, S. & Sârbu, C., 1/10/2010, In: Journal of Systems and Software. 83, 10, p. 1780-1800 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  85. Published

    Profiling the operational behavior of OS device drivers

    Sârbu, C., Johansson, A., Suri, N. & Nagappan, N., 1/08/2010, In: Empirical Software Engineering. 15, 4, p. 380-422 43 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    Eventually linearizable shared objects

    Serafini, M., Dobre, D., Majuntke, M., Bokor, P. & Suri, N., 25/07/2010, PODC '10 Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing. ACM, p. 95-104 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published

    Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicas

    Serafini, M., Bokor, P., Dobre, D., Majuntke, M. & Suri, N., 28/06/2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN). IEEE, p. 353-362 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    LEHP: Localized energy hole profiling in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 22/06/2010, The IEEE symposium on Computers and Communications. IEEE, p. 100-106 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    ASample: Adaptive spatial sampling in Wireless Sensor Networks

    Szczytowski, P., Khelil, A. & Suri, N., 7/06/2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, p. 35-42 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Published

    Generic information transport for wireless sensor networks

    Shaikh, F. K., Khelil, A., Ayari, B., Szczytowski, P. & Suri, N., 7/06/2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. ACM, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    Reordering for better compressibility: Efficient spatial sampling in Wireless Sensor Networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 7/06/2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, p. 50-57 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    Data-based agreement for inter-vehicle coordination

    Ayari, B., Khelil, A., Saffar, K. & Suri, N., 23/05/2010, 2010 Eleventh International Conference on Mobile Data Management. IEEE, p. 279-280 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    ParTAC: A Partition-Tolerant Atomic Commit protocol for MANETs

    Ayari, B., Khelil, A. & Suri, N., 23/05/2010, 2010 Eleventh International Conference on Mobile Data Management. IEEE, p. 135-144 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published

    HP: Hybrid paxos for WANs

    Dobre, D., Majuntke, M., Serafini, M. & Suri, N., 28/04/2010, 2010 European Dependable Computing Conference. IEEE, p. 117-126 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Using underutilized CPU resources to enhance its reliability

    Timor, A., Mendelson, A., Birk, Y. & Suri, N., 1/01/2010, In: IEEE Transactions on Dependable and Secure Computing. 7, 1, p. 94-109 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  96. Published

    A pre-injection analysis for identifying fault-injection tests for protocol validation

    Suri, N. & Sinha, P., 2010, In: Journal of Software. 5, 10, p. 1144-1161 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  97. Published

    Increasing the resilience of critical SCADA systems using peer-to-peer overlays

    Germanus, D., Khelil, A. & Suri, N., 2010, Architecting Critical Systems: First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings. Springer, Vol. 6150 LNCS. p. 161-178 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  98. Published

    INDEXYS, a logical step beyond GENESYS

    Eckel, A., Milbredt, P., Al-Ars, Z., Schneele, S., Vermeulen, B., Csertán, G., Scheerer, C., Suri, N., Khelil, A., Fohler, G., Obermaisser, R. & Fidi, C., 2010, Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings. Springer, Vol. 6351 LNCS. p. 431-451 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  99. Published

    MPM: Map based Predictive Monitoring for Wireless Sensor Networks

    Ali, A., Khelil, A., Shaikh, F. K. & Suri, N., 2010, Autonomic Computing and Communications Systems: Third International ICST Conference, Autonomics 2009, Limassol, Cyprus, September 9-11, 2009, Revised Selected Papers. Springer, Vol. 23 LNICST. p. 79-95 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  100. Published

    On efficient models for model checking message-passing distributed protocols

    Bokor, P., Serafini, M. & Suri, N., 2010, Formal Techniques for Distributed Systems: Joint 12th IFIP WG 6.1 International Conference, FMOODS 2010 and 30th IFIP WG 6.1 International Conference, FORTE 2010, Amsterdam, The Netherlands, June 7-9, 2010. Proceedings. Springer, Vol. 6117 LNCS. p. 216-223 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  101. Published

    Quality of information in wireless sensor networks: A survey

    Sachidananda, V., Khelil, A. & Suri, N., 2010.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  102. Published

    Towards benchmarking of P2P technologies from a SCADA systems protection perspective

    Khelil, A., Jeckel, S., Germanus, D. & Suri, N., 2010, Mobile Lightweight Wireless Systems: Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. Springer, Vol. 45 LNICST. p. 400-414 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  103. Published

    TRCCIT: Tunable reliability with congestion control for information transport in wireless sensor networks

    Shaikh, F. K., Khelil, A., Ali, A. & Suri, N., 2010. 9 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  104. 2009
  105. Published

    Low-latency access to robust amnesic storage

    Dobre, D., Majuntke, M. & Suri, N., 15/09/2009, LADIS '08 Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware. ACM, 3 p. 12

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  106. Published

    MAP-based modeling and design of wireless sensor networks with OMNeT++

    Szczytowski, P., Khelil, A. & Suri, N., 13/07/2009, 2009 International Symposium on Performance Evaluation of Computer & Telecommunication Systems. IEEE, p. 162-169 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  107. Published

    On equivalence partitioning of code paths inside OS kernel components

    Sârbu, C., Nagappan, N. & Suri, N., 17/03/2009, 2009 Software Technologies for Future Dependable Distributed Systems. IEEE, p. 17-19 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top