Home > Research > Researchers > Professor Neeraj Suri > Publications

Professor Neeraj Suri

Chair in Cyber Security

  1. 2024
  2. Forthcoming

    Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/02/2024, (Accepted/In press) In: IEEE Transactions on Cloud Computing.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. 2023
  4. Published

    RAFL: A Robust and Adaptive Federated Meta-Learning Framework Against Adversaries

    Yu, Z., Lu, Y. & Suri, N., 1/11/2023, 2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems (MASS). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Replication: 20 Years of Inferring Interdomain Routing Policies

    Kastanakis, S., Giotsas, V., Livadariu, I. & Suri, N., 24/10/2023, p. 16-29. 14 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  6. Published

    Compilation as a Defense: Enhancing DL Model Attack Robustness via Tensor Optimization

    Trawicki, S., Hackett, W., Birch, L., Suri, N. & Garraghan, P., 20/10/2023. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  7. Published

    Model Leeching: An Extraction Attack Targeting LLMs

    Birch, L., Hackett, W., Trawicki, S., Suri, N. & Garraghan, P., 20/10/2023.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  8. Forthcoming

    Fuzzy Detectors Against Adversarial Attacks

    Li, Y., Angelov, P. & Suri, N., 15/09/2023, (Accepted/In press) IEEE Symposium Series on Computational Intelligence. Mexico, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph

    Lu, Y., Yu, Z. & Suri, N., 31/08/2023, In: ACM Transactions on Privacy and Security. 26, 3, p. 1-39 39 p., 33.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Domain Generalization and Feature Fusion for Cross-domain Imperceptible Adversarial Attack Detection

    Li, Y., Angelov, P. & Suri, N., 2/08/2023, 2023 International Joint Conference on Neural Networks (IJCNN). Gold Coast, Australia: IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    The influence of geopolitics on polar research – Options for HM Government

    Germond, B. & Suri, N., 8/06/2023

    Research output: Exhibits, objects and web-based outputsBlog

  12. Published
  13. Forthcoming

    Federated Meta Learning for Visual Navigation in GPS-denied Urban Airspace

    Yuksek, B., Yu, Z., Suri, N. & Inalhan, G., 22/04/2023, (Accepted/In press).

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  14. Published

    PPFM: An Adaptive and Hierarchical Peer-to-Peer Federated Meta-Learning Framework

    Yu, Z., Lu, Y., Angelov, P. & Suri, N., 29/03/2023, 2022 18th International Conference on Mobility, Sensing and Networking (MSN). IEEE, p. 502-509 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Cloud Security Requirement Based Threat Analysis

    Taha, A., Lawall, A. & Suri, N., 23/03/2023, 2023 International Conference on Computing, Networking and Communications, ICNC 2023. Institute of Electrical and Electronics Engineers Inc., p. 506-510 5 p. (2023 International Conference on Computing, Networking and Communications, ICNC 2023).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Similarity-based Deep Neural Network to Detect Imperceptible Adversarial Attacks

    Almeida Soares, E., Angelov, P. & Suri, N., 30/01/2023, Proceedings of the 2022 IEEE Symposium Series on Computational Intelligence, SSCI 2022. Ishibuchi, H., Kwoh, C-K., Tan, A-H., Srinivasan, D., Miao, C., Trivedi, A. & Crockett, K. (eds.). IEEE, p. 1028-1035 8 p. (Proceedings of the 2022 IEEE Symposium Series on Computational Intelligence, SSCI 2022).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Specifying Autonomous System Behaviour

    Sogokon, A., Yuksek, B., Inalhan, G. & Suri, N., 2023, In: CoRR. abs/2302.10087

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. 2022
  19. Published

    A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems

    Chuah, E., Jhumka, A., Malek, M. & Suri, N., 29/12/2022, In: IEEE Access. 10, p. 133487-133503 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Towards Effective Performance Fuzzing

    Chen, Y., Bradbury, M. & Suri, N., 26/12/2022, 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, p. 128-129 2 p. (Proceedings - 2022 IEEE International Symposium on Software Reliability Engineering Workshops, ISSREW 2022).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    SlowCoach: Mutating Code to Simulate Performance Bugs

    Chen, Y., Schwahn, O., Natella, R., Bradbury, M. & Suri, N., 21/12/2022, 33rd IEEE International Symposium on Software Reliability Engineering. New York: IEEE, p. 274-285 12 p. (2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Yin, H. & Stavrou, A. (eds.). New York: ACM, p. 3415-3417 3 p. (Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Poster: Multi-Layer Threat Analysis of the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, p. 3419-3421. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  24. Published

    Understanding the confounding factors of inter-domain routing modeling

    Kastanakis, S., Giotsas, V. & Suri, N., 25/10/2022, IMC 2022 - Proceedings of the 2022 ACM Internet Measurement Conference. New York: ACM, p. 758-759 2 p. (Proceedings of the 22nd ACM Internet Measurement Conference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph

    Lu, Y., Yu, Z. & Suri, N., 1/10/2022, In: arXiv. abs/2210.00325, 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    ThreatPro: Multi-Layer Threat Analysis in the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 29/09/2022, In: arXiv. abs/2209.14795, 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Pinch: An Adversarial Extraction Attack Framework for Deep Learning Models

    Hackett, W., Trawicki, S., Yu, Z., Suri, N. & Garraghan, P., 13/09/2022, In: arXiv.

    Research output: Contribution to Journal/MagazineJournal article

  28. Published

    PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models.

    Hackett, W., Trawicki, S., Yu, Z., Suri, N. & Garraghan, P., 13/09/2022, In: arXiv. abs/2209.06300, 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    Challenges in Identifying Network Attacks Using Netflow Data

    Chuah, E., Suri, N., Jhumka, A. & Alt, S., 31/01/2022, 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. 2021
  31. Published

    Failure Diagnosis for Cluster Systems using Partial Correlations

    Chuah, E., Jhumka, A., Alt, S., Evans, R. T. & Suri, N., 22/12/2021, 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom). IEEE, p. 1091-1101 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    PCaaD: Towards automated determination and exploitation of industrial systems

    Green, B., Derbyshire, R., Krotofil, M., Knowles, W., Prince, D. & Suri, N., 30/11/2021, In: Computers and Security. 110, 19 p., 102424.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    Fast Kernel Error Propagation Analysis in Virtualized Environments

    Coppik, N., Darmstadt, TU. & Suri, N., 24/05/2021, 2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST). IEEE, p. 159-170 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. 2020
  35. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 31/10/2020, In: International Journal on Software Tools for Technology Transfer. 22, p. 565-581 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    TraceSanitizer - Eliminating the Effects of Non-Determinism on Error Propagation Analysis.

    Saissi, H., Winter, S., Schwahn, O., Pattabiraman, K. & Suri, N., 25/06/2020, 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, p. 52-63 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Trace Sanitizer: Eliminating the Effects of Non-Determinism of Error Propagation Analysis

    Saissi, H., Winter, S., Schwahn, O., Pattabiraman, K. & Suri, N., 23/06/2020, 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure

    Taha, A., Zakaria, A., Kim, D. & Suri, N., 19/05/2020, 2020 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 134-143 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Time-critical fog computing for vehicular networks

    Chebaane, A., Khelil, A. & Suri, N., 5/05/2020, Fog Computing: Theory and Practice. Zomaya, A., Abbas, A. & Khan, S. (eds.). London: Wiley, p. 431-458 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  40. Published

    Gyro: A Modular Scale-Out Layer for Single-Server DBMSs

    Suri, N., 30/03/2020, 2019 38th Symposium on Reliable Distributed Systems (SRDS). Lyon, France, Vol. 2019. p. 71-82 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 1/03/2020, In: IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. 2019
  43. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 2/10/2019, Model Checking Software: 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings. Springer, p. 153-171 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  44. Published

    Analyzing and improving customer-side cloud security certifiability

    Zhao, S., Chen, Y., Winter, S. & Suri, N., 1/10/2019, Proceedings - 2019 IEEE 30th International Symposium on Software Reliability Engineering Workshops, ISSREW 2019. p. 300-307 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Distributed Systems Security

    Suri, N., 1/10/2019, CyBOK Knowledge Base. Lupu, E. (ed.). Bristol: University of Bristol, p. 38

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  46. Inferring Performance Bug Patterns from Developer Commits

    Chen, Y., Winter, S. & Suri, N., 17/07/2019, Proceedings - 2019 IEEE 30th International Symposium on Software Reliability Engineering, ISSRE 2019. Wolter, K., Schieferdecker, I., Gallina, B., Cukier, M., Natella, R., Ivaki, N. & Laranjeiro, N. (eds.). IEEE Computer Society Press, p. 70-81 12 p. 8987574. (Proceedings - International Symposium on Software Reliability Engineering, ISSRE; vol. 2019-October).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Assessing the state and improving the art of parallel testing for C

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 15/07/2019, ISSTA 2019 Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, p. 123-133 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Security Requirements Engineering in Safety-Critical Railway Signalling Networks.

    Heinrich, M., Vateva-Gurova, T., Arul, T., Katzenbeisser, S., Suri, N., Birkholz, H., Fuchs, A., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Tverdyshev, S. & Schlehuber, C., 14/07/2019, In: Security and Communication Networks. 2019, 14 p., 8348925.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    CIPSEC-enhancing critical infrastructure protection with innovative security framework

    Álvarez, A., Trapero, R., Guilhot, D., García-Mila, I., Hernandez, F., Marín-Tordera, E., Forne, J., Masip-Bruin, X., Suri, N., Heinrich, M., Katzenbeisser, S., Athanatos, M., Ioannidis, S., Kallipolitis, L., Spais, I., Fournaris, A. & Lampropoulos, K., 30/06/2019, Challenges in Cybersecurity and Privacy: the European Research Landscape. River Publishers, p. 129-148 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  50. Published

    MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems

    Demir, K., Nayyer, F. & Suri, N., 1/06/2019, In: International Journal of Critical Infrastructure Protection. 25, p. 84-101 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    Proofs of Writing for Robust Storage

    Dobre, D., Karame, G., Li, W., Majuntke, M., Suri, N. & Vukolic, M., 27/05/2019, In: IEEE Transactions on Parallel and Distributed Systems. 30, 11, p. 2547-2566 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    MemFuzz: Using memory accesses to guide fuzzing

    Coppik, N., Schwahn, O. & Suri, N., 24/04/2019, 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). IEEE, p. 48-58 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    InfoLeak: Scheduling-based information leakage

    Vateva-Gurova, T., Manzoor, S., Huang, Y. & Suri, N., 11/02/2019, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 44-53 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (ed.) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  55. Published

    Threat Modeling the Cloud: An Ontology Based Approach

    Manzoor, S., Vateva-Gurova, T., Trapero, R. & Suri, N., 30/01/2019, IOSec 2018: Information and Operational Technology Security Systems . Fournaris, A., Lampropoulos, K. & Marin Tordera, E. (eds.). Cham: Springer-Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science; vol. 11398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    Distributed Systems Security Knowledge Area: Issue 1.0

    Suri, N., 2019, The Cyber Security Body of Knowledge . Lupu, E. (ed.). University of Bristol, 38 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  58. 2018
  59. Published

    Exploring the relationship between dimensionality reduction and private data release

    Tai, B-C., Li, S-C., Huang, Y., Suri, N. & Wang, P-C., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 25-33 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    FastFI: Accelerating software fault injections

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 193-202 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    On the detection of side-channel attacks

    Vateva-Gurova, T. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 185-186 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Securing the cloud-assisted smart grid

    Demir, K., Ismail, H., Vateva-Gurova, T. & Suri, N., 1/12/2018, In: International Journal of Critical Infrastructure Protection. 23, p. 100-111 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  63. Published

    How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code

    Schwahn, O., Winter, S., Coppik, N. & Suri, N., 1/11/2018, In: IEEE Transactions on Dependable and Secure Computing. 15, 6, p. 945-958 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  64. Published

    Flashlight: A novel monitoring path identification schema for securing cloud services

    Zhang, H., Luna, J., Suri, N. & Trapero, R., 27/08/2018, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, 10 p. 5

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems

    Birkholz, H., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Arul, T., Heinrich, M., Katzenbeisser, S., Suri, N., Vateva-Gurova, T. & Schlehuber, C., 25/06/2018. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  67. Published

    Whetstone: Reliable monitoring of cloud services

    Zhang, H., Luna, J., Trapero, R. & Suri, N., 18/06/2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, p. 115-122 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

    Ismail, H., Roos, S. & Suri, N., 12/06/2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  69. Published

    Message from the IC2E 2018 General Chairs

    Hua, K. A., Suri, N., J., L. (ed.), A., C. (ed.), T., G. (ed.) & Y., C. (ed.), 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. xiii 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  70. Published

    Monitoring path discovery for supporting indirect monitoring of cloud services

    Zhang, H., Manzoor, S., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 274-277 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    Threat modeling and analysis for the cloud ecosystem

    Manzoor, S., Zhang, H., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 278-281 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. 2017
  73. Published

    Quick verification of concurrent programs by iteratively relaxed scheduling

    Metzler, P., Saissi, H., Bokor, P., Suri, N., T.N., N. (ed.), G., R. (ed.) & M., D. P. (ed.), 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 776-781 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    TrEKer: Tracing error propagation in operating system kernels

    Coppik, N., Schwahn, O., Winter, S., Suri, N., T.N., N. (ed.), G., R. & M., D. P., 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 377-387 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    C'MON: Monitoring the compliance of cloud services to contracted properties

    Alboghdady, S., Winter, S., Taha, A., Zhang, H. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 6 36

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    Towards DDoS attack resilient wide area monitoring systems

    Demir, K. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, 7 p. 99

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    A security architecture for railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S., Suri, N., Bitsch, F. (ed.), Tonetta, S. (ed.) & Schoitsch, E. (ed.), 17/08/2017, Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings. Springer-Verlag, Vol. 10488 LNCS. p. 320-328 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    Safety verification utilizing model-based development for safety critical cyber-physical systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 15/08/2017, In: Journal of Information Processing Systems. 25, p. 797-810 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  79. Published

    A novel approach to manage cloud security SLA incidents

    Trapero, R., Modic, J., Stopar, M., Taha, A. & Suri, N., 1/07/2017, In: Future Generation Computer Systems. 72, p. 193-205 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  80. Published

    Quantitative Reasoning about Cloud Security Using Service Level Agreements

    Luna, J., Taha, A., Trapero, R. & Suri, N., 1/07/2017, In: IEEE Transactions on Cloud Computing. 5, 3, p. 457-471 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

    Manzoor, S., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 499-502 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    DeQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services

    Zhang, H., Trapero, R., Luna, J., Suri, N., X., L. & U., B., 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    SLA-Based Service Selection for Multi-Cloud Environments

    Taha, A., Manzoor, S., Suri, N., A.M., G. (ed.) & M., L. (ed.), 25/06/2017, 2017 IEEE International Conference on Edge Computing (EDGE). IEEE, p. 65-72 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Challenges and approaches in securing safety-relevant railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S. & Suri, N., 26/04/2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 139-145 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  86. Published

    IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants

    Chan, A., Winter, S., Saissi, H., Pattabiraman, K. & Suri, N., 13/03/2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). IEEE, p. 184-195 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published

    P2P routing table poisoning: A quorum-based sanitizing approach

    Ismail, H., Germanus, D. & Suri, N., 1/03/2017, In: Computers and Security. 65, p. 283-299 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  88. Published

    SeReCP: A secure and reliable communication platform for the smart grid

    Demir, K., Suri, N., M., K. (ed.), D.S., K. (ed.) & V., V. (ed.), 22/01/2017, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 175-184 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    Robust QoS-aware communication in the smart distribution grid

    Demir, K., Germanus, D. & Suri, N., 1/01/2017, In: Peer-to-Peer Networking and Applications. 10, 1, p. 193-207 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  90. 2016
  91. Published

    Malicious peers eviction for P2P overlays

    Ismail, H., Germanus, D. & Suri, N., 17/10/2016, 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, p. 216-224 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    Efficient verification of program fragments: Eager POR

    Metzler, P., Saissi, H., Bokor, P., Hess, R., Suri, N., Artho, C. (ed.), Peled, D. (ed.) & Legay, A. (ed.), 22/09/2016, Automated Technology for Verification and Analysis: 14th International Symposium, ATVA 2016, Chiba, Japan, October 17-20, 2016, Proceedings. Springer-Verlag, Vol. 9938 LNCS. p. 375-391 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    Novel efficient techniques for real-time cloud security assessment

    Modic, J., Trapero, R., Taha, A., Luna, J., Stopar, M. & Suri, N., 1/09/2016, In: Computers and Security. 62, p. 1-18 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    Practical Formal Verification for Model Based Development of Cyber-Physical Systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Reliable Memory Efficient Name Forwarding in Named Data Networking

    Saxena, D., Raychoudhury, V., Becker, C. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 48-55 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    SENTRY: A novel approach for mitigating application layer DDoS threats

    Zhang, H., Taha, A., Trapero, R., Luna, J. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 465-472 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    Trust validation of cloud IaaS: A customer-centric approach

    Manzoor, S., Taha, A. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 97-104 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  98. Published

    Run Time Application Repartitioning in Dynamic Mobile Cloud Environments

    Yang, L., Cao, J., Tang, S., Han, D. & Suri, N., 1/07/2016, In: IEEE Transactions on Cloud Computing. 4, 3, p. 336-348 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    Quantifiably Trusting the Cloud: Putting Metrics to Work

    Trapero, R., Luna, J. & Suri, N., 1/06/2016, In: IEEE Security and Privacy Magazine. 14, 3, p. 73-77 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    Identifying and utilizing dependencies across cloud security services

    Taha, A., Metzler, P., Trapero, R., Luna, J. & Suri, N., 30/05/2016, ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, p. 329-340 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  101. Published

    On choosing server-or client-side solutions for BFT

    Platania, M., Obenshain, D., Tantillo, T., Amir, Y. & Suri, N., 1/05/2016, In: ACM Computing Surveys. 48, 4, 30 p., 61.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  102. Published

    Named Data Networking: A survey

    Saxena, D., Raychoudhury, V., Suri, N., Becker, C. & Cao, J., 28/02/2016, In: Computer Science Review. 19, p. 15-55 41 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  103. Published

    FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes

    Ali, A., Khelil, A. & Suri, N., 7/01/2016, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, p. 140-145 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  104. Published

    Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

    Livraga, G. (ed.), Torra, V. (ed.), Aldini, A. (ed.), Martinelli, F. (ed.) & Suri, N. (ed.), 2016, Springer.

    Research output: Book/Report/ProceedingsProceedings

  105. Published

    Delay tolerant monitoring of mobility-assisted WSN

    Khelil, A., Shaikh, F. K., Ali, A., Suri, N. & Reinl, C., 2016, Delay Tolerant Networks: Protocols and Applications. Vasilakos, A. V. (ed.). CRC Press, p. 189-221 33 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  106. Published

    Foreword from the QASA 2016 program chairs

    Aldini, A., Martinelli, F., Suri, N., G., L. (ed.), A., A. (ed.), V., T. (ed.), F., M. (ed.) & N., S., 2016, Springer.

    Research output: Book/Report/ProceedingsBook

  107. 2015
  108. Published

    Detecting and mitigating P2P eclipse attacks

    Ismail, H., Germanus, D. & Suri, N., 14/12/2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 224-231 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  109. Published

    Adaptive hybrid compression for wireless sensor networks

    Ali, A., Khelil, A., Suri, N. & Mahmudimanesh, M., 1/12/2015, In: ACM Transactions on Sensor Networks. 11, 4, 36 p., 53.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  110. Published

    Assessing privacy capabilities of cloud service providers

    Del Alamo, J. M., Trapero, R., Martin, Y. S., Yelmo, J. C. & Suri, N., 1/11/2015, In: IEEE Latin America Transactions. 13, 11, p. 3634-3641 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 Next

Back to top