Home > Research > Researchers > Professor Neeraj Suri > Publications

Professor Neeraj Suri

Distinguished Professor in Cyber Security, Distinguished Professor & Chair in Cyber Security

  1. Published

    Model-based development of distributed embedded real-time systems with the DECOS tool-chain

    Herzner, W., Schlick, R., Schlager, M., Leiner, B., Huber, B., Balogh, A., Csertan, G., Leguennec, A., Lesergent, T., Suri, N. & Islam, S., 2007, SAE International, (SAE Techni. Paper.).

    Research output: Working paperOther

  2. Published

    EPIC: Profiling the propagation and effect of data errors in software

    Hiller, M., Jhumka, A. & Suri, N., 1/05/2004, In: IEEE Transactions on Computers. 53, 5, p. 512-530 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    An approach for analysing the propagation of data errors in software

    Hiller, M., Jhumka, A., Suri, N. & D.C., Y. (ed.), 1/07/2001, 2001 International Conference on Dependable Systems and Networks. IEEE, p. 161-170 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    On the placement of software mechanisms for detection of data errors

    Hiller, M., Jhumka, A. & Suri, N., 23/06/2002, Proceedings International Conference on Dependable Systems and Networks. p. 135-144 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    PROPANE: An environment for examining the propagation of errors in software

    Hiller, M., Jhumka, A., Suri, N. & P.G., F. (ed.), 22/07/2002, Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis: ISSTA '02. ACM, p. 81-85 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Message from the IC2E 2018 General Chairs

    Hua, K. A., Suri, N., J., L. (ed.), A., C. (ed.), T., G. (ed.) & Y., C. (ed.), 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. xiii 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  7. Published

    Event pattern discovery on IDS traces of cloud services

    Huang, S-Y., Huang, Y. & Suri, N., 3/12/2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. IEEE, p. 25-32 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Safety verification utilizing model-based development for safety critical cyber-physical systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 15/08/2017, In: Journal of Information Processing Systems. 25, p. 797-810 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Practical use of formal verification for safety critical cyber-physical systems: A case study

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 25/08/2014, 2014 IEEE International Conference on Cyber-Physical Systems, Networks, and Applications. IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Practical Formal Verification for Model Based Development of Cyber-Physical Systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1...6 7 8 9 10 11 12 13 ...30 Next

Back to top