Home > Research > Researchers > Professor Neeraj Suri > Publications

Professor Neeraj Suri

Distinguished Professor in Cyber Security, Distinguished Professor & Chair in Cyber Security

  1. Published

    Replication: 20 Years of Inferring Interdomain Routing Policies

    Kastanakis, S., Giotsas, V., Livadariu, I. & Suri, N., 24/10/2023, p. 16-29. 14 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  2. Published

    Robustness Evaluation of Operating Systems

    Johansson, A. & Suri, N., 2008, Information Assurance: The Morgan Kaufmann Series in Networking. Elsevier Inc., p. 349-375 27 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    Error propagation profiling of operating systems

    Johansson, A. & Suri, N., 28/06/2005, 2005 International Conference on Dependable Systems and Networks (DSN'05). IEEE, p. 86-95 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    On enhancing the robustness of commercial operating systems

    Johansson, A., Sârbu, A., Jhumka, A. & Suri, N., 2005, Service Availability: First International Service Availability Symposium, ISAS 2004, Munich, Germany, May 13-14, 2004, Revised Selected Papers. Springer, p. 148-159 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    On the impact of injection triggers for OS robustness evaluation

    Johansson, A., Suri, N. & Murphy, B., 5/11/2007, The 18th IEEE International Symposium on Software Reliability (ISSRE '07). IEEE, p. 127-136 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    On the selection of error model(s) for OS robustness evaluation

    Johansson, A., Suri, N. & Murphy, B., 25/06/2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07). IEEE, p. 502-511 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    An approach to synthesise safe systems

    Jhumka, A., Freiling, F., Fetzer, C. & Suri, N., 2006, In: International Journal of Security and Networks. 1, 1-2, p. 62-74 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Assessing inter-modular error propagation in distributed software

    Jhumka, A., Hiller, M. & Suri, N., 31/10/2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems. IEEE, p. 152-161 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    An approach to specify and test component-based dependable software

    Jhumka, A., Hiller, M. & Suri, N., 23/10/2002, 7th IEEE International Symposium on High Assurance Systems Engineering, 2002. Proceedings.. IEEE, p. 211-220 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Component-based synthesis of dependable embedded software

    Jhumka, A., Hiller, M. & Suri, N., 2002, Formal Techniques in Real-Time and Fault-Tolerant Systems. Springer-Verlag, Vol. 2469. p. 111-128 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  11. Published

    On systematic design of globally consistent executable assertions in embedded software

    Jhumka, A., Hiller, M., Claesson, V. & Suri, N., 19/06/2002, Proceedings of the joint conference on Languages, compilers and tools for embedded systems: software and compilers for embedded systems. ACM, p. 75-84 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    A framework for the design and validation of efficient fail-safe fault-tolerant programs

    Jhumka, A., Suri, N. & Hiller, M., 2003, Software and Compilers for Embedded Systems . Springer-Verlag, Vol. 2826. p. 182-197 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  13. Published

    An approach for designing and assessing detectors for dependable component-based systems

    Jhumka, A., Hiller, M. & Suri, N., 25/03/2004, Eighth IEEE International Symposium on High Assurance Systems Engineering, 2004. Proceedings. IEEE, Vol. 8. p. 69-78 10 p. (Proc. IEEE Int. Symp. High Assur. Syst. Eng.).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Designing efficient fail-safe multitolerant systems

    Jhumka, A. & Suri, N., 2005, Formal Techniques for Networked and Distributed Systems - FORTE 2005 . Springer, Vol. 3731 LNCS. p. 428-422 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  15. Published

    P2P routing table poisoning: A quorum-based sanitizing approach

    Ismail, H., Germanus, D. & Suri, N., 1/03/2017, In: Computers and Security. 65, p. 283-299 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Detecting and mitigating P2P eclipse attacks

    Ismail, H., Germanus, D. & Suri, N., 14/12/2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 224-231 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Malicious peers eviction for P2P overlays

    Ismail, H., Germanus, D. & Suri, N., 17/10/2016, 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, p. 216-224 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

    Ismail, H., Roos, S. & Suri, N., 12/06/2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    An optimization based design for integrated dependable real-time embedded systems

    Islam, S., Suri, N., Balogh, A., Csertán, G. & Pataricza, A., 2009, In: Design Automation for Embedded Systems. 13, 4, p. 245-285 41 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Dependability driven integration of mixed criticality SW components

    Islam, S., Lindström, R. & Suri, N., 24/04/2006, Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'06). IEEE, p. 485-495 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    A multi variable optimization approach for the design of integrated dependable real-time embedded systems

    Islam, S. & Suri, N., 2007, Embedded and Ubiquitous Computing: International Conference, EUC 2007, Taipei, Taiwan, December 17-20, 2007. Proceedings. Springer, Vol. 4808 LNCS. p. 517-530 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  23. Published

    Safety verification utilizing model-based development for safety critical cyber-physical systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 15/08/2017, In: Journal of Information Processing Systems. 25, p. 797-810 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Practical use of formal verification for safety critical cyber-physical systems: A case study

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 25/08/2014, 2014 IEEE International Conference on Cyber-Physical Systems, Networks, and Applications. IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Practical Formal Verification for Model Based Development of Cyber-Physical Systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top