Home > Research > Researchers > Professor Neeraj Suri > Publications

Professor Neeraj Suri

Distinguished Professor in Cyber Security, Distinguished Professor & Chair in Cyber Security

  1. Published

    DeQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services

    Zhang, H., Trapero, R., Luna, J., Suri, N., X., L. & U., B., 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Dependable Embedded Systems Special Day Panel: Issues and Challenges in Dependable Embedded Systems.

    Suri, N., Fetzer, C., Abraham, J. A., Poledna, S., Mendelson, A. & Mitra, S., 2008, 2008 Design, Automation and Test in Europe. IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Dependable and cost-effective architecture for X-by-wire systems with membership middleware

    Sakurai, K., Matsubara, M., Serafini, M. & Suri, N., 2008, p. 160-169. 10 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Published

    Dependability issues in the reuse of standard components in open architectures

    Walter, C., Suri, N. & Monaghan, T., 1995, p. 443-453. 11 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  5. Published

    Dependability driven integration of mixed criticality SW components

    Islam, S., Lindström, R. & Suri, N., 24/04/2006, Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'06). IEEE, p. 485-495 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Delay-aware mobile transactions

    Ayari, B., Khelil, A. & Suri, N., 2008, Software Technologies for Embedded and Ubiquitous Systems: 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedings. Springer, Vol. 5287 LNCS. p. 280-291 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    Delay tolerant monitoring of mobility-assisted WSN

    Khelil, A., Shaikh, F. K., Ali, A., Suri, N. & Reinl, C., 2016, Delay Tolerant Networks: Protocols and Applications. Vasilakos, A. V. (ed.). CRC Press, p. 189-221 33 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  8. Published

    Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure

    Taha, A., Zakaria, A., Kim, D. & Suri, N., 19/05/2020, 2020 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 134-143 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Data-based agreement for inter-vehicle coordination

    Ayari, B., Khelil, A., Saffar, K. & Suri, N., 23/05/2010, 2010 Eleventh International Conference on Mobile Data Management. IEEE, p. 279-280 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Data privacy management, autonomous spontaneous security, and security assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Garcia-Alfaro, J. (Editor), Herrera-Joancomartí, J. (Editor), Lupu, E. (Editor), Posegga, J. (Editor), Aldini, A. (Editor), Martinelli, F. (Editor) & Suri, N. (Editor), 2015, Springer. 343 p. (Lecture Notes in Computer Science)

    Research output: Book/Report/ProceedingsBook

  11. Published

    Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

    Livraga, G. (Editor), Torra, V. (Editor), Aldini, A. (Editor), Martinelli, F. (Editor) & Suri, N. (Editor), 2016, Springer.

    Research output: Book/Report/ProceedingsProceedings

  12. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Coral: Reliable and low-latency P2P convergecast for critical sensor data collection

    Germanus, D., Khelil, A., Schwandke, J. & Suri, N., 21/10/2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 300-305 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Compressive sensing for wireless sensor networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 2012, Intelligent Sensor Networks: The Integration of Sensor Networks, Signal Processing and Machine Learning. CRC Press, p. 379-396 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  15. Published

    Compositional design of RT systems: A conceptual basis for specification of linking interfaces

    Kopetz, H. & Suri, N., 16/05/2003, Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, 2003.. IEEE, p. 51-60 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Component-based synthesis of dependable embedded software

    Jhumka, A., Hiller, M. & Suri, N., 2002, Formal Techniques in Real-Time and Fault-Tolerant Systems. Springer-Verlag, Vol. 2469. p. 111-128 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  17. Published

    Compilation as a Defense: Enhancing DL Model Attack Robustness via Tensor Optimization

    Trawicki, S., Hackett, W., Birch, L., Suri, N. & Garraghan, P., 20/10/2023. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  18. Published

    C'MON: Monitoring the compliance of cloud services to contracted properties

    Alboghdady, S., Winter, S., Taha, A., Zhang, H. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 6 36

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Cloud Security Requirement Based Threat Analysis

    Taha, A., Lawall, A. & Suri, N., 23/03/2023, 2023 International Conference on Computing, Networking and Communications, ICNC 2023. Institute of Electrical and Electronics Engineers Inc., p. 506-510 5 p. (2023 International Conference on Computing, Networking and Communications, ICNC 2023).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    CIPSEC-enhancing critical infrastructure protection with innovative security framework

    Álvarez, A., Trapero, R., Guilhot, D., García-Mila, I., Hernandez, F., Marín-Tordera, E., Forne, J., Masip-Bruin, X., Suri, N., Heinrich, M., Katzenbeisser, S., Athanatos, M., Ioannidis, S., Kallipolitis, L., Spais, I., Fournaris, A. & Lampropoulos, K., 30/06/2019, Challenges in Cybersecurity and Privacy: the European Research Landscape. River Publishers, p. 129-148 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  21. Published

    Challenges in Identifying Network Attacks Using Netflow Data

    Chuah, E., Suri, N., Jhumka, A. & Alt, S., 31/01/2022, 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Challenges and approaches in securing safety-relevant railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S. & Suri, N., 26/04/2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 139-145 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Cache based fault recovery for distributed systems

    Mendelson, A. & Suri, N., 8/09/1997, Proceedings. Third IEEE International Conference on Engineering of Complex Computer Systems. IEEE, p. 119-129 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Building a long term strategy for international collaboration in trustworthy ICT: Security, privacy and trust in global networks and services

    Clarke, J., Suri, N., Riguidel, M. & Pasic, A., 6/07/2011, 2011 First SysSec Workshop. IEEE, p. 90-93 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Broadcast in ad hoc wireless networks with selfish nodes: A Bayesian incentive compatibility approach

    Suri, N. & Narahari, Y., 7/01/2007, 2007 2nd International Conference on Communication Systems Software and Middleware. IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top