Home > Research > Researchers > Professor Neeraj Suri > Publications

Professor Neeraj Suri

Distinguished Professor in Cyber Security, Distinguished Professor & Chair in Cyber Security

  1. Blog
  2. Published

    The influence of geopolitics on polar research – Options for HM Government

    Germond, B. & Suri, N., 8/06/2023

    Research output: Exhibits, objects and web-based outputsBlog

  3. Proceedings
  4. Published

    Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

    Livraga, G. (ed.), Torra, V. (ed.), Aldini, A. (ed.), Martinelli, F. (ed.) & Suri, N. (ed.), 2016, Springer.

    Research output: Book/Report/ProceedingsProceedings

  5. Published
  6. Published

    Service Availability: Second International Service Availability Symposium, ISAS 2005, Berlin, Germany, April 25-26, 2005, Revised Selected Papers

    Malek, M. (ed.), Nett, E. (ed.) & Suri, N. (ed.), 2005, Springer.

    Research output: Book/Report/ProceedingsProceedings

  7. Book
  8. Published

    Foreword from the QASA 2016 program chairs

    Aldini, A., Martinelli, F., Suri, N., G., L. (ed.), A., A. (ed.), V., T. (ed.), F., M. (ed.) & N., S., 2016, Springer.

    Research output: Book/Report/ProceedingsBook

  9. Published

    Data privacy management, autonomous spontaneous security, and security assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Garcia-Alfaro, J. (ed.), Herrera-Joancomartí, J. (ed.), Lupu, E. (ed.), Posegga, J. (ed.), Aldini, A. (ed.), Martinelli, F. (ed.) & Suri, N. (ed.), 2015, Springer. 343 p. (Lecture Notes in Computer Science)

    Research output: Book/Report/ProceedingsBook

  10. Other
  11. Published

    Model-based development of distributed embedded real-time systems with the DECOS tool-chain

    Herzner, W., Schlick, R., Schlager, M., Leiner, B., Huber, B., Balogh, A., Csertan, G., Leguennec, A., Lesergent, T., Suri, N. & Islam, S., 2007, SAE International, (SAE Techni. Paper.).

    Research output: Working paperOther

  12. Editorial
  13. Published

    IEEE Transactions on Dependable an Secure Computing: Editorial

    Gligor, V. D., Meadows, C. & Suri, N., 8/02/2008, In: IEEE Transactions on Dependable and Secure Computing. 5, 1, p. 4-5 2 p.

    Research output: Contribution to Journal/MagazineEditorial

  14. Journal article
  15. Forthcoming

    Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/02/2024, (Accepted/In press) In: IEEE Transactions on Cloud Computing.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph

    Lu, Y., Yu, Z. & Suri, N., 31/08/2023, In: ACM Transactions on Privacy and Security. 26, 3, p. 1-39 39 p., 33.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Specifying Autonomous System Behaviour

    Sogokon, A., Yuksek, B., Inalhan, G. & Suri, N., 2023, In: CoRR. abs/2302.10087

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems

    Chuah, E., Jhumka, A., Malek, M. & Suri, N., 29/12/2022, In: IEEE Access. 10, p. 133487-133503 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph

    Lu, Y., Yu, Z. & Suri, N., 1/10/2022, In: arXiv. abs/2210.00325, 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    ThreatPro: Multi-Layer Threat Analysis in the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 29/09/2022, In: arXiv. abs/2209.14795, 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models.

    Hackett, W., Trawicki, S., Yu, Z., Suri, N. & Garraghan, P., 13/09/2022, In: arXiv. abs/2209.06300, 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Pinch: An Adversarial Extraction Attack Framework for Deep Learning Models

    Hackett, W., Trawicki, S., Yu, Z., Suri, N. & Garraghan, P., 13/09/2022, In: arXiv.

    Research output: Contribution to Journal/MagazineJournal article

  23. Published

    PCaaD: Towards automated determination and exploitation of industrial systems

    Green, B., Derbyshire, R., Krotofil, M., Knowles, W., Prince, D. & Suri, N., 30/11/2021, In: Computers and Security. 110, 19 p., 102424.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 31/10/2020, In: International Journal on Software Tools for Technology Transfer. 22, p. 565-581 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 1/03/2020, In: IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Security Requirements Engineering in Safety-Critical Railway Signalling Networks.

    Heinrich, M., Vateva-Gurova, T., Arul, T., Katzenbeisser, S., Suri, N., Birkholz, H., Fuchs, A., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Tverdyshev, S. & Schlehuber, C., 14/07/2019, In: Security and Communication Networks. 2019, 14 p., 8348925.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems

    Demir, K., Nayyer, F. & Suri, N., 1/06/2019, In: International Journal of Critical Infrastructure Protection. 25, p. 84-101 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Proofs of Writing for Robust Storage

    Dobre, D., Karame, G., Li, W., Majuntke, M., Suri, N. & Vukolic, M., 27/05/2019, In: IEEE Transactions on Parallel and Distributed Systems. 30, 11, p. 2547-2566 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Securing the cloud-assisted smart grid

    Demir, K., Ismail, H., Vateva-Gurova, T. & Suri, N., 1/12/2018, In: International Journal of Critical Infrastructure Protection. 23, p. 100-111 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code

    Schwahn, O., Winter, S., Coppik, N. & Suri, N., 1/11/2018, In: IEEE Transactions on Dependable and Secure Computing. 15, 6, p. 945-958 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 4 5 6 7 8 ...12 Next

Back to top