Home > Research > Researchers > Professor Neeraj Suri > Publications

Professor Neeraj Suri

Distinguished Professor in Cyber Security, Distinguished Professor & Chair in Cyber Security

  1. Published

    Dependable and cost-effective architecture for X-by-wire systems with membership middleware

    Sakurai, K., Matsubara, M., Serafini, M. & Suri, N., 2008, p. 160-169. 10 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  2. Published

    Aiding modular design and verification of safety-critical time-triggered systems by use of executable formal specifications

    Sakurai, K., Bokor, P. & Suri, N., 3/12/2008, 2008 11th IEEE High Assurance Systems Engineering Symposium. IEEE, p. 261-270 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Efficient verification of distributed protocols using stateful model checking

    Saissi, H., Bokor, P., Muftuoglu, C. A., Suri, N. & Serafini, M., 30/09/2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems. IEEE, p. 133-142 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    PBMC: Symbolic slicing for the verification of concurrent programs

    Saissi, H., Bokor, P. & Suri, N., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer-Verlag, Vol. 9364. p. 344-360 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    Trace Sanitizer: Eliminating the Effects of Non-Determinism of Error Propagation Analysis

    Saissi, H., Winter, S., Schwahn, O., Pattabiraman, K. & Suri, N., 23/06/2020, 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    TraceSanitizer - Eliminating the Effects of Non-Determinism on Error Propagation Analysis.

    Saissi, H., Winter, S., Schwahn, O., Pattabiraman, K. & Suri, N., 25/06/2020, 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, p. 52-63 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Quality of information in wireless sensor networks: A survey

    Sachidananda, V., Khelil, A. & Suri, N., 2010.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  8. Published

    Information quality aware co-design of sampling and transport in wireless sensor networks

    Sachidananda, V., Khelil, A., Noack, D. & Suri, N., 23/04/2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Sampling and transport co-design in Wireless Sensor Networks

    Sachidananda, V., Khelil, A., Noack, D. & Suri, N., 18/03/2013, 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS). IEEE, p. 98-100 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Trading transport timeliness and reliability for efficiency in wireless sensor networks

    Sachidananda, V., Khelil, A., Umap, D., Majuntke, M. & Suri, N., 10/04/2013, 2013 10th IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC). I. B. Tauris, p. 720-727 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Security issues in cloud federations

    Rak, M., Ghani, H., Ficco, M., Suri, N., Luna, J., Panica, S. & Petcu, D., 2012, Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice. IGI Global, p. 176-194 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  12. Published

    Security as a service using an SLA-based approach via SPECS

    Rak, M., Suri, N., Luna, J., Petcu, D., Casola, V. & Villano, U., 2/12/2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    On choosing server-or client-side solutions for BFT

    Platania, M., Obenshain, D., Tantillo, T., Amir, Y. & Suri, N., 1/05/2016, In: ACM Computing Surveys. 48, 4, 30 p., 61.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Instrumenting AUTOSAR for dependability assessment: A guidance framework

    Piper, T., Winter, S., Manns, P. & Suri, N., 25/06/2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Mitigating timing error propagation in mixed-criticality automotive systems

    Piper, T., Winter, S., Schwahn, O., Bidarahalli, S. & Suri, N., 13/04/2015, 2015 IEEE 18th International Symposium on Real-Time Distributed Computing. IEEE, p. 102-109 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms

    Piper, T., Winter, S., Suri, N. & Fuhrman, T. E., 7/09/2015, 2015 11th European Dependable Computing Conference (EDCC). IEEE, p. 85-96 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services

    Pellegrino, G., Balzarotti, D., Winter, S. & Suri, N., 2015. 16 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  18. Published

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 1/03/2020, In: IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Brief announcement: MP-state: State-aware software model checking of message-passing systems

    Muftuoglu, C. A., Bokor, P. & Suri, N., 2012, Stabilization, Safety, and Security of Distributed Systems: 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings. Vol. 7596 LNCS. p. 183-186 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  20. Published

    Novel efficient techniques for real-time cloud security assessment

    Modic, J., Trapero, R., Taha, A., Luna, J., Stopar, M. & Suri, N., 1/09/2016, In: Computers and Security. 62, p. 1-18 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Technical implementation and feasibility

    Mikkelsen, G. L., Damgård, K., Guldager, H., Jensen, J. L., Luna, J. G., Nielsen, J. D., Paillier, P., Pellegrino, G., Stausholm, M. B., Suri, N. & Zhang, H., 2015, Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, p. 255-318 64 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  22. Published

    Efficient verification of program fragments: Eager POR

    Metzler, P., Saissi, H., Bokor, P., Hess, R., Suri, N., Artho, C. (ed.), Peled, D. (ed.) & Legay, A. (ed.), 22/09/2016, Automated Technology for Verification and Analysis: 14th International Symposium, ATVA 2016, Chiba, Japan, October 17-20, 2016, Proceedings. Springer-Verlag, Vol. 9938 LNCS. p. 375-391 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Quick verification of concurrent programs by iteratively relaxed scheduling

    Metzler, P., Saissi, H., Bokor, P., Suri, N., T.N., N. (ed.), G., R. (ed.) & M., D. P. (ed.), 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 776-781 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 2/10/2019, Model Checking Software: 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings. Springer, p. 153-171 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 31/10/2020, In: International Journal on Software Tools for Technology Transfer. 22, p. 565-581 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Roll-forward recovery: the bidirectional cache approach

    Mendelson, A., Suri, N. & Zimmerman, O., 12/06/1996, Proceedings of IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems. IEEE, p. 59-68 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Cache based fault recovery for distributed systems

    Mendelson, A. & Suri, N., 8/09/1997, Proceedings. Third IEEE International Conference on Engineering of Complex Computer Systems. IEEE, p. 119-129 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Designing high-performance & reliable superscalar architectures the out of order reliable superscalar (O3RS) approach

    Mendelson, A. & Suri, N., 25/06/2000, Proceeding International Conference on Dependable Systems and Networks. IEEE, p. 473-481 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Threat Modeling the Cloud: An Ontology Based Approach

    Manzoor, S., Vateva-Gurova, T., Trapero, R. & Suri, N., 30/01/2019, IOSec 2018: Information and Operational Technology Security Systems . Fournaris, A., Lampropoulos, K. & Marin Tordera, E. (eds.). Cham: Springer-Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science; vol. 11398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Trust validation of cloud IaaS: A customer-centric approach

    Manzoor, S., Taha, A. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 97-104 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

    Manzoor, S., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 499-502 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Threat modeling and analysis for the cloud ecosystem

    Manzoor, S., Zhang, H., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 278-281 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Poster: Multi-Layer Threat Analysis of the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, p. 3419-3421. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  34. Published

    Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/11/2022, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Yin, H. & Stavrou, A. (eds.). New York: ACM, p. 3415-3417 3 p. (Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    ThreatPro: Multi-Layer Threat Analysis in the Cloud

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 29/09/2022, In: arXiv. abs/2209.14795, 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Forthcoming

    Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments

    Manzoor, S., Gouglidis, A., Bradbury, M. & Suri, N., 7/02/2024, (Accepted/In press) In: IEEE Transactions on Cloud Computing.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    General and program chairs' message

    Malek, M. & Suri, N., 2005, Service Availability: Second International Service Availability Symposium, ISAS 2005. Springer-Verlag, Vol. 3694 LNCS. p. V-VI 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  38. Published

    Service Availability: Second International Service Availability Symposium, ISAS 2005, Berlin, Germany, April 25-26, 2005, Revised Selected Papers

    Malek, M. (ed.), Nett, E. (ed.) & Suri, N. (ed.), 2005, Springer.

    Research output: Book/Report/ProceedingsProceedings

  39. Published

    Abortable fork-linearizable storage

    Majuntke, M., Dobre, D., Serafini, M. & Suri, N., 2009, Principles of Distributed Systems: 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings. Springer, Vol. 5923 LNCS. p. 255-269 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  40. Published

    Fork-consistent constructions from registers

    Majuntke, M., Dobre, D., Cachin, C. & Suri, N., 2011, Principles of Distributed Systems: 15th International Conference, OPODIS 2011, Toulouse, France, December 13-16, 2011. Proceedings. Vol. 7109 LNCS. p. 283-298 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  41. Published

    Compressive sensing for wireless sensor networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 2012, Intelligent Sensor Networks: The Integration of Sensor Networks, Signal Processing and Machine Learning. CRC Press, p. 379-396 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  42. Published

    Reordering for better compressibility: Efficient spatial sampling in Wireless Sensor Networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 7/06/2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, p. 50-57 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Balanced spatio-temporal compressive sensing for multi-hop wireless sensor networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 8/10/2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012). IEEE, p. 389-397 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Agile sink selection in wireless sensor networks

    Mahmudimanesh, M. & Suri, N., 30/06/2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, p. 390-398 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Efficient agile sink selection in wireless sensor networks based on compressed sensing

    Mahmudimanesh, M., Naseri, A. & Suri, N., 26/05/2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems. IEEE, p. 193-200 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Robust compressive data gathering in wireless sensor networks with linear topology

    Mahmudimanesh, M. & Suri, N., 26/05/2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems. IEEE, p. 179-186 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Quantitative Reasoning about Cloud Security Using Service Level Agreements

    Luna, J., Taha, A., Trapero, R. & Suri, N., 1/07/2017, In: IEEE Transactions on Cloud Computing. 5, 3, p. 457-471 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    Leveraging the Potential of Cloud Security Service-Level Agreements through Standards

    Luna, J., Suri, N., Iorga, M. & Karmel, A., 1/05/2015, In: IEEE Cloud Computing. 2, 3, p. 32-40 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    A security metrics framework for the Cloud

    Luna, J., Ghani, H., Germanus, D. & Suri, N., 18/07/2011, Proceedings of the International Conference on Security and Cryptography 2011. IEEE, p. 245-250 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Benchmarking cloud security level agreements using quantitative policy trees

    Luna, J., Langenberg, R. & Suri, N., 19/10/2012, Proceedings of the 2012 ACM Workshop on Cloud computing security workshop. ACM, p. 103-112 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top