Home > Research > Researchers > Professor Neeraj Suri > Publications

Professor Neeraj Suri

Chair in Cyber Security

  1. Journal article
  2. Published

    Quantitative Reasoning about Cloud Security Using Service Level Agreements

    Luna, J., Taha, A., Trapero, R. & Suri, N., 1/07/2017, In: IEEE Transactions on Cloud Computing. 5, 3, p. 457-471 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    A novel approach to manage cloud security SLA incidents

    Trapero, R., Modic, J., Stopar, M., Taha, A. & Suri, N., 1/07/2017, In: Future Generation Computer Systems. 72, p. 193-205 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    P2P routing table poisoning: A quorum-based sanitizing approach

    Ismail, H., Germanus, D. & Suri, N., 1/03/2017, In: Computers and Security. 65, p. 283-299 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Robust QoS-aware communication in the smart distribution grid

    Demir, K., Germanus, D. & Suri, N., 1/01/2017, In: Peer-to-Peer Networking and Applications. 10, 1, p. 193-207 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Novel efficient techniques for real-time cloud security assessment

    Modic, J., Trapero, R., Taha, A., Luna, J., Stopar, M. & Suri, N., 1/09/2016, In: Computers and Security. 62, p. 1-18 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Run Time Application Repartitioning in Dynamic Mobile Cloud Environments

    Yang, L., Cao, J., Tang, S., Han, D. & Suri, N., 1/07/2016, In: IEEE Transactions on Cloud Computing. 4, 3, p. 336-348 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Quantifiably Trusting the Cloud: Putting Metrics to Work

    Trapero, R., Luna, J. & Suri, N., 1/06/2016, In: IEEE Security and Privacy Magazine. 14, 3, p. 73-77 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    On choosing server-or client-side solutions for BFT

    Platania, M., Obenshain, D., Tantillo, T., Amir, Y. & Suri, N., 1/05/2016, In: ACM Computing Surveys. 48, 4, 30 p., 61.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Named Data Networking: A survey

    Saxena, D., Raychoudhury, V., Suri, N., Becker, C. & Cao, J., 28/02/2016, In: Computer Science Review. 19, p. 15-55 41 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Adaptive hybrid compression for wireless sensor networks

    Ali, A., Khelil, A., Suri, N. & Mahmudimanesh, M., 1/12/2015, In: ACM Transactions on Sensor Networks. 11, 4, 36 p., 53.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Assessing privacy capabilities of cloud service providers

    Del Alamo, J. M., Trapero, R., Martin, Y. S., Yelmo, J. C. & Suri, N., 1/11/2015, In: IEEE Latin America Transactions. 13, 11, p. 3634-3641 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking

    Tan, F., Wang, Y., Wang, Q., Bu, L. & Suri, N., 1/10/2015, In: IEEE Transactions on Parallel and Distributed Systems. 26, 10, p. 2630-2642 13 p., 6898840.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Leveraging the Potential of Cloud Security Service-Level Agreements through Standards

    Luna, J., Suri, N., Iorga, M. & Karmel, A., 1/05/2015, In: IEEE Cloud Computing. 2, 3, p. 32-40 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Assessing the security of internet-connected critical infrastructures

    Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G. & Clarke, J., 1/12/2014, In: Security and Communication Networks. 7, 12, p. 2713-2725 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    GMTC: A generalized commit approach for hybrid mobile environments

    Ayari, B., Khelil, A. & Suri, N., 1/12/2013, In: IEEE Transactions on Mobile Computing. 12, 12, p. 2399-2411 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Efficient predictive monitoring of wireless sensor networks

    Ali, A., Khelil, A., Shaikh, F. K. & Suri, N., 2012, In: International Journal of Autonomous and Adaptive Communications Systems. 5, 3, p. 233-254 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    On the design of perturbation-resilient atomic commit protocols for mobile transactions

    Ayari, B., Khelil, A. & Suri, N., 1/08/2011, In: ACM Transactions on Computer Systems. 29, 3, 7.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Reliable congestion-aware information transport in wireless sensor networks

    Shaikh, F. K., Khelil, A., Ali, A. & Suri, N., 1/07/2011, In: International Journal of Communication Networks and Distributed Systems. 7, 1-2, p. 135-152 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Application-level diagnostic and membership protocols for generic time-triggered systems

    Serafini, M., Bokor, P., Suri, N., Vinter, J., Ademaj, A., Brandstätter, W., Tagliabo, F. & Koch, J., 1/03/2011, In: IEEE Transactions on Dependable and Secure Computing. 8, 2, p. 177-193 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    A software integration approach for designing and assessing dependable embedded systems

    Suri, N., Jhumka, A., Hiller, M., Pataricza, A., Islam, S. & Sârbu, C., 1/10/2010, In: Journal of Systems and Software. 83, 10, p. 1780-1800 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Profiling the operational behavior of OS device drivers

    Sârbu, C., Johansson, A., Suri, N. & Nagappan, N., 1/08/2010, In: Empirical Software Engineering. 15, 4, p. 380-422 43 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Using underutilized CPU resources to enhance its reliability

    Timor, A., Mendelson, A., Birk, Y. & Suri, N., 1/01/2010, In: IEEE Transactions on Dependable and Secure Computing. 7, 1, p. 94-109 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    A pre-injection analysis for identifying fault-injection tests for protocol validation

    Suri, N. & Sinha, P., 2010, In: Journal of Software. 5, 10, p. 1144-1161 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    An optimization based design for integrated dependable real-time embedded systems

    Islam, S., Suri, N., Balogh, A., Csertán, G. & Pataricza, A., 2009, In: Design Automation for Embedded Systems. 13, 4, p. 245-285 41 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Exploring delay-aware transactions in heterogeneous mobile environments

    Ayari, B., Khelil, A. & Suri, N., 2009, In: Journal of Software. 4, 7, p. 634-643 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Increasing security and protection of SCADA systems through infrastructure resilience

    D'Antonio, S., Romano, L., Khelil, A. & Suri, N., 2009, In: International Journal of System of Systems Engineering. 1, 4, p. 401-413 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Design of an optimal Bayesian incentive compatible broadcast protocol for ad hoc networks with rational nodes

    Suri, N. & Narahari, Y., 2008, In: IEEE Journal on Selected Areas in Communications. 26, 7, p. 1138-1148 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    Online diagnosis and recovery: On the choice and impact of tuning parameters

    Serafini, M., Bondavalli, A. & Suri, N., 12/11/2007, In: IEEE Transactions on Dependable and Secure Computing. 4, 4, p. 295-312 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    An approach to synthesise safe systems

    Jhumka, A., Freiling, F., Fetzer, C. & Suri, N., 2006, In: International Journal of Security and Networks. 1, 1-2, p. 62-74 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    An efficient TDMA start-up and restart synchronization approach for distributed embedded systems

    Claesson, V., Lönn, H. & Suri, N., 13/09/2004, In: IEEE Transactions on Parallel and Distributed Systems. 15, 8, p. 725-739 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    EPIC: Profiling the propagation and effect of data errors in software

    Hiller, M., Jhumka, A. & Suri, N., 1/05/2004, In: IEEE Transactions on Computers. 53, 5, p. 512-530 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    The customizable fault/error model for dependable distributed systems

    Walter, C. J. & Suri, N., 2/01/2003, In: Theoretical Computer Science. 290, 2, p. 1223-1251 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    Analyzing the Impact of Data Errors in Safety-Critical Control Systems

    Askerdal, Ö., Gäfvert, M., Hiller, M. & Suri, N., 2003, In: IEICE Transactions on Information and Systems. E86-D, 12, p. 2623-2633 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Design of a parallel interconnect based on communication pattern considerations.

    Suri, N. & Mendelson, A., 2001, In: Parallel Algorithms Appl.. 16, 4, p. 243-271 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    Editorial: Special Section on Dependable Real-Time Systems

    Suri, N. & Ramamritham, K., 1999, In: IEEE Transactions on Parallel and Distributed Systems. 10, 6, p. 529-532 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Formally Verified On-Line Diagnosis

    Walter, C. J., Lincoln, P. & Suri, N., 1997, In: IEEE Trans. Software Eng.. 23, 11, p. 684-721 38 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    Synchronization Issues in Real Time Systems

    Suri, N., Hugue, M. M. & Walter, C. J., 1994, In: Proceedings of the IEEE. 82, 1, p. 41-54 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Editorial
  40. Published

    IEEE Transactions on Dependable an Secure Computing: Editorial

    Gligor, V. D., Meadows, C. & Suri, N., 8/02/2008, In: IEEE Transactions on Dependable and Secure Computing. 5, 1, p. 4-5 2 p.

    Research output: Contribution to Journal/MagazineEditorial

  41. Other
  42. Published

    Model-based development of distributed embedded real-time systems with the DECOS tool-chain

    Herzner, W., Schlick, R., Schlager, M., Leiner, B., Huber, B., Balogh, A., Csertan, G., Leguennec, A., Lesergent, T., Suri, N. & Islam, S., 2007, SAE International, (SAE Techni. Paper.).

    Research output: Working paperOther

  43. Book
  44. Published

    Foreword from the QASA 2016 program chairs

    Aldini, A., Martinelli, F., Suri, N., G., L. (ed.), A., A. (ed.), V., T. (ed.), F., M. (ed.) & N., S., 2016, Springer.

    Research output: Book/Report/ProceedingsBook

  45. Published

    Data privacy management, autonomous spontaneous security, and security assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Garcia-Alfaro, J. (ed.), Herrera-Joancomartí, J. (ed.), Lupu, E. (ed.), Posegga, J. (ed.), Aldini, A. (ed.), Martinelli, F. (ed.) & Suri, N. (ed.), 2015, Springer. 343 p. (Lecture Notes in Computer Science)

    Research output: Book/Report/ProceedingsBook

  46. Proceedings
  47. Published

    Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

    Livraga, G. (ed.), Torra, V. (ed.), Aldini, A. (ed.), Martinelli, F. (ed.) & Suri, N. (ed.), 2016, Springer.

    Research output: Book/Report/ProceedingsProceedings

  48. Published
  49. Published

    Service Availability: Second International Service Availability Symposium, ISAS 2005, Berlin, Germany, April 25-26, 2005, Revised Selected Papers

    Malek, M. (ed.), Nett, E. (ed.) & Suri, N. (ed.), 2005, Springer.

    Research output: Book/Report/ProceedingsProceedings

  50. Blog
  51. Published

    The influence of geopolitics on polar research – Options for HM Government

    Germond, B. & Suri, N., 8/06/2023

    Research output: Exhibits, objects and web-based outputsBlog

Previous 12 3 4 5 6 Next

Back to top