Home > Research > Researchers > Professor Neeraj Suri > Publications

Professor Neeraj Suri

Distinguished Professor in Cyber Security, Distinguished Professor & Chair in Cyber Security

  1. 2018
  2. Published

    Threat modeling and analysis for the cloud ecosystem

    Manzoor, S., Zhang, H., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 278-281 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. 2017
  4. Published

    Quick verification of concurrent programs by iteratively relaxed scheduling

    Metzler, P., Saissi, H., Bokor, P., Suri, N., T.N., N. (Editor), G., R. (Editor) & M., D. P. (Editor), 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 776-781 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    TrEKer: Tracing error propagation in operating system kernels

    Coppik, N., Schwahn, O., Winter, S., Suri, N., T.N., N. (Editor), G., R. & M., D. P., 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 377-387 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    C'MON: Monitoring the compliance of cloud services to contracted properties

    Alboghdady, S., Winter, S., Taha, A., Zhang, H. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 6 36

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Towards DDoS attack resilient wide area monitoring systems

    Demir, K. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, 7 p. 99

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A security architecture for railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S., Suri, N., Bitsch, F. (Editor), Tonetta, S. (Editor) & Schoitsch, E. (Editor), 17/08/2017, Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings. Springer-Verlag, Vol. 10488 LNCS. p. 320-328 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Safety verification utilizing model-based development for safety critical cyber-physical systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 15/08/2017, In: Journal of Information Processing Systems. 25, p. 797-810 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    A novel approach to manage cloud security SLA incidents

    Trapero, R., Modic, J., Stopar, M., Taha, A. & Suri, N., 1/07/2017, In: Future Generation Computer Systems. 72, p. 193-205 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Quantitative Reasoning about Cloud Security Using Service Level Agreements

    Luna, J., Taha, A., Trapero, R. & Suri, N., 1/07/2017, In: IEEE Transactions on Cloud Computing. 5, 3, p. 457-471 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (Editor) & U., B. (Editor), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

    Manzoor, S., Luna, J., Suri, N., X., L. (Editor) & U., B. (Editor), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 499-502 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    DeQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services

    Zhang, H., Trapero, R., Luna, J., Suri, N., X., L. & U., B., 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    SLA-Based Service Selection for Multi-Cloud Environments

    Taha, A., Manzoor, S., Suri, N., A.M., G. (Editor) & M., L. (Editor), 25/06/2017, 2017 IEEE International Conference on Edge Computing (EDGE). IEEE, p. 65-72 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Challenges and approaches in securing safety-relevant railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S. & Suri, N., 26/04/2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 139-145 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants

    Chan, A., Winter, S., Saissi, H., Pattabiraman, K. & Suri, N., 13/03/2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). IEEE, p. 184-195 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    P2P routing table poisoning: A quorum-based sanitizing approach

    Ismail, H., Germanus, D. & Suri, N., 1/03/2017, In: Computers and Security. 65, p. 283-299 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    SeReCP: A secure and reliable communication platform for the smart grid

    Demir, K., Suri, N., M., K. (Editor), D.S., K. (Editor) & V., V. (Editor), 22/01/2017, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 175-184 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Robust QoS-aware communication in the smart distribution grid

    Demir, K., Germanus, D. & Suri, N., 1/01/2017, In: Peer-to-Peer Networking and Applications. 10, 1, p. 193-207 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. 2016
  22. Published

    Malicious peers eviction for P2P overlays

    Ismail, H., Germanus, D. & Suri, N., 17/10/2016, 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, p. 216-224 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Efficient verification of program fragments: Eager POR

    Metzler, P., Saissi, H., Bokor, P., Hess, R., Suri, N., Artho, C. (Editor), Peled, D. (Editor) & Legay, A. (Editor), 22/09/2016, Automated Technology for Verification and Analysis: 14th International Symposium, ATVA 2016, Chiba, Japan, October 17-20, 2016, Proceedings. Springer-Verlag, Vol. 9938 LNCS. p. 375-391 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Novel efficient techniques for real-time cloud security assessment

    Modic, J., Trapero, R., Taha, A., Luna, J., Stopar, M. & Suri, N., 1/09/2016, In: Computers and Security. 62, p. 1-18 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Practical Formal Verification for Model Based Development of Cyber-Physical Systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Reliable Memory Efficient Name Forwarding in Named Data Networking

    Saxena, D., Raychoudhury, V., Becker, C. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 48-55 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    SENTRY: A novel approach for mitigating application layer DDoS threats

    Zhang, H., Taha, A., Trapero, R., Luna, J. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 465-472 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Trust validation of cloud IaaS: A customer-centric approach

    Manzoor, S., Taha, A. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 97-104 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 6 7 8 ...13 Next

Back to top