Home > Research > Researchers > Professor Neeraj Suri > Publications

Professor Neeraj Suri

Chair in Cyber Security

  1. Published

    LEHP: Localized energy hole profiling in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 22/06/2010, The IEEE symposium on Computers and Communications. IEEE, p. 100-106 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    TOM: Topology oriented maintenance in sparse Wireless Sensor Networks

    Szczytowski, P., Khelil, A., Ali, A. & Suri, N., 27/06/2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, p. 548-556 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    DKM: Distributed k-connectivity maintenance in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 9/01/2012, 2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS). IEEE, p. 83-90 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    MAP++: support for map-based WSN modeling and design with OMNeT++.

    Szczytowski, P., Khelil, A. & Suri, N., 2009, 2nd International ICST Workshop on OMNeT++. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Identifying and utilizing dependencies across cloud security services

    Taha, A., Metzler, P., Trapero, R., Luna, J. & Suri, N., 30/05/2016, ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, p. 329-340 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    SLA-Based Service Selection for Multi-Cloud Environments

    Taha, A., Manzoor, S., Suri, N., A.M., G. (ed.) & M., L. (ed.), 25/06/2017, 2017 IEEE International Conference on Edge Computing (EDGE). IEEE, p. 65-72 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure

    Taha, A., Zakaria, A., Kim, D. & Suri, N., 19/05/2020, 2020 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 134-143 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Cloud Security Requirement Based Threat Analysis

    Taha, A., Lawall, A. & Suri, N., 23/03/2023, 2023 International Conference on Computing, Networking and Communications, ICNC 2023. Institute of Electrical and Electronics Engineers Inc., p. 506-510 5 p. (2023 International Conference on Computing, Networking and Communications, ICNC 2023).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Exploring the relationship between dimensionality reduction and private data release

    Tai, B-C., Li, S-C., Huang, Y., Suri, N. & Wang, P-C., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 25-33 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking

    Tan, F., Wang, Y., Wang, Q., Bu, L. & Suri, N., 1/10/2015, In: IEEE Transactions on Parallel and Distributed Systems. 26, 10, p. 2630-2642 13 p., 6898840.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach

    Tan, F., Wang, Y., Wang, Q., Bu, L., Zheng, R. & Suri, N., 24/06/2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    WiP abstract: A framework on profiling cross-domain noise propagation in control CPS

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 14/04/2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS). IEEE, p. 224 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Using underutilized CPU resources to enhance its reliability

    Timor, A., Mendelson, A., Birk, Y. & Suri, N., 1/01/2010, In: IEEE Transactions on Dependable and Secure Computing. 7, 1, p. 94-109 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Message from the conference chairs

    Torin, J., Suri, N. & D.C., Y. (ed.), 1/07/2001, Proceedings of the 2001 International Conference on Dependable Systems and Networks. ACM, p. xiii-xiv 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    A novel approach to manage cloud security SLA incidents

    Trapero, R., Modic, J., Stopar, M., Taha, A. & Suri, N., 1/07/2017, In: Future Generation Computer Systems. 72, p. 193-205 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Quantifiably Trusting the Cloud: Putting Metrics to Work

    Trapero, R., Luna, J. & Suri, N., 1/06/2016, In: IEEE Security and Privacy Magazine. 14, 3, p. 73-77 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Compilation as a Defense: Enhancing DL Model Attack Robustness via Tensor Optimization

    Trawicki, S., Hackett, W., Birch, L., Suri, N. & Garraghan, P., 20/10/2023. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  21. Published

    Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 28/08/2014, 2014 11th International Conference on Security and Cryptography (SECRYPT). IEEE, p. 113-124 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    On the feasibility of side-channel attacks in a virtualized environment

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 2015, E-Business and Telecommunications: 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers. Springer-Verlag, Vol. 554. p. 319-339 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  23. Published

    The impact of hypervisor scheduling on compromising virtualized environments

    Vateva-Gurova, T., Suri, N., Mendelson, A., Atzori, L. (ed.), Jin, X. (ed.), Jarvis, S. (ed.), Liu, L. (ed.), Calvo, R. A. (ed.), Hu, J. (ed.), Min, G. (ed.), Georgalas, N. (ed.) & Wu, Y. (ed.), 26/10/2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, p. 1910-1917 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    InfoLeak: Scheduling-based information leakage

    Vateva-Gurova, T., Manzoor, S., Huang, Y. & Suri, N., 11/02/2019, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 44-53 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    On the detection of side-channel attacks

    Vateva-Gurova, T. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 185-186 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top