Home > Research > Researchers > Professor Neeraj Suri > Publications

Professor Neeraj Suri

Distinguished Professor in Cyber Security, Distinguished Professor & Chair in Cyber Security

  1. Published

    Gossiping: Adaptive and reliable broadcasting in MANETs

    Khelil, A. & Suri, N., 2007, Dependable Computing: Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedings. Springer, Vol. 4746 LNCS. p. 123-141 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  2. Published

    gMAP: Efficient construction of global maps for mobility-assisted wireless sensor networks

    Khelil, A., Shaikh, F. K., Ali, A. & Suri, N., 2/02/2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services. IEEE, p. 189-196 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Towards benchmarking of P2P technologies from a SCADA systems protection perspective

    Khelil, A., Jeckel, S., Germanus, D. & Suri, N., 2010, Mobile Lightweight Wireless Systems: Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. Springer, Vol. 45 LNICST. p. 400-414 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    Assessing the comparative effectiveness of map construction protocols in wireless sensor networks

    Khelil, A., Chang, H. & Suri, N., 17/11/2011, 30th IEEE International Performance Computing and Communications Conference. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    MWM: A map-based world model for wireless sensor networks

    Khelil, A., Shaikh, F. K., Ayari, B. & Suri, N., 23/09/2011, Autonomics: 2nd International ICST Conference on Autonomic Computing and Communication Systems. EUDL, 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    Khelil, A., Germanus, D. & Suri, N., 2012, Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer, Vol. 7130. p. 177-196 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    Why Have Progresses in Real-Time Fault Tolerant Computing Been Slow?

    Kim, K. H., Ezhilchelvan, P. D., Kaiser, J., Moser, L. E., Nett, E. & Suri, N., 2004, IEEE Symposium on Reliable Distributed Systems . IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  8. Published

    Compositional design of RT systems: A conceptual basis for specification of linking interfaces

    Kopetz, H. & Suri, N., 16/05/2003, Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, 2003.. IEEE, p. 51-60 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    On the limits of the precise specification of component interfaces

    Kopetz, H. & Suri, N., 1/10/2003, 2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. IEEE, p. 26-27 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    An empirical study of injected versus actual interface errors

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 21/07/2014, Proceedings of the 2014 International Symposium on Software Testing and Analysis. ACM, p. 397-408 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Error models for the representative injection of software defects

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 2015, Software-engineering and management. Assmann, U. (ed.). Gesellschaft für Informatik, p. 118-119 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  12. Published

    Domain Generalization and Feature Fusion for Cross-domain Imperceptible Adversarial Attack Detection

    Li, Y., Angelov, P. & Suri, N., 2/08/2023, 2023 International Joint Conference on Neural Networks (IJCNN). Gold Coast, Australia: IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Forthcoming

    Fuzzy Detectors Against Adversarial Attacks

    Li, Y., Angelov, P. & Suri, N., 15/09/2023, (Accepted/In press) IEEE Symposium Series on Computational Intelligence. Mexico, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

    Livraga, G. (ed.), Torra, V. (ed.), Aldini, A. (ed.), Martinelli, F. (ed.) & Suri, N. (ed.), 2016, Springer.

    Research output: Book/Report/ProceedingsProceedings

  15. Published

    Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph

    Lu, Y., Yu, Z. & Suri, N., 1/10/2022, In: arXiv. abs/2210.00325, 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph

    Lu, Y., Yu, Z. & Suri, N., 31/08/2023, In: ACM Transactions on Privacy and Security. 26, 3, p. 1-39 39 p., 33.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Quantitative Reasoning about Cloud Security Using Service Level Agreements

    Luna, J., Taha, A., Trapero, R. & Suri, N., 1/07/2017, In: IEEE Transactions on Cloud Computing. 5, 3, p. 457-471 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Leveraging the Potential of Cloud Security Service-Level Agreements through Standards

    Luna, J., Suri, N., Iorga, M. & Karmel, A., 1/05/2015, In: IEEE Cloud Computing. 2, 3, p. 32-40 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    A security metrics framework for the Cloud

    Luna, J., Ghani, H., Germanus, D. & Suri, N., 18/07/2011, Proceedings of the International Conference on Security and Cryptography 2011. IEEE, p. 245-250 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Benchmarking cloud security level agreements using quantitative policy trees

    Luna, J., Langenberg, R. & Suri, N., 19/10/2012, Proceedings of the 2012 ACM Workshop on Cloud computing security workshop. ACM, p. 103-112 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Privacy-by-design based on quantitative threat modeling

    Luna, J., Suri, N. & Krontiris, I., 10/10/2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Quantitative assessment of Cloud Security Level Agreements: A case study

    Luna, J., Ghani, H., Vateva, T. & Suri, N., 2012, Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, 2012, Rome, Italy. SciTePress, p. 64-73 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Negotiating and brokering Cloud resources based on Security Level Agreements

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & Liccardo, L., 2013, Proceedings of the 3rd International Conference on Cloud Computing and Services Science - Volume 1. SciTePress, p. 533-541 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    SecLA-based negotiation and brokering of cloud resources

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & De Benedictis, A., 2014, Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Springer-Verlag, Vol. 453. p. 1-18 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    Compressive sensing for wireless sensor networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 2012, Intelligent Sensor Networks: The Integration of Sensor Networks, Signal Processing and Machine Learning. CRC Press, p. 379-396 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Previous 12 3 4 5 6 7 8 9 ...12 Next

Back to top