Self-Supervised Representation Learning for Adversarial Attack Detection Yi Li , Plamen Angelov, Neeraj Suri Proc. of ECCV, 2024 | ||
Investigating Location-Aware Advertisements in Anycast IP Networks Savvas Kastanakis, Ioana Livadariu, Vasileios Giotsas, Neeraj Suri Proc. of ANRW, 2024 | ||
Rethinking Self-Supervised Learning for Cross-Domain Adversarial Sample Recovery Yi Li, Plamen Angelov, Neeraj Suri Proc. of IJCNN, 2024 | ||
Federated Adversarial Learning for Robust Autonomous Landing Runway Detection Yi Li, Plamen Angelov, Zhengxin Yu, Alvaro Lopez Pellicer, Neeraj Suri Proc. of ICANN, 2024 | ||
UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification Alvaro Lopez Pellcier, Kittipos Giatgong, Yi Li, Neeraj Suri, Plamen Angelov Proc. of IJCNN, 2024 | ||
Real Arithmetic in TLAPM Ovini V.W. Gunasekera, Andrew Sogokon, Antonios Gouglidis, and Neeraj Suri Proc. of NFM, 2024 | ||
Scalable Content-centric Routing for Hybrid ICN. Sergi Rene, George Pavlou, Onur Ascigil Proc. of LANMAN, 2023 | ||
Ditto: Towards Decentralised Similarity Search for Web3 Services. Navin V. Keizer, Onur Ascigil, Michał Krol, George Pavlou Proc. of DAPPS, 2023 | ||
The Cloud Strikes Back: Investigating the Decentralization of IPFS. Leonhard Balduf, Maciej Korczyński, Onur Ascigil, Navin V. Keizer, George Pavlou, Björn Scheuermann, Michał Król Proc. of IMC, 2023 | ||
Compilation as a Defense: Enhancing DL Model Attack Robustness via Tensor Optimization. Stefan Trawicki, William Hackett, Lewis Birch, Neeraj Suri, Peter Garraghan Proc. of CAMLIS, 2023 | ||
Model Leeching: An Extraction Attack Targeting LLMs. Lewis Birch, William Hackett, Stefan Trawicki, Neeraj Suri, Peter Garraghan Proc. of CAMLIS, 2023 | ||
Fuzzy Detectors Against Adversarial Attacks. Yi Li, Plamen Angelov, Neeraj Suri Proc. of IEEE SSCI, 2023 | ||
20 Years of Inferring Inter-domain Routing Policies. Savvas Kastanakis, Vasileios Giotsas, Ioana Livadariu, Neeraj Suri Proc. of ACM IMC, 2023 | ||
Federated Meta Learning for Visual Navigation in GPS-denied Urban Airspace. Burak Yuksek, Zhengxin Yu, Neeraj Suri, Gokhan Inalhan Proc. of DASC, 2023 | ||
Content Censorship in the InterPlanetary File System. Srivatsan Sridhar, Onur Ascigil, Navin Keizer, Michał Kro ́l, Francois Genon, Se ́bastien Pierre, Yiannis Psaras, Etienne Rivie`re Proc. of NDSS, 2024 | ||
RAFL: A Robust and Adaptive Federated Meta-Learning Framework Against Adversaries. Zhengxin Yu, Yang Lu, and Neeraj Suri Proc. of IEEE MASS, 2023 | ||
Domain Generalization and Feature Fusion for Cross-domain Imperceptible Adversarial Attack Detection. Yi Li, Yang Lu, Plamen Angelov and Neeraj Suri Proc. of IEEE IJCNN, 2023 | ||
Cloud Security Requirement Based Threat Analysis Ahmed Taha, Alexander Lawall, and Neeraj Suri Proc. of IEEE ICNC, 2023 | ||
PPFM: An Adaptive and Hierarchical Peer-to-Peer Federated Meta-Learning Framework. Zhengxin Yu, Yang Lu, Plamen Angelov and Neeraj Suri Proc. of IEEE MSN, 2022 | ||
Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud. Salman Manzoor, Antonios Gouglidis Matthew Bradbury and Neeraj Suri Proc. of ACM CCS (Poster), 2022 | bib | |
Multi-Layer Threat Analysis of the Cloud Salman Manzoor, Antonios Gouglidis Matthew Bradbury and Neeraj Suri Proc. of ACM CCS (Poster), 2022 | bib | |
Understanding the confounding factors of inter-domain routing modeling Savvas Kastanakis, Vasilios Giotsas and Neeraj Suri Proc. of ACM IMC (Poster), 2022 | bib | |
Similarity-based Deep Neural Network to Detect Imperceptible Adversarial Attacks Eduardo Soares, Plamen Angelov and Neeraj Suri Proc. of IEEE CIDUE/SSCI, 2022 | bib | |
Towards Effective Performance Fuzzing Yiqun Chen, Matthew Bradbury and Neeraj Suri Proc. of ISSRE (FA), 2022 | bib | |
SlowCoach: Mutating Code to Simulate Performance Bugs Yiqun Chen, Oliver Schwahn, Roberto Natella, Matthew Bradbury and Neeraj Suri Proc. of ISSRE, 2022 | bib | |
Challenges in Identifying Network Attacks Using Netflow Data Edward Chuah, Neeraj Suri, Arshad Jhumka and Samantha Alt Proc. of NCA, 2021 | bib | |
Failure Diagnosis for Cluster Systems using Partial Correlations Edward Chuah, Arshad Jhumka, Samantha Alt, Todd Evans, Neeraj Suri Proc. of ISPA, 2021 | bib | |
World Wide ICS Honeypots:A Study into the Deployment of Conpot Honeypots Sam Maesschalck, Vasileios Giotsas, Nicholas Race Proc. of ICSS, 2021 | ||
IP Unbound: Robust, Responsive CDN-scale service without CDN-Scale Addresses Marwan Fayed, Vasileios Giotsas, Lorenz Bauer, Sami Kerola, Marek Majkowski, Pavel Odintsov, Jakub Sitnicki, Taejoong Chung, Dave Levin, Alan Mislove, Nick Sullivan, Chris Wood Proc. of SIGCOMM, 2021 | ||
Sentiment Analysis based Error Detection for Large-Scale Systems Khalid Alharthi, Arshad Jhumka, Sheng Di, Edward Chuah and Franck Cappello Proc. of DSN, 2021 | ||
Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems Patrizia Sailer, Igor Ivkic, Markus Tauber, Andreas Mauthe, Antonios Gouglidis Proc. of IFIP/IEEE International Symposium on Integrated Network Management, 2021 | ||
Fast Kernel Error Propagation Analysis in Virtualized Environments Nicolas Coppik, Oliver Schwahn and Neeraj Suri Proc. of ICST, 2021 | bib | |
From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security Charles Weir, Ben Hermann and Sascha Fahl Proc. of USENIX Security, 2020 | ||
Reduce, Reuse, Recycle: Repurposing existing measurements to identify stale traceroutes V. Giotsas, T. Koch, E. Fazzion, I. Cunha, M. Calder, H. Madhyastha, E. Katz-Bassett. ACM Internet Measurement Conference (IMC), 2020 | ||
Rise of the Cloud and the Private Internet T. Arnold, J. He, W. Jiang, M. Calder, I. Cunha, V. Giotsas, E. Katz-Bassett. ACM Internet Measurement Conference (IMC), 2020. | ||
ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource Benjamin Green, Richard Derbyshire, William Knowles, James Boorman, Pierre Ciholas, Daniel Prince and David Hutchison Proc. of USENIX Security – CSET Workshop, 2020 | ||
Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure Ahmed Taha, Ahmed Zakaria, Dongseong Kim and Neeraj Suri Proc. of IC2E, 2020 | bib | |
TraceSanitizer – Eliminating the Effects of Non-determinism on Error Propagation Analysis Habib Saissi, Stefan Winter, Oliver Schwahn, Karthik Pattabiraman and Neeraj Suri Proc. of DSN, 2020 | bib | |
A Framework to Support ICS Cyber Incident Response and Recovery Alex Staves, Harry Balderstone, Benjamin Green, Antonios Gouglidis and David Hutchison Proc. of ISCRAM 2020 | ||
General Access Control Guidance for Cloud Systems Vincent C. Hu, Michaela Iorga, Wei Bao, Ang Li, Qinghua Li and Antonios Gouglidis NIST Publication, SP 800-210, 2020 | ||
Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode Pierre Ciholas, Jose Such, Angelos Marnerides, Benjamin Green, Jiajie Zhang and Utz Roedig Proc. of DIMVA, 2020 | ||
A first look at the misuse and abuse of the IPv4 Transfer Market Vasileios Giotsas, Ioana Livadariu and Petros Gigis Proc. of PAM, 2020 | ||
Profiling IoT-based Botnet Traffic using DNS Owen Dwyer, Angelos Marnerides, Vasileios Giotsas and Troy Mursch Proc. of Globecomm, 2020 | ||
Honeypots for Automatic Network-Level Industrial Control System Security Sam Maesschalck, Vasileios Giotsas, Benjamin Green and Nicholas Races Proc. of Eurosys Doctoral workshop, 2020 | ||
HoneyPlant: A Distributed Hybrid Honeypot System for ICS Security Sam Maesschalck, Vasileios Giotsas, Benjamin Green and Nicholas Race Proc. of Annual UK System Research Challenges Workshop, 2020 | ||
(How Much) Does a Private WAN Improve Cloud Performance? Todd W Arnold, Ege Gurmericliler, Arpit Gupta, Matt Calder, Georgia Essig, Vasileios Giotsas and Ethan Katz-Bassett Proc. of INFOCOM, 2020 | ||
λBGP: Rethinking BGP programmability Nicholas Hart, Charalampos Rotsos, Vasileios Giotsas, Nicholas Race and David Hutchison Proc. of NOMS, 2020 | ||
Inferring Performance Bug Patterns from Developer Commits Yiqun Chen, Stefan Winter and Neeraj Suri Proc. of ISSRE, 2019 | bib | |
Gyro: A Modular Scale-Out Layer for Single-Server DBMSs Habib Saissi, Marco Serafini and Neeraj Suri Proc. of SRDS, 2019 | bib | |
Extracting Safe Thread Schedules from Incomplete Model Checking Results Patrick Metzler, Neeraj Suri and Georg Weissenbacher Proc. of SPIN, 2019 | bib | |
Assessing the State and Improving the Art of Parallel Testing for C Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri Proc. of ISSTA, 2019 | bib | |
MemFuzz: Using Memory Accesses to Guide Fuzzing Nicolas Coppik, Oliver Schwahn and Neeraj Suri Proc. of ICST, 2019 | bib | |
Communication standards for distributed renewable energy sources integration in future electricity distribution networks Anish Jindal, Angelos Marnerides, Antonios Gouglidis, Andreas Ulrich Mauthe and David Hutchison Proc. of IEEE ICASSP, 2019 | ||
Identifying infected energy systems in the wild Angelos Marnerides, Vasileios Giotsas and Troy Mursch Proc. Of e-energy, 2019 | ||
Stable and Practical AS Relationship Inference with ProbLink Yuchen Jin, Colin Scott, Amogh Dhamdhere, Vasileios Giotsas, Arvind Krishnamurthy and Scott Shenker Proc. of NSDI, 2019 | ||
Deep-learning based precoding techniques for next-generation video compression Aaron Chadha, Eirina Bourtsoulatze, Vasileios Giotsas, Yiannis Andreopoulos and Sergio Grce Proc. of IBC, 2019 | ||
Access Control in Industrial Internet of Things Stavros Salonikias, Antonios Gouglidis, Ioannis Mavridis and Dimitrios Gritzalis Book Chapter, 2019 | ||
Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds Joseph Gardiner, Barnaby Craggs, Benjamin Green and Awais Rashid Proc. of CPS-SPC, 2019 | ||
Everything is Awesome! Or is it?: Cyber Security Risks in Critical Infrastructure Awais Rashid, Joseph Gardiner, Benjamin Green and Barney Craggs Proc. of CRITIS, 2019 | ||
FUJITSU White Paper: Cyber Threat Lab Angelos Marnerides, Daniel Prince, John Couzins, Ryan Mills, Vasileios Giotsas, Paul McEvatt, David Markham and Catherine Irvine | ||
InfoLeak: Scheduling-based Information Leakage Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang and Neeraj Suri Proc. of PRDC, 2018 | bib | |
FastFI: Accelerating Software Fault Injections Oliver Schwahn, Nicolas Coppik, Stefan Winter and Neeraj Suri Proc. of PRDC, 2018 | bib | |
Exploring the Relationship Between Dimensionality Reduction and Private Data Release Bo-Chen Tai, Szu-Chuang Li, Yennun Huang and Neeraj Suri Proc. of PRDC, 2018 | bib | |
Protecting Cloud-based CIs: Covert Channel Vulnerabilities at the Resource Tsvetoslava Vateva-Gurova, Salman Manzoor, Ruben Trapero and Neeraj Suri Proc. of LNCS IOSEC, 2018 | bib | |
Threat Modeling the Cloud: An Ontology Based Approach Salman Manzoor, Tsvetoslava Vateva-Gurova, Ruben Trapero and Neeraj Suri Proc. of LNCS IOSEC, 2018 | bib | |
Assessing the Impact of Malware Attacks in Utility Networks Sandra König, Antonios Gouglidis, Benjamin Green and Alma Solar Book Chapter, 2018 | ||
G-DPS: A Game-theoretical Decision-making Framework for Physical Surveillance Games Ali Alshawish, Mohamed Amine Abid, Hermann de Meer, Stefan Schauer, Sandra König, Antonios Gouglidis and David Hutchison Book Chapter, 2018 | ||
Random Damage in Interconnected Networks Sandra König and Antonios Gouglidis Book Chapter, 2018 | ||
Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study Antonios Gouglidis, Sandra König, Benjamin Green, Karl Rossegger and David Hutchison Book Chapter, 2018 | ||
Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+ Antonios Gouglidis, Christos Grompanopoulos and Anastasia Mavridou Proc. of MeTRiD, 2018 | ||
An Analysis of Cyber Security Attack Taxonomies Ric Derbyshire, Benjamin Green, Andreas Ulrich Mauthe, Jeremy Simon Busby and David Hutchison Proc. of IEEE Euro S&P workshop, 2018 | ||
Open Testbeds for CNI Chris Hankin, Deeph Chana, Benjamin Green, Rafiullah Khan, Peter M3, Peter Popov, Awais Rashid and Sakir Sezer Commissioned report, 2018 | ||
On the Disaster Resiliency within the Context of 5G Networks: The RECODIS Experience Christian Esposito, Antonios Gouglidis, David Hutchison, Andrei Gurtov, Bjarne Helvik, Poul Heegaard, Gianluca Rizzo and Jacek Rak Proc. of MeTRiD, 2018 | ||
Verification of Policies in Human Cyber-Physical Systems: the Role and Importance of Resilience Antonios Gouglidis and David Hutchison Proc. of CPS-SR, 2018 | ||
Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services Heng Zhang, Ruben Trapero, Jesus Luna, Neeraj Suri Intl. Conference on Availability, Reliability and Security (ARES), 2018 | bib | |
A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems Hatem Ismail, Stefanie Roos and Neeraj Suri IEEE TrustComm, 2018 | bib | |
QRES: Quantitative Reasoning on Encrypted Security SLAs Ahmed Taha, Spyros Boukoros, Jesus Luna, Stefan Katzenbeisser, and Neeraj Suri https://arxiv.org/abs/1804.04426, 2018 | bib | |
Whetstone: Reliable Monitoring of Cloud Heng Zhang, Jesus Luna Garcia, Neeraj Suri and Ruben Trapero Proc. of Smartcomp, 2018 | bib | |
A Detection Mechanism for Internal Attacks in P2P Streaming Systems Hatem Ismail, Stefanie Roos, Neeraj Suri Proc. IEEE WoWMoM, 2018 | bib | |
Monitoring Path Discovery for Supporting Indirect Monitoring of Cloud Heng Zhang, Salman Manzoor, and Neeraj Suri Proc. of IC2E (IEEE Intl. Conf on Cloud Engg – Doctoral Symposium), 2018 | bib | |
Threat Modeling and Analysis for the Cloud Ecosystem Salman Manzoor, Heng Zhang, Neeraj Suri Proc. of IC2E (IEEE Intl. Conf on Cloud Engg – Doctoral Symposium), 2018 | bib | |
O Peer, Where Art Thou?: Uncovering Remote Peering Interconnections at IXPs Georgios Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas Dimitropoulos and Vasileios Giotsas Proc. of IMC, 2018 | ||
CommunityWatch: The Swiss-Army Knife of BGP Anomaly Detection Vasileios Giotsas Proc. of ANRW, 2018 | ||
Quick Verification of Concurrent Programs by Iteratively Relaxed Scheduling Patrick Metzler, Habib Saissi, Peter Bokor and Neeraj Suri Proc. of IEEE/ACM Automated Software Engg. (ASE), 2017 | bib | |
TrEKer: Tracing Error Propagation in Operating System Kernels Nicolas Coppik, Oliver Schwahn, Stefan Winter and Neeraj Suri Proc. of IEEE/ACM Automated Software Engg. (ASE), 2017 | bib | |
Towards DDoS Attack Resilient Wide Area Monitoring Systems Kubilay Demir and Neeraj Suri Proc. of Security in Critical Infrastructures Workshop @IEEE ARES, 2017 | bib | |
C’MON: Monitoring the Compliance of Cloud Services to Contracted Properties Soha Albaghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri Proc. of Intl. Conference on Availability, Reliability and Security (ARES), 2017 | bib | |
AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces Salman Manzoor, Jesus Luna and Neeraj Suri Proc. of IEEE Services Computing (SCC), 2017 | bib | |
A Security Architecture for Railway Signalling C. Schlehuber, M. Heinrich, T. Vateva-Gurova, S. Katzenbeisser and N. Suri Intl. Conference on Computer Safety, Reliability and Security (SAFECOMP), 2017 | bib | |
SLA-based Service Selection for Multi-Cloud Environments Ahmed Taha, Salman Manzoor and Neeraj Suri Proc. of IEEE EDGE Computing (EGDE), 2017 | bib | |
deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services Heng Zhang, Jesus Luna, Ruben Trapero and Neeraj Suri Proc. of IEEE Services Computing (SCC), 2017 | bib | |
A Framework for Ranking Cloud Security Services Ahmed Taha, Ruben Trapero, Jesus Luna, Neeraj Suri Proc. of IEEE Services Computing (SCC), 2017 | bib | |
Effectiveness of Driver Isolation and Testing in User Space Oliver Schwahn EuroSys Doctoral Workshop, 2017 | ||
Challenges and Approaches in Securing Safety-Relevant Railway Signalling Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, and Neeraj Suri Proc. of S4CIP, 2017 | bib | |
Error Propagation Analysis of Multithreaded Programs Using Likely Invariants Abraham Chan, Stefan Winter, Habib Saissi, Karthik Pattabiraman, Neeraj Suri Proc. of ICST, 2017 | bib | |
SeReCP: A Secure and Reliable Communication Platform for the Smart Grid Kubilay Demir, Neeraj Suri Proc. of PRDC, 2017 | bib | |
Verification of Resilience Policies that Assist Attribute Based Access Control Antonios Gouglidis, Vincent C. Hu, Jeremy Simon Busby and David Hutchison Proc. of IEEE ABAC, 2017 | ||
Protection against Cyber Attacks: Introducing Resilience for SCADA Networks Antonios Gouglidis and David Hutchison Proc. of Symposium on Innovative Smart Grid Cybersecurity Solutions, 2017 | ||
How Long is a Piece of String: Defining Key Phases and Observed Challenges within ICS Risk Assessment Benjamin Green, Daniel David Campbell Prince, Jeremy Simon Busby and David Hutchison Proc. of CPS, 2017 | ||
Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research Benjamin Green, Anh Tuan Le, Rob Antrobus, Utz Roedig, David Hutchison and Awais Rashid Proc. of Usenix CSET, 2017 | ||
On the Significance of Process Comprehension for Conducting Targeted ICS Attacks Benjamin Green, Marina Krotofil and Ali Abbasi Proc. of CPS, 2017 | ||
Inferring BGP blackholing activity in the Internet Vasileios Giotsas, Georgios Smaragdakis, Christoph Dietzel, Philipp Richter, Anja Feldmann and Arthur Berger Proc. of IMC, 2017 | ||
Detecting peering infrastructure outages in the wild Vasileios Giotsas, Christoph Dietzel, Georgios Smaragdakis, Anja Feldmann, Arthur Berger and Emile Aben Proc. of SiGCOMM, 2017 | ||
Achieving ICS resilience and security through granular data flow management Benjamin Green, Marina Krotofil and David Hutchison Proc. of CPS-SPC, 2016 | ||
Malicious Peers Eviction for P2P Overlays Hatem Ismail, Daniel Germanus, Neeraj Suri Proc. of CNS, 2016 | bib | |
Efficient Verification of Program Fragments: Eager POR Patrick Metzler, Habib Saissi, Péter Bokor, Robin Hesse and Neeraj Suri Proc of ATVA, 2016 | bib | |
Practical Formal Verification for Model Based Development of Cyber-Physical Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri Proc. of IEEE/IFIP Embedded and Ubiquitous Computing (EUC), 2016 | bib | |
Sentry: A novel approach for mitigating application layer DDoS security Heng Zhang, Ahmed Taha, Ruben Trapero, Jesus Luna and Neeraj Suri Proc. TrustCom, 2016 | bib | |
Trust Validation of Cloud IaaS: A Customer Centric Approach Salman Manzoor, Ahmed Taha and Neeraj Suri Proc. TrustCom, 2016 | bib | |
Identifying and Utilizing Dependencies Across Cloud Security Services Ahmed Taha, Patrick Metzler, Ruben Trapero, Jesus Luna, Neeraj Suri Proc. of Asia CCS, 2016 | bib | |
Reliable Memory-Efficient Name Forwarding in Named Data Networking Divya Saxena, Vaskar Raychoudhury, Christian Becker and Neeraj Suri Proc. EUC, 2016 | bib | |
A Multi-Level Approach to Resilience of Critical Infrastructures and Services Antonios Gouglidis, Syed Noor Ul Hassan Shirazi, Steven Simpson, Paul Smith and David Hutchison Proc. of ICT, 2016 | ||
Modelling security risk in critical utilities: the system at risk as a three player game and agent society Jeremy Simon Busby, Antonios Gouglidis, Stefan Rass and Sandra König Proc. of , 2016 | ||
Technology-related disasters: a survey towards disaster-resilient software defined networks Carmen Mas Machuca, Stefano Secci, Petra Vizaretta, Fernando Kuipers, Antonios Gouglidis, David Hutchison, Simon Jouet, Dimitrios Pezaros, Ahmed Elmokashfi, Poul Heegaard, Sasko Ristov and Marjan Gusev Proc. of RNDM, 2016 | ||
Threat awareness for critical infrastructures resilience Antonios Gouglidis, Benjamin Green, Jeremy Simon Busby, Mark Francis Rouncefield, David Hutchison and Stefan Schauer Proc. of RNDM, 2016 | ||
A Multi-commodity network flow model for cloud service environments Ioannis M. Stephanakis, Syed Noor Ul Hassan Shirazi, Antonios Gouglidis and David Hutchison Proc. of, 2016 | ||
Evaluation of Anomaly Detection Techniques for SCADA Communication Resilience Syed Noor Ul Hassan Shirazi, Antonios Gouglidis, Kanza Noor Syeda, Steven Simpson, Andreas Ulrich Mauthe, Ioannis M. Stephanakis and David Hutchison Proc. of RWS, 2016 | ||
Anomaly detection in the cloud using data density Syed Noor Ul Hassan Shirazi, Steven Simpson, Antonios Gouglidis, Andreas Ulrich Mauthe and David Hutchison Proc. of IEEE Cloud, 2016 | ||
BGPStream: A software framework for live and historical BGP data analysis Chiara Orsini, Alistair King, Danilo Giordano, Vasileios Giotsas and Alberto Dainotti Proc. of IMC, 2016 | ||
Cloud instance management and resource prediction for computation-as-a-service platforms Joseph Doyle, Vasileios Giotsas, Mohammad Ashraful Anam and Yiannis Andreopoulos Proc. of IC2E, 2016 | ||
Query processing for the internet-of-things: Coupling of device energy consumption and cloud infrastructure billing Francesco Renna, Joseph Doyle, Yiannis Andreopoulos and Vasileios Giotsas Proc. of IoTDI, 2016 | ||
Periscope: Unifying looking glass querying Vasileios Giotsas, Amogh Dhamdhere, K. C. Claffy Proc. of PAM, 2016 | ||
Detecting and Mitigating Sophisticated P2P Eclipse Attacks Hatem Ismail, Daniel Germanus and Neeraj Suri Proc. IEEE ICPADS, 2015 | bib | |
The Impact of Hypervisor Scheduling on Compromising Virtualized Environments Tsvetoslava Vateva-Gurova, Neeraj Suri, Avi Mendelson Proc. of DASC, 2015 | bib | |
Fault-Tolerance for Transient and Permanent Data Errors in Wireless Sensor Networks Azad Ali, Abdelmajid Khalil and Neeraj Suri Proc. of SRDS, 2015 | ||
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation Daniel Germanus, Hatem Ismail and Neeraj Suri Proc of SRDS, 2015 | bib | |
PBMC: Symbolic Slicing for the Verification of Concurrent Programs Habib Saissi, Peter Bokor, Neeraj Suri Symposium on Automated Technology for Verification and Analysis, ATVA, 2015 | bib | |
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms Thorsten Piper, Stefan Winter, Neeraj Suri and Thomas E. Fuhrman Proc. of EDCC, 2015 | bib | |
In the Compression Hornet’s Nest: A Security Study of Data Compression in Network Services Giancarlo Pellegrino, Davide Balzarotti, Stefan Winter, Neeraj Suri Proc. of USENIX Security Symposium, 2015 | bib | |
GRINDER: On Reusability of Fault Injection Tools Stefan Winter, Thorsten Piper, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo Proc. of ICSE/AST, 2015 | bib | |
Quantitative Assessment and Comparison of Cloud Service Providers’ Privacy Practices J. M. del Alamo, R. Trapero, Y. S. MartÃn, J. C. Yelmo and N. Suri Proc. CITA, 2015 | ||
Mitigating Timing Error Propagation in Mixed-Criticality Automotive Systems Thorsten Piper, Stefan Winter, Oliver Schwahn, Suman Bidarahalli and Neeraj Suri Proc. of ISORC, 2015 | bib | |
Optimizing Multi-Cloud Application Deployments with Security Controls as Constraints Philippe Massonet, Jesus Luna, Alain Pannetrat and Ruben Trapero Intl. Symposium on Engineering Secure Software and Systems (ESSoS), 2015 | ||
No PAIN, No Gain? The utility of PArallel fault INjections Stefan Winter, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo Intl. Conf on Software Engg (ICSE), 2015 | bib | |
Assurance Techniques for Industrial Control Systems (ICS) William Knowles Jose Miguel Such Aparicio, Antonios Gouglidis, Gaurav Misra, Awais Rashid Proc. of , 2015 | ||
The North West cyber security industry: export potential assessment Daniel David Campbell Prince and Oliver James Fitton Technical report, 2015 | ||
The future of maritime cyber security Oliver Fitton, Daniel Prince, Basil Germond and Mark Lacy Technical report, 2015 | ||
Mapping peering interconnections to a facility Vasileios Giotsas, Georgios Smaragdakis, Bradley Huffaker, Matthew Luckie and K. C. Claffy Proc. of CoNEXT, 2015 | ||
Perceptual video quality estimation by regression with myopic experts Vasileios Giotsas, Nikos Deligiannis, Pam Fisher and Yiannis Andreopoulos Proc. of QoMEx, 2015 | ||
IPv6 AS relationships, cliques, and congruence Vasileios Giotsas, Matthew Luckie, Bradley Huffaker and Kc Claffy Proc. of PAM, 2015 | ||
Video Clarity: High Speed Data Mining for Video Pam Fisher, Abbas Alhabib, Vasileios Giotsas and I. Andreopoulos Proc. of IBC, 2015 | ||
Event pattern discovery on IDS traces of Cloud Services Shin-Ying Huang, Yennun Huang, Neeraj Suri Proc. IEEE Intl Conf on Big Data and Cloud Computing (BDCloud), 2014 | bib | |
AHP-Based Quantitative Approach for Assessing & Comparing Cloud Security Ahmed Taha, Ruben Trapero, Jesus Luna and Neeraj Suri Proc. of TrustComm, 2014 | bib | |
Robust and Real-time Communication on Heterogeneous Networks for Smart Distribution Grid Kubilay Demir, Daniel Germanus and Neeraj Suri Proc. of SmartGridComm, 2014 | bib | |
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments Tsvetoslava Vateva-Gurova, Jesus Luna, Ginacarlo Pellegrino, Neeraj Suri Proc. of SECRYPT, 2014 | bib | |
Mitigating Eclipse Attacks in Peer-to-Peer Networks Daniel Germanus, Stefanie Roos, Thorsten Strufe, Neeraj Suri Proc. of CNS, 2014 | bib | |
Practical Use of Formal Verification for Safety Critical Cyber-Physical Systems: A Case Study Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter and Neeraj Suri Proc CPSNA, 2014 | bib | |
Socio-technical security analysis of Industrial Control Systems (ICS) Benjamin Green Daniel Prince, Utz Roedig, Jeremy Busby and David Hutchison Proc. of eWiC, 2014 | ||
An Empirical Study of Injected versus Actual Interface Errors Anna Lanzaro, Roberto Natella, Stefan Winter, Domenico Cotroneo and Neeraj Suri Proc. of ISSTA, 2014 | bib | |
Robust Compressive Data Gathering in Wireless Sensor Networks with Linear Topology Mohammadreza Mahmudimanesh and Neeraj Suri Proc. of DCOSS, 2014 | bib | |
Efficient Agile Sink Selection in Wireless Sensor Networks based on Compressed Sensing Mohammadreza Mahmudimanesh, Amir Naseri, and Neeraj Suri Proc. of DCOSS, 2014 | bib | |
Towards a Framework for Benchmarking Privacy-ABC Technologies Fatbardh Veseli1, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, and Neeraj Suri Proc. of IFIP SEC, 2014 | bib | |
Agile Sink Selection in Wireless Sensor Networks Mohammadreza Mahmudimanesh, Neeraj Suri Proc. of SECON, 2014 | bib | |
User-Centric Security Assessment of Software Configurations: A Case Study Hamza Ghani, Jesus Luna Garcia, Ivaylo Petkov and Neeraj Suri Proc. ESSoS, 2014 | bib | |
Design and construction of an Industrial Control System testbed Benjamin Green, Ben Paske, David Hutchison and Daniel Prince Proc. of PG Net, 2014 | ||
Inferring complex AS relationships Vasileios Giotsas, Matthew Luckie, Bradley Huffaker and Kc Claffy Proc. of IMC, 2014 | ||
Model-Based Generation of Run-Time Monitors for AUTOSAR Lars Patzina, Sven Patzina, Thorsten Piper, and Paul Manns Proc. of the 9th European Conference on Modelling Foundations and Applications (ECMFA), pp. 70-85, 2013 | ||
Quantitative Assessment of Software Vulnerabilities Based on Economic-Driven Security Metrics Hamza Ghani, Jesus Luna Garcia and Neeraj Suri Proc. Of CRISIS, 2013 | bib | |
Predictive Vulnerability Scoring in the Context of Insufficient Information Availability Hamza Ghani, Jesus Luna Garcia, Neeraj Suri, Abdelmajid Khelil and Najib Alkadri CRISIS, 2013 | bib | |
Quantitative Assessment of Software Vulnerabilities Based on Economic-Driven Security Metrics Hamza Ghani, Jesus Luna Garcia and Neeraj Suri Proc. of CRISIS, 2013 | bib | |
PoWerStore: Proofs of Writing for Efficient and Robust Storage Dan Dobre, Ghassan Karame, Wenting Li, Matthias Majuntke, Neeraj Suri and Marko Vukoliç Proc. of ACM CCS, 2013 | bib | |
Coral: Reliable and Low-latency P2P Convergecast for Critical Sensor Data Collection Daniel Germanus, Johannes Schwandke, Abdelmajid Khelil, Neeraj Suri Proc. of IEEE SmartGridComm Symposium, 2013 | bib | |
Efficient Verification of Distributed Protocols Using Stateful Model Checking Habib Saissi, Peter Bokor, Can Arda Müftüoglu, Marco Serafini and Neeraj Suri Proc. of SRDS, 2013 | bib | |
On Using Threat Modeling for Financial Damage Estimation Hamza Ghani, Jesus Luna, Fabian Letzkus and Neeraj Suri Proc. of NETYS, 2013 | ||
Negotiating and Brokering Cloud Resources based on Security Level Agreements Jesus Luna, Tsvetoslava Vateva-Gurova, Neeraj Suri, Massimiliano Rak, Loredana Liccardo Proc. of the International Conference on Cloud Computing and Services Science, 2013 | bib | |
simFI: From single to simultaneous software fault injections Stefan Winter, Michael Tretter, Benjamin Sattler, Neeraj Suri Proc. of DSN-DCCS, 2013 | bib | |
Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach Tan Feng, Qixin Wang, Lei Bu, Rong Zheng, Yufei Wang, Neeraj Suri Proc. of DSN-PDS, 2013 | bib | |
Information Quality Aware Co-design of Sampling and Transport in Wireless Sensor Networks Vinay Sachidananda, Abdelmajid Khelil, David Noack and Neeraj Suri Proc. WMNC, 2013 | bib | |
Sampling and Transport Co-design in Wireless Sensor Networks Vinay Sachidananda, Abdelmajid Khelil, David Noack and Neeraj Suri Proc. of Wireless On-Demand Network Systems & Services (WONS), 2013 | bib | |
Trading Transport Timeliness and Reliability for Efficiency in Wireless Sensor Networks Vinay Sachidananda, Abdelmajid Khelil, D. Umap, Matthias Majuntke, Neeraj Suri Proc. Intl Conf on Networking Sensing and Control (ICNSC), 2013 | bib | |
A use-based approach for enhancing UCON Christos Grompanopoulos, Antonios Gouglidis and Ioannis Mavridis Proc. of International Workshop on Security and Trust Management, 2013 | ||
Verification of secure inter-operation properties in multi-domain RBAC systems Antonios Gouglidis, Ioannis Mavridis and Vincent C. Hu Proc. of IEEE SSIRI-C, 2013 | ||
A methodology for the development and verification of access control systems in cloud computing Syed Noor Ul Hassan Shirazi, Steven Simpson, Antonios Gouglidis, Andreas Ulrich Mauthe and David Hutchison Proc. of Conference on e-Business, e-Services and e-Society, 2013 | ||
Understanding cyber criminals and measuring their future activity Claire Hargreaves and Daniel Prince Technical report, 2013 | ||
The future of digital disrupters: rethinking the digital divide Mark Lacy and Daniel Prince Technical report, 2013 | ||
Small business cyber security workshop 2013: towards digitally secure business growth Daniel Prince and Nick King Technical report, 2013 | ||
Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research William Knowles, Daniel Prince, David Hutchison, Jules Ferdinand Pagna Disso and Kevin Jones Proc. of ICS & SCADA Cyber Security, 2013 | ||
AS relationships, customer cones, and validation Matthew Luckie, Bradley Huffaker, Amogh Dhamdhere, Vasileios Giotsas, Kc Claffy Proc. of IMC, 2013 | ||
Improving the discovery of IXP peering links through passive BGP measurements Vasileios Giotsas and Shi Zhou Proc. of infocom, 2013 | ||
Inferring multilateral peering Vasileios Giotsas, Shi Zhou, Matthew Luckie and Kc Claffy Proc. of CoNEXT, 2013 | ||
Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees Jesus Luna, Robert Langenberg, Neeraj Suri Proc. of CCSW (ACM Cloud Computing Security Workshop), 2012 | bib | |
Privacy-by-Design Based on Quantitative Threat Modeling Jesus Luna, Neeraj Suri, Ioannis Krontiris Proc. of Conference on Risks and Security of Internet and Systems (CRISIS), 2012 | bib | |
On Co-modeling the Sampling and Transport in Wireless Sensor Networks Vinay Sachidananda, Abdelmajid Khelil, David Noack and Neeraj Suri Proceedings of the 11th GI/ITG KuVS Fachgespr, 2012 | ||
Balanced Spatio-Temporal Compressive Sensing for Multi-hop Wireless Sensor Networks Mohammadreza Mahmudimanesh, Abdelmajid Khelil, Neeraj Suri Proceedings of Mobile Ad hoc and Sensor Systems (MASS), 2012 | bib | |
The Hierarchical Microkernel: A Flexible and Robust OS Architecture Stefan Winter, Martin Tsarev, Dennis Feldmann, Robert Reinecke Proc. of Dependable Systems & Networks (DSN), 2012 (Supplemental Proceedings) | ||
Susceptibility Analysis of Structured P2P Systems to Localized Eclipse Attacks Daniel Germanus, Robert Langenberg, Abdelmajid Khelil, Neeraj Suri Proc. of Symposium on Reliable Distributed Systems (SRDS), pp. 11-20, 2012 | bib | |
Quantitative Assessment of Cloud Security Levels: A Case Study Jesus Luna, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri Proc. of Security and Cryptography (SECRYPT), pp. 64-73, 2012 | bib | |
Instrumenting AUTOSAR for Dependability Assessment: A Guidance Framework Thorsten Piper, Stefan Winter, Paul Manns and Neeraj Suri Proc. of Dependable Systems & Networks (DSN/DCCS), pp. 1-12, 2012 | bib | |
Fast Indoor Radio-Map Building for RSSI-based Localization Systems Philipp M. Scholl, Stefan Kohlbrecher, Vinay Sachidananda, Kristof Van Laerhoven Proc. of INSS, 2012 | ||
Information Quality Aware Co-design of Sampling and Transport in Wireless Sensor Networks Vinay Sachidananda, Abdelmajid Khelil, Neeraj Suri Proc. of European Conference on Wireless Sensor Networks (EWSN), Poster, 2012 | bib | |
Grid access control models and architectures Antonios Gouglidis and Ioannis Mavridis Book Chapter, 2012 | ||
Perceptual Influences on Risk Assessments and the Challenges for Information Security and Network Management William Knowles, Daniel Prince and David Hutchison 2012 | ||
Role-based secure inter-operation and resource usage management in mobile grid systems Antonios Gouglidis and Ioannis Mavridis Proc. of IFIP International Workshop on Information Security Theory and Practices, 2012 | ||
Towards utilizing Tcpcrypt in mobile healthcare applications Stefanos A. Nikolidakis, Vasileios Giotsas, Emmanouil Georgakakis, Dimitrios D. Vergados and Christos Douligeris Proc. of MobiHealth, 2012 | ||
Valley-free violation in Internet routing: analysis based on BGP Community data Vasileios Giotsas and Shi Zhou Proc. of ICC, 2012 | ||
The impact of fault models on software robustness evaluations Stefan Winter, Constantin Sarbu, Neeraj Suri, Brendan Murphy Proc. of ICSE 2011, pp 51-60 | bib | |
DKM: Distributed k-Connectivity Maintenance in Wireless Sensor Networks Piotr Szczytowski, Abdelmajid Khelil, Neeraj Suri Proc. of WONS, pp. 83-90, 2011 | bib | |
Assessing the Comparative Effectiveness of Map Construction Protocols in Wireless Sensor Networks Abdelmajid Khelil, Hanbin Chang, Neeraj Suri Proc. of IPCCC, pp. 1-6, 2011 | ||
Fork-Consistent Constructions From Registers Matthias Majuntke, Dan Dobre, Christian Cachin and Neeraj Suri Proc. of OPODIS, pp. 283-298, 2011 | bib | |
An Adaptive and Composite Spatio-Temporal Data Compression Approach for Wireless Sensor Networks Azad Ali, Abdelmajid Khelil, Piotr Szczytowski and Neeraj Suri Proc. of ACM Intl Conf on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), pp. 67-76, 2011 | bib | |
Supporting Domain-Specific State Space Reductions through Local Partial-Order Reduction Peter Bokor, Marco Serafini, Johannes Kinder, Neeraj Suri Proc. of Automated Software Engineering (ASE), pp. 113-122, 2011 | bib | |
Building a long term strategy for International Collaboration in Trustworthy ICT Security, Privacy and Trust in Global Networks and Services James Clarke, Neeraj Suri, Michel Riguidel, Aljosa Pasic Proc. of System Security (SysSec), 2011 | ||
To Crash or Not To Crash: Efficient Modeling of Fail-Stop Faults Habib Saissi, Peter Bokor, Marco Serafini and Neeraj Suri Proc. of Logical Aspects of Fault Tolerance (LAFT), 2011 (invited paper) | ||
A Security Metrics Framework for the Cloud Jesus Luna, Hamza Ghani, Daniel Germanus, and Neeraj Suri Proc. of International Conference on Security and Cryptography (SECRYPT), pp. 245-250, 2011 | bib | |
TOM: Topology Oriented Maintenance in Sparse Wireless Sensor Networks Piotr Szczytowski, Abdelmajid Khelil, Azad Ali and Neeraj Suri Proc. of Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 548-556, 2011 | bib | |
The Complexity of Robust Atomic Storage Dan Dobre, Rachid Guerraoui, Matthias Majuntke, Neeraj Suri and Marko Vukolic Proc. ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), pp. 59-68, 2011 | bib | |
Fork-Consistent Constructions From Registers Matthias Majuntke, Dan Dobre and Neeraj Suri Proc. ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), pp. 209-210, 2011 (Brief Announcement) | bib | |
Efficient Model Checking of Fault-Tolerant Distributed Protocols Peter Bokor, Johannes Kinder, Marco Serafini and Neeraj Suri Proc. of DSN/DCCS, pp. 73-84, 2011 | ||
INDEXYS, A Logical Step Beyond GENESYS – INDustrial EXploitation of the genesYS cross-domain architecture Andreas Eckel, Neeraj Suri et al Proc. of Symposium on Computer Safety, Reliability and Security (SAFECOMP), 2010 | ||
Simulation and Evaluation of Mixed-Mode Environments: Towards Higher Quality of Simulations Vinay Sachidananda, Diego Costantini, Christian Reinl, Dominik Haumann, Karen Petersen, Parag S. Mogre, and Abdelmajid Khelil Proc. of Simulation, Modeling and Programming for Autonomous Robots (SIMPAR), 2010 | ||
Quality of Information in Wireless Sensor Networks: A Survey Vinay Sachidananda, Abdelmajid Khelil, Neeraj Suri Proc. of Information Quality (ICIQ), 2010 | bib | |
Leveraging the Next-Generation Power Grid: Data Sharing and Associated Partnerships Ionna Dionysiou, Harald Gjermundrod, Daniel Germanus, Abdelmajid Khelil, Neeraj Suri, David E. Bakken, and Carl Hauser Proc. ISGT, 2010 | ||
Eventually Linearizable Shared Objects Marco Serafini, Dan Dobre, Matthias Majuntke, Peter Bokor and Neeraj Suri Proc. of ACM Symposium on Principles of Distributed Computing (PODC), pp. 95-104, 2010 | bib | |
Mobility Assisted Adaptive Sampling in Wireless Sensor Networks Piotr Szczytowski, Faisal Karim Shaikh, Vinay Sachidananda, Abdelmajid Khelil and Neeraj Suri Proc. of International Conference on Networked Sensing Systems (INSS), Demo Session, 2010 | ||
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays Daniel Germanus, Abdelmajid Khelil and Neeraj Suri Proc. of International Symposium on Architecting Critical Systems (ISARCS), pp. 161-178, 2010 | bib | |
On Efficient Models for Model Checking Message-Passing Distributed Protocols Peter Bokor, Marco Serafini, Neeraj Suri Proc. of Formal Methods for Distributed Systems (FORTE), pp. 216-223, 2010 | bib | |
Localized Energy Hole Profiling in Wireless Sensor Networks Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri Proc. IEEE symposium on Computers and Communications (ISCC), pp. 100-106, 2010 | bib | |
Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective Abdelmajid Khelil, Sebastian Jeckel, Daniel Germanus and Neeraj Suri Proc. of Mobile Lightweight Wireless Systems (MOBILIGHT), pp. 400-414, 2010 | bib | |
Data-based Agreement for Inter-Vehicle Coordination Brahim Ayari, Abdelmajid Khelil, Kamel Saffar and Neeraj Suri Proc. of Mobile Data Management (MDM), Demo Track, 2010 | bib | |
Scrooge: Reducing the Costs of Fast Byzantine Replication in Presence of Unresponsive Replicas Marco Serafini, Peter Bokor, Dan Dobre, Matthias Majuntke and Neeraj Suri Proc. of DSN-DCCS, pp. 353-362, 2010 | bib | |
HP: Hybrid Paxos for WANs Dan Dobre, Matthias Majuntke, Marco Serafini and Neeraj Suri Proc. of European Dependable Computing Conference (EDCC), pp. 117-126, 2010 | bib | |
Generic Information Transport for Wireless Sensor Networks Faisal Karim Shaikh, Abdelmajid Khelil, Brahim Ayari, Piotr Szczytowski and Neeraj Suri Proc. of Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 27-34, 2010 | bib | |
ASample: Adaptive Spatial Sampling in Wireless Sensor Networks Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri Proc. of Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 35-42, 2010 | bib | |
Reordering for Better Compressibility: Efficient Spatial Sampling in Wireless Sensor Networks Mohammadreza Mahmudimanesh, Abdelmajid Khelil and Neeraj Suri Proc. of Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 50-57, 2010 | ||
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs Brahim Ayari, Abdelmajid Khelil and Neeraj Suri Proc. of Mobile Data Management (MDM), pp. 135-144, 2010 | bib | |
Detecting and assessing the hybrid IPv4/IPv6 as relationships Vasileios Giotsas and Shi Zhou Proc. of SIGCOMM, 2011 | ||
Inferring Internet AS Relationships Based on BGP Routing Policies Vasileios Giotsas and Shi Zhou | ||
A secure ubiquitous healthcare system based on IMS and the HL7 standards Stefanos A. Nikolidakis, Emmanouil Georgakakis, Vasileios Giotsas, Dimitrios D. Vergados and Christos Douligeris Proc. of Petra, 2010 | ||
TRCCIT: Tunable Reliability with Congestion Control for Information Transport in Wireless Sensor Networks Faisal Karim Shaikh, Abdelmajid Khelil, Azad Ali and Neeraj Suri Proc. of Wireless Internet Conference (WICON), pp. 1-9, 2010 | ||
Abortable Fork-Linearizable Storage Matthias Majuntke, Dan Dobre, Marco Serafini, and Neeraj Suri Proc. of OPODIS, pp. 255-269, 2009 | bib | |
GENESYS: A Cross- Domain Architecture for Embedded Systems Roman Obermaisser, Hermann Kopetz, Bernhard Huber, Christian El-Salloum, Roberto Zafalon, Fabrice Auzanneau, K. Kronloef, Pascal Millet, Michael Borth, C. Couvreur, Neeraj Suri, Sergio Campos, Eila Ovaska, and Michael Goedecke Proc. of DATE09 on Designing for Embedded Parallel Computing Platforms: Architectures, Design Tools, and Applications, 2009 | ||
Role-Based Symmetry Reduction of Fault-tolerant Distributed Protocols with Language Support Peter Bokor, Marco Serafini, Neeraj Suri and Helmut Veith Proc. of Formal Methods and Software Engineering (ICFEM), pp. 147-166, 2009 | bib | |
Efficient Robust Storage Using Secret Tokens Dan Dobre, Matthias Majuntke, Marco Serafini and Neeraj Suri Proc. of Stabilization, Safety, and Security of Distributed Systems (SSS), pp. 269-283, 2009 | bib | |
A mobile healthcare system using IMS and the HL7 framework Stefanos Nikolidakis, Vasileios Giotsas, Dimitrios Vergados and Christos Douligeris Proc. of ANCS, 2009 | ||
A novel power-efficient middleware scheme for sensor grid applications Nikolaos I. Miridakis, Vasileios Giotsas, Dimitrios D. Vergados and Christos Douligeris Proc. of QShine, 2009 | ||
MPM: Map based Predictive Monitoring for Wireless Sensor Networks Azad Ali, Abdelmajid Khelil, Faisal Karim Shaikh, and Neeraj Suri Proc. of Autonomics, pp. 79-95, 2009 | bib | |
Design and Formal Verification of Membership Middleware for Dependable Automotive Network Systems Kohei Sakurai, Marco Serafini, Peter Bokor and Neeraj Suri International Congress on Electronic Systems for Vehicles, 2009 | ||
Brief Announcement: Efficient Model Checking of Fault-tolerant Distributed Protocols Using Symmetry Reduction Peter Bokor, Marco Serafini, Neeraj Suri and Hermann Veith Proc. of Distributed Computing DISC, 2009 | bib | |
Map-Based Modeling and Design of Wireless Sensor Networks with OMNeT++ Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri Proc. of Performance Evaluation of Computer and Telecommunication Systems (SPECTS), pp. 162-169, 2009 | bib | |
AReIT: Adaptable Reliable Information Transport for Service Availability in Wireless Sensor Networks Faisal Karim Shaikh, Abdelmajid Khelil and Neeraj Suri Proc. of Wireless Networks (ICWN), 2009 | bib | |
Map-based Compressive Sensing Model for Wireless Sensor Network Architecture, A Starting Point Mohammadreza Mahmudimanesh, Abdelmauid Khelil, Nasser Yazdani Proc. of Wireless Sensor Networks Architectures, Simulation and Programming (WASP), 2009 | bib | |
MAP++: Support for Map-Based WSN Modeling and Design with OMNeT++ Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri Proc. of Workshop on OMNeT++, pp. 77-87, 2009 | bib | |
On Equivalence Partitioning of Code Paths inside OS Kernel Components Constantin Sârbu, Nachiappan Nagappan and Neeraj Suri Proc. of Software Technologies for Future Dependable Distributed Systems (STFSSD), 2009 | bib | |
gMAP: Efficient Construction of Global Maps for Mobility-Assisted Wireless Sensor Networks Abdelmajid Khelil, Faisal Karim Shaikh, Azad Ali and Neeraj Suri Proc. of Wireless On demand Network Systems and Services (WONS), pp. 189-196, 2009 | ||
A foundation for defining security requirements in grid computing Antonios Gouglidis and Ioannis Mavridis Proc. of IEEE PCI, 2009 | ||
Implementation and Evaluation of Delay-Aware and Fault-Tolerant Mobile Transactions Brahim Ayari, Abdelmajid Khelil, Neeraj Suri and Eugen Bleim Proc. of E-Medical Systems (E-Medisys’08), 2008 [Invited] | bib | |
On the Time-Complexity of Robust and Amnesic Storage Dan Dobre, Matthias Majuntke and Neeraj Suri Proc. OPODIS, pp. 197-216, 2008 | bib | |
Reducing the Costs of Large-Scale BFT Replication Marco Serafini and Neeraj Suri Proc. LADIS, 2008 | ||
Low-latency Access to Robust Amnesic Storage Dan Dobre, Matthias Majuntke and Neeraj Suri Proc. LADIS, 2008 | ||
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by use of Executable Formal Specifications Kohei Sakurai, Peter Bokor, Neeraj Suri Proc. HASE, pp. 261-270, 2008 | bib | |
Dependable and Cost-Effective Architecture for X-by-Wire with Membership Middleware Kohei Sakurai, Masahiro Matsubara, Marco Serafini, Neeraj Suri Proc. FISITA, 2008 | ||
MM-ulator: Towards a Common Evaluation Platform for Mixed Mode Environments Matthias Krop , Arthur Herzog, Daniel Jacobi, Kim Listmann, Karen Petersen, Katayon Radkhah, Christian Reinl, Faisal Karim Shaikh, Armin Strobel and Oskar von Stryk Proc. of Simulation, Modeling, and Programming for Autonomous Robots (SIMPAR), 2008 | ||
Profiling the Operational Behavior of OS Device Drivers Constantin Sârbu, Andréas Johansson, Neeraj Suri and Nachi Nagappan ISSRE, pp. 127-136, 2008 | bib | |
MWM: A Map-based World Model for Event-driven Wireless Sensor Networks Abdelmajid Khelil, Faisal Karim Shaikh, Brahim Ayari and Neeraj Suri Proc. of Autonomic Computing and Communication Systems (AUTONOMICS), 2008 | bib | |
INcreasing Security and Protection through Infrastructure REsilience: the INSPIRE Project Salvatore D’Antonio, Abdelmajid Khelil, Luigi Romano and Neeraj Suri Proc. of Critical Information Infrastructures Security (CRITIS), pp. 109-118, 2008 | ||
Delay-Aware Mobile Transactions Brahim Ayari, Abdelmajid Khelil and Neeraj Suri Proc. of Software Technologies for Future Embedded & Ubiquitous Systems (SEUS), pp. 280-291, 2008 | bib | |
Strengthened State Transitions for Complete Invariant Verification in Practical Depth-Induction Peter Bokor, Sandeep Shukla, András Pataricza and Neeraj Suri AFM, 2008 | ||
Trust Characterization for Dependable Distributed Systems Marco Serafini and Neeraj Suri EUROSYS. Doctoral Workshop, 2008 | ||
Efficient Asynchronous Agreement Protocols Dan Dobre and Neeraj Suri EUROSYS. Doctoral Workshop, 2008 | ||
Semantic Property Preserving Abstractions for Automated Verification of Fault-Tolerance Peter Bokor and Neeraj Suri EUROSYS. Doctoral Workshop, 2008 | ||
On Building (and Sojourning) the State-space of Windows Device Drivers Constantin Sârbu and Neeraj Suri Workshop on State-space Exploration for Automated Testing (SSEAT), 2008 | bib | |
Execution Path Profiling for OS Device Drivers: Viability and Methodology Constantin Sârbu, Andréas Johansson and Neeraj Suri Proc. of Service Availability Symposium (ISAS), Tokyo, Japan. Lecture Notes in Computer Science 5017, Springer Verlag, pp. 90-109, 2008 | bib | |
A Comparative study of Data Transport Protocols in Wireless Sensor Networks Faisal Karim Shaikh, Abdelmajid Khelil and Neeraj Suri Proc. of World of Wireless, Mobile and Multimedia Networks (WOWMOM), pp. 1-9, 2008 | ||
Sustaining Property Verification of Synchronous Dependable Protocols Over Implementation Péter Bokor, Marco Serafini, Áron Sisak, András Pataricza and Neeraj Suri Proc. of High Assurance Systems Engineering Symposium (HASE), pp. 169-178, 2007 | ||
A Multi Variable Optimization Approach for the Design of Integrated Dependable Real-Time Embedded Systems Shariful Islam and Neeraj Suri Proc. of Embedded and Ubiquitous Computing (EUC), pp. 517-530, 2007 | bib | |
On the Impact of Injection Triggers for OS Robustness Evaluation Andréas Johansson, Brendan Murphy and Neeraj Suri Proc. of International Symposium on Software Reliability Engineering (ISSRE), pp. 117-126, 2007 | bib | |
The Fail-Heterogeneous Architectural Model Marco Serafini and Neeraj Suri Proc. of Symposium on Reliable Distributed Systems (SRDS), pp. 103-113, 2007 | bib | |
On the Latency-Efficiency of Message-Parsimonious Asynchronous Atomic Broadcast Dan Dobre, HariGovind V. Ramasamy and Neeraj Suri Proc. of Symposium on Reliable Distributed Systems (SRDS), pp. 311-322, 2007 | bib | |
Model-Based Development of Distributed Embedded Real-Time Systems with the DECOS Tool-Chain Wolfgang Herzner, Rupert Schlick, Martin Schlager, Bernhard Leiner, Bernhard Huber, András Balogh, György Csertan, Alain LeGuennec, Thierry LeSergent, Neeraj Suri and Shariful Islam Proc. SAE Aerotech, 2007 | ||
Gossiping: Adaptive and Reliable Broadcasting in MANETs Abdelmajid Khelil and Neeraj Suri Proc. of Latin-American Symposium on Dependable Computing (LADC), Sep. 2007 | bib | |
On Detecting Termination in the Crash-Recovery Model Felix C. Freiling, Matthias Majuntke, Neeraj Mittal Proc. of European Conference on Parallel and Distributed Computing (Euro-Par), 2007 | ||
Latency-Efficient Atomic Broadcast for WANs Dan Dobre, Matthias Majuntke, Neeraj Suri Large-Scale Distributed Systems and Middleware (LADIS), 2007 | bib | |
On the Selection of Error Model(s) For OS Robustness Evaluation Andréas Johansson, Neeraj Suri and Brendan Murphy Proc. of Dependable Systems & Networks (DSN/DCCS), pp. 502-511, 2007 | bib | |
A Tunable Add-On Diagnostic Protocol for Time-Triggered Systems Marco Serafini, Neeraj Suri et al. Proc. of Dependable Systems & Networks (DSN/DCCS), pp. 164-174, 2007 | bib | |
Meeting the Evolving Reliability Requirements for WSN Applications Faisal Karim Shaikh, Abdelmajid Khelil, Neeraj Suri European Conference on Wireless Sensor Networks (EWSN), 2007 | ||
A Line in the Sand: Emerging Embedded System Challenges Neeraj Suri Microelectronics Keynote, 2006 | ||
On Modeling the Reliability of Data Transport in Wireless Sensor Networks Faisal Karim Shaikh, Abdelmajid Khelil, Neeraj Suri Proc. of Parallel, Distributed and Network-based Processing (PDP), pp. 395-402, 2007 | bib | |
Supporting Heterogeneous Applications in the DECOS Integrated Architecture Christian El-Salloum, Roman Obermaisser, Bernhard Huber, Hermann Kopetz, Neeraj Suri Microelectronics ME, 2006 | ||
A SW-HW Integration Process for the Generation of Platform Specific Models Shariful Islam, György Csertán, András Balogh, Wolfgang Herzner, Thierry Le Sergent, András Pataricza, Neeraj Suri Microelectronics ME, 2006 | ||
From Model-Based Design to Deployment of Integrated, Embedded, Real-Time Systems: The DECOS Tool-Chain Wolfgang Herzner, Martin Schlager, Thierry Le Sergent, Bernhard Huber, Shariful Islam, Neeraj Suri, András Balogh Microelectronics ME, 2006 | ||
FT-PPTC: An Efficient and Fault-Tolerant Commit Protocol for Mobile Environments Brahim Ayari, Abdelmajid Khelil, Neeraj Suri Proc. of Symposium on Reliable Distributed Systems (SRDS), pp. 96-105, 2006 | ||
Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures Felix C. Freiling, Matthias Majuntke and Neeraj Mittal Proc. of Stabilization, Safety, and Security of Distributed Systems (SSS), 2006 | ||
Mobility-Aware Buffering for Delay-Tolerant Broadcasting in MANETs Abdelmajid Khelil Proc. of Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS’06), 2006 | ||
Closing the Gap in Failure Analysis Brendan Murphy, Mario Garzia and Neeraj Suri Workshop on Applied SW Reliability @ Proc. of Dependable Systems and Networks (DSN), 2006 | ||
One Step Consensus with Zero Degradation Dan Dobre and Neeraj Suri Proc. of Dependable Systems and Networks (DSN), pp. 137-146, 2006 | bib | |
Improving Robustness Testing of COTS OS Extensions Constantin Sârbu, Andréas Johansson, Falk Fraikin and Neeraj Suri Proc. of International Service Availability Symposium (ISAS), Published in Lecture Notes in Computer Science 4328, Springer Verlag, pp. 120-139, 2006 | bib | |
Dependability Driven Integration of Mixed Criticality SW Components Shariful Islam, Robert Lindström and Neeraj Suri 9th IEEE International Symposium on Object and Component-oriented Real-time distributed Computing (ISORC), pp. 485-495, 2006 | bib | |
Evaluation of Partition-Aware MANET Protocols and Applications with ns-2 Abdelmajid Khelil, Pedro José Marrón, R. Dietrich, and Kurt Rothermel Proc. of Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS’05), 2005 | ||
Contact-Based Mobility Metrics for Delay-Tolerant Ad Hoc Networking Abdelmajid Khelil, Pedro José Marrón, and Kurt Rothermel Proc. of Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), 2005 | ||
Designing Efficient Fail-Safe Multi-tolerant Systems Arshad Jhumka and Neeraj Suri Proc. of Formal Techniques for Networked and Distributed Systems (FORTE), pp. 428-442, 2005 | ||
Error Propagation Profiling of Operating Systems Andréas Johansson and Neeraj Suri Proc. of Dependable Systems and Networks (DSN), pp. 86-95, 2005 | bib | |
Automating the Addition of Fail-Safe Fault-Tolerance: Beyond Fusion-Closed Specifications Felix Gärtner and Arshad Jhumka Proc. of Formal Techniques in Real-Time and Fault Tolerant System (FTRTFT), 2004 | ||
Survivability of Operating Systems: Profiling Vulnerabilities Neeraj Suri and Andréas Johansson FuDiCo II: Bertinoro Workshop on Future Directions in Distributed Computing, Bertinoro, Italy, 2004 | ||
On Enhancing the Robustness of Commercial Operating Systems Andréas Johansson, Adina Sârbu, Arshad Jhumka and Neeraj Suri Proc. of International Service Availability Symposium (ISAS), 2004. Springer Verlag, pp. 148-159, 2004 | bib | |
On Dependability Driven Software and Hardware Integration Neeraj Suri Proc. of Workshop on Software Technologies for Embedded and Ubiquitous Computing Systems/International Symp, 2004 | ||
Providing Event Triggered Channels on a Time-triggered Base Vilgot Claesson and Neeraj Suri Proc. of International Conference on Engineering of Complex Computer Systems (ICECCS), 2004 | ||
An Approach for Designing and Assessing Detectors for Dependable Component-Based Systems Arshad Jhumka, Martin Hiller, Neeraj Suri High Assurance Systems Engineering Conference (HASE), pp. 69-78, 2004 | bib | |
Challenges for Dependable Embedded Systems: Developing the Information Society Infrastructure Neeraj Suri (invited talk) SRDS: WDES/WLGC Joint Keynote, 2003 | bib | |
On the Limits of the Precise Specification of Component Interfaces Hermann Kopetz and Neeraj Suri Proc. of Workshop on Object-oriented Real-time Dependable Systems (WORDS 2003), Capri, 2003 | ||
Practical Aspects of Designing an IP Take Over Mechanism Christof Fetzer, Karin Högstedt, and Neeraj Suri Proc. of Workshop on Object-oriented Real-time Dependable Systems (WORDS 2003), Capri, 2003 | bib | |
Software Profiling for Designing Dependable Systems Martin Hiller, Arshad Jhumka and Neeraj Suri Proc. of Space Mission Challenges for Information Technology (SMC-IT), JPL Publication 03-13A, pp. 59-66, Jul. 2003 | ||
A Framework for the Design and Validation of Efficient Fail-Safe Fault-Tolerant Programs Arshad Jhumka, Martin Hiller, Neeraj Suri Software and Compilers for Embedded Systems (SCOPES03), 2003 | bib | |
Compositional Design of Real-Time Systems: A Conceptual Basis for Specification of Linking Interfaces Hermann Kopetz, and Neeraj Suri Proc. of International Symposium on Object-oriented Real-time distributed Computing (ISORC), pp. 51-60, 2003 | bib | |
The Event-Triggered and Time-Triggered Media Access Methods Vilgot Claesson, Cecilia Ekelin, Neeraj Suri Proc. of International Symposium on Object-oriented Real-time distributed Computing (ISORC), pp. 131-134, 2003 | ||
On the Effect of Transient Data-Errors in Controller Implementation Magnus Gäfvert, Björn Wittenmark , Örjan Askerdal American Control Conference (ACC), 2003 | ||
On Demand Network Level Service Deployment in Ad-Hoc Networks Daniel Prince, Andrew Scott and William Shepherd Proc. of IFIP International Conference on Personal Wireless Communications, 2003 | ||
Toward an efficient solution for dynamic ad hoc network interoperability Daniel Prince, Andrew Scott and Dough Shepherd Proc. of PGNet, 2002 | ||
An Epidemic Model for Information Diffusion in MANETs Abdelmajid Khelil, Christian Becker, Jing Tian, Kurt Rothermel Proc. of Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2002 | ||
A Control Theory Approach for Analyzing the Effects of Data Errors in Safety-Critical Control Systems Örjan Askerdal, Magnus Gäfvert, Martin Hiller, Neeraj Suri Proc. of Pacific Rim International Symposium on Dependable Computing (PRDC), 2002 | ||
An Approach to Specify and Test Component-Based Dependable Software Arshad Jhumka, Martin Hiller, Neeraj Suri Proc. of High Assurance Systems Engineering (HASE), 211-220, 2002 | ||
Component-Based Synthesis of Dependable Embedded Software Arshad Jhumka, Martin Hiller, Neeraj Suri Proc. of Formal Techniques in Real-Time and Fault Tolerant Systems (FTRTFT), pp. 111-118, 2002 | ||
PROPANE: An Environment for Examining the Propagation of Errors in Software Martin Hiller, Arshad Jhumka, Neeraj Suri Proc. of International Symposium on Software Testing and Analysis (ISSTA), ACM SIGSOFT, Vol. 27, #4, pp. 81-85, 2002 | ||
On the Placement of Software Mechanisms for Detection of Data Errors Martin Hiller, Arshad Jhumka, Neeraj Suri Proc. of Dependable Systems and Networks (DSN), pp. 135-144, 2002 | ||
On Systematic Design of Globally Consistent Executable Assertions in Embedded Software Arshad Jhumka, Martin Hiller, Vilgot Claesson, Neeraj Suri ACM Joint Conference – Languages, Compilers and Tools for Embedded Systems/Software and Compilers for Embedded Systems (LCTES/SCOPES), pp. 74-83, 2002 | ||
On Simplifying Modular Specification and Verification of Distributed Protocols Purnendu Sinha, Neeraj Suri High Assurance Systems Engineering (HASE), pp. 173-181, 2001 | ||
An Efficient TDMA Synchronization Approach for Distributed Embedded Systems Vilgot Claesson, Henrik Lönn, Neeraj Suri Proc. of Symposium on Reliable and Distributed Systems (SRDS), pp. 198-201, 2001 | ||
Assessing Inter-Modular Error Propagation in Distributed Software Arshad Jhumka, Martin Hiller, Neeraj Suri Proc. of Symposium on Reliable and Distributed Systems (SRDS), pp. 152-161, 2001 | ||
An Approach for Analysing the Propagation of Data Errors in Software Martin Hiller, Arshad Jhumka, Neeraj Suri Proc. of Dependable Systems and Networks (DSN) 2001, pp. 161-170, 2001 | ||
DBench (Dependability Benchmarking) Karama Kanoun et al. (Neeraj Suri) EC DEPPY Workshop, Supplement DSN, 2001 | ||
Modular Composition of Redundancy Management Protocols in Distributed Protocols: An Outlook on Simplifying Protocol Level Specification & Verification Purnendu Sinha, Neeraj Suri Proc. of International Conference on Distributed Computing Systems (ICDCS), pp. 255-263, 2001 | ||
Executable Assertions for Detecting Data Errors in Embedded Control Systems Martin Hiller Proc. of Dependable Systems and Networks (DSN) 2000, pp. 24-33, 2000 | ||
Designing High-Performance & Reliable Superscalar Architectures: The Out of Order Reliable Superscalar (O3Rs) Approach Avi Mendelson, Neeraj Suri Proc. of Dependable Systems and Networks (DSN), pp. 473-481, 2000 | ||
Evaluation of COTS Standards for Dependable Systems Design Chris J. Walter, Neeraj Suri, Tim Monaghan Proc. of Dependable Systems and Networks (DSN), 2000 | ||
Error Recovery Using Forced Validity Assisted by Executable Assertions for Error Detection: An Experimental Evaluation Martin Hiller Proc. of EUROMICRO Conference, Vol. II, pp. 105-112, 1999 | ||
On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols Purnendu Sinha, Neeraj Suri Proc. of Real-Time Systems Symposium (RTSS), pp. 126-135, 1999 | ||
Identification of Test Cases Using a Formal FI Approach Purnendu Sinha, Neeraj Suri Proc. of Fault-Tolerant Computing Symposium (FTCS-29), pp. 314-321, 1999 | ||
An Experimental Comparison of Fault and Error Injection Jorgen Christmansson, Martin Hiller, Marcus Rimén Proc. of International Symposium on Software Reliability Engineering (ISSRE), pp. 378-396, 1998 | ||
A Framework for Dependability Driven SW Integration Neeraj Suri, Sunundu Ghosh, Tom Marlowe Proc. of International Conference on Distributed Computing Systems (ICDCS), pp. 405-416, 1998 | ||
The XBW Model for Dependable Real-Time Systems Vilgot Claesson , Stefan Poledna, Jan Söderberg Proc. of International Conference on Parallel and Distributed Systems, 1998 | ||
On the Use of Formal Techniques for Validation Neeraj Suri, Purnendu Sinha Proc. of Fault-Tolerant Computing Symposium (FTCS-28), pp. 390-401, 1998 | ||
Prototype Implementation Using the XBW Software Model Vilgot Claesson Proceedings of the Swedish National Real-Time Workshop (SNART) ’97, Lund, Sweden, 1997 | ||
Cache Based Fault Recovery in Distributed Systems Avi Mendelson, Neeraj Suri International Conference on Engineering of Complex Computer Systems, 1997 | ||
Roll-Forward Recovery: The Bi-Directional Cache Approach Avi Mendelson, Neeraj Suri Fault-Tolerant Parallel and Distributed Systems, 1995 | ||
Dependability Issues in the Reuse of Standard Components in Open Architectures Chris J. Walter, Neeraj Suri 10th Conf. on Computing in Aerospace, 1995 | ||
A System Level On-Line Testing Approach Neeraj Suri On-Line Testing, 1995 | ||
Evaluating Fault Coverage Using an Integrated Inductive and Deductive Approach Chris J. Walter, Neeraj Suri Fault and Error Models of Failures in Computer Systems, 1993 | ||
Reliability Modeling of Large Fault-Tolerant Systems Neeraj Suri, M. Hugue, Chris J. Walter 22nd International Symposium on Fault-Tolerant Computing (FTCS-22), 1992 | ||
Continual On-Line Diagnosis of Hybrid Faults Chris J. Walter, M. Hugue, Neeraj Suri Proc. of Dependable Computing for Critical Applications (DCCA-4), 1994 | ||
BDG-Torus Union Graph: An Algorithmically Specialized Parallel Interconnect Neeraj Suri, Avi Mendelson, Dhiraj Pradhan Symposium on Parallel and Distributed Processing (SPDP), 1991 |