Journals
Adversarial Attack Detection via Fuzzy Predictions Yi Li, Plamen Angelov, Neeraj Suri IEEE Transactions On Fuzzy Systems, 2024 | |||
Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments Salman Manzoor, Antonios Gouglidis, Matthew Bradbury and Neeraj Suri IEEE Transactions of Cloud Computing, 2024 | |||
Error Propagation Analysis for Multithreaded Programs: An Empirical Approach Stefan Winter, Abraham Chan, Habib Saissi, Karthik Pattabiraman, Neeraj Suri arXiv, 2024 | |||
An Empirical Study of Reflection Attacks Using NetFlow Data Edward Chuah, Neeraj Suri Cybersecurity, Springer Open, 2024 | |||
Security Challenges When Space Merges With Cyberspace Vijay Varadharajan, Neeraj Suri ELSEVIER Space Policy, 2023 | |||
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph Yang Lu, Zhengxin Yu, and Neeraj Suri ACM Transactions on Privacy and Security, 2023 | |||
A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems Edward Chuah, Arshad Jhumka, Miroslaw Malek and Neeraj Suri IEEE Access, 2022 | bib | ||
PCaaD: Towards automated determination and exploitation of industrial systems Benjamin Green, Richard Derbyshire, MarinaKrotofil, William Knowles, Daniel Prince, Neeraj Suri Journal of Computers & Security, 2021 | bib | ||
Extracting Safe Thread Schedules from Incomplete Model Checking Results Patrick Metzler, Neeraj Suri, Georg Weissenbacher International Journal on Software Tools for Technology Transfer, 2020 | |||
Proofs of Writing for Robust Storage Dan Dobre, Ghassan Karame, Wenting Li, Matthias Majuntke, Neeraj Suri, Marko Vukolic IEEE Trans on Parallel and Distributed System, 2019 | bib | ||
How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code Oliver Schwahn, Stefan Winter, Nicolas Coppik, Neeraj Suri IEEE Trans on Dependable and Secure Computing, 2018 | bib | ||
Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS F. Tan, L. Liu, S. Winter, Q. Wang, N. Suri, L. Bu, Y. Peng, X. Liu, X. Peng ACM Trans on CPS, 2018 | bib | ||
Securing the Cloud-Assisted Smart Grid Kubilay Demir, Hatem Ismail, Tsvetoslava Vateva-Gurova, and Neeraj Suri International Journal of Critical Infrastructure Protection, Dec. 2018 | bib | ||
Quantitative Reasoning about Cloud Security Using Service Level Agreements Jesus Luna, Ahmed Taha, Ruben Trapero, and Neeraj Suri IEEE Trans on Cloud Computing, 2017 | bib | ||
Robust QoS-aware Communication in the Smart Distribution Grid Kubilay Demir, Daniel Germanus, Neeraj Suri Springer Journal on Peer-to-Peer Networking and Applications, 2017 | bib | ||
Safety Verification utilizing Model-based Development for Safety Critical Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri Journal of Information Processing, 2017 | bib | ||
P2P Routing Table Poisoning: A Quorum-based Sanitizing Approach Hatem Ismail, Daniel Germanus, Neeraj Suri Journal of Computers & Security, 2017 | |||
A Novel Approach to Manage Cloud Security SLA Incidents Ruben Trapero, Jolanda Modic, Miha Stopar, Ahmed Taha, Neeraj Suri Future Generation Computer System, 2017 | bib | ||
Novel Efficient Techniques for Real-Time Cloud Security Assessment Jolanda Modic, Ruben Trapero, Ahmed Taha, Jesus Luna, Miha Stopar, Neeraj Suri Elsevier Journal on Computers & Security, 2016 | bib | ||
Quantifiably Trusting the Cloud: Putting Metrics to Work! Ruben Trapero, Jesus Luna and Neeraj Suri IEEE Security & Privacy Magazine, May/June 2016 https://arxiv.org/abs/1804.04426, 2016 | bib | ||
On Choosing Server- or Client-Side Solutions for BFT M. Platania, D. Obenshain, T. Tantillo, Y. Amir, N. Suri ACM Computing Surveys, May 2016 | bib | ||
Named Data Networking: A Survey D. Saxena, V. Raychoudhury, N. Suri, C. Becker, J. Cao Elsevier Computer Science Review Journal, 2016 | bib | ||
Leveraging the Potential of Cloud Security Service Level Agreements through Standards Jesus Luna, Neeraj Suri, Michaela Iorga, Anil Karmel IEEE Cloud Computing, 2015 | bib | ||
Adaptive Hybrid Compression for Wireless Sensor Networks Azad Ali, Mohammadreza Mahmudimanesh, Abdelmajid Khelil, Neeraj Suri ACM Trans. on Sensor Networks, 2015 | bib | ||
A Lease based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking Feng Tan, Yufei Wang, Qixin Wang, Lei Bu, and Neeraj Suri IEEE Trans. on Parallel and Distributed Systems, 2015 | |||
Run Time Application Repartitioning in Dynamic Mobile Cloud Environments Lei Yang, Jiannong Cao, Di Han, Shaojie Tang, and Neeraj Suri IEEE Trans. on Cloud Computing, 2014 | bib | ||
Blended Identity: Pervasive IdM for Continuous Authentication Patricia Arias-Cabarcos, Rubén Trapero, Florina Almenárez, Daniel Díaz-Sánchez, Andrés Marín IEEE Security & Privacy Magazine, 2014 | |||
GMTC: A Generalized Commit Approach for Hybrid Mobile Environments Brahim Ayari, Abdelmajid Khlelil, Neeraj Suri IEEE Trans. on Mobile Computing, Dec. 2013 Proc. of Intl. Conference on Availability, Reliability and Security (ARES), 2013 | bib | ||
Performance Analysis of an OCSP-Based Authentication Protocol for VANETs Jetzabel Serna, Valentina Casola, Massimiliano Rak, Jesus Luna, Manel Medina and Niccola Mazzocca International Journal of Adaptive, Resilient and Autonomic Systems 2012 | |||
Efficient Predictive Monitoring of Wireless Sensor Networks Azad Ali, Abdelmajid Khelil, Faisal Karim Shaikh and Neeraj Suri International Journal Autonomous and Adaptive Communications Systems, 2012 | bib | ||
On the Design of Perturbation-Resilient Atomic Commit Protocols for Mobile Transactions Brahim Ayari, Abdelmajid Khelil, Neeraj Suri ACM Transactions on Computer Systems, 2011 | |||
ReCait: Reliable Congestion Aware Information Transport in Wireless Sensor Networks Faisal Karim Shaikh, Abdelmajid Khelil, Azad Ali and Neeraj Suri International Journal of Communication Networks and Distributed Systems, 2010 | |||
Map-based Support for Wireless Sensor Network Simulation Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri Journal of Networks, 2010 | bib | ||
A Software Integration Approach for Designing and Assessing Dependable Embedded Systems Neeraj Suri, Arshad Jhumka, Martin Hiller, András Pataricza, Shariful Islama, Constantin Sârbua Journal of Systems and Software, 2010 | bib | ||
Pre-Injection Analysis for Identifying Fault-Injection Tests for Protocol Validation Neeraj Suri and Purnendu Sinha Journal of Software, 2010 | bib | ||
Using Under-Utilized CPU Resources to Enhance its Reliability Avi Timor, Avi Mendelson, Yitzhak Birk and Neeraj Suri IEEE Transaction on Dependable and Secure Computing, 2010 | bib | ||
Profiling the Operational Behavior of OS Device Drivers Constantin Sârbu, Andréas Johansson, Neeraj Suri and Nachiappan Nagappan Journal of Empirical Software Engineering , 2009 | bib | ||
Increasing Security and Protection of SCADA Systems through Infrastructure Resilience Salvatore D’Antonio, Abdelmajid Khelil, Luigi Romano, Neeraj Suri International Journal of System of Systems Engineering, 2009 | |||
Application-Level Diagnostic and Membership Protocols for Generic Time-Triggered Systems Marco Serafini, Peter Bokor, Neeraj Suri et al IEEE Transactions On Dependable & Secure Computing, 2009 | bib | ||
An Optimization Based Design for Integrated Dependable Real-Time Embedded Systems Shariful Islam, Neeraj Suri, András Balogh, György Csertán and András Pataricza Journal of Design Automation for Embedded Systems, 2009 | bib | ||
Exploring Delay-Aware Transactions in Heterogenous Mobile Environments Brahim Ayari, Abdelmajid Khelil and Neeraj Suri Journal of Software, 2009 | bib | ||
Contact-Based Buffering for Delay-Tolerant Ad Hoc Broadcasting Abdelmajid Khelil Computer Communications Journal, 2007 | |||
On-Line Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters Marco Serafini, Andrea Bondavalli, Neeraj Suri IEEE Transactions on Dependable and Secure Computing, 2007 | bib | ||
Hypergossiping: A Generalized Broadcast Strategy for MANETs Abdelmajid Khelil, Pedro José Marrón, Christian Becker, and Kurt Rothermel Elsevier Ad Hoc Networks Journal, 2007 | |||
An Approach to Synthesize Safe Systems Arshad Jhumka, Felix Freiling, Christof Fetzer and Neeraj Suri Intl. Journal on Security and Networks, 2006 | |||
An Efficient TDMA Start-up and Restart Synchronization Approach for Distributed Embedded Systems Vilgot Claesson, Henrik Lönn and Neeraj Suri IEEE Transactions on Parallel and Distributed Systems, 2004 | bib | ||
EPIC: Profiling the Propagation and Effect of Data Errors in Software Martin Hiller, Arshad Jhumka and Neeraj Suri IEEE Transactions on Computers, 2004 | bib | ||
Analyzing the Impacts of Data Errors in Safety-Critical Control Systems Örjan Askerdal, Magnus Gäfvert, Martin Hiller, Neeraj Suri IEICE Transactions on Information & Systems, Special Issue on Dependable Computing, 2003 | |||
The Customizable Fault/Error Model for Dependable Distributed Systems Chris J. Walter, Neeraj Suri Journal of Theoretical Computer Science, 2003 | bib | ||
Design of a Parallel Interconnect Based on Communication Pattern Considerations Neeraj Suri, Avi Mendelson Journal of Parallel Algorithms and Architectures, 2001 | |||
Formally Verified On-Line Diagnosis Chris J. Walter, Patrick Lincoln, Neeraj Suri IEEE Transactions on Software Engineering, 1997 | bib | ||
Synchronization Issues in Real Time Systems Neeraj Suri, Chris Walter, Michelle Hugue IEEE Special Issue on Real Time Systems, 1994 |