Journal Publications
CyBok: SSG Prof. Suri defines NCSC’s CyBOK knowledge area on Distributed Systems Security, bib

A Categorization of Policy Conflicts in Distributed Systems and Network Management
Sarandis Mitropoulos, Antonios Gouglidis, Vasileios Giotsas
International Journal of Information Privacy, Security and Integrity, 2020
Specifying and Verifying Usage Control Models and Policies in TLA+
Christos Grompanopoulos, Antonios Gouglidis, Anastasia Mavridou
International Journal on Software Tools for Technology Transfer, 2020
Analyzing the Effects of Bugs on Software Interfaces
Roberto Natella, Stefan Winter, Domenico Cotroneo, Neeraj Suri
IEEE Trans. on Software Engg (TSE), 2020
O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs
V. Giotsas, G. Nomikos, V. Kotronis, P. Sermpezis, P. Gigis, L. Manassakis, C. Dietzel, S. Konstantaras, X. Dimitropoulos
ACM/IEEE Transactions on Networking (ToN), accepted, August 2020.
Extracting Safe Thread Schedules from Incomplete Model
Checking Results

Patrick Metzler, Neeraj Suri, Georg Weissenbacher
International Journal on Software Tools for Technology Transfer, 2020
A Flexible ICT Architecture to Support Ancillary Services in Future Electricity Distribution Networks: An Accounting Use Case for DSOs
Anish Jindal, Jakob Kronawitter, Ramona Kühn, Martin Bor, Hermann de Meer, Antonios Gouglidis, David Hutchison, Angelos Marnerides, Andrew Scott and Andreas Mauthe
Journal of Energy Informatics, 2020
Proofs of Writing for Robust Storage
Dan Dobre, Ghassan Karame, Wenting Li, Matthias Majuntke, Neeraj Suri, Marko Vukolic
IEEE Trans on Parallel and Distributed System, 2019
How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code
Oliver Schwahn, Stefan Winter, Nicolas Coppik, Neeraj Suri
IEEE Trans on Dependable and Secure Computing, 2018
Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS
F. Tan, L. Liu, S. Winter, Q. Wang, N. Suri, L. Bu, Y. Peng, X. Liu, X. Peng
ACM Trans on CPS, 2018
Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures
Antonios Gouglidis, Benjamin Green, David Hutchison, Ali Alshawish and Hermann de Meer
Journal of Energy Informatics, 2018
Could a cyber attack cause a systemic impact in the financial sector?
Phil Warren, Kim Kaleva Kaivanto and Daniel David Campbell Prince
Bank of England Quarterly Bulletin, 2018
Securitization and the global politics of cybersecurity
Mark James Lacy and Daniel David Campbell Prince
Journal of Global Discourse, 2018
Securing the Cloud-Assisted Smart Grid
Kubilay Demir, Hatem Ismail, Tsvetoslava Vateva-Gurova, and Neeraj Suri
International Journal of Critical Infrastructure Protection, Dec. 2018
Quantitative Reasoning about Cloud Security Using Service Level Agreements
Jesus Luna, Ahmed Taha, Ruben Trapero, and Neeraj Suri
IEEE Trans on Cloud Computing, 2017
Robust QoS-aware Communication in the Smart Distribution Grid
Kubilay Demir, Daniel Germanus, Neeraj Suri
Springer Journal on Peer-to-Peer Networking and Applications, 2017
Safety Verification utilizing Model-based Development for Safety Critical
Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri
Journal of Information Processing, 2017
P2P Routing Table Poisoning: A Quorum-based Sanitizing Approach
Hatem Ismail, Daniel Germanus, Neeraj Suri
Journal of Computers & Security, 2017
A Novel Approach to Manage Cloud Security SLA Incidents
Ruben Trapero, Jolanda Modic, Miha Stopar, Ahmed Taha, Neeraj Suri
Future Generation Computer System, 2017
All that glitters is not gold: on the effectiveness of cyber security qualifications
William Knowles, Jose M. Such, Antonios Gouglidis, Gaurav Misra and Awais Rashid
IEEE Computer, 2017
The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective
Syed Noorulhassan Shirazi, Antonios Gouglidis, Arsham Farshad and David Hutchison
IEEE Journal on Selected Areas in Communications, 2017
Panning for gold: automatically analysing online social engineering attack surfaces
Matthew Edwards, Robert Larson, Benjamin Green, Awais Rashid and Alistair Baron
Journal of Computers and Security, 2017
Analysis of affordance, time and adaptation in the assessment of industrial control system cybersecurity risk
Jeremy Simon Busby, Benjamin Green and David Hutchison
Journal of Risk Analysis, 2017
Novel Efficient Techniques for Real-Time Cloud Security Assessment
Jolanda Modic, Ruben Trapero, Ahmed Taha, Jesus Luna, Miha Stopar, Neeraj Suri
Elsevier Journal on Computers & Security, 2016
Quantifiably Trusting the Cloud: Putting Metrics to Work!
Ruben Trapero, Jesus Luna and Neeraj Suri
IEEE Security & Privacy Magazine, May/June 2016, 2016
On Choosing Server- or Client-Side Solutions for BFT
M. Platania, D. Obenshain, T. Tantillo, Y. Amir, N. Suri
ACM Computing Surveys, May 2016
Named Data Networking: A Survey
D. Saxena, V. Raychoudhury, N. Suri, C. Becker, J. Cao
Elsevier Computer Science Review Journal, 2016
Information assurance techniques: perceived cost effectiveness
Jose M. Such, Antonios Gouglidis, William Knowles, Gaurav Misra and Awais Rashid
Journal of Computers & Security , 2016
Media Query Processing for the Internet-of-Things: Coupling of Device Energy Consumption and Cloud Infrastructure Billing
Francesco Renna, Joseph Doyle, Vasileios Giotsas and Yiannis Andreopoulos
IEEE Transactions on Multimedia, 2016
Leveraging the Potential of Cloud Security Service Level Agreements through Standards
Jesus Luna, Neeraj Suri, Michaela Iorga, Anil Karmel
IEEE Cloud Computing, 2015
Adaptive Hybrid Compression for Wireless Sensor Networks
Azad Ali, Mohammadreza Mahmudimanesh, Abdelmajid Khelil, Neeraj Suri
ACM Trans. on Sensor Networks, 2015
A Lease based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking
Feng Tan, Yufei Wang, Qixin Wang, Lei Bu, and Neeraj Suri
IEEE Trans. on Parallel and Distributed Systems, 2015
A survey of cyber security management in industrial control systems
William Knowles, Daniel David Campbell Prince, David Hutchison, Jules Ferdinand Pagna Disso and Kevin Jones
International Journal of Critical Infrastructure Protection, 2015
Run Time Application Repartitioning in Dynamic Mobile Cloud Environments
Lei Yang, Jiannong Cao, Di Han, Shaojie Tang, and Neeraj Suri
IEEE Trans. on Cloud Computing, 2014
Blended Identity: Pervasive IdM for Continuous Authentication
Patricia Arias-Cabarcos, Rubén Trapero, Florina Almenárez, Daniel Díaz-Sánchez, Andrés Marín
IEEE Security & Privacy Magazine, 2014
Security policy verification for multi-domains in cloud systems
Antonios Gouglidis, Ioannis Mavridis and Vincent C. Hu
International Journal of Information Security, 2014
GMTC: A Generalized Commit Approach for Hybrid Mobile Environments
Brahim Ayari, Abdelmajid Khlelil, Neeraj Suri
IEEE Trans. on Mobile Computing, Dec. 2013
Proc. of Intl. Conference on Availability, Reliability and Security (ARES), 2013
Performance Analysis of an OCSP-Based Authentication Protocol for VANETs
Jetzabel Serna, Valentina Casola, Massimiliano Rak, Jesus Luna, Manel Medina and Niccola Mazzocca
International Journal of Adaptive, Resilient and Autonomic Systems 2012
Efficient Predictive Monitoring of Wireless Sensor Networks
Azad Ali, Abdelmajid Khelil, Faisal Karim Shaikh and Neeraj Suri
International Journal Autonomous and Adaptive Communications Systems, 2012
Measuring the diffusion of marketing messages across a social network
Mark Rogers, Clovis Chapman and Vasileios Giotsas
Journal of Direct, Data and Digital Marketing Practice, 2012
Assessing the Security of Internet Connected Critical Infrastructures
György Csertán, László Gönczy, Gábor Urbanics, James Clarke
Journal of Security & Communication Networks, Special issue: Internet of things, 2011
On the Design of Perturbation-Resilient Atomic Commit Protocols for Mobile Transactions
Brahim Ayari, Abdelmajid Khelil, Neeraj Suri
ACM Transactions on Computer Systems, 2011
ReCait: Reliable Congestion Aware Information Transport in Wireless Sensor Networks
Faisal Karim Shaikh, Abdelmajid Khelil, Azad Ali and Neeraj Suri
International Journal of Communication Networks and Distributed Systems, 2010
Map-based Support for Wireless Sensor Network Simulation
Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri
Journal of Networks, 2010
A Software Integration Approach for Designing and Assessing Dependable Embedded Systems
Neeraj Suri, Arshad Jhumka, Martin Hiller, András Pataricza, Shariful Islama, Constantin Sârbua
Journal of Systems and Software, 2010
Pre-Injection Analysis for Identifying Fault-Injection Tests for Protocol Validation
Neeraj Suri and Purnendu Sinha
Journal of Software, 2010
Using Under-Utilized CPU Resources to Enhance its Reliability
Avi Timor, Avi Mendelson, Yitzhak Birk and Neeraj Suri
IEEE Transaction on Dependable and Secure Computing, 2010
Profiling the Operational Behavior of OS Device Drivers
Constantin Sârbu, Andréas Johansson, Neeraj Suri and Nachiappan Nagappan
Journal of Empirical Software Engineering , 2009
Increasing Security and Protection of SCADA Systems through Infrastructure Resilience
Salvatore D’Antonio, Abdelmajid Khelil, Luigi Romano, Neeraj Suri
International Journal of System of Systems Engineering, 2009
Application-Level Diagnostic and Membership Protocols for Generic Time-Triggered Systems
Marco Serafini, Peter Bokor, Neeraj Suri et al
IEEE Transactions On Dependable & Secure Computing, 2009
An Optimization Based Design for Integrated Dependable Real-Time Embedded Systems
Shariful Islam, Neeraj Suri, András Balogh, György Csertán and András Pataricza
Journal of Design Automation for Embedded Systems, 2009
Exploring Delay-Aware Transactions in Heterogenous Mobile Environments
Brahim Ayari, Abdelmajid Khelil and Neeraj Suri
Journal of Software, 2009
Contact-Based Buffering for Delay-Tolerant Ad Hoc Broadcasting
Abdelmajid Khelil
Computer Communications Journal, 2007
On-Line Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters
Marco Serafini, Andrea Bondavalli, Neeraj Suri
IEEE Transactions on Dependable and Secure Computing, 2007
Hypergossiping: A Generalized Broadcast Strategy for MANETs
Abdelmajid Khelil, Pedro José Marrón, Christian Becker, and Kurt Rothermel
Elsevier Ad Hoc Networks Journal, 2007
An Approach to Synthesize Safe Systems
Arshad Jhumka, Felix Freiling, Christof Fetzer and Neeraj Suri
Intl. Journal on Security and Networks, 2006
An Efficient TDMA Start-up and Restart Synchronization Approach for Distributed Embedded Systems
Vilgot Claesson, Henrik Lönn and Neeraj Suri
IEEE Transactions on Parallel and Distributed Systems, 2004
EPIC: Profiling the Propagation and Effect of Data Errors in Software
Martin Hiller, Arshad Jhumka and Neeraj Suri
IEEE Transactions on Computers, 2004
Analyzing the Impacts of Data Errors in Safety-Critical Control Systems
Örjan Askerdal, Magnus Gäfvert, Martin Hiller, Neeraj Suri
IEICE Transactions on Information & Systems, Special Issue on Dependable Computing, 2003
The Customizable Fault/Error Model for Dependable Distributed Systems
Chris J. Walter, Neeraj Suri
Journal of Theoretical Computer Science, 2003
Design of a Parallel Interconnect Based on Communication Pattern Considerations
Neeraj Suri, Avi Mendelson
Journal of Parallel Algorithms and Architectures, 2001
Formally Verified On-Line Diagnosis
Chris J. Walter, Patrick Lincoln, Neeraj Suri
IEEE Transactions on Software Engineering, 1997
Synchronization Issues in Real Time Systems
Neeraj Suri, Chris Walter, Michelle Hugue
IEEE Special Issue on Real Time Systems, 1994