Publications

Journal Publications
CyBok: SSG Prof. Suri defines NCSC’s CyBOK knowledge area on Distributed Systems Security, bib

Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments
Salman Manzoor, Antonios Gouglidis, Matthew Bradbury and Neeraj Suri
IEEE Transactions of Cloud Computing, 2024
pdf
Error Propagation Analysis for Multithreaded Programs: An Empirical Approach
Stefan Winter, Abraham Chan, Habib Saissi, Karthik Pattabiraman, Neeraj Suri
arXiv, 2024
pdf
An Empirical Study of Reflection Attacks Using NetFlow Data
Edward Chuah, Neeraj Suri
Cybersecurity, Springer Open, 2024
pdf
Security Challenges When Space Merges With Cyberspace
Vijay Varadharajan, Neeraj Suri
ELSEVIER Space Policy, 2023
pdf
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph
Yang Lu, Zhengxin Yu, and Neeraj Suri
ACM Transactions on Privacy and Security, 2023
pdf
Transactive Energy System Deployment over Insecure Communication Links
Yang Lu, Jianming Lian, Minghui Zhu and Ke Ma
IEEE Transactions on Automation Science and Engineering, 2023
pdf
A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems
Edward Chuah, Arshad Jhumka, Miroslaw Malek and Neeraj Suri
IEEE Access, 2022
pdfbib
Information Management for Trust Computation on Resource-constrained IoT Devices
Matthew Bradbury, Arshad Jhumka, and Tim Watson
Future Generation Computing Systems, 2022.
pdf
Characterizing positively invariant sets: Inductive and topological methods
Khalil Ghorbal and Andrew Sogokon
Journal of Symbolic Computation, 2022
pdf
A cyber incident response and recovery framework to support operators of ICS and Critical National Infrastructure
Alexander Staves, Tom Anderson, Harry Balderstone, Benjamin Green, Antonios Gouglidis and David Hutchison
International Journal of Critical Infrastructure Protection, 2022
pdf
An ICT Architecture for Enabling Ancillary Services in Distributed Renewable Energy Sources Based on the SGAM Framework
Armin Stocker, Ali Alshawish, Martin Bor, John Vidler, Antonios Gouglidis, Andrew Scott, Angelos Marnerides, Hermann De Meer and David Hutchison
Energy Informatics, 2022
pdf
Threat Modelling Guided Trust-based Task Offloading for Resource-constrained Internet of Things
Matthew Bradbury, Arshad Jhumka, Tim Watson, Denys Flores, Jonathan Burton, and Matthew Butler
ACM Transactions on Sensor Networks, 2022
pdfbib
Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security
Sam Maesschalck, Vasileios Giotsas, Benjamin Green, Nicholas Race
Journal of Computers & Security, 2021
pdf
PCaaD: Towards automated determination and exploitation of industrial systems
Benjamin Green, Richard Derbyshire, MarinaKrotofil, William Knowles, Daniel Prince, Neeraj Suri
Journal of Computers & Security, 2021
pdfbib
A Security Cost Modelling Framework for Cyber-Physical Systems
Igor Ivkic, Patrizia Sailer, Antonios Gouglidis, Andreas Mauthe, Markus Tauber
ACM Transactions on Internet Technology, 2021
pdf
Network-aware Recommendations in the Wild: Methodology, Realistic Evaluations, Experiments
Savvas Kastanakis, Pavlos Sermpezis, Vasileios Kotronis, Daniel Menasche, Thrasyvoulos Spyropoulos
IEEE Transactions on Mobile Computing, 2020
pdf
A Categorization of Policy Conflicts in Distributed Systems and Network Management
Sarandis Mitropoulos, Antonios Gouglidis, Vasileios Giotsas
International Journal of Information Privacy, Security and Integrity, 2020
pdf
Specifying and Verifying Usage Control Models and Policies in TLA+
Christos Grompanopoulos, Antonios Gouglidis, Anastasia Mavridou
International Journal on Software Tools for Technology Transfer, 2020
pdf
Analyzing the Effects of Bugs on Software Interfaces
Roberto Natella, Stefan Winter, Domenico Cotroneo, Neeraj Suri
IEEE Trans. on Software Engg (TSE), 2020
pdfbib
O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs
V. Giotsas, G. Nomikos, V. Kotronis, P. Sermpezis, P. Gigis, L. Manassakis, C. Dietzel, S. Konstantaras, X. Dimitropoulos
ACM/IEEE Transactions on Networking (ToN), accepted, August 2020.
Extracting Safe Thread Schedules from Incomplete Model
Checking Results

Patrick Metzler, Neeraj Suri, Georg Weissenbacher
International Journal on Software Tools for Technology Transfer, 2020
pdfbib
A Flexible ICT Architecture to Support Ancillary Services in Future Electricity Distribution Networks: An Accounting Use Case for DSOs
Anish Jindal, Jakob Kronawitter, Ramona Kühn, Martin Bor, Hermann de Meer, Antonios Gouglidis, David Hutchison, Angelos Marnerides, Andrew Scott and Andreas Mauthe
Journal of Energy Informatics, 2020
pdf
Proofs of Writing for Robust Storage
Dan Dobre, Ghassan Karame, Wenting Li, Matthias Majuntke, Neeraj Suri, Marko Vukolic
IEEE Trans on Parallel and Distributed System, 2019
pdfbib
How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code
Oliver Schwahn, Stefan Winter, Nicolas Coppik, Neeraj Suri
IEEE Trans on Dependable and Secure Computing, 2018
pdfbib
Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS
F. Tan, L. Liu, S. Winter, Q. Wang, N. Suri, L. Bu, Y. Peng, X. Liu, X. Peng
ACM Trans on CPS, 2018
pdfbib
Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures
Antonios Gouglidis, Benjamin Green, David Hutchison, Ali Alshawish and Hermann de Meer
Journal of Energy Informatics, 2018
pdf
Could a cyber attack cause a systemic impact in the financial sector?
Phil Warren, Kim Kaleva Kaivanto and Daniel David Campbell Prince
Bank of England Quarterly Bulletin, 2018
pdf
Securitization and the global politics of cybersecurity
Mark James Lacy and Daniel David Campbell Prince
Journal of Global Discourse, 2018
pdf
Securing the Cloud-Assisted Smart Grid
Kubilay Demir, Hatem Ismail, Tsvetoslava Vateva-Gurova, and Neeraj Suri
International Journal of Critical Infrastructure Protection, Dec. 2018
pdfbib
Quantitative Reasoning about Cloud Security Using Service Level Agreements
Jesus Luna, Ahmed Taha, Ruben Trapero, and Neeraj Suri
IEEE Trans on Cloud Computing, 2017
pdfbib
Robust QoS-aware Communication in the Smart Distribution Grid
Kubilay Demir, Daniel Germanus, Neeraj Suri
Springer Journal on Peer-to-Peer Networking and Applications, 2017
pdfbib
Safety Verification utilizing Model-based Development for Safety Critical
Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri
Journal of Information Processing, 2017
pdfbib
P2P Routing Table Poisoning: A Quorum-based Sanitizing Approach
Hatem Ismail, Daniel Germanus, Neeraj Suri
Journal of Computers & Security, 2017
pdfbib
A Novel Approach to Manage Cloud Security SLA Incidents
Ruben Trapero, Jolanda Modic, Miha Stopar, Ahmed Taha, Neeraj Suri
Future Generation Computer System, 2017
pdfbib
All that glitters is not gold: on the effectiveness of cyber security qualifications
William Knowles, Jose M. Such, Antonios Gouglidis, Gaurav Misra and Awais Rashid
IEEE Computer, 2017
pdf
The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective
Syed Noorulhassan Shirazi, Antonios Gouglidis, Arsham Farshad and David Hutchison
IEEE Journal on Selected Areas in Communications, 2017
pdf
Panning for gold: automatically analysing online social engineering attack surfaces
Matthew Edwards, Robert Larson, Benjamin Green, Awais Rashid and Alistair Baron
Journal of Computers and Security, 2017
pdf
Analysis of affordance, time and adaptation in the assessment of industrial control system cybersecurity risk
Jeremy Simon Busby, Benjamin Green and David Hutchison
Journal of Risk Analysis, 2017
pdf
Novel Efficient Techniques for Real-Time Cloud Security Assessment
Jolanda Modic, Ruben Trapero, Ahmed Taha, Jesus Luna, Miha Stopar, Neeraj Suri
Elsevier Journal on Computers & Security, 2016
pdfbib
Quantifiably Trusting the Cloud: Putting Metrics to Work!
Ruben Trapero, Jesus Luna and Neeraj Suri
IEEE Security & Privacy Magazine, May/June 2016
https://arxiv.org/abs/1804.04426, 2016
pdfbib
On Choosing Server- or Client-Side Solutions for BFT
M. Platania, D. Obenshain, T. Tantillo, Y. Amir, N. Suri
ACM Computing Surveys, May 2016
pdfbib
Named Data Networking: A Survey
D. Saxena, V. Raychoudhury, N. Suri, C. Becker, J. Cao
Elsevier Computer Science Review Journal, 2016
pdfbib
Information assurance techniques: perceived cost effectiveness
Jose M. Such, Antonios Gouglidis, William Knowles, Gaurav Misra and Awais Rashid
Journal of Computers & Security , 2016
pdf
Media Query Processing for the Internet-of-Things: Coupling of Device Energy Consumption and Cloud Infrastructure Billing
Francesco Renna, Joseph Doyle, Vasileios Giotsas and Yiannis Andreopoulos
IEEE Transactions on Multimedia, 2016
pdf
Leveraging the Potential of Cloud Security Service Level Agreements through Standards
Jesus Luna, Neeraj Suri, Michaela Iorga, Anil Karmel
IEEE Cloud Computing, 2015
pdfbib
Adaptive Hybrid Compression for Wireless Sensor Networks
Azad Ali, Mohammadreza Mahmudimanesh, Abdelmajid Khelil, Neeraj Suri
ACM Trans. on Sensor Networks, 2015
pdfbib
A Lease based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking
Feng Tan, Yufei Wang, Qixin Wang, Lei Bu, and Neeraj Suri
IEEE Trans. on Parallel and Distributed Systems, 2015
pdfbib
A survey of cyber security management in industrial control systems
William Knowles, Daniel David Campbell Prince, David Hutchison, Jules Ferdinand Pagna Disso and Kevin Jones
International Journal of Critical Infrastructure Protection, 2015
pdf
Run Time Application Repartitioning in Dynamic Mobile Cloud Environments
Lei Yang, Jiannong Cao, Di Han, Shaojie Tang, and Neeraj Suri
IEEE Trans. on Cloud Computing, 2014
pdfbib
Blended Identity: Pervasive IdM for Continuous Authentication
Patricia Arias-Cabarcos, Rubén Trapero, Florina Almenárez, Daniel Díaz-Sánchez, Andrés Marín
IEEE Security & Privacy Magazine, 2014
pdf
Security policy verification for multi-domains in cloud systems
Antonios Gouglidis, Ioannis Mavridis and Vincent C. Hu
International Journal of Information Security, 2014
pdf
GMTC: A Generalized Commit Approach for Hybrid Mobile Environments
Brahim Ayari, Abdelmajid Khlelil, Neeraj Suri
IEEE Trans. on Mobile Computing, Dec. 2013
Proc. of Intl. Conference on Availability, Reliability and Security (ARES), 2013
pdfbib
Performance Analysis of an OCSP-Based Authentication Protocol for VANETs
Jetzabel Serna, Valentina Casola, Massimiliano Rak, Jesus Luna, Manel Medina and Niccola Mazzocca
International Journal of Adaptive, Resilient and Autonomic Systems 2012
Efficient Predictive Monitoring of Wireless Sensor Networks
Azad Ali, Abdelmajid Khelil, Faisal Karim Shaikh and Neeraj Suri
International Journal Autonomous and Adaptive Communications Systems, 2012
pdfbib
Measuring the diffusion of marketing messages across a social network
Mark Rogers, Clovis Chapman and Vasileios Giotsas
Journal of Direct, Data and Digital Marketing Practice, 2012
pdf
Assessing the Security of Internet Connected Critical Infrastructures
György Csertán, László Gönczy, Gábor Urbanics, James Clarke
Journal of Security & Communication Networks, Special issue: Internet of things, 2011
On the Design of Perturbation-Resilient Atomic Commit Protocols for Mobile Transactions
Brahim Ayari, Abdelmajid Khelil, Neeraj Suri
ACM Transactions on Computer Systems, 2011
pdfbib
ReCait: Reliable Congestion Aware Information Transport in Wireless Sensor Networks
Faisal Karim Shaikh, Abdelmajid Khelil, Azad Ali and Neeraj Suri
International Journal of Communication Networks and Distributed Systems, 2010
pdfbib
Map-based Support for Wireless Sensor Network Simulation
Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri
Journal of Networks, 2010
pdfbib
A Software Integration Approach for Designing and Assessing Dependable Embedded Systems
Neeraj Suri, Arshad Jhumka, Martin Hiller, András Pataricza, Shariful Islama, Constantin Sârbua
Journal of Systems and Software, 2010
pdfbib
Pre-Injection Analysis for Identifying Fault-Injection Tests for Protocol Validation
Neeraj Suri and Purnendu Sinha
Journal of Software, 2010
pdfbib
Using Under-Utilized CPU Resources to Enhance its Reliability
Avi Timor, Avi Mendelson, Yitzhak Birk and Neeraj Suri
IEEE Transaction on Dependable and Secure Computing, 2010
pdfbib
Profiling the Operational Behavior of OS Device Drivers
Constantin Sârbu, Andréas Johansson, Neeraj Suri and Nachiappan Nagappan
Journal of Empirical Software Engineering , 2009
pdfbib
Increasing Security and Protection of SCADA Systems through Infrastructure Resilience
Salvatore D’Antonio, Abdelmajid Khelil, Luigi Romano, Neeraj Suri
International Journal of System of Systems Engineering, 2009
bib
Application-Level Diagnostic and Membership Protocols for Generic Time-Triggered Systems
Marco Serafini, Peter Bokor, Neeraj Suri et al
IEEE Transactions On Dependable & Secure Computing, 2009
pdfbib
An Optimization Based Design for Integrated Dependable Real-Time Embedded Systems
Shariful Islam, Neeraj Suri, András Balogh, György Csertán and András Pataricza
Journal of Design Automation for Embedded Systems, 2009
pdfbib
Exploring Delay-Aware Transactions in Heterogenous Mobile Environments
Brahim Ayari, Abdelmajid Khelil and Neeraj Suri
Journal of Software, 2009
pdfbib
Contact-Based Buffering for Delay-Tolerant Ad Hoc Broadcasting
Abdelmajid Khelil
Computer Communications Journal, 2007
On-Line Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters
Marco Serafini, Andrea Bondavalli, Neeraj Suri
IEEE Transactions on Dependable and Secure Computing, 2007
pdfbib
Hypergossiping: A Generalized Broadcast Strategy for MANETs
Abdelmajid Khelil, Pedro José Marrón, Christian Becker, and Kurt Rothermel
Elsevier Ad Hoc Networks Journal, 2007
An Approach to Synthesize Safe Systems
Arshad Jhumka, Felix Freiling, Christof Fetzer and Neeraj Suri
Intl. Journal on Security and Networks, 2006
pdfbib
An Efficient TDMA Start-up and Restart Synchronization Approach for Distributed Embedded Systems
Vilgot Claesson, Henrik Lönn and Neeraj Suri
IEEE Transactions on Parallel and Distributed Systems, 2004
pdfbib
EPIC: Profiling the Propagation and Effect of Data Errors in Software
Martin Hiller, Arshad Jhumka and Neeraj Suri
IEEE Transactions on Computers, 2004
pdfbib
Analyzing the Impacts of Data Errors in Safety-Critical Control Systems
Örjan Askerdal, Magnus Gäfvert, Martin Hiller, Neeraj Suri
IEICE Transactions on Information & Systems, Special Issue on Dependable Computing, 2003
pdfbib
The Customizable Fault/Error Model for Dependable Distributed Systems
Chris J. Walter, Neeraj Suri
Journal of Theoretical Computer Science, 2003
pdfbib
Design of a Parallel Interconnect Based on Communication Pattern Considerations
Neeraj Suri, Avi Mendelson
Journal of Parallel Algorithms and Architectures, 2001
bib
Formally Verified On-Line Diagnosis
Chris J. Walter, Patrick Lincoln, Neeraj Suri
IEEE Transactions on Software Engineering, 1997
pdfbib
Synchronization Issues in Real Time Systems
Neeraj Suri, Chris Walter, Michelle Hugue
IEEE Special Issue on Real Time Systems, 1994
pdfbib