Publications

Journals                  Conferences             PhD Theses    
Conference Publications
 
Fast Kernel Error Propagation Analysis in Virtualized Environments
Nicolas Coppik, Oliver Schwahn and Neeraj Suri
Proc. of ICST, 2021
pdf
From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security
Charles Weir, Ben Hermann and Sascha Fahl
Proc. of USENIX Security, 2020
pdf
Reduce, Reuse, Recycle: Repurposing existing measurements to identify stale traceroutes
V. Giotsas, T. Koch, E. Fazzion, I. Cunha, M. Calder, H. Madhyastha, E. Katz-Bassett.
ACM Internet Measurement Conference (IMC), 2020
Rise of the Cloud and the Private Internet
T. Arnold, J. He, W. Jiang, M. Calder, I. Cunha, V. Giotsas, E. Katz-Bassett.
ACM Internet Measurement Conference (IMC), 2020.
ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource
Benjamin Green, Richard Derbyshire, William Knowles, James Boorman, Pierre Ciholas, Daniel Prince and David Hutchison
Proc. of USENIX Security – CSET Workshop, 2020
pdf
Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure
Ahmed Taha, Ahmed Zakaria, Dongseong Kim and Neeraj Suri
Proc. of IC2E, 2020
pdfbib
TraceSanitizer – Eliminating the Effects of Non-determinism on Error Propagation Analysis
Habib Saissi, Stefan Winter, Oliver Schwahn, Karthik Pattabiraman and Neeraj Suri
Proc. of DSN, 2020
pdfbib
A Framework to Support ICS Cyber Incident Response and Recovery
Alex Staves, Harry Balderstone, Benjamin Green, Antonios Gouglidis and David Hutchison
Proc. of ISCRAM 2020
pdf
General Access Control Guidance for Cloud Systems
Vincent C. Hu, Michaela Iorga, Wei Bao, Ang Li, Qinghua Li and Antonios Gouglidis
NIST Publication, SP 800-210, 2020
pdf
Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode
Pierre Ciholas, Jose Such, Angelos Marnerides, Benjamin Green, Jiajie Zhang and Utz Roedig
Proc. of DIMVA, 2020
A first look at the misuse and abuse of the IPv4 Transfer Market
Vasileios Giotsas, Ioana Livadariu and Petros Gigis
Proc. of PAM, 2020
pdf
Profiling IoT-based Botnet Traffic using DNS
Owen Dwyer, Angelos Marnerides, Vasileios Giotsas and Troy Mursch
Proc. of Globecomm, 2020
pdf
Honeypots for Automatic Network-Level Industrial Control System Security
Sam Maesschalck, Vasileios Giotsas, Benjamin Green and Nicholas Races
Proc. of Eurosys Doctoral workshop, 2020
pdf
HoneyPlant: A Distributed Hybrid Honeypot System for ICS Security
Sam Maesschalck, Vasileios Giotsas, Benjamin Green and Nicholas Race
Proc. of Annual UK System Research Challenges Workshop, 2020
(How Much) Does a Private WAN Improve Cloud Performance?
Todd W Arnold, Ege Gurmericliler, Arpit Gupta, Matt Calder, Georgia Essig, Vasileios Giotsas and Ethan Katz-Bassett
Proc. of INFOCOM, 2020
pdf
λBGP: Rethinking BGP programmability
Nicholas Hart, Charalampos Rotsos, Vasileios Giotsas, Nicholas Race and David Hutchison
Proc. of NOMS, 2020
pdf
Inferring Performance Bug Patterns from Developer Commits
Yiqun Chen, Stefan Winter and Neeraj Suri
Proc. of ISSRE, 2019
pdfbib
Gyro: A Modular Scale-Out Layer for Single-Server DBMSs
Habib Saissi, Marco Serafini and Neeraj Suri
Proc. of SRDS, 2019
pdfbib
Extracting Safe Thread Schedules from Incomplete Model Checking Results
Patrick Metzler, Neeraj Suri and Georg Weissenbacher
Proc. of SPIN, 2019
pdfbib
Assessing the State and Improving the Art of Parallel Testing for C
Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri
Proc. of ISSTA, 2019
pdfbib
MemFuzz: Using Memory Accesses to Guide Fuzzing
Nicolas Coppik, Oliver Schwahn and Neeraj Suri
Proc. of ICST, 2019
pdfbib
Communication standards for distributed renewable energy sources integration in future electricity distribution networks
Anish Jindal, Angelos Marnerides, Antonios Gouglidis, Andreas Ulrich Mauthe and David Hutchison
Proc. of IEEE ICASSP, 2019
pdf
Identifying infected energy systems in the wild
Angelos Marnerides, Vasileios Giotsas and Troy Mursch
Proc. Of e-energy, 2019
pdf
Stable and Practical AS Relationship Inference with ProbLink
Yuchen Jin, Colin Scott, Amogh Dhamdhere, Vasileios Giotsas, Arvind Krishnamurthy and Scott Shenker
Proc. of NSDI, 2019
pdf
Deep-learning based precoding techniques for next-generation video compression
Aaron Chadha, Eirina Bourtsoulatze, Vasileios Giotsas, Yiannis Andreopoulos and Sergio Grce
Proc. of IBC, 2019
pdf
Access Control in Industrial Internet of Things
Stavros Salonikias, Antonios Gouglidis, Ioannis Mavridis and Dimitrios Gritzalis
Book Chapter, 2019
Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds
Joseph Gardiner, Barnaby Craggs, Benjamin Green and Awais Rashid
Proc. of CPS-SPC, 2019
pdf
Everything is Awesome! Or is it?: Cyber Security Risks in Critical Infrastructure
Awais Rashid, Joseph Gardiner, Benjamin Green and Barney Craggs
Proc. of CRITIS, 2019
pdf
FUJITSU White Paper: Cyber Threat Lab
Angelos Marnerides, Daniel Prince, John Couzins, Ryan Mills, Vasileios Giotsas, Paul McEvatt, David Markham and Catherine Irvine
pdf
InfoLeak: Scheduling-based Information Leakage
Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang and Neeraj Suri
Proc. of PRDC, 2018
pdfbib
FastFI: Accelerating Software Fault Injections
Oliver Schwahn, Nicolas Coppik, Stefan Winter and Neeraj Suri
Proc. of PRDC, 2018
pdfbib
Exploring the Relationship Between Dimensionality Reduction and Private Data Release
Bo-Chen Tai, Szu-Chuang Li, Yennun Huang and Neeraj Suri
Proc. of PRDC, 2018
Protecting Cloud-based CIs: Covert Channel Vulnerabilities at the Resource
Tsvetoslava Vateva-Gurova, Salman Manzoor, Ruben Trapero and Neeraj Suri
Proc. of LNCS IOSEC, 2018
pdfbib
Threat Modeling the Cloud: An Ontology Based Approach
Salman Manzoor, Tsvetoslava Vateva-Gurova, Ruben Trapero and Neeraj Suri
Proc. of LNCS IOSEC, 2018
pdfbib
Assessing the Impact of Malware Attacks in Utility Networks
Sandra König, Antonios Gouglidis, Benjamin Green and Alma Solar
Book Chapter, 2018
G-DPS: A Game-theoretical Decision-making Framework for Physical Surveillance Games
Ali Alshawish, Mohamed Amine Abid, Hermann de Meer, Stefan Schauer, Sandra König, Antonios Gouglidis and David Hutchison
Book Chapter, 2018
Random Damage in Interconnected Networks
Sandra König and Antonios Gouglidis
Book Chapter, 2018
Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study
Antonios Gouglidis, Sandra König, Benjamin Green, Karl Rossegger and David Hutchison
Book Chapter, 2018
Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+
Antonios Gouglidis, Christos Grompanopoulos and Anastasia Mavridou
Proc. of MeTRiD, 2018
pdf
An Analysis of Cyber Security Attack Taxonomies
Ric Derbyshire, Benjamin Green, Andreas Ulrich Mauthe, Jeremy Simon Busby and David Hutchison
Proc. of IEEE Euro S&P workshop, 2018
pdf
Open Testbeds for CNI
Chris Hankin, Deeph Chana, Benjamin Green, Rafiullah Khan, Peter M3, Peter Popov, Awais Rashid and Sakir Sezer
Commissioned report, 2018
pdf
On the Disaster Resiliency within the Context of 5G Networks: The RECODIS Experience
Christian Esposito, Antonios Gouglidis, David Hutchison, Andrei Gurtov, Bjarne Helvik, Poul Heegaard, Gianluca Rizzo and Jacek Rak
Proc. of MeTRiD, 2018
pdf
Verification of Policies in Human Cyber-Physical Systems: the Role and Importance of Resilience
Antonios Gouglidis and David Hutchison
Proc. of CPS-SR, 2018
pdf
Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services
Heng Zhang, Ruben Trapero, Jesus Luna, Neeraj Suri
Intl. Conference on Availability, Reliability and Security (ARES), 2018
pdfbib
A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems
Hatem Ismail, Stefanie Roos and Neeraj Suri
IEEE TrustComm, 2018
pdfbib
QRES: Quantitative Reasoning on Encrypted Security SLAs
Ahmed Taha, Spyros Boukoros, Jesus Luna, Stefan Katzenbeisser, and Neeraj Suri
https://arxiv.org/abs/1804.04426, 2018
pdf
Whetstone: Reliable Monitoring of Cloud
Heng Zhang, Jesus Luna Garcia, Neeraj Suri and Ruben Trapero
Proc. of Smartcomp, 2018
pdfbib
A Detection Mechanism for Internal Attacks in P2P Streaming Systems
Hatem Ismail, Stefanie Roos, Neeraj Suri
Proc. IEEE WoWMoM, 2018
pdfbib
Monitoring Path Discovery for Supporting Indirect Monitoring of Cloud
Heng Zhang, Salman Manzoor, and Neeraj Suri
Proc. of IC2E (IEEE Intl. Conf on Cloud Engg – Doctoral Symposium), 2018
Threat Modeling and Analysis for the Cloud Ecosystem
Salman Manzoor, Heng Zhang, Neeraj Suri
Proc. of IC2E (IEEE Intl. Conf on Cloud Engg – Doctoral Symposium), 2018
pdfbib
O Peer, Where Art Thou?: Uncovering Remote Peering Interconnections at IXPs
Georgios Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas Dimitropoulos and Vasileios Giotsas
Proc. of IMC, 2018
pdf
CommunityWatch: The Swiss-Army Knife of BGP Anomaly Detection
Vasileios Giotsas
Proc. of ANRW, 2018
pdf
Quick Verification of Concurrent Programs by Iteratively Relaxed Scheduling
Patrick Metzler, Habib Saissi, Peter Bokor and Neeraj Suri
Proc. of IEEE/ACM Automated Software Engg. (ASE), 2017
pdfbib
TrEKer: Tracing Error Propagation in Operating System Kernels
Nicolas Coppik, Oliver Schwahn, Stefan Winter and Neeraj Suri
Proc. of IEEE/ACM Automated Software Engg. (ASE), 2017
pdfbib
Towards DDoS Attack Resilient Wide Area Monitoring Systems
Kubilay Demir and Neeraj Suri
Proc. of Security in Critical Infrastructures Workshop @IEEE ARES, 2017
C’MON: Monitoring the Compliance of Cloud Services to Contracted Properties
Soha Albaghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri
Proc. of Intl. Conference on Availability, Reliability and Security (ARES), 2017
pdfbib
AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces
Salman Manzoor, Jesus Luna and Neeraj Suri
Proc. of IEEE Services Computing (SCC), 2017
pdfbib
A Security Architecture for Railway Signalling
C. Schlehuber, M. Heinrich, T. Vateva-Gurova, S. Katzenbeisser and N. Suri
Intl. Conference on Computer Safety, Reliability and Security (SAFECOMP), 2017
pdfbib
SLA-based Service Selection for Multi-Cloud Environments
Ahmed Taha, Salman Manzoor and Neeraj Suri
Proc. of IEEE EDGE Computing (EGDE), 2017
pdfbib
deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services
Heng Zhang, Jesus Luna, Ruben Trapero and Neeraj Suri
Proc. of IEEE Services Computing (SCC), 2017
pdfbib
A Framework for Ranking Cloud Security Services
Ahmed Taha, Ruben Trapero, Jesus Luna, Neeraj Suri
Proc. of IEEE Services Computing (SCC), 2017
pdfbib
Effectiveness of Driver Isolation and Testing in User Space
Oliver Schwahn
EuroSys Doctoral Workshop, 2017
pdf
Challenges and Approaches in Securing Safety-Relevant Railway Signalling
Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, and Neeraj Suri
Proc. of S4CIP, 2017
pdfbib
Error Propagation Analysis of Multithreaded Programs Using Likely Invariants
Abraham Chan, Stefan Winter, Habib Saissi, Karthik Pattabiraman, Neeraj Suri
Proc. of ICST, 2017
SeReCP: A Secure and Reliable Communication Platform for the Smart Grid
Kubilay Demir, Neeraj Suri
Proc. of PRDC, 2017
pdfbib
Verification of Resilience Policies that Assist Attribute Based Access Control
Antonios Gouglidis, Vincent C. Hu, Jeremy Simon Busby and David Hutchison
Proc. of IEEE ABAC, 2017
pdf
Protection against Cyber Attacks: Introducing Resilience for SCADA Networks
Antonios Gouglidis and David Hutchison
Proc. of Symposium on Innovative Smart Grid Cybersecurity Solutions, 2017
pdf
How Long is a Piece of String: Defining Key Phases and Observed Challenges within ICS Risk Assessment
Benjamin Green, Daniel David Campbell Prince, Jeremy Simon Busby and David Hutchison
Proc. of CPS, 2017
pdf
Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research
Benjamin Green, Anh Tuan Le, Rob Antrobus, Utz Roedig, David Hutchison and Awais Rashid
Proc. of Usenix CSET, 2017
pdf
On the Significance of Process Comprehension for Conducting Targeted ICS Attacks
Benjamin Green, Marina Krotofil and Ali Abbasi
Proc. of CPS, 2017
pdf
Inferring BGP blackholing activity in the Internet
Vasileios Giotsas, Georgios Smaragdakis, Christoph Dietzel, Philipp Richter, Anja Feldmann and Arthur Berger
Proc. of IMC, 2017
pdf
Detecting peering infrastructure outages in the wild
Vasileios Giotsas, Christoph Dietzel, Georgios Smaragdakis, Anja Feldmann, Arthur Berger and Emile Aben
Proc. of SiGCOMM, 2017
pdf
Achieving ICS resilience and security through granular data flow management
Benjamin Green, Marina Krotofil and David Hutchison
Proc. of CPS-SPC, 2016
pdf
Malicious Peers Eviction for P2P Overlays
Hatem Ismail, Daniel Germanus, Neeraj Suri
Proc. of CNS, 2016
pdfbib
Efficient Verification of Program Fragments: Eager POR

Patrick Metzler, Habib Saissi, Péter Bokor, Robin Hesse and Neeraj Suri
Proc of ATVA, 2016
pdfbib
Practical Formal Verification for Model Based Development of Cyber-Physical
Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri
Proc. of IEEE/IFIP Embedded and Ubiquitous Computing (EUC), 2016
pdf
Sentry: A novel approach for mitigating application layer DDoS security
Heng Zhang, Ahmed Taha, Ruben Trapero, Jesus Luna and Neeraj Suri
Proc. TrustCom, 2016
pdfbib
Trust Validation of Cloud IaaS: A Customer Centric Approach
Salman Manzoor, Ahmed Taha and Neeraj Suri
Proc. TrustCom, 2016
pdfbib
Identifying and Utilizing Dependencies Across Cloud Security Services
Ahmed Taha, Patrick Metzler, Ruben Trapero, Jesus Luna, Neeraj Suri
Proc. of Asia CCS, 2016
pdfbib
Reliable Memory-Efficient Name Forwarding in Named Data Networking
Divya Saxena, Vaskar Raychoudhury, Christian Becker and Neeraj Suri
Proc. EUC, 2016
pdfbib
A Multi-Level Approach to Resilience of Critical Infrastructures and Services
Antonios Gouglidis, Syed Noor Ul Hassan Shirazi, Steven Simpson, Paul Smith and David Hutchison
Proc. of ICT, 2016
Modelling security risk in critical utilities: the system at risk as a three player game and agent society
Jeremy Simon Busby, Antonios Gouglidis, Stefan Rass and Sandra König
Proc. of , 2016
pdf
Technology-related disasters: a survey towards disaster-resilient software defined networks
Carmen Mas Machuca, Stefano Secci, Petra Vizaretta, Fernando Kuipers, Antonios Gouglidis, David Hutchison, Simon Jouet, Dimitrios Pezaros, Ahmed Elmokashfi, Poul Heegaard, Sasko Ristov and Marjan Gusev
Proc. of RNDM, 2016
pdf
Threat awareness for critical infrastructures resilience
Antonios Gouglidis, Benjamin Green, Jeremy Simon Busby, Mark Francis Rouncefield, David Hutchison and Stefan Schauer
Proc. of RNDM, 2016
pdf
A Multi-commodity network flow model for cloud service environments
Ioannis M. Stephanakis, Syed Noor Ul Hassan Shirazi, Antonios Gouglidis and David Hutchison
Proc. of, 2016
pdf
Evaluation of Anomaly Detection Techniques for SCADA Communication Resilience
Syed Noor Ul Hassan Shirazi, Antonios Gouglidis, Kanza Noor Syeda, Steven Simpson, Andreas Ulrich Mauthe, Ioannis M. Stephanakis and David Hutchison
Proc. of RWS, 2016
pdf
Anomaly detection in the cloud using data density
Syed Noor Ul Hassan Shirazi, Steven Simpson, Antonios Gouglidis, Andreas Ulrich Mauthe and David Hutchison
Proc. of IEEE Cloud, 2016
pdf
BGPStream: A software framework for live and historical BGP data analysis
Chiara Orsini, Alistair King, Danilo Giordano, Vasileios Giotsas and Alberto Dainotti
Proc. of IMC, 2016
pdf
Cloud instance management and resource prediction for computation-as-a-service platforms
Joseph Doyle, Vasileios Giotsas, Mohammad Ashraful Anam and Yiannis Andreopoulos
Proc. of IC2E, 2016
pdf
Query processing for the internet-of-things: Coupling of device energy consumption and cloud infrastructure billing
Francesco Renna, Joseph Doyle, Yiannis Andreopoulos and Vasileios Giotsas
Proc. of IoTDI, 2016
pdf
Periscope: Unifying looking glass querying
Vasileios Giotsas, Amogh Dhamdhere, K. C. Claffy
Proc. of PAM, 2016
pdf
Detecting and Mitigating Sophisticated P2P Eclipse Attacks
Hatem Ismail, Daniel Germanus and Neeraj Suri
Proc. IEEE ICPADS, 2015
pdfbib
The Impact of Hypervisor Scheduling on Compromising Virtualized Environments
Tsvetoslava Vateva-Gurova, Neeraj Suri, Avi Mendelson
Proc. of DASC, 2015
pdfbib
Fault-Tolerance for Transient and Permanent Data Errors in Wireless Sensor Networks
Azad Ali, Abdelmajid Khalil and Neeraj Suri
Proc. of SRDS, 2015
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation
Daniel Germanus, Hatem Ismail and Neeraj Suri
Proc of SRDS, 2015
pdfbib
PBMC: Symbolic Slicing for the Verification of Concurrent Programs
Habib Saissi, Peter Bokor, Neeraj Suri
Symposium on Automated Technology for Verification and Analysis, ATVA, 2015
pdfbib
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms
Thorsten Piper, Stefan Winter, Neeraj Suri and Thomas E. Fuhrman
Proc. of EDCC, 2015
pdf
In the Compression Hornet’s Nest: A Security Study of Data Compression in Network Services
Giancarlo Pellegrino, Davide Balzarotti, Stefan Winter, Neeraj Suri
Proc. of USENIX Security Symposium, 2015
pdfbib
GRINDER: On Reusability of Fault Injection Tools
Stefan Winter, Thorsten Piper, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo
Proc. of ICSE/AST, 2015
pdfbib
Quantitative Assessment and Comparison of Cloud Service Providers’ Privacy Practices

J. M. del Alamo, R. Trapero, Y. S. Martín, J. C. Yelmo and N. Suri
Proc. CITA, 2015
pdf
Mitigating Timing Error Propagation in Mixed-Criticality Automotive Systems
Thorsten Piper, Stefan Winter, Oliver Schwahn, Suman Bidarahalli and Neeraj Suri
Proc. of ISORC, 2015
pdfbib
Optimizing Multi-Cloud Application Deployments with Security Controls as Constraints
Philippe Massonet, Jesus Luna, Alain Pannetrat and Ruben Trapero
Intl. Symposium on Engineering Secure Software and Systems (ESSoS), 2015
pdf
No PAIN, No Gain? The utility of PArallel fault INjections
Stefan Winter, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo
Intl. Conf on Software Engg (ICSE), 2015
pdfbib
Assurance Techniques for Industrial Control Systems (ICS)
William Knowles
Jose Miguel Such Aparicio, Antonios Gouglidis, Gaurav Misra, Awais Rashid
Proc. of , 2015
pdf
The North West cyber security industry: export potential assessment
Daniel David Campbell Prince and Oliver James Fitton
Technical report, 2015
pdf
The future of maritime cyber security
Oliver Fitton, Daniel Prince, Basil Germond and Mark Lacy
Technical report, 2015
pdf
Mapping peering interconnections to a facility
Vasileios Giotsas, Georgios Smaragdakis, Bradley Huffaker, Matthew Luckie and K. C. Claffy
Proc. of CoNEXT, 2015
pdf
Perceptual video quality estimation by regression with myopic experts
Vasileios Giotsas, Nikos Deligiannis, Pam Fisher and Yiannis Andreopoulos
Proc. of QoMEx, 2015
pdf
IPv6 AS relationships, cliques, and congruence
Vasileios Giotsas, Matthew Luckie, Bradley Huffaker and Kc Claffy
Proc. of PAM, 2015
pdf
Video Clarity: High Speed Data Mining for Video
Pam Fisher, Abbas Alhabib, Vasileios Giotsas and I. Andreopoulos
Proc. of IBC, 2015
pdf
Event pattern discovery on IDS traces of Cloud Services
Shin-Ying Huang, Yennun Huang, Neeraj Suri
Proc. IEEE Intl Conf on Big Data and Cloud Computing (BDCloud), 2014
pdfbib
AHP-Based Quantitative Approach for Assessing & Comparing Cloud Security
Ahmed Taha, Ruben Trapero, Jesus Luna and Neeraj Suri
Proc. of TrustComm, 2014
pdfbib
Robust and Real-time Communication on Heterogeneous Networks for Smart Distribution Grid
Kubilay Demir, Daniel Germanus and Neeraj Suri
Proc. of SmartGridComm, 2014
pdfbib
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments
Tsvetoslava Vateva-Gurova, Jesus Luna, Ginacarlo Pellegrino, Neeraj Suri
Proc. of SECRYPT, 2014
pdfbib
Mitigating Eclipse Attacks in Peer-to-Peer Networks
Daniel Germanus, Stefanie Roos, Thorsten Strufe, Neeraj Suri
Proc. of CNS, 2014
pdfbib
Practical Use of Formal Verification for Safety Critical Cyber-Physical Systems: A Case Study
Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter and Neeraj Suri
Proc CPSNA, 2014
pdfbib
Socio-technical security analysis of Industrial Control Systems (ICS)
Benjamin Green
Daniel Prince, Utz Roedig, Jeremy Busby and David Hutchison
Proc. of eWiC, 2014
pdf
An Empirical Study of Injected versus Actual Interface Errors
Anna Lanzaro, Roberto Natella, Stefan Winter, Domenico Cotroneo and Neeraj Suri
Proc. of ISSTA, 2014
pdfbib
Robust Compressive Data Gathering in Wireless Sensor Networks with Linear Topology
Mohammadreza Mahmudimanesh and Neeraj Suri
Proc. of DCOSS, 2014
pdfbib
Efficient Agile Sink Selection in Wireless Sensor Networks based on Compressed Sensing
Mohammadreza Mahmudimanesh, Amir Naseri, and Neeraj Suri
Proc. of DCOSS, 2014
pdfbib
Towards a Framework for Benchmarking Privacy-ABC Technologies
Fatbardh Veseli1, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, and Neeraj Suri
Proc. of IFIP SEC, 2014
pdfbib
Agile Sink Selection in Wireless Sensor Networks
Mohammadreza Mahmudimanesh, Neeraj Suri
Proc. of SECON, 2014
pdfbib
User-Centric Security Assessment of Software Configurations: A Case Study
Hamza Ghani, Jesus Luna Garcia, Ivaylo Petkov and Neeraj Suri
Proc. ESSoS, 2014
pdfbib
Design and construction of an Industrial Control System testbed
Benjamin Green, Ben Paske, David Hutchison and Daniel Prince
Proc. of PG Net, 2014
Inferring complex AS relationships
Vasileios Giotsas, Matthew Luckie, Bradley Huffaker and Kc Claffy
Proc. of IMC, 2014
pdf
Model-Based Generation of Run-Time Monitors for AUTOSAR
Lars Patzina, Sven Patzina, Thorsten Piper, and Paul Manns
Proc. of the 9th European Conference on Modelling Foundations and Applications (ECMFA), pp. 70-85, 2013
pdf
Quantitative Assessment of Software Vulnerabilities Based on Economic-Driven Security Metrics
Hamza Ghani, Jesus Luna Garcia and Neeraj Suri
Proc. Of CRISIS, 2013
pdfbib
Predictive Vulnerability Scoring in the Context of Insufficient Information Availability
Hamza Ghani, Jesus Luna Garcia, Neeraj Suri, Abdelmajid Khelil and Najib Alkadri
CRISIS, 2013
pdfbib
Quantitative Assessment of Software Vulnerabilities Based on Economic-Driven Security Metrics
Hamza Ghani, Jesus Luna Garcia and Neeraj Suri
Proc. of CRISIS, 2013
pdfbib
PoWerStore: Proofs of Writing for Efficient and Robust Storage
Dan Dobre, Ghassan Karame, Wenting Li, Matthias Majuntke, Neeraj Suri and Marko Vukoliç
Proc. of ACM CCS, 2013
pdfbib
Coral: Reliable and Low-latency P2P Convergecast for Critical Sensor Data Collection
Daniel Germanus, Johannes Schwandke, Abdelmajid Khelil, Neeraj Suri
Proc. of IEEE SmartGridComm Symposium, 2013
pdfbib
Efficient Verification of Distributed Protocols Using Stateful Model Checking
Habib Saissi, Peter Bokor, Can Arda Müftüoglu, Marco Serafini and Neeraj Suri
Proc. of SRDS, 2013
pdfbib
On Using Threat Modeling for Financial Damage Estimation
Hamza Ghani, Jesus Luna, Fabian Letzkus and Neeraj Suri
Proc. of NETYS, 2013
Negotiating and Brokering Cloud Resources based on Security Level Agreements
Jesus Luna, Tsvetoslava Vateva-Gurova, Neeraj Suri, Massimiliano Rak, Loredana Liccardo
Proc. of the International Conference on Cloud Computing and Services Science, 2013
pdfbib
simFI: From single to simultaneous software fault injections
Stefan Winter, Michael Tretter, Benjamin Sattler, Neeraj Suri
Proc. of DSN-DCCS, 2013
pdfbib
Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach
Tan Feng, Qixin Wang, Lei Bu, Rong Zheng, Yufei Wang, Neeraj Suri
Proc. of DSN-PDS, 2013
pdf
Information Quality Aware Co-design of Sampling and Transport in Wireless Sensor Networks
Vinay Sachidananda, Abdelmajid Khelil, David Noack and Neeraj Suri
Proc. WMNC, 2013
pdfbib
Sampling and Transport Co-design in Wireless Sensor Networks
Vinay Sachidananda, Abdelmajid Khelil, David Noack and Neeraj Suri
Proc. of Wireless On-Demand Network Systems & Services (WONS), 2013
pdfbib
Trading Transport Timeliness and Reliability for Efficiency in Wireless Sensor Networks
Vinay Sachidananda, Abdelmajid Khelil, D. Umap, Matthias Majuntke, Neeraj Suri
Proc. Intl Conf on Networking Sensing and Control (ICNSC), 2013
pdfbib
A use-based approach for enhancing UCON
Christos Grompanopoulos, Antonios Gouglidis and Ioannis Mavridis
Proc. of International Workshop on Security and Trust Management, 2013
pdf
Verification of secure inter-operation properties in multi-domain RBAC systems
Antonios Gouglidis, Ioannis Mavridis and Vincent C. Hu
Proc. of IEEE SSIRI-C, 2013
pdf
A methodology for the development and verification of access control systems in cloud computing
Syed Noor Ul Hassan Shirazi, Steven Simpson, Antonios Gouglidis, Andreas Ulrich Mauthe and David Hutchison
Proc. of Conference on e-Business, e-Services and e-Society, 2013
pdf
Understanding cyber criminals and measuring their future activity
Claire Hargreaves and Daniel Prince
Technical report, 2013
The future of digital disrupters: rethinking the digital divide
Mark Lacy and Daniel Prince
Technical report, 2013
pdf
Small business cyber security workshop 2013: towards digitally secure business growth
Daniel Prince and Nick King
Technical report, 2013
pdf
Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research
William Knowles, Daniel Prince, David Hutchison, Jules Ferdinand Pagna Disso and Kevin Jones
Proc. of ICS & SCADA Cyber Security, 2013
AS relationships, customer cones, and validation
Matthew Luckie, Bradley Huffaker, Amogh Dhamdhere, Vasileios Giotsas, Kc Claffy
Proc. of IMC, 2013
pdf
Improving the discovery of IXP peering links through passive BGP measurements
Vasileios Giotsas and Shi Zhou
Proc. of infocom, 2013
pdf
Inferring multilateral peering
Vasileios Giotsas, Shi Zhou, Matthew Luckie and Kc Claffy
Proc. of CoNEXT, 2013
pdf
Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees
Jesus Luna, Robert Langenberg, Neeraj Suri
Proc. of CCSW (ACM Cloud Computing Security Workshop), 2012
pdfbib
Privacy-by-Design Based on Quantitative Threat Modeling
Jesus Luna, Neeraj Suri, Ioannis Krontiris
Proc. of Conference on Risks and Security of Internet and Systems (CRISIS), 2012
pdfbib
On Co-modeling the Sampling and Transport in Wireless Sensor Networks
Vinay Sachidananda, Abdelmajid Khelil, David Noack and Neeraj Suri
Proceedings of the 11th GI/ITG KuVS Fachgespr, 2012
Balanced Spatio-Temporal Compressive Sensing for Multi-hop Wireless Sensor Networks
Mohammadreza Mahmudimanesh, Abdelmajid Khelil, Neeraj Suri
Proceedings of Mobile Ad hoc and Sensor Systems (MASS), 2012
pdfbib
The Hierarchical Microkernel: A Flexible and Robust OS Architecture
Stefan Winter, Martin Tsarev, Dennis Feldmann, Robert Reinecke
Proc. of Dependable Systems & Networks (DSN), 2012 (Supplemental Proceedings)
pdf
Susceptibility Analysis of Structured P2P Systems to Localized Eclipse Attacks
Daniel Germanus, Robert Langenberg, Abdelmajid Khelil, Neeraj Suri
Proc. of Symposium on Reliable Distributed Systems (SRDS), pp. 11-20, 2012
pdfbib
Quantitative Assessment of Cloud Security Levels: A Case Study
Jesus Luna, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri
Proc. of Security and Cryptography (SECRYPT), pp. 64-73, 2012
pdfbib
Instrumenting AUTOSAR for Dependability Assessment: A Guidance Framework
Thorsten Piper, Stefan Winter, Paul Manns and Neeraj Suri
Proc. of Dependable Systems & Networks (DSN/DCCS), pp. 1-12, 2012
pdfbib
Fast Indoor Radio-Map Building for RSSI-based Localization Systems
Philipp M. Scholl, Stefan Kohlbrecher, Vinay Sachidananda, Kristof Van Laerhoven
Proc. of INSS, 2012
Information Quality Aware Co-design of Sampling and Transport in Wireless Sensor Networks
Vinay Sachidananda, Abdelmajid Khelil, Neeraj Suri
Proc. of European Conference on Wireless Sensor Networks (EWSN), Poster, 2012
Grid access control models and architectures
Antonios Gouglidis and Ioannis Mavridis
Book Chapter, 2012
pdf
Perceptual Influences on Risk Assessments and the Challenges for Information Security and Network Management
William Knowles, Daniel Prince and David Hutchison
2012
pdf
Role-based secure inter-operation and resource usage management in mobile grid systems
Antonios Gouglidis and Ioannis Mavridis
Proc. of IFIP International Workshop on Information Security Theory and Practices, 2012
pdf
Towards utilizing Tcpcrypt in mobile healthcare applications
Stefanos A. Nikolidakis, Vasileios Giotsas, Emmanouil Georgakakis, Dimitrios D. Vergados and Christos Douligeris
Proc. of MobiHealth, 2012
pdf
Valley-free violation in Internet routing: analysis based on BGP Community data
Vasileios Giotsas and Shi Zhou
Proc. of ICC, 2012
pdf
DKM: Distributed k-Connectivity Maintenance in Wireless Sensor Networks
Piotr Szczytowski, Abdelmajid Khelil, Neeraj Suri
Proc. of WONS, pp. 83-90, 2011
pdfbib
Assessing the Comparative Effectiveness of Map Construction Protocols in Wireless Sensor Networks
Abdelmajid Khelil, Hanbin Chang, Neeraj Suri
Proc. of IPCCC, pp. 1-6, 2011
Fork-Consistent Constructions From Registers
Matthias Majuntke, Dan Dobre, Christian Cachin and Neeraj Suri
Proc. of OPODIS, pp. 283-298, 2011
pdfbib
An Adaptive and Composite Spatio-Temporal Data Compression Approach for Wireless Sensor Networks
Azad Ali, Abdelmajid Khelil, Piotr Szczytowski and Neeraj Suri
Proc. of ACM Intl Conf on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), pp. 67-76, 2011
pdfbib
Supporting Domain-Specific State Space Reductions through Local Partial-Order Reduction
Peter Bokor, Marco Serafini, Johannes Kinder, Neeraj Suri
Proc. of Automated Software Engineering (ASE), pp. 113-122, 2011
pdfbib
Building a long term strategy for International Collaboration in Trustworthy ICT Security, Privacy and Trust in Global Networks and Services
James Clarke, Neeraj Suri, Michel Riguidel, Aljosa Pasic
Proc. of System Security (SysSec), 2011
To Crash or Not To Crash: Efficient Modeling of Fail-Stop Faults
Habib Saissi, Peter Bokor, Marco Serafini and Neeraj Suri
Proc. of Logical Aspects of Fault Tolerance (LAFT), 2011 (invited paper)
pdf
A Security Metrics Framework for the Cloud
Jesus Luna, Hamza Ghani, Daniel Germanus, and Neeraj Suri
Proc. of International Conference on Security and Cryptography (SECRYPT), pp. 245-250, 2011
pdfbib
TOM: Topology Oriented Maintenance in Sparse Wireless Sensor Networks
Piotr Szczytowski, Abdelmajid Khelil, Azad Ali and Neeraj Suri
Proc. of Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 548-556, 2011
pdfbib
The Complexity of Robust Atomic Storage
Dan Dobre, Rachid Guerraoui, Matthias Majuntke, Neeraj Suri and Marko Vukolic
Proc. ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), pp. 59-68, 2011
pdfbib
Fork-Consistent Constructions From Registers
Matthias Majuntke, Dan Dobre and Neeraj Suri
Proc. ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), pp. 209-210, 2011 (Brief Announcement)
pdfbib
Efficient Model Checking of Fault-Tolerant Distributed Protocols
Peter Bokor, Johannes Kinder, Marco Serafini and Neeraj Suri
Proc. of DSN/DCCS, pp. 73-84, 2011
INDEXYS, A Logical Step Beyond GENESYS – INDustrial EXploitation of the genesYS cross-domain architecture
Andreas Eckel, Neeraj Suri et al
Proc. of Symposium on Computer Safety, Reliability and Security (SAFECOMP), 2010
Simulation and Evaluation of Mixed-Mode Environments: Towards Higher Quality of Simulations
Vinay Sachidananda, Diego Costantini, Christian Reinl, Dominik Haumann, Karen Petersen, Parag S. Mogre, and Abdelmajid Khelil
Proc. of Simulation, Modeling and Programming for Autonomous Robots (SIMPAR), 2010
Quality of Information in Wireless Sensor Networks: A Survey
Vinay Sachidananda, Abdelmajid Khelil, Neeraj Suri
Proc. of Information Quality (ICIQ), 2010
pdfbib
Leveraging the Next-Generation Power Grid: Data Sharing and Associated Partnerships
Ionna Dionysiou, Harald Gjermundrod, Daniel Germanus, Abdelmajid Khelil, Neeraj Suri, David E. Bakken, and Carl Hauser
Proc. ISGT, 2010
Eventually Linearizable Shared Objects
Marco Serafini, Dan Dobre, Matthias Majuntke, Peter Bokor and Neeraj Suri
Proc. of ACM Symposium on Principles of Distributed Computing (PODC), pp. 95-104, 2010
pdfbib
Mobility Assisted Adaptive Sampling in Wireless Sensor Networks
Piotr Szczytowski, Faisal Karim Shaikh, Vinay Sachidananda, Abdelmajid Khelil and Neeraj Suri
Proc. of International Conference on Networked Sensing Systems (INSS), Demo Session, 2010
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays
Daniel Germanus, Abdelmajid Khelil and Neeraj Suri
Proc. of International Symposium on Architecting Critical Systems (ISARCS), pp. 161-178, 2010
pdfbib
On Efficient Models for Model Checking Message-Passing Distributed Protocols
Peter Bokor, Marco Serafini, Neeraj Suri
Proc. of Formal Methods for Distributed Systems (FORTE), pp. 216-223, 2010
pdfbib
Localized Energy Hole Profiling in Wireless Sensor Networks
Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri
Proc. IEEE symposium on Computers and Communications (ISCC), pp. 100-106, 2010
pdfbib
Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective
Abdelmajid Khelil, Sebastian Jeckel, Daniel Germanus and Neeraj Suri
Proc. of Mobile Lightweight Wireless Systems (MOBILIGHT), pp. 400-414, 2010
pdfbib
Data-based Agreement for Inter-Vehicle Coordination
Brahim Ayari, Abdelmajid Khelil, Kamel Saffar and Neeraj Suri
Proc. of Mobile Data Management (MDM), Demo Track, 2010
pdfbib
Scrooge: Reducing the Costs of Fast Byzantine Replication in Presence of Unresponsive Replicas
Marco Serafini, Peter Bokor, Dan Dobre, Matthias Majuntke and Neeraj Suri
Proc. of DSN-DCCS, pp. 353-362, 2010
pdfbib
HP: Hybrid Paxos for WANs
Dan Dobre, Matthias Majuntke, Marco Serafini and Neeraj Suri
Proc. of European Dependable Computing Conference (EDCC), pp. 117-126, 2010
pdfbib
Generic Information Transport for Wireless Sensor Networks
Faisal Karim Shaikh, Abdelmajid Khelil, Brahim Ayari, Piotr Szczytowski and Neeraj Suri
Proc. of Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 27-34, 2010
pdfbib
ASample: Adaptive Spatial Sampling in Wireless Sensor Networks
Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri
Proc. of Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 35-42, 2010
pdfbib
Reordering for Better Compressibility: Efficient Spatial Sampling in Wireless Sensor Networks
Mohammadreza Mahmudimanesh, Abdelmajid Khelil and Neeraj Suri
Proc. of Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 50-57, 2010
pdf
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs
Brahim Ayari, Abdelmajid Khelil and Neeraj Suri
Proc. of Mobile Data Management (MDM), pp. 135-144, 2010
pdfbib
Detecting and assessing the hybrid IPv4/IPv6 as relationships
Vasileios Giotsas and Shi Zhou
Proc. of SIGCOMM, 2011
pdf
Inferring Internet AS Relationships Based on BGP Routing Policies
Vasileios Giotsas and Shi Zhou
A secure ubiquitous healthcare system based on IMS and the HL7 standards
Stefanos A. Nikolidakis, Emmanouil Georgakakis, Vasileios Giotsas, Dimitrios D. Vergados and Christos Douligeris
Proc. of Petra, 2010
pdf
TRCCIT: Tunable Reliability with Congestion Control for Information Transport in Wireless Sensor Networks
Faisal Karim Shaikh, Abdelmajid Khelil, Azad Ali and Neeraj Suri
Proc. of Wireless Internet Conference (WICON), pp. 1-9, 2010
pdf
Abortable Fork-Linearizable Storage
Matthias Majuntke, Dan Dobre, Marco Serafini, and Neeraj Suri
Proc. of OPODIS, pp. 255-269, 2009
pdfbib
GENESYS: A Cross- Domain Architecture for Embedded Systems
Roman Obermaisser, Hermann Kopetz, Bernhard Huber, Christian El-Salloum, Roberto Zafalon, Fabrice Auzanneau, K. Kronloef, Pascal Millet, Michael Borth, C. Couvreur, Neeraj Suri, Sergio Campos, Eila Ovaska, and Michael Goedecke
Proc. of DATE09 on Designing for Embedded Parallel Computing Platforms: Architectures, Design Tools, and Applications, 2009
Role-Based Symmetry Reduction of Fault-tolerant Distributed Protocols with Language Support
Peter Bokor, Marco Serafini, Neeraj Suri and Helmut Veith
Proc. of Formal Methods and Software Engineering (ICFEM), pp. 147-166, 2009
pdfbib
Efficient Robust Storage Using Secret Tokens
Dan Dobre, Matthias Majuntke, Marco Serafini and Neeraj Suri
Proc. of Stabilization, Safety, and Security of Distributed Systems (SSS), pp. 269-283, 2009
pdfbib
A mobile healthcare system using IMS and the HL7 framework
Stefanos Nikolidakis, Vasileios Giotsas, Dimitrios Vergados and Christos Douligeris
Proc. of ANCS, 2009
pdf
A novel power-efficient middleware scheme for sensor grid applications
Nikolaos I. Miridakis, Vasileios Giotsas, Dimitrios D. Vergados and Christos Douligeris
Proc. of QShine, 2009
pdf
MPM: Map based Predictive Monitoring for Wireless Sensor Networks
Azad Ali, Abdelmajid Khelil, Faisal Karim Shaikh, and Neeraj Suri
Proc. of Autonomics, pp. 79-95, 2009
pdfbib
Design and Formal Verification of Membership Middleware for Dependable Automotive Network Systems
Kohei Sakurai, Marco Serafini, Peter Bokor and Neeraj Suri
International Congress on Electronic Systems for Vehicles, 2009
Brief Announcement: Efficient Model Checking of Fault-tolerant Distributed Protocols Using Symmetry Reduction
Peter Bokor, Marco Serafini, Neeraj Suri and Hermann Veith
Proc. of Distributed Computing DISC, 2009
pdfbib
Map-Based Modeling and Design of Wireless Sensor Networks with OMNeT++
Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri
Proc. of Performance Evaluation of Computer and Telecommunication Systems (SPECTS), pp. 162-169, 2009
pdfbib
AReIT: Adaptable Reliable Information Transport for Service Availability in Wireless Sensor Networks
Faisal Karim Shaikh, Abdelmajid Khelil and Neeraj Suri
Proc. of Wireless Networks (ICWN), 2009
pdfbib
Map-based Compressive Sensing Model for Wireless Sensor Network Architecture, A Starting Point
Mohammadreza Mahmudimanesh, Abdelmauid Khelil, Nasser Yazdani
Proc. of Wireless Sensor Networks Architectures, Simulation and Programming (WASP), 2009
pdfbib
MAP++: Support for Map-Based WSN Modeling and Design with OMNeT++
Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri
Proc. of Workshop on OMNeT++, pp. 77-87, 2009
pdfbib
On Equivalence Partitioning of Code Paths inside OS Kernel Components
Constantin Sârbu, Nachiappan Nagappan and Neeraj Suri
Proc. of Software Technologies for Future Dependable Distributed Systems (STFSSD), 2009
pdfbib
gMAP: Efficient Construction of Global Maps for Mobility-Assisted Wireless Sensor Networks
Abdelmajid Khelil, Faisal Karim Shaikh, Azad Ali and Neeraj Suri
Proc. of Wireless On demand Network Systems and Services (WONS), pp. 189-196, 2009
pdf
A foundation for defining security requirements in grid computing
Antonios Gouglidis and Ioannis Mavridis
Proc. of IEEE PCI, 2009
pdf
Implementation and Evaluation of Delay-Aware and Fault-Tolerant Mobile Transactions
Brahim Ayari, Abdelmajid Khelil, Neeraj Suri and Eugen Bleim
Proc. of E-Medical Systems (E-Medisys’08), 2008 [Invited]
pdfbib
On the Time-Complexity of Robust and Amnesic Storage
Dan Dobre, Matthias Majuntke and Neeraj Suri
Proc. OPODIS, pp. 197-216, 2008
pdfbib
Reducing the Costs of Large-Scale BFT Replication
Marco Serafini and Neeraj Suri
Proc. LADIS, 2008
Low-latency Access to Robust Amnesic Storage
Dan Dobre, Matthias Majuntke and Neeraj Suri
Proc. LADIS, 2008
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by use of Executable Formal Specifications
Kohei Sakurai, Peter Bokor, Neeraj Suri
Proc. HASE, pp. 261-270, 2008
pdfbib
Dependable and Cost-Effective Architecture for X-by-Wire with Membership Middleware
Kohei Sakurai, Masahiro Matsubara, Marco Serafini, Neeraj Suri
Proc. FISITA, 2008
MM-ulator: Towards a Common Evaluation Platform for Mixed Mode Environments
Matthias Krop , Arthur Herzog, Daniel Jacobi, Kim Listmann, Karen Petersen, Katayon Radkhah, Christian Reinl, Faisal Karim Shaikh, Armin Strobel and Oskar von Stryk
Proc. of Simulation, Modeling, and Programming for Autonomous Robots (SIMPAR), 2008
pdf
Profiling the Operational Behavior of OS Device Drivers
Constantin Sârbu, Andréas Johansson, Neeraj Suri and Nachi Nagappan
ISSRE, pp. 127-136, 2008
pdfbib
MWM: A Map-based World Model for Event-driven Wireless Sensor Networks
Abdelmajid Khelil, Faisal Karim Shaikh, Brahim Ayari and Neeraj Suri
Proc. of Autonomic Computing and Communication Systems (AUTONOMICS), 2008
pdfbib
INcreasing Security and Protection through Infrastructure REsilience: the INSPIRE Project
Salvatore D’Antonio, Abdelmajid Khelil, Luigi Romano and Neeraj Suri
Proc. of Critical Information Infrastructures Security (CRITIS), pp. 109-118, 2008
Delay-Aware Mobile Transactions
Brahim Ayari, Abdelmajid Khelil and Neeraj Suri
Proc. of Software Technologies for Future Embedded & Ubiquitous Systems (SEUS), pp. 280-291, 2008
pdfbib
Strengthened State Transitions for Complete Invariant Verification in Practical Depth-Induction
Peter Bokor, Sandeep Shukla, András Pataricza and Neeraj Suri
AFM, 2008
pdf
Trust Characterization for Dependable Distributed Systems
Marco Serafini and Neeraj Suri
EUROSYS. Doctoral Workshop, 2008
Efficient Asynchronous Agreement Protocols
Dan Dobre and Neeraj Suri
EUROSYS. Doctoral Workshop, 2008
Semantic Property Preserving Abstractions for Automated Verification of Fault-Tolerance
Peter Bokor and Neeraj Suri
EUROSYS. Doctoral Workshop, 2008
On Building (and Sojourning) the State-space of Windows Device Drivers
Constantin Sârbu and Neeraj Suri
Workshop on State-space Exploration for Automated Testing (SSEAT), 2008
pdfbib
Execution Path Profiling for OS Device Drivers: Viability and Methodology
Constantin Sârbu, Andréas Johansson and Neeraj Suri
Proc. of Service Availability Symposium (ISAS), Tokyo, Japan. Lecture Notes in Computer Science 5017, Springer Verlag, pp. 90-109, 2008
pdfbib
A Comparative study of Data Transport Protocols in Wireless Sensor Networks
Faisal Karim Shaikh, Abdelmajid Khelil and Neeraj Suri
Proc. of World of Wireless, Mobile and Multimedia Networks (WOWMOM), pp. 1-9, 2008
pdf
Sustaining Property Verification of Synchronous Dependable Protocols Over Implementation
Péter Bokor, Marco Serafini, Áron Sisak, András Pataricza and Neeraj Suri
Proc. of High Assurance Systems Engineering Symposium (HASE), pp. 169-178, 2007
A Multi Variable Optimization Approach for the Design of Integrated Dependable Real-Time Embedded Systems
Shariful Islam and Neeraj Suri
Proc. of Embedded and Ubiquitous Computing (EUC), pp. 517-530, 2007
pdfbib
On the Impact of Injection Triggers for OS Robustness Evaluation
Andréas Johansson, Brendan Murphy and Neeraj Suri
Proc. of International Symposium on Software Reliability Engineering (ISSRE), pp. 117-126, 2007
pdfbib
The Fail-Heterogeneous Architectural Model
Marco Serafini and Neeraj Suri
Proc. of Symposium on Reliable Distributed Systems (SRDS), pp. 103-113, 2007
pdfbib
On the Latency-Efficiency of Message-Parsimonious Asynchronous Atomic Broadcast
Dan Dobre, HariGovind V. Ramasamy and Neeraj Suri
Proc. of Symposium on Reliable Distributed Systems (SRDS), pp. 311-322, 2007
pdfbib
Model-Based Development of Distributed Embedded Real-Time Systems with the DECOS Tool-Chain
Wolfgang Herzner, Rupert Schlick, Martin Schlager, Bernhard Leiner, Bernhard Huber, András Balogh, György Csertan, Alain LeGuennec, Thierry LeSergent, Neeraj Suri and Shariful Islam
Proc. SAE Aerotech, 2007
Gossiping: Adaptive and Reliable Broadcasting in MANETs
Abdelmajid Khelil and Neeraj Suri
Proc. of Latin-American Symposium on Dependable Computing (LADC), Sep. 2007
pdfbib
On Detecting Termination in the Crash-Recovery Model
Felix C. Freiling, Matthias Majuntke, Neeraj Mittal
Proc. of European Conference on Parallel and Distributed Computing (Euro-Par), 2007
pdf
Latency-Efficient Atomic Broadcast for WANs
Dan Dobre, Matthias Majuntke, Neeraj Suri
Large-Scale Distributed Systems and Middleware (LADIS), 2007
pdfbib
On the Selection of Error Model(s) For OS Robustness Evaluation
Andréas Johansson, Neeraj Suri and Brendan Murphy
Proc. of Dependable Systems & Networks (DSN/DCCS), pp. 502-511, 2007
pdfbib
A Tunable Add-On Diagnostic Protocol for Time-Triggered Systems
Marco Serafini, Neeraj Suri et al.
Proc. of Dependable Systems & Networks (DSN/DCCS), pp. 164-174, 2007
pdfbib
Meeting the Evolving Reliability Requirements for WSN Applications
Faisal Karim Shaikh, Abdelmajid Khelil, Neeraj Suri
European Conference on Wireless Sensor Networks (EWSN), 2007
A Line in the Sand: Emerging Embedded System Challenges
Neeraj Suri
Microelectronics Keynote, 2006
On Modeling the Reliability of Data Transport in Wireless Sensor Networks
Faisal Karim Shaikh, Abdelmajid Khelil, Neeraj Suri
Proc. of Parallel, Distributed and Network-based Processing (PDP), pp. 395-402, 2007
pdfbib
Supporting Heterogeneous Applications in the DECOS Integrated Architecture
Christian El-Salloum, Roman Obermaisser, Bernhard Huber, Hermann Kopetz, Neeraj Suri
Microelectronics ME, 2006
pdf
A SW-HW Integration Process for the Generation of Platform Specific Models
Shariful Islam, György Csertán, András Balogh, Wolfgang Herzner, Thierry Le Sergent, András Pataricza, Neeraj Suri
Microelectronics ME, 2006
pdf
From Model-Based Design to Deployment of Integrated, Embedded, Real-Time Systems: The DECOS Tool-Chain
Wolfgang Herzner, Martin Schlager, Thierry Le Sergent, Bernhard Huber, Shariful Islam, Neeraj Suri, András Balogh
Microelectronics ME, 2006
pdf
FT-PPTC: An Efficient and Fault-Tolerant Commit Protocol for Mobile Environments
Brahim Ayari, Abdelmajid Khelil, Neeraj Suri
Proc. of Symposium on Reliable Distributed Systems (SRDS), pp. 96-105, 2006
Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures
Felix C. Freiling, Matthias Majuntke and Neeraj Mittal
Proc. of Stabilization, Safety, and Security of Distributed Systems (SSS), 2006
pdf
Mobility-Aware Buffering for Delay-Tolerant Broadcasting in MANETs
Abdelmajid Khelil
Proc. of Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS’06), 2006
pdf
Closing the Gap in Failure Analysis
Brendan Murphy, Mario Garzia and Neeraj Suri
Workshop on Applied SW Reliability @ Proc. of Dependable Systems and Networks (DSN), 2006
pdf
One Step Consensus with Zero Degradation
Dan Dobre and Neeraj Suri
Proc. of Dependable Systems and Networks (DSN), pp. 137-146, 2006
pdfbib
Improving Robustness Testing of COTS OS Extensions
Constantin Sârbu, Andréas Johansson, Falk Fraikin and Neeraj Suri
Proc. of International Service Availability Symposium (ISAS), Published in Lecture Notes in Computer Science 4328, Springer Verlag, pp. 120-139, 2006
pdfbib
Dependability Driven Integration of Mixed Criticality SW Components
Shariful Islam, Robert Lindström and Neeraj Suri
9th IEEE International Symposium on Object and Component-oriented Real-time distributed Computing (ISORC), pp. 485-495, 2006
pdfbib
Evaluation of Partition-Aware MANET Protocols and Applications with ns-2
Abdelmajid Khelil, Pedro José Marrón, R. Dietrich, and Kurt Rothermel
Proc. of Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS’05), 2005
pdf
Contact-Based Mobility Metrics for Delay-Tolerant Ad Hoc Networking
Abdelmajid Khelil, Pedro José Marrón, and Kurt Rothermel
Proc. of Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), 2005
pdf
Designing Efficient Fail-Safe Multi-tolerant Systems
Arshad Jhumka and Neeraj Suri
Proc. of Formal Techniques for Networked and Distributed Systems (FORTE), pp. 428-442, 2005
pdf
Error Propagation Profiling of Operating Systems
Andréas Johansson and Neeraj Suri
Proc. of Dependable Systems and Networks (DSN), pp. 86-95, 2005
pdfbib
Automating the Addition of Fail-Safe Fault-Tolerance: Beyond Fusion-Closed Specifications
Felix Gärtner and Arshad Jhumka
Proc. of Formal Techniques in Real-Time and Fault Tolerant System (FTRTFT), 2004
pdf
Survivability of Operating Systems: Profiling Vulnerabilities
Neeraj Suri and Andréas Johansson
FuDiCo II: Bertinoro Workshop on Future Directions in Distributed Computing, Bertinoro, Italy, 2004
On Enhancing the Robustness of Commercial Operating Systems
Andréas Johansson, Adina Sârbu, Arshad Jhumka and Neeraj Suri
Proc. of International Service Availability Symposium (ISAS), 2004. Springer Verlag, pp. 148-159, 2004
pdfbib
On Dependability Driven Software and Hardware Integration
Neeraj Suri
Proc. of Workshop on Software Technologies for Embedded and Ubiquitous Computing Systems/International Symp, 2004
Providing Event Triggered Channels on a Time-triggered Base
Vilgot Claesson and Neeraj Suri
Proc. of International Conference on Engineering of Complex Computer Systems (ICECCS), 2004
An Approach for Designing and Assessing Detectors for Dependable Component-Based Systems
Arshad Jhumka, Martin Hiller, Neeraj Suri
High Assurance Systems Engineering Conference (HASE), pp. 69-78, 2004
pdfbib
Challenges for Dependable Embedded Systems: Developing the Information Society Infrastructure
Neeraj Suri
(invited talk) SRDS: WDES/WLGC Joint Keynote, 2003
pdfbib
On the Limits of the Precise Specification of Component Interfaces
Hermann Kopetz and Neeraj Suri
Proc. of Workshop on Object-oriented Real-time Dependable Systems (WORDS 2003), Capri, 2003
Practical Aspects of Designing an IP Take Over Mechanism
Christof Fetzer, Karin Högstedt, and Neeraj Suri
Proc. of Workshop on Object-oriented Real-time Dependable Systems (WORDS 2003), Capri, 2003
pdfbib
Software Profiling for Designing Dependable Systems
Martin Hiller, Arshad Jhumka and Neeraj Suri
Proc. of Space Mission Challenges for Information Technology (SMC-IT), JPL Publication 03-13A, pp. 59-66, Jul. 2003
pdf
A Framework for the Design and Validation of Efficient Fail-Safe Fault-Tolerant Programs
Arshad Jhumka, Martin Hiller, Neeraj Suri
Software and Compilers for Embedded Systems (SCOPES03), 2003
pdfbib
Compositional Design of Real-Time Systems: A Conceptual Basis for Specification of Linking Interfaces
Hermann Kopetz, and Neeraj Suri
Proc. of International Symposium on Object-oriented Real-time distributed Computing (ISORC), pp. 51-60, 2003
pdfbib
The Event-Triggered and Time-Triggered Media Access Methods
Vilgot Claesson, Cecilia Ekelin, Neeraj Suri
Proc. of International Symposium on Object-oriented Real-time distributed Computing (ISORC), pp. 131-134, 2003
pdf
On the Effect of Transient Data-Errors in Controller Implementation
Magnus Gäfvert, Björn Wittenmark , Örjan Askerdal
American Control Conference (ACC), 2003
pdf
On Demand Network Level Service Deployment in Ad-Hoc Networks
Daniel Prince, Andrew Scott and William Shepherd
Proc. of IFIP International Conference on Personal Wireless Communications, 2003
pdf
Toward an efficient solution for dynamic ad hoc network interoperability
Daniel Prince, Andrew Scott and Dough Shepherd
Proc. of PGNet, 2002
pdf
An Epidemic Model for Information Diffusion in MANETs
Abdelmajid Khelil, Christian Becker, Jing Tian, Kurt Rothermel
Proc. of Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2002
pdf
A Control Theory Approach for Analyzing the Effects of Data Errors in Safety-Critical Control Systems
Örjan Askerdal, Magnus Gäfvert, Martin Hiller, Neeraj Suri
Proc. of Pacific Rim International Symposium on Dependable Computing (PRDC), 2002
pdf
An Approach to Specify and Test Component-Based Dependable Software
Arshad Jhumka, Martin Hiller, Neeraj Suri
Proc. of High Assurance Systems Engineering (HASE), 211-220, 2002
pdf
Component-Based Synthesis of Dependable Embedded Software
Arshad Jhumka, Martin Hiller, Neeraj Suri
Proc. of Formal Techniques in Real-Time and Fault Tolerant Systems (FTRTFT), pp. 111-118, 2002
pdf
PROPANE: An Environment for Examining the Propagation of Errors in Software
Martin Hiller, Arshad Jhumka, Neeraj Suri
Proc. of International Symposium on Software Testing and Analysis (ISSTA), ACM SIGSOFT, Vol. 27, #4, pp. 81-85, 2002
pdf
On the Placement of Software Mechanisms for Detection of Data Errors
Martin Hiller, Arshad Jhumka, Neeraj Suri
Proc. of Dependable Systems and Networks (DSN), pp. 135-144, 2002
pdf
On Systematic Design of Globally Consistent Executable Assertions in Embedded Software
Arshad Jhumka, Martin Hiller, Vilgot Claesson, Neeraj Suri
ACM Joint Conference – Languages, Compilers and Tools for Embedded Systems/Software and Compilers for Embedded Systems (LCTES/SCOPES), pp. 74-83, 2002
pdf
On Simplifying Modular Specification and Verification of Distributed Protocols
Purnendu Sinha, Neeraj Suri
High Assurance Systems Engineering (HASE), pp. 173-181, 2001
pdf
An Efficient TDMA Synchronization Approach for Distributed Embedded Systems
Vilgot Claesson, Henrik Lönn, Neeraj Suri
Proc. of Symposium on Reliable and Distributed Systems (SRDS), pp. 198-201, 2001
pdf
Assessing Inter-Modular Error Propagation in Distributed Software
Arshad Jhumka, Martin Hiller, Neeraj Suri
Proc. of Symposium on Reliable and Distributed Systems (SRDS), pp. 152-161, 2001
pdf
An Approach for Analysing the Propagation of Data Errors in Software
Martin Hiller, Arshad Jhumka, Neeraj Suri
Proc. of Dependable Systems and Networks (DSN) 2001, pp. 161-170, 2001
pdf
DBench (Dependability Benchmarking)
Karama Kanoun et al. (Neeraj Suri)
EC DEPPY Workshop, Supplement DSN, 2001
Modular Composition of Redundancy Management Protocols in Distributed Protocols: An Outlook on Simplifying Protocol Level Specification & Verification
Purnendu Sinha, Neeraj Suri
Proc. of International Conference on Distributed Computing Systems (ICDCS), pp. 255-263, 2001
pdf
Executable Assertions for Detecting Data Errors in Embedded Control Systems
Martin Hiller
Proc. of Dependable Systems and Networks (DSN) 2000, pp. 24-33, 2000
pdf
Designing High-Performance & Reliable Superscalar Architectures: The Out of Order Reliable Superscalar (O3Rs) Approach
Avi Mendelson, Neeraj Suri
Proc. of Dependable Systems and Networks (DSN), pp. 473-481, 2000
pdf
Evaluation of COTS Standards for Dependable Systems Design
Chris J. Walter, Neeraj Suri, Tim Monaghan
Proc. of Dependable Systems and Networks (DSN), 2000
pdf
Error Recovery Using Forced Validity Assisted by Executable Assertions for Error Detection: An Experimental Evaluation
Martin Hiller
Proc. of EUROMICRO Conference, Vol. II, pp. 105-112, 1999
pdf
On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols
Purnendu Sinha, Neeraj Suri
Proc. of Real-Time Systems Symposium (RTSS), pp. 126-135, 1999
pdf
Identification of Test Cases Using a Formal FI Approach
Purnendu Sinha, Neeraj Suri
Proc. of Fault-Tolerant Computing Symposium (FTCS-29), pp. 314-321, 1999
pdf
An Experimental Comparison of Fault and Error Injection
Jorgen Christmansson, Martin Hiller, Marcus Rimén
Proc. of International Symposium on Software Reliability Engineering (ISSRE), pp. 378-396, 1998
pdf
A Framework for Dependability Driven SW Integration
Neeraj Suri, Sunundu Ghosh, Tom Marlowe
Proc. of International Conference on Distributed Computing Systems (ICDCS), pp. 405-416, 1998
pdf
The XBW Model for Dependable Real-Time Systems
Vilgot Claesson , Stefan Poledna, Jan Söderberg
Proc. of International Conference on Parallel and Distributed Systems, 1998
pdf
On the Use of Formal Techniques for Validation
Neeraj Suri, Purnendu Sinha
Proc. of Fault-Tolerant Computing Symposium (FTCS-28), pp. 390-401, 1998
pdf
Prototype Implementation Using the XBW Software Model
Vilgot Claesson
Proceedings of the Swedish National Real-Time Workshop (SNART) ’97, Lund, Sweden, 1997
Cache Based Fault Recovery in Distributed Systems
Avi Mendelson, Neeraj Suri
International Conference on Engineering of Complex Computer Systems, 1997
pdf
Roll-Forward Recovery: The Bi-Directional Cache Approach
Avi Mendelson, Neeraj Suri
Fault-Tolerant Parallel and Distributed Systems, 1995
Dependability Issues in the Reuse of Standard Components in Open Architectures
Chris J. Walter, Neeraj Suri
10th Conf. on Computing in Aerospace, 1995
A System Level On-Line Testing Approach
Neeraj Suri
On-Line Testing, 1995
Evaluating Fault Coverage Using an Integrated Inductive and Deductive Approach
Chris J. Walter, Neeraj Suri
Fault and Error Models of Failures in Computer Systems, 1993
Reliability Modeling of Large Fault-Tolerant Systems
Neeraj Suri, M. Hugue, Chris J. Walter
22nd International Symposium on Fault-Tolerant Computing (FTCS-22), 1992
pdf
Continual On-Line Diagnosis of Hybrid Faults
Chris J. Walter, M. Hugue, Neeraj Suri
Proc. of Dependable Computing for Critical Applications (DCCA-4), 1994
pdf
BDG-Torus Union Graph: An Algorithmically Specialized Parallel Interconnect
Neeraj Suri, Avi Mendelson, Dhiraj Pradhan
Symposium on Parallel and Distributed Processing (SPDP), 1991
pdf