


Остановите войну!
for scientists:


default search action
Neeraj Suri
Person information

- affiliation: Lancaster University, Bailrigg, UK
- affiliation: Darmstadt University of Technology, Germany
- affiliation (PhD 1991): University of Massachusetts, Amherst, MA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c193]Ahmed Taha, Alexander Lawall, Neeraj Suri:
Cloud Security Requirement Based Threat Analysis. ICNC 2023: 506-510 - [i11]Andrew Sogokon, Burak Yuksek, Gökhan Inalhan, Neeraj Suri:
Specifying Autonomous System Behaviour. CoRR abs/2302.10087 (2023) - 2022
- [j45]Edward Chuah
, Arshad Jhumka
, Miroslaw Malek, Neeraj Suri
:
A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems. IEEE Access 10: 133487-133503 (2022) - [c192]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud. CCS 2022: 3415-3417 - [c191]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
Poster: Multi-Layer Threat Analysis of the Cloud. CCS 2022: 3419-3421 - [c190]Savvas Kastanakis
, Vasileios Giotsas, Neeraj Suri:
Understanding the confounding factors of inter-domain routing modeling. IMC 2022: 758-759 - [c189]Yiqun Chen, Matthew Bradbury, Neeraj Suri:
Towards Effective Performance Fuzzing. ISSRE Workshops 2022: 128-129 - [c188]Yiqun Chen, Oliver Schwahn, Roberto Natella, Matthew Bradbury, Neeraj Suri:
SlowCoach: Mutating Code to Simulate Performance Bugs. ISSRE 2022: 274-285 - [c187]Zhengxin Yu, Yang Lu, Plamen Angelov, Neeraj Suri:
PPFM: An Adaptive and Hierarchical Peer-to-Peer Federated Meta-Learning Framework. MSN 2022: 502-509 - [c186]Eduardo A. Soares, Plamen P. Angelov, Neeraj Suri:
Similarity-based Deep Neural Network to Detect Imperceptible Adversarial Attacks. SSCI 2022: 1028-1035 - [i10]Vijay Varadharajan, Neeraj Suri:
Security Challenges when Space Merges with Cyberspace. CoRR abs/2207.10798 (2022) - [i9]William Hackett, Stefan Trawicki, Zhengxin Yu, Neeraj Suri, Peter Garraghan:
PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models. CoRR abs/2209.06300 (2022) - [i8]Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
ThreatPro: Multi-Layer Threat Analysis in the Cloud. CoRR abs/2209.14795 (2022) - [i7]Yang Lu, Zhengxin Yu, Neeraj Suri:
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph. CoRR abs/2210.00325 (2022) - 2021
- [j44]Benjamin Green, Richard Derbyshire, Marina Krotofil, William Knowles, Daniel Prince
, Neeraj Suri
:
PCaaD: Towards automated determination and exploitation of industrial systems. Comput. Secur. 110: 102424 (2021) - [c185]Nicolas Coppik, Oliver Schwahn
, Neeraj Suri:
Fast Kernel Error Propagation Analysis in Virtualized Environments. ICST 2021: 159-170 - [c184]Edward Chuah
, Arshad Jhumka, Samantha Alt, R. Todd Evans, Neeraj Suri
:
Failure Diagnosis for Cluster Systems using Partial Correlations. ISPA/BDCloud/SocialCom/SustainCom 2021: 1091-1101 - [c183]Edward Chuah
, Neeraj Suri
, Arshad Jhumka, Samantha Alt:
Challenges in Identifying Network Attacks Using Netflow Data. NCA 2021: 1-10 - [i6]Benjamin Green, William Knowles, Marina Krotofil, Richard Derbyshire, Daniel Prince, Neeraj Suri:
PCaaD: Towards Automated Determination and Exploitation of Industrial Processes. CoRR abs/2102.10049 (2021) - 2020
- [j43]Patrick Metzler, Neeraj Suri
, Georg Weissenbacher
:
Extracting safe thread schedules from incomplete model checking results. Int. J. Softw. Tools Technol. Transf. 22(5): 565-581 (2020) - [j42]Roberto Natella
, Stefan Winter
, Domenico Cotroneo
, Neeraj Suri
:
Analyzing the Effects of Bugs on Software Interfaces. IEEE Trans. Software Eng. 46(3): 280-301 (2020) - [c182]Habib Saissi, Stefan Winter, Oliver Schwahn
, Karthik Pattabiraman, Neeraj Suri
:
TraceSanitizer - Eliminating the Effects of Non-Determinism on Error Propagation Analysis. DSN 2020: 52-63 - [c181]Ahmed Taha, Ahmed Zakaria, Dong Seong Kim, Neeraj Suri
:
Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure. IC2E 2020: 134-143 - [i5]Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri:
A Security Architecture for Railway Signalling. CoRR abs/2009.04207 (2020)
2010 – 2019
- 2019
- [j41]Kubilay Demir
, Ferdaus Nayyer, Neeraj Suri
:
MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems. Int. J. Crit. Infrastructure Prot. 25: 84-101 (2019) - [j40]Markus Heinrich
, Tsvetoslava Vateva-Gurova, Tolga Arul
, Stefan Katzenbeisser, Neeraj Suri
, Henk Birkholz, Andreas Fuchs, Christoph Krauß
, Maria Zhdanova
, Don Kuzhiyelil, Sergey Tverdyshev, Christian Schlehuber:
Security Requirements Engineering in Safety-Critical Railway Signalling Networks. Secur. Commun. Networks 2019: 8348925:1-8348925:14 (2019) - [j39]Feng Tan, Liansheng Liu, Stefan Winter, Qixin Wang
, Neeraj Suri
, Lei Bu
, Yu Peng, Xue Liu, Xiyuan Peng:
Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS. ACM Trans. Cyber Phys. Syst. 3(1): 2:1-2:25 (2019) - [j38]Dan Dobre, Ghassan O. Karame
, Wenting Li
, Matthias Majuntke, Neeraj Suri
, Marko Vukolic:
Proofs of Writing for Robust Storage. IEEE Trans. Parallel Distributed Syst. 30(11): 2547-2566 (2019) - [c180]Nicolas Coppik, Oliver Schwahn
, Neeraj Suri
:
MemFuzz: Using Memory Accesses to Guide Fuzzing. ICST 2019: 48-58 - [c179]Yiqun Chen, Stefan Winter, Neeraj Suri
:
Inferring Performance Bug Patterns from Developer Commits. ISSRE 2019: 70-81 - [c178]Shujie Zhao, Yiqun Chen, Stefan Winter, Neeraj Suri
:
Analyzing and Improving Customer-Side Cloud Security Certifiability. ISSRE Workshops 2019: 300-307 - [c177]Oliver Schwahn
, Nicolas Coppik, Stefan Winter, Neeraj Suri
:
Assessing the state and improving the art of parallel testing for C. ISSTA 2019: 123-133 - [c176]Patrick Metzler, Neeraj Suri
, Georg Weissenbacher
:
Extracting Safe Thread Schedules from Incomplete Model Checking Results. SPIN 2019: 153-171 - [c175]Habib Saissi, Marco Serafini, Neeraj Suri
:
Gyro: A Modular Scale-Out Layer for Single-Server DBMSs. SRDS 2019: 71-82 - 2018
- [j37]Kubilay Demir
, Hatem Ismail, Tsvetoslava Vateva-Gurova, Neeraj Suri
:
Securing the cloud-assisted smart grid. Int. J. Crit. Infrastructure Prot. 23: 100-111 (2018) - [j36]Oliver Schwahn
, Stefan Winter
, Nicolas Coppik
, Neeraj Suri
:
How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code. IEEE Trans. Dependable Secur. Comput. 15(6): 945-958 (2018) - [c174]Heng Zhang, Jesus Luna, Neeraj Suri
, Rubén Trapero:
Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services. ARES 2018: 5:1-5:10 - [c173]Henk Birkholz, Christoph Krauß
, Maria Zhdanova, Don Kuzhiyelil, Tolga Arul
, Markus Heinrich
, Stefan Katzenbeisser, Neeraj Suri
, Tsvetoslava Vateva-Gurova, Christian Schlehuber:
A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems. MILS@DSN 2018 - [c172]Heng Zhang, Salman Manzoor, Neeraj Suri
:
Monitoring Path Discovery for Supporting Indirect Monitoring of Cloud Services. IC2E 2018: 274-277 - [c171]Salman Manzoor, Heng Zhang, Neeraj Suri
:
Threat Modeling and Analysis for the Cloud Ecosystem. IC2E 2018: 278-281 - [c170]Bo-Chen Tai, Szu-Chuang Li, Yennun Huang
, Neeraj Suri
, Pang-Chieh Wang:
Exploring the Relationship Between Dimensionality Reduction and Private Data Release. PRDC 2018: 25-33 - [c169]Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang
, Neeraj Suri
:
InfoLeak: Scheduling-Based Information Leakage. PRDC 2018: 44-53 - [c168]Tsvetoslava Vateva-Gurova, Neeraj Suri
:
On the Detection of Side-Channel Attacks. PRDC 2018: 185-186 - [c167]Oliver Schwahn
, Nicolas Coppik, Stefan Winter, Neeraj Suri
:
FastFI: Accelerating Software Fault Injections. PRDC 2018: 193-202 - [c166]Tsvetoslava Vateva-Gurova, Salman Manzoor, Rubén Trapero, Neeraj Suri
:
Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level. IOSec@RAID 2018: 27-38 - [c165]Salman Manzoor, Tsvetoslava Vateva-Gurova, Rubén Trapero, Neeraj Suri
:
Threat Modeling the Cloud: An Ontology Based Approach. IOSec@RAID 2018: 61-72 - [c164]Heng Zhang, Jesus Luna, Rubén Trapero, Neeraj Suri
:
Whetstone: Reliable Monitoring of Cloud Services. SMARTCOMP 2018: 115-122 - [c163]Hatem Ismail, Stefanie Roos, Neeraj Suri
:
A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems. TrustCom/BigDataSE 2018: 456-464 - [c162]Hatem Ismail, Stefanie Roos, Neeraj Suri
:
A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems. WOWMOM 2018: 1-9 - [i4]Habib Saissi, Marco Serafini, Neeraj Suri
:
Scaling Out Acid Applications with Operation Partitioning. CoRR abs/1804.01942 (2018) - [i3]Ahmed Taha, Spyros Boukoros, Jesus Luna, Stefan Katzenbeisser, Neeraj Suri
:
QRES: Quantitative Reasoning on Encrypted Security SLAs. CoRR abs/1804.04426 (2018) - [i2]Patrick Metzler, Habib Saissi, Péter Bokor, Neeraj Suri
:
Safe Execution of Concurrent Programs by Enforcement of Scheduling Constraints. CoRR abs/1809.01955 (2018) - 2017
- [j35]Hatem Ismail, Daniel Germanus, Neeraj Suri
:
P2P routing table poisoning: A quorum-based sanitizing approach. Comput. Secur. 65: 283-299 (2017) - [j34]Rubén Trapero, Jolanda Modic
, Miha Stopar, Ahmed Taha, Neeraj Suri
:
A novel approach to manage cloud security SLA incidents. Future Gener. Comput. Syst. 72: 193-205 (2017) - [j33]Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri
:
Safety Verification Utilizing Model-based Development for Safety Critical Cyber-Physical Systems. J. Inf. Process. 25: 797-810 (2017) - [j32]Kubilay Demir
, Daniel Germanus, Neeraj Suri
:
Robust QoS-aware communication in the smart distribution grid. Peer-to-Peer Netw. Appl. 10(1): 193-207 (2017) - [j31]Jesus Luna, Ahmed Taha, Rubén Trapero, Neeraj Suri
:
Quantitative Reasoning about Cloud Security Using Service Level Agreements. IEEE Trans. Cloud Comput. 5(3): 457-471 (2017) - [c161]Soha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri
:
C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties. ARES 2017: 36:1-36:6 - [c160]Kubilay Demir
, Neeraj Suri
:
Towards DDoS Attack Resilient Wide Area Monitoring Systems. ARES 2017: 99:1-99:7 - [c159]Heng Zhang, Rubén Trapero, Jesus Luna, Neeraj Suri
:
deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services. SCC 2017: 27-34 - [c158]Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri
:
A Framework for Ranking Cloud Security Services. SCC 2017: 322-329 - [c157]Salman Manzoor, Jesus Luna, Neeraj Suri
:
AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces. SCC 2017: 499-502 - [c156]Ahmed Taha, Salman Manzoor, Neeraj Suri
:
SLA-Based Service Selection for Multi-Cloud Environments. EDGE 2017: 65-72 - [c155]Christian Schlehuber, Markus Heinrich
, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri
:
Challenges and Approaches in Securing Safety-Relevant Railway Signalling. EuroS&P Workshops 2017: 139-145 - [c154]Abraham Chan, Stefan Winter, Habib Saissi, Karthik Pattabiraman, Neeraj Suri
:
IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants. ICST 2017: 184-195 - [c153]Nicolas Coppik, Oliver Schwahn
, Stefan Winter, Neeraj Suri
:
TrEKer: tracing error propagation in operating system kernels. ASE 2017: 377-387 - [c152]Patrick Metzler, Habib Saissi, Péter Bokor, Neeraj Suri
:
Quick verification of concurrent programs by iteratively relaxed scheduling. ASE 2017: 776-781 - [c151]Kubilay Demir
, Neeraj Suri
:
SeReCP: A Secure and Reliable Communication Platform for the Smart Grid. PRDC 2017: 175-184 - [c150]Christian Schlehuber, Markus Heinrich
, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri
:
A Security Architecture for Railway Signalling. SAFECOMP 2017: 320-328 - 2016
- [j30]Jolanda Modic
, Rubén Trapero, Ahmed Taha, Jesus Luna, Miha Stopar, Neeraj Suri
:
Novel efficient techniques for real-time cloud security assessment. Comput. Secur. 62: 1-18 (2016) - [j29]Divya Saxena
, Vaskar Raychoudhury, Neeraj Suri
, Christian Becker
, Jiannong Cao
:
Named Data Networking: A survey. Comput. Sci. Rev. 19: 15-55 (2016) - [j28]Marco Platania, Daniel Obenshain, Thomas Tantillo, Yair Amir, Neeraj Suri
:
On Choosing Server- or Client-Side Solutions for BFT. ACM Comput. Surv. 48(4): 61:1-61:30 (2016) - [j27]Rubén Trapero, Jesus Luna, Neeraj Suri
:
Quantifiably Trusting the Cloud: Putting Metrics to Work. IEEE Secur. Priv. 14(3): 73-77 (2016) - [j26]Lei Yang, Jiannong Cao
, Shaojie Tang, Di Han
, Neeraj Suri
:
Run Time Application Repartitioning in Dynamic Mobile Cloud Environments. IEEE Trans. Cloud Comput. 4(3): 336-348 (2016) - [c149]Patrick Metzler, Habib Saissi, Péter Bokor, Robin Hesse, Neeraj Suri
:
Efficient Verification of Program Fragments: Eager POR. ATVA 2016: 375-391 - [c148]Ahmed Taha, Patrick Metzler, Rubén Trapero, Jesus Luna, Neeraj Suri
:
Identifying and Utilizing Dependencies Across Cloud Security Services. AsiaCCS 2016: 329-340 - [c147]Hatem Ismail, Daniel Germanus, Neeraj Suri
:
Malicious peers eviction for P2P overlays. CNS 2016: 216-224 - [c146]Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri
:
Practical Formal Verification for Model Based Development of Cyber-Physical Systems. CSE/EUC/DCABES 2016: 1-8 - [c145]Divya Saxena
, Vaskar Raychoudhury, Christian Becker
, Neeraj Suri
:
Reliable Memory Efficient Name Forwarding in Named Data Networking. CSE/EUC/DCABES 2016: 48-55 - [c144]Stefan Winter, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo:
No PAIN, no gain? the utility of parallel fault injections. Software Engineering 2016: 45-46 - [c143]Salman Manzoor, Ahmed Taha, Neeraj Suri
:
Trust Validation of Cloud IaaS: A Customer-centric Approach. Trustcom/BigDataSE/ISPA 2016: 97-104 - [c142]Heng Zhang, Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri
:
SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats. Trustcom/BigDataSE/ISPA 2016: 465-472 - [e6]Joaquín García-Alfaro
, Guillermo Navarro-Arribas
, Alessandro Aldini
, Fabio Martinelli, Neeraj Suri
:
Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9481, Springer 2016, ISBN 978-3-319-29882-5 [contents] - [e5]Giovanni Livraga, Vicenç Torra, Alessandro Aldini, Fabio Martinelli, Neeraj Suri
:
Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Lecture Notes in Computer Science 9963, Springer 2016, ISBN 978-3-319-47071-9 [contents] - 2015
- [j25]Jesus Luna, Neeraj Suri
, Michaela Iorga, Anil Karmel:
Leveraging the Potential of Cloud Security Service-Level Agreements through Standards. IEEE Cloud Comput. 2(3): 32-40 (2015) - [j24]Azad Ali, Abdelmajid Khelil
, Neeraj Suri
, Mohammadreza Mahmudimanesh:
Adaptive Hybrid Compression for Wireless Sensor Networks. ACM Trans. Sens. Networks 11(4): 53:1-53:36 (2015) - [j23]Feng Tan, Yufei Wang, Qixin Wang
, Lei Bu, Neeraj Suri
:
A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking. IEEE Trans. Parallel Distributed Syst. 26(10): 2630-2642 (2015) - [c141]Tsvetoslava Vateva-Gurova, Neeraj Suri
, Avi Mendelson:
The Impact of Hypervisor Scheduling on Compromising Virtualized Environments. CIT/IUCC/DASC/PICom 2015: 1910-1917 - [c140]Habib Saissi, Péter Bokor, Neeraj Suri
:
PBMC: Symbolic Slicing for the Verification of Concurrent Programs. ATVA 2015: 344-360 - [c139]Thorsten Piper, Stefan Winter, Neeraj Suri
, Thomas E. Fuhrman:
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms. EDCC 2015: 85-96 - [c138]Hatem Ismail, Daniel Germanus, Neeraj Suri
:
Detecting and Mitigating P2P Eclipse Attacks. ICPADS 2015: 224-231 - [c137]Stefan Winter, Thorsten Piper, Oliver Schwahn
, Roberto Natella
, Neeraj Suri
, Domenico Cotroneo:
GRINDER: On Reusability of Fault Injection Tools. AST@ICSE 2015: 75-79 - [c136]Stefan Winter, Oliver Schwahn
, Roberto Natella
, Neeraj Suri
, Domenico Cotroneo:
No PAIN, No Gain? The Utility of PArallel Fault INjections. ICSE (1) 2015: 494-505 - [c135]Thorsten Piper, Stefan Winter, Oliver Schwahn
, Suman Bidarahalli, Neeraj Suri
:
Mitigating Timing Error Propagation in Mixed-Criticality Automotive Systems. ISORC 2015: 102-109 - [c134]Anna Lanzaro, Roberto Natella, Stefan Winter, Domenico Cotroneo, Neeraj Suri:
Error models for the representative injection of software defects. Software Engineering & Management 2015: 118-119 - [c133]Daniel Germanus, Hatem Ismail, Neeraj Suri
:
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation. SRDS 2015: 74-83 - [c132]Azad Ali, Abdelmajid Khelil
, Neeraj Suri
:
FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes. SRDS 2015: 140-145 - [c131]Giancarlo Pellegrino, Davide Balzarotti, Stefan Winter, Neeraj Suri:
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services. USENIX Security Symposium 2015: 801-816 - [p5]Gert Læssøe Mikkelsen, Kasper Damgård, Hans Guldager, Jonas Lindstrøm Jensen, Jesus Luna Garcia, Janus Dam Nielsen, Pascal Paillier, Giancarlo Pellegrino, Michael Bladt Stausholm, Neeraj Suri
, Heng Zhang:
Technical Implementation and Feasibility. Attribute-based Credentials for Trust 2015: 255-317 - [e4]Joaquín García-Alfaro
, Jordi Herrera-Joancomartí
, Emil Lupu, Joachim Posegga, Alessandro Aldini
, Fabio Martinelli, Neeraj Suri
:
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8872, Springer 2015, ISBN 978-3-319-17015-2 [contents] - 2014
- [j22]Hamza Ghani, Abdelmajid Khelil
, Neeraj Suri
, György Csertán, László Gönczy, Gábor Urbanics, James Clarke:
Assessing the security of internet-connected critical infrastructures. Secur. Commun. Networks 7(12): 2713-2725 (2014) - [c130]Shin-Ying Huang, Yennun Huang
, Neeraj Suri
:
Event Pattern Discovery on IDS Traces of Cloud Services. BDCloud 2014: 25-32 - [c129]Daniel Germanus, Stefanie Roos, Thorsten Strufe, Neeraj Suri
:
Mitigating Eclipse attacks in Peer-To-Peer networks. CNS 2014: 400-408 - [c128]Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri
:
Practical Use of Formal Verification for Safety Critical Cyber-Physical Systems: A Case Study. CPSNA 2014: 7-12 - [c127]Mohammadreza Mahmudimanesh, Neeraj Suri
:
Robust Compressive Data Gathering in Wireless Sensor Networks with Linear Topology. DCOSS 2014: 179-186 - [c126]Mohammadreza Mahmudimanesh, Amir Naseri, Neeraj Suri
:
Efficient Agile Sink Selection in Wireless Sensor Networks Based on Compressed Sensing. DCOSS 2014: 193-200 - [c125]Hamza Ghani, Jesus Luna Garcia, Ivaylo Petkov, Neeraj Suri
:
User-Centric Security Assessment of Software Configurations: A Case Study. ESSoS 2014: 196-212 - [c124]Feng Tan, Liansheng Liu, Stefan Winter, Qixin Wang
, Neeraj Suri
, Lei Bu, Yu Peng, Xue Liu, Xiyuan Peng:
WiP abstract: A framework on profiling cross-domain noise propagation in control CPS. ICCPS 2014: 224 - [c123]Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri
:
On the Feasibility of Side-Channel Attacks in a Virtualized Environment. ICETE (Selected Papers) 2014: 319-339 - [c122]Anna Lanzaro, Roberto Natella, Stefan Winter, Domenico Cotroneo, Neeraj Suri
:
An empirical study of injected versus actual interface errors. ISSTA 2014: 397-408 - [c121]Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri
:
Towards a Framework for Benchmarking Privacy-ABC Technologies. SEC 2014: 197-204 - [c120]Mohammadreza Mahmudimanesh, Neeraj Suri
:
Agile sink selection in wireless sensor networks. SECON 2014: 390-398 - [c119]Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri
:
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments. SECRYPT 2014: 113-124 - [c118]Kubilay Demir
, Daniel Germanus, Neeraj Suri
:
Robust and real-time communication on heterogeneous networks for smart distribution grid. SmartGridComm 2014: 386-391 - [c117]Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri
:
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security. TrustCom 2014: 284-291 - 2013
- [j21]Brahim Ayari, Abdelmajid Khelil
, Neeraj Suri
:
GMTC: A Generalized Commit Approach for Hybrid Mobile Environments. IEEE Trans. Mob. Comput. 12(12): 2399-2411 (2013) - [c116]Dan Dobre, Ghassan Karame, Wenting Li
, Matthias Majuntke, Neeraj Suri
, Marko Vukolic:
PoWerStore: proofs of writing for efficient and robust storage. CCS 2013: 285-298 - [c115]