Neeraj Suri

Orcid: 0000-0003-1688-1167

Affiliations:
  • Lancaster University, Bailrigg, UK
  • Darmstadt University of Technology, Germany
  • University of Massachusetts, Amherst, MA, USA (PhD 1991)


According to our database1, Neeraj Suri authored at least 258 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enabling Multi-Layer Threat Analysis in Dynamic Cloud Environments.
IEEE Trans. Cloud Comput., 2024

Real Arithmetic in TLAPM.
Proceedings of the NASA Formal Methods - 16th International Symposium, 2024

2023
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph.
ACM Trans. Priv. Secur., August, 2023

Error Propagation Analysis for Multithreaded Programs: An Empirical Approach.
CoRR, 2023

Compilation as a Defense: Enhancing DL Model Attack Robustness via Tensor Optimization.
CoRR, 2023

Specifying Autonomous System Behaviour.
CoRR, 2023

Fuzzy Detectors Against Adversarial Attacks.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2023

Replication: 20 Years of Inferring Interdomain Routing Policies.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Domain Generalization and Feature Fusion for Cross-domain Imperceptible Adversarial Attack Detection.
Proceedings of the International Joint Conference on Neural Networks, 2023

Cloud Security Requirement Based Threat Analysis.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Model Leeching: An Extraction Attack Targeting LLMs.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2023

2022
ThreatPro: Multi-Layer Threat Analysis in the Cloud.
CoRR, 2022

PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models.
CoRR, 2022

Security Challenges when Space Merges with Cyberspace.
CoRR, 2022

A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems.
IEEE Access, 2022

Similarity-based Deep Neural Network to Detect Imperceptible Adversarial Attacks.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2022

PPFM: An Adaptive and Hierarchical Peer-to-Peer Federated Meta-Learning Framework.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

SlowCoach: Mutating Code to Simulate Performance Bugs.
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

Towards Effective Performance Fuzzing.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

Understanding the confounding factors of inter-domain routing modeling.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Poster: Multi-Layer Threat Analysis of the Cloud.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
PCaaD: Towards Automated Determination and Exploitation of Industrial Processes.
CoRR, 2021

PCaaD: Towards automated determination and exploitation of industrial systems.
Comput. Secur., 2021

Challenges in Identifying Network Attacks Using Netflow Data.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

Failure Diagnosis for Cluster Systems using Partial Correlations.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Fast Kernel Error Propagation Analysis in Virtualized Environments.
Proceedings of the 14th IEEE Conference on Software Testing, Verification and Validation, 2021

2020
Analyzing the Effects of Bugs on Software Interfaces.
IEEE Trans. Software Eng., 2020

Extracting safe thread schedules from incomplete model checking results.
Int. J. Softw. Tools Technol. Transf., 2020

Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure.
Proceedings of the 2020 IEEE International Conference on Cloud Engineering, 2020

TraceSanitizer - Eliminating the Effects of Non-Determinism on Error Propagation Analysis.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
Proofs of Writing for Robust Storage.
IEEE Trans. Parallel Distributed Syst., 2019

Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.
ACM Trans. Cyber Phys. Syst., 2019

Security Requirements Engineering in Safety-Critical Railway Signalling Networks.
Secur. Commun. Networks, 2019

MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems.
Int. J. Crit. Infrastructure Prot., 2019

Gyro: A Modular Scale-Out Layer for Single-Server DBMSs.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

Assessing the state and improving the art of parallel testing for C.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

Analyzing and Improving Customer-Side Cloud Security Certifiability.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

Inferring Performance Bug Patterns from Developer Commits.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

MemFuzz: Using Memory Accesses to Guide Fuzzing.
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019

2018
How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code.
IEEE Trans. Dependable Secur. Comput., 2018

Securing the cloud-assisted smart grid.
Int. J. Crit. Infrastructure Prot., 2018

Safe Execution of Concurrent Programs by Enforcement of Scheduling Constraints.
CoRR, 2018

QRES: Quantitative Reasoning on Encrypted Security SLAs.
CoRR, 2018

Scaling Out Acid Applications with Operation Partitioning.
CoRR, 2018

A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Whetstone: Reliable Monitoring of Cloud Services.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level.
Proceedings of the Information and Operational Technology Security Systems, 2018

Threat Modeling the Cloud: An Ontology Based Approach.
Proceedings of the Information and Operational Technology Security Systems, 2018

On the Detection of Side-Channel Attacks.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

InfoLeak: Scheduling-Based Information Leakage.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Exploring the Relationship Between Dimensionality Reduction and Private Data Release.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

FastFI: Accelerating Software Fault Injections.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Monitoring Path Discovery for Supporting Indirect Monitoring of Cloud Services.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Threat Modeling and Analysis for the Cloud Ecosystem.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems.
Proceedings of the International Workshop on MILS: Architecture and Assurance for Secure Systems, 2018

Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Quantitative Reasoning about Cloud Security Using Service Level Agreements.
IEEE Trans. Cloud Comput., 2017

Robust QoS-aware communication in the smart distribution grid.
Peer-to-Peer Netw. Appl., 2017

Safety Verification Utilizing Model-based Development for Safety Critical Cyber-Physical Systems.
J. Inf. Process., 2017

A novel approach to manage cloud security SLA incidents.
Future Gener. Comput. Syst., 2017

P2P routing table poisoning: A quorum-based sanitizing approach.
Comput. Secur., 2017

A Security Architecture for Railway Signalling.
Proceedings of the Computer Safety, Reliability, and Security, 2017

SeReCP: A Secure and Reliable Communication Platform for the Smart Grid.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Quick verification of concurrent programs by iteratively relaxed scheduling.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

TrEKer: tracing error propagation in operating system kernels.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Challenges and Approaches in Securing Safety-Relevant Railway Signalling.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

SLA-Based Service Selection for Multi-Cloud Environments.
Proceedings of the IEEE International Conference on Edge Computing, 2017

deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

A Framework for Ranking Cloud Security Services.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

Towards DDoS Attack Resilient Wide Area Monitoring Systems.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Run Time Application Repartitioning in Dynamic Mobile Cloud Environments.
IEEE Trans. Cloud Comput., 2016

Quantifiably Trusting the Cloud: Putting Metrics to Work.
IEEE Secur. Priv., 2016

On Choosing Server- or Client-Side Solutions for BFT.
ACM Comput. Surv., 2016

Named Data Networking: A survey.
Comput. Sci. Rev., 2016

Novel efficient techniques for real-time cloud security assessment.
Comput. Secur., 2016

SENTRY: A Novel Approach for Mitigating Application Layer DDoS Threats.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Trust Validation of Cloud IaaS: A Customer-centric Approach.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

No PAIN, no gain? the utility of parallel fault injections.
Proceedings of the Software Engineering 2016, 2016

Reliable Memory Efficient Name Forwarding in Named Data Networking.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

Practical Formal Verification for Model Based Development of Cyber-Physical Systems.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

Malicious peers eviction for P2P overlays.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Identifying and Utilizing Dependencies Across Cloud Security Services.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Efficient Verification of Program Fragments: Eager POR.
Proceedings of the Automated Technology for Verification and Analysis, 2016

2015
A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking.
IEEE Trans. Parallel Distributed Syst., 2015

Adaptive Hybrid Compression for Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2015

Leveraging the Potential of Cloud Security Service-Level Agreements through Standards.
IEEE Cloud Comput., 2015

In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
Proceedings of the 24th USENIX Security Symposium, 2015

PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

Error models for the representative injection of software defects.
Proceedings of the Software Engineering & Management 2015, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. März, 2015

Mitigating Timing Error Propagation in Mixed-Criticality Automotive Systems.
Proceedings of the IEEE 18th International Symposium on Real-Time Distributed Computing, 2015

GRINDER: On Reusability of Fault Injection Tools.
Proceedings of the 10th IEEE/ACM International Workshop on Automation of Software Test, 2015

Detecting and Mitigating P2P Eclipse Attacks.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms.
Proceedings of the 11th European Dependable Computing Conference, 2015

PBMC: Symbolic Slicing for the Verification of Concurrent Programs.
Proceedings of the Automated Technology for Verification and Analysis, 2015

The Impact of Hypervisor Scheduling on Compromising Virtualized Environments.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Technical Implementation and Feasibility.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

2014
Assessing the security of internet-connected critical infrastructures.
Secur. Commun. Networks, 2014

AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Robust and real-time communication on heterogeneous networks for smart distribution grid.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments.
Proceedings of the SECRYPT 2014, 2014

Agile sink selection in wireless sensor networks.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Towards a Framework for Benchmarking Privacy-ABC Technologies.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

An empirical study of injected versus actual interface errors.
Proceedings of the International Symposium on Software Testing and Analysis, 2014

On the Feasibility of Side-Channel Attacks in a Virtualized Environment.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

WiP abstract: A framework on profiling cross-domain noise propagation in control CPS.
Proceedings of the ACM/IEEE International Conference on Cyber-Physical Systems, 2014

User-Centric Security Assessment of Software Configurations: A Case Study.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

Robust Compressive Data Gathering in Wireless Sensor Networks with Linear Topology.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

Efficient Agile Sink Selection in Wireless Sensor Networks Based on Compressed Sensing.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

Practical Use of Formal Verification for Safety Critical Cyber-Physical Systems: A Case Study.
Proceedings of the 2014 IEEE International Conference on Cyber-Physical Systems, 2014

Mitigating Eclipse attacks in Peer-To-Peer networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Event Pattern Discovery on IDS Traces of Cloud Services.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

2013
GMTC: A Generalized Commit Approach for Hybrid Mobile Environments.
IEEE Trans. Mob. Comput., 2013

Sampling and transport co-design in Wireless Sensor Networks.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013

Efficient Verification of Distributed Protocols Using Stateful Model Checking.
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013

Coral: Reliable and low-latency P2P convergecast for critical sensor data collection.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Information quality aware co-design of sampling and transport in wireless sensor networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Trading transport timeliness and reliability for efficiency in wireless sensor networks.
Proceedings of 10th IEEE International Conference on Networking, Sensing and Control, 2013

simFI: From single to simultaneous software fault injections.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Quantitative assessment of software vulnerabilities based on economic-driven security metrics.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Predictive vulnerability scoring in the context of insufficient information availability.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Security as a Service Using an SLA-Based Approach via SPECS.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

SecLA-Based Negotiation and Brokering of Cloud Resources.
Proceedings of the Cloud Computing and Services Science - Third International Conference, 2013

Negotiating and Brokering Cloud Resources based on Security Level Agreements.
Proceedings of the CLOSER 2013, 2013

PoWerStore: proofs of writing for efficient and robust storage.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Protection of SCADA Communication Channels.
Proceedings of the Critical Infrastructure Protection, 2012

Efficient predictive monitoring of wireless sensor networks.
Int. J. Auton. Adapt. Commun. Syst., 2012

Proofs of Writing for Efficient and Robust Storage
CoRR, 2012

DKM: Distributed k-connectivity maintenance in Wireless Sensor Networks.
Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services, 2012

Brief Announcement: MP-State: State-Aware Software Model Checking of Message-Passing Systems.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Susceptibility Analysis of Structured P2P Systems to Localized Eclipse Attacks.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Trust & security RTD in the internet of things: opportunities for international cooperation.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Quantitative Assessment of Cloud Security Level Agreements - A Case Study.
Proceedings of the SECRYPT 2012, 2012

Balanced spatio-temporal compressive sensing for multi-hop wireless sensor networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Instrumenting AUTOSAR for dependability assessment: A guidance framework.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Privacy-by-design based on quantitative threat modeling.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

Benchmarking cloud security level agreements using quantitative policy trees.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

Monitoring and Evaluation of Semantic Rooms.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

2011
On the design of perturbation-resilient atomic commit protocols for mobile transactions.
ACM Trans. Comput. Syst., 2011

Application-Level Diagnostic and Membership Protocols for Generic Time-Triggered Systems.
IEEE Trans. Dependable Secur. Comput., 2011

Reliable congestion-aware information transport in wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2011

A Security Metrics Framework for the Cloud.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

TOM: Topology oriented maintenance in sparse Wireless Sensor Networks.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Fork-consistent constructions from registers.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

The complexity of robust atomic storage.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

Enhancing FPGA Robustness via Generic Monitoring IP Cores.
Proceedings of the PECCS 2011, 2011

Fork-Consistent Constructions from Registers.
Proceedings of the Principles of Distributed Systems - 15th International Conference, 2011

An adaptive and composite spatio-temporal data compression approach for wireless sensor networks.
Proceedings of the 14th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2011

Supporting domain-specific state space reductions through local partial-order reduction.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

Assessing the comparative effectiveness of map construction protocols in wireless sensor networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

The impact of fault models on software robustness evaluations.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Efficient model checking of fault-tolerant distributed protocols.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Building a Long Term Strategy for International Collaboration in Trustworthy ICT: Security, Privacy and Trust in Global Networks and Services.
Proceedings of the First SysSec Workshop 2011, 2011

Delay Tolerant Monitoring of Mobility-Assisted WSN.
Proceedings of the Delay Tolerant Networks - Protocols and Applications., 2011

2010
Using Underutilized CPU Resources to Enhance Its Reliability.
IEEE Trans. Dependable Secur. Comput., 2010

A Pre-Injection Analysis for Identifying Fault-Injection Tests for Protocol Validation.
J. Softw., 2010

A software integration approach for designing and assessing dependable embedded systems.
J. Syst. Softw., 2010

Profiling the operational behavior of OS device drivers.
Empir. Softw. Eng., 2010

TRCCIT: Tunable Reliability with Congestion Control for Information Transport in Wireless Sensor Networks.
Proceedings of the 5th Annual International Conference on Wireless Internet, 2010

ASample: Adaptive Spatial Sampling in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

Generic Information Transport for Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

Reordering for Better Compressibility: Efficient Spatial Sampling in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2010


Eventually linearizable shared objects.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

Data-Based Agreement for Inter-vehicle Coordination.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

Leveraging the next-generation power grid: Data sharing and associated partnerships.
Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies, 2010

LEHP: Localized energy hole profiling in Wireless Sensor Networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays.
Proceedings of the Architecting Critical Systems, First International Symposium, 2010

Quality of information in wireless sensor networks.
Proceedings of the 15th International Conference on Information Quality, 2010

On Efficient Models for Model Checking Message-Passing Distributed Protocols.
Proceedings of the Formal Techniques for Distributed Systems, 2010

HP: Hybrid Paxos for WANs.
Proceedings of the Eighth European Dependable Computing Conference, 2010

Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicas.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

Map-based Design for Autonomic Wireless Sensor Networks.
Proceedings of the Autonomic Communication, 2010

2009
Exploring Delay-Aware Transactions in Heterogeneous Mobile Environments.
J. Softw., 2009

Increasing security and protection of SCADA systems through infrastructure resilience.
Int. J. Syst. Syst. Eng., 2009

An optimization based design for integrated dependable real-time embedded systems.
Des. Autom. Embed. Syst., 2009

Brief Announcement: Efficient Model Checking of Fault-Tolerant Distributed Protocols Using Symmetry Reduction.
Proceedings of the Distributed Computing, 23rd International Symposium, 2009

Efficient Robust Storage Using Secret Tokens.
Proceedings of the Stabilization, 2009

MAP++: support for map-based WSN modeling and design with OMNeT++.
Proceedings of the 2nd International Conference on Simulation Tools and Techniques for Communications, 2009

Abortable Fork-Linearizable Storage.
Proceedings of the Principles of Distributed Systems, 13th International Conference, 2009

AReIT: Adaptive Reliable Information Transport Protocol for Wireless Sensor Networks.
Proceedings of the 2009 International Conference on Wireless Networks, 2009

Role-Based Symmetry Reduction of Fault-Tolerant Distributed Protocols with Language Support.
Proceedings of the Formal Methods and Software Engineering, 2009

MPM: Map Based Predictive Monitoring for Wireless Sensor Networks.
Proceedings of the Autonomic Computing and Communications Systems, 2009

2008
A comparative study of data transport protocols in wireless sensor networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Delay-Aware Mobile Transactions.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008

On the Time-Complexity of Robust and Amnesic Storage.
Proceedings of the Principles of Distributed Systems, 12th International Conference, 2008

Reducing the costs of large-scale BFT replication.
Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware, 2008

Low-latency access to robust amnesic storage.
Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware, 2008

Execution Path Profiling for OS Device Drivers: Viability and Methodology.
Proceedings of the Service Availability, 5th International Service Availability Symposium, 2008

Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Message from the DCCS program chair.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

Dependable Embedded Systems Special Day Panel: Issues and Challenges in Dependable Embedded Systems.
Proceedings of the Design, Automation and Test in Europe, 2008

INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project.
Proceedings of the Critical Information Infrastructure Security, 2008

MWM: a map-based world model for wireless sensor networks.
Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems, 2008

2007
Online Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters.
IEEE Trans. Dependable Secur. Comput., 2007

The Fail-Heterogeneous Architectural Model.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

On the Latency Efficiency of Message-Parsimonious Asynchronous Atomic Broadcast.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

On Modeling the Reliability of Data Transport in Wireless Sensor Networks.
Proceedings of the 15th Euromicro International Conference on Parallel, 2007

Gossiping: Adaptive and Reliable Broadcasting in MANETs.
Proceedings of the Dependable Computing, Third Latin-American Symposium, 2007

On the Impact of Injection Triggers for OS Robustness Evaluation.
Proceedings of the ISSRE 2007, 2007

Sustaining Property Verification of Synchronous Dependable Protocols Over Implementation.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

A Multi Variable Optimization Approach for the Design of Integrated Dependable Real-Time Embedded Systems.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2007

A Tunable Add-On Diagnostic Protocol for Time-Triggered Systems.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

On the Selection of Error Model(s) for OS Robustness Evaluation.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
An approach to synthesise safe systems.
Int. J. Secur. Networks, 2006

FT-PPTC: An Efficient and Fault-Tolerant Commit Protocol for Mobile Environments.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

Dependability Driven Integration of Mixed Criticality SW Components.
Proceedings of the Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 2006

Improving Robustness Testing of COTS OS Extensions.
Proceedings of the Service Availability, 2006

One-step Consensus with Zero-Degradation.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

2005
Designing Efficient Fail-Safe Multitolerant Systems.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2005

Error Propagation Profiling of Operating Systems.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
An Efficient TDMA Start-Up and Restart Synchronization Approach for Distributed Embedded Systems.
IEEE Trans. Parallel Distributed Syst., 2004

EPIC: Profiling the Propagation and Effect of Data Errors in Software.
IEEE Trans. Computers, 2004

On Dependability Driven Software and Hardware Integration.
Proceedings of the 2nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004

Why Progress in (Composite) Fault Tolerant Real-Time Systems has been Slow (-er than Expected.. & What Can We Do About It?).
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

Why Have Progresses in Real-Time Fault Tolerant Computing Been Slow?
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

Panel Summary Statements.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

On Enhancing the Robustness of Commercial Operating Systems.
Proceedings of the Service Availability, 2004

TTET: Event-Triggered Channels on a Time-Triggered Base.
Proceedings of the 9th International Conference on Engineering of Complex Computer Systems (ICECCS 2004), 2004

An Approach for Designing and Assessing Detectors for Dependable Component-Based Systems.
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004

2003
The customizable fault/error model for dependable distributed systems.
Theor. Comput. Sci., 2003

On the Limits of the Precise Specification of Component Interfaces.
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003

Practical Aspects of IP Take-Over Mechanisms.
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003

A Framework for the Design and Validation of Efficient Fail-Safe Fault-Tolerant Programs.
Proceedings of the Software and Compilers for Embedded Systems, 7th International Workshop, 2003

Compositional Design of RT Systems: A Conceptual Basis for Specification of Linking Interfaces.
Proceedings of the 6th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2003), 2003

The Event-Triggered and Time-Triggered Medium-Access Methods.
Proceedings of the 6th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2003), 2003

2002
A Control Theory Approach for Analyzing the Effects of Data Errors in Safety-Critical Control Systems.
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002

On systematic design of globally consistent executable assertions in embedded software.
Proceedings of the 2002 Joint Conference on Languages, 2002

PROPANE: an environment for examining the propagation of errors in software.
Proceedings of the International Symposium on Software Testing and Analysis, 2002

An Approach to Specify and Test Component-Based Dependable Software.
Proceedings of the 7th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2002), 2002

Component-Based Synthesis of Dependable Embedded Software.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 2002

On the Placement of Software Mechanisms for Detection of Data Errors.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Design of a parallel interconnect based on communication pattern considerations.
Parallel Algorithms Appl., 2001

Assessing Inter-Modular Error Propagation in Distributed Software.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

Efficient TDMA Synchronization for Distributed Embedded Systems.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

Modular Composition of Redundancy Management Protocols in Distributed Systems: An Outlook on Simplifying Protocol Level Formal Specification & Verification.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

On Simplifying Modular Specification and Verification of Distributed Protocols.
Proceedings of the 6th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2001), 2001

An Approach for Analysing the Propagation of Data Errors in Software.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
Evaluating COTS Standards for Design of Dependable Systems.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

Designing High-Performance & Reliable Superscalar Architectures: The out of Order Reliable Superscalar (O3RS) Approach.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

1999
Editorial: Special Section on Dependable Real-Time Systems.
IEEE Trans. Parallel Distributed Syst., 1999

On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols.
Proceedings of the 20th IEEE Real-Time Systems Symposium, 1999

Identification of Test Cases Using a Formal Approach.
Proceedings of the Digest of Papers: FTCS-29, 1999

1998
A Framework for Dependability Driven Software Integration.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

On the Use of Formal Techniques for Validation.
Proceedings of the Digest of Papers: FTCS-28, 1998

1997
Formally Verified On-Line Diagnosis.
IEEE Trans. Software Eng., 1997

Cache based fault recovery for distributed systems.
Proceedings of the 3rd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '97), 1997

1994
Synchronization issues in real-time systems.
Proc. IEEE, 1994

1992
Reliability Modeling of Large Fault-Tolerant Systems.
Proceedings of the Digest of Papers: FTCS-22, 1992

1991
BDG-torus union graph-an efficient algorithmically specializedparallel interconnect.
Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing, 1991


  Loading...