What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Neeraj Suri
Google Scholar
ORCID:
0000-0003-1688-1167
28
publications in security and cryptology related venues
Year
Venue
Title
2022
conf/ccs
Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud.
Salman Manzoor
Antonios Gouglidis
Matthew Bradbury
Neeraj Suri
2022
conf/ccs
Poster: Multi-Layer Threat Analysis of the Cloud.
Salman Manzoor
Antonios Gouglidis
Matthew Bradbury
Neeraj Suri
2021
journals/compsec
PCaaD: Towards automated determination and exploitation of industrial systems.
Benjamin Green
Richard Derbyshire
Marina Krotofil
William Knowles
Daniel Prince
Neeraj Suri
2020
conf/dsn
TraceSanitizer - Eliminating the Effects of Non-Determinism on Error Propagation Analysis.
Habib Saissi
Stefan Winter
Oliver Schwahn
Karthik Pattabiraman
Neeraj Suri
2017
journals/compsec
P2P routing table poisoning: A quorum-based sanitizing approach.
Hatem Ismail
Daniel Germanus
Neeraj Suri
2017
conf/eurosp
Challenges and Approaches in Securing Safety-Relevant Railway Signalling.
Christian Schlehuber
Markus Heinrich
Tsvetoslava Vateva-Gurova
Stefan Katzenbeisser
Neeraj Suri
2016
journals/compsec
Novel efficient techniques for real-time cloud security assessment.
Jolanda Modic
Rubén Trapero
Ahmed Taha
Jesus Luna
Miha Stopar
Neeraj Suri
2016
conf/ccs
Identifying and Utilizing Dependencies Across Cloud Security Services.
Ahmed Taha
Patrick Metzler
Rubén Trapero
Jesus Luna
Neeraj Suri
2016
conf/cns
Malicious peers eviction for P2P overlays.
Hatem Ismail
Daniel Germanus
Neeraj Suri
2015
conf/uss
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
Giancarlo Pellegrino
Davide Balzarotti
Stefan Winter
Neeraj Suri
2014
conf/sec
Towards a Framework for Benchmarking Privacy-ABC Technologies.
Fatbardh Veseli
Tsvetoslava Vateva-Gurova
Ioannis Krontiris
Kai Rannenberg
Neeraj Suri
2014
conf/cns
Mitigating Eclipse attacks in Peer-To-Peer networks.
Daniel Germanus
Stefanie Roos
Thorsten Strufe
Neeraj Suri
2013
conf/ccs
PoWerStore: proofs of writing for efficient and robust storage.
Dan Dobre
Ghassan Karame
Wenting Li
Matthias Majuntke
Neeraj Suri
Marko Vukolic
2013
conf/dsn
Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach.
Feng Tan
Yufei Wang
Qixin Wang
Lei Bu
Rong Zheng
Neeraj Suri
2013
conf/dsn
simFI: From single to simultaneous software fault injections.
Stefan Winter
Michael Tretter
Benjamin Sattler
Neeraj Suri
2012
conf/ccs
Benchmarking cloud security level agreements using quantitative policy trees.
Jesus Luna Garcia
Robert Langenberg
Neeraj Suri
2012
conf/dsn
Instrumenting AUTOSAR for dependability assessment: A guidance framework.
Thorsten Piper
Stefan Winter
Paul Manns
Neeraj Suri
2011
conf/dsn
Efficient model checking of fault-tolerant distributed protocols.
Péter Bokor
Johannes Kinder
Marco Serafini
Neeraj Suri
2010
conf/dsn
Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicas.
Marco Serafini
Péter Bokor
Dan Dobre
Matthias Majuntke
Neeraj Suri
2008
conf/dsn
Message from the DCCS program chair.
Neeraj Suri
2007
conf/dsn
A Tunable Add-On Diagnostic Protocol for Time-Triggered Systems.
Marco Serafini
Neeraj Suri
Jonny Vinter
Astrit Ademaj
Wolfgang Brandstätter
Fulvio Tagliabo
Jens Koch
2007
conf/dsn
On the Selection of Error Model(s) for OS Robustness Evaluation.
Andréas Johansson
Neeraj Suri
Brendan Murphy
2006
conf/dsn
One-step Consensus with Zero-Degradation.
Dan Dobre
Neeraj Suri
2005
conf/dsn
Error Propagation Profiling of Operating Systems.
Andréas Johansson
Neeraj Suri
2002
conf/dsn
On the Placement of Software Mechanisms for Detection of Data Errors.
Martin Hiller
Arshad Jhumka
Neeraj Suri
2001
conf/dsn
An Approach for Analysing the Propagation of Data Errors in Software.
Martin Hiller
Arshad Jhumka
Neeraj Suri
2000
conf/dsn
Evaluating COTS Standards for Design of Dependable Systems.
Chris J. Walter
Neeraj Suri
T. Monaghan
2000
conf/dsn
Designing High-Performance & Reliable Superscalar Architectures: The out of Order Reliable Superscalar (O3RS) Approach.
Avi Mendelson
Neeraj Suri
Coauthors
Ahmed Taha
(2)
Andreas Johansson
(2)
Antonios Gouglidis
(2)
Arshad Jhumka
(2)
Astrit Ademaj
(1)
Avi Mendelson
(1)
Benjamin Green
(1)
Benjamin Sattler
(1)
Brendan Murphy
(1)
Chris J. Walter
(1)
Christian Schlehuber
(1)
Dan Dobre
(3)
Daniel Germanus
(3)
Daniel Prince
(1)
Davide Balzarotti
(1)
Fatbardh Veseli
(1)
Feng Tan
(1)
Fulvio Tagliabo
(1)
Ghassan Karame
(1)
Giancarlo Pellegrino
(1)
Habib Saissi
(1)
Hatem Ismail
(2)
Ioannis Krontiris
(1)
Jens Koch
(1)
Jesus Luna
(2)
Jesus Luna Garcia
(1)
Johannes Kinder
(1)
Jolanda Modic
(1)
Jonny Vinter
(1)
Kai Rannenberg
(1)
Karthik Pattabiraman
(1)
Lei Bu
(1)
Marco Serafini
(3)
Marina Krotofil
(1)
Marko Vukolic
(1)
Markus Heinrich
(1)
Martin Hiller
(2)
Matthew Bradbury
(2)
Matthias Majuntke
(2)
Michael Tretter
(1)
Miha Stopar
(1)
Neeraj Suri
(28)
Oliver Schwahn
(1)
Patrick Metzler
(1)
Paul Manns
(1)
Péter Bokor
(2)
Qixin Wang
(1)
Richard Derbyshire
(1)
Robert Langenberg
(1)
Rong Zheng
(1)
Rubén Trapero
(2)
Salman Manzoor
(2)
Stefan Katzenbeisser
(1)
Stefan Winter
(4)
Stefanie Roos
(1)
T. Monaghan
(1)
Thorsten Piper
(1)
Thorsten Strufe
(1)
Tsvetoslava Vateva-Gurova
(2)
Wenting Li
(1)
William Knowles
(1)
Wolfgang Brandstätter
(1)
Yufei Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to