Sujeet Shenoi
Orcid: 0000-0002-6420-8922
According to our database1,
Sujeet Shenoi
authored at least 74 papers
between 1990 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2023
Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems.
Int. J. Crit. Infrastructure Prot., March, 2023
Proceedings of the Advances in Digital Forensics XIX, 2023
Proceedings of the Critical Infrastructure Protection XVII, 2023
Proceedings of the Critical Infrastructure Protection XVII, 2023
Proceedings of the Critical Infrastructure Protection XVII, 2023
2022
Proceedings of the Critical Infrastructure Protection XVI, 2022
Proceedings of the Critical Infrastructure Protection XVI, 2022
Detecting Part Anomalies Induced by Cyber Attacks on a Powder BED Fusion Additive Manufacturing System.
Proceedings of the Critical Infrastructure Protection XVI, 2022
2019
Retrofitting Mobile Devices for Capturing Memory-Resident Malware Based on System Side-Effects.
Proceedings of the Advances in Digital Forensics XV, 2019
Proceedings of the Critical Infrastructure Protection XIII, 2019
2017
Int. J. Crit. Infrastructure Prot., 2017
Int. J. Crit. Infrastructure Prot., 2017
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017
2016
2014
2012
Implementing novel reactive defense functionality in MPLS networks using hyperspeed signaling.
Int. J. Crit. Infrastructure Prot., 2012
2011
May the US government monitor private critical infrastructure assets to combat foreign cyberspace threats?
Int. J. Crit. Infrastructure Prot., 2011
Int. J. Crit. Infrastructure Prot., 2011
Proceedings of the Critical Infrastructure Protection V, 2011
Implementing Novel Defense Functionality in MPLS Networks Using Hyperspeed Signaling.
Proceedings of the Critical Infrastructure Protection V, 2011
2010
Int. J. Crit. Infrastructure Prot., 2010
Int. J. Crit. Infrastructure Prot., 2010
Proceedings of the Critical Infrastructure Protection IV, 2010
Modeling Control System Failures and Attacks - The Waterloo Campaign to Oil Pipelines.
Proceedings of the Critical Infrastructure Protection IV, 2010
2009
Int. J. Crit. Infrastructure Prot., 2009
Proceedings of the Advances in Digital Forensics V, 2009
Proceedings of the Critical Infrastructure Protection III, 2009
Proceedings of the Critical Infrastructure Protection III, 2009
2008
Int. J. Crit. Infrastructure Prot., 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Proceedings of the Critical Infrastructure Protection II, 2008
2007
Proceedings of the Advances in Digital Forensics III, 2007
Proceedings of the Advances in Digital Forensics III, 2007
Proceedings of the Critical Infrastructure Protection, 2007
Proceedings of the Critical Infrastructure Protection, 2007
2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
2005
J. Netw. Syst. Manag., 2005
Proceedings of the Advances in Digital Forensics, 2005
Proceedings of the Advances in Digital Forensics, 2005
Proceedings of the Advances in Digital Forensics, 2005
Proceedings of the Advances in Digital Forensics, 2005
Proceedings of the Advances in Digital Forensics, 2005
2003
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
2001
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001
Public Telephone Network Vulnerabilities.
Proceedings of the Database and Application Security XV, 2001
2000
J. Comput. Secur., 2000
Proceedings of the Data and Application Security, 2000
Proceedings of the Data and Application Security, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Programmable Security for Object-Oriented Systems.
Proceedings of the Database Security XII: Status and Prospects, 1998
1997
Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Implementing Advanced Internet Search Engines.
Proceedings of the Database Securty XI: Status and Prospects, 1997
Capability-Based Primitives for Access Control in Object-Oriented Systems.
Proceedings of the Database Securty XI: Status and Prospects, 1997
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.
Proceedings of the Database Securty XI: Status and Prospects, 1997
1996
A Framework for High Assurance Security of Distributed Objects.
Proceedings of the Database Security Volume X, 1996
1995
A Tool for Inference Detection and Knowledge Discovery in Databases.
Proceedings of the Database Security IX: Status and Prospects, 1995
1994
A Practical Formalism for Imprecise Inference Control.
Proceedings of the Database Security, 1994
1992
Inf. Sci., 1992
1990
Int. J. Approx. Reason., 1990