


default search action
Sujeet Shenoi
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [e39]Elizabeth Kurkowski, Sujeet Shenoi:
Advances in Digital Forensics XX - 20th IFIP WG 11.9 International Conference, New Delhi, India, January 4-5, 2024, Revised Selected Papers. IFIP Advances in Information and Communication Technology 724, Springer 2025, ISBN 978-3-031-71024-7 [contents] - 2024
- [e38]Jason Staggs, Sujeet Shenoi:
Critical Infrastructure Protection XVII - 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13-14, 2023, Revised Selected Papers. IFIP Advances in Information and Communication Technology 686, Springer 2024, ISBN 978-3-031-49584-7 [contents] - 2023
- [j55]James Ashworth, Jason Staggs, Sujeet Shenoi
:
Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems. Int. J. Crit. Infrastructure Prot. 40: 100587 (2023) - [c51]Øyvind Anders Arntzen Toftegaard, Doney Abraham, Sujeet Shenoi, Bernhard M. Hämmerli:
Smart-Grid-Enabled Business Cases and the Consequences of Cyber Attacks. Critical Infrastructure Protection 2023: 17-39 - [c50]Kameron Tillman, Jason Staggs, Sujeet Shenoi:
A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures. Critical Infrastructure Protection 2023: 195-220 - [c49]Edward Martin, Sujeet Shenoi:
Real-Time Attack Detection in Modern Automobile Controller Area Networks. Critical Infrastructure Protection 2023: 221-252 - [c48]Shawn McKay, Nathan F. Hutchins, Steven Baskerville, Sujeet Shenoi:
Towards Direct-Control Data Acquisition by Nano-Probing Non-Volatile Memory Cells. IFIP Int. Conf. Digital Forensics 2023: 91-122 - [e37]Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics XIX - 19th IFIP WG 11.9 International Conference, ICDF 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers. IFIP Advances in Information and Communication Technology 687, Springer 2023, ISBN 978-3-031-42990-3 [contents] - 2022
- [c47]Alyxandra Van Stockum, Elizabeth Kurkowski, Tiffany Potok, Curtis Taylor
, Joel A. Dawson
, Mason Rice, Sujeet Shenoi:
Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems. Critical Infrastructure Protection 2022: 121-153 - [c46]Elizabeth Kurkowski, Alyxandra Van Stockum, Joel A. Dawson
, Curtis Taylor
, Tricia Schulz, Sujeet Shenoi:
Manipulation of G-Code Toolpath Files in 3D Printers: Attacks and Mitigations. Critical Infrastructure Protection 2022: 155-174 - [c45]Elizabeth Kurkowski, Mason Rice, Sujeet Shenoi:
Detecting Part Anomalies Induced by Cyber Attacks on a Powder BED Fusion Additive Manufacturing System. Critical Infrastructure Protection 2022: 175-203 - [e36]Jason Staggs, Sujeet Shenoi:
Critical Infrastructure Protection XV - 15th IFIP WG 11.10 International Conference, ICCIP 2021, Virtual Event, March 15-16, 2021, Revised Selected Papers. IFIP Advances in Information and Communication Technology 636, Springer 2022, ISBN 978-3-030-93510-8 [contents] - [e35]Jason Staggs, Sujeet Shenoi:
Critical Infrastructure Protection XVI - 16th IFIP WG 11.10 International Conference, ICCIP 2022, Virtual Event, March 14-15, 2022, Revised Selected Papers. IFIP Advances in Information and Communication Technology 666, Springer 2022, ISBN 978-3-031-20136-3 [contents] - [e34]Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics XVIII - 18th IFIP WG 11.9 International Conference, Virtual Event, January 3-4, 2022, Revised Selected Papers. IFIP Advances in Information and Communication Technology 653, Springer 2022, ISBN 978-3-031-10077-2 [contents] - 2021
- [e33]Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics XVII - 17th IFIP WG 11.9 International Conference, Virtual Event, February 1-2, 2021, Revised Selected Papers. IFIP Advances in Information and Communication Technology 612, Springer 2021, ISBN 978-3-030-88380-5 [contents] - 2020
- [e32]Jason Staggs, Sujeet Shenoi:
Critical Infrastructure Protection XIV - 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16-17, 2020, Revised Selected Papers. IFIP Advances in Information and Communication Technology 596, Springer 2020, ISBN 978-3-030-62839-0 [contents] - [e31]Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised Selected Papers. IFIP Advances in Information and Communication Technology 589, Springer 2020, ISBN 978-3-030-56222-9 [contents]
2010 – 2019
- 2019
- [c44]Jason Staggs, Sujeet Shenoi:
Securing Wireless Coprocessors from Attacks in the Internet of Things. Critical Infrastructure Protection 2019: 159-178 - [c43]Zachary Grimmett, Jason Staggs, Sujeet Shenoi:
Retrofitting Mobile Devices for Capturing Memory-Resident Malware Based on System Side-Effects. IFIP Int. Conf. Digital Forensics 2019: 59-72 - [e30]Jason Staggs, Sujeet Shenoi:
Critical Infrastructure Protection XIII - 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11-12, 2019, Revised Selected Papers. IFIP Advances in Information and Communication Technology 570, Springer 2019, ISBN 978-3-030-34646-1 [contents] - [e29]Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics XV - 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised Selected Papers. IFIP Advances in Information and Communication Technology 569, Springer 2019, ISBN 978-3-030-28751-1 [contents] - 2018
- [j54]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 20: 1-2 (2018) - [e28]Jason Staggs, Sujeet Shenoi:
Critical Infrastructure Protection XII - 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers. IFIP Advances in Information and Communication Technology 542, Springer 2018, ISBN 978-3-030-04536-4 [contents] - [e27]Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics XIV - 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers. IFIP Advances in Information and Communication Technology 532, Springer 2018, ISBN 978-3-319-99276-1 [contents] - 2017
- [j53]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 16: 1-2 (2017) - [j52]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 17: 1-2 (2017) - [j51]Jason Staggs, David F. Ferraiolo, Sujeet Shenoi:
Wind farm security: attack surface, targets, scenarios and mitigation. Int. J. Crit. Infrastructure Prot. 17: 3-14 (2017) - [j50]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 18: 1-2 (2017) - [j49]Aaron Hansen, Jason Staggs, Sujeet Shenoi:
Security analysis of an advanced metering infrastructure. Int. J. Crit. Infrastructure Prot. 18: 3-19 (2017) - [j48]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 19: 1-3 (2017) - [c42]Zachary Grimmett, Jason Staggs, Sujeet Shenoi:
Categorizing Mobile Device Malware Based on System Side-Effects. IFIP Int. Conf. Digital Forensics 2017: 203-219 - [e26]Mason Rice, Sujeet Shenoi:
Critical Infrastructure Protection XI - 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers. IFIP Advances in Information and Communication Technology 512, Springer 2017, ISBN 978-3-319-70394-7 [contents] - [e25]Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers. IFIP Advances in Information and Communication Technology 511, Springer 2017, ISBN 978-3-319-67207-6 [contents] - 2016
- [j47]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 12: 1-3 (2016) - [j46]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 13: 1-2 (2016) - [j45]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 14: 1-2 (2016) - [j44]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 15: 1-2 (2016) - [e24]Mason Rice, Sujeet Shenoi:
Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers. IFIP Advances in Information and Communication Technology 485, 2016, ISBN 978-3-319-48736-6 [contents] - [e23]Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics XII - 12th IFIP WG 11.9 International Conference, New Delhi, India, January 4-6, 2016, Revised Selected Papers. IFIP Advances in Information and Communication Technology 484, Springer 2016, ISBN 978-3-319-46278-3 [contents] - 2015
- [j43]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 8: 1-2 (2015) - [j42]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 9: 1-2 (2015) - [j41]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 10: 1-2 (2015) - [j40]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 11: 1-2 (2015) - [e22]Mason Rice, Sujeet Shenoi:
Critical Infrastructure Protection IX - 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers. IFIP Advances in Information and Communication Technology 466, Springer 2015, ISBN 978-3-319-26566-7 [contents] - [e21]Gilbert L. Peterson
, Sujeet Shenoi:
Advances in Digital Forensics XI - 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers. IFIP Advances in Information and Communication Technology 462, Springer 2015, ISBN 978-3-319-24122-7 [contents] - 2014
- [j39]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 7(1): 1-2 (2014) - [j38]Jill Rowland, Mason Rice, Sujeet Shenoi:
The anatomy of a cyber power. Int. J. Crit. Infrastructure Prot. 7(1): 3-11 (2014) - [j37]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 7(2): 69-70 (2014) - [j36]Jill Rowland, Mason Rice, Sujeet Shenoi:
Whither cyberpower? Int. J. Crit. Infrastructure Prot. 7(2): 124-137 (2014) - [j35]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 7(3): 139-140 (2014) - [j34]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 7(4): 211-212 (2014) - [e20]Jonathan Butts, Sujeet Shenoi:
Critical Infrastructure Protection VIII - 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers. IFIP Advances in Information and Communication Technology 441, Springer 2014, ISBN 978-3-662-45354-4 [contents] - [e19]Gilbert L. Peterson
, Sujeet Shenoi:
Advances in Digital Forensics X - 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers. IFIP Advances in Information and Communication Technology 433, Springer 2014, ISBN 978-3-662-44951-6 [contents] - 2013
- [j33]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 6(1): 1-2 (2013) - [j32]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 6(2): 61-62 (2013) - [j31]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 6(3-4): 121-122 (2013) - [e18]Jonathan Butts, Sujeet Shenoi:
Critical Infrastructure Protection VII - 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers. IFIP Advances in Information and Communication Technology 417, Springer 2013, ISBN 978-3-642-45329-8 [contents] - [e17]Gilbert L. Peterson
, Sujeet Shenoi:
Advances in Digital Forensics IX - 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers. IFIP Advances in Information and Communication Technology 410, Springer 2013, ISBN 978-3-642-41147-2 [contents] - [e16]Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi:
Security and Privacy Protection in Information Processing Systems - 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings. IFIP Advances in Information and Communication Technology 405, Springer 2013, ISBN 978-3-642-39217-7 [contents] - 2012
- [j30]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 5(1): 1-2 (2012) - [j29]Daniel Guernsey, Mason Rice, Sujeet Shenoi:
Implementing novel reactive defense functionality in MPLS networks using hyperspeed signaling. Int. J. Crit. Infrastructure Prot. 5(1): 40-52 (2012) - [j28]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 5(2): 53-54 (2012) - [j27]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 5(3-4): 105-107 (2012) - [e15]Jonathan Butts, Sujeet Shenoi:
Critical Infrastructure Protection VI - 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers. IFIP Advances in Information and Communication Technology 390, Springer 2012, ISBN 978-3-642-35763-3 [contents] - [e14]Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics VIII - 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers. IFIP Advances in Information and Communication Technology 383, Springer 2012, ISBN 978-3-642-33961-5 [contents] - 2011
- [j26]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 4(1): 1-2 (2011) - [j25]Mason Rice, Robert Miller, Sujeet Shenoi:
May the US government monitor private critical infrastructure assets to combat foreign cyberspace threats? Int. J. Crit. Infrastructure Prot. 4(1): 3-13 (2011) - [j24]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 4(2): 55-56 (2011) - [j23]Mason Rice, Jonathan Butts, Sujeet Shenoi:
A signaling framework to deter aggression in cyberspace. Int. J. Crit. Infrastructure Prot. 4(2): 57-65 (2011) - [j22]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 4(3-4): 105-106 (2011) - [c41]Mason Rice, Daniel Guernsey, Sujeet Shenoi:
Using Deception to Shield Cyberspace Sensors. Critical Infrastructure Protection 2011: 3-18 - [c40]Daniel Guernsey, Mason Rice, Sujeet Shenoi:
Implementing Novel Defense Functionality in MPLS Networks Using Hyperspeed Signaling. Critical Infrastructure Protection 2011: 91-106 - [e13]Jonathan Butts, Sujeet Shenoi:
Critical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers. IFIP Advances in Information and Communication Technology 367, Springer 2011, ISBN 978-3-642-24863-4 [contents] - [e12]Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 - February 2, 2011, Revised Selected Papers. IFIP Advances in Information and Communication Technology 361, Springer 2011, ISBN 978-3-642-24211-3 [contents] - 2010
- [j21]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 3(1): 1-2 (2010) - [j20]Mason Rice, Jonathan Butts, Robert Miller, Sujeet Shenoi:
An analysis of the legality of government-mandated computer inoculations. Int. J. Crit. Infrastructure Prot. 3(1): 5-15 (2010) - [j19]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 3(2): 51-52 (2010) - [j18]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 3(3-4): 99-100 (2010) - [j17]Mason Rice, Jonathan Butts, Robert Miller, Sujeet Shenoi:
Applying public health strategies to the protection of cyberspace. Int. J. Crit. Infrastructure Prot. 3(3-4): 118-127 (2010) - [c39]Jonathan Butts, Mason Rice, Sujeet Shenoi:
Modeling Control System Failures and Attacks - The Waterloo Campaign to Oil Pipelines. Critical Infrastructure Protection 2010: 43-62 - [c38]Daniel Guernsey, Aaron Engel, Jonathan Butts, Sujeet Shenoi:
Security Analysis of the MPLS Label Distribution Protocol. Critical Infrastructure Protection 2010: 127-139 - [e11]Tyler Moore, Sujeet Shenoi:
Critical Infrastructure Protection IV - Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers. IFIP Advances in Information and Communication Technology 342, Springer 2010, ISBN 978-3-642-16805-5 [contents] - [e10]Kam-Pui Chow, Sujeet Shenoi:
Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers. IFIP Advances in Information and Communication Technology 337, Springer 2010, ISBN 978-3-642-15505-5 [contents]
2000 – 2009
- 2009
- [j16]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 2(1-2): 1-2 (2009) - [j15]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 2(3): 69-70 (2009) - [j14]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 2(4): 135-136 (2009) - [j13]Denise Grayson, Daniel Guernsey, Jonathan Butts, Michael Spainhower, Sujeet Shenoi:
Analysis of security threats to MPLS virtual private networks. Int. J. Crit. Infrastructure Prot. 2(4): 146-153 (2009) - [c37]Samuel East, Jonathan Butts, Mauricio Papa
, Sujeet Shenoi:
A Taxonomy of Attacks on the DNP3 Protocol. Critical Infrastructure Protection 2009: 67-81 - [c36]Jonathan Butts, Hugo Kleinhans, Rodrigo Chandia, Mauricio Papa
, Sujeet Shenoi:
Providing Situational Awareness for Pipeline Control Operations. Critical Infrastructure Protection 2009: 97-111 - [c35]Hugo Kleinhans, Jonathan Butts, Sujeet Shenoi:
Password Cracking Using Sony Playstations. IFIP Int. Conf. Digital Forensics 2009: 215-227 - [e9]Mauricio Papa, Sujeet Shenoi:
Critical Infrastructure Protection II - Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers. IFIP Advances in Information and Communication Technology 290, Springer 2009, ISBN 978-0-387-88522-3 [contents] - [e8]Charles C. Palmer, Sujeet Shenoi:
Critical Infrastructure Protection III - Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers. IFIP Advances in Information and Communication Technology 311, Springer 2009, ISBN 978-3-642-04797-8 [contents] - [e7]Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics V - Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers. IFIP Advances in Information and Communication Technology 306, Springer 2009, ISBN 978-3-642-04154-9 [contents] - 2008
- [j12]Sujeet Shenoi:
Editorial. Int. J. Crit. Infrastructure Prot. 1: 1-2 (2008) - [j11]Peter Huitsing, Rodrigo Chandia, Mauricio Papa
, Sujeet Shenoi:
Attack taxonomies for the Modbus protocols. Int. J. Crit. Infrastructure Prot. 1: 37-44 (2008) - [j10]Michael Spainhower, Jonathan Butts, Daniel Guernsey, Sujeet Shenoi:
Security analysis of RSVP-TE signaling in MPLS networks. Int. J. Crit. Infrastructure Prot. 1: 68-74 (2008) - [j9]Tim Kilpatrick, Jesús González, Rodrigo Chandia, Mauricio Papa
, Sujeet Shenoi:
Forensic analysis of SCADA systems and networks. Int. J. Secur. Networks 3(2): 95-102 (2008) - [c34]Ryan Shayto, Brian Porter, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi:
Assessing The Integrity Of Field Devices In Modbus Networks. Critical Infrastructure Protection 2008: 115-128 - [c33]Charles Adams, Anthony Whitledge, Sujeet Shenoi:
Legal Issues Pertaining to the Use of Cell Phone Data. IFIP Int. Conf. Digital Forensics 2008: 231-243 - [e6]Indrajit Ray, Sujeet Shenoi:
Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008. IFIP 285, Springer 2008, ISBN 978-0-387-84926-3 [contents] - 2007
- [c32]Rodrigo Chandia, Jesús González, Tim Kilpatrick, Mauricio Papa
, Sujeet Shenoi:
Security Strategies for SCADA Networks. Critical Infrastructure Protection 2007: 117-131 - [c31]Janica Edmonds, Mauricio Papa
, Sujeet Shenoi:
Security Analysis of Multilayer SCADA Protocols. Critical Infrastructure Protection 2007: 205-221 - [c30]Christopher Swenson, Charles Adams, Anthony Whitledge, Sujeet Shenoi:
On the Legality of Analyzing Telephone Call Records. IFIP Int. Conf. Digital Forensics 2007: 21-39 - [c29]Christopher Swenson, Raquel Phillips, Sujeet Shenoi:
File System Journal Forensics. IFIP Int. Conf. Digital Forensics 2007: 231-244 - [e5]Eric Goetz, Sujeet Shenoi:
Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007. IFIP 253, Springer 2007, ISBN 978-0-387-75461-1 [contents] - [e4]Philip Craiger, Sujeet Shenoi:
Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007. IFIP 242, Springer 2007, ISBN 978-0-387-73741-6 [contents] - 2006
- [c28]Scott Piper, Mark Davis, Sujeet Shenoi:
Countering Hostile Forensic Techniques. IFIP Int. Conf. Digital Forensics 2006: 79-90 - [c27]Mark Davis, Richard Kennedy, Kristina Pyles, Amanda Strickler, Sujeet Shenoi:
Detecting Data Concealment Programs Using File System Analysis. IFIP Int. Conf. Digital Forensics 2006: 171-183 - [c26]Christopher Swenson, Tyler Moore, Sujeet Shenoi:
GSM Cell Site Forensics. IFIP Int. Conf. Digital Forensics 2006: 259-272 - [c25]Tim Kilpatrick, Jesús González, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi:
An Architecture for SCADA Network Forensics. IFIP Int. Conf. Digital Forensics 2006: 273-285 - [c24]Pavel Gershteyn, Mark Davis, Sujeet Shenoi:
Forensic Analysis of BIOS Chips. IFIP Int. Conf. Digital Forensics 2006: 301-314 - [e3]Mark Pollitt, Sujeet Shenoi:
Advances in Digital Forensics, IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, USA, February 13-16, 2005. IFIP 194, Springer 2006, ISBN 0-387-30012-0 [contents] - [e2]Martin S. Olivier, Sujeet Shenoi:
Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 - February 1, 2006. IFIP Advances in Information and Communication Technology 222, Springer 2006, ISBN 978-0-387-36890-0 [contents] - 2005
- [j8]Gavin Manes, Dominic Schulte, Seth Guenther, Sujeet Shenoi:
NetGlean: A Methodology for Distributed Network Security Scanning. J. Netw. Syst. Manag. 13(3): 329-344 (2005) - [c23]Mark Davis, Gavin Manes, Sujeet Shenoi:
A Network-Based Architecture for Storing Digital Evidence. IFIP Int. Conf. Digital Forensics 2005: 33-42 - [c22]Tyler Moore, Anthony Meehan, Gavin Manes, Sujeet Shenoi:
Using Signaling Information in Telecom Network Forensics. IFIP Int. Conf. Digital Forensics 2005: 177-188 - [c21]Christopher Swenson, Gavin Manes, Sujeet Shenoi:
Imaging and Analysis of GSM SIM Cards. IFIP Int. Conf. Digital Forensics 2005: 205-216 - [c20]Pavel Gershteyn, Mark Davis, Gavin Manes, Sujeet Shenoi:
Extracting Concealed Data from BIOS Chips. IFIP Int. Conf. Digital Forensics 2005: 217-230 - [c19]Scott Piper, Mark Davis, Gavin Manes, Sujeet Shenoi:
Detecting Hidden Data in Ext2/Ext3 File Systems. IFIP Int. Conf. Digital Forensics 2005: 245-256 - 2003
- [j7]John Hale
, Mauricio Papa
, Sujeet Shenoi:
Programmable Access Control. J. Comput. Secur. 11(3): 331-352 (2003) - [c18]Jon Novotny, Dominic Schulte, Gavin Manes, Sujeet Shenoi:
Remote Computer Fingerprinting for Cyber Crime Investigations. DBSec 2003: 3-15 - [c17]Mark Pollitt, Michael A. Caloyannides, Jon Novotny, Sujeet Shenoi:
Digital Forensics: Operational, Legal, and Research Issues. DBSec 2003: 393-403 - [c16]Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi:
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. SEC 2003: 349-360 - [e1]Ehud Gudes, Sujeet Shenoi:
Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK. IFIP Conference Proceedings 256, Kluwer 2003, ISBN 1-4020-7541-3 [contents] - 2001
- [j6]Mauricio Papa
, Jason Wood, Sujeet Shenoi:
Evaluating controller robustness using cell mapping. Fuzzy Sets Syst. 121(1): 3-12 (2001) - [c15]G. Lorenz, J. Keller, Gavin Manes, John Hale, Sujeet Shenoi:
Public Telephone Network Vulnerabilities. DBSec 2001: 151-164 - [c14]Mauricio Papa
, Oliver Bremer, John Hale
, Sujeet Shenoi:
Formal Analysis of E-Commerce Protocols. ISADS 2001: 19-28 - 2000
- [j5]John Hale
, Jody Threet, Sujeet Shenoi:
A Ticket-Based Access Control Architecture for Object Systems. J. Comput. Secur. 8(1): 43-65 (2000) - [c13]John Hale
, Mauricio Papa
, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi:
Extending Java for Package based Access Control. ACSAC 2000: 67-76 - [c12]Pablo Galiasso, Oliver Bremer, John Hale
, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu:
Policy Mediation for Multi-Enterprise Environments. ACSAC 2000: 100-106 - [c11]Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi:
Simulation and Analysis of Cryptographic Protocols. DBSec 2000: 89-100 - [c10]John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi:
Language Extensions for Programmable Security. DBSec 2000: 221-232
1990 – 1999
- 1999
- [c9]John Hale
, Pablo Galiasso, Mauricio Papa
, Sujeet Shenoi:
Security Policy Coordination for Heterogeneous Information Systems. ACSAC 1999: 219-228 - 1998
- [c8]John Hale, Mauricio Papa, Sujeet Shenoi:
Programmable Security for Object-Oriented Systems. DBSec 1998: 109-123 - 1997
- [c7]John Hale, Jody Threet, Sujeet Shenoi:
Capability-Based Primitives for Access Control in Object-Oriented Systems. DBSec 1997: 134-148 - [c6]M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi:
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. DBSec 1997: 385-388 - [c5]Gary Lorentz, S. Dangi, Dominic Jones, Paul Carpenter, Sujeet Shenoi:
Implementing Advanced Internet Search Engines. DBSec 1997: 389-391 - [c4]John Hale, Sujeet Shenoi:
Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery. S&P 1997: 188-199 - 1996
- [j4]John Hale
, Sujeet Shenoi:
Analyzing FD Inference in Relational Databases. Data Knowl. Eng. 18(2): 167-183 (1996) - [c3]John Hale, Jody Threet, Sujeet Shenoi:
A Framework for High Assurance Security of Distributed Objects. DBSec 1996: 101-119 - 1995
- [c2]Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi:
A Tool for Inference Detection and Knowledge Discovery in Databases. DBSec 1995: 317-332 - 1994
- [c1]John Hale, Jody Threet, Sujeet Shenoi:
A Practical Formalism for Imprecise Inference Control. DBSec 1994: 139-156 - 1992
- [j3]Sujeet Shenoi, Austin Melton, L. T. Fan:
Functional dependencies and normal forms in the fuzzy relational database model. Inf. Sci. 60(1-2): 1-28 (1992) - 1990
- [j2]Rizwan Mithani, Sujeet Shenoi, L. T. Fan, W. P. Walawender:
Ranking dimensionless groups in fluidized-bed reactor scale-up. Int. J. Approx. Reason. 4(1): 69-85 (1990) - [j1]Sujeet Shenoi, Austin Melton:
An extended version of the fuzzy relational database model. Inf. Sci. 52(1): 35-52 (1990)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-16 22:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint