Sujeet Shenoi

Orcid: 0000-0002-6420-8922

According to our database1, Sujeet Shenoi authored at least 74 papers between 1990 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems.
Int. J. Crit. Infrastructure Prot., March, 2023

Towards Direct-Control Data Acquisition by Nano-Probing Non-Volatile Memory Cells.
Proceedings of the Advances in Digital Forensics XIX, 2023

Smart-Grid-Enabled Business Cases and the Consequences of Cyber Attacks.
Proceedings of the Critical Infrastructure Protection XVII, 2023

A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures.
Proceedings of the Critical Infrastructure Protection XVII, 2023

Real-Time Attack Detection in Modern Automobile Controller Area Networks.
Proceedings of the Critical Infrastructure Protection XVII, 2023

2022
Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems.
Proceedings of the Critical Infrastructure Protection XVI, 2022

Manipulation of G-Code Toolpath Files in 3D Printers: Attacks and Mitigations.
Proceedings of the Critical Infrastructure Protection XVI, 2022

Detecting Part Anomalies Induced by Cyber Attacks on a Powder BED Fusion Additive Manufacturing System.
Proceedings of the Critical Infrastructure Protection XVI, 2022

2019
Retrofitting Mobile Devices for Capturing Memory-Resident Malware Based on System Side-Effects.
Proceedings of the Advances in Digital Forensics XV, 2019

Securing Wireless Coprocessors from Attacks in the Internet of Things.
Proceedings of the Critical Infrastructure Protection XIII, 2019

2017
Wind farm security: attack surface, targets, scenarios and mitigation.
Int. J. Crit. Infrastructure Prot., 2017

Security analysis of an advanced metering infrastructure.
Int. J. Crit. Infrastructure Prot., 2017

Categorizing Mobile Device Malware Based on System Side-Effects.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

2014
Editorial.
Int. J. Crit. Infrastructure Prot., 2014

Whither cyberpower?
Int. J. Crit. Infrastructure Prot., 2014

The anatomy of a cyber power.
Int. J. Crit. Infrastructure Prot., 2014

2012
Implementing novel reactive defense functionality in MPLS networks using hyperspeed signaling.
Int. J. Crit. Infrastructure Prot., 2012

2011
May the US government monitor private critical infrastructure assets to combat foreign cyberspace threats?
Int. J. Crit. Infrastructure Prot., 2011

A signaling framework to deter aggression in cyberspace.
Int. J. Crit. Infrastructure Prot., 2011

Using Deception to Shield Cyberspace Sensors.
Proceedings of the Critical Infrastructure Protection V, 2011

Implementing Novel Defense Functionality in MPLS Networks Using Hyperspeed Signaling.
Proceedings of the Critical Infrastructure Protection V, 2011

2010
Applying public health strategies to the protection of cyberspace.
Int. J. Crit. Infrastructure Prot., 2010

An analysis of the legality of government-mandated computer inoculations.
Int. J. Crit. Infrastructure Prot., 2010

Security Analysis of the MPLS Label Distribution Protocol.
Proceedings of the Critical Infrastructure Protection IV, 2010

Modeling Control System Failures and Attacks - The Waterloo Campaign to Oil Pipelines.
Proceedings of the Critical Infrastructure Protection IV, 2010

2009
Analysis of security threats to MPLS virtual private networks.
Int. J. Crit. Infrastructure Prot., 2009

Password Cracking Using Sony Playstations.
Proceedings of the Advances in Digital Forensics V, 2009

A Taxonomy of Attacks on the DNP3 Protocol.
Proceedings of the Critical Infrastructure Protection III, 2009

Providing Situational Awareness for Pipeline Control Operations.
Proceedings of the Critical Infrastructure Protection III, 2009

2008
Forensic analysis of SCADA systems and networks.
Int. J. Secur. Networks, 2008

Security analysis of RSVP-TE signaling in MPLS networks.
Int. J. Crit. Infrastructure Prot., 2008

Attack taxonomies for the Modbus protocols.
Int. J. Crit. Infrastructure Prot., 2008

Legal Issues Pertaining to the Use of Cell Phone Data.
Proceedings of the Advances in Digital Forensics IV, 2008

Assessing The Integrity Of Field Devices In Modbus Networks.
Proceedings of the Critical Infrastructure Protection II, 2008

2007
File System Journal Forensics.
Proceedings of the Advances in Digital Forensics III, 2007

On the Legality of Analyzing Telephone Call Records.
Proceedings of the Advances in Digital Forensics III, 2007

Security Analysis of Multilayer SCADA Protocols.
Proceedings of the Critical Infrastructure Protection, 2007

Security Strategies for SCADA Networks.
Proceedings of the Critical Infrastructure Protection, 2007

2006
GSM Cell Site Forensics.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

Countering Hostile Forensic Techniques.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

An Architecture for SCADA Network Forensics.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

Forensic Analysis of BIOS Chips.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

Detecting Data Concealment Programs Using File System Analysis.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

2005
NetGlean: A Methodology for Distributed Network Security Scanning.
J. Netw. Syst. Manag., 2005

Imaging and Analysis of GSM SIM Cards.
Proceedings of the Advances in Digital Forensics, 2005

Detecting Hidden Data in Ext2/Ext3 File Systems.
Proceedings of the Advances in Digital Forensics, 2005

Using Signaling Information in Telecom Network Forensics.
Proceedings of the Advances in Digital Forensics, 2005

Extracting Concealed Data from BIOS Chips.
Proceedings of the Advances in Digital Forensics, 2005

A Network-Based Architecture for Storing Digital Evidence.
Proceedings of the Advances in Digital Forensics, 2005

2003
Programmable Access Control.
J. Comput. Secur., 2003

Integrating Logics and Process Calculi for Cryptographic Protocol Analysis.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Digital Forensics: Operational, Legal, and Research Issues.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Remote Computer Fingerprinting for Cyber Crime Investigations.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

2001
Evaluating controller robustness using cell mapping.
Fuzzy Sets Syst., 2001

Formal Analysis of E-Commerce Protocols.
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001

Public Telephone Network Vulnerabilities.
Proceedings of the Database and Application Security XV, 2001

2000
A Ticket-Based Access Control Architecture for Object Systems.
J. Comput. Secur., 2000

Simulation and Analysis of Cryptographic Protocols.
Proceedings of the Data and Application Security, 2000

Language Extensions for Programmable Security.
Proceedings of the Data and Application Security, 2000

Extending Java for Package based Access Control.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

Policy Mediation for Multi-Enterprise Environments.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Security Policy Coordination for Heterogeneous Information Systems.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Programmable Security for Object-Oriented Systems.
Proceedings of the Database Security XII: Status and Prospects, 1998

1997
Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Implementing Advanced Internet Search Engines.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Capability-Based Primitives for Access Control in Object-Oriented Systems.
Proceedings of the Database Securty XI: Status and Prospects, 1997

An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.
Proceedings of the Database Securty XI: Status and Prospects, 1997

1996
Analyzing FD Inference in Relational Databases.
Data Knowl. Eng., 1996

A Framework for High Assurance Security of Distributed Objects.
Proceedings of the Database Security Volume X, 1996

1995
A Tool for Inference Detection and Knowledge Discovery in Databases.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
A Practical Formalism for Imprecise Inference Control.
Proceedings of the Database Security, 1994

1992
Functional dependencies and normal forms in the fuzzy relational database model.
Inf. Sci., 1992

1990
An extended version of the fuzzy relational database model.
Inf. Sci., 1990

Ranking dimensionless groups in fluidized-bed reactor scale-up.
Int. J. Approx. Reason., 1990


  Loading...