dblp.uni-trier.dewww.uni-trier.de

Sujeet Shenoi

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
48 Indrajit Ray, Sujeet Shenoi: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008 Springer 2008
47EECharles Adams, Anthony Whitledge, Sujeet Shenoi: Legal Issues Pertaining to the Use of Cell Phone Data. IFIP Int. Conf. Digital Forensics 2008: 231-243
46EETim Kilpatrick, Jesús González, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi: Forensic analysis of SCADA systems and networks. IJSN 3(2): 95-102 (2008)
2007
45 Philip Craiger, Sujeet Shenoi: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, January 28-31, 2007 Springer 2007
44 Eric Goetz, Sujeet Shenoi: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007 Springer 2007
43EERodrigo Chandia, Jesús González, Tim Kilpatrick, Mauricio Papa, Sujeet Shenoi: Security Strategies for SCADA Networks. Critical Infrastructure Protection 2007: 117-131
42EEJanica Edmonds, Mauricio Papa, Sujeet Shenoi: Security Analysis of Multilayer SCADA Protocols. Critical Infrastructure Protection 2007: 205-221
41EEChristopher Swenson, Charles Adams, Anthony Whitledge, Sujeet Shenoi: On the Legality of Analyzing Telephone Call Records. IFIP Int. Conf. Digital Forensics 2007: 21-39
40EEChristopher Swenson, Raquel Phillips, Sujeet Shenoi: File System Journal Forensics. IFIP Int. Conf. Digital Forensics 2007: 231-244
2006
39 Martin S. Olivier, Sujeet Shenoi: Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 - February 1, 2006 Springer 2006
38 Mark Pollitt, Sujeet Shenoi: Advances in Digital Forensics, IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005 Springer 2006
37 Mark Davis, Richard Kennedy, Kristina Pyles, Amanda Strickler, Sujeet Shenoi: Detecting Data Concealment Programs Using File System Analysis. IFIP Int. Conf. Digital Forensics 2006: 171-183
36 Christopher Swenson, Tyler Moore, Sujeet Shenoi: GSM Cell Site Forensics. IFIP Int. Conf. Digital Forensics 2006: 259-272
35 Tim Kilpatrick, Jesús González, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi: An Architecture for SCADA Network Forensics. IFIP Int. Conf. Digital Forensics 2006: 273-285
34 Pavel Gershteyn, Mark Davis, Sujeet Shenoi: Forensic Analysis of BIOS Chips. IFIP Int. Conf. Digital Forensics 2006: 301-314
33 Scott Piper, Mark Davis, Sujeet Shenoi: Countering Hostile Forensic Techniques. IFIP Int. Conf. Digital Forensics 2006: 79-90
2005
32 Tyler Moore, Anthony Meehan, Gavin Manes, Sujeet Shenoi: Using Signaling Information in Telecom Network Forensics. IFIP Int. Conf. Digital Forensics 2005: 177-188
31 Christopher Swenson, Gavin Manes, Sujeet Shenoi: Imaging and Analysis of GSM SIM Cards. IFIP Int. Conf. Digital Forensics 2005: 205-216
30 Pavel Gershteyn, Mark Davis, Gavin Manes, Sujeet Shenoi: Extracting Concealed Data from BIOS Chips. IFIP Int. Conf. Digital Forensics 2005: 217-230
29 Scott Piper, Mark Davis, Gavin Manes, Sujeet Shenoi: Detecting Hidden Data in Ext2/Ext3 File Systems. IFIP Int. Conf. Digital Forensics 2005: 245-256
28 Mark Davis, Gavin Manes, Sujeet Shenoi: A Network-Based Architecture for Storing Digital Evidence. IFIP Int. Conf. Digital Forensics 2005: 33-42
27EEGavin Manes, Dominic Schulte, Seth Guenther, Sujeet Shenoi: NetGlean: A Methodology for Distributed Network Security Scanning. J. Network Syst. Manage. 13(3): 329-344 (2005)
2003
26 Ehud Gudes, Sujeet Shenoi: Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK Kluwer 2003
25 Jon Novotny, Dominic Schulte, Gavin Manes, Sujeet Shenoi: Remote Computer Fingerprinting for Cyber Crime Investigations. DBSec 2003: 3-15
24 Mark Pollitt, Michael Caloyannides, Jon Novotny, Sujeet Shenoi: Digital Forensics: Operational, Legal, and Research Issues. DBSec 2003: 393-403
23 Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi: Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. SEC 2003: 349-360
22 John Hale, Mauricio Papa, Sujeet Shenoi: Programmable Access Control. Journal of Computer Security 11(3): 331-352 (2003)
2001
21 G. Lorenz, J. Keller, Gavin Manes, John Hale, Sujeet Shenoi: Public Telephone Network Vulnerabilities. DBSec 2001: 151-164
20EEMauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi: Formal Analysis of E-Commerce Protocols. ISADS 2001: 19-28
19EEMauricio Papa, Jason Wood, Sujeet Shenoi: Evaluating controller robustness using cell mapping. Fuzzy Sets and Systems 121(1): 3-12 (2001)
2000
18EEPablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu: Policy Mediation for Multi-Enterprise Environments. ACSAC 2000: 100-106
17EEJohn Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi: Extending Java for Package based Access Control. ACSAC 2000: 67-76
16 John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi: Language Extensions for Programmable Security. DBSec 2000: 221-232
15 Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi: Simulation and Analysis of Cryptographic Protocols. DBSec 2000: 89-100
14 John Hale, Jody Threet, Sujeet Shenoi: A Ticket-Based Access Control Architecture for Object Systems. Journal of Computer Security 8(1): (2000)
1999
13EEJohn Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi: Security Policy Coordination for Heterogeneous Information Systems. ACSAC 1999: 219-228
1998
12 John Hale, Mauricio Papa, Sujeet Shenoi: Programmable Security for Object-Oriented Systems. DBSec 1998: 109-123
1997
11 John Hale, Jody Threet, Sujeet Shenoi: Capability-Based Primitives for Access Control in Object-Oriented Systems. DBSec 1997: 134-148
10 M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi: An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. DBSec 1997: 385-388
9 G. Lorentz, S. Dangi, D. Jones, P. Carpenter, Sujeet Shenoi: Implementing Advanced Internet Search Engines. DBSec 1997: 389-391
8EEJohn Hale, Sujeet Shenoi: Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery. IEEE Symposium on Security and Privacy 1997: 188-199
1996
7 J. Halle, Jody Threet, Sujeet Shenoi: A Framework for High Assurance Security of Distributed Objects. DBSec 1996: 101-119
6EEJohn Hale, Sujeet Shenoi: Analyzing FD Inference in Relational Databases. Data Knowl. Eng. 18(2): 167-183 (1996)
1995
5 Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi: A Tool for Inference Detection and Knowledge Discovery in Databases. DBSec 1995: 317-332
1994
4 John Hale, Jody Threet, Sujeet Shenoi: A Practical Formalism for Imprecise Inference Control. DBSec 1994: 139-156
1992
3EESujeet Shenoi, Austin Melton, L. T. Fan: Functional dependencies and normal forms in the fuzzy relational database model. Inf. Sci. 60(1-2): 1-28 (1992)
1990
2EESujeet Shenoi, Austin Melton: An extended version of the fuzzy relational database model. Inf. Sci. 52(1): 35-52 (1990)
1EERizwan Mithani, Sujeet Shenoi, L. T. Fan, W. P. Walawender: Ranking dimensionless groups in fluidized-bed reactor scale-up. Int. J. Approx. Reasoning 4(1): 69-85 (1990)

Coauthor Index

1Charles Adams [41] [47]
2M. Berryman [10]
3Oliver Bremer [15] [17] [18] [20] [23]
4Michael Caloyannides [24]
5Clinton Campbell [16]
6P. Carpenter [9]
7Rodrigo Chandia [16] [17] [35] [43] [46]
8J. Philip Craiger (Philip Craiger) [45]
9S. Dangi [9]
10Mark Davis [28] [29] [30] [33] [34] [37]
11Janica Edmonds [42]
12L. T. Fan [1] [3]
13David F. Ferraiolo [18]
14Pablo Galiasso [13] [18]
15Pavel Gershteyn [30] [34]
16Eric Goetz [44]
17Jesús González [35] [43] [46]
18Ehud Gudes [26]
19Seth Guenther [27]
20John Hale [4] [5] [6] [8] [10] [11] [12] [13] [14] [15] [16] [17] [18] [20] [21] [22] [23]
21J. Halle [7]
22Vincent C. Hu [18]
23D. Jones [9]
24Dominic Jones [5]
25J. Keller [21]
26Richard Kennedy [37]
27Tim Kilpatrick [35] [43] [46]
28G. Lorentz [9]
29G. Lorenz [21]
30Stephen Magill [15]
31Gavin Manes [21] [25] [27] [28] [29] [30] [31] [32]
32Anthony Meehan [32]
33Austin Melton [2] [3]
34Rizwan Mithani [1]
35Tyler Moore [32] [36]
36Jon Novotny [24] [25]
37Martin S. Olivier [39]
38Mauricio Papa [10] [12] [13] [15] [17] [19] [20] [22] [23] [35] [42] [43] [46]
39Raquel Phillips [40]
40Scott Piper [29] [33]
41Mark Pollitt [24] [38]
42Kristina Pyles [37]
43Surath Rath [5]
44Indrajit Ray [48]
45C. Rummel [10]
46Dominic Schulte [25] [27]
47Amanda Strickler [37]
48Christopher Swenson [31] [36] [40] [41]
49Jody Threet [4] [7] [10] [11] [14]
50W. P. Walawender [1]
51Anthony Whitledge [41] [47]
52Jason Wood [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)