2008 | ||
---|---|---|
48 | Indrajit Ray, Sujeet Shenoi: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008 Springer 2008 | |
47 | EE | Charles Adams, Anthony Whitledge, Sujeet Shenoi: Legal Issues Pertaining to the Use of Cell Phone Data. IFIP Int. Conf. Digital Forensics 2008: 231-243 |
46 | EE | Tim Kilpatrick, Jesús González, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi: Forensic analysis of SCADA systems and networks. IJSN 3(2): 95-102 (2008) |
2007 | ||
45 | Philip Craiger, Sujeet Shenoi: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, January 28-31, 2007 Springer 2007 | |
44 | Eric Goetz, Sujeet Shenoi: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007 Springer 2007 | |
43 | EE | Rodrigo Chandia, Jesús González, Tim Kilpatrick, Mauricio Papa, Sujeet Shenoi: Security Strategies for SCADA Networks. Critical Infrastructure Protection 2007: 117-131 |
42 | EE | Janica Edmonds, Mauricio Papa, Sujeet Shenoi: Security Analysis of Multilayer SCADA Protocols. Critical Infrastructure Protection 2007: 205-221 |
41 | EE | Christopher Swenson, Charles Adams, Anthony Whitledge, Sujeet Shenoi: On the Legality of Analyzing Telephone Call Records. IFIP Int. Conf. Digital Forensics 2007: 21-39 |
40 | EE | Christopher Swenson, Raquel Phillips, Sujeet Shenoi: File System Journal Forensics. IFIP Int. Conf. Digital Forensics 2007: 231-244 |
2006 | ||
39 | Martin S. Olivier, Sujeet Shenoi: Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 - February 1, 2006 Springer 2006 | |
38 | Mark Pollitt, Sujeet Shenoi: Advances in Digital Forensics, IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005 Springer 2006 | |
37 | Mark Davis, Richard Kennedy, Kristina Pyles, Amanda Strickler, Sujeet Shenoi: Detecting Data Concealment Programs Using File System Analysis. IFIP Int. Conf. Digital Forensics 2006: 171-183 | |
36 | Christopher Swenson, Tyler Moore, Sujeet Shenoi: GSM Cell Site Forensics. IFIP Int. Conf. Digital Forensics 2006: 259-272 | |
35 | Tim Kilpatrick, Jesús González, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi: An Architecture for SCADA Network Forensics. IFIP Int. Conf. Digital Forensics 2006: 273-285 | |
34 | Pavel Gershteyn, Mark Davis, Sujeet Shenoi: Forensic Analysis of BIOS Chips. IFIP Int. Conf. Digital Forensics 2006: 301-314 | |
33 | Scott Piper, Mark Davis, Sujeet Shenoi: Countering Hostile Forensic Techniques. IFIP Int. Conf. Digital Forensics 2006: 79-90 | |
2005 | ||
32 | Tyler Moore, Anthony Meehan, Gavin Manes, Sujeet Shenoi: Using Signaling Information in Telecom Network Forensics. IFIP Int. Conf. Digital Forensics 2005: 177-188 | |
31 | Christopher Swenson, Gavin Manes, Sujeet Shenoi: Imaging and Analysis of GSM SIM Cards. IFIP Int. Conf. Digital Forensics 2005: 205-216 | |
30 | Pavel Gershteyn, Mark Davis, Gavin Manes, Sujeet Shenoi: Extracting Concealed Data from BIOS Chips. IFIP Int. Conf. Digital Forensics 2005: 217-230 | |
29 | Scott Piper, Mark Davis, Gavin Manes, Sujeet Shenoi: Detecting Hidden Data in Ext2/Ext3 File Systems. IFIP Int. Conf. Digital Forensics 2005: 245-256 | |
28 | Mark Davis, Gavin Manes, Sujeet Shenoi: A Network-Based Architecture for Storing Digital Evidence. IFIP Int. Conf. Digital Forensics 2005: 33-42 | |
27 | EE | Gavin Manes, Dominic Schulte, Seth Guenther, Sujeet Shenoi: NetGlean: A Methodology for Distributed Network Security Scanning. J. Network Syst. Manage. 13(3): 329-344 (2005) |
2003 | ||
26 | Ehud Gudes, Sujeet Shenoi: Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK Kluwer 2003 | |
25 | Jon Novotny, Dominic Schulte, Gavin Manes, Sujeet Shenoi: Remote Computer Fingerprinting for Cyber Crime Investigations. DBSec 2003: 3-15 | |
24 | Mark Pollitt, Michael Caloyannides, Jon Novotny, Sujeet Shenoi: Digital Forensics: Operational, Legal, and Research Issues. DBSec 2003: 393-403 | |
23 | Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi: Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. SEC 2003: 349-360 | |
22 | John Hale, Mauricio Papa, Sujeet Shenoi: Programmable Access Control. Journal of Computer Security 11(3): 331-352 (2003) | |
2001 | ||
21 | G. Lorenz, J. Keller, Gavin Manes, John Hale, Sujeet Shenoi: Public Telephone Network Vulnerabilities. DBSec 2001: 151-164 | |
20 | EE | Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi: Formal Analysis of E-Commerce Protocols. ISADS 2001: 19-28 |
19 | EE | Mauricio Papa, Jason Wood, Sujeet Shenoi: Evaluating controller robustness using cell mapping. Fuzzy Sets and Systems 121(1): 3-12 (2001) |
2000 | ||
18 | EE | Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu: Policy Mediation for Multi-Enterprise Environments. ACSAC 2000: 100-106 |
17 | EE | John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi: Extending Java for Package based Access Control. ACSAC 2000: 67-76 |
16 | John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi: Language Extensions for Programmable Security. DBSec 2000: 221-232 | |
15 | Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi: Simulation and Analysis of Cryptographic Protocols. DBSec 2000: 89-100 | |
14 | John Hale, Jody Threet, Sujeet Shenoi: A Ticket-Based Access Control Architecture for Object Systems. Journal of Computer Security 8(1): (2000) | |
1999 | ||
13 | EE | John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi: Security Policy Coordination for Heterogeneous Information Systems. ACSAC 1999: 219-228 |
1998 | ||
12 | John Hale, Mauricio Papa, Sujeet Shenoi: Programmable Security for Object-Oriented Systems. DBSec 1998: 109-123 | |
1997 | ||
11 | John Hale, Jody Threet, Sujeet Shenoi: Capability-Based Primitives for Access Control in Object-Oriented Systems. DBSec 1997: 134-148 | |
10 | M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi: An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. DBSec 1997: 385-388 | |
9 | G. Lorentz, S. Dangi, D. Jones, P. Carpenter, Sujeet Shenoi: Implementing Advanced Internet Search Engines. DBSec 1997: 389-391 | |
8 | EE | John Hale, Sujeet Shenoi: Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery. IEEE Symposium on Security and Privacy 1997: 188-199 |
1996 | ||
7 | J. Halle, Jody Threet, Sujeet Shenoi: A Framework for High Assurance Security of Distributed Objects. DBSec 1996: 101-119 | |
6 | EE | John Hale, Sujeet Shenoi: Analyzing FD Inference in Relational Databases. Data Knowl. Eng. 18(2): 167-183 (1996) |
1995 | ||
5 | Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi: A Tool for Inference Detection and Knowledge Discovery in Databases. DBSec 1995: 317-332 | |
1994 | ||
4 | John Hale, Jody Threet, Sujeet Shenoi: A Practical Formalism for Imprecise Inference Control. DBSec 1994: 139-156 | |
1992 | ||
3 | EE | Sujeet Shenoi, Austin Melton, L. T. Fan: Functional dependencies and normal forms in the fuzzy relational database model. Inf. Sci. 60(1-2): 1-28 (1992) |
1990 | ||
2 | EE | Sujeet Shenoi, Austin Melton: An extended version of the fuzzy relational database model. Inf. Sci. 52(1): 35-52 (1990) |
1 | EE | Rizwan Mithani, Sujeet Shenoi, L. T. Fan, W. P. Walawender: Ranking dimensionless groups in fluidized-bed reactor scale-up. Int. J. Approx. Reasoning 4(1): 69-85 (1990) |