2008 |
48 | | Indrajit Ray,
Sujeet Shenoi:
Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008
Springer 2008 |
47 | EE | Charles Adams,
Anthony Whitledge,
Sujeet Shenoi:
Legal Issues Pertaining to the Use of Cell Phone Data.
IFIP Int. Conf. Digital Forensics 2008: 231-243 |
46 | EE | Tim Kilpatrick,
Jesús González,
Rodrigo Chandia,
Mauricio Papa,
Sujeet Shenoi:
Forensic analysis of SCADA systems and networks.
IJSN 3(2): 95-102 (2008) |
2007 |
45 | | Philip Craiger,
Sujeet Shenoi:
Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, January 28-31, 2007
Springer 2007 |
44 | | Eric Goetz,
Sujeet Shenoi:
Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007
Springer 2007 |
43 | EE | Rodrigo Chandia,
Jesús González,
Tim Kilpatrick,
Mauricio Papa,
Sujeet Shenoi:
Security Strategies for SCADA Networks.
Critical Infrastructure Protection 2007: 117-131 |
42 | EE | Janica Edmonds,
Mauricio Papa,
Sujeet Shenoi:
Security Analysis of Multilayer SCADA Protocols.
Critical Infrastructure Protection 2007: 205-221 |
41 | EE | Christopher Swenson,
Charles Adams,
Anthony Whitledge,
Sujeet Shenoi:
On the Legality of Analyzing Telephone Call Records.
IFIP Int. Conf. Digital Forensics 2007: 21-39 |
40 | EE | Christopher Swenson,
Raquel Phillips,
Sujeet Shenoi:
File System Journal Forensics.
IFIP Int. Conf. Digital Forensics 2007: 231-244 |
2006 |
39 | | Martin S. Olivier,
Sujeet Shenoi:
Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 - February 1, 2006
Springer 2006 |
38 | | Mark Pollitt,
Sujeet Shenoi:
Advances in Digital Forensics, IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005
Springer 2006 |
37 | | Mark Davis,
Richard Kennedy,
Kristina Pyles,
Amanda Strickler,
Sujeet Shenoi:
Detecting Data Concealment Programs Using File System Analysis.
IFIP Int. Conf. Digital Forensics 2006: 171-183 |
36 | | Christopher Swenson,
Tyler Moore,
Sujeet Shenoi:
GSM Cell Site Forensics.
IFIP Int. Conf. Digital Forensics 2006: 259-272 |
35 | | Tim Kilpatrick,
Jesús González,
Rodrigo Chandia,
Mauricio Papa,
Sujeet Shenoi:
An Architecture for SCADA Network Forensics.
IFIP Int. Conf. Digital Forensics 2006: 273-285 |
34 | | Pavel Gershteyn,
Mark Davis,
Sujeet Shenoi:
Forensic Analysis of BIOS Chips.
IFIP Int. Conf. Digital Forensics 2006: 301-314 |
33 | | Scott Piper,
Mark Davis,
Sujeet Shenoi:
Countering Hostile Forensic Techniques.
IFIP Int. Conf. Digital Forensics 2006: 79-90 |
2005 |
32 | | Tyler Moore,
Anthony Meehan,
Gavin Manes,
Sujeet Shenoi:
Using Signaling Information in Telecom Network Forensics.
IFIP Int. Conf. Digital Forensics 2005: 177-188 |
31 | | Christopher Swenson,
Gavin Manes,
Sujeet Shenoi:
Imaging and Analysis of GSM SIM Cards.
IFIP Int. Conf. Digital Forensics 2005: 205-216 |
30 | | Pavel Gershteyn,
Mark Davis,
Gavin Manes,
Sujeet Shenoi:
Extracting Concealed Data from BIOS Chips.
IFIP Int. Conf. Digital Forensics 2005: 217-230 |
29 | | Scott Piper,
Mark Davis,
Gavin Manes,
Sujeet Shenoi:
Detecting Hidden Data in Ext2/Ext3 File Systems.
IFIP Int. Conf. Digital Forensics 2005: 245-256 |
28 | | Mark Davis,
Gavin Manes,
Sujeet Shenoi:
A Network-Based Architecture for Storing Digital Evidence.
IFIP Int. Conf. Digital Forensics 2005: 33-42 |
27 | EE | Gavin Manes,
Dominic Schulte,
Seth Guenther,
Sujeet Shenoi:
NetGlean: A Methodology for Distributed Network Security Scanning.
J. Network Syst. Manage. 13(3): 329-344 (2005) |
2003 |
26 | | Ehud Gudes,
Sujeet Shenoi:
Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK
Kluwer 2003 |
25 | | Jon Novotny,
Dominic Schulte,
Gavin Manes,
Sujeet Shenoi:
Remote Computer Fingerprinting for Cyber Crime Investigations.
DBSec 2003: 3-15 |
24 | | Mark Pollitt,
Michael Caloyannides,
Jon Novotny,
Sujeet Shenoi:
Digital Forensics: Operational, Legal, and Research Issues.
DBSec 2003: 393-403 |
23 | | Mauricio Papa,
Oliver Bremer,
John Hale,
Sujeet Shenoi:
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis.
SEC 2003: 349-360 |
22 | | John Hale,
Mauricio Papa,
Sujeet Shenoi:
Programmable Access Control.
Journal of Computer Security 11(3): 331-352 (2003) |
2001 |
21 | | G. Lorenz,
J. Keller,
Gavin Manes,
John Hale,
Sujeet Shenoi:
Public Telephone Network Vulnerabilities.
DBSec 2001: 151-164 |
20 | EE | Mauricio Papa,
Oliver Bremer,
John Hale,
Sujeet Shenoi:
Formal Analysis of E-Commerce Protocols.
ISADS 2001: 19-28 |
19 | EE | Mauricio Papa,
Jason Wood,
Sujeet Shenoi:
Evaluating controller robustness using cell mapping.
Fuzzy Sets and Systems 121(1): 3-12 (2001) |
2000 |
18 | EE | Pablo Galiasso,
Oliver Bremer,
John Hale,
Sujeet Shenoi,
David F. Ferraiolo,
Vincent C. Hu:
Policy Mediation for Multi-Enterprise Environments.
ACSAC 2000: 100-106 |
17 | EE | John Hale,
Mauricio Papa,
Oliver Bremer,
Rodrigo Chandia,
Sujeet Shenoi:
Extending Java for Package based Access Control.
ACSAC 2000: 67-76 |
16 | | John Hale,
Rodrigo Chandia,
Clinton Campbell,
Sujeet Shenoi:
Language Extensions for Programmable Security.
DBSec 2000: 221-232 |
15 | | Mauricio Papa,
Oliver Bremer,
Stephen Magill,
John Hale,
Sujeet Shenoi:
Simulation and Analysis of Cryptographic Protocols.
DBSec 2000: 89-100 |
14 | | John Hale,
Jody Threet,
Sujeet Shenoi:
A Ticket-Based Access Control Architecture for Object Systems.
Journal of Computer Security 8(1): (2000) |
1999 |
13 | EE | John Hale,
Pablo Galiasso,
Mauricio Papa,
Sujeet Shenoi:
Security Policy Coordination for Heterogeneous Information Systems.
ACSAC 1999: 219-228 |
1998 |
12 | | John Hale,
Mauricio Papa,
Sujeet Shenoi:
Programmable Security for Object-Oriented Systems.
DBSec 1998: 109-123 |
1997 |
11 | | John Hale,
Jody Threet,
Sujeet Shenoi:
Capability-Based Primitives for Access Control in Object-Oriented Systems.
DBSec 1997: 134-148 |
10 | | M. Berryman,
C. Rummel,
Mauricio Papa,
John Hale,
Jody Threet,
Sujeet Shenoi:
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.
DBSec 1997: 385-388 |
9 | | G. Lorentz,
S. Dangi,
D. Jones,
P. Carpenter,
Sujeet Shenoi:
Implementing Advanced Internet Search Engines.
DBSec 1997: 389-391 |
8 | EE | John Hale,
Sujeet Shenoi:
Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery.
IEEE Symposium on Security and Privacy 1997: 188-199 |
1996 |
7 | | J. Halle,
Jody Threet,
Sujeet Shenoi:
A Framework for High Assurance Security of Distributed Objects.
DBSec 1996: 101-119 |
6 | EE | John Hale,
Sujeet Shenoi:
Analyzing FD Inference in Relational Databases.
Data Knowl. Eng. 18(2): 167-183 (1996) |
1995 |
5 | | Surath Rath,
Dominic Jones,
John Hale,
Sujeet Shenoi:
A Tool for Inference Detection and Knowledge Discovery in Databases.
DBSec 1995: 317-332 |
1994 |
4 | | John Hale,
Jody Threet,
Sujeet Shenoi:
A Practical Formalism for Imprecise Inference Control.
DBSec 1994: 139-156 |
1992 |
3 | EE | Sujeet Shenoi,
Austin Melton,
L. T. Fan:
Functional dependencies and normal forms in the fuzzy relational database model.
Inf. Sci. 60(1-2): 1-28 (1992) |
1990 |
2 | EE | Sujeet Shenoi,
Austin Melton:
An extended version of the fuzzy relational database model.
Inf. Sci. 52(1): 35-52 (1990) |
1 | EE | Rizwan Mithani,
Sujeet Shenoi,
L. T. Fan,
W. P. Walawender:
Ranking dimensionless groups in fluidized-bed reactor scale-up.
Int. J. Approx. Reasoning 4(1): 69-85 (1990) |