From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Shenoi, Sujeet
add a person with the name Shenoi, Sujeet
 

Другие публикации лиц с тем же именем

Public Telephone Network Vulnerabilities., , , , и . DBSec, том 215 из IFIP Conference Proceedings, стр. 151-164. Kluwer, (2001)Extracting Concealed Data from BIOS Chips., , , и . IFIP Int. Conf. Digital Forensics, том 194 из IFIP, стр. 217-230. Springer, (2005)A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures., , и . Critical Infrastructure Protection, том 686 из IFIP Advances in Information and Communication Technology, стр. 195-220. Springer, (2023)Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems., , , , , , и . Critical Infrastructure Protection, том 666 из IFIP Advances in Information and Communication Technology, стр. 121-153. Springer, (2022)Analyzing FD Inference in Relational Databases., и . Data Knowl. Eng., 18 (2): 167-183 (1996)Formal Analysis of E-Commerce Protocols., , , и . ISADS, стр. 19-28. IEEE Computer Society, (2001)Evaluating controller robustness using cell mapping., , и . Fuzzy Sets Syst., 121 (1): 3-12 (2001)Security Policy Coordination for Heterogeneous Information Systems., , , и . ACSAC, стр. 219-228. IEEE Computer Society, (1999)Remote Computer Fingerprinting for Cyber Crime Investigations., , , и . DBSec, том 142 из IFIP, стр. 3-15. Kluwer/Springer, (2003)Digital Forensics: Operational, Legal, and Research Issues., , , и . DBSec, том 142 из IFIP, стр. 393-403. Kluwer/Springer, (2003)