From post

Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems.

, , , , , , и . Critical Infrastructure Protection, том 666 из IFIP Advances in Information and Communication Technology, стр. 121-153. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Shenoi, Sujeet
add a person with the name Shenoi, Sujeet
 

Другие публикации лиц с тем же именем

Functional dependencies and normal forms in the fuzzy relational database model., , и . Inf. Sci., 60 (1-2): 1-28 (1992)Assessing The Integrity Of Field Devices In Modbus Networks., , , , и . Critical Infrastructure Protection, том 290 из IFIP Advances in Information and Communication Technology, стр. 115-128. Springer, (2008)Implementing Novel Defense Functionality in MPLS Networks Using Hyperspeed Signaling., , и . Critical Infrastructure Protection, том 367 из IFIP Advances in Information and Communication Technology, стр. 91-106. Springer, (2011)Remote Computer Fingerprinting for Cyber Crime Investigations., , , и . DBSec, том 142 из IFIP, стр. 3-15. Kluwer/Springer, (2003)Digital Forensics: Operational, Legal, and Research Issues., , , и . DBSec, том 142 из IFIP, стр. 393-403. Kluwer/Springer, (2003)Retrofitting Mobile Devices for Capturing Memory-Resident Malware Based on System Side-Effects., , и . IFIP Int. Conf. Digital Forensics, том 569 из IFIP Advances in Information and Communication Technology, стр. 59-72. Springer, (2019)An Architecture for SCADA Network Forensics., , , , и . IFIP Int. Conf. Digital Forensics, том 222 из IFIP Advances in Information and Communication Technology, стр. 273-285. Springer, (2006)Countering Hostile Forensic Techniques., , и . IFIP Int. Conf. Digital Forensics, том 222 из IFIP Advances in Information and Communication Technology, стр. 79-90. Springer, (2006)Security analysis of RSVP-TE signaling in MPLS networks., , , и . Int. J. Crit. Infrastructure Prot., (2008)Language Extensions for Programmable Security., , , и . DBSec, том 201 из IFIP Conference Proceedings, стр. 221-232. Kluwer, (2000)