From post

An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.

, , , , , и . DBSec, том 113 из IFIP Conference Proceedings, стр. 385-388. Chapman & Hall, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Shenoi, Sujeet
add a person with the name Shenoi, Sujeet
 

Другие публикации лиц с тем же именем

Implementing Novel Defense Functionality in MPLS Networks Using Hyperspeed Signaling., , и . Critical Infrastructure Protection, том 367 из IFIP Advances in Information and Communication Technology, стр. 91-106. Springer, (2011)Assessing The Integrity Of Field Devices In Modbus Networks., , , , и . Critical Infrastructure Protection, том 290 из IFIP Advances in Information and Communication Technology, стр. 115-128. Springer, (2008)Remote Computer Fingerprinting for Cyber Crime Investigations., , , и . DBSec, том 142 из IFIP, стр. 3-15. Kluwer/Springer, (2003)Digital Forensics: Operational, Legal, and Research Issues., , , и . DBSec, том 142 из IFIP, стр. 393-403. Kluwer/Springer, (2003)An Architecture for SCADA Network Forensics., , , , и . IFIP Int. Conf. Digital Forensics, том 222 из IFIP Advances in Information and Communication Technology, стр. 273-285. Springer, (2006)Countering Hostile Forensic Techniques., , и . IFIP Int. Conf. Digital Forensics, том 222 из IFIP Advances in Information and Communication Technology, стр. 79-90. Springer, (2006)Security analysis of RSVP-TE signaling in MPLS networks., , , и . Int. J. Crit. Infrastructure Prot., (2008)Retrofitting Mobile Devices for Capturing Memory-Resident Malware Based on System Side-Effects., , и . IFIP Int. Conf. Digital Forensics, том 569 из IFIP Advances in Information and Communication Technology, стр. 59-72. Springer, (2019)Functional dependencies and normal forms in the fuzzy relational database model., , и . Inf. Sci., 60 (1-2): 1-28 (1992)Manipulation of G-Code Toolpath Files in 3D Printers: Attacks and Mitigations., , , , , и . Critical Infrastructure Protection, том 666 из IFIP Advances in Information and Communication Technology, стр. 155-174. Springer, (2022)