Author of the publication

Security Strategies for SCADA Networks.

, , , , and . Critical Infrastructure Protection, volume 253 of IFIP, page 117-131. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Shenoi, Sujeet
add a person with the name Shenoi, Sujeet
 

Other publications of authors with the same name

Manipulation of G-Code Toolpath Files in 3D Printers: Attacks and Mitigations., , , , , and . Critical Infrastructure Protection, volume 666 of IFIP Advances in Information and Communication Technology, page 155-174. Springer, (2022)Functional dependencies and normal forms in the fuzzy relational database model., , and . Inf. Sci., 60 (1-2): 1-28 (1992)Retrofitting Mobile Devices for Capturing Memory-Resident Malware Based on System Side-Effects., , and . IFIP Int. Conf. Digital Forensics, volume 569 of IFIP Advances in Information and Communication Technology, page 59-72. Springer, (2019)Security analysis of RSVP-TE signaling in MPLS networks., , , and . Int. J. Crit. Infrastructure Prot., (2008)An Architecture for SCADA Network Forensics., , , , and . IFIP Int. Conf. Digital Forensics, volume 222 of IFIP Advances in Information and Communication Technology, page 273-285. Springer, (2006)Countering Hostile Forensic Techniques., , and . IFIP Int. Conf. Digital Forensics, volume 222 of IFIP Advances in Information and Communication Technology, page 79-90. Springer, (2006)Implementing Novel Defense Functionality in MPLS Networks Using Hyperspeed Signaling., , and . Critical Infrastructure Protection, volume 367 of IFIP Advances in Information and Communication Technology, page 91-106. Springer, (2011)Assessing The Integrity Of Field Devices In Modbus Networks., , , , and . Critical Infrastructure Protection, volume 290 of IFIP Advances in Information and Communication Technology, page 115-128. Springer, (2008)Language Extensions for Programmable Security., , , and . DBSec, volume 201 of IFIP Conference Proceedings, page 221-232. Kluwer, (2000)Remote Computer Fingerprinting for Cyber Crime Investigations., , , and . DBSec, volume 142 of IFIP, page 3-15. Kluwer/Springer, (2003)