Author of the publication

On the Legality of Analyzing Telephone Call Records.

, , , and . IFIP Int. Conf. Digital Forensics, volume 242 of IFIP, page 21-39. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Shenoi, Sujeet
add a person with the name Shenoi, Sujeet
 

Other publications of authors with the same name

Evaluating controller robustness using cell mapping., , and . Fuzzy Sets Syst., 121 (1): 3-12 (2001)Editorial.. Int. J. Crit. Infrastructure Prot., (2015)Wind farm security: attack surface, targets, scenarios and mitigation., , and . Int. J. Crit. Infrastructure Prot., (2017)Extracting Concealed Data from BIOS Chips., , , and . IFIP Int. Conf. Digital Forensics, volume 194 of IFIP, page 217-230. Springer, (2005)Public Telephone Network Vulnerabilities., , , , and . DBSec, volume 215 of IFIP Conference Proceedings, page 151-164. Kluwer, (2001)Analyzing FD Inference in Relational Databases., and . Data Knowl. Eng., 18 (2): 167-183 (1996)A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures., , and . Critical Infrastructure Protection, volume 686 of IFIP Advances in Information and Communication Technology, page 195-220. Springer, (2023)Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems., , , , , , and . Critical Infrastructure Protection, volume 666 of IFIP Advances in Information and Communication Technology, page 121-153. Springer, (2022)Formal Analysis of E-Commerce Protocols., , , and . ISADS, page 19-28. IEEE Computer Society, (2001)Security Policy Coordination for Heterogeneous Information Systems., , , and . ACSAC, page 219-228. IEEE Computer Society, (1999)