Author of the publication

Security Analysis of the MPLS Label Distribution Protocol.

, , , and . Critical Infrastructure Protection, volume 342 of IFIP Advances in Information and Communication Technology, page 127-139. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Shenoi, Sujeet
add a person with the name Shenoi, Sujeet
 

Other publications of authors with the same name

Evaluating controller robustness using cell mapping., , and . Fuzzy Sets Syst., 121 (1): 3-12 (2001)Extracting Concealed Data from BIOS Chips., , , and . IFIP Int. Conf. Digital Forensics, volume 194 of IFIP, page 217-230. Springer, (2005)Wind farm security: attack surface, targets, scenarios and mitigation., , and . Int. J. Crit. Infrastructure Prot., (2017)Editorial.. Int. J. Crit. Infrastructure Prot., (2015)Analyzing FD Inference in Relational Databases., and . Data Knowl. Eng., 18 (2): 167-183 (1996)Public Telephone Network Vulnerabilities., , , , and . DBSec, volume 215 of IFIP Conference Proceedings, page 151-164. Kluwer, (2001)A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures., , and . Critical Infrastructure Protection, volume 686 of IFIP Advances in Information and Communication Technology, page 195-220. Springer, (2023)Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems., , , , , , and . Critical Infrastructure Protection, volume 666 of IFIP Advances in Information and Communication Technology, page 121-153. Springer, (2022)Formal Analysis of E-Commerce Protocols., , , and . ISADS, page 19-28. IEEE Computer Society, (2001)Security Policy Coordination for Heterogeneous Information Systems., , , and . ACSAC, page 219-228. IEEE Computer Society, (1999)