google-plus
utulsa.edu

Sujeet Shenoi PhD

F.P. Walter Professor of Computer Science and Professor of Chemical Engineering College of Engineering & Natural Sciences
Tandy School of Computer Science, Russell School of Chemical Engineering
Keplinger Hall U351 918-631-3269
sujeet@utulsa.edu
faculty-photo

Biography

Contact at 918-344-1288


Ph.D., Kansas State University
M.S., Kansas State University
M.S., Kansas State University
BTech, Indian institute of Technology


Cyber Security
Critical Infrastructure Protection
Cyber Operations
Reverse Engineering
Digital Forensics
Process Control

Compiler Construction
Theory of Computing
Computer Security
SCADA Systems
Cyber Operations


The following may be selected publications rather than a comprehensive list.

Journal Articles


Shenoi, Sujeet, Janica Edmonds, and Mauricio Papa. “Security Analysis of Multilayer SCADA Protocols.” IFIP International Federation for Information Processing 253.1 (2010): n. pag. Print.

Kilpatrick, Tim et al. “Forensic Analysis of SCADA Systems and Networks.” International Journal of Security and Networks 3.2 (2008): 95–102. Print.

Huitsing, Peter et al. “Attack Taxonomies for the Modbus Protocols.” International Journal of Critical Infrastructure Protection 1 (2008): 37–44. Print.

Hale, John, Mauricio Papa, and Sujeet Shenoi. “Programmable Access Control.” Journal of Computer Security 11.3 (2003): 331–351. Print.

Mauricio, PAPA et al. “Formal Analysis of e-Commerce Protocols.” IEICE TRANSACTIONS on Information and Systems 84.10 (2001): 1313–1323. Print.

Lorenz, G et al. “Securing ss7 Telecommunications Networks.” Workshop on Information Assurance and Security 2 (2001): 273–278. Print.

Papa, Mauricio et al. “IEICE/IEEE Joint Special Issue on Autonomous Decentralized Systems and Systems’ Assurance-PAPERS-Electronic Commerce-Formal Analysis of E-Commerce Protocols.” IEICE Transactions on Information and Systems 84.10 (2001): 1313–1323. Print.

Papa, Mauricio, Jason Wood, and Sujeet Shenoi. “Evaluating Controller Robustness Using Cell Mapping.” Fuzzy Sets and Systems 121.1 (2001): 3–12. Print.

Meehan, A et al. “Packet Sniffing for Automated Chat Room Monitoring and Evidence Preservation.” Workshop on Information Assurance and Security 2 (2001): 1045. Print.

Lorenz, GV et al. “Characterization of Attacks on Public Telephone Networks [4232-19].” PROCEEDINGS-SPIE THE INTERNATIONAL SOCIETY FOR OPTICAL ENGINEERING (2000): 93–103. Print.

Hale, John, Jody Threet, and Sujeet Shenoi. “A Ticket-Based Access Control Architecture for Object Systems.” Journal of Computer Security 8.1 (2000): 43–65. Print.

Hale, John, Jody Threet, and Sujeet Shenoi. “Capability-Based Primitives for Access Control in Object-Oriented Systems.” DATABASE SECURITY 11 (1998): 134–150. Print.

Papa, Mauricio, Heng-Ming Tai, and Sujeet Shenoi. “Cell Mapping for Controller Design and Evaluation.” Control Systems, IEEE 17.2 (1997): 52–65. Print.

Threet, Jody, John Hale, and Sujeet Shenoi. “A Process Calculus for Distributed Objects.” (1996): n. pag. Print.

Hale, John, and Sujeet Shenoi. “Analyzing FD Inference in Relational Databases.” Data & Knowledge Engineering 18.2 (1996): 167–183. Print.

Hale, John, Sujeet Shenoi, and Keplinger Hall. “Imprecise Database Inference Using Functional Dependencies.” Advances in fuzzy theory and technology, Duke University (1995): 307–326. Print.

Hale, John, and Sujeet Shenoi. “Catalytic Inference Analysis Using Fuzzy Relations.” Proceedings of the 6th International Fuzzy Systems Association World Congress, IFSA 2 (1995): 413. Print.

Hu, HT, Heng-Ming Tai, and Sujeet Shenoi. “Fuzzy Controller Design Using Genetic Algorithms and Cell Maps. In?, Editor.” Proceedings of the Second International Conference on Fuzzy Theory & Technology-Control & Decision, page (2017): n. pag. Print.

Book Chapters


East, Samuel et al. “A Taxonomy of Attacks on the DNP3 Protocol.” Critical Infrastructure Protection III. Springer, 2009. 67–81. Print.

Butts, Jonathan et al. “Providing Situational Awareness for Pipeline Control Operations.” Critical Infrastructure Protection III. Springer, 2009. 97–111. Print.

Shayto, Ryan et al. “Assessing the Integrity of Field Devices in Modbus Networks.” Critical Infrastructure Protection II. Springer, 2008. 115–128. Print.

Chandia, Rodrigo et al. “Security Strategies for SCADA Networks.” Critical Infrastructure Protection. Springer, 2008. 117–131. Print.

Edmonds, Janica, Mauricio Papa, and Sujeet Shenoi. “Security Analysis of Multilayer SCADA Protocols.” Critical Infrastructure Protection. Springer, 2008. 205–221. Print.

Kilpatrick, Tim et al. “An Architecture for SCADA Network Forensics.” Advances in Digital Forensics II. Springer, 2006. 273–285. Print.

Swenson, Christopher, Tyler Moore, and Sujeet Shenoi. “GSM Cell Site Forensics.” Advances in Digital Forensics II. Ed. Martin Olivier and Sujeet Shenoi. Vol. 222. Springer, 2006. 259–272. Print.

Moore, Tyler et al. “Using Signaling Information in Telecom Network Forensics.” Advances in Digital Forensics. Ed. Mark Pollitt and Sujeet Shenoi. Vol. 194. Springer, 2005. 177–188. Print.

Papa, Mauricio et al. “Integrating Logics and Process Calculi for Cryptographic Protocol Analysis.” Security and Privacy in the Age of Uncertainty. Springer US, 2003. 349–360. Print.

Lorenz, G et al. “Public Telephone Network Vulnerabilities.” Database and Application Security XV. Springer US, 2002. 151–164. Print.

Papa, Mauricio et al. “Simulation and Analysis of Cryptographic Protocols.” Data and Application Security. Springer US, 2001. 89–100. Print.

Hale, John et al. “Language Extensions for Programmable Security.” Data and Application Security. Springer US, 2001. 221–232. Print.

Hale, John, Mauricio Papa, and Sujeet Shenoi. “Programmable Security for Object-Oriented Systems.” Database Security XII. Springer US, 1999. 109–123. Print.

Books


Shenoi, Sujeet, and Mauricio Papa. Critical Infrastructure Protection IV. IFIP International Federation for Information Processing, 2010. Print.

Papa, Mauricio, and Sujeet Shenoi. Critical Infrastructure Protection II. Vol. 290. Springer, 2008. Print.

Conference Proceedings


Manes, Gavin et al. “Identifying and Tracking Attacks on Networks: C3I Displays and Related Technologies.” AeroSense 2003. 2003. 105–113. Print.

Kosloff, T. et al. “Attacks on Public Telephone Networks: Technologies and Challenges.” SPIE 5071, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II, 72. 2003. 72–83. Print.

Kosloff, Todd et al. “SS7 Messaging Attacks on Public Telephone Networks: Attack Scenarios and Detection.” Workshop on the Scientific Aspects of Cyber Terrorism. ACM, 2002. Print.

J. Edmonds, M. Papa, J. Hale, and S. Shenoi, “Modeling and Verifying Protocols with Key Chaining,” Proceedings of the Third Annual Institute of Electrical and Electronics Engineering (IEEE) Information Assurance Workshop, West Point, New York, June 2001.

Lorenz, Gary et al. “Securing SS7 Telecommunications Networks.” Second IEEE Systems, Man and Cybernetics Information Assurance Workshop. 2001. Print.

Lorenz, Gary et al. “Characterization of Attacks on Public Telephone Networks.” Enabling Technologies for Law Enforcement. 2001. 93–103. Print.

Papa, Mauricio et al. “Extending Java for Package Based Access Control.” Computer Security Applications, 2000. ACSAC’00. 16th Annual Conference. 2000. 67–76. Print.

Galiasso, Pablo et al. “Policy Mediation for Multi-Enterprise Environments.” Computer Security Applications, 2000. ACSAC’00. 16th Annual Conference. 2000. 100–106. Print.

Hale, John et al. “Security Policy Coordination for Heterogeneous Information Systems.” Acsac. 1999. 219. Print.

Hale, John, and Sujeet Shenoi. “Catalytic Inference Analysis: Detecting Inference Threats Due to Knowledge Discovery.” Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium On. 1997. 188–199. Print.

Berryman, M et al. “An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.” Proceedings of the IFIP TC11 WG11. 3 Eleventh International Conference on Database Securty XI: Status and Prospects. 1997. 385–388. Print.

Rath, Surath et al. “A Tool for Inference Detection and Knowledge Discovery in Databases.” Proceedings of the Ninth Annual IFIP TC11 WG11. 3 Working Conference on Database Security IX: Status and Prospects: Status and Prospects. 1996. 317–332. Print.

Tai, Heng-Ming, Mauricio Papa, and Sujeet Shenoi. “On Global Analysis and Design of Fuzzy Control Systems.” Industrial Electronics, Control, and Instrumentation, 1996., Proceedings of the 1996 IEEE IECON 22nd International Conference On. Vol. 1. 1996. 372–377. Print.

Hale, John, Jody Threet, and Sujeet Shenoi. “A Framework for High Assurance Security of Distributed Objects.” In Database Security, X: Status and Prospects. 1996. Print.

Papa, Mauricio, Heng-Ming Tai, and Sujeet Shenoi. “Effect of Cell Map Granularity on Fuzzy Control System Analysis.” Fuzzy Systems, 1996., Proceedings of the Fifth IEEE International Conference On. Vol. 1. 1996. 411–415. Print.

Tai, Heng-Ming, Hernt-Tai Hu, and Sujeet Shenoi. “Auto-Tuning of Fuzzy Controllers Using Cell Mapping.” Industrial Automation and Control: Emerging Technologies, 1995., International IEEE/IAS Conference On. 1995. 492–499. Print.

Hale, John, and Sujeet Shenoi. “Catalyzing Database Inference with Fuzzy Relations.” Uncertainty Modeling and Analysis, 1995, and Annual Conference of the North American Fuzzy Information Processing Society. Proceedings of ISUMA-NAFIPS’95., Third International Symposium On. 1995. 408–413. Print.

Papa, Mauricio, Heng-Ming Tai, and Sujeet Shenoi. “Evaluation of Cell State Techniques for Optimal Controller Design.” Fuzzy Systems, 1995. International Joint Conference of the Fourth IEEE International Conference on Fuzzy Systems and The Second International Fuzzy Engineering Symposium., Proceedings of 1995 IEEE Int. Vol. 3. 1995. 1331–1338. Print.

Tai, Heng-Ming, and Sujeet Shenoi. “Robust Fuzzy Controllers.” Systems, Man, and Cybernetics, 1994. Humans, Information and Technology., 1994 IEEE International Conference On. Vol. 1. 1994. 85–90. Print.

Hale, John, Jody Threet, and Sujeet Shenoi. “A Practical Formalism for Imprecise Inference Control.” Proceedings of the 8th IFIP WG11. 3 Workshop on Database Security. 1994. Print.

Hale, John, Scott Finnerty, and Sujeet Shenoi. “Analysing Inference in Fuzzy Database Systems.” Fuzzy Systems, 1994. IEEE World Congress on Computational Intelligence., Proceedings of the Third IEEE Conference On. 1994. 331–336. Print.

Hu, Hernt-Tai, Heng-Ming Tai, and Sujeet Shenoi. “Incorporating Cell Map Information in Fuzzy Controller Design.” Fuzzy Systems, 1994. IEEE World Congress on Computational Intelligence., Proceedings of the Third IEEE Conference On. 1994. 394–399. Print.


CS 4153 Computer Security
CS 6413 Compiler Construction
CS 6483 Theory of Computing
CS 7033 SCADA Systems Security
CS 7073 Embedded Devices Reverse Engineering
CS 7483 Computer and Network Forensics
CS 7863 Special Topics in Computer Science
CS 9983 Research and Dissertation