Browsing by Researcher/Guide Saikia, D. K.
Showing results 1 to 12 of 12
Upload Date | Award Date | Title | Researcher | Guide(s) |
1-Feb-2018 | Jun-2010 | CFG pruning and taint analysis for protocol level vulnerability signature generation | Nath, Amitabha | Saikia, D. K. |
2-Feb-2018 | Jun-2010 | Development of a filtering engine for deployment of protocol level vulnerability signatures at the router to defend against internet worms in an enterprise network | Gupta, Nitin | Saikia, D. K. |
26-Feb-2018 | Jun-2010 | Development of filtering engine for deployment of vulnerability based protocol-level signatures at the router to defend against internet worms in an enterprise network | Sonar, Monjit | Saikia, D. K. |
27-Feb-2018 | May-2011 | Extension of the IEEE 802.15.4e MAC layer protocol in a cluster tree topology for an industrial automation environment with multilevel of hierarchy | Sarmah, Kaushik Dev | Saikia, D. K. |
27-Feb-2018 | May-2011 | Extracting input dependent path predicates from executable codes for a vulnerability signature generator | Goswami, Pankaj; Agarwala, Pankaj Kumar | Saikia, D. K. |
28-Feb-2018 | May-2011 | Merging of non-input dependent paths of a CFG for a vulnerability signature generator | Sarmah, Rishi Kowsick; Choudhury, Bhadeshwar | Saikia, D. K. |
1-Mar-2018 | May-2011 | Mobile purchase and order tracking application using software AG product suite | Dhar, Amit | Saikia, D. K. |
7-Mar-2018 | May-2011 | Protocol variable to path variable mapping for generation of protocol-level vulnerability signatures | Gogoi, Bronjon | Saikia, D. K. |
7-Mar-2018 | Jun-2010 | Receive buffer identification & protocol variable location at run-time for generation of protocol level vulnerability signature for protection against internet worm attacks | Pathak, Amarjyoti | Saikia, D. K. |
13-May-2016 | 2009 | Recognition of printed Assamese characters using orthogonal moments | Saharia, Sarat | Saikia, D. K. |
16-May-2016 | 2013 | Relaxing trust requirement in 3GPP mobile systems for improved subscriber identity privacy | Choudhury, Hiten | Saikia, D. K. |
6-May-2016 | 2007 | A study on transport layer congestion controls | Dahal, Manoj | Saikia, D. K. |