Please use this identifier to cite or link to this item: http://192.168.98.239:8080/jspui/handle/1994/1025
Full metadata record
DC FieldValueLanguage
dc.date.accessioned2018-02-27T05:08:01Z-
dc.date.available2018-02-27T05:08:01Z-
dc.date.issued2011-05-
dc.identifier.urihttp://192.168.98.42:8080/jspui/handle/1994/1025-
dc.description.abstractAvailableen_US
dc.format.extent45p.en_US
dc.language.isoenen_US
dc.publisherTezpur Universityen_US
dc.subjectExecutable codesen_US
dc.subjectSignature generatoren_US
dc.titleExtracting input dependent path predicates from executable codes for a vulnerability signature generatoren_US
dc.typeTechnical Reporten_US
dc.contributor.guideSaikia, D. K.-
dc.creator.researcherGoswami, Pankaj-
dc.creator.researcherAgarwala, Pankaj Kumar-
Appears in Collections:Dissertations

Files in This Item:
File Description SizeFormat 
01_title_1440.pdfTitle212.93 kBAdobe PDFThumbnail
View/Open
02_abstract_1440.pdfAbstract37.34 kBAdobe PDFThumbnail
View/Open
03_cert_ack_decn_1440.pdfCertificate, Declaration and Acknowledgement331.51 kBAdobe PDFThumbnail
View/Open
04_cont_tab_fig_1440.pdfList of Contents, Tables and Figures23.74 kBAdobe PDFThumbnail
View/Open
05_main chapters_1440.pdf
  Restricted Access
Main Chapters and References1.26 MBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.