
Please use this identifier to cite or link to this item:
http://192.168.98.239:8080/jspui/handle/1994/1128Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.date.accessioned | 2018-03-07T05:44:41Z | - |
| dc.date.available | 2018-03-07T05:44:41Z | - |
| dc.date.issued | 2011-05 | - |
| dc.identifier.uri | http://192.168.98.42:8080/jspui/handle/1994/1128 | - |
| dc.description.abstract | Available | en_US |
| dc.format.extent | 48p. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Tezpur University | en_US |
| dc.subject | Computer Science and Engineering | en_US |
| dc.title | Protocol variable to path variable mapping for generation of protocol-level vulnerability signatures | en_US |
| dc.type | Technical Report | en_US |
| dc.contributor.guide | Saikia, D. K. | - |
| dc.creator.researcher | Gogoi, Bronjon | - |
| Appears in Collections: | Dissertations | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 01_title_1694.pdf | Title | 177.84 kB | Adobe PDF | ![]() View/Open |
| 02_abstract_1694.pdf | Abstract | 48.58 kB | Adobe PDF | ![]() View/Open |
| 03_cert_ack_decn_1694.pdf | Certificate, Declaration and Acknowledgement | 62.01 kB | Adobe PDF | ![]() View/Open |
| 04_cont_tab_fig_1694.pdf | List of Contents, Tables and Figures | 28.46 kB | Adobe PDF | ![]() View/Open |
| 05_main_chapters_1694.pdf Restricted Access | Main Chapters and References | 3.41 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



