
Please use this identifier to cite or link to this item:
http://192.168.98.239:8080/jspui/handle/1994/891Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.date.accessioned | 2018-02-01T09:34:36Z | - |
| dc.date.available | 2018-02-01T09:34:36Z | - |
| dc.date.issued | 2010-06 | - |
| dc.identifier.uri | http://192.168.98.42:8080/jspui/handle/1994/891 | - |
| dc.description.abstract | Available | en_US |
| dc.format.extent | 46p. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Tezpur University | en_US |
| dc.subject | Computer Science and Engineering | en_US |
| dc.title | CFG pruning and taint analysis for protocol level vulnerability signature generation | en_US |
| dc.type | Technical Report | en_US |
| dc.contributor.guide | Saikia, D. K. | - |
| dc.creator.researcher | Nath, Amitabha | - |
| Appears in Collections: | Dissertations | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 01_title_1237.pdf | Title | 196.3 kB | Adobe PDF | ![]() View/Open |
| 02_abstract_1237.pdf | Abstract | 54.16 kB | Adobe PDF | ![]() View/Open |
| 03_cert_ack_decn_1237.pdf | Certificate, Declaration and Acknowledgement | 790.25 kB | Adobe PDF | ![]() View/Open |
| 04_cont_tab_fig_1237.pdf | List of Contents, Tables and Figures | 26.55 kB | Adobe PDF | ![]() View/Open |
| 05_main chapters_1237.pdf Restricted Access | Main Chapters and References | 2.37 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



