Follow
Koustav Sadhukhan
Title
Cited by
Cited by
Year
Cyber Attack Thread: A control-flow based approach to deconstruct and mitigate cyber threats
K Sadhukhan, RA Mallari, T Yadav
2015 International Conference on Computing and Network Communications …, 2015
72015
Identification of bugs and vulnerabilities in TLS implementation for windows operating system using state machine learning
T Yadav, K Sadhukhan
Security in Computing and Communications: 6th International Symposium, SSCC …, 2019
52019
Approximation algorithm for n-distance minimal vertex cover problem
T Yadav, K Sadhukhan, RA Mallari
arXiv preprint arXiv:1606.02889, 2016
42016
Learning explainable network request signatures for robot detection
R Agarwal, S Chitlangia, A Muralidhar, A Niranjan, A Sharma, ...
2023
The system can't perform the operation now. Try again later.
Articles 1–4