Soumajit Pal

According to our database1, Soumajit Pal authored at least 5 papers between 2015 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network.
J. Intell. Fuzzy Syst., 2017

Malsign: Threat analysis of signed and implicitly trusted malicious code.
Proceedings of the 2017 International Conference on Public Key Infrastructure and its Applications, 2017

Enhancing Knowledge Graph Completion By Embedding Correlations.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
Hiper-ping: Data plane based high performance packet generation bypassing kernel on ×86 based commodity systems.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

2015
Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers.
Proceedings of the 2015 International Conference on Information Technology, 2015


  Loading...