Susanta Nanda
Susanta Nanda
Verified email at
TitleCited byYear
A survey on virtualization technologies
SNT Chiueh, S Brook
Rpe Report 142, 2005
Systems and methods for scalable network monitoring in virtual data centers
SK Nanda, Y Sun
US Patent 10,264,020, 2019
Viking: A multi-spanning-tree Ethernet architecture for metropolitan area and cluster networks
S Sharma, K Gopalan, S Nanda, T Chiueh
IEEE INFOCOM 2004 4, 2283-2294, 2004
A feather-weight virtual machine for windows applications
Y Yu, F Guo, S Nanda, L Lam, T Chiueh
Proceedings of the 2nd international conference on Virtual execution …, 2006
BIRD: Binary interpretation using runtime disassembly
S Nanda, W Li, LC Lam, T Chiueh
Proceedings of the International Symposium on Code Generation and …, 2006
Techniques for behavior based malware analysis
SB Bhatkar, S Nanda, JS Wilhelm
US Patent 8,555,385, 2013
Systems and methods for monitoring virtual networks
SK Nanda, Y Sun
US Patent 9,961,105, 2018
Dynamic multi-process information flow tracking for web application security
S Nanda, LC Lam, T Chiueh
Proceedings of the 2007 ACM/IFIP/USENIX international conference on …, 2007
Security-as-a-service for microservices-based cloud applications
Y Sun, S Nanda, T Jaeger
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
Systems and methods for protecting against unauthorized access of encrypted data during power-management modes
S Nanda, K Griffin
US Patent 8,555,083, 2013
Systems and methods for data loss prevention on mobile computing systems
J Casaburi, K Griffin, S Nanda, S Sawhney, M Conover
US Patent 8,429,745, 2013
Foreign code detection on the windows/x86 platform
S Nanda, W Li, LC Lam, T Chiueh
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 279-288, 2006
Execution trace-driven automated attack signature generation
S Nanda, T Chiueh
2008 Annual Computer Security Applications Conference (ACSAC), 195-204, 2008
Web application attack prevention for tiered internet services
S Nanda, L Lam, T Chiueh
2008 The Fourth International Conference on Information Assurance and …, 2008
Techniques for virtual environment-based web client management
SK Nanda, T Chiueh
US Patent 9,065,725, 2015
Systems and methods for detecting malicious documents based on component-object reuse
S Bhatkar, F Guo, S Nanda
US Patent 9,317,679, 2016
Systems and methods for deploying a pre-boot environment to enable an address offset mode after execution of system bios for booting a operating system in a protected area
S Nanda, KE Griffin
US Patent 9,135,447, 2015
Sharing confidential graph data using multi-level graph summarization with varying data utility and privacy protection
AK Kayyoor, SK Nanda, P Efstathopoulos
US Patent 9,692,768, 2017
Systems and methods for neutralizing file-format-specific exploits included within files contained within electronic communications
C Nachenberg, F Guo, S Nanda, S Bhatkar, D Shou, M Dacier
US Patent 9,009,459, 2015
Decrypting network traffic on a middlebox device using a trusted execution environment
Y Sun, D Marino, SK Nanda, S Shintre, BT Witten, RA Frederick, Q Li
US Patent 10,044,691, 2018
The system can't perform the operation now. Try again later.
Articles 1–20