Method and apparatus for transparently directing requests for web objects to proxy caches A Cohen, S Rangarajan, N Singh US Patent 6,389,462, 2002 | 926 | 2002 |
Transparent {Run-Time} defense against {Stack-Smashing} attacks A Baratloo, N Singh, T Tsai 2000 USENIX Annual Technical Conference (USENIX ATC 00), 2000 | 577 | 2000 |
Multi-tier security event correlation and mitigation A Agarwal, D Ahrens, R Livingood, M Mani, N Singh, A Zmolek US Patent App. 12/234,248, 2009 | 289 | 2009 |
Supporting soft real-time tasks in the xen hypervisor M Lee, AS Krishnakumar, P Krishnan, N Singh, S Yajnik Proceedings of the 6th ACM SIGPLAN/SIGOPS international conference on …, 2010 | 192 | 2010 |
Facilitating a contact center agent to select a contact in a contact center queue RP Klemm, P Krishnan, DD Seligmann, N Singh US Patent 9,106,750, 2015 | 184 | 2015 |
Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-ip environments YS Wu, S Bagchi, S Garg, N Singh International conference on dependable systems and networks, 2004, 433-442, 2004 | 179 | 2004 |
Automatic failure detection and recovery of applications RP Klemm, N Singh US Patent 7,243,267, 2007 | 171 | 2007 |
A log mining approach to failure analysis of enterprise telephony systems C Lim, N Singh, S Yajnik 2008 IEEE International Conference on Dependable Systems and Networks With …, 2008 | 136 | 2008 |
Method and apparatus for providing extensible object-oriented fault injection N Singh, T Tsai US Patent 6,484,276, 2002 | 133 | 2002 |
System and method for location-based protection of mobile data P Krishnan, N Singh US Patent App. 13/611,022, 2014 | 129 | 2014 |
Method and apparatus for target application program supervision RP Klemm, N Singh US Patent 6,457,142, 2002 | 121 | 2002 |
Communication between a document editor in-space user interface and a document editor out-space user interface JI Gordner, M Dukhon, JC Satterfield, N Singh, MF Trevino, AE Alberts, ... US Patent 8,484,578, 2013 | 103 | 2013 |
Distributed indirect software instrumentation R Klemm, N Singh, T Tsai US Patent 6,216,237, 2001 | 101 | 2001 |
Fault tolerance software system with periodic external self-test failure detection N Singh, T Tsai US Patent 7,096,388, 2006 | 88 | 2006 |
Libsafe: Protecting critical elements of stacks A Baratloo, T Tsai, N Singh White Paper http://www. research. avayalabs. com/project/libsafe, 1999 | 83 | 1999 |
Intelligent merging of transactions based on a variety of criteria JL Bentley, FJ Boyle III, AS Krishnakumar, P Krishnan, JH Meiners, ... US Patent 8,752,054, 2014 | 79 | 2014 |
Spam detection in voice-over-ip calls through semi-supervised clustering YS Wu, S Bagchi, N Singh, R Wita 2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009 | 79 | 2009 |
System and method for mitigating denial of service attacks on communication appliances S Garg, N Singh US Patent App. 11/157,880, 2006 | 72 | 2006 |
Security vulnerability monitor N Singh, T Tsai US Patent App. 10/611,264, 2005 | 67 | 2005 |
Libsafe 2.0: Detection of format string vulnerability exploits T Tsai, N Singh white paper, Avaya Labs, 2001 | 64 | 2001 |