V. N. Venkatakrishnan mostly deals with Applied mathematics, Computer security, Multigrid method, Navier–Stokes equations and Mathematical optimization. He has researched Applied mathematics in several fields, including Iterative method, Mathematical analysis and Inviscid flow. The study incorporates disciplines such as Cross-site scripting, Web application, World Wide Web and Scripting language in addition to Computer security.
Discretization and Euler equations are fields of study that intersect with his Navier–Stokes equations research. His studies deal with areas such as Flux limiter, Convergence and Monotone polygon as well as Euler equations. The various areas that he examines in his Mathematical optimization study include Grid and Mesh generation.
His primary areas of study are Computer security, Web application, World Wide Web, Applied mathematics and Exploit. His Code, Malware and Exploit kit study in the realm of Computer security connects with subjects such as Incident report. V. N. Venkatakrishnan usually deals with Web application and limits it to topics linked to Internet security and Secure coding.
His study in the fields of Cross-site scripting, The Internet and Cross-site request forgery under the domain of World Wide Web overlaps with other disciplines such as Browser security. His study in Applied mathematics is interdisciplinary in nature, drawing from both Iterative method and Inviscid flow. V. N. Venkatakrishnan combines subjects such as Grid and Mathematical optimization with his study of Inviscid flow.
V. N. Venkatakrishnan focuses on Computer security, Exploit, Web application, Static analysis and Distributed computing. His Computer security research includes themes of Adversarial system and Cheque truncation. As part of one scientific family, V. N. Venkatakrishnan deals mainly with the area of Exploit, narrowing it down to issues related to the Workflow, and often Cybercrime and Vulnerability.
His Web application study is focused on World Wide Web in general. His research in Static analysis intersects with topics in Scalability, Compiler and Static program analysis. His work on Content Security Policy is typically connected to Browser security as part of general Web application security study, connecting several disciplines of science.
His primary areas of investigation include Computer security, Scalability, The Internet, Malware and Static analysis. His Computer security study combines topics from a wide range of disciplines, such as World Wide Web and Kernel. His study on Server-side is often connected to Context as part of broader study in World Wide Web.
His biological study spans a wide range of topics, including Computer network and Peer-to-peer. His research investigates the link between Malware and topics such as Cybercrime that cross with problems in Exploit. V. N. Venkatakrishnan interconnects Transport Layer Security, Construct and Server, Operating system in the investigation of issues within Static analysis.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Convergence to steady state solutions of the Euler equations on unstructured grids with limiters
V. Venkatakrishnan.
Journal of Computational Physics (1995)
Aerodynamic design optimization on unstructured grids with a continuous adjoint formulation
W. K Anderson;V. Venkatakrishnan.
Computers & Fluids (1997)
Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers
Mike Ter Louw;V.N. Venkatakrishnan.
ieee symposium on security and privacy (2009)
Model-carrying code: a practical approach for safe execution of untrusted applications
R. Sekar;V.N. Venkatakrishnan;Samik Basu;Sandeep Bhatkar.
symposium on operating systems principles (2003)
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks
Prithvi Bisht;V. N. Venkatakrishnan.
international conference on detection of intrusions and malware and vulnerability assessment (2008)
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
Prithvi Bisht;P. Madhusudan;V. N. Venkatakrishnan.
ACM Transactions on Information and System Security (2010)
IMPLICIT METHOD FOR THE COMPUTATION OF UNSTEADY FLOWS ON UNSTRUCTURED GRIDS
V. Venkatakrishnan;D.J. Mavriplis.
Journal of Computational Physics (1996)
Implicit Solvers for Unstructured Meshes
V. Venkatakrishnan;Dimitri J. Mavriplis.
Journal of Computational Physics (1993)
CANDID: preventing sql injection attacks using dynamic candidate evaluations
Sruthi Bandhakavi;Prithvi Bisht;P. Madhusudan;V. N. Venkatakrishnan.
computer and communications security (2007)
HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows
Sadegh Momeni Milajerdi;Rigel Gjomemo;Birhanu Eshete;R. Sekar.
ieee symposium on security and privacy (2019)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Stony Brook University
University of Wyoming
Stony Brook University
Stony Brook University
University of Illinois at Chicago
University of Illinois at Urbana-Champaign
National University of Singapore
Stony Brook University
King Abdullah University of Science and Technology
Carnegie Mellon University