Srini Narayanamurthy
Cited by
Cited by
Clay Codes: Moulding {MDS} Codes to Yield an {MSR} Code
M Vajha, V Ramkumar, B Puranik, G Kini, E Lobo, B Sasidharan, ...
16th {USENIX} Conference on File and Storage Technologies ({FAST} 18), 139-154, 2018
Data management in distributed file systems
S Narayanamurthy, G Makkar, K Muthyala, A Suresh
US Patent 9,507,800, 2016
Distributed file system snapshot
G Makkar, S Narayanamurthy, K Muthyala
US Patent 9,336,219, 2016
Using random forests for network-based anomaly detection at active routers
G Prashanth, V Prashanth, P Jayashree, N Srinivasan
2008 International Conference on Signal Processing, Communications and …, 2008
Performance impact analysis of network change
J Basak, V Mathur, S Nandi, S Narayanamurthy, K Voruganti
US Patent 8,903,995, 2014
Distributed file system gateway
K Muthyala, G Makkar, A Suresh, S Narayanamurthy
US Patent 9,575,974, 2017
Evaluation of codes with inherent double replication for hadoop
MN Krishnan, N Prakash, V Lalitha, B Sasidharan, PV Kumar, ...
6th {USENIX} Workshop on Hot Topics in Storage and File Systems (HotStorage 14), 2014
Deduplication of encrypted data within a remote data store
S Narayanamurthy, P Deshmukh
US Patent 11,106,375, 2021
Secure proofs of storage for deduplication
S Narayanamurthy
US Patent 9,571,287, 2017
Multiple node repair using high rate minimum storage regeneration erasure code
SA Hussain, S Narayanamurthy
US Patent 10,452,477, 2019
Fuzzy rule-base based intrusion detection system on application layer
S Sangeetha, S Haripriya, SG Mohana Priya, V Vaidehi, N Srinivasan
International Conference on Network Security and Applications, 27-36, 2010
Reduction of false alarm rate in detecting network anomaly using mahalanobis distance and similarity measure
N Srinivasan, V Vaidehi
2007 International Conference on Signal Processing, Communications and …, 2007
Aggregate inline deduplication with volume granular encryption
S Narayanamurthy, DN Pawar, J Vasudeva, P Deshmukh, S Nandi
US Patent App. 16/354,562, 2020
Timed coloured Petri net model for misuse intrusion detection
N Srinivasan, V Vaidehi
First International Conference on Industrial and Information Systems, 550-555, 2006
Implementation of application layer intrusion detection system using protocol analysis
S Sangeetha, V Vaidehi, N Srinivasan, KV Rajkumar, S Pradeep, ...
2008 International Conference on Signal Processing, Communications and …, 2008
WORMStore: A specialized object store for write-once read-many workloads
S Narayanamurthy, K Muthyala, G Makkar
2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation …, 2014
Model building for dynamic multi-tenant provider environments
J Basak, K Wadhwani, K Voruganti, S Narayanamurthy, V Mathur, ...
ACM SIGOPS Operating Systems Review 46 (3), 20-31, 2012
Modern erasure codes for distributed storage systems
S Narayanamurthy
Storage Developer Conference (SDC), SNIA, Santa Clara, 2016
Performance Analysis of Soft Computing Based Anomaly Detectors.
N Srinivasan, V Vaidehi
Int. J. Netw. Secur. 7 (3), 436-447, 2008
Anomaly detection in a distributed environment using neural networks on a cluster
N Srinivasan, V Vaidehi
IASTED International Conference on Communication, Network, and Information …, 2005
The system can't perform the operation now. Try again later.
Articles 1–20