Pinned Repositories
Chandy-Lamport
CPSA
The results of our CPSA analysis of the 5G EAP-TLS protocol
CPU-Memory-Simulator
Data-Structures-and-Algorithms
Various data structures and algorithms
DVMRP
Hangman
JuhiPatel28
Magazine-Interface
Malware-Classification
A project where malware binaries were classified by APT groups using various extracted artifacts
Searchable-Encryption
a client application that can interface with a MySQL database such that the records it inserts into the database have certain columns hidden from the server
JuhiPatel28's Repositories
JuhiPatel28/Malware-Classification
A project where malware binaries were classified by APT groups using various extracted artifacts
JuhiPatel28/Searchable-Encryption
a client application that can interface with a MySQL database such that the records it inserts into the database have certain columns hidden from the server
JuhiPatel28/Chandy-Lamport
JuhiPatel28/CPSA
The results of our CPSA analysis of the 5G EAP-TLS protocol
JuhiPatel28/CPU-Memory-Simulator
JuhiPatel28/Data-Structures-and-Algorithms
Various data structures and algorithms
JuhiPatel28/DVMRP
JuhiPatel28/Hangman
JuhiPatel28/JuhiPatel28
JuhiPatel28/Magazine-Interface
JuhiPatel28/Numeral-Converter
JuhiPatel28/Polynomial-Solver
JuhiPatel28/PostOffice-Simulation
JuhiPatel28/Sudoku-Checker
A program that validates sudoku puzzles
JuhiPatel28/System-Security
Various projects that exploit vulnerabilities in software