dblp.uni-trier.dewww.uni-trier.de

Brajendra Panda

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
43EEQutaibah Althebyan, Brajendra Panda: Performance analysis of an insider threat mitigation model. ICDIM 2008: 703-709
42EEQutaibah Althebyan, Brajendra Panda: A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. SEC 2008: 557-571
41 Qutaibah Althebyan, Brajendra Panda: Knowledge Extraction and Management for Insider Threat Mitigation. WOSIS 2008: 99-110
2007
40EEYi Hu, Zhichun Xiao, Brajendra Panda: A Trust Based Information Dissemination Model for Evaluating the Effect of Deceptive Data. HICSS 2007: 157
39EESastry Konduri, Brajendra Panda, Wing-Ning Li: Monitoring Information Leakage During Query Aggregation. ICDCIT 2007: 89-96
38EEHadi Sabaa, Brajendra Panda: Data authentication and provenance management. ICDIM 2007: 309-314
37EEYi Hu, Zhichun Xiao, Brajendra Panda: Modeling deceptive information dissemination using a holistic approach. SAC 2007: 1591-1598
2006
36EEYanjun Zuo, Brajendra Panda: Information trustworthiness evaluation based on trust combination. SAC 2006: 1880-1885
35 Yi Hu, Brajendra Panda: Modeling Deceptive Action in Virtual Communities. WOSIS 2006: 125-134
34EEBrajendra Panda, Joseph Giordano, Daniel Kalil: Introduction. Commun. ACM 49(2): 44-47 (2006)
2005
33EEYanjun Zuo, Brajendra Panda: Component based trust management in the context of a virtual organization. SAC 2005: 1582-1588
32 Yanjun Zuo, Brajendra Panda: External Object Trust Zone Mapping for Information Clustering. WOSIS 2005: 196-206
31EEYi Hu, Brajendra Panda: Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. J. Network Syst. Manage. 13(3): 269-291 (2005)
2004
30 Yanjun Zuo, Brajendra Panda: Damage Discovery in Distributed Database Systems. DBSec 2004: 111-123
29EEJing Zhou, Brajendra Panda, Yi Hu: Succinct and Fast Accessible Data Structures for Database Damage Assessment. ICDCIT 2004: 420-429
28EEYi Hu, Brajendra Panda: A data mining approach for database intrusion detection. SAC 2004: 711-716
27EERajesh Yalamanchili, Brajendra Panda: Transaction Fusion: A Model for Data Recovery from Information Attacks. J. Intell. Inf. Syst. 23(3): 225-245 (2004)
2003
26 Prahalad Ragothaman, Brajendra Panda: Improving Damage Assessment Efficacy in case of Frequent Attacks on Databases. DBSec 2003: 16-30
25 Amit Valsangkar, Brajendra Panda: An Architecture for Making Data Available Ceaselessly During Recovery. IAW 2003: 196-202
24 Yanjun Zuo, Brajendra Panda: Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. IAW 2003: 306-307
23EEYi Hu, Brajendra Panda: Identification of Malicious Transactions in Database Systems. IDEAS 2003: 329-335
22EEBrajendra Panda, Jing Zhou: Database Damage Assessment Using A Matrix Based Approach: An Intrusion Response System. IDEAS 2003: 336-341
21 Prahalad Ragothaman, Brajendra Panda: Hybrid Log Segmentation for Assured Damage Assessment. SAC 2003: 522-527
20 Satyadeep Patnaik, Brajendra Panda: Transaction-Relationship Oriented Log Division for Data Recovery from Information Attacks. J. Database Manag. 14(2): 27-41 (2003)
2002
19 Prahalad Ragothaman, Brajendra Panda: Dividing Database Login to Equal Size Segments for Efficiency. Computers and Their Applications 2002: 118-121
18 Prahalad Ragothaman, Brajendra Panda: Analyzing Transaction Logs for Effective Damage Assessment. DBSec 2002: 89-101
17EEBrajendra Panda, Kazi Asharful Haque: Extended data dependency approach: a robust way of rebuilding database. SAC 2002: 446-452
2001
16 Brajendra Panda, Rajesh Yalamanchili: A model to detect multi-source information attacks. Computers and Their Applications 2001: 447-451
15 Rumman Sobhan, Brajendra Panda: Reorganization of Database Log for Information Warfare Data Recovery. DBSec 2001: 121-134
14 Brajendra Panda, Prahalad Ragothaman: Alternate Methods of Storing Committed Transactions in the Log for Their Future Re-execution. ISAS-SCI (1) 2001: 508-512
13EEYuelong Gu, Brajendra Panda, Kazi Asharful Haque: Design and analysis of data structures for querying image databases. SAC 2001: 236-241
12EEBrajendra Panda, Rajesh Yalamanchili: Transaction fusion in the wake of information warfare. SAC 2001: 242-247
11 Chandana Lala, Brajendra Panda: Evaluating damage from cyber attacks: a model and analysis. IEEE Transactions on Systems, Man, and Cybernetics, Part A 31(4): 300-310 (2001)
2000
10 Chandana Lala, Brajendra Panda, Rumman Sobhan: Storing transaction dependency graphs for damage appraisal following an information attack. Computers and Their Applications 2000: 317-321
9 Brajendra Panda, Sani Tripathy: Data Dependency Based Logging for Defensive Information Warfare. SAC (1) 2000: 361-365
1999
8EESatyadeep Patnaik, Marshall Meier, Brian Henderson, Joe Hickman, Brajendra Panda: Improving the Performance of Lineage Tracing in Data Warehouse. SAC 1999: 210-215
7EEBrajendra Panda, Joseph Giordano: Defensive Information Warfare - Introduction. Commun. ACM 42(7): 30-32 (1999)
1998
6 Brajendra Panda, Joseph Giordano: Reconstructing the Database after Electronic Attacks. DBSec 1998: 143-156
5EEBrajendra Panda, Joseph Giordano: An overview of post information warfare data recovery. SAC 1998: 253-254
1997
4EEBrajendra Panda: An alternative approach to serialization of multilevel secure Transactions. SAC 1997: 134-135
1995
3 Brajendra Panda, William Perrizo: Maintaining Surrogate Data for Query Acceleration in Multilevel Secure Database Systems. CISMOD 1995: 45-57
2EEBrajendra Panda, William Perrizo: Query execution in prism and seaview: a cost analysis. SAC 1995: 65-70
1994
1EEBrajendra Panda, William Perrizo, Ramzi A. Haraty: Secure transaction management and query processing in multilevel secure database systems. SAC 1994: 363-368

Coauthor Index

1Qutaibah Althebyan [41] [42] [43]
2Joseph Giordano [5] [6] [7] [34]
3Yuelong Gu [13]
4Kazi Asharful Haque [13] [17]
5Ramzi A. Haraty [1]
6Brian Henderson [8]
7Joe Hickman [8]
8Yi Hu [23] [28] [29] [31] [35] [37] [40]
9Daniel Kalil [34]
10Sastry Konduri [39]
11Chandana Lala [10] [11]
12Wing-Ning Li [39]
13Marshall Meier [8]
14Satyadeep Patnaik [8] [20]
15William Perrizo [1] [2] [3]
16Prahalad Ragothaman [14] [18] [19] [21] [26]
17Hadi Sabaa [38]
18Rumman Sobhan [10] [15]
19Sani Tripathy [9]
20Amit Valsangkar [25]
21Zhichun Xiao [37] [40]
22Rajesh Yalamanchili [12] [16] [27]
23Jing Zhou [22] [29]
24Yanjun Zuo [24] [30] [32] [33] [36]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)