2008 |
43 | EE | Qutaibah Althebyan,
Brajendra Panda:
Performance analysis of an insider threat mitigation model.
ICDIM 2008: 703-709 |
42 | EE | Qutaibah Althebyan,
Brajendra Panda:
A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack.
SEC 2008: 557-571 |
41 | | Qutaibah Althebyan,
Brajendra Panda:
Knowledge Extraction and Management for Insider Threat Mitigation.
WOSIS 2008: 99-110 |
2007 |
40 | EE | Yi Hu,
Zhichun Xiao,
Brajendra Panda:
A Trust Based Information Dissemination Model for Evaluating the Effect of Deceptive Data.
HICSS 2007: 157 |
39 | EE | Sastry Konduri,
Brajendra Panda,
Wing-Ning Li:
Monitoring Information Leakage During Query Aggregation.
ICDCIT 2007: 89-96 |
38 | EE | Hadi Sabaa,
Brajendra Panda:
Data authentication and provenance management.
ICDIM 2007: 309-314 |
37 | EE | Yi Hu,
Zhichun Xiao,
Brajendra Panda:
Modeling deceptive information dissemination using a holistic approach.
SAC 2007: 1591-1598 |
2006 |
36 | EE | Yanjun Zuo,
Brajendra Panda:
Information trustworthiness evaluation based on trust combination.
SAC 2006: 1880-1885 |
35 | | Yi Hu,
Brajendra Panda:
Modeling Deceptive Action in Virtual Communities.
WOSIS 2006: 125-134 |
34 | EE | Brajendra Panda,
Joseph Giordano,
Daniel Kalil:
Introduction.
Commun. ACM 49(2): 44-47 (2006) |
2005 |
33 | EE | Yanjun Zuo,
Brajendra Panda:
Component based trust management in the context of a virtual organization.
SAC 2005: 1582-1588 |
32 | | Yanjun Zuo,
Brajendra Panda:
External Object Trust Zone Mapping for Information Clustering.
WOSIS 2005: 196-206 |
31 | EE | Yi Hu,
Brajendra Panda:
Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems.
J. Network Syst. Manage. 13(3): 269-291 (2005) |
2004 |
30 | | Yanjun Zuo,
Brajendra Panda:
Damage Discovery in Distributed Database Systems.
DBSec 2004: 111-123 |
29 | EE | Jing Zhou,
Brajendra Panda,
Yi Hu:
Succinct and Fast Accessible Data Structures for Database Damage Assessment.
ICDCIT 2004: 420-429 |
28 | EE | Yi Hu,
Brajendra Panda:
A data mining approach for database intrusion detection.
SAC 2004: 711-716 |
27 | EE | Rajesh Yalamanchili,
Brajendra Panda:
Transaction Fusion: A Model for Data Recovery from Information Attacks.
J. Intell. Inf. Syst. 23(3): 225-245 (2004) |
2003 |
26 | | Prahalad Ragothaman,
Brajendra Panda:
Improving Damage Assessment Efficacy in case of Frequent Attacks on Databases.
DBSec 2003: 16-30 |
25 | | Amit Valsangkar,
Brajendra Panda:
An Architecture for Making Data Available Ceaselessly During Recovery.
IAW 2003: 196-202 |
24 | | Yanjun Zuo,
Brajendra Panda:
Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs.
IAW 2003: 306-307 |
23 | EE | Yi Hu,
Brajendra Panda:
Identification of Malicious Transactions in Database Systems.
IDEAS 2003: 329-335 |
22 | EE | Brajendra Panda,
Jing Zhou:
Database Damage Assessment Using A Matrix Based Approach: An Intrusion Response System.
IDEAS 2003: 336-341 |
21 | | Prahalad Ragothaman,
Brajendra Panda:
Hybrid Log Segmentation for Assured Damage Assessment.
SAC 2003: 522-527 |
20 | | Satyadeep Patnaik,
Brajendra Panda:
Transaction-Relationship Oriented Log Division for Data Recovery from Information Attacks.
J. Database Manag. 14(2): 27-41 (2003) |
2002 |
19 | | Prahalad Ragothaman,
Brajendra Panda:
Dividing Database Login to Equal Size Segments for Efficiency.
Computers and Their Applications 2002: 118-121 |
18 | | Prahalad Ragothaman,
Brajendra Panda:
Analyzing Transaction Logs for Effective Damage Assessment.
DBSec 2002: 89-101 |
17 | EE | Brajendra Panda,
Kazi Asharful Haque:
Extended data dependency approach: a robust way of rebuilding database.
SAC 2002: 446-452 |
2001 |
16 | | Brajendra Panda,
Rajesh Yalamanchili:
A model to detect multi-source information attacks.
Computers and Their Applications 2001: 447-451 |
15 | | Rumman Sobhan,
Brajendra Panda:
Reorganization of Database Log for Information Warfare Data Recovery.
DBSec 2001: 121-134 |
14 | | Brajendra Panda,
Prahalad Ragothaman:
Alternate Methods of Storing Committed Transactions in the Log for Their Future Re-execution.
ISAS-SCI (1) 2001: 508-512 |
13 | EE | Yuelong Gu,
Brajendra Panda,
Kazi Asharful Haque:
Design and analysis of data structures for querying image databases.
SAC 2001: 236-241 |
12 | EE | Brajendra Panda,
Rajesh Yalamanchili:
Transaction fusion in the wake of information warfare.
SAC 2001: 242-247 |
11 | | Chandana Lala,
Brajendra Panda:
Evaluating damage from cyber attacks: a model and analysis.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 31(4): 300-310 (2001) |
2000 |
10 | | Chandana Lala,
Brajendra Panda,
Rumman Sobhan:
Storing transaction dependency graphs for damage appraisal following an information attack.
Computers and Their Applications 2000: 317-321 |
9 | | Brajendra Panda,
Sani Tripathy:
Data Dependency Based Logging for Defensive Information Warfare.
SAC (1) 2000: 361-365 |
1999 |
8 | EE | Satyadeep Patnaik,
Marshall Meier,
Brian Henderson,
Joe Hickman,
Brajendra Panda:
Improving the Performance of Lineage Tracing in Data Warehouse.
SAC 1999: 210-215 |
7 | EE | Brajendra Panda,
Joseph Giordano:
Defensive Information Warfare - Introduction.
Commun. ACM 42(7): 30-32 (1999) |
1998 |
6 | | Brajendra Panda,
Joseph Giordano:
Reconstructing the Database after Electronic Attacks.
DBSec 1998: 143-156 |
5 | EE | Brajendra Panda,
Joseph Giordano:
An overview of post information warfare data recovery.
SAC 1998: 253-254 |
1997 |
4 | EE | Brajendra Panda:
An alternative approach to serialization of multilevel secure Transactions.
SAC 1997: 134-135 |
1995 |
3 | | Brajendra Panda,
William Perrizo:
Maintaining Surrogate Data for Query Acceleration in Multilevel Secure Database Systems.
CISMOD 1995: 45-57 |
2 | EE | Brajendra Panda,
William Perrizo:
Query execution in prism and seaview: a cost analysis.
SAC 1995: 65-70 |
1994 |
1 | EE | Brajendra Panda,
William Perrizo,
Ramzi A. Haraty:
Secure transaction management and query processing in multilevel secure database systems.
SAC 1994: 363-368 |