dblp.uni-trier.dewww.uni-trier.de

Brajendra Panda Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
46EEYermek Nugmanov, Brajendra Panda, Yi Hu: Analysis of Data Dependency Based Intrusion Detection System. DBSec 2009: 111-125
2008
45EEQutaibah Althebyan, Brajendra Panda: Performance analysis of an insider threat mitigation model. ICDIM 2008: 703-709
44EEQutaibah Althebyan, Brajendra Panda: A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. SEC 2008: 557-571
43 Qutaibah Althebyan, Brajendra Panda: Knowledge Extraction and Management for Insider Threat Mitigation. WOSIS 2008: 99-110
42EEYanjun Zuo, Brajendra Panda: Two-level trust-based decision model for information assurance in a virtual organization. Decision Support Systems 45(2): 291-309 (2008)
2007
41EEYi Hu, Zhichun Xiao, Brajendra Panda: A Trust Based Information Dissemination Model for Evaluating the Effect of Deceptive Data. HICSS 2007: 157
40EESastry Konduri, Brajendra Panda, Wing-Ning Li: Monitoring Information Leakage During Query Aggregation. ICDCIT 2007: 89-96
39EEHadi Sabaa, Brajendra Panda: Data authentication and provenance management. ICDIM 2007: 309-314
38EEYi Hu, Zhichun Xiao, Brajendra Panda: Modeling deceptive information dissemination using a holistic approach. SAC 2007: 1591-1598
2006
37EEYanjun Zuo, Brajendra Panda: Information trustworthiness evaluation based on trust combination. SAC 2006: 1880-1885
36 Yi Hu, Brajendra Panda: Modeling Deceptive Action in Virtual Communities. WOSIS 2006: 125-134
35EEBrajendra Panda, Joseph Giordano, Daniel Kalil: Introduction. Commun. ACM 49(2): 44-47 (2006)
34EEYanjun Zuo, Brajendra Panda: Distributed database damage assessment paradigm. Inf. Manag. Comput. Security 14(2): 116-139 (2006)
2005
33EEYanjun Zuo, Brajendra Panda: Component based trust management in the context of a virtual organization. SAC 2005: 1582-1588
32 Yanjun Zuo, Brajendra Panda: External Object Trust Zone Mapping for Information Clustering. WOSIS 2005: 196-206
31EEYi Hu, Brajendra Panda: Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. J. Network Syst. Manage. 13(3): 269-291 (2005)
2004
30 Yanjun Zuo, Brajendra Panda: Damage Discovery in Distributed Database Systems. DBSec 2004: 111-123
29EEJing Zhou, Brajendra Panda, Yi Hu: Succinct and Fast Accessible Data Structures for Database Damage Assessment. ICDCIT 2004: 420-429
28EEYi Hu, Brajendra Panda: A data mining approach for database intrusion detection. SAC 2004: 711-716
27EERajesh Yalamanchili, Brajendra Panda: Transaction Fusion: A Model for Data Recovery from Information Attacks. J. Intell. Inf. Syst. 23(3): 225-245 (2004)
2003
26 Prahalad Ragothaman, Brajendra Panda: Improving Damage Assessment Efficacy in case of Frequent Attacks on Databases. DBSec 2003: 16-30
25 Amit Valsangkar, Brajendra Panda: An Architecture for Making Data Available Ceaselessly During Recovery. IAW 2003: 196-202
24 Yanjun Zuo, Brajendra Panda: Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. IAW 2003: 306-307
23EEYi Hu, Brajendra Panda: Identification of Malicious Transactions in Database Systems. IDEAS 2003: 329-335
22EEBrajendra Panda, Jing Zhou: Database Damage Assessment Using A Matrix Based Approach: An Intrusion Response System. IDEAS 2003: 336-341
21 Prahalad Ragothaman, Brajendra Panda: Hybrid Log Segmentation for Assured Damage Assessment. SAC 2003: 522-527
20 Satyadeep Patnaik, Brajendra Panda: Transaction-Relationship Oriented Log Division for Data Recovery from Information Attacks. J. Database Manag. 14(2): 27-41 (2003)
2002
19 Prahalad Ragothaman, Brajendra Panda: Dividing Database Login to Equal Size Segments for Efficiency. Computers and Their Applications 2002: 118-121
18 Prahalad Ragothaman, Brajendra Panda: Analyzing Transaction Logs for Effective Damage Assessment. DBSec 2002: 89-101
17EEBrajendra Panda, Kazi Asharful Haque: Extended data dependency approach: a robust way of rebuilding database. SAC 2002: 446-452
2001
16 Brajendra Panda, Rajesh Yalamanchili: A model to detect multi-source information attacks. Computers and Their Applications 2001: 447-451
15 Rumman Sobhan, Brajendra Panda: Reorganization of Database Log for Information Warfare Data Recovery. DBSec 2001: 121-134
14 Brajendra Panda, Prahalad Ragothaman: Alternate Methods of Storing Committed Transactions in the Log for Their Future Re-execution. ISAS-SCI (1) 2001: 508-512
13EEYuelong Gu, Brajendra Panda, Kazi Asharful Haque: Design and analysis of data structures for querying image databases. SAC 2001: 236-241
12EEBrajendra Panda, Rajesh Yalamanchili: Transaction fusion in the wake of information warfare. SAC 2001: 242-247
11 Chandana Lala, Brajendra Panda: Evaluating damage from cyber attacks: a model and analysis. IEEE Transactions on Systems, Man, and Cybernetics, Part A 31(4): 300-310 (2001)
2000
10 Chandana Lala, Brajendra Panda, Rumman Sobhan: Storing transaction dependency graphs for damage appraisal following an information attack. Computers and Their Applications 2000: 317-321
9 Brajendra Panda, Sani Tripathy: Data Dependency Based Logging for Defensive Information Warfare. SAC (1) 2000: 361-365
1999
8EESatyadeep Patnaik, Marshall Meier, Brian Henderson, Joe Hickman, Brajendra Panda: Improving the Performance of Lineage Tracing in Data Warehouse. SAC 1999: 210-215
7EEBrajendra Panda, Joseph Giordano: Defensive Information Warfare - Introduction. Commun. ACM 42(7): 30-32 (1999)
1998
6 Brajendra Panda, Joseph Giordano: Reconstructing the Database after Electronic Attacks. DBSec 1998: 143-156
5EEBrajendra Panda, Joseph Giordano: An overview of post information warfare data recovery. SAC 1998: 253-254
1997
4EEBrajendra Panda: An alternative approach to serialization of multilevel secure Transactions. SAC 1997: 134-135
1995
3 Brajendra Panda, William Perrizo: Maintaining Surrogate Data for Query Acceleration in Multilevel Secure Database Systems. CISMOD 1995: 45-57
2EEBrajendra Panda, William Perrizo: Query execution in prism and seaview: a cost analysis. SAC 1995: 65-70
1994
1EEBrajendra Panda, William Perrizo, Ramzi A. Haraty: Secure transaction management and query processing in multilevel secure database systems. SAC 1994: 363-368

Coauthor Index

1Qutaibah Althebyan [43] [44] [45]
2Joseph Giordano [5] [6] [7] [35]
3Yuelong Gu [13]
4Kazi Asharful Haque [13] [17]
5Ramzi A. Haraty [1]
6Brian Henderson [8]
7Joe Hickman [8]
8Yi Hu [23] [28] [29] [31] [36] [38] [41] [46]
9Daniel Kalil [35]
10Sastry Konduri [40]
11Chandana Lala [10] [11]
12Wing-Ning Li [40]
13Marshall Meier [8]
14Yermek Nugmanov [46]
15Satyadeep Patnaik [8] [20]
16William Perrizo [1] [2] [3]
17Prahalad Ragothaman [14] [18] [19] [21] [26]
18Hadi Sabaa [39]
19Rumman Sobhan [10] [15]
20Sani Tripathy [9]
21Amit Valsangkar [25]
22Zhichun Xiao [38] [41]
23Rajesh Yalamanchili [12] [16] [27]
24Jing Zhou [22] [29]
25Yanjun Zuo [24] [30] [32] [33] [34] [37] [42]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)