The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Partha Pratim Pal: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jennifer Chong, Partha Pratim Pal, Michael Atigethchi, Paul Rubel, Franklin Webber
    Survivability Architecture of a Mission Critical System: The DPASA Example. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:495-504 [Conf]
  2. Joseph P. Loyall, Richard E. Schantz, John A. Zinky, Partha Pratim Pal, Richard Shapiro, Craig Rodrigues, Michael Atighetchi, David A. Karr, Jeanna M. Gossett, Christopher D. Gill
    Comparing and Contrasting Adaptive Middleware Support in Wide-Area and Embedded Distributed Object Applications. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2001, pp:625-634 [Conf]
  3. Michael Atighetchi, Partha Pratim Pal, Christopher C. Jones, Paul Rubel, Richard E. Schantz, Joseph P. Loyall, John A. Zinky
    Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:104-0 [Conf]
  4. Partha Pratim Pal, Richard E. Schantz, Joseph P. Loyall
    Timeliness in Auto-Adaptive Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2004, pp:354-359 [Conf]
  5. Richard E. Schantz, Franklin Webber, Partha Pratim Pal, Joseph P. Loyall, Douglas C. Schmidt
    Protecting Applications Against Malice Using AdaptiveMiddleware. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:73-108 [Conf]
  6. Michael Atighetchi, Partha Pratim Pal, Franklin Webber, Christopher C. Jones
    Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. [Citation Graph (0, 0)][DBLP]
    ISORC, 2003, pp:183-192 [Conf]
  7. Richard E. Schantz, Joseph P. Loyall, Michael Atighetchi, Partha Pratim Pal
    Packaging Quality of Service Control Behaviors for Reuse. [Citation Graph (0, 0)][DBLP]
    Symposium on Object-Oriented Real-Time Distributed Computing, 2002, pp:375-385 [Conf]
  8. Partha Pratim Pal, Joseph P. Loyall, Richard E. Schantz, John A. Zinky, Richard Shapiro, James Megquier
    Using QDL to Specify QoS Aware Distributed (QuO) Application Configuration. [Citation Graph (0, 0)][DBLP]
    ISORC, 2000, pp:310-319 [Conf]
  9. Michael Atighetchi, Partha Pratim Pal, Franklin Webber, Christopher C. Jones
    Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. [Citation Graph (0, 0)][DBLP]
    NCA, 2003, pp:179-0 [Conf]
  10. Michael Atighetchi, Paul Rubel, Partha Pratim Pal, Jennifer Chong, Lyle Sudin
    Networking Aspects in the DPASA Survivability Architecture: An Experience Report. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:219-222 [Conf]
  11. Joseph P. Loyall, Partha Pratim Pal, Richard E. Schantz, Franklin Webber
    Building Adaptive and Agile Applications Using Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  12. Partha Pratim Pal, Franklin Webber, Richard E. Schantz
    Survival by defense-enabling. [Citation Graph (0, 0)][DBLP]
    NSPW, 2001, pp:71-78 [Conf]
  13. Fabrice Stevens, Tod Courtney, Sankalp Singh, Adnan Agbaria, John F. Meyer, William H. Sanders, Partha Pratim Pal
    Model-Based Validation of an Intrusion-Tolerant Information System. [Citation Graph (0, 0)][DBLP]
    SRDS, 2004, pp:184-194 [Conf]
  14. Partha Pratim Pal, James Megquier
    XML and Quality Objects. [Citation Graph (0, 0)][DBLP]
    WETICE, 1999, pp:315-316 [Conf]
  15. Partha Pratim Pal
    A framework for isolating connection expection management. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 2000, v:32, n:1es, pp:29- [Journal]
  16. Michael Atighetchi, Partha Pratim Pal, Franklin Webber, Richard E. Schantz, Christopher C. Jones, Joseph P. Loyall
    Adaptive Cyberdefense for Survival and Intrusion Tolerance. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2004, v:8, n:6, pp:25-33 [Journal]
  17. Naftaly H. Minsky, Partha Pratim Pal
    Providing multiple views for objects. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2000, v:30, n:7, pp:803-823 [Journal]
  18. Partha Pratim Pal, Paul Rubel, Michael Atighetchi, Franklin Webber, William H. Sanders, Mouna Seri, HariGovind V. Ramasamy, James Lyons, Tod Courtney, Adnan Agbaria, Michel Cukier, Jeanna M. Gossett, Idit Keidar
    An architecture for adaptive intrusion-tolerant applications. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2006, v:36, n:11-12, pp:1331-1354 [Journal]
  19. Naftaly H. Minsky, Partha Pratim Pal
    Law-Governed Regularities in Object Systems, Part 2: A Concrete Implementation. [Citation Graph (0, 0)][DBLP]
    TAPOS, 1997, v:3, n:2, pp:87-101 [Journal]
  20. Partha Pratim Pal, Franklin Webber, Michael Atighetchi, Nate Combs
    Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing. [Citation Graph (0, 0)][DBLP]
    NCA, 2006, pp:285-292 [Conf]

  21. Effective Monitoring of a Survivable Distributed Networked Information System. [Citation Graph (, )][DBLP]


  22. High-Assurance Distributed, Adaptive Software for Dynamic Systems. [Citation Graph (, )][DBLP]


  23. From Auto-adaptive to Survivable and Self-Regenerative Systems. [Citation Graph (, )][DBLP]


  24. Attribute-Based Prevention of Phishing Attacks. [Citation Graph (, )][DBLP]


  25. Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response. [Citation Graph (, )][DBLP]


  26. Using a Cognitive Architecture to Automate Cyberdefense Reasoning. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002