|
Search the dblp DataBase
Partha Pratim Pal:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jennifer Chong, Partha Pratim Pal, Michael Atigethchi, Paul Rubel, Franklin Webber
Survivability Architecture of a Mission Critical System: The DPASA Example. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:495-504 [Conf]
- Joseph P. Loyall, Richard E. Schantz, John A. Zinky, Partha Pratim Pal, Richard Shapiro, Craig Rodrigues, Michael Atighetchi, David A. Karr, Jeanna M. Gossett, Christopher D. Gill
Comparing and Contrasting Adaptive Middleware Support in Wide-Area and Embedded Distributed Object Applications. [Citation Graph (0, 0)][DBLP] ICDCS, 2001, pp:625-634 [Conf]
- Michael Atighetchi, Partha Pratim Pal, Christopher C. Jones, Paul Rubel, Richard E. Schantz, Joseph P. Loyall, John A. Zinky
Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2003, pp:104-0 [Conf]
- Partha Pratim Pal, Richard E. Schantz, Joseph P. Loyall
Timeliness in Auto-Adaptive Distributed Systems. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2004, pp:354-359 [Conf]
- Richard E. Schantz, Franklin Webber, Partha Pratim Pal, Joseph P. Loyall, Douglas C. Schmidt
Protecting Applications Against Malice Using AdaptiveMiddleware. [Citation Graph (0, 0)][DBLP] Certification and Security in E-Services, 2002, pp:73-108 [Conf]
- Michael Atighetchi, Partha Pratim Pal, Franklin Webber, Christopher C. Jones
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. [Citation Graph (0, 0)][DBLP] ISORC, 2003, pp:183-192 [Conf]
- Richard E. Schantz, Joseph P. Loyall, Michael Atighetchi, Partha Pratim Pal
Packaging Quality of Service Control Behaviors for Reuse. [Citation Graph (0, 0)][DBLP] Symposium on Object-Oriented Real-Time Distributed Computing, 2002, pp:375-385 [Conf]
- Partha Pratim Pal, Joseph P. Loyall, Richard E. Schantz, John A. Zinky, Richard Shapiro, James Megquier
Using QDL to Specify QoS Aware Distributed (QuO) Application Configuration. [Citation Graph (0, 0)][DBLP] ISORC, 2000, pp:310-319 [Conf]
- Michael Atighetchi, Partha Pratim Pal, Franklin Webber, Christopher C. Jones
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. [Citation Graph (0, 0)][DBLP] NCA, 2003, pp:179-0 [Conf]
- Michael Atighetchi, Paul Rubel, Partha Pratim Pal, Jennifer Chong, Lyle Sudin
Networking Aspects in the DPASA Survivability Architecture: An Experience Report. [Citation Graph (0, 0)][DBLP] NCA, 2005, pp:219-222 [Conf]
- Joseph P. Loyall, Partha Pratim Pal, Richard E. Schantz, Franklin Webber
Building Adaptive and Agile Applications Using Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP] NDSS, 2000, pp:- [Conf]
- Partha Pratim Pal, Franklin Webber, Richard E. Schantz
Survival by defense-enabling. [Citation Graph (0, 0)][DBLP] NSPW, 2001, pp:71-78 [Conf]
- Fabrice Stevens, Tod Courtney, Sankalp Singh, Adnan Agbaria, John F. Meyer, William H. Sanders, Partha Pratim Pal
Model-Based Validation of an Intrusion-Tolerant Information System. [Citation Graph (0, 0)][DBLP] SRDS, 2004, pp:184-194 [Conf]
- Partha Pratim Pal, James Megquier
XML and Quality Objects. [Citation Graph (0, 0)][DBLP] WETICE, 1999, pp:315-316 [Conf]
- Partha Pratim Pal
A framework for isolating connection expection management. [Citation Graph (0, 0)][DBLP] ACM Comput. Surv., 2000, v:32, n:1es, pp:29- [Journal]
- Michael Atighetchi, Partha Pratim Pal, Franklin Webber, Richard E. Schantz, Christopher C. Jones, Joseph P. Loyall
Adaptive Cyberdefense for Survival and Intrusion Tolerance. [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2004, v:8, n:6, pp:25-33 [Journal]
- Naftaly H. Minsky, Partha Pratim Pal
Providing multiple views for objects. [Citation Graph (0, 0)][DBLP] Softw., Pract. Exper., 2000, v:30, n:7, pp:803-823 [Journal]
- Partha Pratim Pal, Paul Rubel, Michael Atighetchi, Franklin Webber, William H. Sanders, Mouna Seri, HariGovind V. Ramasamy, James Lyons, Tod Courtney, Adnan Agbaria, Michel Cukier, Jeanna M. Gossett, Idit Keidar
An architecture for adaptive intrusion-tolerant applications. [Citation Graph (0, 0)][DBLP] Softw., Pract. Exper., 2006, v:36, n:11-12, pp:1331-1354 [Journal]
- Naftaly H. Minsky, Partha Pratim Pal
Law-Governed Regularities in Object Systems, Part 2: A Concrete Implementation. [Citation Graph (0, 0)][DBLP] TAPOS, 1997, v:3, n:2, pp:87-101 [Journal]
- Partha Pratim Pal, Franklin Webber, Michael Atighetchi, Nate Combs
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing. [Citation Graph (0, 0)][DBLP] NCA, 2006, pp:285-292 [Conf]
Effective Monitoring of a Survivable Distributed Networked Information System. [Citation Graph (, )][DBLP]
High-Assurance Distributed, Adaptive Software for Dynamic Systems. [Citation Graph (, )][DBLP]
From Auto-adaptive to Survivable and Self-Regenerative Systems. [Citation Graph (, )][DBLP]
Attribute-Based Prevention of Phishing Attacks. [Citation Graph (, )][DBLP]
Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response. [Citation Graph (, )][DBLP]
Using a Cognitive Architecture to Automate Cyberdefense Reasoning. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.305secs
|