Search the dblp DataBase
Brajendra Panda :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Prahalad Ragothaman , Brajendra Panda Dividing Database Login to Equal Size Segments for Efficiency. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2002, pp:118-121 [Conf ] Chandana Lala , Brajendra Panda , Rumman Sobhan Storing transaction dependency graphs for damage appraisal following an information attack. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:317-321 [Conf ] Brajendra Panda , Rajesh Yalamanchili A model to detect multi-source information attacks. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2001, pp:447-451 [Conf ] Brajendra Panda , William Perrizo Maintaining Surrogate Data for Query Acceleration in Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP ] CISMOD, 1995, pp:45-57 [Conf ] Brajendra Panda , Joseph Giordano Reconstructing the Database after Electronic Attacks. [Citation Graph (0, 0)][DBLP ] DBSec, 1998, pp:143-156 [Conf ] Rumman Sobhan , Brajendra Panda Reorganization of Database Log for Information Warfare Data Recovery. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:121-134 [Conf ] Prahalad Ragothaman , Brajendra Panda Analyzing Transaction Logs for Effective Damage Assessment. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:89-101 [Conf ] Prahalad Ragothaman , Brajendra Panda Improving Damage Assessment Efficacy in case of Frequent Attacks on Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:16-30 [Conf ] Yanjun Zuo , Brajendra Panda Damage Discovery in Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:111-123 [Conf ] Yi Hu , Zhichun Xiao , Brajendra Panda A Trust Based Information Dissemination Model for Evaluating the Effect of Deceptive Data. [Citation Graph (0, 0)][DBLP ] HICSS, 2007, pp:157- [Conf ] Amit Valsangkar , Brajendra Panda An Architecture for Making Data Available Ceaselessly During Recovery. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:196-202 [Conf ] Yanjun Zuo , Brajendra Panda Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:306-307 [Conf ] Jing Zhou , Brajendra Panda , Yi Hu Succinct and Fast Accessible Data Structures for Database Damage Assessment. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2004, pp:420-429 [Conf ] Yi Hu , Brajendra Panda Identification of Malicious Transactions in Database Systems. [Citation Graph (0, 0)][DBLP ] IDEAS, 2003, pp:329-335 [Conf ] Brajendra Panda , Jing Zhou Database Damage Assessment Using A Matrix Based Approach: An Intrusion Response System. [Citation Graph (0, 0)][DBLP ] IDEAS, 2003, pp:336-341 [Conf ] Brajendra Panda , Prahalad Ragothaman Alternate Methods of Storing Committed Transactions in the Log for Their Future Re-execution. [Citation Graph (0, 0)][DBLP ] ISAS-SCI (1), 2001, pp:508-512 [Conf ] Yi Hu , Brajendra Panda A data mining approach for database intrusion detection. [Citation Graph (0, 0)][DBLP ] SAC, 2004, pp:711-716 [Conf ] Yuelong Gu , Brajendra Panda , Kazi Asharful Haque Design and analysis of data structures for querying image databases. [Citation Graph (0, 0)][DBLP ] SAC, 2001, pp:236-241 [Conf ] Brajendra Panda An alternative approach to serialization of multilevel secure Transactions. [Citation Graph (0, 0)][DBLP ] SAC, 1997, pp:134-135 [Conf ] Brajendra Panda , Joseph Giordano An overview of post information warfare data recovery. [Citation Graph (0, 0)][DBLP ] SAC, 1998, pp:253-254 [Conf ] Brajendra Panda , Kazi Asharful Haque Extended data dependency approach: a robust way of rebuilding database. [Citation Graph (0, 0)][DBLP ] SAC, 2002, pp:446-452 [Conf ] Brajendra Panda , William Perrizo Query execution in prism and seaview: a cost analysis. [Citation Graph (0, 0)][DBLP ] SAC, 1995, pp:65-70 [Conf ] Brajendra Panda , William Perrizo , Ramzi A. Haraty Secure transaction management and query processing in multilevel secure database systems. [Citation Graph (0, 0)][DBLP ] SAC, 1994, pp:363-368 [Conf ] Brajendra Panda , Sani Tripathy Data Dependency Based Logging for Defensive Information Warfare. [Citation Graph (0, 0)][DBLP ] SAC (1), 2000, pp:361-365 [Conf ] Brajendra Panda , Rajesh Yalamanchili Transaction fusion in the wake of information warfare. [Citation Graph (0, 0)][DBLP ] SAC, 2001, pp:242-247 [Conf ] Satyadeep Patnaik , Marshall Meier , Brian Henderson , Joe Hickman , Brajendra Panda Improving the Performance of Lineage Tracing in Data Warehouse. [Citation Graph (0, 0)][DBLP ] SAC, 1999, pp:210-215 [Conf ] Prahalad Ragothaman , Brajendra Panda Hybrid Log Segmentation for Assured Damage Assessment. [Citation Graph (0, 0)][DBLP ] SAC, 2003, pp:522-527 [Conf ] Yanjun Zuo , Brajendra Panda Component based trust management in the context of a virtual organization. [Citation Graph (0, 0)][DBLP ] SAC, 2005, pp:1582-1588 [Conf ] Yanjun Zuo , Brajendra Panda Information trustworthiness evaluation based on trust combination. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:1880-1885 [Conf ] Yi Hu , Zhichun Xiao , Brajendra Panda Modeling deceptive information dissemination using a holistic approach. [Citation Graph (0, 0)][DBLP ] SAC, 2007, pp:1591-1598 [Conf ] Yanjun Zuo , Brajendra Panda External Object Trust Zone Mapping for Information Clustering. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:196-206 [Conf ] Yi Hu , Brajendra Panda Modeling Deceptive Action in Virtual Communities. [Citation Graph (0, 0)][DBLP ] WOSIS, 2006, pp:125-134 [Conf ] Brajendra Panda , Joseph Giordano Defensive Information Warfare - Introduction. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:30-32 [Journal ] Brajendra Panda , Joseph Giordano , Daniel Kalil Introduction. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:44-47 [Journal ] Satyadeep Patnaik , Brajendra Panda Transaction-Relationship Oriented Log Division for Data Recovery from Information Attacks. [Citation Graph (0, 0)][DBLP ] J. Database Manag., 2003, v:14, n:2, pp:27-41 [Journal ] Rajesh Yalamanchili , Brajendra Panda Transaction Fusion: A Model for Data Recovery from Information Attacks. [Citation Graph (0, 0)][DBLP ] J. Intell. Inf. Syst., 2004, v:23, n:3, pp:225-245 [Journal ] Yi Hu , Brajendra Panda Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2005, v:13, n:3, pp:269-291 [Journal ] Chandana Lala , Brajendra Panda Evaluating damage from cyber attacks: a model and analysis. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:300-310 [Journal ] Analysis of Data Dependency Based Intrusion Detection System. [Citation Graph (, )][DBLP ] Two-Dimensional Traceability Link Rule Mining for Detection of Insider Attacks. [Citation Graph (, )][DBLP ] Monitoring Information Leakage During Query Aggregation. [Citation Graph (, )][DBLP ] Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. [Citation Graph (, )][DBLP ] Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases. [Citation Graph (, )][DBLP ] A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. [Citation Graph (, )][DBLP ] Knowledge Extraction and Management for Insider Threat Mitigation. [Citation Graph (, )][DBLP ] Predicting and Preventing Insider Threat in Relational Database Systems. [Citation Graph (, )][DBLP ] Data authentication and provenance management. [Citation Graph (, )][DBLP ] Performance analysis of an insider threat mitigation model. [Citation Graph (, )][DBLP ] Mining Inter-transaction Data Dependencies for Database Intrusion Detection. [Citation Graph (, )][DBLP ] Provenance Tracking with Bit Vectors. [Citation Graph (, )][DBLP ] Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems. [Citation Graph (, )][DBLP ] Two-level trust-based decision model for information assurance in a virtual organization. [Citation Graph (, )][DBLP ] Search in 0.029secs, Finished in 0.032secs