The SCEAS System
Navigation Menu

Search the dblp DataBase


Brajendra Panda: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Prahalad Ragothaman, Brajendra Panda
    Dividing Database Login to Equal Size Segments for Efficiency. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2002, pp:118-121 [Conf]
  2. Chandana Lala, Brajendra Panda, Rumman Sobhan
    Storing transaction dependency graphs for damage appraisal following an information attack. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:317-321 [Conf]
  3. Brajendra Panda, Rajesh Yalamanchili
    A model to detect multi-source information attacks. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2001, pp:447-451 [Conf]
  4. Brajendra Panda, William Perrizo
    Maintaining Surrogate Data for Query Acceleration in Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP]
    CISMOD, 1995, pp:45-57 [Conf]
  5. Brajendra Panda, Joseph Giordano
    Reconstructing the Database after Electronic Attacks. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:143-156 [Conf]
  6. Rumman Sobhan, Brajendra Panda
    Reorganization of Database Log for Information Warfare Data Recovery. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:121-134 [Conf]
  7. Prahalad Ragothaman, Brajendra Panda
    Analyzing Transaction Logs for Effective Damage Assessment. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:89-101 [Conf]
  8. Prahalad Ragothaman, Brajendra Panda
    Improving Damage Assessment Efficacy in case of Frequent Attacks on Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:16-30 [Conf]
  9. Yanjun Zuo, Brajendra Panda
    Damage Discovery in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:111-123 [Conf]
  10. Yi Hu, Zhichun Xiao, Brajendra Panda
    A Trust Based Information Dissemination Model for Evaluating the Effect of Deceptive Data. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:157- [Conf]
  11. Amit Valsangkar, Brajendra Panda
    An Architecture for Making Data Available Ceaselessly During Recovery. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:196-202 [Conf]
  12. Yanjun Zuo, Brajendra Panda
    Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:306-307 [Conf]
  13. Jing Zhou, Brajendra Panda, Yi Hu
    Succinct and Fast Accessible Data Structures for Database Damage Assessment. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:420-429 [Conf]
  14. Yi Hu, Brajendra Panda
    Identification of Malicious Transactions in Database Systems. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2003, pp:329-335 [Conf]
  15. Brajendra Panda, Jing Zhou
    Database Damage Assessment Using A Matrix Based Approach: An Intrusion Response System. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2003, pp:336-341 [Conf]
  16. Brajendra Panda, Prahalad Ragothaman
    Alternate Methods of Storing Committed Transactions in the Log for Their Future Re-execution. [Citation Graph (0, 0)][DBLP]
    ISAS-SCI (1), 2001, pp:508-512 [Conf]
  17. Yi Hu, Brajendra Panda
    A data mining approach for database intrusion detection. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:711-716 [Conf]
  18. Yuelong Gu, Brajendra Panda, Kazi Asharful Haque
    Design and analysis of data structures for querying image databases. [Citation Graph (0, 0)][DBLP]
    SAC, 2001, pp:236-241 [Conf]
  19. Brajendra Panda
    An alternative approach to serialization of multilevel secure Transactions. [Citation Graph (0, 0)][DBLP]
    SAC, 1997, pp:134-135 [Conf]
  20. Brajendra Panda, Joseph Giordano
    An overview of post information warfare data recovery. [Citation Graph (0, 0)][DBLP]
    SAC, 1998, pp:253-254 [Conf]
  21. Brajendra Panda, Kazi Asharful Haque
    Extended data dependency approach: a robust way of rebuilding database. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:446-452 [Conf]
  22. Brajendra Panda, William Perrizo
    Query execution in prism and seaview: a cost analysis. [Citation Graph (0, 0)][DBLP]
    SAC, 1995, pp:65-70 [Conf]
  23. Brajendra Panda, William Perrizo, Ramzi A. Haraty
    Secure transaction management and query processing in multilevel secure database systems. [Citation Graph (0, 0)][DBLP]
    SAC, 1994, pp:363-368 [Conf]
  24. Brajendra Panda, Sani Tripathy
    Data Dependency Based Logging for Defensive Information Warfare. [Citation Graph (0, 0)][DBLP]
    SAC (1), 2000, pp:361-365 [Conf]
  25. Brajendra Panda, Rajesh Yalamanchili
    Transaction fusion in the wake of information warfare. [Citation Graph (0, 0)][DBLP]
    SAC, 2001, pp:242-247 [Conf]
  26. Satyadeep Patnaik, Marshall Meier, Brian Henderson, Joe Hickman, Brajendra Panda
    Improving the Performance of Lineage Tracing in Data Warehouse. [Citation Graph (0, 0)][DBLP]
    SAC, 1999, pp:210-215 [Conf]
  27. Prahalad Ragothaman, Brajendra Panda
    Hybrid Log Segmentation for Assured Damage Assessment. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:522-527 [Conf]
  28. Yanjun Zuo, Brajendra Panda
    Component based trust management in the context of a virtual organization. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1582-1588 [Conf]
  29. Yanjun Zuo, Brajendra Panda
    Information trustworthiness evaluation based on trust combination. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:1880-1885 [Conf]
  30. Yi Hu, Zhichun Xiao, Brajendra Panda
    Modeling deceptive information dissemination using a holistic approach. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:1591-1598 [Conf]
  31. Yanjun Zuo, Brajendra Panda
    External Object Trust Zone Mapping for Information Clustering. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:196-206 [Conf]
  32. Yi Hu, Brajendra Panda
    Modeling Deceptive Action in Virtual Communities. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:125-134 [Conf]
  33. Brajendra Panda, Joseph Giordano
    Defensive Information Warfare - Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:30-32 [Journal]
  34. Brajendra Panda, Joseph Giordano, Daniel Kalil
    Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:44-47 [Journal]
  35. Satyadeep Patnaik, Brajendra Panda
    Transaction-Relationship Oriented Log Division for Data Recovery from Information Attacks. [Citation Graph (0, 0)][DBLP]
    J. Database Manag., 2003, v:14, n:2, pp:27-41 [Journal]
  36. Rajesh Yalamanchili, Brajendra Panda
    Transaction Fusion: A Model for Data Recovery from Information Attacks. [Citation Graph (0, 0)][DBLP]
    J. Intell. Inf. Syst., 2004, v:23, n:3, pp:225-245 [Journal]
  37. Yi Hu, Brajendra Panda
    Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2005, v:13, n:3, pp:269-291 [Journal]
  38. Chandana Lala, Brajendra Panda
    Evaluating damage from cyber attacks: a model and analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:300-310 [Journal]

  39. Analysis of Data Dependency Based Intrusion Detection System. [Citation Graph (, )][DBLP]

  40. Two-Dimensional Traceability Link Rule Mining for Detection of Insider Attacks. [Citation Graph (, )][DBLP]

  41. Monitoring Information Leakage During Query Aggregation. [Citation Graph (, )][DBLP]

  42. Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. [Citation Graph (, )][DBLP]

  43. Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases. [Citation Graph (, )][DBLP]

  44. A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. [Citation Graph (, )][DBLP]

  45. Knowledge Extraction and Management for Insider Threat Mitigation. [Citation Graph (, )][DBLP]

  46. Predicting and Preventing Insider Threat in Relational Database Systems. [Citation Graph (, )][DBLP]

  47. Data authentication and provenance management. [Citation Graph (, )][DBLP]

  48. Performance analysis of an insider threat mitigation model. [Citation Graph (, )][DBLP]

  49. Mining Inter-transaction Data Dependencies for Database Intrusion Detection. [Citation Graph (, )][DBLP]

  50. Provenance Tracking with Bit Vectors. [Citation Graph (, )][DBLP]

  51. Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems. [Citation Graph (, )][DBLP]

  52. Two-level trust-based decision model for information assurance in a virtual organization. [Citation Graph (, )][DBLP]

Search in 0.029secs, Finished in 0.032secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002