Year |
Citation |
Score |
2017 |
Yaseen Q, Jararweh Y, Panda B, Althebyan Q. An insider threat aware access control for cloud relational databases Cluster Computing. 20: 2669-2685. DOI: 10.1007/S10586-017-0810-Y |
0.733 |
|
2016 |
Yaseen Q, Althebyan Q, Panda B, Jararweh Y. Mitigating insider threat in cloud relational databases Security and Communication Networks. 9: 1132-1145. DOI: 10.1002/Sec.1405 |
0.734 |
|
2013 |
Ragavan H, Panda B. Mitigating malicious updates: Prevention of insider threat to databases Proceedings - 12th Ieee International Conference On Trust, Security and Privacy in Computing and Communications, Trustcom 2013. 781-788. DOI: 10.1109/TrustCom.2013.95 |
0.396 |
|
2013 |
Zuo Y, Panda B. Composition and combination-based object trust evaluation for knowledge management in virtual organizations Vine. 43: 296-321. DOI: 10.1108/Vine-03-2012-0004 |
0.567 |
|
2012 |
Yaseen Q, Panda B. Tackling insider threat in cloud relational databases Proceedings - 2012 Ieee/Acm 5th International Conference On Utility and Cloud Computing, Ucc 2012. 215-218. DOI: 10.1109/UCC.2012.18 |
0.729 |
|
2012 |
Yaseen Q, Panda B. Mitigating insider threat without limiting the availability in concurrent undeclared tasks Proceedings of the 2012 Ieee 6th International Conference On Software Security and Reliability, Sere 2012. 235-244. DOI: 10.1109/SERE.2012.36 |
0.716 |
|
2012 |
Yaseen Q, Panda B. Insider threat mitigation: Preventing unauthorized knowledge acquisition International Journal of Information Security. 11: 269-280. DOI: 10.1007/S10207-012-0165-6 |
0.758 |
|
2011 |
Ragavan H, Panda B. Mitigation of malicious modifications by insiders in databases Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7093: 337-351. DOI: 10.1007/978-3-642-25560-1_23 |
0.426 |
|
2011 |
Yaseen Q, Panda B. Enhanced insider threat detection model that increases data availability Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6536: 267-277. DOI: 10.1007/978-3-642-19056-8_20 |
0.735 |
|
2010 |
Yaseen Q, Panda B. Malicious modification attacks by insiders in relational databases: Prediction and prevention Proceedings - Socialcom 2010: 2nd Ieee International Conference On Social Computing, Passat 2010: 2nd Ieee International Conference On Privacy, Security, Risk and Trust. 849-856. DOI: 10.1109/SocialCom.2010.128 |
0.732 |
|
2010 |
Yaseen Q, Panda B. Organizing access privileges: Maximizing the availability and mitigating the threat of insider's knowledgebase Proceedings - 2010 4th International Conference On Network and System Security, Nss 2010. 312-317. DOI: 10.1109/NSS.2010.74 |
0.743 |
|
2010 |
White J, Panda B. Insider threat discovery using automatic detection of mission critical data based on content 2010 6th International Conference On Information Assurance and Security, Ias 2010. 56-61. DOI: 10.1109/ISIAS.2010.5604187 |
0.345 |
|
2010 |
Hu Y, Panda B. Mining inter-transaction data dependencies for database intrusion detection Innovations and Advances in Computer Sciences and Engineering. 67-72. DOI: 10.1007/978-90-481-3658-2_12 |
0.33 |
|
2010 |
Yaseen Q, Panda B. Predicting and preventing insider threat in relational database systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6033: 368-383. DOI: 10.1007/978-3-642-12368-9_30 |
0.727 |
|
2009 |
White J, Panda B. Implementing PII honeytokens to mitigate against the threat of malicous insiders 2009 Ieee International Conference On Intelligence and Security Informatics, Isi 2009. 233. DOI: 10.1109/ISI.2009.5137315 |
0.312 |
|
2009 |
Yaseen Q, Panda B. Knowledge acquisition and insider threat prediction in relational database systems Proceedings - 12th Ieee International Conference On Computational Science and Engineering, Cse 2009. 3: 450-455. DOI: 10.1109/CSE.2009.159 |
0.723 |
|
2009 |
White J, Panda B. Automatic identification of critical data items in a database to mitigate the effects of malicious insiders Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5905: 208-221. DOI: 10.1007/978-3-642-10772-6_16 |
0.425 |
|
2008 |
Althebyan Q, Panda B. Performance analysis of an insider threat mitigation model 3rd International Conference On Digital Information Management, Icdim 2008. 703-709. DOI: 10.1109/ICDIM.2008.4746709 |
0.301 |
|
2008 |
Althebyan Q, Panda B. A knowledge-based bayesian model for analyzing a system after an insider attack Ifip International Federation For Information Processing. 278: 557-571. DOI: 10.1007/978-0-387-09699-5_36 |
0.317 |
|
2008 |
Althebyan Q, Panda B. Knowledge extraction and management for insider threat mitigation Security in Information Systems - Proceedings of the 6th International Workshop On Security in Information Systems, Wosis 2008; in Conjunction With Iceis 2008. 99-110. |
0.336 |
|
2006 |
Zuo Y, Panda B. Distributed database damage assessment paradigm Information Management and Computer Security. 14: 116-139. DOI: 10.1108/09685220610655870 |
0.573 |
|
2006 |
Zuo Y, Panda B. A trust-based model for information integrity in open systems Ifip International Federation For Information Processing. 193. |
0.516 |
|
2005 |
Hu Y, Panda B. Design and analysis of techniques for detection of malicious activities in database systems Journal of Network and Systems Management. 13: 269-291. DOI: 10.1007/S10922-005-6264-1 |
0.458 |
|
2005 |
Zuo Y, Panda B. A Trust-Based Model for Information Integrity in Open Systems Ifip Advances in Information and Communication Technology. 193: 337-354. |
0.516 |
|
2005 |
Zuo Y, Panda B. External object trust zone mapping for information clustering Proceedings of the 3rd International Workshop On Security in Information Systems, Wosis 2005, in Conjunction With Iceis 2005. 196-206. |
0.512 |
|
2004 |
Yalamanchili R, Panda B. Transaction fusion: A model for data recovery from information attacks Journal of Intelligent Information Systems. 23: 225-245. DOI: 10.1023/B:JIIS.0000047393.99078.c4 |
0.305 |
|
2004 |
Zuo Y, Panda B. Damage discovery in distributed database systems Ifip Advances in Information and Communication Technology. 144: 111-123. |
0.522 |
|
2004 |
Zuo Y, Panda B. A service oriented system based information flow model for damage assessment Ifip Advances in Information and Communication Technology. 140: 177-194. |
0.302 |
|
2004 |
Zuo Y, Panda B. Fuzzy dependency and its applications in damage assessment and recovery Proceedings Fron the Fifth Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc. 350-357. |
0.497 |
|
2003 |
Patnaik S, Panda B. Transaction-relationship oriented log division for data recovery from information attacks Journal of Database Management. 14: 27-41. DOI: 10.4018/Jdm.2003040103 |
0.447 |
|
2003 |
Valsangkar A, Panda B. An architecture for making data available ceaselessly during recovery Ieee Systems, Man and Cybernetics Society Information Assurance Workshop. 196-202. DOI: 10.1109/SMCSIA.2003.1232421 |
0.338 |
|
2003 |
Hu Y, Panda B. Identification of malicious transactions in database systems Proceedings of the International Database Engineering and Applications Symposium, Ideas. 329-335. DOI: 10.1109/IDEAS.2003.1214946 |
0.359 |
|
2002 |
Panda B, Haque KA. Extended data dependency approach - A robust way of rebuilding database Proceedings of the Acm Symposium On Applied Computing. 446-452. |
0.355 |
|
2001 |
Lala C, Panda B. Evaluating damage from cyber attacks: A model and analysis Ieee Transactions On Systems, Man, and Cybernetics Part a:Systems and Humans.. 31: 300-310. DOI: 10.1109/3468.935047 |
0.305 |
|
2000 |
Panda B, Tripathy S. Data dependency based logging for defensive information warfare Proceedings of the Acm Symposium On Applied Computing. 1: 361-365. DOI: 10.1145/335603.335836 |
0.34 |
|
1997 |
Panda B. An alternative approach to serialization of multilevel secure transactions Proceedings of the Acm Symposium On Applied Computing. 134-135. DOI: 10.1145/331697.331726 |
0.363 |
|
1995 |
Panda B, Perrizo W. Maintaining surrogate data for query acceleration in multilevel secure database systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1006: 45-57. DOI: 10.1007/3-540-60584-3_23 |
0.376 |
|
Show low-probability matches. |