Brajendra Panda - Publications

Affiliations: 
University of Arkansas, Little Rock, AR 
Area:
Computer Science

37 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Yaseen Q, Jararweh Y, Panda B, Althebyan Q. An insider threat aware access control for cloud relational databases Cluster Computing. 20: 2669-2685. DOI: 10.1007/S10586-017-0810-Y  0.733
2016 Yaseen Q, Althebyan Q, Panda B, Jararweh Y. Mitigating insider threat in cloud relational databases Security and Communication Networks. 9: 1132-1145. DOI: 10.1002/Sec.1405  0.734
2013 Ragavan H, Panda B. Mitigating malicious updates: Prevention of insider threat to databases Proceedings - 12th Ieee International Conference On Trust, Security and Privacy in Computing and Communications, Trustcom 2013. 781-788. DOI: 10.1109/TrustCom.2013.95  0.396
2013 Zuo Y, Panda B. Composition and combination-based object trust evaluation for knowledge management in virtual organizations Vine. 43: 296-321. DOI: 10.1108/Vine-03-2012-0004  0.567
2012 Yaseen Q, Panda B. Tackling insider threat in cloud relational databases Proceedings - 2012 Ieee/Acm 5th International Conference On Utility and Cloud Computing, Ucc 2012. 215-218. DOI: 10.1109/UCC.2012.18  0.729
2012 Yaseen Q, Panda B. Mitigating insider threat without limiting the availability in concurrent undeclared tasks Proceedings of the 2012 Ieee 6th International Conference On Software Security and Reliability, Sere 2012. 235-244. DOI: 10.1109/SERE.2012.36  0.716
2012 Yaseen Q, Panda B. Insider threat mitigation: Preventing unauthorized knowledge acquisition International Journal of Information Security. 11: 269-280. DOI: 10.1007/S10207-012-0165-6  0.758
2011 Ragavan H, Panda B. Mitigation of malicious modifications by insiders in databases Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7093: 337-351. DOI: 10.1007/978-3-642-25560-1_23  0.426
2011 Yaseen Q, Panda B. Enhanced insider threat detection model that increases data availability Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6536: 267-277. DOI: 10.1007/978-3-642-19056-8_20  0.735
2010 Yaseen Q, Panda B. Malicious modification attacks by insiders in relational databases: Prediction and prevention Proceedings - Socialcom 2010: 2nd Ieee International Conference On Social Computing, Passat 2010: 2nd Ieee International Conference On Privacy, Security, Risk and Trust. 849-856. DOI: 10.1109/SocialCom.2010.128  0.732
2010 Yaseen Q, Panda B. Organizing access privileges: Maximizing the availability and mitigating the threat of insider's knowledgebase Proceedings - 2010 4th International Conference On Network and System Security, Nss 2010. 312-317. DOI: 10.1109/NSS.2010.74  0.743
2010 White J, Panda B. Insider threat discovery using automatic detection of mission critical data based on content 2010 6th International Conference On Information Assurance and Security, Ias 2010. 56-61. DOI: 10.1109/ISIAS.2010.5604187  0.345
2010 Hu Y, Panda B. Mining inter-transaction data dependencies for database intrusion detection Innovations and Advances in Computer Sciences and Engineering. 67-72. DOI: 10.1007/978-90-481-3658-2_12  0.33
2010 Yaseen Q, Panda B. Predicting and preventing insider threat in relational database systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6033: 368-383. DOI: 10.1007/978-3-642-12368-9_30  0.727
2009 White J, Panda B. Implementing PII honeytokens to mitigate against the threat of malicous insiders 2009 Ieee International Conference On Intelligence and Security Informatics, Isi 2009. 233. DOI: 10.1109/ISI.2009.5137315  0.312
2009 Yaseen Q, Panda B. Knowledge acquisition and insider threat prediction in relational database systems Proceedings - 12th Ieee International Conference On Computational Science and Engineering, Cse 2009. 3: 450-455. DOI: 10.1109/CSE.2009.159  0.723
2009 White J, Panda B. Automatic identification of critical data items in a database to mitigate the effects of malicious insiders Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5905: 208-221. DOI: 10.1007/978-3-642-10772-6_16  0.425
2008 Althebyan Q, Panda B. Performance analysis of an insider threat mitigation model 3rd International Conference On Digital Information Management, Icdim 2008. 703-709. DOI: 10.1109/ICDIM.2008.4746709  0.301
2008 Althebyan Q, Panda B. A knowledge-based bayesian model for analyzing a system after an insider attack Ifip International Federation For Information Processing. 278: 557-571. DOI: 10.1007/978-0-387-09699-5_36  0.317
2008 Althebyan Q, Panda B. Knowledge extraction and management for insider threat mitigation Security in Information Systems - Proceedings of the 6th International Workshop On Security in Information Systems, Wosis 2008; in Conjunction With Iceis 2008. 99-110.  0.336
2006 Zuo Y, Panda B. Distributed database damage assessment paradigm Information Management and Computer Security. 14: 116-139. DOI: 10.1108/09685220610655870  0.573
2006 Zuo Y, Panda B. A trust-based model for information integrity in open systems Ifip International Federation For Information Processing. 193.  0.516
2005 Hu Y, Panda B. Design and analysis of techniques for detection of malicious activities in database systems Journal of Network and Systems Management. 13: 269-291. DOI: 10.1007/S10922-005-6264-1  0.458
2005 Zuo Y, Panda B. A Trust-Based Model for Information Integrity in Open Systems Ifip Advances in Information and Communication Technology. 193: 337-354.  0.516
2005 Zuo Y, Panda B. External object trust zone mapping for information clustering Proceedings of the 3rd International Workshop On Security in Information Systems, Wosis 2005, in Conjunction With Iceis 2005. 196-206.  0.512
2004 Yalamanchili R, Panda B. Transaction fusion: A model for data recovery from information attacks Journal of Intelligent Information Systems. 23: 225-245. DOI: 10.1023/B:JIIS.0000047393.99078.c4  0.305
2004 Zuo Y, Panda B. Damage discovery in distributed database systems Ifip Advances in Information and Communication Technology. 144: 111-123.  0.522
2004 Zuo Y, Panda B. A service oriented system based information flow model for damage assessment Ifip Advances in Information and Communication Technology. 140: 177-194.  0.302
2004 Zuo Y, Panda B. Fuzzy dependency and its applications in damage assessment and recovery Proceedings Fron the Fifth Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc. 350-357.  0.497
2003 Patnaik S, Panda B. Transaction-relationship oriented log division for data recovery from information attacks Journal of Database Management. 14: 27-41. DOI: 10.4018/Jdm.2003040103  0.447
2003 Valsangkar A, Panda B. An architecture for making data available ceaselessly during recovery Ieee Systems, Man and Cybernetics Society Information Assurance Workshop. 196-202. DOI: 10.1109/SMCSIA.2003.1232421  0.338
2003 Hu Y, Panda B. Identification of malicious transactions in database systems Proceedings of the International Database Engineering and Applications Symposium, Ideas. 329-335. DOI: 10.1109/IDEAS.2003.1214946  0.359
2002 Panda B, Haque KA. Extended data dependency approach - A robust way of rebuilding database Proceedings of the Acm Symposium On Applied Computing. 446-452.  0.355
2001 Lala C, Panda B. Evaluating damage from cyber attacks: A model and analysis Ieee Transactions On Systems, Man, and Cybernetics Part a:Systems and Humans.. 31: 300-310. DOI: 10.1109/3468.935047  0.305
2000 Panda B, Tripathy S. Data dependency based logging for defensive information warfare Proceedings of the Acm Symposium On Applied Computing. 1: 361-365. DOI: 10.1145/335603.335836  0.34
1997 Panda B. An alternative approach to serialization of multilevel secure transactions Proceedings of the Acm Symposium On Applied Computing. 134-135. DOI: 10.1145/331697.331726  0.363
1995 Panda B, Perrizo W. Maintaining surrogate data for query acceleration in multilevel secure database systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1006: 45-57. DOI: 10.1007/3-540-60584-3_23  0.376
Show low-probability matches.