default search action
Partha P. Pal
Person information
- affiliation: BBN Technologies, Cambridge, MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c60]Kevin Leach, Christopher Steven Timperley, Kevin Angstadt, Anh Nguyen-Tuong, Jason Hiser, Aaron Paulos, Partha P. Pal, Patrick Hurley, Carl Thomas, Jack W. Davidson, Stephanie Forrest, Claire Le Goues, Westley Weimer:
START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report). ISSRE 2022: 73-84 - 2021
- [c59]Partha P. Pal, Aaron Paulos, Richard E. Schantz:
Resiliency and Antifragility in Modern Software Systems- A Concept Paper. ACSOS-C 2021: 263-268 - [c58]Aaron Paulos, Soura Dasgupta, Jacob Beal, Yuanqiu Mo, Jon Schewe, Alexander Wald, Partha Pratim Pal, Richard E. Schantz, J. Bryan Lyles:
Priority-enabled Load Balancing for Dispersed Computing. ICFEC 2021: 1-8 - [c57]David Last, Michael Atighetchi, Partha P. Pal, Ryan Toner:
Using Distributed Ledgers For Command and Control - Concepts and Challenges. MILCOM 2021: 55-60 - 2020
- [i1]Shreyas Ramakrishna, Charles Hartsell, Abhishek Dubey, Partha Pratim Pal, Gabor Karsai:
A Methodology for Automating Assurance Case Generation. CoRR abs/2003.05388 (2020)
2010 – 2019
- 2019
- [j11]Jacob Staples, Charles Endicott, Lee Krause, Partha P. Pal, Peter Samouelian, Richard E. Schantz, Austin Wellman:
A Semi-Autonomic Bytecode Repair Framework. IEEE Softw. 36(2): 97-102 (2019) - [c56]Brian Krisler, Partha Pratim Pal, Zech Bertilson, Dan Thomsen:
Secure Desktop Computing in the Cloud. CSCloud/EdgeCom 2019: 107-112 - [c55]Aaron Paulos, Soura Dasgupta, Jacob Beal, Yuanqiu Mo, Khoi D. Hoang, Lyles J. Bryan, Partha P. Pal, Richard E. Schantz, Jon Schewe, Ramesh K. Sitaraman, Alexander Wald, Christabel Wayllace, William Yeoh:
A Framework for Self-Adaptive Dispersal of Computing Services. FAS*W@SASO/ICAC 2019: 98-103 - 2018
- [c54]Brett Benyo, Shane S. Clark, Aaron Paulos, Partha P. Pal:
HYDRA: Hypothesis Driven Repair Automation. ARES 2018: 8:1-8:10 - 2017
- [c53]Partha P. Pal, Nathaniel Soule, Nate Lageman, Shane S. Clark, Marco M. Carvalho, Adrian Granados, Anthony Alves:
Adaptive Resource Management Enabling Deception (ARMED). ARES 2017: 52:1-52:8 - [c52]Aaron Paulos, Partha P. Pal, Shane S. Clark, Kyle Usbeck, Patrick Hurley:
Trusted Mission Operation - Concept and Implementation. RV 2017: 416-423 - 2015
- [c51]Shane S. Clark, Aaron Paulos, Brett Benyo, Partha P. Pal, Richard E. Schantz:
Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks. ARES 2015: 80-89 - [c50]Shane S. Clark, Jacob Beal, Partha P. Pal:
Distributed Recovery for Enterprise Services. SASO 2015: 111-120 - 2014
- [j10]Hala Mostafa, Partha P. Pal, Patrick Hurley:
Message Passing for Distributed QoS-Security Tradeoffs. Comput. J. 57(6): 840-855 (2014) - [j9]Partha P. Pal, Richard E. Schantz, Aaron Paulos, Brett Benyo:
Managed Execution Environment as a Moving-Target Defense Infrastructure. IEEE Secur. Priv. 12(2): 51-59 (2014) - [c49]Joud Khoury, Gregory Lauer, Partha P. Pal, Bishal Thapa, Joseph P. Loyall:
Efficient Private Publish-Subscribe Systems. ISORC 2014: 64-71 - [c48]Partha P. Pal, Michael Atighetchi, Nathaniel Soule, Vatche Ishakian, Joseph P. Loyall, Robert Grant, Asher Sinclair:
Secure and QoS-Managed Information Exchange Between Enterprise and Constrained Environments. ISORC 2014: 141-149 - 2013
- [c47]Aaron Paulos, Partha P. Pal, Richard E. Schantz, Brett Benyo, David Johnson, Mike Hibler, Eric Eide:
Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment. ARES 2013: 82-91 - [c46]Hala Mostafa, Nathaniel Soule, Nicholas Hoff, Partha P. Pal, Patrick Hurley:
Applying distributed optimization for QoS-security tradeoff in a distributed information system. AAMAS 2013: 1261-1262 - [c45]Michael Atighetchi, Nathaniel Soule, Partha P. Pal, Joseph P. Loyall, Asher Sinclair, Robert Grant:
Safe configuration of TLS connections. CNS 2013: 415-422 - [c44]Aaron Paulos, Partha P. Pal, Richard E. Schantz, Brett Benyo:
Moving target defense (MTD) in an adaptive execution environment. CSIIRW 2013: 62 - [c43]Brett Benyo, Partha P. Pal, Richard E. Schantz, Aaron Paulos, David J. Musliner, Tom Marble, Jeffrey M. Rye, Michael Boldt, Scott E. Friedman:
Automated Self-Adaptation for Cyber-Defense - Pushing Adaptive Perimeter Protection Inward. SASO Workshops 2013: 47-52 - 2012
- [c42]Michael Atighetchi, Partha P. Pal, Joseph P. Loyall, Asher Sinclair:
Avoiding common security flaws in composed service-oriented systems. DSN Workshops 2012: 1-6 - [c41]Jing Zhang, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Safeguarding academic accounts and resources with the University Credential Abuse Auditing System. DSN 2012: 1-8 - [c40]Partha P. Pal, Greg Lauer, Joud Khoury, Nick Hoff, Joseph P. Loyall:
P3S: A Privacy Preserving Publish-Subscribe Middleware. Middleware 2012: 476-495 - [c39]Partha P. Pal, Michael Atighetchi, Andrew Gronosky, Joseph P. Loyall, Charles Payne, Asher Sinclair, Brandon Froberg, Robert Grant:
Cooperative red teaming of a prototype surivable service-oriented system. MILCOM 2012: 1-6 - [c38]Partha P. Pal, Richard E. Schantz, Aaron Paulos, Brett Benyo, David Johnson, Mike Hibler, Eric Eide:
A3: An Environment for Self-Adaptive Diagnosis and Immunization of Novel Attacks. SASO Workshops 2012: 15-22 - [c37]Jing Zhang, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Learning from Early Attempts to Measure Information Security Performance. CSET 2012 - 2011
- [j8]Michael Atighetchi, Brett Benyo, Abhimanyu Gosain, Robert MacIntyre, Partha P. Pal, Virginia Travers, John A. Zinky:
Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy. IEEE Internet Comput. 15(3): 43-50 (2011) - [c36]Alysson Neves Bessani, Partha P. Pal:
5th Workshop on recent advances in intrusion-tolerant systems WRAITS 2011. DSN Workshops 2011: 1-2 - [c35]Patrick Hurley, Partha P. Pal, Matthew Tan Creti, Amy Fedyk:
Continuous mission-oriented assessment (CMA) of assurance. DSN Workshops 2011: 33-38 - [c34]Alysson Neves Bessani, Partha P. Pal:
5th Workshop on Recent Advances in Intrusion-Tolerant Systems WRAITS 2011. DSN 2011: 586-587 - [c33]Joseph P. Loyall, Kurt Rohloff, Partha P. Pal, Michael Atighetchi:
A Survey of Security Concepts for Common Operating Environments. ISORC Workshops 2011: 244-253 - 2010
- [c32]Amy Fedyk, Michael Atighetchi, Partha P. Pal:
Leveraging ESM platforms for continuous mission-oriented assessment of information assurance. CNSM 2010: 234-237 - [c31]Miguel Correia, Partha P. Pal:
4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010. DSN 2010: 621-622 - [c30]Michael Atighetchi, Andrew Gronosky, Partha P. Pal, Joseph P. Loyall:
Usable Survivability. INC 2010: 209-212 - [c29]Partha P. Pal, Michael Atighetchi, Joseph P. Loyall, Andrew Gronosky, Charles Payne, Robert Hillman:
Advanced Protected Services - A Concept Paper on Survivable Service-Oriented Systems. ISORC Workshops 2010: 158-165 - [c28]Partha P. Pal, Richard E. Schantz, Joseph P. Loyall:
Middleware for runtime assessment of information assurance. Middleware (Industry Track) 2010: 23-28 - [c27]Andrew Gronosky, Michael Atighetchi, Partha P. Pal:
Understanding the Vulnerabilities of a SOA Platform - A Case Study. NCA 2010: 182-187 - [c26]Michael Atighetchi, Jonathan Webb, Partha P. Pal, Joseph P. Loyall, Azer Bestavros, Michael J. Mayhew:
Dynamic cross domain information sharing: a concept paper on flexible adaptive policy management. SafeConfig 2010: 83-88 - [c25]Partha P. Pal, Kurt Rohloff, Michael Atighetchi, Richard E. Schantz:
Managed Mission Assurance - Concept, Methodology and Runtime Support. SocialCom/PASSAT 2010: 1159-1164
2000 – 2009
- 2009
- [c24]Saurabh Bagchi, Miguel Correia, Partha P. Pal:
3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009. DSN 2009: 600-601 - [c23]Michael Atighetchi, Partha P. Pal:
From Auto-adaptive to Survivable and Self-Regenerative Systems. NCA 2009: 98-101 - [c22]Michael Atighetchi, Partha P. Pal:
Attribute-Based Prevention of Phishing Attacks. NCA 2009: 266-269 - 2008
- [c21]Paul Rubel, Michael Atighetchi, Partha P. Pal, Martin W. Fong, Richard O'Brien:
Effective Monitoring of a Survivable Distributed Networked Information System. ARES 2008: 1306-1312 - [c20]D. Paul Benjamin, Partha P. Pal, Franklin Webber, Paul Rubel, Mike Atigetchi:
Using a Cognitive Architecture to Automate Cyberdefense Reasoning. BLISS 2008: 58-63 - [c19]Franklin Webber, Partha P. Pal, Paul Rubel, Michael Atighetchi:
An abstract interface for cyber-defense mechanisms. CSIIRW 2008: 37:1-37:3 - [c18]Paul Rubel, Partha P. Pal, Michael Atighetchi, D. Paul Benjamin, Franklin Webber:
Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response. RAID 2008: 408-409 - 2007
- [c17]Kurt Rohloff, Joseph P. Loyall, Partha P. Pal, Richard E. Schantz:
High-Assurance Distributed, Adaptive Software for Dynamic Systems. HASE 2007: 385-386 - 2006
- [j7]Partha P. Pal, Paul Rubel, Michael Atighetchi, Franklin Webber, William H. Sanders, Mouna Seri, HariGovind V. Ramasamy, James Lyons, Tod Courtney, Adnan Agbaria, Michel Cukier, Jeanna M. Gossett, Idit Keidar:
An architecture for adaptive intrusion-tolerant applications. Softw. Pract. Exp. 36(11-12): 1331-1354 (2006) - [c16]Partha P. Pal, Franklin Webber, Michael Atighetchi, Nate Combs:
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing. NCA 2006: 285-292 - 2005
- [j6]Sankalp Singh, Adnan Agbaria, Fabrice Stevens, Tod Courtney, John F. Meyer, William H. Sanders, Partha P. Pal:
Validation of a survivable Publish-Subscribe System. Int. J. Comput. 4(2): 77-94 (2005) - [c15]Jennifer Chong, Partha P. Pal, Michael Atighetchi, Paul Rubel, Franklin Webber:
Survivability Architecture of a Mission Critical System: The DPASA Example. ACSAC 2005: 495-504 - [c14]Michael Atighetchi, Paul Rubel, Partha P. Pal, Jennifer Chong, Lyle Sudin:
Networking Aspects in the DPASA Survivability Architecture: An Experience Report. NCA 2005: 219-222 - 2004
- [j5]Michael Atighetchi, Partha P. Pal, Franklin Webber, Richard E. Schantz, Christopher C. Jones, Joseph P. Loyall:
Adaptive Cyberdefense for Survival and Intrusion Tolerance. IEEE Internet Comput. 8(6): 25-33 (2004) - [c13]Partha P. Pal, Richard E. Schantz, Joseph P. Loyall:
Timeliness in Auto-Adaptive Distributed Systems. ICDCS Workshops 2004: 354-359 - [c12]Fabrice Stevens, Tod Courtney, Sankalp Singh, Adnan Agbaria, John F. Meyer, William H. Sanders, Partha P. Pal:
Model-Based Validation of an Intrusion-Tolerant Information System. SRDS 2004: 184-194 - 2003
- [c11]Michael Atighetchi, Partha P. Pal, Christopher C. Jones, Paul Rubel, Richard E. Schantz, Joseph P. Loyall, John A. Zinky:
Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience. ICDCS Workshops 2003: 104- - [c10]Michael Atighetchi, Partha P. Pal, Franklin Webber, Christopher C. Jones:
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. ISORC 2003: 183-192 - [c9]Michael Atighetchi, Partha P. Pal, Franklin Webber, Christopher C. Jones:
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. NCA 2003: 179-190 - [e1]Peng Liu, Partha P. Pal:
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, in Association with 10th ACM Conference on Computer and Communications Security, SSRS@CCS 2003, Fairfax, VA, USA, October 31, 2003. ACM 2003, ISBN 978-1-58113-784-2 [contents] - 2002
- [c8]Richard E. Schantz, Franklin Webber, Partha P. Pal, Joseph P. Loyall, Douglas C. Schmidt:
Protecting Applications Against Malice Using AdaptiveMiddleware. Certification and Security in E-Services 2002: 73-108 - [c7]Richard E. Schantz, Joseph P. Loyall, Michael Atighetchi, Partha P. Pal:
Packaging Quality of Service Control Behaviors for Reuse. Symposium on Object-Oriented Real-Time Distributed Computing 2002: 375-385 - 2001
- [c6]Joseph P. Loyall, Richard E. Schantz, John A. Zinky, Partha P. Pal, Richard Shapiro, Craig Rodrigues, Michael Atighetchi, David A. Karr, Jeanna M. Gossett, Christopher D. Gill:
Comparing and Contrasting Adaptive Middleware Support in Wide-Area and Embedded Distributed Object Applications. ICDCS 2001: 625-634 - [c5]Partha P. Pal, Franklin Webber, Richard E. Schantz:
Survival by defense-enabling. NSPW 2001: 71-78 - 2000
- [j4]Partha Pratim Pal:
A framework for isolating connection expection management. ACM Comput. Surv. 32(1es): 29 (2000) - [j3]Naftaly H. Minsky, Partha Pratim Pal:
Providing multiple views for objects. Softw. Pract. Exp. 30(7): 803-823 (2000) - [c4]Partha P. Pal, Joseph P. Loyall, Richard E. Schantz, John A. Zinky, Richard Shapiro, James Megquier:
Using QDL to Specify QoS Aware Distributed (QuO) Application Configuration. ISORC 2000: 310-319 - [c3]Joseph P. Loyall, Partha P. Pal, Richard E. Schantz, Franklin Webber:
Building Adaptive and Agile Applications Using Intrusion Detection and Response. NDSS 2000
1990 – 1999
- 1999
- [c2]Partha P. Pal, James Megquier:
XML and Quality Objects. WETICE 1999: 315-316 - 1998
- [j2]Partha Pratim Pal:
A flexible, applet-like software distribution mechanism for Java applications. ACM SIGSOFT Softw. Eng. Notes 23(4): 56-60 (1998) - 1997
- [j1]Naftaly H. Minsky, Partha P. Pal:
Law-Governed Regularities in Object Systems, Part 2: A Concrete Implementation. Theory Pract. Object Syst. 3(2): 87-101 (1997) - 1996
- [c1]Naftaly H. Minsky, Partha Pratim Pal:
Providing multiple views for objects by means of surrogates. ISAW/Viewpoints@FSE 1996: 294-297
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint