default search action
Brajendra Panda
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c77]Mariha Siddika Ahmad, Brajendra Panda:
Damage Assessment in Fog Computing Systems: A Blind Write Lineage Approach. CCGridW 2024: 50-55 - 2022
- [c76]Brajendra Panda, Shruthi Ramakrishnan:
Optimized Damage Assessment in Large Datasets in Cloud. UCC 2022: 384-390 - 2021
- [j13]Sultan Almakdi, Brajendra Panda, Mohammed S. Alshehri, Abdulwahab Alazeb:
An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases. IEEE Access 9: 78474-78494 (2021) - 2020
- [c75]Mohammed S. Alshehri, Brajendra Panda:
Minimizing Data Breach by a Malicious Fog Node within a Fog Federation. CSCloud/EdgeCom 2020: 36-43 - [i3]Sultan Almakdi, Brajendra Panda:
Designing a Bit-Based Model to Accelerate Query Processing Over Encrypted Databases in Cloud. CoRR abs/2001.03269 (2020) - [i2]Abdulwahab Alazeb, Brajendra Panda:
Maintaining Data Integrity in Fog Computing Based Critical Infrastructure Systems. CoRR abs/2001.04443 (2020) - [i1]Mohammed S. Alshehri, Brajendra Panda:
A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes. CoRR abs/2001.04490 (2020)
2010 – 2019
- 2019
- [c74]Víctor Alexis Fuentes Tello, Brajendra Panda:
A proposal for a reduced client workload model for querying encrypted databases in cloud. CLEI 2019: 1-7 - [c73]Mohammed S. Alshehri, Brajendra Panda:
A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes. CSNet 2019: 6-13 - [c72]Sultan Almakdi, Brajendra Panda:
Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud. ICDIS 2019: 120-127 - [c71]Sultan Almakdi, Brajendra Panda:
A Secure Model to Execute Queries Over Encrypted Databases in the Cloud. SmartCloud 2019: 31-36 - [c70]Abdulwahab Alazeb, Brajendra Panda:
Ensuring Data Integrity in Fog Computing Based Health-Care Systems. SpaCCS 2019: 63-77 - [c69]Mohammed S. Alshehri, Brajendra Panda:
An Encryption-Based Approach to Protect Fog Federations from Rogue Nodes. SpaCCS 2019: 225-243 - 2017
- [j12]Qussai Yaseen, Yaser Jararweh, Brajendra Panda, Qutaibah Althebyan:
An insider threat aware access control for cloud relational databases. Clust. Comput. 20(3): 2669-2685 (2017) - 2016
- [j11]Qussai Yaseen, Qutaibah Althebyan, Brajendra Panda, Yaser Jararweh:
Mitigating insider threat in cloud relational databases. Secur. Commun. Networks 9(10): 1132-1145 (2016) - [c68]Katanosh Morovat, Brajendra Panda:
Request Evaluation for Policy-Based Attribute Access Control in Social Network Cloud. CIT 2016: 399-406 - [c67]Osama M. Ben Omran, Brajendra Panda:
Facilitating Secure Query Processing on Encrypted Databases on the Cloud. SmartCloud 2016: 307-312 - [c66]Katanosh Morovat, Brajendra Panda:
Policy Language for Access Control in Social Network Cloud. SmartCloud 2016: 313-318 - 2015
- [c65]Osama M. Ben Omran, Brajendra Panda:
Efficiently Managing Encrypted Data in Cloud Databases. CSCloud 2015: 266-271 - [c64]Kranthi Kurra, Brajendra Panda, Wing-Ning Li, Yi Hu:
An Agent Based Approach to Perform Damage Assessment and Recovery Efficiently after a Cyber Attack to Ensure E-government Database Security. HICSS 2015: 2272-2279 - 2014
- [c63]Osama M. Ben Omran, Brajendra Panda:
A new technique to partition and manage data security in cloud databases. ICITST 2014: 191-196 - 2013
- [c62]Harini Ragavan, Brajendra Panda:
Mitigating Malicious Updates: Prevention of Insider Threat to Databases. TrustCom/ISPA/IUCC 2013: 781-788 - 2012
- [j10]Qussai Yaseen, Brajendra Panda:
Insider threat mitigation: preventing unauthorized knowledge acquisition. Int. J. Inf. Sec. 11(4): 269-280 (2012) - [c61]Weihan Li, Brajendra Panda, Qussai Yaseen:
Mitigating Insider Threat on Database Integrity. ICISS 2012: 223-237 - [c60]Weihan Li, Brajendra Panda, Qussai Yaseen:
Malicious Users' Transactions: Tackling Insider Threat. SEC 2012: 211-222 - [c59]Khanh Viet, Brajendra Panda, Yi Hu:
Detecting collaborative insider attacks in information systems. SMC 2012: 502-507 - [c58]Qussai Yaseen, Brajendra Panda:
Mitigating Insider Threat without Limiting the Availability in Concurrent Undeclared Tasks. SERE 2012: 235-244 - [c57]Qussai Yaseen, Brajendra Panda:
Tackling Insider Threat in Cloud Relational Databases. UCC 2012: 215-218 - 2011
- [c56]Qussai Yaseen, Brajendra Panda:
Enhanced Insider Threat Detection Model that Increases Data Availability. ICDCIT 2011: 267-277 - [c55]Harini Ragavan, Brajendra Panda:
Mitigation of Malicious Modifications by Insiders in Databases. ICISS 2011: 337-351 - 2010
- [j9]Lorie M. Liebrock, Brajendra Panda, Robert L. Hutchinson:
Special Issue Guest Editorial: Computer Forensics Track of Symposium on Applied Computing. J. Digit. Forensic Pract. 3(1): 4 (2010) - [c54]Jonathan White, Brajendra Panda:
Insider threat discovery using automatic detection of mission critical data based on content. IAS 2010: 56-61 - [c53]Yi Hu, Brajendra Panda:
Two-Dimensional Traceability Link Rule Mining for Detection of Insider Attacks. HICSS 2010: 1-9 - [c52]Qussai Yaseen, Brajendra Panda:
Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase. NSS 2010: 312-317 - [c51]Qussai Yaseen, Brajendra Panda:
Malicious Modification Attacks by Insiders in Relational Databases: Prediction and Prevention. SocialCom/PASSAT 2010: 849-856 - [c50]Qussai Yaseen, Brajendra Panda:
Predicting and Preventing Insider Threat in Relational Database Systems. WISTP 2010: 368-383
2000 – 2009
- 2009
- [c49]Qussai Yaseen, Brajendra Panda:
Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems. CSE (3) 2009: 450-455 - [c48]Yi Hu, Brajendra Panda:
A traceability link mining approach for identifying insider threats. CSIIRW 2009: 46 - [c47]Yermek Nugmanov, Brajendra Panda, Yi Hu:
Analysis of Data Dependency Based Intrusion Detection System. DBSec 2009: 111-125 - [c46]Jonathan White, Brajendra Panda:
Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. ICISS 2009: 208-221 - [c45]Yanjun Zuo, Brajendra Panda:
Unifying strategies and tactics: A survivability framework for countering cyber attacks. ISI 2009: 119-124 - [c44]Jonathan White, Brajendra Panda:
Implementing PII honeytokens to mitigate against the threat of malicous insiders. ISI 2009: 233 - [c43]Manideep Chagarlamudi, Brajendra Panda, Yi Hu:
Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases. ITNG 2009: 1616-1620 - [c42]Jonathan White, Brajendra Panda, Quassai Yassen, Khanh Nguyen, Weihan Li:
Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation. WOSIS 2009: 93-102 - 2008
- [j8]Yanjun Zuo, Brajendra Panda:
Two-level trust-based decision model for information assurance in a virtual organization. Decis. Support Syst. 45(2): 291-309 (2008) - [c41]Siddharta S. Gadang, Brajendra Panda, Joseph E. Hoag:
Provenance Tracking with Bit Vectors. IAS 2008: 132-137 - [c40]Yi Hu, Brajendra Panda:
Mining Inter-transaction Data Dependencies for Database Intrusion Detection. SCSS (1) 2008: 67-72 - [c39]Qutaibah Althebyan, Brajendra Panda:
Performance analysis of an insider threat mitigation model. ICDIM 2008: 703-709 - [c38]Qutaibah Althebyan, Brajendra Panda:
A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. SEC 2008: 557-571 - [c37]Qutaibah Althebyan, Brajendra Panda:
Knowledge Extraction and Management for Insider Threat Mitigation. WOSIS 2008: 99-110 - 2007
- [c36]Yi Hu, Zhichun Xiao, Brajendra Panda:
A Trust Based Information Dissemination Model for Evaluating the Effect of Deceptive Data. HICSS 2007: 157 - [c35]Sastry Konduri, Brajendra Panda, Wing-Ning Li:
Monitoring Information Leakage During Query Aggregation. ICDCIT 2007: 89-96 - [c34]Hadi Sabaa, Brajendra Panda:
Data authentication and provenance management. ICDIM 2007: 309-314 - [c33]Yi Hu, Zhichun Xiao, Brajendra Panda:
Modeling deceptive information dissemination using a holistic approach. SAC 2007: 1591-1598 - 2006
- [j7]Brajendra Panda, Joseph Giordano, Daniel Kalil:
Introduction. Commun. ACM 49(2): 44-47 (2006) - [j6]Yanjun Zuo, Brajendra Panda:
Distributed database damage assessment paradigm. Inf. Manag. Comput. Secur. 14(2): 116-139 (2006) - [c32]Yanjun Zuo, Brajendra Panda:
Information trustworthiness evaluation based on trust combination. SAC 2006: 1880-1885 - [c31]Yi Hu, Brajendra Panda:
Modeling Deceptive Action in Virtual Communities. WOSIS 2006: 125-134 - 2005
- [j5]Yi Hu, Brajendra Panda:
Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. J. Netw. Syst. Manag. 13(3): 269-291 (2005) - [c30]Yanjun Zuo, Brajendra Panda:
Component based trust management in the context of a virtual organization. SAC 2005: 1582-1588 - [c29]Yanjun Zuo, Brajendra Panda:
External Object Trust Zone Mapping for Information Clustering. WOSIS 2005: 196-206 - 2004
- [j4]Rajesh Yalamanchili, Brajendra Panda:
Transaction Fusion: A Model for Data Recovery from Information Attacks. J. Intell. Inf. Syst. 23(3): 225-245 (2004) - [c28]Yanjun Zuo, Brajendra Panda:
Damage Discovery in Distributed Database Systems. DBSec 2004: 111-123 - [c27]Jing Zhou, Brajendra Panda, Yi Hu:
Succinct and Fast Accessible Data Structures for Database Damage Assessment. ICDCIT 2004: 420-429 - [c26]Yi Hu, Brajendra Panda:
A data mining approach for database intrusion detection. SAC 2004: 711-716 - [c25]Yanjun Zuo, Brajendra Panda:
A Trust-Based Model for Information Integrity in Open Systems. IICIS 2004: 337-354 - 2003
- [j3]Satyadeep Patnaik, Brajendra Panda:
Transaction-Relationship Oriented Log Division for Data Recovery from Information Attacks. J. Database Manag. 14(2): 27-41 (2003) - [c24]Prahalad Ragothaman, Brajendra Panda:
Improving Damage Assessment Efficacy in case of Frequent Attacks on Databases. DBSec 2003: 16-30 - [c23]Amit Valsangkar, Brajendra Panda:
An Architecture for Making Data Available Ceaselessly During Recovery. IAW 2003: 196-202 - [c22]Yanjun Zuo, Brajendra Panda:
Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. IAW 2003: 306-307 - [c21]Yi Hu, Brajendra Panda:
Identification of Malicious Transactions in Database Systems. IDEAS 2003: 329-335 - [c20]Brajendra Panda, Jing Zhou:
Database Damage Assessment Using A Matrix Based Approach: An Intrusion Response System. IDEAS 2003: 336-341 - [c19]Prahalad Ragothaman, Brajendra Panda:
Hybrid Log Segmentation for Assured Damage Assessment. SAC 2003: 522-527 - [c18]Yanjun Zuo, Brajendra Panda:
A Service Oriented System Based Information Flow Model for Damage Assessment. IICIS 2003: 177-194 - [e2]Gary B. Lamont, Hisham Haddad, George A. Papadopoulos, Brajendra Panda:
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), March 9-12, 2003, Melbourne, FL, USA. ACM 2003, ISBN 1-58113-624-2 [contents] - 2002
- [c17]Prahalad Ragothaman, Brajendra Panda:
Dividing Database Login to Equal Size Segments for Efficiency. CATA 2002: 118-121 - [c16]Prahalad Ragothaman, Brajendra Panda:
Analyzing Transaction Logs for Effective Damage Assessment. DBSec 2002: 89-101 - [c15]Brajendra Panda, Kazi Asharful Haque:
Extended data dependency approach: a robust way of rebuilding database. SAC 2002: 446-452 - [e1]Gary B. Lamont, Hisham Haddad, George A. Papadopoulos, Brajendra Panda:
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain. ACM 2002, ISBN 1-58113-445-2 [contents] - 2001
- [j2]Chandana Lala, Brajendra Panda:
Evaluating damage from cyber attacks: a model and analysis. IEEE Trans. Syst. Man Cybern. Part A 31(4): 300-310 (2001) - [c14]Brajendra Panda, Rajesh Yalamanchili:
A model to detect multi-source information attacks. CATA 2001: 447-451 - [c13]Rumman Sobhan, Brajendra Panda:
Reorganization of Database Log for Information Warfare Data Recovery. DBSec 2001: 121-134 - [c12]Brajendra Panda, Prahalad Ragothaman:
Alternate Methods of Storing Committed Transactions in the Log for Their Future Re-execution. ISAS-SCI (1) 2001: 508-512 - [c11]Yuelong Gu, Brajendra Panda, Kazi Asharful Haque:
Design and analysis of data structures for querying image databases. SAC 2001: 236-241 - [c10]Brajendra Panda, Rajesh Yalamanchili:
Transaction fusion in the wake of information warfare. SAC 2001: 242-247 - 2000
- [c9]Chandana Lala, Brajendra Panda, Rumman Sobhan:
Storing transaction dependency graphs for damage appraisal following an information attack. CATA 2000: 317-321 - [c8]Brajendra Panda, Sani Tripathy:
Data Dependency Based Logging for Defensive Information Warfare. SAC (1) 2000: 361-365
1990 – 1999
- 1999
- [j1]Brajendra Panda, Joseph Giordano:
Defensive Information Warfare - Introduction. Commun. ACM 42(7): 30-32 (1999) - [c7]Satyadeep Patnaik, Marshall Meier, Brian Henderson, Joe Hickman, Brajendra Panda:
Improving the Performance of Lineage Tracing in Data Warehouse. SAC 1999: 210-215 - 1998
- [c6]Brajendra Panda, Joseph Giordano:
Reconstructing the Database after Electronic Attacks. DBSec 1998: 143-156 - [c5]Brajendra Panda, Joseph Giordano:
An overview of post information warfare data recovery. SAC 1998: 253-254 - 1997
- [c4]Brajendra Panda:
An alternative approach to serialization of multilevel secure Transactions. SAC 1997: 134-135 - 1995
- [c3]Brajendra Panda, William Perrizo:
Maintaining Surrogate Data for Query Acceleration in Multilevel Secure Database Systems. CISMOD 1995: 45-57 - [c2]Brajendra Panda, William Perrizo:
Query execution in prism and seaview: a cost analysis. SAC 1995: 65-70 - 1994
- [c1]Brajendra Panda, William Perrizo, Ramzi A. Haraty:
Secure transaction management and query processing in multilevel secure database systems. SAC 1994: 363-368
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint