Brajendra Panda
Orcid: 0000-0003-1117-9328
According to our database1,
Brajendra Panda
authored at least 92 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Proceedings of the 24th IEEE International Symposium on Cluster, 2024
2022
Proceedings of the 15th IEEE/ACM International Conference on Utility and Cloud Computing, 2022
2021
An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases.
IEEE Access, 2021
2020
CoRR, 2020
Designing a Bit-Based Model to Accelerate Query Processing Over Encrypted Databases in Cloud.
CoRR, 2020
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020
2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Proceedings of the IEEE International Conference on Smart Cloud, 2019
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019
Proceedings of the 3rd Cyber Security in Networking Conference, 2019
A proposal for a reduced client workload model for querying encrypted databases in cloud.
Proceedings of the XLV Latin American Computing Conference, 2019
2017
Clust. Comput., 2017
2016
Secur. Commun. Networks, 2016
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016
Request Evaluation for Policy-Based Attribute Access Control in Social Network Cloud.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
An Agent Based Approach to Perform Damage Assessment and Recovery Efficiently after a Cyber Attack to Ensure E-government Database Security.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
2012
Int. J. Inf. Sec., 2012
Proceedings of the IEEE Fifth International Conference on Utility and Cloud Computing, 2012
Mitigating Insider Threat without Limiting the Availability in Concurrent Undeclared Tasks.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the Distributed Computing and Internet Technology, 2011
2010
Special Issue Guest Editorial: Computer Forensics Track of Symposium on Applied Computing.
J. Digit. Forensic Pract., 2010
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Malicious Modification Attacks by Insiders in Relational Databases: Prediction and Prevention.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase.
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Insider threat discovery using automatic detection of mission critical data based on content.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation.
Proceedings of the Security in Information Systems, 2009
Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Unifying strategies and tactics: A survivability framework for countering cyber attacks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders.
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of the Data and Applications Security XXIII, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Two-level trust-based decision model for information assurance in a virtual organization.
Decis. Support Syst., 2008
Knowledge Extraction and Management for Insider Threat Mitigation.
Proceedings of the Security in Information Systems, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008
Proceedings of the Innovations and Advances in Computer Sciences and Engineering, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007
Proceedings of the Distributed Computing and Internet Technology, 2007
A Trust Based Information Dissemination Model for Evaluating the Effect of Deceptive Data.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
2006
Modeling Deceptive Action in Virtual Communities.
Proceedings of the Security in Information Systems, 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
2005
Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems.
J. Netw. Syst. Manag., 2005
External Object Trust Zone Mapping for Information Clustering.
Proceedings of the Security in Information Systems, 2005
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
2004
J. Intell. Inf. Syst., 2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the Distributed Computing and Internet Technology, 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
2003
Transaction-Relationship Oriented Log Division for Data Recovery from Information Attacks.
J. Database Manag., 2003
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
Database Damage Assessment Using A Matrix Based Approach: An Intrusion Response System.
Proceedings of the 7th International Database Engineering and Applications Symposium (IDEAS 2003), 2003
Proceedings of the 7th International Database Engineering and Applications Symposium (IDEAS 2003), 2003
Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs.
Proceedings of the IEEE Systems, 2003
An Architecture for Making Data Available Ceaselessly During Recovery.
Proceedings of the IEEE Systems, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
2002
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002
Analyzing Transaction Logs for Effective Damage Assessment.
Proceedings of the Research Directions in Data and Applications Security, 2002
Dividing Database Login to Equal Size Segments for Efficiency.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002
2001
IEEE Trans. Syst. Man Cybern. Part A, 2001
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001
Alternate Methods of Storing Committed Transactions in the Log for Their Future Re-execution.
Proceedings of the World Multiconference on Systemics, Cybernetics and Informatics, 2001
Reorganization of Database Log for Information Warfare Data Recovery.
Proceedings of the Database and Application Security XV, 2001
A model to detect multi-source information attacks.
Proceedings of the ISCA 16th International Conference Computers and Their Applications, 2001
2000
Proceedings of the Applied Computing 2000, 2000
Storing transaction dependency graphs for damage appraisal following an information attack.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000
1999
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999
1998
Proceedings of the 1998 ACM symposium on Applied Computing, 1998
Reconstructing the Database after Electronic Attacks.
Proceedings of the Database Security XII: Status and Prospects, 1998
1997
Proceedings of the 1997 ACM symposium on Applied Computing, 1997
1995
Proceedings of the 1995 ACM symposium on applied computing, 1995
Maintaining Surrogate Data for Query Acceleration in Multilevel Secure Database Systems.
Proceedings of the Information Systems and Data Management, 1995
1994
Secure transaction management and query processing in multilevel secure database systems.
Proceedings of the 1994 ACM Symposium on Applied Computing, 1994