Partha P. Pal
Orcid: 0000-0002-5979-4306Affiliations:
- BBN Technologies, Cambridge, MA, USA
According to our database1,
Partha P. Pal
authored at least 70 papers
between 1996 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report).
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022
2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Proceedings of the 5th IEEE International Conference on Fog and Edge Computing, 2021
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2021
2020
2019
Proceedings of the IEEE 4th International Workshops on Foundations and Applications of Self* Systems, 2019
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019
2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Proceedings of the Runtime Verification - 17th International Conference, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2015
Proceedings of the 2015 IEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems, 2015
Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
IEEE Secur. Priv., 2014
Secure and QoS-Managed Information Exchange Between Enterprise and Constrained Environments.
Proceedings of the 17th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2014
Proceedings of the 17th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2014
2013
Automated Self-Adaptation for Cyber-Defense - Pushing Adaptive Perimeter Protection Inward.
Proceedings of the 7th IEEE International Conference on Self-Adaptation and Self-Organizing Systems Workshops, 2013
Proceedings of the Cyber Security and Information Intelligence, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Applying distributed optimization for QoS-security tradeoff in a distributed information system.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013
Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012
Proceedings of the Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
Proceedings of the Middleware 2012, 2012
Safeguarding academic accounts and resources with the University Credential Abuse Auditing System.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012
2011
IEEE Internet Comput., 2011
Proceedings of the 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2011
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011
5<sup>th</sup> Workshop on Recent Advances in Intrusion-Tolerant Systems WRAITS 2011.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Dynamic cross domain information sharing: a concept paper on flexible adaptive policy management.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010
Proceedings of the 11th International Middleware Conference Industrial Track, Bangalore, India, November 29, 2010
Advanced Protected Services - A Concept Paper on Survivable Service-Oriented Systems.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2010
Proceedings of the Eighth International Network Conference (INC 2010), 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
Leveraging ESM platforms for continuous mission-oriented assessment of information assurance.
Proceedings of the 6th International Conference on Network and Service Management, 2010
2009
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
2008
Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
Proceedings of the 2008 ECSIS Symposium on Bio-inspired, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
2006
Softw. Pract. Exp., 2006
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing.
Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006
2005
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
IEEE Internet Comput., 2004
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004
2003
Proceedings of the 6th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2003), 2003
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003
2002
Proceedings of the 5th International Symposiun on Object Oriented Real-Time Distributed Computing, 2002
Protecting Applications Against Malice Using AdaptiveMiddleware.
Proceedings of the Certification and Security in E-Services, From E-Govenment to E-Business, IFIP 17<sup>th</sup> World Computer Congress, 2002
2001
Proceedings of the New Security Paradigms Workshop 2001, 2001
Comparing and Contrasting Adaptive Middleware Support in Wide-Area and Embedded Distributed Object Applications.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001
2000
Proceedings of the Network and Distributed System Security Symposium, 2000
Proceedings of the 3rd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2000), 2000
1999
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999
1998
ACM SIGSOFT Softw. Eng. Notes, 1998
1997
Law-Governed Regularities in Object Systems, Part 2: A Concrete Implementation.
Theory Pract. Object Syst., 1997
1996
Proceedings of the Joint Proceedings of the Second International Software Architecture Workshop (ISAW-2) and International Workshop on Multiple Perspectives in Software Development (Viewpoints '96) on SIGSOFT '96 workshops, 1996