Brajendra Panda
Title
Cited by
Cited by
Year
A data mining approach for database intrusion detection
Y Hu, B Panda
Proceedings of the 2004 ACM symposium on Applied computing, 711-716, 2004
2172004
Identification of malicious transactions in database systems
Y Hu, B Panda
Seventh International Database Engineering and Applications Symposium, 2003 …, 2003
892003
Poultry nutrition
KS Singh, B Panda
Kalyani publishers, 1988
851988
Reconstructing the database after electronic attacks
B Panda, J Giordano
Database Security XII, 143-156, 1999
601999
Evaluating damage from cyber attacks: a model and analysis
C Lala, B Panda
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001
562001
A knowledge-base model for insider threat prediction
Q Althebyan, B Panda
2007 IEEE SMC Information Assurance and Security Workshop, 239-246, 2007
542007
Defensive information warfare
B Panda, J Giordano
Communications of the ACM 42 (7), 30-32, 1999
451999
Knowledge acquisition and insider threat prediction in relational database systems
Q Yaseen, B Panda
2009 International Conference on Computational Science and Engineering 3 …, 2009
412009
Data dependency based logging for defensive information warfare
B Panda, S Tripathy
Proceedings of the 2000 ACM symposium on Applied computing-Volume 1, 361-365, 2000
352000
Insider threat in database systems: Preventing malicious users' activities in databases
M Chagarlamudi, B Panda, Y Hu
2009 Sixth International Conference on Information Technology: New …, 2009
332009
Predicting and preventing insider threat in relational database systems
Q Yaseen, B Panda
IFIP International Workshop on Information Security Theory and Practices …, 2010
292010
Extended data dependency approach: a robust way of rebuilding database
B Panda, KA Haque
Proceedings of the 2002 ACM symposium on Applied computing, 446-452, 2002
272002
Reorganization of the database log for information warfare data recovery
R Sobhan, B Panda
Database and Application Security XV, 121-134, 2002
272002
Insider threat mitigation: preventing unauthorized knowledge acquisition
Q Yaseen, B Panda
International Journal of Information Security 11 (4), 269-280, 2012
242012
Poultry production.
B Panda, SC Mohapatra
Poultry production., 1989
241989
Variability, correlation and path-coefficient analysis in linseed
D Satapathi, RC Misra, BS Panda
Journal of Oilseeds Research (India), 1987
241987
Design and analysis of techniques for detection of malicious activities in database systems
Y Hu, B Panda
Journal of Network and Systems Management 13 (3), 269-291, 2005
222005
Database damage assessment using a matrix based approach: an intrusion response system
B Panda, J Zhou
Seventh International Database Engineering and Applications Symposium, 2003 …, 2003
212003
Post-intrusion recovery using data dependency approach
S Tripathy, B Panda
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security …, 2001
202001
Classification of consumer behavior using functional link artificial neural network
R Majhi, B Panda, S Pandu, B Majhi, G Panda
2010 International Conference on Advances in Computer Engineering, 323-325, 2010
192010
The system can't perform the operation now. Try again later.
Articles 1–20