Brajendra Panda
Affiliations: | University of Arkansas, Little Rock, AR |
Area:
Computer ScienceGoogle:
"Brajendra Panda"Children
Sign in to add traineeYanjun Zuo | grad student | 2005 | University of Arkansas |
Qussai Yaseen | grad student | 2012 | University of Arkansas |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Yaseen Q, Jararweh Y, Panda B, et al. (2017) An insider threat aware access control for cloud relational databases Cluster Computing. 20: 2669-2685 |
Yaseen Q, Althebyan Q, Panda B, et al. (2016) Mitigating insider threat in cloud relational databases Security and Communication Networks. 9: 1132-1145 |
Ragavan H, Panda B. (2013) Mitigating malicious updates: Prevention of insider threat to databases Proceedings - 12th Ieee International Conference On Trust, Security and Privacy in Computing and Communications, Trustcom 2013. 781-788 |
Zuo Y, Panda B. (2013) Composition and combination-based object trust evaluation for knowledge management in virtual organizations Vine. 43: 296-321 |
Yaseen Q, Panda B. (2012) Tackling insider threat in cloud relational databases Proceedings - 2012 Ieee/Acm 5th International Conference On Utility and Cloud Computing, Ucc 2012. 215-218 |
Yaseen Q, Panda B. (2012) Mitigating insider threat without limiting the availability in concurrent undeclared tasks Proceedings of the 2012 Ieee 6th International Conference On Software Security and Reliability, Sere 2012. 235-244 |
Yaseen Q, Panda B. (2012) Insider threat mitigation: Preventing unauthorized knowledge acquisition International Journal of Information Security. 11: 269-280 |
Ragavan H, Panda B. (2011) Mitigation of malicious modifications by insiders in databases Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7093: 337-351 |
Yaseen Q, Panda B. (2011) Enhanced insider threat detection model that increases data availability Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6536: 267-277 |
Yaseen Q, Panda B. (2010) Malicious modification attacks by insiders in relational databases: Prediction and prevention Proceedings - Socialcom 2010: 2nd Ieee International Conference On Social Computing, Passat 2010: 2nd Ieee International Conference On Privacy, Security, Risk and Trust. 849-856 |