Brajendra Panda

Affiliations: 
University of Arkansas, Little Rock, AR 
Area:
Computer Science
Google:
"Brajendra Panda"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Yaseen Q, Jararweh Y, Panda B, et al. (2017) An insider threat aware access control for cloud relational databases Cluster Computing. 20: 2669-2685
Yaseen Q, Althebyan Q, Panda B, et al. (2016) Mitigating insider threat in cloud relational databases Security and Communication Networks. 9: 1132-1145
Ragavan H, Panda B. (2013) Mitigating malicious updates: Prevention of insider threat to databases Proceedings - 12th Ieee International Conference On Trust, Security and Privacy in Computing and Communications, Trustcom 2013. 781-788
Zuo Y, Panda B. (2013) Composition and combination-based object trust evaluation for knowledge management in virtual organizations Vine. 43: 296-321
Yaseen Q, Panda B. (2012) Tackling insider threat in cloud relational databases Proceedings - 2012 Ieee/Acm 5th International Conference On Utility and Cloud Computing, Ucc 2012. 215-218
Yaseen Q, Panda B. (2012) Mitigating insider threat without limiting the availability in concurrent undeclared tasks Proceedings of the 2012 Ieee 6th International Conference On Software Security and Reliability, Sere 2012. 235-244
Yaseen Q, Panda B. (2012) Insider threat mitigation: Preventing unauthorized knowledge acquisition International Journal of Information Security. 11: 269-280
Ragavan H, Panda B. (2011) Mitigation of malicious modifications by insiders in databases Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7093: 337-351
Yaseen Q, Panda B. (2011) Enhanced insider threat detection model that increases data availability Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6536: 267-277
Yaseen Q, Panda B. (2010) Malicious modification attacks by insiders in relational databases: Prediction and prevention Proceedings - Socialcom 2010: 2nd Ieee International Conference On Social Computing, Passat 2010: 2nd Ieee International Conference On Privacy, Security, Risk and Trust. 849-856
See more...