Agency theory: Review of theory and evidence on problems and perspectives B Panda, NM Leepsa Indian journal of corporate governance 10 (1), 74-95, 2017 | 1346 | 2017 |
A data mining approach for database intrusion detection Y Hu, B Panda Proceedings of the 2004 ACM symposium on Applied computing, 711-716, 2004 | 259 | 2004 |
Poultry nutrition KS Singh, B Panda Kalyani publishers, 1988 | 125 | 1988 |
Identification of malicious transactions in database systems Y Hu, B Panda Seventh International Database Engineering and Applications Symposium, 2003 …, 2003 | 109 | 2003 |
A knowledge-base model for insider threat prediction Q Althebyan, B Panda 2007 IEEE SMC information assurance and security workshop, 239-246, 2007 | 78 | 2007 |
Evaluating damage from cyber attacks: a model and analysis C Lala, B Panda IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001 | 76 | 2001 |
Reconstructing the database after electronic attacks B Panda, J Giordano Database Security XII: Status and Prospects, 143-156, 1999 | 73 | 1999 |
A survey of artificial intelligence in cybersecurity K Morovat, B Panda 2020 International conference on computational science and computational …, 2020 | 54 | 2020 |
Knowledge acquisition and insider threat prediction in relational database systems Q Yaseen, B Panda 2009 International Conference on Computational Science and Engineering 3 …, 2009 | 49 | 2009 |
Insider threat mitigation: preventing unauthorized knowledge acquisition Q Yaseen, B Panda International Journal of Information Security 11, 269-280, 2012 | 45 | 2012 |
Insider threat in database systems: Preventing malicious users' activities in databases M Chagarlamudi, B Panda, Y Hu 2009 Sixth International Conference on Information Technology: New …, 2009 | 44 | 2009 |
Defensive information warfare B Panda, J Giordano Communications of the ACM 42 (7), 30-32, 1999 | 44 | 1999 |
Predicting and preventing insider threat in relational database systems Q Yaseen, B Panda Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010 | 42 | 2010 |
Poultry production. B Panda, SC Mohapatra | 42 | 1989 |
Data dependency based logging for defensive information warfare B Panda, S Tripathy Proceedings of the 2000 ACM symposium on Applied computing-Volume 1, 361-365, 2000 | 38 | 2000 |
Extended data dependency approach: a robust way of rebuilding database B Panda, KA Haque Proceedings of the 2002 ACM symposium on applied computing, 446-452, 2002 | 37 | 2002 |
Reorganization of the database log for information warfare data recovery R Sobhan, B Panda Database and Application Security XV: IFIP TC11/WG11. 3 Fifteenth Annual …, 2002 | 34 | 2002 |
Ensuring data integrity in fog computing based health-care systems A Alazeb, B Panda Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2019 | 32 | 2019 |
Evaluation of gastrointestinal helminths in canine population of Bhubaneswar, Odisha, India: a public health appraisal PN Panigrahi, AR Gupta, SK Behera, BSK Panda, RC Patra, BN Mohanty, ... Veterinary world 7 (5), 2014 | 31 | 2014 |
Feed additives KS Singh, B Panda Poultry nutrition 2, 134-143, 1992 | 29 | 1992 |