Theo dõi
Brajendra Panda
Brajendra Panda
Email được xác minh tại uark.edu
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Agency theory: Review of theory and evidence on problems and perspectives
B Panda, NM Leepsa
Indian journal of corporate governance 10 (1), 74-95, 2017
13132017
A data mining approach for database intrusion detection
Y Hu, B Panda
Proceedings of the 2004 ACM symposium on Applied computing, 711-716, 2004
2582004
Poultry nutrition
KS Singh, B Panda
Kalyani publishers, 1988
1231988
Identification of malicious transactions in database systems
Y Hu, B Panda
Seventh International Database Engineering and Applications Symposium, 2003 …, 2003
1082003
A knowledge-base model for insider threat prediction
Q Althebyan, B Panda
2007 IEEE SMC information assurance and security workshop, 239-246, 2007
782007
Evaluating damage from cyber attacks: a model and analysis
C Lala, B Panda
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001
742001
Reconstructing the database after electronic attacks
B Panda, J Giordano
Database Security XII: Status and Prospects, 143-156, 1999
741999
A survey of artificial intelligence in cybersecurity
K Morovat, B Panda
2020 International conference on computational science and computational …, 2020
542020
Knowledge acquisition and insider threat prediction in relational database systems
Q Yaseen, B Panda
2009 International Conference on Computational Science and Engineering 3 …, 2009
492009
Insider threat mitigation: Preventing unauthorized knowledge acquisition
Q Yaseen, B Panda
International Journal of Information Security 11, 269-280, 2012
452012
Insider threat in database systems: Preventing malicious users' activities in databases
M Chagarlamudi, B Panda, Y Hu
2009 Sixth International Conference on Information Technology: New …, 2009
452009
Defensive information warfare
B Panda, J Giordano
Communications of the ACM 42 (7), 30-32, 1999
441999
Predicting and preventing insider threat in relational database systems
Q Yaseen, B Panda
IFIP international workshop on information security theory and practices …, 2010
432010
Poultry production.
B Panda, SC Mohapatra
401989
Data dependency based logging for defensive information warfare
B Panda, S Tripathy
Proceedings of the 2000 ACM symposium on Applied computing-Volume 1, 361-365, 2000
372000
Extended data dependency approach: a robust way of rebuilding database
B Panda, KA Haque
Proceedings of the 2002 ACM symposium on applied computing, 446-452, 2002
352002
Reorganization of the database log for information warfare data recovery
R Sobhan, B Panda
Database and Application Security XV: IFIP TC11/WG11. 3 Fifteenth Annual …, 2002
342002
Evaluation of gastrointestinal helminths in canine population of Bhubaneswar, Odisha, India: a public health appraisal
PN Panigrahi, AR Gupta, SK Behera, BSK Panda, RC Patra, BN Mohanty, ...
Veterinary world 7 (5), 2014
322014
Ensuring data integrity in fog computing based health-care systems
A Alazeb, B Panda
Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2019
312019
Design and analysis of techniques for detection of malicious activities in database systems
Y Hu, B Panda
Journal of Network and Systems Management 13, 269-291, 2005
282005
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20