Partha Pal
Partha Pal
BBN Technologies
Verified email at raytheon.com
Title
Cited by
Cited by
Year
Adaptive use of network-centric mechanisms in cyber-defense
M Atighetchi, P Pal, F Webber, C Jones
Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed …, 2003
1442003
Using qdl to specify qos aware distributed (quo) application configuration
P Pal, J Loyall, R Schantz, J Zinky, R Shapiro, J Megquier
Proceedings Third IEEE International Symposium on Object-Oriented Real-Time …, 2000
1082000
Packaging quality of service control behaviors for reuse
R Schantz, J Loyall, M Atighetchi, P Pal
Proceedings Fifth IEEE International Symposium on Object-Oriented Real-Time …, 2002
902002
Comparing and contrasting adaptive middleware support in wide-area and embedded distributed object applications
J Loyall, R Schantz, J Zinky, P Pal, R Shapiro, C Rodrigues, M Atighetchi, ...
Proceedings 21st International Conference on Distributed Computing Systems …, 2001
802001
Model-based validation of an intrusion-tolerant information system
F Stevens, T Courtney, S Singh, A Agbaria, JR Meyer, WH Sanders, P Pal
Proceedings of the 23rd IEEE International Symposium on Reliable Distributed …, 2004
792004
Adaptive cyberdefense for survival and intrusion tolerance
M Atighetchi, P Pal, F Webber, R Schantz, C Jones, J Loyall
IEEE Internet Computing 8 (6), 25-33, 2004
592004
Intrusion tolerant systems
P Pal, F Webber, RE Schantz, JP Loyall
Proceedings of the IEEE Information Survivability Workshop (ISW-2000), 24-26, 2000
532000
Intrusion tolerance approaches in ITUA
M Cukier, J Lyons, P Pandey, HGV Ramasamy, WH Sanders, P Pal, ...
Supplement of the 2001 International Conference on Dependable Systems and …, 2001
512001
Lawgoverned regularities in object systems; Part 2: The Eiffel case
NH Minsky, P Pal
Technical Report LWWW. CSR-TR-22, Department of Computer Science, Rutgers …, 1994
41*1994
Survivability architecture of a mission critical system: The DPASA example
J Chong, P Pal, M Atigetchi, P Rubel, F Webber
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-504, 2005
392005
Attribute-based prevention of phishing attacks
M Atighetchi, P Pal
2009 Eighth IEEE International Symposium on Network Computing and …, 2009
352009
Building auto-adaptive distributed applications: The quo-apod experience
M Atighetchi, PP Pal, CC Jones, P Rubel, RE Schantz, JP Loyall, JA Zinky
23rd International Conference on Distributed Computing Systems Workshops …, 2003
352003
Survival by defense-enabling
P Pal, F Webber, R Schantz
Proceedings of the 2001 workshop on New security paradigms, 71-78, 2001
342001
Law-governed support for realizing design patterns
PP Pal
Proceedings of 17th Conference on Technology of Object-Oriented Languages …, 1995
331995
The DPASA survivable JBI-a high-water mark in intrusion-tolerant systems
P Pal, F Webber, R Schantz
Proc. 2007 Workshop Recent Advances in Intrusion Tolerant Systems, 2007
312007
P3S: A privacy preserving publish-subscribe middleware
P Pal, G Lauer, J Khoury, N Hoff, J Loyall
ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2012
292012
Open implementation toolkit for building survivable applications
PP Pal, JP Loyall, RE Schantz, JA Zinky, F Webber
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
292000
Providing intrusion tolerance with itua
M Cukier, T Courtney, J Lyons, HV Ramasamy, WH Sanders, M Seri, ...
Supplement of the 2002 International Conference on Dependable Systems and …, 2002
282002
An architecture for adaptive intrusion‐tolerant applications
P Pal, P Rubel, M Atighetchi, F Webber, WH Sanders, M Seri, ...
Software: Practice and Experience 36 (11‐12), 1331-1354, 2006
262006
Building Adaptive and Agile Applications Using Intrusion Detection and
JP Loyall, PP Pal, RE Schantz, F Webber
262000
The system can't perform the operation now. Try again later.
Articles 1–20