Partha P. Pal

Orcid: 0000-0002-5979-4306

Affiliations:
  • BBN Technologies, Cambridge, MA, USA


According to our database1, Partha P. Pal authored at least 69 papers between 1996 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report).
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

2021
Using Distributed Ledgers For Command and Control - Concepts and Challenges.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Priority-enabled Load Balancing for Dispersed Computing.
Proceedings of the 5th IEEE International Conference on Fog and Edge Computing, 2021

Resiliency and Antifragility in Modern Software Systems- A Concept Paper.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2021

2020
A Methodology for Automating Assurance Case Generation.
CoRR, 2020

2019
A Semi-Autonomic Bytecode Repair Framework.
IEEE Softw., 2019

A Framework for Self-Adaptive Dispersal of Computing Services.
Proceedings of the IEEE 4th International Workshops on Foundations and Applications of Self* Systems, 2019

Secure Desktop Computing in the Cloud.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

2018
HYDRA: Hypothesis Driven Repair Automation.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Trusted Mission Operation - Concept and Implementation.
Proceedings of the Runtime Verification - 17th International Conference, 2017

Adaptive Resource Management Enabling Deception (ARMED).
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2015
Distributed Recovery for Enterprise Services.
Proceedings of the 2015 IEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems, 2015

Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Managed Execution Environment as a Moving-Target Defense Infrastructure.
IEEE Secur. Priv., 2014

Message Passing for Distributed QoS-Security Tradeoffs.
Comput. J., 2014

Secure and QoS-Managed Information Exchange Between Enterprise and Constrained Environments.
Proceedings of the 17th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2014

Efficient Private Publish-Subscribe Systems.
Proceedings of the 17th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2014

2013
Automated Self-Adaptation for Cyber-Defense - Pushing Adaptive Perimeter Protection Inward.
Proceedings of the 7th IEEE International Conference on Self-Adaptation and Self-Organizing Systems Workshops, 2013

Moving target defense (MTD) in an adaptive execution environment.
Proceedings of the Cyber Security and Information Intelligence, 2013

Safe configuration of TLS connections.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Applying distributed optimization for QoS-security tradeoff in a distributed information system.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Learning from Early Attempts to Measure Information Security Performance.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

A3: An Environment for Self-Adaptive Diagnosis and Immunization of Novel Attacks.
Proceedings of the Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2012

Cooperative red teaming of a prototype surivable service-oriented system.
Proceedings of the 31st IEEE Military Communications Conference, 2012

P3S: A Privacy Preserving Publish-Subscribe Middleware.
Proceedings of the Middleware 2012, 2012

Safeguarding academic accounts and resources with the University Credential Abuse Auditing System.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Avoiding common security flaws in composed service-oriented systems.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

2011
Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy.
IEEE Internet Comput., 2011

A Survey of Security Concepts for Common Operating Environments.
Proceedings of the 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2011

Continuous mission-oriented assessment (CMA) of assurance.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

5<sup>th</sup> Workshop on recent advances in intrusion-tolerant systems WRAITS 2011.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

2010
Managed Mission Assurance - Concept, Methodology and Runtime Support.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Dynamic cross domain information sharing: a concept paper on flexible adaptive policy management.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Understanding the Vulnerabilities of a SOA Platform - A Case Study.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

Middleware for runtime assessment of information assurance.
Proceedings of the 11th International Middleware Conference Industrial Track, Bangalore, India, November 29, 2010

Advanced Protected Services - A Concept Paper on Survivable Service-Oriented Systems.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2010

Usable Survivability.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

Leveraging ESM platforms for continuous mission-oriented assessment of information assurance.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
Attribute-Based Prevention of Phishing Attacks.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

From Auto-adaptive to Survivable and Self-Regenerative Systems.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

An abstract interface for cyber-defense mechanisms.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

Using a Cognitive Architecture to Automate Cyberdefense Reasoning.
Proceedings of the 2008 ECSIS Symposium on Bio-inspired, 2008

Effective Monitoring of a Survivable Distributed Networked Information System.
Proceedings of the The Third International Conference on Availability, 2008

2007
High-Assurance Distributed, Adaptive Software for Dynamic Systems.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

2006
An architecture for adaptive intrusion-tolerant applications.
Softw. Pract. Exp., 2006

Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing.
Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006

2005
Networking Aspects in the DPASA Survivability Architecture: An Experience Report.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

Survivability Architecture of a Mission Critical System: The DPASA Example.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Adaptive Cyberdefense for Survival and Intrusion Tolerance.
IEEE Internet Comput., 2004

Model-Based Validation of an Intrusion-Tolerant Information System.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

Timeliness in Auto-Adaptive Distributed Systems.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

2003
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

2002
Packaging Quality of Service Control Behaviors for Reuse.
Proceedings of the 5th International Symposiun on Object Oriented Real-Time Distributed Computing, 2002

Protecting Applications Against Malice Using AdaptiveMiddleware.
Proceedings of the Certification and Security in E-Services, From E-Govenment to E-Business, IFIP 17<sup>th</sup> World Computer Congress, 2002

2001
Survival by defense-enabling.
Proceedings of the New Security Paradigms Workshop 2001, 2001

Comparing and Contrasting Adaptive Middleware Support in Wide-Area and Embedded Distributed Object Applications.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

2000
Providing multiple views for objects.
Softw. Pract. Exp., 2000

A framework for isolating connection expection management.
ACM Comput. Surv., 2000

Building Adaptive and Agile Applications Using Intrusion Detection and Response.
Proceedings of the Network and Distributed System Security Symposium, 2000

Using QDL to Specify QoS Aware Distributed (QuO) Application Configuration.
Proceedings of the 3rd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2000), 2000

1999
XML and Quality Objects.
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999

1998
A flexible, applet-like software distribution mechanism for Java applications.
ACM SIGSOFT Softw. Eng. Notes, 1998

1997
Law-Governed Regularities in Object Systems, Part 2: A Concrete Implementation.
Theory Pract. Object Syst., 1997

1996
Providing multiple views for objects by means of surrogates.
Proceedings of the Joint Proceedings of the Second International Software Architecture Workshop (ISAW-2) and International Workshop on Multiple Perspectives in Software Development (Viewpoints '96) on SIGSOFT '96 workshops, 1996


  Loading...