Adaptive use of network-centric mechanisms in cyber-defense M Atighetchi, P Pal, F Webber, C Jones Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed …, 2003 | 172 | 2003 |
Using qdl to specify qos aware distributed (quo) application configuration P Pal, J Loyall, R Schantz, J Zinky, R Shapiro, J Megquier Proceedings Third IEEE International Symposium on Object-Oriented Real-Time …, 2000 | 114 | 2000 |
Packaging quality of service control behaviors for reuse R Schantz, J Loyall, M Atighetchi, P Pal Proceedings Fifth IEEE International Symposium on Object-Oriented Real-Time …, 2002 | 92 | 2002 |
Comparing and contrasting adaptive middleware support in wide-area and embedded distributed object applications J Loyall, R Schantz, J Zinky, P Pal, R Shapiro, C Rodrigues, M Atighetchi, ... Proceedings 21st International Conference on Distributed Computing Systems …, 2001 | 87 | 2001 |
Model-based validation of an intrusion-tolerant information system F Stevens, T Courtney, S Singh, A Agbaria, JR Meyer, WH Sanders, P Pal Proceedings of the 23rd IEEE International Symposium on Reliable Distributed …, 2004 | 85 | 2004 |
Adaptive cyberdefense for survival and intrusion tolerance M Atighetchi, P Pal, F Webber, R Schantz, C Jones, J Loyall IEEE Internet Computing 8 (6), 25-33, 2004 | 64 | 2004 |
Intrusion tolerant systems P Pal, F Webber, RE Schantz, JP Loyall Proceedings of the IEEE Information Survivability Workshop (ISW-2000), 24-26, 2000 | 61 | 2000 |
Intrusion tolerance approaches in ITUA M Cukier, J Lyons, P Pandey, HGV Ramasamy, WH Sanders, P Pal, ... Supplement of the 2001 International Conference on Dependable Systems and …, 2001 | 52 | 2001 |
Survivability architecture of a mission critical system: The DPASA example J Chong, P Pal, M Atigetchi, P Rubel, F Webber 21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-504, 2005 | 47 | 2005 |
Attribute-based prevention of phishing attacks M Atighetchi, P Pal 2009 Eighth IEEE International Symposium on Network Computing and …, 2009 | 44 | 2009 |
Lawgoverned regularities in object systems; Part 2: The Eiffel case NH Minsky, P Pal Technical Report LWWW. CSR-TR-22, Department of Computer Science, Rutgers …, 1994 | 44* | 1994 |
Survival by defense-enabling P Pal, F Webber, R Schantz Proceedings of the 2001 workshop on New security paradigms, 71-78, 2001 | 40 | 2001 |
Building auto-adaptive distributed applications: The quo-apod experience M Atighetchi, PP Pal, CC Jones, P Rubel, RE Schantz, JP Loyall, JA Zinky 23rd International Conference on Distributed Computing Systems Workshops …, 2003 | 39 | 2003 |
P3S: A privacy preserving publish-subscribe middleware P Pal, G Lauer, J Khoury, N Hoff, J Loyall Middleware 2012: ACM/IFIP/USENIX 13th International Middleware Conference …, 2012 | 36 | 2012 |
Law-governed support for realizing design patterns PP Pal Proceedings of the 17th Conference on Technology of Object-Oriented …, 1995 | 34 | 1995 |
Open implementation toolkit for building survivable applications PP Pal, JP Loyall, RE Schantz, JA Zinky, F Webber Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 33 | 2000 |
Cyber physical systems security challenges and research ideas P Pal, R Schantz, K Rohloff, J Loyall Workshop on Future Directions in Cyber-physical Systems Security, 1-5, 2009 | 32 | 2009 |
The DPASA survivable JBI-a high-water mark in intrusion-tolerant systems P Pal, F Webber, R Schantz Proc. 2007 Workshop Recent Advances in Intrusion Tolerant Systems, 2007 | 32 | 2007 |
Building Adaptive and Agile Applications Using Intrusion Detection and Response. JP Loyall, PP Pal, RE Schantz, F Webber NDSS, 2000 | 32 | 2000 |
An architecture for adaptive intrusion‐tolerant applications P Pal, P Rubel, M Atighetchi, F Webber, WH Sanders, M Seri, ... Software: Practice and Experience 36 (11‐12), 1331-1354, 2006 | 30 | 2006 |