Partha Pal
Partha Pal
BBN Technologies
Verified email at
Cited by
Cited by
Adaptive use of network-centric mechanisms in cyber-defense
M Atighetchi, P Pal, F Webber, C Jones
Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed …, 2003
Using qdl to specify qos aware distributed (quo) application configuration
P Pal, J Loyall, R Schantz, J Zinky, R Shapiro, J Megquier
Proceedings Third IEEE International Symposium on Object-Oriented Real-Time …, 2000
Packaging quality of service control behaviors for reuse
R Schantz, J Loyall, M Atighetchi, P Pal
Proceedings Fifth IEEE International Symposium on Object-Oriented Real-Time …, 2002
Comparing and contrasting adaptive middleware support in wide-area and embedded distributed object applications
J Loyall, R Schantz, J Zinky, P Pal, R Shapiro, C Rodrigues, M Atighetchi, ...
Proceedings 21st International Conference on Distributed Computing Systems …, 2001
Model-based validation of an intrusion-tolerant information system
F Stevens, T Courtney, S Singh, A Agbaria, JR Meyer, WH Sanders, P Pal
Proceedings of the 23rd IEEE International Symposium on Reliable Distributed …, 2004
Adaptive cyberdefense for survival and intrusion tolerance
M Atighetchi, P Pal, F Webber, R Schantz, C Jones, J Loyall
IEEE Internet Computing 8 (6), 25-33, 2004
Intrusion tolerant systems
P Pal, F Webber, RE Schantz, JP Loyall
Proceedings of the IEEE Information Survivability Workshop (ISW-2000), 24-26, 2000
Intrusion tolerance approaches in ITUA
M Cukier, J Lyons, P Pandey, HGV Ramasamy, WH Sanders, P Pal, ...
Supplement of the 2001 International Conference on Dependable Systems and …, 2001
Survivability architecture of a mission critical system: The DPASA example
J Chong, P Pal, M Atigetchi, P Rubel, F Webber
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-504, 2005
Lawgoverned regularities in object systems; Part 2: The Eiffel case
NH Minsky, P Pal
Technical Report LWWW. CSR-TR-22, Department of Computer Science, Rutgers …, 1994
Attribute-based prevention of phishing attacks
M Atighetchi, P Pal
2009 Eighth IEEE International Symposium on Network Computing and …, 2009
Survival by defense-enabling
P Pal, F Webber, R Schantz
Proceedings of the 2001 workshop on New security paradigms, 71-78, 2001
Building auto-adaptive distributed applications: The quo-apod experience
M Atighetchi, PP Pal, CC Jones, P Rubel, RE Schantz, JP Loyall, JA Zinky
23rd International Conference on Distributed Computing Systems Workshops …, 2003
P3S: A privacy preserving publish-subscribe middleware
P Pal, G Lauer, J Khoury, N Hoff, J Loyall
Middleware 2012: ACM/IFIP/USENIX 13th International Middleware Conference …, 2012
Law-governed support for realizing design patterns
PP Pal
Proceedings of the 17th Conference on Technology of Object-Oriented …, 1995
An architecture for adaptive intrusion‐tolerant applications
P Pal, P Rubel, M Atighetchi, F Webber, WH Sanders, M Seri, ...
Software: Practice and Experience 36 (11‐12), 1331-1354, 2006
Cyber physical systems security challenges and research ideas
P Pal, R Schantz, K Rohloff, J Loyall
Workshop on Future Directions in Cyber-physical Systems Security, 1-5, 2009
The DPASA survivable JBI-a high-water mark in intrusion-tolerant systems
P Pal, F Webber, R Schantz
Proc. 2007 Workshop Recent Advances in Intrusion Tolerant Systems, 2007
Open implementation toolkit for building survivable applications
PP Pal, JP Loyall, RE Schantz, JA Zinky, F Webber
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
Building Adaptive and Agile Applications Using Intrusion Detection and Response.
JP Loyall, PP Pal, RE Schantz, F Webber
NDSS, 2000
The system can't perform the operation now. Try again later.
Articles 1–20