1. Reconstructing the Database After Electronic Attacks
2. Reorganization of Database Log for Information Warfare Data Recovery;panda;Database and Application Security XV,2002
3. Modeling Damage Paths and Repairing Objects in Critical Infrastructure Systems;burns;Proceedings of the Fifteenth International Conference on Emerging Security Information Systems and Technologies (SECURWARE 2021),2021
4. Maintaining Data Integrity in Fog Computing Based Critical Infrastructure Systems;panda;Proceedings of the 2019 International Conference on Computational Science and Computational Intelligence in Research Track / Symposium on Cyber Warfare Cyber Defense and Cyber Security (CSCI-ISCW),2019