Intrusion detection system in cloud computing environment SN Dhage, BB Meshram, R Rawat, S Padawe, M Paingaokar, A Misra Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 149 | 2011 |
CMS, LMS and LCMS for elearning S Ninoriya, PM Chawan, BB Meshram International Journal of Computer Science Issues (IJCSI) 8 (2), 644, 2011 | 143 | 2011 |
Content based video retrieval systems BV Patel, BB Meshram arXiv preprint arXiv:1205.1641, 2012 | 138 | 2012 |
Modeling rainfall prediction using data mining method: A Bayesian approach VB Nikam, BB Meshram 2013 Fifth International Conference on Computational Intelligence, Modelling …, 2013 | 108 | 2013 |
Digital forensics and cyber crime datamining KK Sindhu, BB Meshram Scientific Research Publishing, 2012 | 69 | 2012 |
A phishing analysis of web based systems P Soni, S Firake, BB Meshram Proceedings of the 2011 International Conference on Communication, Computing …, 2011 | 50 | 2011 |
Analysis of signature-based and behavior-based anti-malware approaches A Mujumdar, G Masiwal, BB Meshram International Journal of Advanced Research in Computer Engineering and …, 2013 | 47 | 2013 |
Analysis of different technique for detection of SQL injection AS Yeole, BB Meshram Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 46 | 2011 |
Digital forensic investigation tools and procedures KK Sindhu, BB Meshram International Journal of Computer Network and Information Security 4 (4), 39, 2012 | 45 | 2012 |
Security issues in cloud computing AH Shaikh, BB Meshram Intelligent Computing and Networking: Proceedings of IC-ICN 2020, 63-77, 2021 | 42 | 2021 |
Transaction security for e-commerce application PB Rane, BB Meshram International Journal of Electronics and Computer Science Engineering 1 (3 …, 2012 | 41 | 2012 |
Digital evidence for database tamper detection S Tripathi, BB Meshram Scientific Research Publishing, 2012 | 40 | 2012 |
CSRF vulnerabilities and defensive techniques RD Kombade, BB Meshram International Journal of Computer Network and Information Security 4 (1), 31, 2012 | 33 | 2012 |
Content based image indexing and retrieval AN Bhute, BB Meshram arXiv preprint arXiv:1401.1742, 2014 | 31 | 2014 |
Focused web crawler with revisit policy S Mali, BB Meshram Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 28 | 2011 |
Digital forensic tools VR Ambhire, BB Meshram IOSR Journal of Engineering 2 (3), 392-398, 2012 | 27 | 2012 |
A implementation of object oriented database security PB Ambhore, BB Meshram, VB Waghmare 5th ACIS International Conference on Software Engineering Research …, 2007 | 27 | 2007 |
Choreography and orchestration using business process execution language for soa with web services A Karande, M Karande, BB Meshram International Journal of Computer Science Issues (IJCSI) 8 (2), 224, 2011 | 26 | 2011 |
Mining association rules to evade network intrusion in network audit data K Nalavade, BB Meshram International Journal of Advanced Computer Research 4 (2), 560, 2014 | 25 | 2014 |
Text based approach for indexing and retrieval of image and video: A review AN Bhute, BB Meshram arXiv preprint arXiv:1404.1514, 2014 | 24 | 2014 |