Intrusion detection system in cloud computing environment SN Dhage, BB Meshram, R Rawat, S Padawe, M Paingaokar, A Misra Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 150 | 2011 |
CMS, LMS and LCMS for elearning S Ninoriya, PM Chawan, BB Meshram International Journal of Computer Science Issues (IJCSI) 8 (2), 644, 2011 | 136 | 2011 |
Content based video retrieval systems BV Patel, BB Meshram arXiv preprint arXiv:1205.1641, 2012 | 135 | 2012 |
Modeling rainfall prediction using data mining method: A Bayesian approach VB Nikam, BB Meshram 2013 Fifth International Conference on Computational Intelligence, Modelling …, 2013 | 105 | 2013 |
Digital forensics and cyber crime datamining KK Sindhu, BB Meshram Scientific Research Publishing, 2012 | 65 | 2012 |
A phishing analysis of web based systems P Soni, S Firake, BB Meshram Proceedings of the 2011 International Conference on Communication, Computing …, 2011 | 48 | 2011 |
Analysis of signature-based and behavior-based anti-malware approaches A Mujumdar, G Masiwal, BB Meshram International Journal of Advanced Research in Computer Engineering and …, 2013 | 47 | 2013 |
Analysis of different technique for detection of SQL injection AS Yeole, BB Meshram Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 45 | 2011 |
Digital evidence for database tamper detection S Tripathi, BB Meshram Scientific Research Publishing, 2012 | 39 | 2012 |
Digital forensic investigation tools and procedures KK Sindhu, BB Meshram International Journal of Computer Network and Information Security 4 (4), 39, 2012 | 38 | 2012 |
Transaction security for e-commerce application PB Rane, BB Meshram International Journal of Electronics and Computer Science Engineering 1 (3 …, 2012 | 38 | 2012 |
Security issues in cloud computing AH Shaikh, BB Meshram Intelligent Computing and Networking: Proceedings of IC-ICN 2020, 63-77, 2021 | 35 | 2021 |
CSRF vulnerabilities and defensive techniques RD Kombade, BB Meshram International Journal of Computer Network and Information Security 4 (1), 31, 2012 | 31 | 2012 |
Content based image indexing and retrieval AN Bhute, BB Meshram arXiv preprint arXiv:1401.1742, 2014 | 30 | 2014 |
Focused web crawler with revisit policy S Mali, BB Meshram Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 28 | 2011 |
A implementation of object oriented database security PB Ambhore, BB Meshram, VB Waghmare 5th ACIS International Conference on Software Engineering Research …, 2007 | 28 | 2007 |
Digital forensic tools VR Ambhire, BB Meshram IOSR Journal of Engineering 2 (3), 392-398, 2012 | 26 | 2012 |
Choreography and orchestration using business process execution language for soa with web services A Karande, M Karande, BB Meshram International Journal of Computer Science Issues (IJCSI) 8 (2), 224, 2011 | 26 | 2011 |
Mining association rules to evade network intrusion in network audit data K Nalavade, BB Meshram International Journal of Advanced Computer Research 4 (2), 560, 2014 | 25 | 2014 |
Text based approach for indexing and retrieval of image and video: A review AN Bhute, BB Meshram arXiv preprint arXiv:1404.1514, 2014 | 24 | 2014 |