B. M. Mehtre
Orcid: 0000-0001-9819-4218
According to our database1,
B. M. Mehtre
authored at least 51 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
1990
1995
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
1
6
1
3
2
1
1
1
2
1
1
1
2
3
1
1
1
1
5
3
1
5
2
3
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on idrbt.ac.in
-
on orcid.org
On csauthors.net:
Bibliography
2024
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection.
Int. J. Inf. Sec., June, 2024
2023
Thermal to Visual Person Re-Identification Using Collaborative Metric Learning Based on Maximum Margin Matrix Factorization.
Pattern Recognit., 2023
J. Ambient Intell. Humaniz. Comput., 2023
Artificial neural network-based intrusion detection system using multi-objective genetic algorithm.
Int. J. Inf. Comput. Secur., 2023
Insider threat detection and prevention using semantic score and dynamic multi-fuzzy classifier.
Int. J. Ad Hoc Ubiquitous Comput., 2023
Int. J. Ad Hoc Ubiquitous Comput., 2023
2022
Multim. Tools Appl., 2022
2021
Int. J. Inf. Priv. Secur. Integr., 2021
2020
Proceedings of the Machine Learning, Image Processing, Network Security and Data Sciences, 2020
2019
Multim. Tools Appl., 2019
Differentiating synthetic and optical zooming for passive video forgery detection: An anti-forensic perspective.
Digit. Investig., 2019
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2019
Proceedings of the 5th IEEE International Conference on Identity, 2019
Proceedings of the 5th IEEE International Conference on Identity, 2019
Differential Attack Graph-Based Approach for Assessing Change in the Network Attack Surface.
Proceedings of the Information Systems Security - 15th International Conference, 2019
2018
Copy-move tampering detection using affine transformation property preservation on clustered keypoints.
Signal Image Video Process., 2018
A Novel Approach to Detect Hardware Malware Using Hamming Weight Model and One Class Support Vector Machine.
Proceedings of the VLSI Design and Test - 22nd International Symposium, 2018
Inter-path Diversity Metrics for Increasing Networks Robustness Against Zero-Day Attacks.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
Proceedings of the Information Systems Security - 14th International Conference, 2018
2017
Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks.
Comput. Secur., 2017
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017
2016
Digit. Investig., 2016
2015
J. Comput. Virol. Hacking Tech., 2015
Proceedings of the Security in Computing and Communications, 2015
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2015
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2015
Proceedings of the 2015 International Conference on Advances in Computing, 2015
Proceedings of the 2015 International Conference on Advances in Computing, 2015
2014
Proceedings of the Security in Computing and Communications, 2014
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014
2013
Proceedings of the Security in Computing and Communications - International Symposium, 2013
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013
1999
Pattern Recognit. Lett., 1999
1998
Inf. Process. Manag., 1998
1997
Inf. Process. Manag., 1997
1996
1995
Multim. Syst., 1995
1994
Proceedings of the Applications of Databases, First International Conference, 1994
1993
1990
Proceedings of IAPR Workshop on Machine Vision Applications, 1990
1989
1987
Pattern Recognit., 1987