B. M. Mehtre

Orcid: 0000-0001-9819-4218

According to our database1, B. M. Mehtre authored at least 49 papers between 1987 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Thermal to Visual Person Re-Identification Using Collaborative Metric Learning Based on Maximum Margin Matrix Factorization.
Pattern Recognit., 2023

User Behaviour based Insider Threat Detection using a Hybrid Learning Approach.
J. Ambient Intell. Humaniz. Comput., 2023

A Snort-based secure edge router for smart home.
Int. J. Sens. Networks, 2023

Artificial neural network-based intrusion detection system using multi-objective genetic algorithm.
Int. J. Inf. Comput. Secur., 2023

Insider threat detection and prevention using semantic score and dynamic multi-fuzzy classifier.
Int. J. Ad Hoc Ubiquitous Comput., 2023

Intrusion detection system using resampled dataset - a comparative study.
Int. J. Ad Hoc Ubiquitous Comput., 2023

2022
User behavior based Insider Threat Detection using a Multi Fuzzy Classifier.
Multim. Tools Appl., 2022

2021
Novel attribute selection technique for an efficient intrusion detection system.
Int. J. Inf. Priv. Secur. Integr., 2021

Advances In Malware Detection- An Overview.
CoRR, 2021

Detecting Phishing Sites - An Overview.
CoRR, 2021

2019
Automated camera sabotage detection for enhancing video surveillance systems.
Multim. Tools Appl., 2019

Differentiating synthetic and optical zooming for passive video forgery detection: An anti-forensic perspective.
Digit. Investig., 2019

A Proximity-Based Measure for Quantifying the Risk of Vulnerabilities.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

Cross-Domain Face Recognition Using Dictionary Learning.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2019

User Behavior Profiling using Ensemble Approach for Insider Threat Detection.
Proceedings of the 5th IEEE International Conference on Identity, 2019

Thermal to Visual Face Recognition using Transfer Learning.
Proceedings of the 5th IEEE International Conference on Identity, 2019

Differential Attack Graph-Based Approach for Assessing Change in the Network Attack Surface.
Proceedings of the Information Systems Security - 15th International Conference, 2019

2018
Copy-move tampering detection using affine transformation property preservation on clustered keypoints.
Signal Image Video Process., 2018

A Novel Approach to Detect Hardware Malware Using Hamming Weight Model and One Class Support Vector Machine.
Proceedings of the VLSI Design and Test - 22nd International Symposium, 2018

Inter-path Diversity Metrics for Increasing Networks Robustness Against Zero-Day Attacks.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra.
Proceedings of the Information Systems Security - 14th International Conference, 2018

2017
Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks.
Comput. Secur., 2017

Diversity-aware, Cost-effective Network Security Hardening Using Attack Graph.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

2016
Digital video tampering detection: An overview of passive techniques.
Digit. Investig., 2016

2015
An overview of vulnerability assessment and penetration testing techniques.
J. Comput. Virol. Hacking Tech., 2015

Analysis of a multistage attack embedded in a video file.
Inf. Syst. Frontiers, 2015

Exploiting Domination in Attack Graph for Enterprise Network Hardening.
Proceedings of the Security in Computing and Communications, 2015

Real-Time Automatic Camera Sabotage Detection for Surveillance Systems.
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2015

Detection of Copy-Move Forgery in Images Using Segmentation and SURF.
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2015

Network intrusion detection system using J48 Decision Tree.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Exploiting curse of diversity for improved network security.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
Attack Graph Generation, Visualization and Analysis: Issues and Challenges.
Proceedings of the Security in Computing and Communications, 2014

Static Malware Analysis Using Machine Learning Methods.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

2013
Recent Trends in Collection of Software Forensics Artifacts: Issues and Challenges.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

Mozilla Firefox Browsing Artifacts in 3 Different Anti-forensics Modes.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

Forensic Artifacts of the flareGet Download Manager.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

1999
Color and spatial feature for content-based image retrieval.
Pattern Recognit. Lett., 1999

1998
Content-Based Image Retrieval Using a Composite Color-Shape Approach.
Inf. Process. Manag., 1998

1997
Shape Measures for Content Based Image Retrieval: A Comparison.
Inf. Process. Manag., 1997

1996
Cluster-based color matching for image retrieval.
Pattern Recognit., 1996

Content-Based Retrieval for Trademark Registration.
Multim. Tools Appl., 1996

1995
Color matching for image retrieval.
Pattern Recognit. Lett., 1995

Color Indexing for Efficient Image Retrieval.
Multim. Tools Appl., 1995

CORE: A Content-Based Retrieval Engine for Multimedia Information Systems.
Multim. Syst., 1995

1994
STAR - A Multimedia Database System For Trademark Registration.
Proceedings of the Applications of Databases, First International Conference, 1994

1993
Fingerprint image analysis for automatic identification.
Mach. Vis. Appl., 1993

1990
Automatic Classification of Fingerprint Images.
Proceedings of IAPR Workshop on Machine Vision Applications, 1990

1989
Segmentation of fingerprint images - A composite method.
Pattern Recognit., 1989

1987
Segmentation of fingerprint images using the directional image.
Pattern Recognit., 1987


  Loading...