Patent:

1. Innovation Patent, Australian Government (IP Australia), Patent #: 2020102438, dated October 28, 2020 (for 8 years). Title of invention: DROWSY DRIVER DETECTION SYSTEM USING AVERAGE LOCAL BINARY STRUCTURE

2. Innovation Patent, Australian Government (IP Australia), Patent #: 2020103841, dated December 02, 2020 (for 8 years). Title of invention: A SYSTEM AND A METHOD FOR QUARANTINE EPIDEMIC MODELS

3. Innovation Patent, Australian Government (IP Australia), Patent #: 2020103842, dated December 02, 2020 (for 8 years). Title of invention: A SYSTEM AND A METHOD FOR ANALYZING AND FORECASTING TRANSMISSION OF VIRUS

4. Innovation Patent, Australian Government (IP Australia), Patent #:2021104529, dtd. 24.07.2021 (for 8 years). Title of invention: A system and method for e-commerce epidemic models

5. CIPC Intellectual Property, REPUBLIC OF SOUTH AFRICA, Patent # 2023/02618, dated 31.05.2023 (for 20 years). Title of Invention: A METHOD FOR PERFORMING MATHEMATICAL MODELLING, FORECAST, AND ANALYSIS ON SPREAD OF COVID-19

Award

  1. Fellow Royal Astronomical Society (FRAS), U.K., 14.02.2020
  2. Fellow Institute of Mathematics & Applications (FIMA), U.K., 07.02.2020
  3. AIAP Early Career Research Award, 2018

Awarded at: International Conference on �Emerging Trends in Inventory, Supply Chain and Reliability Modeling (ETISCRM 2018)� of Association of Inventory Academicians and Practitioner held at Department of Operational Research, University of Delhi, Delhi on December 21-23, 2018

Associate Editor:

  • International Journal of Systems Assurance Engineering and Management, Springer Nature (Scopus/ESCI), IF 2.0 https://www.springer.com/journal/13198/editors
  • International Journal of Information Technology and Computer Sciences http://www.mecs-press.org/ijitcs/board.html
  • International Journal of Smart Computing and Information Technology http://bohrpub.com/ijscit_editorial-board.html
  • Guest Editor: Computer Virus: Theory, Model and Methods (Special Issue of Discrete Dynamics and Nature and Society, Hindawi Publications)

Editor (Edited Book): Understanding Cyber Threats and Attacks, NOVA Science Publishers, USA, 2020

Editorial Board Member:

  1. The Mathematics Education
  2. ACCST Research Journal
  3. Reflections des Era
  4. Australian Journal of Basic and Applied Sciences
  5. Research Journal of Applied Sciences
  6. Journal of Modern Mathematics and Statistics
  7. International Journal of Research in Electronics and Computer Engineering (IJRECE) 

Reviewer of:

  1. Applied Mathematical Modelling
  2. Journal of Franklyn Institute
  3. ZentralblattMathJ
  4. ournal of Mathematical Control Science and Applications
  5. Applied Mathematics and Computation
  6. International Journal of Network Security
  7. Computers and Security
  8. Computer virology
  9. Biosystems
  10. J.  Mathematical Analysis and Applications
  11. Mathematical and Computer Modeling
  12. Computer and Mathematics with Applications
  13. Optimization
  14. Chaos, Solitons and Fractals
  15. Nonlinear Analysis: Real World Applications
  16. Communications in nonlinear Science and numerical simulation
  17. International Journal of Computer Mathematics
  18. Mathematical and Computer Modelling of Dynamical Systems
  19. PHYSICA A
  20. Physics Letters A
  21. Scientific Reports (Nature Publishing Group)

Ph.D. Students:

23 (AWARDED), 04 (Supervising)

  • PUBLICATIONS: 135 
  • International Journals: 84
  • National Journals: 18       
  • Conference Proceedings: 33
  • Total number of citations: 2705
  • h � index: 22
  • i10 – index: 52

S. No.

Ph.  D. Title

Candidate Name

Guide

Co-Guide

Awarded/

Submitted/

Pursuing

1

Design and Analysis of defence Mechanism against Malware attacks in Networks

Sounak Paul

B. K. Mishra

Awarded

2

Assessment of Accreditation on Human Resource Management

Syed Jaleeluddin Hyder

B K Mishra

Manju Bhagat

Awarded

3

Comparative Assessment of Accreditation on Information Systems

Syeda Asma Fatima

B K Mishra

Manju Bhagat

Awarded

4

Defending Against Viruses and Worms on Computer Network

Upedra Kumar

B K Mishra

G Sahoo

Awarded

5

Defending against Malicious Objects in computer Network

Hemraj Saini

T C Panda

B K Mishra

Awarded

6

Epidemic models on attacking behavior of worms in computer network

Samir Pandey

B K Mishra

P K Satapathy

Awarded

7

Mathematical models on the attack of malicious objects in computer network

Prasant Nayak

B K Mishra

T C Panda

Awarded

9

Epidemic models on the attack and defense of malicious objects in computer network

R T Goswami

B K Mishra

N C Mahanti

Awarded

10

A Study of Some Mathematical Model and Simulation on Cyber Attack and Defence

Aditya Singh

B K Mishra

 

Awarded

11

Mathematical models and simulation on the attack of malicious signals in wireless sensor network

Neha Keshri

B K Mishra

 

Awarded

12

Modelling and Simulation on Cyber War

Apeksha Prajapati

B K Mishra

 

Awarded

13

Mathematical models on attacking behaviour of malware in network

Indu Tyagi

B K Mishra

BhaskarKarn

Awarded

14

Quantitative Study on Aerosol Radiative Forcing over Indo-Gangetic Plains

Lipi Kumari

B K Mishra

Manoj Kumar

Awarded

15

Some investigation on Lithium Bromide water based solar refrigeration system

Anil Sharma

B K Mishra

Ashok Misra, Abhinav Dinesh

Awarded

16

A study on modeling and simulation of the attack and defense of malicious objects in wireless networks

Kaushik Haldar

B K Mishra

 

Awarded

17

Mathematical Models and Simulations in Epidemic Diseases

Buddhadeb Mahato

Anurag Jayswal

B K Mishra

Awarded

18

Defending against malicious objects in wireless network

Ajit Kumar Keshri

B K Mishra

D K Mallick

Awarded

19

Study of some e-epidemic models on the attack and defense mechanism of worms and trojan horse in the computer network

Munna Kumar

T C Panda

B K Mishra

Awarded

20

Mathematical Models and Simulation on the Attacking Behavior of Worms� Signals in Wireless Network

Malti Kumari

R N Sinha

B K Mishra

Submitted

21

Mathematical models on the attack and defense of malicious signals in wireless network

Santosh Srivastava

B K Mishra

Binay Kumar Mishra

Awarded

Invited Talk/Resource Person:

AI/ML Techniques and Blockchain Technology in IoMT enabled Hospitals, International Conference in Sustainable Supply Chain Management at Deptt. of Operational Research, University of Delhi from November 04-05, 2023

Mathematics of COVID-19, VIT, Vellore, 12.10.2023

U.G.C. Refresher Course in Mathematics, Central University, Pondicherry, 10.10.2023

UGC Refresher Course in Research Methodology and Statistical Analysis, Ranchi University, Ranchi, 30/08/2023

Mathematical Model on transmission of Zika Virus in human population, World Wide Conference on Infectious Diseases, 25-26.11.2019, Dubai

Epidemic Model on rumors, 9th International Conference on Quality, Reliability, Infocom Technology and Buisness Operations, University of Delhi, 27-29/12/2018  

Mathematics on cyber warfare, International Conference on Emerging trends in Inventory and Supply chain and Reliability modeling, University of Delhi, 21-23/12/2018

Mathematics of Cyber Attacks, ICFAI, Tripura, 25-26/03/2011

U.G.C. Refresher Course in Statistical and O.R. Methods in Social Science; UGC Academic Staff College, Ranchi University, Ranchi; 17.12.2005 to 21.12.2005

Current Trends on Mathematical Models in Blood Flow at National Seminar on Mathematics22-24 April 2005, St.Xavier’s College, Ranchi

ANOVA for flow of Blood in arterial stenosis-an in-vitro treatment at National Seminar on Mathematics and Computer Science, 29-30 November 2005, S.D.(P.G.) College, Muzaffarnagar

Blood flow through a tapered artery with stenosis: Mathematical model of Biomagnetic fluid dynamics, National Conference on Mathematical Modeling on Real life problems, Deptt. of Mathematics, Berhampur University, Berhampur, Sept. 16-17, 2006

U.G.C. Refresher Course in Computational Mathematics; UGC Academic Staff College, Ranchi University, Ranchi; 14.01.2008 to 16.01.2008

Instructional School on Existence and Global attractivity of periodic solutions of functional differential equations with application to population dynamics, Deptt. of Applied Mathematics, B. I. T. Mesra, Ranchi, 19 June to 22 June 2008.

U.G.C. Refresher Course in Recent trends in Mathematics; UGC Academic Staff College, Ranchi University, Ranchi; 14.11.2009 to 21.11.2009

Mathematical models on Cyber attack, National seminar on Brainstorming session in Cyber attack and defense, Orissa Engineering College, Bhubaneswar, November 7-8, 2009

Flow of Blood in Human Body: A statistical Approach, Jharkhand Statistical Society, July 2010

Cyber Crime: A Mathematical approach, National Conference on Recent Developments in Mathematics and its Applications, SRM University Chennai, 2011

Keynote Speaker:

  1. Mathematics of Cyber Attack and Defense,  Ist Bi-annual conference of Jharkhand Mathematical Society, Ranchi, November 22-23, 2012
  2. Contribution of Ancient Indian Mathematics, National Conference on Mathematics and their applications, Vinoba Bhave University, Hazaribag, Jharkhand, December 21-22, 2012

Book Chapter:

  1.  e-Epidemic Models on the Attack and Defense of Malicious Objects in Networks–  Bimal Kumar MishraKaushik Haldar, Theories and Simulations of Complex Social Systems, Intelligent Systems Reference Library, Springer Berlin Heidelberg, Editors:Vahid DabbaghianVijay Kumar Mago, ISBN: 978-3-642-39148-4 (Print) , doi: 10.1007/978-3-642-39149-1_9, Volume 52, 2014, Pages 117-143
  2. A Fuzzy EOQ Model for Deteriorating Items With Allowable Shortage and Inspection Under the Trade Credit- CK Jaggi, BK Mishra, TC Panda, Handbook of Research on Promoting Business Process Improvement Through Inventory Control Techniques, pp233-249, IGI Global Publishers, 2018

Journal Publications:

Some of my Top Publications

  1. Impact of Information based classification on network epidemics – Bimal Kumar Mishra, Kaushik Haldar, Durgesh Nandini Sinha, Scientific Reports, Nature Publishing Group, 6: 28289, DOI: 10.1038/srep28289, 2016
  2. Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: A differential e-epidemic model, Yerra Shankar Rao, Ajit Kumar Keshri, Bimal Kumar Mishra, Tarini Charana Panda, Physica A, Elseveir, 540, 123240, DOI : 10.1016/j.physa.2019.123240
  3. When rumors create chaos in e-commerce, Ajit K Keshri, Bimal K Mishra,Bansidhar P Rukhaiyar, Chaos, Solitons & Fractals, Elseveir, 131, 109497, 2020
  4. COVID-19 created chaos across the globe: Three novel quarantine epidemic models, Bimal Kumar Mishra, Ajit Kumar Keshri, Yerra Shankar Rao, Binay Kumar Mishra, Buddhadeo Mahato, Syeda Ayesha, Bansidhar Prasad Rukhaiyyar, Dinesh Kumar Saini, Aditya Kumar Singh, Chaos, Solitons & Fractals, Elseveir, Vol. 138, 109928, 2020
  5. Impact of reduced scale free network on wireless sensor network, Neha Keshri, Anurag Gupta, Bimal Kumar Mishra, Physica A, Elseveir, 463 (2016), 236-245
  6. Mathematical Model on Vulnerability Characterization and its Impact on Network Epidemics- Kaushik Haldar, Bimal Kumar Mishra, International Journal of Systems Assurance Engineering and Management, Springer, DOI: 10.1007/s13198-016-0441-3, 2016
  7. Mathematical Model on Malicious Attacks in a Mobile Wireless Network with Clustering – Kaushik Haldar, Bimal Kumar Mishra, Chaos Solitons and Fractals, Elseveir, doi : 10.1016/j.chaos.2015.07.013, Vol. 78, (2015), pp. 76-85
  8. A Mathematical Model for a Distributed Attack on Targeted Resources in a Computer Network � Kaushik Haldar, Bimal Kumar Mishra, Communications in Nonlinear Science and Numerical Simulations, Elseveir,doi: 10.1016/j.cnsns.2014.01.028
  9. Two time-delay dynamic model on the transmission of malicious signals in Wireless Sensor Network – Neha Keshri, Bimal Kumar Mishra, Chaos, Solitons and Fractals,Elseveir,68(2014), 151-158
  10. Mathematical model on acquired immuno deficiency syndrome � Buddhadeo Mahato, Bimal Kumar Mishra, Anurag Jayswal, Ramesh Chandra, Journal of Egyptian Mathematical Society, Elseveir ,doi : 10.1016/j.joems.2013.12.001
  11. Dynamic model of worm propagation in computer network � Bimal Kumar Mishra, Samir Kumar Pandey, Applied Mathematical Modelling, Elsevier, 10.1016/j.apm.2013.10.046
  12. Stability Analysis of a Predator�Prey model in Wireless Sensor Network – Bimal Mishra & Neha Keshri, DOI:10.1080/00207160.2013.809070, 2015,International Journal of Computer Mathematics, Taylor and Francis
  13. Mathematical model on the transmission of worms in wireless sensor network – Bimal Kumar Mishra, Neha Keshri, Applied Mathematical Modelling, Elsevier, 37 (2013) pp. 4103-4111
  14. Mathematical model on pulmonary and multi-drug resistant tuberculosis patients with vaccination � Bimal Kumar Mishra, Jyotika Srivastava, Journal of the Egyptian Mathematical Society, Elsevier,http://dx.doi.org/10.1016/j.joems.2013.07.006, 2013
  15. Effect of Anti-virus Software on infectious nodes in Computer Network: A    Mathematical Model – Bimal Kumar Mishra, Samir Kumar Pandey, Physics Letters A, Elseveir, 376, 2389-2393, 2012
  16. Differential epidemic model of virus and worms in computer network – Bimal Kumar Mishra, G.M.Ansari,  International Journal of Network Security, 14(3), 149-155, 2012
  17. Worm Propagation with Differential infectivity under quarantine control strategy – Sounak Paul, Bimal Kumar Mishra, Int. Journal of Security and its Applications, 10(8), 2016, 201-214
  18. SIjRS e-Epidemic model with multiple groups of infection in computer networks � Bimal Kumar Mishra, Aditya Kumar Singh, International Journal of Nonlinear Science, 13, 357-362, 2012
  19. Dynamic model of worms with vertical transmission in computer network � Bimal Kumar Mishra, Samir Kumar Pandey, Applied Mathematics and Computation, Elsevier,217,8438-8446,  2011
  20. Two quarantine models on the attack of malicious objects in computer network  �  Bimal Kumar Mishra, Aditya Kumar Singh,  Mathematical problems in Engineering, In Mathematical Problems for Complex Networks, Hindawi Publishing Corporation, 1-14, 2011(doi : 10.115/2012/407064)
  21. Fuzzy epidemic model for the transmission of worms in computer network � Bimal Kumar Mishra, Samir Pandey, Non Linear Analysis: Real World Applications, Elsevier, 11(5), 4335-4341, 2010
  22. SEIQRS model for the transmission of malicious objects in computer network – Bimal Kumar Mishra, Navnit Jha, Applied Mathematical Modeling, Elsevier,34, 710�715,  2010
  23. Dynamics for Proactive Defense through Self-hardening in the Presence or Absence of Anti Malicious Software � Hemraj Saini, T. C. Panda, Bimal Kumar Mishra, Minaketan Panda, International Journal of Computer Applications, 14, 81-85, 2010
  24. Alternating group explicit iterative method for non-linear singular Fredholm integro-differential boundary value problems – Navnit Jha, R. K. Mohanty and Bimal Kumar Mishra, International Journal of Computer Mathematics, Taylor and Francis , Volume 86(9), 1645-1656, 2009
  25. Effect of Shear Stress, Resistance, and Flow Rate across Mild Stenosis on Blood Flow through Blood Vessels – Bimal Kumar Mishra,  Priyabrata Pradhan, T. C. Panda , The Cardiology, 5(1), 4-11, 2009
  26. Mathematical Models on Computer viruses � Bimal Kumar Mishra, Dinesh Saini, Applied Mathematics and Computation , Elsevier, 187(2), 929-936, 2007
  27. SEIRS epidemic model with delay for transmission of malicious objects in computer network – Bimal Kumar Mishra, Dinesh Saini, Applied Mathematics and Computation, Elsevier, 188(2), 1476-1482, 2007
  28. Fixed period of temporary immunity after run of anti-malicious software on computer nodes, Bimal Kumar Mishra, Navnit Jha, Applied Mathematics and Computation, Elsevier, 190(2), 1207-1212, 2007
  29. A predator�prey model on the attacking behavior of malicious objects in wireless nanosensor networks, A.K. Kesri,BKMishra,DK Mallick, Nano communication networks, Elsevier, 15, 1-16, 2018
  30. Comparative study of green peas using with blanching & without blanching techniques-OP Pandey, BK Mishra, A Misra, Information Processing in Agriculture, Elsevier, 6 (2), 285-296, 2019

International Journals

Number of publications : 56

A quarantine model on the spreading behavior of worms inwireless sensor network-

Binay Kumar Mishra, Santosh Kumar Srivastava, Bimal Kumar Mishra,Transaction on IoT and Cloud Computing 2(1) 1-13, 2014

Defending against malicious threats in wireless sensor network : A Mathematical Model, Bimal Kumar Mishra, Indu Tyagi, International Journal of Information Technology and Computer Science, Volume 6, Issue no.03, pp 12 -19, 2014

Two Time Delay Quarantine Model for the Transmission of Worms in Wireless Network- SK Srivastava, BK Mishra, BK Mishra,            INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 11 (10), 15-23, 2018

An SEIRS epidemic model for spread and control of malicious objects in computer network � Indu Tyagi, Bimal Kumar Mishra, Bhaskar Karn, International Journal of Mathematical Modeling Simulation and Applications, Vol 5(3), 2012, 302-30841235

A Class of spline schemes for nonlinear weakly regular singular boundary value problems using non-uniform mesh: Applications to Physiological models- Navnit Jha, Bimal Kumar Mishra, International Journal of Mathematical Modeling Simulation and Applications, Vol 5(2), 2012, 18-18941235

Mathematical model of malaria for co-infection of Plasmodium vivax and Plasmodium falciparum in India � Buddhadeo Mahato, Bimal Kumar Mishra, Anurag Jayswal, Binay Kumar Mishra, British Microbiology Research Journal, 5(3), 285-299, 201548583

Predator-Prey Models on Interaction between Malicious Objects and Anti-Malicious Software inside a Computer System- Munna Kumar,  Bimal Kumar Mishra,  T. C. Panda, Transaction on IoT and Cloud Computing (Accepted)

Optimal Control Model for attack of worms in wireless sensor network � Nehra Keshri, Bimal Kumar Mishra, Int. Journal of Grid Distribution and Computing, 7(3), 2014, 251-272

Survey of Polymorphic worm signature � Sounak Paul, Bimal Kumar Mishra, Int. Journal of u- and e- service Science and Technology, 7(3), 2014, 129-150

 Security Framework against malicious attacks in wireless sensor network, Sontosh Kumar Srivastava, Bimal Kumar Mishra, Binay Kumar Mishra, International journal of advanced technology and Engineering Research, vol. 3, Issue 5, 2013,, pp 7-1063459

Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP- SounakPaul, Bimal Kumar Mishra, International Journal of Computer Network and Information Security, 5(2), 2013, pp 29-35

A new model on the spread of malicious objects in computer network � Munna Kumar, Bimal Kumar Mishra, T. C. Panda, International Journal of Hybrid Information Technology, Vol.6, No.6 (2013), pp.161-176 22908

A Modified Antidotal e – Epidemiological Model for Malicious Objects in Computer Network � Bimal Kumar Mishra, Indu Tyagi, International Journal ofMathematical Sciencesand Engineering Applications, Vol. 7 No. I (January, 2013), pp. 167-17648305

Spread of Malicious Objects in Computer Network: A Fuzzy approach- Bimal Kumar Mishra and Apeksha Prajapati, Applications and Applied Mathematics: An International Journal,Vol. 8, Issue 2 (December 2013), pp. 684 � 70047348

Effect of Quarantine & Vaccination on Infectious Nodes in Computer Network – Munna Kumar,  Bimal Kumar Mishra,  T. C. Panda, Naushad Anwar – International Journal of Advances in Engineering, Science and Technology (Accepted)

An SEIRS Epidemic Model for spread and control of Malicious Objects in Computer Network – Bimal Kumar Mishra, Indu Tyagi, International Journal of Mathematical Modeling, Simulation and Applications, Volume 5, Issue 3, 2013.

Dynamical model on transmission of malicious codes in network- Bimal Kumar Mishra and Apeksha Prajapati,International Journal of Computer Network and Information Security,Vol 5, No. 10, 2013, 17-23

Mathematical Model on Attack by Malicious Objects Leading to Cyber War – Bimal Kumar Mishra and Apeksha Prajapati, International Journal of Nonlinear Science(Accepted)

Dynamic Model on the Effect of Vaccination on malicious objects in Computer Network- � Bimal Kumar Mishra, Indu Tyagi, Bhaskar Karn, International Journal for Research in Science & Advanced Technologies

e-Epidemic Model On Highly Infectious Nodes in the Computer Network – Munna Kumar, Bimal Kumar Mishra, Naushad Anwar, International Journal of Computer Science & Engineering Technology, Vol. 4 No. 09 Sep 2013, 1216-1223

e-dynamic SIR epidemic model and stability analysis under vaccination in computer network- Prasant Kumar Nayak and Bimal Kumar Mishra, International J. of Math. Sci. & Engg. Appls. (IJMSEA), Vol. 7 No. V (September, 2013), pp. 1-1348305

PolyS: Network-based Signature Generation for Zero-day Polymorphic Worms – Sounak Paul and Bimal Kumar Mishra, International Journal of Grid and Distributed Computing Vol. 6, No. 4, August, 2013, pp 63-74

Fixed length of infective period for attacking worms in computer network – Bimal Kumar Mishra, Upendra Kumar, G. Sahoo, International Journal of Applied Engineering Research and Development (IJAERD) , 2(2),19-31, 2012

Defending polymorphic worms in computer network using honeynet – Bimal Kumar Mishra, Upendra Kumar, G. Sahoo, International Journal of Engineering Science and Technology, 4(4),1408-1411,20122977

Defending polymorphic Worms in Computer network using Honeypot �Bimal Kumar Mishra, R.T.Goswami,  International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10, 2012, pp 63-65

Information and the dynamics of SEIR e-epidemic model for the spreading behavior of malicious objects in computer network – Bimal Kumar Mishra, R.T.Goswami, Int. Journal of Engineering Science and Technology, 4(10), pp 581-588, 20122977

Configuration of a 2 kW Capacity Absorption Refrigeration System Driven by Low Grade Energy Source-Bimal Kumar Mishra, Anil Sharma, International Journal of Mechanical and Production Engineering Research and Development, Vol.2, Issue 4, Dec 2012, 89-97 

Sensitivity analysis of a low grade energy assisted LiBr-H2O absorption cooling system-Bimal Kumar Mishra, Anil Sharma, International J. of Engg. Research & Indu. Appls. (IJERIA), Vol.5, No. IV (November 2012), pp. 109-120 

A class of spline schemes for non-linear weakly regular singular boundary value problems using non-uniform mesh : application to physiological models, Navnit Jha, Bimal Kumar Mishra, International Journal of Mathematical Modeling, Simulation and Applications, Vol. 2, 2012 180-189.41235

An e-Epidemic Model for Developing a Defense Mechanism against Computer Worms- Upendra Kumar, Bimal Kumar Mishra and G. Sahoo, CiiT International Journal of Networking and Communication Engineering, Vol 3(6),   433-435, 2011

A Quarantine Model for Malicious Objects in Computer Network- Aditya Kumar Singh and Bimal Kumar Mishra, CiiT International Journal of Networking and Communication Engineering, Vol 3(6), 436-440, 2011

A Distributed Time Delay Model of Worms in Computer Network –  Samir Kumar Pandey, Bimal Kumar Mishra and Prasanna Kumar Satpathy, CiiT International Journal of Networking and Communication Engineering, Vol 3(6), 441-447, 2011

Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network � Hemraj Saini, Bimal Kumar Mishra, T.C.Panda, International Journal of Web Portals, 3(2), 14-22, 20117753

e-epidemic model for computer viruses- Aditya Kumar Singh, Bimal Kumar Mishra, International Journal of Mathematical Modeling, Simulation and Applications, Vol 4(2),  201-208, 201141235

Extended honeypot framework to detect old/new cyber attacks � Hemraj Saini, Bimal Kumar Mishra, H. N. Pratihari, T. C. Panda, International Journal of Engineering Science and Technology, 3(3), 2421-2426,  2011

Defending the transmission of viruses in computer network using directed graph � Upendra Kumar, Bimal Kumar Mishra, G. Sahoo, International Journal of Mathematical Modeling, Simulation and Applications, Vol 4(4),399-407,   2011 41235

Fuzzy e-epidemic SEIRS model for the transmission of worms in computer network � Bimal Kumar Mishra, Samir Pandey, International Journal of Mathematical Modeling, Simulation and Applications, Vol 4(1), 17-27, 201141235

Modeling the transmission of malicious objects in computer network with two time delays  �   Bimal Kumar Mishra, G.M.Ansari,International Journal of Mathematical Modeling, Simulation and Applications, 4(3), 277-286, 2011 41235

Global Stability of worms in computer network – Bimal Kumar Mishra, Aditya Kumar Singh, Applications and Applied Mathematics: An International Journal, Volume 5(10), 1511-1528,   201047348

Final size formula for infected nodes due to the attack of malicious agents in a computer network � Bimal Kumar Mishra, Prasant Nayak, International Journal of Soft Computing, 5(2), 56-61,  2010

Mathematical Models on Interaction between Computer Virus and Antivirus Software inside a Computer System  �  Bimal Kumar Mishra, Gholam Mursalin Ansari, International Journal of Computer and Network Security,Vol. 2(8), 84 � 89, 2010

Effect of stenosis on Non Newtonian Flow of blood in blood vessels – Bimal Kumar Mishra, Nidhi Verma, Australian Journal of Basic and Applied Sciences, 4(4), 588-601, 20101608

Flow of blood in a porous medium and its effect on heat transfer rate – Bimal Kumar Mishra,  Priyabrata Pradhan, T. C. Panda , International journal of Molecular Medicine and Advanced Sciences, 6(1), 8-13, 2010

Perception of Accreditation on Human Resource Development & Management in Hospitals Accredited by CCHSA, JCI & NABH: A Comparative Study – Syed Jaleeluddin Hyder, Bimal Kumar Mishra, Manju Bhagat, Journal of Economics Theory, 4(1), 20-24,  2010

Impact of Accreditation on Human Resource Development and Management of a Hospital through HR Balance Score Card – Syed Jaleeluddin Hyder, Bimal Kumar Mishra, Manju Bhagat, International Journal of Business Management, 4(2), 89-98,  2010

Effect of Shear Stress, Resistance, and Flow Rate across Mild Stenosis on Blood Flow through Blood Vessels – Bimal Kumar Mishra,  Priyabrata Pradhan, T. C. Panda , The Cardiology, 5(1), 4-11,2010

 Predator-Prey Models for the Attack of Malicious Objects in Computer Network � Bimal Kumar Mishra, Ghoolam Mursalin Ansari, Journal of Engineering and Applied Sciences 4 (3), 215-220,20097336

Cyber Attack Classification by Game Theoretic Weighted Metrics Approach � Bimal Kumar Mishra, Hemraj Saini, World Applied Science Journal, Volume 7 (Special Issue for Computer & IT), 206-215, 2009

Effect of quarantine nodes in SEQIAmS  model for the transmission of malicious  objects in computer network-  Bimal Kumar Mishra, Prasant Kumar Nayak, Navnit Jha, International Journal of Mathematical Modeling, Simulation and Applications , 2(1), 102-113, 200941235

Epidemic Model for Active Infectious Nodes in Computer Sub-Networks  – Bimal Kumar Mishra, Prasant Nayak, International Journal of Systems Signal Control and Engineering Applications 2(3-4), 56-60, 2009

Non Newtonian fluid model of blood flow for the effect of resistance parameter on different portion of arteries through an arterial stenosis – Bimal Kumar Mishra,  Priyabrata Pradhan, T. C. Panda , Research Journal of Biological Sciences, 4(12), 1280-1283,  2009

Effect of Viscosity and Stenosis on Flow Rate of Blood in Human Body – An In-Vitro Treatment  – Bimal Kumar Mishra, Anantha Naik Nagappa, Priyabrata Pradhan, T. C. Panda, International Journal of Mathematical Modeling Simulation and Applications, Vol 2(2), 177-183, 200941235

An 0(h4)  accurate quarter sweep alternating decomposition explicit iterative algorithm for non linear two point boundary value problems – Navnit Jha, Bimal Kumar Mishra, International Journal of Mathematical Modeling, Simulation and Application  1(1), 41 � 46, 200841235

Effect of various parameters of RBC on oxygen concentration in tissues- Bimal Kumar Mishra, Shailendra Singh Shekhawat, Journal of Mathematical Control Science and Applications, 2(1), 117-122,  2008

Effect of resistance parameter on uniform and non-uniform portion of artery for non-Newtonian fluid model of blood flow through an arterial stenosis – Bimal Kumar Mishra, Priyabrata Pradhan, T.C. Panda, Medwell Journal of Modern Mathematics and Statistics, 2(6), 203-206, 2008

Effect of Porous parameter and stenosis on the wall shear stress for the flow of blood in human body � Bimal Kumar Mishra, Shailendra Singh Shekhawat, Research Journal of Medicine and Medical Science , 2 (2), 98 � 101, 2007