Patent:
1. Innovation Patent, Australian Government (IP Australia), Patent #: 2020102438, dated October 28, 2020 (for 8 years). Title of invention: DROWSY DRIVER DETECTION SYSTEM USING AVERAGE LOCAL BINARY STRUCTURE
2. Innovation Patent, Australian Government (IP Australia), Patent #: 2020103841, dated December 02, 2020 (for 8 years). Title of invention: A SYSTEM AND A METHOD FOR QUARANTINE EPIDEMIC MODELS
3. Innovation Patent, Australian Government (IP Australia), Patent #: 2020103842, dated December 02, 2020 (for 8 years). Title of invention: A SYSTEM AND A METHOD FOR ANALYZING AND FORECASTING TRANSMISSION OF VIRUS
4. Innovation Patent, Australian Government (IP Australia), Patent #:2021104529, dtd. 24.07.2021 (for 8 years). Title of invention: A system and method for e-commerce epidemic models
5. CIPC Intellectual Property, REPUBLIC OF SOUTH AFRICA, Patent # 2023/02618, dated 31.05.2023 (for 20 years). Title of Invention: A METHOD FOR PERFORMING MATHEMATICAL MODELLING, FORECAST, AND ANALYSIS ON SPREAD OF COVID-19
Award
- Fellow Royal Astronomical Society (FRAS), U.K., 14.02.2020
- Fellow Institute of Mathematics & Applications (FIMA), U.K., 07.02.2020
- AIAP Early Career Research Award, 2018
Awarded at: International Conference on �Emerging Trends in Inventory, Supply Chain and Reliability Modeling (ETISCRM 2018)� of Association of Inventory Academicians and Practitioner held at Department of Operational Research, University of Delhi, Delhi on December 21-23, 2018
Founder Editor-in-chief:
Associate Editor:
- International Journal of Systems Assurance Engineering and Management, Springer Nature (Scopus/ESCI), IF 2.0 https://www.springer.com/journal/13198/editors
- International Journal of Information Technology and Computer Sciences http://www.mecs-press.org/ijitcs/board.html
- International Journal of Smart Computing and Information Technology http://bohrpub.com/ijscit_editorial-board.html
- Guest Editor: Computer Virus: Theory, Model and Methods (Special Issue of Discrete Dynamics and Nature and Society, Hindawi Publications)
Editor (Edited Book): Understanding Cyber Threats and Attacks, NOVA Science Publishers, USA, 2020
Editorial Board Member:
- The Mathematics Education
- ACCST Research Journal
- Reflections des Era
- Australian Journal of Basic and Applied Sciences
- Research Journal of Applied Sciences
- Journal of Modern Mathematics and Statistics
- International Journal of Research in Electronics and Computer Engineering (IJRECE)
Reviewer of:
- Applied Mathematical Modelling
- Journal of Franklyn Institute
- ZentralblattMathJ
- ournal of Mathematical Control Science and Applications
- Applied Mathematics and Computation
- International Journal of Network Security
- Computers and Security
- Computer virology
- Biosystems
- J. Mathematical Analysis and Applications
- Mathematical and Computer Modeling
- Computer and Mathematics with Applications
- Optimization
- Chaos, Solitons and Fractals
- Nonlinear Analysis: Real World Applications
- Communications in nonlinear Science and numerical simulation
- International Journal of Computer Mathematics
- Mathematical and Computer Modelling of Dynamical Systems
- PHYSICA A
- Physics Letters A
- Scientific Reports (Nature Publishing Group)
Ph.D. Students:
23 (AWARDED), 04 (Supervising)
- PUBLICATIONS: 135
- International Journals: 84
- National Journals: 18
- Conference Proceedings: 33
- Total number of citations: 2705
- h � index: 22
- i10 – index: 52
S. No. | Ph. D. Title | Candidate Name | Guide | Co-Guide | Awarded/ Submitted/ Pursuing |
1 | Design and Analysis of defence Mechanism against Malware attacks in Networks | Sounak Paul | B. K. Mishra | – | Awarded |
2 | Assessment of Accreditation on Human Resource Management | Syed Jaleeluddin Hyder | B K Mishra | Manju Bhagat | Awarded |
3 | Comparative Assessment of Accreditation on Information Systems | Syeda Asma Fatima | B K Mishra | Manju Bhagat | Awarded |
4 | Defending Against Viruses and Worms on Computer Network | Upedra Kumar | B K Mishra | G Sahoo | Awarded |
5 | Defending against Malicious Objects in computer Network | Hemraj Saini | T C Panda | B K Mishra | Awarded |
6 | Epidemic models on attacking behavior of worms in computer network | Samir Pandey | B K Mishra | P K Satapathy | Awarded |
7 | Mathematical models on the attack of malicious objects in computer network | Prasant Nayak | B K Mishra | T C Panda | Awarded |
9 | Epidemic models on the attack and defense of malicious objects in computer network | R T Goswami | B K Mishra | N C Mahanti | Awarded |
10 | A Study of Some Mathematical Model and Simulation on Cyber Attack and Defence | Aditya Singh | B K Mishra | Awarded | |
11 | Mathematical models and simulation on the attack of malicious signals in wireless sensor network | Neha Keshri | B K Mishra | Awarded | |
12 | Modelling and Simulation on Cyber War | Apeksha Prajapati | B K Mishra | Awarded | |
13 | Mathematical models on attacking behaviour of malware in network | Indu Tyagi | B K Mishra | BhaskarKarn | Awarded |
14 | Quantitative Study on Aerosol Radiative Forcing over Indo-Gangetic Plains | Lipi Kumari | B K Mishra | Manoj Kumar | Awarded |
15 | Some investigation on Lithium Bromide water based solar refrigeration system | Anil Sharma | B K Mishra | Ashok Misra, Abhinav Dinesh | Awarded |
16 | A study on modeling and simulation of the attack and defense of malicious objects in wireless networks | Kaushik Haldar | B K Mishra | Awarded | |
17 | Mathematical Models and Simulations in Epidemic Diseases | Buddhadeb Mahato | Anurag Jayswal | B K Mishra | Awarded |
18 | Defending against malicious objects in wireless network | Ajit Kumar Keshri | B K Mishra | D K Mallick | Awarded |
19 | Study of some e-epidemic models on the attack and defense mechanism of worms and trojan horse in the computer network | Munna Kumar | T C Panda | B K Mishra | Awarded |
20 | Mathematical Models and Simulation on the Attacking Behavior of Worms� Signals in Wireless Network | Malti Kumari | R N Sinha | B K Mishra | Submitted |
21 | Mathematical models on the attack and defense of malicious signals in wireless network | Santosh Srivastava | B K Mishra | Binay Kumar Mishra | Awarded |
Invited Talk/Resource Person:
AI/ML Techniques and Blockchain Technology in IoMT enabled Hospitals, International Conference in Sustainable Supply Chain Management at Deptt. of Operational Research, University of Delhi from November 04-05, 2023
Mathematics of COVID-19, VIT, Vellore, 12.10.2023
U.G.C. Refresher Course in Mathematics, Central University, Pondicherry, 10.10.2023
UGC Refresher Course in Research Methodology and Statistical Analysis, Ranchi University, Ranchi, 30/08/2023
Mathematical Model on transmission of Zika Virus in human population, World Wide Conference on Infectious Diseases, 25-26.11.2019, Dubai
Epidemic Model on rumors, 9th International Conference on Quality, Reliability, Infocom Technology and Buisness Operations, University of Delhi, 27-29/12/2018
Mathematics on cyber warfare, International Conference on Emerging trends in Inventory and Supply chain and Reliability modeling, University of Delhi, 21-23/12/2018
Mathematics of Cyber Attacks, ICFAI, Tripura, 25-26/03/2011
U.G.C. Refresher Course in Statistical and O.R. Methods in Social Science; UGC Academic Staff College, Ranchi University, Ranchi; 17.12.2005 to 21.12.2005
Current Trends on Mathematical Models in Blood Flow at National Seminar on Mathematics, 22-24 April 2005, St.Xavier’s College, Ranchi
ANOVA for flow of Blood in arterial stenosis-an in-vitro treatment at National Seminar on Mathematics and Computer Science, 29-30 November 2005, S.D.(P.G.) College, Muzaffarnagar
Blood flow through a tapered artery with stenosis: Mathematical model of Biomagnetic fluid dynamics, National Conference on Mathematical Modeling on Real life problems, Deptt. of Mathematics, Berhampur University, Berhampur, Sept. 16-17, 2006
U.G.C. Refresher Course in Computational Mathematics; UGC Academic Staff College, Ranchi University, Ranchi; 14.01.2008 to 16.01.2008
Instructional School on Existence and Global attractivity of periodic solutions of functional differential equations with application to population dynamics, Deptt. of Applied Mathematics, B. I. T. Mesra, Ranchi, 19 June to 22 June 2008.
U.G.C. Refresher Course in Recent trends in Mathematics; UGC Academic Staff College, Ranchi University, Ranchi; 14.11.2009 to 21.11.2009
Mathematical models on Cyber attack, National seminar on Brainstorming session in Cyber attack and defense, Orissa Engineering College, Bhubaneswar, November 7-8, 2009
Flow of Blood in Human Body: A statistical Approach, Jharkhand Statistical Society, July 2010
Cyber Crime: A Mathematical approach, National Conference on Recent Developments in Mathematics and its Applications, SRM University Chennai, 2011
Keynote Speaker:
- Mathematics of Cyber Attack and Defense, Ist Bi-annual conference of Jharkhand Mathematical Society, Ranchi, November 22-23, 2012
- Contribution of Ancient Indian Mathematics, National Conference on Mathematics and their applications, Vinoba Bhave University, Hazaribag, Jharkhand, December 21-22, 2012
Book Chapter:
- e-Epidemic Models on the Attack and Defense of Malicious Objects in Networks– Bimal Kumar Mishra, Kaushik Haldar, Theories and Simulations of Complex Social Systems, Intelligent Systems Reference Library, Springer Berlin Heidelberg, Editors:Vahid Dabbaghian, Vijay Kumar Mago, ISBN: 978-3-642-39148-4 (Print) , doi: 10.1007/978-3-642-39149-1_9, Volume 52, 2014, Pages 117-143
- A Fuzzy EOQ Model for Deteriorating Items With Allowable Shortage and Inspection Under the Trade Credit- CK Jaggi, BK Mishra, TC Panda, Handbook of Research on Promoting Business Process Improvement Through Inventory Control Techniques, pp233-249, IGI Global Publishers, 2018
Journal Publications:
Some of my Top Publications
- Impact of Information based classification on network epidemics – Bimal Kumar Mishra, Kaushik Haldar, Durgesh Nandini Sinha, Scientific Reports, Nature Publishing Group, 6: 28289, DOI: 10.1038/srep28289, 2016
- Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: A differential e-epidemic model, Yerra Shankar Rao, Ajit Kumar Keshri, Bimal Kumar Mishra, Tarini Charana Panda, Physica A, Elseveir, 540, 123240, DOI : 10.1016/j.physa.2019.123240
- When rumors create chaos in e-commerce, Ajit K Keshri, Bimal K Mishra,Bansidhar P Rukhaiyar, Chaos, Solitons & Fractals, Elseveir, 131, 109497, 2020
- COVID-19 created chaos across the globe: Three novel quarantine epidemic models, Bimal Kumar Mishra, Ajit Kumar Keshri, Yerra Shankar Rao, Binay Kumar Mishra, Buddhadeo Mahato, Syeda Ayesha, Bansidhar Prasad Rukhaiyyar, Dinesh Kumar Saini, Aditya Kumar Singh, Chaos, Solitons & Fractals, Elseveir, Vol. 138, 109928, 2020
- Impact of reduced scale free network on wireless sensor network, Neha Keshri, Anurag Gupta, Bimal Kumar Mishra, Physica A, Elseveir, 463 (2016), 236-245
- Mathematical Model on Vulnerability Characterization and its Impact on Network Epidemics- Kaushik Haldar, Bimal Kumar Mishra, International Journal of Systems Assurance Engineering and Management, Springer, DOI: 10.1007/s13198-016-0441-3, 2016
- Mathematical Model on Malicious Attacks in a Mobile Wireless Network with Clustering – Kaushik Haldar, Bimal Kumar Mishra, Chaos Solitons and Fractals, Elseveir, doi : 10.1016/j.chaos.2015.07.013, Vol. 78, (2015), pp. 76-85
- A Mathematical Model for a Distributed Attack on Targeted Resources in a Computer Network � Kaushik Haldar, Bimal Kumar Mishra, Communications in Nonlinear Science and Numerical Simulations, Elseveir,doi: 10.1016/j.cnsns.2014.01.028
- Two time-delay dynamic model on the transmission of malicious signals in Wireless Sensor Network – Neha Keshri, Bimal Kumar Mishra, Chaos, Solitons and Fractals,Elseveir,68(2014), 151-158
- Mathematical model on acquired immuno deficiency syndrome � Buddhadeo Mahato, Bimal Kumar Mishra, Anurag Jayswal, Ramesh Chandra, Journal of Egyptian Mathematical Society, Elseveir ,doi : 10.1016/j.joems.2013.12.001
- Dynamic model of worm propagation in computer network � Bimal Kumar Mishra, Samir Kumar Pandey, Applied Mathematical Modelling, Elsevier, 10.1016/j.apm.2013.10.046
- Stability Analysis of a Predator�Prey model in Wireless Sensor Network – Bimal Mishra & Neha Keshri, DOI:10.1080/00207160.2013.809070, 2015,International Journal of Computer Mathematics, Taylor and Francis
- Mathematical model on the transmission of worms in wireless sensor network – Bimal Kumar Mishra, Neha Keshri, Applied Mathematical Modelling, Elsevier, 37 (2013) pp. 4103-4111
- Mathematical model on pulmonary and multi-drug resistant tuberculosis patients with vaccination � Bimal Kumar Mishra, Jyotika Srivastava, Journal of the Egyptian Mathematical Society, Elsevier,http://dx.doi.org/10.1016/j.joems.2013.07.006, 2013
- Effect of Anti-virus Software on infectious nodes in Computer Network: A Mathematical Model – Bimal Kumar Mishra, Samir Kumar Pandey, Physics Letters A, Elseveir, 376, 2389-2393, 2012
- Differential epidemic model of virus and worms in computer network – Bimal Kumar Mishra, G.M.Ansari, International Journal of Network Security, 14(3), 149-155, 2012
- Worm Propagation with Differential infectivity under quarantine control strategy – Sounak Paul, Bimal Kumar Mishra, Int. Journal of Security and its Applications, 10(8), 2016, 201-214
- SIjRS e-Epidemic model with multiple groups of infection in computer networks � Bimal Kumar Mishra, Aditya Kumar Singh, International Journal of Nonlinear Science, 13, 357-362, 2012
- Dynamic model of worms with vertical transmission in computer network � Bimal Kumar Mishra, Samir Kumar Pandey, Applied Mathematics and Computation, Elsevier,217,8438-8446, 2011
- Two quarantine models on the attack of malicious objects in computer network � Bimal Kumar Mishra, Aditya Kumar Singh, Mathematical problems in Engineering, In Mathematical Problems for Complex Networks, Hindawi Publishing Corporation, 1-14, 2011(doi : 10.115/2012/407064)
- Fuzzy epidemic model for the transmission of worms in computer network � Bimal Kumar Mishra, Samir Pandey, Non Linear Analysis: Real World Applications, Elsevier, 11(5), 4335-4341, 2010
- SEIQRS model for the transmission of malicious objects in computer network – Bimal Kumar Mishra, Navnit Jha, Applied Mathematical Modeling, Elsevier,34, 710�715, 2010
- Dynamics for Proactive Defense through Self-hardening in the Presence or Absence of Anti Malicious Software � Hemraj Saini, T. C. Panda, Bimal Kumar Mishra, Minaketan Panda, International Journal of Computer Applications, 14, 81-85, 2010
- Alternating group explicit iterative method for non-linear singular Fredholm integro-differential boundary value problems – Navnit Jha, R. K. Mohanty and Bimal Kumar Mishra, International Journal of Computer Mathematics, Taylor and Francis , Volume 86(9), 1645-1656, 2009
- Effect of Shear Stress, Resistance, and Flow Rate across Mild Stenosis on Blood Flow through Blood Vessels – Bimal Kumar Mishra, Priyabrata Pradhan, T. C. Panda , The Cardiology, 5(1), 4-11, 2009
- Mathematical Models on Computer viruses � Bimal Kumar Mishra, Dinesh Saini, Applied Mathematics and Computation , Elsevier, 187(2), 929-936, 2007
- SEIRS epidemic model with delay for transmission of malicious objects in computer network – Bimal Kumar Mishra, Dinesh Saini, Applied Mathematics and Computation, Elsevier, 188(2), 1476-1482, 2007
- Fixed period of temporary immunity after run of anti-malicious software on computer nodes, Bimal Kumar Mishra, Navnit Jha, Applied Mathematics and Computation, Elsevier, 190(2), 1207-1212, 2007
- A predator�prey model on the attacking behavior of malicious objects in wireless nanosensor networks, A.K. Kesri,BKMishra,DK Mallick, Nano communication networks, Elsevier, 15, 1-16, 2018
- Comparative study of green peas using with blanching & without blanching techniques-OP Pandey, BK Mishra, A Misra, Information Processing in Agriculture, Elsevier, 6 (2), 285-296, 2019
International Journals
Number of publications : 56
A quarantine model on the spreading behavior of worms inwireless sensor network-
Binay Kumar Mishra, Santosh Kumar Srivastava, Bimal Kumar Mishra,Transaction on IoT and Cloud Computing 2(1) 1-13, 2014
Defending against malicious threats in wireless sensor network : A Mathematical Model, Bimal Kumar Mishra, Indu Tyagi, International Journal of Information Technology and Computer Science, Volume 6, Issue no.03, pp 12 -19, 2014
Two Time Delay Quarantine Model for the Transmission of Worms in Wireless Network- SK Srivastava, BK Mishra, BK Mishra, INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 11 (10), 15-23, 2018
An SEIRS epidemic model for spread and control of malicious objects in computer network � Indu Tyagi, Bimal Kumar Mishra, Bhaskar Karn, International Journal of Mathematical Modeling Simulation and Applications, Vol 5(3), 2012, 302-30841235
A Class of spline schemes for nonlinear weakly regular singular boundary value problems using non-uniform mesh: Applications to Physiological models- Navnit Jha, Bimal Kumar Mishra, International Journal of Mathematical Modeling Simulation and Applications, Vol 5(2), 2012, 18-18941235
Mathematical model of malaria for co-infection of Plasmodium vivax and Plasmodium falciparum in India � Buddhadeo Mahato, Bimal Kumar Mishra, Anurag Jayswal, Binay Kumar Mishra, British Microbiology Research Journal, 5(3), 285-299, 201548583
Predator-Prey Models on Interaction between Malicious Objects and Anti-Malicious Software inside a Computer System- Munna Kumar, Bimal Kumar Mishra, T. C. Panda, Transaction on IoT and Cloud Computing (Accepted)
Optimal Control Model for attack of worms in wireless sensor network � Nehra Keshri, Bimal Kumar Mishra, Int. Journal of Grid Distribution and Computing, 7(3), 2014, 251-272
Survey of Polymorphic worm signature � Sounak Paul, Bimal Kumar Mishra, Int. Journal of u- and e- service Science and Technology, 7(3), 2014, 129-150
Security Framework against malicious attacks in wireless sensor network, Sontosh Kumar Srivastava, Bimal Kumar Mishra, Binay Kumar Mishra, International journal of advanced technology and Engineering Research, vol. 3, Issue 5, 2013,, pp 7-1063459
Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP- SounakPaul, Bimal Kumar Mishra, International Journal of Computer Network and Information Security, 5(2), 2013, pp 29-35
A new model on the spread of malicious objects in computer network � Munna Kumar, Bimal Kumar Mishra, T. C. Panda, International Journal of Hybrid Information Technology, Vol.6, No.6 (2013), pp.161-176 22908
A Modified Antidotal e – Epidemiological Model for Malicious Objects in Computer Network � Bimal Kumar Mishra, Indu Tyagi, International Journal ofMathematical Sciencesand Engineering Applications, Vol. 7 No. I (January, 2013), pp. 167-17648305
Spread of Malicious Objects in Computer Network: A Fuzzy approach- Bimal Kumar Mishra and Apeksha Prajapati, Applications and Applied Mathematics: An International Journal,Vol. 8, Issue 2 (December 2013), pp. 684 � 70047348
Effect of Quarantine & Vaccination on Infectious Nodes in Computer Network – Munna Kumar, Bimal Kumar Mishra, T. C. Panda, Naushad Anwar – International Journal of Advances in Engineering, Science and Technology (Accepted)
An SEIRS Epidemic Model for spread and control of Malicious Objects in Computer Network – Bimal Kumar Mishra, Indu Tyagi, International Journal of Mathematical Modeling, Simulation and Applications, Volume 5, Issue 3, 2013.
Dynamical model on transmission of malicious codes in network- Bimal Kumar Mishra and Apeksha Prajapati,International Journal of Computer Network and Information Security,Vol 5, No. 10, 2013, 17-23
Mathematical Model on Attack by Malicious Objects Leading to Cyber War – Bimal Kumar Mishra and Apeksha Prajapati, International Journal of Nonlinear Science(Accepted)
Dynamic Model on the Effect of Vaccination on malicious objects in Computer Network- � Bimal Kumar Mishra, Indu Tyagi, Bhaskar Karn, International Journal for Research in Science & Advanced Technologies
e-Epidemic Model On Highly Infectious Nodes in the Computer Network – Munna Kumar, Bimal Kumar Mishra, Naushad Anwar, International Journal of Computer Science & Engineering Technology, Vol. 4 No. 09 Sep 2013, 1216-1223
e-dynamic SIR epidemic model and stability analysis under vaccination in computer network- Prasant Kumar Nayak and Bimal Kumar Mishra, International J. of Math. Sci. & Engg. Appls. (IJMSEA), Vol. 7 No. V (September, 2013), pp. 1-1348305
PolyS: Network-based Signature Generation for Zero-day Polymorphic Worms – Sounak Paul and Bimal Kumar Mishra, International Journal of Grid and Distributed Computing Vol. 6, No. 4, August, 2013, pp 63-74
Fixed length of infective period for attacking worms in computer network – Bimal Kumar Mishra, Upendra Kumar, G. Sahoo, International Journal of Applied Engineering Research and Development (IJAERD) , 2(2),19-31, 2012
Defending polymorphic worms in computer network using honeynet – Bimal Kumar Mishra, Upendra Kumar, G. Sahoo, International Journal of Engineering Science and Technology, 4(4),1408-1411,20122977
Defending polymorphic Worms in Computer network using Honeypot �Bimal Kumar Mishra, R.T.Goswami, International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10, 2012, pp 63-65
Information and the dynamics of SEIR e-epidemic model for the spreading behavior of malicious objects in computer network – Bimal Kumar Mishra, R.T.Goswami, Int. Journal of Engineering Science and Technology, 4(10), pp 581-588, 20122977
Configuration of a 2 kW Capacity Absorption Refrigeration System Driven by Low Grade Energy Source-Bimal Kumar Mishra, Anil Sharma, International Journal of Mechanical and Production Engineering Research and Development, Vol.2, Issue 4, Dec 2012, 89-97
Sensitivity analysis of a low grade energy assisted LiBr-H2O absorption cooling system-Bimal Kumar Mishra, Anil Sharma, International J. of Engg. Research & Indu. Appls. (IJERIA), Vol.5, No. IV (November 2012), pp. 109-120
A class of spline schemes for non-linear weakly regular singular boundary value problems using non-uniform mesh : application to physiological models, Navnit Jha, Bimal Kumar Mishra, International Journal of Mathematical Modeling, Simulation and Applications, Vol. 2, 2012 180-189.41235
An e-Epidemic Model for Developing a Defense Mechanism against Computer Worms- Upendra Kumar, Bimal Kumar Mishra and G. Sahoo, CiiT International Journal of Networking and Communication Engineering, Vol 3(6), 433-435, 2011
A Quarantine Model for Malicious Objects in Computer Network- Aditya Kumar Singh and Bimal Kumar Mishra, CiiT International Journal of Networking and Communication Engineering, Vol 3(6), 436-440, 2011
A Distributed Time Delay Model of Worms in Computer Network – Samir Kumar Pandey, Bimal Kumar Mishra and Prasanna Kumar Satpathy, CiiT International Journal of Networking and Communication Engineering, Vol 3(6), 441-447, 2011
Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network � Hemraj Saini, Bimal Kumar Mishra, T.C.Panda, International Journal of Web Portals, 3(2), 14-22, 20117753
e-epidemic model for computer viruses- Aditya Kumar Singh, Bimal Kumar Mishra, International Journal of Mathematical Modeling, Simulation and Applications, Vol 4(2), 201-208, 201141235
Extended honeypot framework to detect old/new cyber attacks � Hemraj Saini, Bimal Kumar Mishra, H. N. Pratihari, T. C. Panda, International Journal of Engineering Science and Technology, 3(3), 2421-2426, 2011
Defending the transmission of viruses in computer network using directed graph � Upendra Kumar, Bimal Kumar Mishra, G. Sahoo, International Journal of Mathematical Modeling, Simulation and Applications, Vol 4(4),399-407, 2011 41235
Fuzzy e-epidemic SEIRS model for the transmission of worms in computer network � Bimal Kumar Mishra, Samir Pandey, International Journal of Mathematical Modeling, Simulation and Applications, Vol 4(1), 17-27, 201141235
Modeling the transmission of malicious objects in computer network with two time delays � Bimal Kumar Mishra, G.M.Ansari,International Journal of Mathematical Modeling, Simulation and Applications, 4(3), 277-286, 2011 41235
Global Stability of worms in computer network – Bimal Kumar Mishra, Aditya Kumar Singh, Applications and Applied Mathematics: An International Journal, Volume 5(10), 1511-1528, 201047348
Final size formula for infected nodes due to the attack of malicious agents in a computer network � Bimal Kumar Mishra, Prasant Nayak, International Journal of Soft Computing, 5(2), 56-61, 2010
Mathematical Models on Interaction between Computer Virus and Antivirus Software inside a Computer System � Bimal Kumar Mishra, Gholam Mursalin Ansari, International Journal of Computer and Network Security,Vol. 2(8), 84 � 89, 2010
Effect of stenosis on Non Newtonian Flow of blood in blood vessels – Bimal Kumar Mishra, Nidhi Verma, Australian Journal of Basic and Applied Sciences, 4(4), 588-601, 20101608
Flow of blood in a porous medium and its effect on heat transfer rate – Bimal Kumar Mishra, Priyabrata Pradhan, T. C. Panda , International journal of Molecular Medicine and Advanced Sciences, 6(1), 8-13, 2010
Perception of Accreditation on Human Resource Development & Management in Hospitals Accredited by CCHSA, JCI & NABH: A Comparative Study – Syed Jaleeluddin Hyder, Bimal Kumar Mishra, Manju Bhagat, Journal of Economics Theory, 4(1), 20-24, 2010
Impact of Accreditation on Human Resource Development and Management of a Hospital through HR Balance Score Card – Syed Jaleeluddin Hyder, Bimal Kumar Mishra, Manju Bhagat, International Journal of Business Management, 4(2), 89-98, 2010
Effect of Shear Stress, Resistance, and Flow Rate across Mild Stenosis on Blood Flow through Blood Vessels – Bimal Kumar Mishra, Priyabrata Pradhan, T. C. Panda , The Cardiology, 5(1), 4-11,2010
Predator-Prey Models for the Attack of Malicious Objects in Computer Network � Bimal Kumar Mishra, Ghoolam Mursalin Ansari, Journal of Engineering and Applied Sciences 4 (3), 215-220,20097336
Cyber Attack Classification by Game Theoretic Weighted Metrics Approach � Bimal Kumar Mishra, Hemraj Saini, World Applied Science Journal, Volume 7 (Special Issue for Computer & IT), 206-215, 2009
Effect of quarantine nodes in SEQIAmS model for the transmission of malicious objects in computer network- Bimal Kumar Mishra, Prasant Kumar Nayak, Navnit Jha, International Journal of Mathematical Modeling, Simulation and Applications , 2(1), 102-113, 200941235
Epidemic Model for Active Infectious Nodes in Computer Sub-Networks – Bimal Kumar Mishra, Prasant Nayak, International Journal of Systems Signal Control and Engineering Applications 2(3-4), 56-60, 2009
Non Newtonian fluid model of blood flow for the effect of resistance parameter on different portion of arteries through an arterial stenosis – Bimal Kumar Mishra, Priyabrata Pradhan, T. C. Panda , Research Journal of Biological Sciences, 4(12), 1280-1283, 2009
Effect of Viscosity and Stenosis on Flow Rate of Blood in Human Body – An In-Vitro Treatment – Bimal Kumar Mishra, Anantha Naik Nagappa, Priyabrata Pradhan, T. C. Panda, International Journal of Mathematical Modeling Simulation and Applications, Vol 2(2), 177-183, 200941235
An 0(h4) accurate quarter sweep alternating decomposition explicit iterative algorithm for non linear two point boundary value problems – Navnit Jha, Bimal Kumar Mishra, International Journal of Mathematical Modeling, Simulation and Application 1(1), 41 � 46, 200841235
Effect of various parameters of RBC on oxygen concentration in tissues- Bimal Kumar Mishra, Shailendra Singh Shekhawat, Journal of Mathematical Control Science and Applications, 2(1), 117-122, 2008
Effect of resistance parameter on uniform and non-uniform portion of artery for non-Newtonian fluid model of blood flow through an arterial stenosis – Bimal Kumar Mishra, Priyabrata Pradhan, T.C. Panda, Medwell Journal of Modern Mathematics and Statistics, 2(6), 203-206, 2008
Effect of Porous parameter and stenosis on the wall shear stress for the flow of blood in human body � Bimal Kumar Mishra, Shailendra Singh Shekhawat, Research Journal of Medicine and Medical Science , 2 (2), 98 � 101, 2007