Birla Institute of Technology, Mesra
Dr. Upendra Kumar
Assistant Professor, Computer Science and Engg
Ph.D in Engg., M.Tech.(CSE), M.Phil.(CSE)
Contact Address
Permanent Address Dr. Upendra Kumar At- Chetar , P.O-Gumla Dist-Gumla, Gumla Jharkhand, India
Local Address BIT, Patna
Phone (Office) 9006960159
Phone Residence 9006960159
Email Id upendrakr@bitmesra.ac.in
Joined Institute on : 31-Jul-2012

  Work Experience
 
Teaching : 20 Years

Research : 11 Years

Individual: 9 Years

  Professional Background

PhD  awarded--------------------------------02

PhD Research Scholar-------------------01

1.Convener/Organizer-2020-Pragmatic role of Technological Innovation in Startup(Govt. sponsored National Seminar)

2.Convener/Organizer-2023-Pragmatic role of Technological Innovation in Startup(Govt. sponsored National Seminar)

Co-ordinator -Start-up training program (one week)- Sponsored by (Govt. of Bihar)

Co-ordinator-ERP cell, BIT Patna

Invited talk

1.   Jamshedpur, Women’s college(National seminar)- Detection of  Computer Viruses using Honeypots, 2017 

2.   BIT, Patna (Workshop DST)----Internet of Things(IoT)--02

 

 

  Research Areas
 

Computer Network Security,Machine learning, Data mining and Internet of Things

  Award and Honours
 

1. UGC,Staff Academic college,R.U,Ranchi---02

  Publications
 

RESEARCH PAPERS         

1.Neeraj Kumar and Upendra Kumar, Comparative Analysis of CN2 Rule induction with other Classification Algorithms for Network Security,Multimedia Tools and Applications-DOI10.1007/s11042-022-13542-,August,2022,pp.37119-37135 SCI Impact factor-2.57

2.Anshuman and Upendra Kumar:Feature Scaling on SVM Classifier for Breast Cancer Detection  with Higher Accuracy:Pharma Times, March-2022,pp:15-22.(Scopus Unpaid)

3. Neeraj Kumar and Upendra Kumar:Artificial intelligence for classification and regression tree based feature selection method for network intrusion detection system in various telecommunication technologies,Journal of Computational Intelligence-Wiley_Published-10 January 2022-https://doi.org/10.1111/coin.12500-10 Jan, 2022 pp. 1-23 SCI-Impact Factor:3.09

4. Neeraj Kumar and Upendra Kumar: Diverse Analysis of Data Mining and MachinLearning Algorithms to Secure Computer Network, Journal of Wireless Personal Communication:-Springer https://doi.org/10.1007/s11277-021-09393-0. - pp.1033-1059-2nd December2021 SCIE-Impact Factor:2.07

 5.Upendra Kumar,Shreyasi  Uphdhyay, Neeraj Kumar,Subhash Chandra Pandey,Isolation of DDoS Attack in IoT : A New Perspective, Wireless Personal Communications,doi.org/10.1007/s11277-020-07486-w,pp.2493-2510,May,2020.(SCIE)-Impact Factor:2.07

6. Neeraj Kumar, Upendra Kumar”” Fuzzy Controlled Network Intrusion Detection System”” I.J of Innovative Technology & Exploring Engineering,,vol-09,No-02,pp-228-235,Dec-2019.( Scopus).

7. Ansuman and Upendra Kumar, Significance of Vedic Science for Artificially Intelligent System, International Journal of Engineering and Technology, pp.1-2, 2018(Scopus Indexed Journal).

8. Anurag, Deeapk Arora, Upendra Kumar,” Privacy Preserving k-means clustering over outsourced data on the cloud platform, Journal of Theoretical and Applied Information Technology, Vol.96, No.3, 2018 pp.3937-3950 (Scopus Indexed Journal).

9. Anurag, Deepak Arora, Upendra Kumar,” UML Based Model for displaying Privacy Preserving Data Mining Systems, ARPN Journal of Engineering and Applied Sciences, Vol. 13, No. 8, April 2018, pp.2957-2963 (Scopus Indexed Journal).

10. Upendra Kumar, Design and Analysis of multicast classification models for rainfall prediction, Research Journal of Computer Science and Information Technology, pp. 23-34, 2018.

11. Anurag, Deepak Arora, Upendra Kumar,” UML Modelling of Securing Sensitive Data by Inference Control Method, International Journal of Soft Computing, Vol.12, Issue 2, MEd well 2017, pp.112-119. (Scopus Indexed Journal).

12. Abhinav Kumar,Sonal Saxena,Upendra Kumar, HyperSpectral Imaging(HSI): Applications in Animal and Diary sector, Journal of Experimental Biology and Agricultural Sciences,  ISSN No 2320-8694,pp.448-461,30 June-2016 (Scopus Indexed  Journal).

13.Vandana Bharti, Abhinav Kumar, Upendra Kumar , . Hyperspectral imaging:  A potential tool for monitoring crop infestation, crop yield and macronutrient analysis with special emphasis to oil seed Brassica,7(2), PP. 113-125, May 2016. (Scopus Indexed Journal).

14. Upendra Kumar and Priyamvada, New Traceback detection mechanism to detect Spoofed IP packets, International journal of Integrated Computer applications and research, ISSN 2395-4310, pp. 1-5, 2016.

15. Arpita Narayan and Upendra Kumar, A Defence Mechanism: DNS based DDoS attack, international journal of Computer trends and Technology, pp1-6, March 2016.

16.  Prity Kumari, Upendra Kumar and Shyam Krishna Singh, Dual Layer Video Encryption using RSA and ECC algorithm, International Journal of Scientific and Research publication, pp. 620-625, July 2016.

17. Ankita and Upendra Kumar, Job Scheduling in Grid Environment, International Journal of Computer system, pp319-324, 2016.

18. Upendra Kumar, Intrusion Detection Algorithm for data security, I J of Computer trends & Technology pp. 157-160, Nov, 2015

19. Upendra Kumar, Bimal Kumar Mishra,G.Sahoo: Double Sticky Honeypot for defending viruses in Computer network.IJ of Soft Computing, pp.131-134,  July-2012.(Scopus)

20. Upendra Kumar, G.sahoo, Effect of malicious code  using honeypot in computer network, I.J Sc,Engg & Mgt, pp.23-28, June 2013.

21.Upendra Kumar, Bimal Kumar Mishra, G.Sahoo: An E-Epidemic model for developing a defence mechanism in computer network, I.J of Networking & Communication Engg..pp. 433-435, April, 2011.(Scopus)

22.Upendra Kumar,Stochastic model on computer virus, I.J of System Signal control and Engg Apps,  pp.74-79, June,2011.(Scopus)

23. Upendra Kumar, Bimal Kumar Mishra,G.Sahoo: Defending the transmission of viruses in computer network using Directed graph, I.J of Modelling Simulation and application.pp.339--407, Dec, 2011.

24. Upendra Kumar, Bimal Kumar Mishra,G.Sahoo:Fixed length of Infective Period for attacking worms in computer network,I.J of Applied Engg Research and Development, pp.19-31, June-2012.

25. Upendra Kumar, Bimal Kr. Mishra,G.sahoo: Defending polymorphic worms using honeynet in computer network..J of  Engg Sc and Technology,  pp.1408-1411,  June-2012.

26. Upendra Kumar, Bimal Kumar Mishra,G.Sahoo: Double Sticky Honeypot for defending viruses in Computer network. I.J of Soft Computing, pp.131-134, July-2012.

27. Upendra Kumar, Effect of malicious code using honeypot in computer network,I.J Sc,Engg & Mgt, pp.23-28, June 2013.

Proceedings:      

  1.  Upendra Kumar, Security Amplification of IoT : BlockChain :Advances in Information Communication Technology and    Computing:Proceedings of AICTC 2021 ISBN 978-981-19-0618-3,https://doi.org/10.1007/978-981-19-0619-0 May  2022, pp 273-288.
  2. Anshuman, Upendra Kumar: Machine Learning model for detection of Breast Cancer, 5th International Conference on  Information   Systems and Computer    Networks (ISCON),10.1109/ISCON52037.2021.9702514, Publisher: IEEE, 2022.
  3. Anshuman, Upendra Kumar: Machine Learning model for detection of Breast Cancer, 5th International Conference on  Information   Systems and Computer    Networks (ISCON),10.1109/ISCON52037.2021.9702514,Publisher:IEEE, 2022.
  1. .Prity kumara,Upendra Kumar, Shyam Krishna Singh:Schnorr Digital Signature to Improve Security Using Quantum Cryptography  Innovations in Soft Computing and Information Technology, Springer https://doi.org/10.1007/978-981-13-3185-5_7;PP 69-79, 2019
  1. Anurag, Deepak Arora, Upendra Kumar,” Securing Sensitive Data information through Multiplicative Perturbation approach based on UML Modelling,, Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, Vol 563. Springer, Singapore, pp.267-279, 2018. 
  1. Neeraj Kumar and Upendra Kumar, Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques, proceedings Springer publications, pp.262-269, 2018.
  1.  Anurag, Deeapk Arora, Upendra kumar,” UML Model for Protecting Sensitive information based on Data Perturbation Approach”, INDIAcom,IEEE Delhi ,1-3 March 2017.
  2.   Upendra Kumar and Samir Kumar Pandey, Dynamic Models on DDoS Attack in computer network, Article 17, ACM conference, ISBN 978-1-4503-4756-3, 2016. 
  3. Anurag, Deepak Arora, Upendra Kumar,”Protection of sensitive  Warehouse Data though UML Modelling”,In Proceeding of International Conference on Informtion and Analytics, ISBN number-978-01-4503-4756-3 ,ACM Conference, Pondicherry, 25-26 August 2016,pp.1-6
  4. Upendra Kumar, A Dynamic model on Computer Virus, Recent Advances in Mathematics, Statistics and Computer Sciences, World Scientific press, pp.504-510 ,2016
  5.  Upendra Kumar, Effect of Honeypots on Polymorphic Worms in Computer Network.  Narosa Publication, ISBN: 978-81-8487-391-7.PP 123-128. Sep, 2014.
  6. Upendra Kumar, Bimal Kumar Mishra,G.Sahoo.Spread and Control of worms using undirected graph.with ISBN:978-93-800697-54-4,  pp.394-400, Feb, 2012.
  7.  Upendra Kumar, Bimal Kumar Mishra,G.Sahoo Defending Computer worms: A Mathematical model.with ISBN:978-93-800697-54-3, pp.183-186, Jan, 2011.

 

Book Chapters

  1.  Tenable Irrigation system with Internet of Thing  Upendra Kumar,Smita Pallavi  and Pranjal Pandeys, CRC Press,DOI https://doi.org/10.1201/9780429289057,pp-,July,2020.
  2. Security Issues of Internet of Things in Health-Care Sector: An Analytical Approach Pranjal Pandey, Subhash Chandra Pandey and Upendra Kumar, Springer,pp 307-329,March 2020.
  3. Knowledge Computational Intelligence in Network Intrusion Detection Systems Neeraj Kumar and Upendra Kuma,Knowledge   Computing and Its Applications, https://doi.org/10.1007/978-981-10-6680-1_8/..pp.161-176

Paper presented in National & International Conferences:  13

 


 

 

  Current Sponsored Projects
 

Co-ordinator Start-ups project,( Govts of Bihar )

Mentor startup project approved by Govts of Bihar

  Text and Reference Books
 
  Intellectual Property Rights (IPR)
 

Upendra Kumar,SC Pandey and Neeraj Kumar:  A System and a Method for Isolation of Distributed Denial of Service Attack in Internet of Things, Australian Innovation Patent : 2021102419,2022