1.Neeraj Kumar and Upendra Kumar, Comparative Analysis of CN2 Rule induction with other Classification Algorithms for Network Security,Multimedia Tools and Applications-DOI10.1007/s11042-022-13542-,August,2022,pp.37119-37135 SCI Impact factor-2.57
5.Upendra Kumar,Shreyasi Uphdhyay, Neeraj Kumar,Subhash Chandra Pandey,Isolation of DDoS Attack in IoT : A New Perspective, Wireless Personal Communications,doi.org/10.1007/s11277-020-07486-w,pp.2493-2510,May,2020.(SCIE)-Impact Factor:2.07
6. Neeraj Kumar, Upendra Kumar”” Fuzzy Controlled Network Intrusion Detection System”” I.J of Innovative Technology & Exploring Engineering,,vol-09,No-02,pp-228-235,Dec-2019.( Scopus).
7. Ansuman and Upendra Kumar, Significance of Vedic Science for Artificially Intelligent System, International Journal of Engineering and Technology, pp.1-2, 2018(Scopus Indexed Journal).
8. Anurag, Deeapk Arora, Upendra Kumar,” Privacy Preserving k-means clustering over outsourced data on the cloud platform”, Journal of Theoretical and Applied Information Technology, Vol.96, No.3, 2018 pp.3937-3950 (Scopus Indexed Journal).
9. Anurag, Deepak Arora, Upendra Kumar,” UML Based Model for displaying Privacy Preserving Data Mining Systems”, ARPN Journal of Engineering and Applied Sciences, Vol. 13, No. 8, April 2018, pp.2957-2963 (Scopus Indexed Journal).
10. Upendra Kumar, Design and Analysis of multicast classification models for rainfall prediction, Research Journal of Computer Science and Information Technology, pp. 23-34, 2018.
11. Anurag, Deepak Arora, Upendra Kumar,” UML Modelling of Securing Sensitive Data by Inference Control Method”, International Journal of Soft Computing, Vol.12, Issue 2, MEd well 2017, pp.112-119. (Scopus Indexed Journal).
12. Abhinav Kumar,Sonal Saxena,Upendra Kumar, HyperSpectral Imaging(HSI): Applications in Animal and Diary sector, Journal of Experimental Biology and Agricultural Sciences, ISSN No 2320-8694,pp.448-461,30 June-2016 (Scopus Indexed Journal).
13.Vandana Bharti, Abhinav Kumar, Upendra Kumar , . Hyperspectral imaging: A potential tool for monitoring crop infestation, crop yield and macronutrient analysis with special emphasis to oil seed Brassica,7(2), PP. 113-125, May 2016. (Scopus Indexed Journal).
14. Upendra Kumar and Priyamvada, New Traceback detection mechanism to detect Spoofed IP packets, International journal of Integrated Computer applications and research, ISSN 2395-4310, pp. 1-5, 2016.
15. Arpita Narayan and Upendra Kumar, A Defence Mechanism: DNS based DDoS attack, international journal of Computer trends and Technology, pp1-6, March 2016.
16. Prity Kumari, Upendra Kumar and Shyam Krishna Singh, Dual Layer Video Encryption using RSA and ECC algorithm, International Journal of Scientific and Research publication, pp. 620-625, July 2016.
17. Ankita and Upendra Kumar, Job Scheduling in Grid Environment, International Journal of Computer system, pp319-324, 2016.
18. Upendra Kumar, Intrusion Detection Algorithm for data security, I J of Computer trends & Technology pp. 157-160, Nov, 2015
19. Upendra Kumar, Bimal Kumar Mishra,G.Sahoo: Double Sticky Honeypot for defending viruses in Computer network.IJ of Soft Computing, pp.131-134, July-2012.(Scopus)
20. Upendra Kumar, G.sahoo, Effect of malicious code using honeypot in computer network, I.J Sc,Engg & Mgt, pp.23-28, June 2013.
21.Upendra Kumar, Bimal Kumar Mishra, G.Sahoo: An E-Epidemic model for developing a defence mechanism in computer network, I.J of Networking & Communication Engg..pp. 433-435, April, 2011.(Scopus)
22.Upendra Kumar,Stochastic model on computer virus, I.J of System Signal control and Engg Apps, pp.74-79, June,2011.(Scopus)
23. Upendra Kumar, Bimal Kumar Mishra,G.Sahoo: Defending the transmission of viruses in computer network using Directed graph, I.J of Modelling Simulation and application.pp.339--407, Dec, 2011.
24. Upendra Kumar, Bimal Kumar Mishra,G.Sahoo:Fixed length of Infective Period for attacking worms in computer network,I.J of Applied Engg Research and Development, pp.19-31, June-2012.
25. Upendra Kumar, Bimal Kr. Mishra,G.sahoo: Defending polymorphic worms using honeynet in computer network..J of Engg Sc and Technology, pp.1408-1411, June-2012.
26. Upendra Kumar, Bimal Kumar Mishra,G.Sahoo: Double Sticky Honeypot for defending viruses in Computer network. I.J of Soft Computing, pp.131-134, July-2012.
27. Upendra Kumar, Effect of malicious code using honeypot in computer network,I.J Sc,Engg & Mgt, pp.23-28, June 2013.
Proceedings:
- Upendra Kumar, Security Amplification of IoT : BlockChain :Advances in Information Communication Technology and Computing:Proceedings of AICTC 2021 ISBN 978-981-19-0618-3,https://doi.org/10.1007/978-981-19-0619-0 May 2022, pp 273-288.
- Anshuman, Upendra Kumar: Machine Learning model for detection of Breast Cancer, 5th International Conference on Information Systems and Computer Networks (ISCON),10.1109/ISCON52037.2021.9702514, Publisher: IEEE, 2022.
- Anshuman, Upendra Kumar: Machine Learning model for detection of Breast Cancer, 5th International Conference on Information Systems and Computer Networks (ISCON),10.1109/ISCON52037.2021.9702514,Publisher:IEEE, 2022.
- .Prity kumara,Upendra Kumar, Shyam Krishna Singh:Schnorr Digital Signature to Improve Security Using Quantum Cryptography Innovations in Soft Computing and Information Technology, Springer https://doi.org/10.1007/978-981-13-3185-5_7;PP 69-79, 2019
- Anurag, Deepak Arora, Upendra Kumar,” Securing Sensitive Data information through Multiplicative Perturbation approach based on UML Modelling,”, Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, Vol 563. Springer, Singapore, pp.267-279, 2018.
- Neeraj Kumar and Upendra Kumar, Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques, proceedings Springer publications, pp.262-269, 2018.
- Anurag, Deeapk Arora, Upendra kumar,” UML Model for Protecting Sensitive information based on Data Perturbation Approach”, INDIAcom,IEEE Delhi ,1-3 March 2017.
- Upendra Kumar and Samir Kumar Pandey, Dynamic Models on DDoS Attack in computer network, Article 17, ACM conference, ISBN 978-1-4503-4756-3, 2016.
- Anurag, Deepak Arora, Upendra Kumar,”Protection of sensitive Warehouse Data though UML Modelling”,In Proceeding of International Conference on Informtion and Analytics, ISBN number-978-01-4503-4756-3 ,ACM Conference, Pondicherry, 25-26 August 2016,pp.1-6
- Upendra Kumar, A Dynamic model on Computer Virus, Recent Advances in Mathematics, Statistics and Computer Sciences, World Scientific press, pp.504-510 ,2016
- Upendra Kumar, Effect of Honeypots on Polymorphic Worms in Computer Network. Narosa Publication, ISBN: 978-81-8487-391-7.PP 123-128. Sep, 2014.
- Upendra Kumar, Bimal Kumar Mishra,G.Sahoo.Spread and Control of worms using undirected graph.with ISBN:978-93-800697-54-4, pp.394-400, Feb, 2012.
- Upendra Kumar, Bimal Kumar Mishra,G.Sahoo Defending Computer worms: A Mathematical model.with ISBN:978-93-800697-54-3, pp.183-186, Jan, 2011.
Book Chapters
- Tenable Irrigation system with Internet of Thing Upendra Kumar,Smita Pallavi and Pranjal Pandeys, CRC Press,DOI https://doi.org/10.1201/9780429289057,pp-,July,2020.
- Security Issues of Internet of Things in Health-Care Sector: An Analytical Approach Pranjal Pandey, Subhash Chandra Pandey and Upendra Kumar, Springer,pp 307-329,March 2020.
- Knowledge Computational Intelligence in Network Intrusion Detection Systems Neeraj Kumar and Upendra Kuma,Knowledge Computing and Its Applications, https://doi.org/10.1007/978-981-10-6680-1_8/..pp.161-176
Paper presented in National & International Conferences: 13