Name: | Dr. Bipin Bihari Jaya Singh |
|
Staff Id : | CVRITF006 | |
Designation : | Professor & HoD | |
Qualification : | M.Tech. PhD | |
Subjects Interested: | Security & Forensics, Data Mining, Cloud Computing | |
Research Area : | Security & Forensics | |
Date of Joining : | 26-6-2006 | |
Date of Birth : | ||
Contact Email: [email protected] Mobile No: 9440476544 | ||
Address for Communication: CVR College of Engineering, Mangalpalli | ||
Experience: Teaching: Industry: Research: | ||
Publications list with counts (journal/conference/books) | 60 | |
Publications list (journal/conference/books) 19. List of Research Papers: 61 (Int. Journal-11, Int. Conference -20, National Journal-10, National Conference -20) [1] B. B. Jayasingh, M. R. Patra, P. K. Sastry, An Agent based Architecture for Cyber Forensics, in proceedings of the 5th International Conference on Information Technology (CIT 2002), Bhubaneswar, India, Dec. 21-24, 2002, pp. 311-314. [2] B. B. Jayasingh, M. R. Patra, P. K. Sastry, R. K. Jain, Designing A Specialist Agent For Intrusion Detection � A Tool For Cyber Forensics, in proceedings of the 14th All India Forensic Science Conference, Mumbai, India, Jan. 6-8, 2003, pp. 86. [3] B. B. Jayasingh, M. R. Patra, Cyber Crime-An Overview, in proceedings of the National Workshop on Internet and E-Security, Paralakhemundi, India, March 15-16, 2003. [4] B. B. Jayasingh, M. R. Patra, An Intelligent Agent based Approach for Secured Web Services, in proceedings of the International Conference on Information Technology : Prospects and Challenges 2003 (ITPC- 2003), Kathamandu, Nepal, May 23-26,2003, pp. 152-159. [5] B. B. Jayasingh, M. R. Patra, Distributed Agents framework for Network Security-A Case Study of an Attack, in Web Proceedings of the 10th international Conference on High Performance Computing (HIPC 2003), Hyderabad, India, Dec 17-20, 2003, No. 15. [6] B. B. Jayasingh, M. R. Patra, R. K. Jain, A Framework of Specialist Agents For Network Security, in proceedings of the 6th International Conference on Information Technology (CIT 2003), Bhubaneswar, India, Dec. 21-25, 2003, pp. 592-593. [7] B. B. Jayasingh, M. R. Patra, R. K. Jain, Analysis Of ICMP Attack For Intrusion Detection, in proceedings of the 15th All India Forensic Science Conference, karnal, India, Jan. 16-18, 2004, pp. 50. [8] B. B. Jayasingh, M. R. Patra, R. K. Jain, Ch. Gandhi, An Intelligent Agent Based Intrusion Detection For RIP Attack, in proceedings of the 15th All India Forensic Science Conference, karnal, India, Jan. 16-18, 2004, pp. 49. [9] S. Satpathy, R. K. Jain, B. B. Jayasingh, Application of Neural network in Network Forensics, in proceedings of the 15th All India Forensic Science Conference, karnal, India, Jan. 16-18, 2004, pp. 51. [10] B. B. Jayasingh, M. R. Patra, R. K. Jain, Ch. Gandhi, A Distributed Framework For Crime Detection In Cyber Space, in proceedings of the 35th all India police science conference, Jalandhar, india, May 24-26, 2004, pp.11-22. [11] B. B. Jayasingh, M. R. Patra, A Software Agent Based Approach For Fraud Detection In Network Crimes, in proceedings of the Asian Applied Computing Conference ( AACC 2004), LNCS 3285� Springer-Verlag Berlin Heidelberg Publication, Kathamandu, Nepal, Oct. 29-31, 2004, pp. 310-316. (DBLP indexed) [12] B. B. Jayasingh, M. R. Patra, Ch. Gandhi, Realtime Evidence Collection for Internet Intrusions, in proceedings of the 16th All India Forensic Science Conference, Hyderabad, India, Dec. 8-9, 2004, pp.375-384. [13] B. B. Jayasingh, M. R. Patra, Ch. Gandhi, A Multiagent based defense mechanism for internet intrusions, in proceedings of the 1st International Conference on emerging Technology (ICET 2004), Bhubaneswar, India, Dec 22-24, 2004, pp. 229-238. [14] B. B. Jayasingh, M. R. Patra, Ch. Gandhi, N. Singh, Evidence Aggregation For Cyber Forensics, in proceedings of the 17th All India Forensic Science Conference, Raipur, Chhatisgarh, India, Nov. 9-11, 2005, pp.189-193. [15] B. B. Jayasingh, Cyber Forensics- A Case Study, in proceedings of the Young Scientist Award in 93rd Indian Science Congress, Hyderabad, India, Jan. 3-7, 2006, pp.38. [16] B. B. Jayasingh, M. R. Patra, Secured Web Services through Forensic Computing, in proceedings of the International Conference On Remote sensing and Geo-informatics (ICORG 2006), Hyderabad, India, June. 5-8, 2006, pp.35. [17] B. B. Jayasingh, M. R. Patra, Agents as Ingredient for Forensic Computing �A Network Security Approach, in proceedings of the 41st Annual National Convention of Computer Society of India(CSI-2006), Kolkata, India, Nov. 23-25, 2006, pp.71-75. [18] B. B. Jayasingh, Evidence Warehouse for Forensic Investigation of Cyber Attacks, in proceedings of the 94th Indian Science Congress, Annamalai University, Tamilnadu, India, Jan. 3-7, 2007, pp. 10-11. [19] B. B. Jayasingh, M. R. Patra, Evidence Mining From Agent Log For Forensic Investigation, in proceedings of the 18th All India Forensic Science Conference, Kolkata, India, January 2007, pp. 343-350. [20] B. B. Jayasingh, M. R. Patra, Agent Based Cyber Forensics � a Decision Tree Approach for Security Threats, in proceedings of 1st International Conference on Network Security (ICONS-2007), Erode, Tamilnadu, India, January 29-31, 2007, pp. 395-404. [21] B. B. Jayasingh, M. R. Patra, Rule Based Evidence Mining for Network Attack, in proceedings of the 10th International Conference on Information Technology (ICIT 2007),0-7695-3068-0/07@2007 IEEE Computer Society Publication, Rourkela, India, Dec. 17-20, 2007, DOI. 10.1109/ICIT.2007.47, pp. 23-28. (DBLP indexed) [22] B. B. Jayasingh, M. R. Patra, S. Mallick, Forensic Investigation through Rule based Evidence Mining, in proceedings of the 95th Indian Science Congress, Andhra University, Vishakhapatnam, India, Jan. 3-7th, 2008, pp. 3-4. [23] B. B. Jayasingh, Cyber Forensics-An Emerging Trend towards Archiving Evidence on ICMP Attack, in proceedings of the International Conference on Emerging Technologies and Applications in Engineering, Technology and Sciences (ICETAETS-2008), ISBN: 978-81-906220-1-1, Saurashtra University, Rajkot, Gujarat (India), jan. 13-14th, 2008, pp. 1803-1807. [24] B. B. Jayasingh, M. Mary Jyothsna Rani, Y.R. Kiran, Deepak J. Lalwani, Jest Editor � An Enhanced Version of Jedit for Java Programming Language, in proceedings of the national conference on Data Engineering and Intelligent Systems (DEIS2008), Sagar Institute of Research & Technology, Bhopal, in collaboration with CSI Bhopal & IETE Bhopal, 7-8th March 2008. [25] B. B. Jayasingh, Praveen G.C., B. Pradeep, A Framework of Network Forensic Investigation System, in proceedings of the national conference on Recent Trends in Information & Communication Technology (RTICT-2008), Bannari Amman Institute of Technology, Sathyamangalam, Tamilnadu(India), March 17-18th, 2008. [26] B. B. Jayasingh, M. Divya, K. Divyasree, Handout Procedure of Incident Handling and Attack Assessment, in proceedings of the national conference on Recent Trends in Information & Communication Technology (RTICT-2008), Bannari Amman Institute of Technology, Sathyamangalam, Tamilnadu(India), March 17-18th, 2008. [27] B. B. Jayasingh, M. R. Patra, Ontological Model of Military Issues in Cyber Forensics, published in the IETECH Journal of Information Systems, India, ISSN: 0973-8096, Vol. 2: No. 2, 2008, pp. 105-110. [28] B. B. Jayasingh, Forensic Computing � The Investigation of Network Security Dome, published in the International Journal of Computer Applications in Engineering, Technology and Sciences (IJ_CA_ETS), India, ISSN: 0974-3596, Volume 1, Issue 1, October 2008 - March 2009, pp. 112-121. [29] B. B. Jayasingh, Agents at Work in the Evidence Aggregation Model of Cyber Forensics, in proceedings of the International Conference on Intelligent Systems and Networks (IISN-2009), Institute of Science Technology, Klawad, Haryana, India, February 14-16, 2009, pp. 301-305. [30] B. B. Jayasingh, Evidence Aggregation of ARP Spoofing Attack, published in the International Journal of Computer Applications in Engineering, Technology and Sciences (IJ_CA_ETS), India, ISSN: 0974-3596, Volume 1, Issue 2, April - September 2009, pp.623-627. [31] B. B. Jayasingh, G. Vikas, Denial of Log Manipulation System-An Evidentiary Approach, published in the International Journal of Computer Applications in Engineering, Technology and Sciences (IJ_CA_ETS), India, ISSN: 0974-3596, Volume 2, Issue 2, October 09 � March 2010, pp. 536-539. [32] B. B. Jayasingh, B. Swathi, A Novel Metric for Detection of Jellyfish Reorder Attack on Ad Hoc Network, published in the BVICAM's International Journal of Information Technology (BIJIT), ISSN: 0973-5658, Vol. 2 No. 1, January-June, 2010, pp. 15-19. [33] B. B. Jayasingh, M. Sunitha, Handling and Log Exploitation to Seize Evidence, published in proceedings of the 97th Indian Science Congress, Kerala University, Thiruvananthapuram, India, Jan. 3-7th, 2010, pp.54-55. [34] B. B. Jayasingh, M. Sunitha, Detection of DNS Cache Poisoning Attack on Web, published in proceedings of the 97th Indian Science Congress, Kerala University, Thiruvananthapuram, India, Jan. 3-7th, 2010, pp. 55. [35] M. R. Patra, B. B. Jayasingh, P. K. Sahoo, Policy Based Virtual Private Network, in proceedings of the International Conference on Emerging Trends in Computer Science, Communication and Information Technology (CSCIT2010),Yeshwant Mahavidyalaya, Nanded, Maharashtra, India, Jan. 9th -11th, 2010, pp. 537. [36] R Baliarsingh, G. Jena, P. K. Sahoo, M. R. Patra, B. B. Jayasingh, Enhanced Security to Virtual Private Network Logs, in proceedings of the 3rd CSI National Conference on Education and Research (ConfER 2010), Jaypee Institute of Engineering and Technology, Guna, Madhya Pradesh, India, March 6th -7th, 2010, pp. 214-221. [37] S. Mallick, Mahil Carr, B. B. Jayasingh, Alternative Generation for Personal Expenditure Tracking (PET), published in International Journal Of Computer Applications In Engineering, Technology And Sciences (IJ-CA-ETS), ISSN: 0974-3596, Volume 3, Issue 2,April-October 2011, pp. 56-61. [38] Dr. R. K. Chottray, Dr. Gunamani Jena, P. K. Sahoo, Dr. B. B. Jayasingh, Security- A Vital Requisite for the Modern Era, published in International Journal Of Computer Applications In Engineering, Technology And Sciences (IJ-CA-ETS), ISSN: 0974-3596, Volume 3, Issue 2,April-October 2011, pp. 85-90. [39] B. B. Jayasingh, forensic systems engineering, published in CVR Journal of Science and Technology, ISSN: 2277-3916, vol. no: 1, October 2011, pp. 66-71. [40] B. B. Jayasingh, S. Mallick, Next Generation Network-A study on QOS Mechanisms, published in CVR Journal of Science and Technology, ISSN: 2277-3916, vol. no: 2, June 2012, pp.70-75. [41] B. B. Jayasingh, S. Mallick, Minimization of Backbone Nodes in Wireless Mobile Backbone Networks using Approximation Algorithms, published in the CVR Journal of Science and Technology, ISSN: 2277-3916, vol. no: 3, Dec. 2012, pp. 74-77. [42] B. B. Jayasingh, B. Rama Mohan, Software Quality assurance Through Fuzzy Logarithmic Least Squares Method, published in the International Journal of Computing, Intelligent and Communication Technologies (IJCICT), Volume 2, Issue 1, ISSN: 2319-748X, www.ijcict.com, January 2013, pp: 16-20. [43] B. B. Jayasingh, B. Rama Mohan, A Survey on Software Quality Assurance Techniques, published in the International Journal of Information Technology & Systems (IJITS), Vol. 1; No. 2: ISSN: 2277-9825, www.gtia.co.in, Jan-June 2013, pp. 49-57. [44] B. B. Jayasingh, B. Rama Mohan, Software Quality Estimation Through Analytic Hierarcy Process Approach, published in the CVR Journal of Science and Technology, ISSN: 2277-3916, vol. no: 4, June 2013, pp. 80-86. [45] B. B. Jayasingh, S. Mallick, A study on skyline analysis of Nominal attributes, published in proceedings of the International Conference on Innovations in Computer Science & Engineering (ICICSE 2013), Guru Nanak Institutions, Hyderabad, 20-21st September 2013, pp. 231-235. [46] B. B. Jayasingh, Sri Datta V., N. S. Pranav, Expert Rating Based Software Quality Evaluation, published in the International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, vol. 2 Issue 10, October 2013, pp. 1269-1275 (DRJI indexed). [47] B. B. Jayasingh, N. Sateesh, Determining the most Significant factors in classifying a Web site-Users Perspective, published in the CVR Journal of Science and Technology, ISSN: 2277-3916, vol. no: 5, Dec. 2013, pp. 78-82. [48] S. Mallick, B. B. Jayasingh, Detection of Black-hole Attack in Adhoc Networks, published in proceedings of the International Conference on Innovations in Computer Science & Engineering (ICICSE 2014), ISBN:978-93-82163-44-2, Guru Nanak Institutions, Hyderabad, 8-9th August 2014, pp. 120-125. [49] B. B. Jayasingh, A. Mounika, K. Pranavi, S. Mallick, Location based skyline Queries on Uncertain Database, published in proceedings of the International Conference on Innovations in Computer Science & Engineering (ICICSE 2014), ISBN:978-93-82163-44-2, Guru Nanak Institutions, Hyderabad, 8-9th August 2014, pp. 373-378. [50] B. B. Jayasingh, Classroom Learning Model-Know Your Learner, published in proceedings of the Second International Conference on Transformations in Engineering Education (ICTIEE-2015), eISSN: 2394-1707@ 2015 ICTIEE 2015 Organisers, BMS College of Engineering, Bangalore, 5-8th Jan. 2015, pp. 407-412. [51] B. B. Jayasingh, Classroom Learning Model-Know Your Learner, published in the Journal of Engineering Education Transformations, ISSN 2349-2473, Volume 28, No. 2&3, Oct. 2014 & Jan. 2015, pp. 30-36. [52] B. B. Jayasingh, Web Surfer Tracking using Big Data Technologies, published in CVR Journal of Science and Technology, ISSN: 2277-3916, vol. no: 8, June 2015, pp.65-68. [53] B. B. Jayasingh, D. Hari Priya, R. Karthik, Forensic Analysis of Crime Scenario in Social Networking Website, in proceedings of the National Conference on Information Security (NCIS-2015), Chaitanya Bharathi Institute of Technology, Hyderabad, 26th -27th Aug. 2015, pp. 20. [54] B. B. Jayasingh, A Data Mining Approach to Inquiry Based Inductive Learning Practices in Engineering Education, 6th IEEE International Advance Computing Conference (IACC 2016), IEEE Xplore Computer Society, SRKR Engineering College, Bhimavaram, February 27-28, 2016, DOI 10.1109/IACC.2016.161, pp.845-850. [55] Dr. B. B. Jayasingh, H. Kumar, G. Aishwarya, Inquiry Based Inductive Learning Practices In Engineering Education-A Classroom Study, 4th IEEE International Conference on Moocs, Innovation And Technology In Education (Mite'16) at Thiagarajar College Of Engineering, Madurai On December 9 & 10, 2016, IEEE Xplore Computer Society, DOI 10.1109/MITE.2016.53, pp.60-65. . [56] B. B. Jayasingh, M. R. Patra, S. Mallick, Levelwise Filtration System For Forensic Analysis Of Social Networking, in the 2nd International Conference on Contemporary Computing and Informatics (IC3I 2016) held in Amity University, Noida, India from 14 - 17 December 2016, IEEE Xplore digital library, DOI 978-1- 5090-5256-1/16, pp.205-210. [57] B. B. Jayasingh, M. R. Patra, D. Bhanu Mahesh, Security Issues and Challenges Of Big Data Analytics and Visualization, in the 2nd International Conference on Contemporary Computing and Informatics (IC3I 2016) held in Amity University, Noida, India from 14 - 17 December 2016, IEEE Xplore digital library, DOI 978-1- 5090-5256-1/16, pp.216-221. [58] S. Jyoshna, B. B. Jayasingh, Dynamic load balancing in cloud using extended hungarian method, published in the CVR Journal of Science and Technology, ISSN: 2277-3916, vol. no: 11, Dec. 2016, pp. 77-80. [59] B. B. Jayasingh, DNS Cache Poisoning Attack Analysis and Detection using Packet Header, published in the CVR Journal of Science and Technology, ISSN: 2277- 3916, vol. no: 12, June 2017, pp. 77-80. [60] B. B. Jayasingh, A Study Towards Post Hoc Forensic Analysis Using Big Data Analytics, Accepted in the CVR Journal of Science and Technology, ISSN: 2277-3916, vol. no: 14, June 2018, pp. . [61] Sengathir Janakiraman, B. B. Jayasingh, A Hyper-Exponential Factor-based Semi-Markov Prediction Mechanism for Selfish Rendezvous nodes in MANETs, submitte in the Wireless Personal Communications journal-SCI Indexed, Jan. 2018. | ||
Mention Scopus/SCI Journals National: 10 International: 11 | ||
Awards /Honours / Memberships: | ||
Projects Guided: B.Tech: 20 M.Tech: 4 | ||
Other Research Projects: | ||
Subject Materials: | ||
Links/ppt/pdf formats | ||
other website links to follow (like researchgate, google scholar) |