[1] B. B. Jayasingh, M. R. Patra, P. K. Sastry, An Agent
based Architecture for Cyber Forensics, in proceedings of
the 5th International Conference on Information Technology
(CIT 2002), Bhubaneswar, India, Dec. 21-24, 2002, pp.
311-314.
[2] B. B. Jayasingh, M. R. Patra, P. K. Sastry,
R. K. Jain, Designing A Specialist Agent For Intrusion
Detection � A Tool For Cyber Forensics, in proceedings of
the 14th All India Forensic Science Conference, Mumbai,
India, Jan. 6-8, 2003, pp. 86.
[3] B. B. Jayasingh, M. R. Patra, Cyber Crime-An
Overview, in proceedings of the National Workshop on
Internet and E-Security, Paralakhemundi, India, March 15-16,
2003.
[4] B. B. Jayasingh, M. R. Patra, An Intelligent
Agent based Approach for Secured Web Services, in
proceedings of the International Conference on Information
Technology : Prospects and Challenges 2003 (ITPC- 2003),
Kathamandu, Nepal, May 23-26,2003, pp. 152-159.
[5] B. B. Jayasingh, M. R. Patra, Distributed
Agents framework for Network Security-A Case Study of an
Attack, in Web Proceedings of the 10th international
Conference on High Performance Computing (HIPC 2003),
Hyderabad, India, Dec 17-20, 2003, No. 15.
[6] B. B. Jayasingh, M. R. Patra, R. K. Jain, A
Framework of Specialist Agents For Network Security, in
proceedings of the 6th International Conference on
Information Technology (CIT 2003), Bhubaneswar, India, Dec.
21-25, 2003, pp. 592-593.
[7] B. B. Jayasingh, M. R. Patra, R. K. Jain,
Analysis Of ICMP Attack For Intrusion Detection, in
proceedings of the 15th All India Forensic Science
Conference, karnal, India, Jan. 16-18, 2004, pp. 50.
[8] B. B. Jayasingh, M. R. Patra, R. K. Jain,
Ch. Gandhi, An Intelligent Agent Based Intrusion Detection
For RIP Attack, in proceedings of the 15th All India
Forensic Science Conference, karnal, India, Jan. 16-18,
2004, pp. 49.
[9] S. Satpathy, R. K. Jain, B. B. Jayasingh,
Application of Neural network in Network Forensics, in
proceedings of the 15th All India Forensic Science
Conference, karnal, India, Jan. 16-18, 2004, pp. 51.
[10] B. B. Jayasingh, M. R. Patra, R. K. Jain,
Ch. Gandhi, A Distributed Framework For Crime Detection In
Cyber Space, in proceedings of the 35th all India police
science conference, Jalandhar, india, May 24-26, 2004,
pp.11-22.
[11] B. B. Jayasingh, M. R. Patra, A Software
Agent Based Approach For Fraud Detection In Network Crimes,
in proceedings of the Asian Applied Computing Conference (
AACC 2004), LNCS 3285� Springer-Verlag Berlin Heidelberg
Publication, Kathamandu, Nepal, Oct. 29-31, 2004, pp.
310-316. (DBLP indexed)
[12] B. B. Jayasingh, M. R. Patra, Ch. Gandhi,
Realtime Evidence Collection for Internet Intrusions, in
proceedings of the 16th All India Forensic Science
Conference, Hyderabad, India, Dec. 8-9, 2004, pp.375-384.
[13] B. B. Jayasingh, M. R. Patra, Ch. Gandhi, A
Multiagent based defense mechanism for internet intrusions,
in proceedings of the 1st International Conference on
emerging Technology (ICET 2004), Bhubaneswar, India, Dec
22-24, 2004, pp. 229-238.
[14] B. B. Jayasingh, M. R. Patra, Ch. Gandhi,
N. Singh, Evidence Aggregation For Cyber Forensics, in
proceedings of the 17th All India Forensic Science
Conference, Raipur, Chhatisgarh, India, Nov. 9-11, 2005,
pp.189-193.
[15] B. B. Jayasingh, Cyber Forensics- A Case
Study, in proceedings of the Young Scientist Award in 93rd
Indian Science Congress, Hyderabad, India, Jan. 3-7, 2006,
pp.38.
[16] B. B. Jayasingh, M. R. Patra, Secured Web
Services through Forensic Computing, in proceedings of the
International Conference On Remote sensing and
Geo-informatics (ICORG 2006), Hyderabad, India, June. 5-8,
2006, pp.35.
[17] B. B. Jayasingh, M. R. Patra, Agents as
Ingredient for Forensic Computing �A Network Security
Approach, in proceedings of the 41st Annual National
Convention of Computer Society of India(CSI-2006), Kolkata,
India, Nov. 23-25, 2006, pp.71-75.
[18] B. B. Jayasingh, Evidence Warehouse for
Forensic Investigation of Cyber Attacks, in proceedings of
the 94th Indian Science Congress, Annamalai University,
Tamilnadu, India, Jan. 3-7, 2007, pp. 10-11.
[19] B. B. Jayasingh, M. R. Patra, Evidence
Mining From Agent Log For Forensic Investigation, in
proceedings of the 18th All India Forensic Science
Conference, Kolkata, India, January 2007, pp. 343-350.
[20] B. B. Jayasingh, M. R. Patra, Agent Based
Cyber Forensics � a Decision Tree Approach for Security
Threats, in proceedings of 1st International Conference on
Network Security (ICONS-2007), Erode, Tamilnadu, India,
January 29-31, 2007, pp. 395-404.
[21] B. B. Jayasingh, M. R. Patra, Rule Based
Evidence Mining for Network Attack, in proceedings of the
10th International Conference on Information Technology
(ICIT 2007),0-7695-3068-0/
[email protected]
IEEE Computer Society Publication, Rourkela, India, Dec.
17-20, 2007, DOI. 10.1109/ICIT.2007.47, pp. 23-28. (DBLP
indexed)
[22] B. B. Jayasingh, M. R. Patra, S. Mallick,
Forensic Investigation through Rule based Evidence Mining,
in proceedings of the 95th Indian Science Congress, Andhra
University, Vishakhapatnam, India, Jan. 3-7th, 2008, pp.
3-4.
[23] B. B. Jayasingh, Cyber Forensics-An
Emerging Trend towards Archiving Evidence on ICMP Attack, in
proceedings of the International Conference on Emerging
Technologies and Applications in Engineering, Technology and
Sciences (ICETAETS-2008), ISBN: 978-81-906220-1-1,
Saurashtra University, Rajkot, Gujarat (India), jan.
13-14th, 2008, pp. 1803-1807.
[24] B. B. Jayasingh, M. Mary Jyothsna Rani,
Y.R. Kiran, Deepak J. Lalwani, Jest Editor � An Enhanced
Version of Jedit for Java Programming Language, in
proceedings of the national conference on Data Engineering
and Intelligent Systems (DEIS2008), Sagar Institute of
Research & Technology, Bhopal, in collaboration with CSI
Bhopal & IETE Bhopal, 7-8th March 2008.
[25] B. B. Jayasingh, Praveen G.C., B. Pradeep,
A Framework of Network Forensic Investigation System, in
proceedings of the national conference on Recent Trends in
Information & Communication Technology (RTICT-2008), Bannari
Amman Institute of Technology, Sathyamangalam,
Tamilnadu(India), March 17-18th, 2008.
[26] B. B. Jayasingh, M. Divya, K. Divyasree,
Handout Procedure of Incident Handling and Attack
Assessment, in proceedings of the national conference on
Recent Trends in Information & Communication Technology
(RTICT-2008), Bannari Amman Institute of Technology,
Sathyamangalam, Tamilnadu(India), March 17-18th, 2008.
[27] B. B. Jayasingh, M. R. Patra, Ontological
Model of Military Issues in Cyber Forensics, published in
the IETECH Journal of Information Systems, India, ISSN:
0973-8096, Vol. 2: No. 2, 2008, pp. 105-110.
[28] B. B. Jayasingh, Forensic Computing � The
Investigation of Network Security Dome, published in the
International Journal of Computer Applications in
Engineering, Technology and Sciences (IJ_CA_ETS), India,
ISSN: 0974-3596, Volume 1, Issue 1, October 2008 - March
2009, pp. 112-121.
[29] B. B. Jayasingh, Agents at Work in the
Evidence Aggregation Model of Cyber Forensics, in
proceedings of the International Conference on Intelligent
Systems and Networks (IISN-2009), Institute of Science
Technology, Klawad, Haryana, India, February 14-16, 2009,
pp. 301-305.
[30] B. B. Jayasingh, Evidence Aggregation of
ARP Spoofing Attack, published in the International Journal
of Computer Applications in Engineering, Technology and
Sciences (IJ_CA_ETS), India, ISSN: 0974-3596, Volume 1,
Issue 2, April - September 2009, pp.623-627.
[31] B. B. Jayasingh, G. Vikas, Denial of Log
Manipulation System-An Evidentiary Approach, published in
the International Journal of Computer Applications in
Engineering, Technology and Sciences (IJ_CA_ETS), India,
ISSN: 0974-3596, Volume 2, Issue 2, October 09 � March 2010,
pp. 536-539.
[32] B. B. Jayasingh, B. Swathi, A Novel Metric
for Detection of Jellyfish Reorder Attack on Ad Hoc Network,
published in the BVICAM's International Journal of
Information Technology (BIJIT), ISSN: 0973-5658, Vol. 2 No.
1, January-June, 2010, pp. 15-19.
[33] B. B. Jayasingh, M. Sunitha, Handling and
Log Exploitation to Seize Evidence, published in proceedings
of the 97th Indian Science Congress, Kerala University,
Thiruvananthapuram, India, Jan. 3-7th, 2010, pp.54-55.
[34] B. B. Jayasingh, M. Sunitha, Detection of
DNS Cache Poisoning Attack on Web, published in proceedings
of the 97th Indian Science Congress, Kerala University,
Thiruvananthapuram, India, Jan. 3-7th, 2010, pp. 55.
[35] M. R. Patra, B. B. Jayasingh, P. K. Sahoo,
Policy Based Virtual Private Network, in proceedings of the
International Conference on Emerging Trends in Computer
Science, Communication and Information Technology
(CSCIT2010),Yeshwant Mahavidyalaya, Nanded, Maharashtra,
India, Jan. 9th -11th, 2010, pp. 537.
[36] R Baliarsingh, G. Jena, P. K. Sahoo, M. R.
Patra, B. B. Jayasingh, Enhanced Security to Virtual Private
Network Logs, in proceedings of the 3rd CSI National
Conference on Education and Research (ConfER 2010), Jaypee
Institute of Engineering and Technology, Guna, Madhya
Pradesh, India, March 6th -7th, 2010, pp. 214-221.
[37] S. Mallick, Mahil Carr, B. B. Jayasingh,
Alternative Generation for Personal Expenditure Tracking
(PET), published in International Journal Of Computer
Applications In Engineering, Technology And Sciences
(IJ-CA-ETS), ISSN: 0974-3596, Volume 3, Issue
2,April-October 2011, pp. 56-61.
[38] Dr. R. K. Chottray, Dr. Gunamani Jena, P.
K. Sahoo, Dr. B. B. Jayasingh, Security- A Vital Requisite
for the Modern Era, published in International Journal Of
Computer Applications In Engineering, Technology And
Sciences (IJ-CA-ETS), ISSN: 0974-3596, Volume 3, Issue
2,April-October 2011, pp. 85-90.
[39] B. B. Jayasingh, forensic systems
engineering, published in CVR Journal of Science and
Technology, ISSN: 2277-3916, vol. no: 1, October 2011, pp.
66-71.
[40] B. B. Jayasingh, S. Mallick, Next
Generation Network-A study on QOS Mechanisms, published in
CVR Journal of Science and Technology, ISSN: 2277-3916, vol.
no: 2, June 2012, pp.70-75.
[41] B. B. Jayasingh, S. Mallick, Minimization
of Backbone Nodes in Wireless Mobile Backbone Networks using
Approximation Algorithms, published in the CVR Journal of
Science and Technology, ISSN: 2277-3916, vol. no: 3, Dec.
2012, pp. 74-77.
[42] B. B. Jayasingh, B. Rama Mohan, Software
Quality assurance Through Fuzzy Logarithmic Least Squares
Method, published in the International Journal of Computing,
Intelligent and Communication Technologies (IJCICT), Volume
2, Issue 1, ISSN: 2319-748X, www.ijcict.com, January 2013,
pp: 16-20.
[43] B. B. Jayasingh, B. Rama Mohan, A Survey on
Software Quality Assurance Techniques, published in the
International Journal of Information Technology & Systems
(IJITS), Vol. 1; No. 2: ISSN: 2277-9825, www.gtia.co.in,
Jan-June 2013, pp. 49-57.
[44] B. B. Jayasingh, B. Rama Mohan, Software
Quality Estimation Through Analytic Hierarcy Process
Approach, published in the CVR Journal of Science and
Technology, ISSN: 2277-3916, vol. no: 4, June 2013, pp.
80-86.
[45] B. B. Jayasingh, S. Mallick, A study on
skyline analysis of Nominal attributes, published in
proceedings of the International Conference on Innovations
in Computer Science & Engineering (ICICSE 2013), Guru Nanak
Institutions, Hyderabad, 20-21st September 2013, pp.
231-235.
[46] B. B. Jayasingh, Sri Datta V., N. S.
Pranav, Expert Rating Based Software Quality Evaluation,
published in the International Journal of Engineering
Research & Technology (IJERT), ISSN: 2278-0181, vol. 2 Issue
10, October 2013, pp. 1269-1275 (DRJI indexed).
[47] B. B. Jayasingh, N. Sateesh, Determining
the most Significant factors in classifying a Web site-Users
Perspective, published in the CVR Journal of Science and
Technology, ISSN: 2277-3916, vol. no: 5, Dec. 2013, pp.
78-82.
[48] S. Mallick, B. B. Jayasingh, Detection of
Black-hole Attack in Adhoc Networks, published in
proceedings of the International Conference on Innovations
in Computer Science & Engineering (ICICSE 2014),
ISBN:978-93-82163-44-2, Guru Nanak Institutions, Hyderabad,
8-9th August 2014, pp. 120-125.
[49] B. B. Jayasingh, A. Mounika, K. Pranavi, S.
Mallick, Location based skyline Queries on Uncertain
Database, published in proceedings of the International
Conference on Innovations in Computer Science & Engineering
(ICICSE 2014), ISBN:978-93-82163-44-2, Guru Nanak
Institutions, Hyderabad, 8-9th August 2014, pp. 373-378.
[50] B. B. Jayasingh, Classroom Learning
Model-Know Your Learner, published in proceedings of the
Second International Conference on Transformations in
Engineering Education (ICTIEE-2015), eISSN:
[email protected]
2015 ICTIEE 2015 Organisers, BMS College of Engineering,
Bangalore, 5-8th Jan. 2015, pp. 407-412.
[51] B. B. Jayasingh, Classroom Learning
Model-Know Your Learner, published in the Journal of
Engineering Education Transformations, ISSN 2349-2473,
Volume 28, No. 2&3, Oct. 2014 & Jan. 2015, pp. 30-36.
[52] B. B. Jayasingh, Web Surfer Tracking using
Big Data Technologies, published in CVR Journal of Science
and Technology, ISSN: 2277-3916, vol. no: 8, June 2015,
pp.65-68.
[53] B. B. Jayasingh, D. Hari Priya, R. Karthik,
Forensic Analysis of Crime Scenario in Social Networking
Website, in proceedings of the National Conference on
Information Security (NCIS-2015), Chaitanya Bharathi
Institute of Technology, Hyderabad, 26th -27th Aug. 2015,
pp. 20.
[54] B. B. Jayasingh, A Data Mining Approach to
Inquiry Based Inductive Learning Practices in Engineering
Education, 6th IEEE International Advance Computing
Conference (IACC 2016), IEEE Xplore Computer Society, SRKR
Engineering College, Bhimavaram, February 27-28, 2016, DOI
10.1109/IACC.2016.161, pp.845-850.
[55] Dr. B. B. Jayasingh, H. Kumar, G. Aishwarya, Inquiry
Based Inductive Learning Practices In Engineering
Education-A Classroom Study, 4th IEEE International
Conference on Moocs, Innovation And Technology In Education
(Mite'16) at Thiagarajar College Of Engineering, Madurai On
December 9 & 10, 2016, IEEE Xplore Computer Society, DOI
10.1109/MITE.2016.53, pp.60-65. .
[56] B. B.
Jayasingh, M. R. Patra, S. Mallick, Levelwise Filtration
System For Forensic Analysis Of Social Networking, in the
2nd International Conference on Contemporary Computing and
Informatics (IC3I 2016) held in Amity University, Noida,
India from 14 - 17 December 2016, IEEE Xplore digital
library, DOI 978-1- 5090-5256-1/16, pp.205-210.
[57] B. B. Jayasingh, M. R. Patra, D. Bhanu
Mahesh, Security Issues and Challenges Of Big Data Analytics
and Visualization, in the 2nd International Conference on
Contemporary Computing and Informatics (IC3I 2016) held in
Amity University, Noida, India from 14 - 17 December 2016,
IEEE Xplore digital library, DOI 978-1- 5090-5256-1/16,
pp.216-221.
[58] S. Jyoshna, B. B. Jayasingh, Dynamic load
balancing in cloud using extended hungarian method,
published in the CVR Journal of Science and Technology,
ISSN: 2277-3916, vol. no: 11, Dec. 2016, pp. 77-80.
[59] B. B. Jayasingh, DNS Cache Poisoning Attack
Analysis and Detection using Packet Header, published in the
CVR Journal of Science and Technology, ISSN: 2277- 3916,
vol. no: 12, June 2017, pp. 77-80.
[60] B. B. Jayasingh, A Study Towards Post Hoc
Forensic Analysis Using Big Data Analytics, Accepted in the
CVR Journal of Science and Technology, ISSN: 2277-3916, vol.
no: 14, June 2018, pp. .
[61] Sengathir Janakiraman, B. B. Jayasingh, A
Hyper-Exponential Factor-based Semi-Markov Prediction
Mechanism for Selfish Rendezvous nodes in MANETs, submitte
in the Wireless Personal Communications journal-SCI Indexed,
Jan. 2018.