SEIRS epidemic model with delay for transmission of malicious objects in computer network BK Mishra, DK Saini Applied Mathematics and Computation 188 (2), 1476-1482, 2007 | 193 | 2007 |

SEIQRS model for the transmission of malicious objects in computer network BK Mishra, N Jha Applied Mathematical Modelling 34 (3), 710-715, 2010 | 170 | 2010 |

Dynamic model of worms with vertical transmission in computer network BK Mishra, SK Pandey Applied Mathematics and Computation 217 (21), 8438-8446, 2011 | 162 | 2011 |

Fixed period of temporary immunity after run of anti-malicious software on computer nodes BK Mishra, N Jha Applied Mathematics and Computation 190 (2), 1207-1212, 2007 | 127 | 2007 |

Mathematical models on computer viruses BK Mishra, D Saini Applied Mathematics and Computation 187 (2), 929-936, 2007 | 99 | 2007 |

Fuzzy epidemic model for the transmission of worms in computer network BK Mishra, SK Pandey Nonlinear Analysis: Real World Applications 11 (5), 4335-4341, 2010 | 91 | 2010 |

Mathematical model on the transmission of worms in wireless sensor network BK Mishra, N Keshri Applied Mathematical Modelling 37 (6), 4103-4111, 2013 | 76 | 2013 |

Dynamic model of worm propagation in computer network BK Mishra, SK Pandey Applied mathematical modelling 38 (7-8), 2173-2179, 2014 | 43 | 2014 |

A mathematical model of dengue transmission with memory T Sardar, S Rana, J Chattopadhyay Communications in Nonlinear Science and Numerical Simulation 22 (1-3), 511-525, 2015 | 40 | 2015 |

Differential Epidemic Model of Virus and Worms in Computer Network. BK Mishra, GM Ansari IJ Network security 14 (3), 149-155, 2012 | 36 | 2012 |

Effect of anti-virus software on infectious nodes in computer network: a mathematical model BK Mishra, SK Pandey Physics Letters A 376 (35), 2389-2393, 2012 | 24 | 2012 |

Effects of porous parameter and stenosis on the wall shear stress for the flow of blood in human body. Res BK Mishra, N Verma J. medicine and Medical Sciences 2, 98-101, 2007 | 21 | 2007 |

Computer virus: theory, model, and methods X Yang, BK Mishra, Y Liu Discrete Dynamics in Nature and Society 2012, 2012 | 20 | 2012 |

Two quarantine models on the attack of malicious objects in computer network BK Mishra, AK Singh Mathematical Problems in Engineering 2012, 2012 | 15 | 2012 |

Non-Newtonian model of blood flow through an arterial stenosis BK Mishra, TC Panda ACTA CIENCIA INDICA MATHEMATICS 31 (2), 341, 2005 | 15 | 2005 |

A quarantine model on the spreading behavior of worms in wireless sensor network BK Mishra, SK Srivastava, BK Mishra Transaction on IoT and Cloud Computing 2 (1), 1-12, 2014 | 14 | 2014 |

Defending against malicious threats in wireless sensor network: A mathematical model BK Mishra, I Tyagi International Journal of Information Technology and Computer Science (IJITCS …, 2014 | 14 | 2014 |

Cyber attack classification using game theoretic weighted metrics approach BK Mishra, H Saini World Applied Sciences Journal 7, 206-215, 2009 | 14 | 2009 |

A mathematical model for a distributed attack on targeted resources in a computer network K Haldar, BK Mishra Communications in Nonlinear Science and Numerical Simulation 19 (9), 3149-3160, 2014 | 13 | 2014 |

A novel approach of image based steganography using pseudorandom sequence generator function and DCT coefficients A Mondal, S Pujari IJ Computer Network and Information Security, 42-49, 2015 | 11 | 2015 |