Qualification: Ph.D.
Area of Interest: Algorithm Design, Digital Forensics, Machine Learning
Phone No:
E-Mail:
Gola Ka Mandir, Gwalior (M.P.) - 474005, INDIA
Ph.: +91-751-2409300, E-mail: vicechancellor@mitsgwalior.in, Website: www.mitsgwalior.in
Degree | Specialization | Institute |
Ph.D | Computer Science & Engineering | Maulana Azad National Institute of Technology (MANIT), Bhopal |
M.Tech | Information Security | Maulana Azad National Institute of Technology (MANIT), Bhopal |
B.Tech | Computer Science & Engineering | Samrat Ashok Technological Institute(SATI) Vidisha |
1) Awarded with the Certificate of Recognition for significant Contribution in “Establishment of MOOC development facility” (contribution in establishing the digital studio & development of moocs) (Ref. No. MITS/2021/04). The Certificate of Recognition was conferred on MITS Day, 10th March 2021.
2) Awarded with the Certificate of Recognition for successful conduction of “National Hackathon 0n 16-17 April 2022 in collaboration with Microsoft IDs, Cadre Design, Ansys and dhiyotech” (Ref. No. MITS/100032023/SC/29). The Certificate of Recognition was conferred on MITS Day, 10th March 2023.
3) Awarded with the Certificate of Recognition for “mentoring the students of NEC on Coding skills and achieving tangible outcomes through student efforts” (Ref. No. MITS/100032023/SC/19). The Certificate of Recognition was conferred on MITS Day, 10th March 2023.
4) Won “best paper award” in track “Computer science and information technology” at National conference on emerging technologies trends (NCETT 2020) organized by VNS institute of technology , Bhopal.
5) Awarded “Fellowship for training of young Scientist” by M.P. Council of Science & Technology (MPCST) at the “30th M.P. Young Scientist Congress” held at Vigyan Bhavan Bhopal during feb. 28- March 2015.
6) Awarded with the Certificate of Appreciation for Achieving High faculty feedback Index(FFI) (4.62 out of 5) for course Data Structures, 150302 in July-Dec. 2019 (Ref. No. DA/MP/2020/1085).
7) Awarded with the Certificate of Appreciation for Achieving High faculty feedback Index (FFI) (4.61 out of 5) for course Operating System, 160403 in Jan-June. 2019 (Ref. No. DA/MP/2019/941).
8) Awarded with the Certificate of Appreciation for Achieving High faculty feedback Index (FFI) (4.19 out of 5) for course Operating Systems, 150403 in Jan-June. 2021 (Ref. No. DA/MP/2021/1354).
9) Awarded with the Certificate of Appreciation for Achieving High faculty feedback Index(FFI) (4.19 out of 5) for course Operating Systems, 150403 in Jan-June. 2021 (Ref. No. DA/MP/2021/1354).
10) Awarded with the Certificate of Appreciation for Achieving High faculty feedback Index(FFI) (4.41 out of 5) for course Operating Systems, 150312 in July-Dec. 2022 (Ref. No. DA/MP/2022/1546).
11) Awarded with the Certificate of Appreciation for Achieving High faculty feedback Index(FFI) (4.20 out of 5) for course Operating Systems, 290303 in July-Dec. 2022 (Ref. No. DA/MP/2022/1546).
12) Awarded with the Certificate of Appreciation for Achieving High faculty feedback Index(FFI) (4.48 out of 5) for course Computer Networks, 150411 in Jan-June. 2023 (Ref. No. DA/MP/2023/09).
13) Awarded with the Certificate of Appreciation for Achieving High faculty feedback Index(FFI) (4.36 out of 5) for course Operating System, 2240324 in July-Dec. 2023 (Ref. No. DA/MP/2023/78).
14) Awarded with the Certificate of Appreciation for Achieving High faculty feedback Index(FFI) (4.30 out of 5) for course Problem solving and programming, 3270122 in Jan-June. 2024 (Ref. No. DA/MP/2023/107).
15) Topper (AIR top 5%) in the NPTEl course Cyber Security and Privacy (July-Oct 2023)
16) Awarded with the Certificate of Appreciation for coordinating MITS code war club “Top performing club” (Ref. No. MITS/2K19/16). The Certificate of Recognition was conferred on Founders Day, 14th Nov. 2019.
17) Awarded with the Certificate of Appreciation for “Top performing mentor” for remarkable contribution as top performing mentor of NPTEL course “Programming Data Structures and algorithm using C” run during academic session Jan-June 2018.
18) Second highest AEI (Academic Efficiency Index) in the institute with AEI Score 9.65 out of 10 during July-Dec 2023.
|
R. R. Singh and D. K. Singh, ‘Deadlock Avoidance: A Dynamic Programming Approach’, in 2010 International Conference on Computational Intelligence and Communication Networks, 2010, pp. 661–664. IEEE |
|
R. R. Singh and D. S. Tomar, ‘Approaches for user profile investigation in orkut social network’, arXiv preprint arXiv:0912. 1008, 2009. |
|
B. Dharamkar and R. R. Singh, ‘A review of cyber attack classification technique based on data mining and neural network approach’, Int. J. Comput. Trends Technol, vol. 7, no. 2, pp. 100–105, 2014. |
|
B. Dharamkar, R. R. Singh, B. Dharamkar, and Others, ‘Cyber-attack classification using improved ensemble technique based on support vector machine and neural network’, International Journal of Computer Applications, vol. 103, no. 11, pp. 1–7, 2014. |
|
R. R. Singh and D. S. Tomar, ‘Network forensics: detection and analysis of stealth port scanning attack’, scanning, vol. 4, p. 8, 2015. |
|
S. Upadhyay and R. R. Singh, ‘Comparative Analysis based Classification of KDD’99 Intrusion Dataset’, International Journal of Computer Science and Information Security, vol. 13, no. 3, p. 14, 2015. |
|
S. Upadhyay and R. R. Singh, ‘A Survey on IDS Alerts Classification Techniques’, International Journal of Computer Applications, vol. 105, no. 12, 2014. |
|
K. Gupta and R. R. Singh, ‘A Survey On Web Application Attack Detection Methods’, International Journal of Advanced Research in Computer Science, vol. 8, no. 7, 2017. |
|
U. P. Singh, S. Jain, R. Singh, M. Parmar, R. Makwana, and J. Kumare, ‘Dynamic surface control based ts-fuzzy model for a class of uncertain nonlinear systems’, International Journal of Control Theory and Applications, vol. 9, no. 2, pp. 1333–1345, 2016. |
|
G. Mishra and R. R. Singh, ‘Enhancing Provider’s Profit on Cloud Market Infrastructure’, International Journal of Advanced Research in Computer Science, vol. 8, no. 5, 2017. |
|
S. Seth, R. R. S. Makwana, and M. Dixit, ‘Hybridized Combinational Feature Selection Framework for Network Intrusion Detection System (HCFSF)’, Probe, vol. 11656, p. 2421. UGC Indexed |
|
R. R. S. M. Ruhi Dubey, ‘Comparative Analysis of Computer Assisted Valuation of Descriptive Answers using WEKA with different classification algorithms’, SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE), vol. 4, no. 6, pp. 5–10, 2017. UGC Indexed |
|
K. Gupta, R. R. Singh, and M. Dixit, ‘Cross site scripting (XSS) attack detection using intrustion detection system’, in 2017 International Conference on Intelligent Computing and Control Systems (ICICCS), 2017, pp. 199–203. IEEE |
|
R. Dubey and R. R. S. Makwana, ‘Computer-Assisted Valuation of Descriptive Answers Using Weka with RandomForest Classification’, in Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017), 2019, pp. 359–366. Springer |
|
D. Kushwah, R. R. Singh, and D. S. Tomar, ‘An approach to meta-alert generation for anomalous tcp traffic’, in Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9--11, 2019, Revised Selected Papers 2, 2019, pp. 193–216. Springer |
|
R. R. Singh, ‘Shashikant Upadhyay’, Journal of Network Security & Its Applications (IJNSA), vol. 4, no. 2, 2012. |
|
D. Kushwah and R. R. S. Makwana, ‘An Approach to Meta-Alert Generation to Reduce Analyst Workload’. |
|
V. Shakya and R. R. S. Makwana, ‘Feature selection based intrusion detection system using the combination of DBSCAN, K-Mean++ and SMO algorithms’, in 2017 international conference on trends in electronics and informatics (ICEI), 2017, pp. 928–932. IEEE |
|
V. Shakya and R. R. S. Makwana, ‘A Survey on Intrusion Detection System Based on K-Means and RBF Kernel Function’. |
|
R. R. Singh and D. S. Tomar, ‘Guidelines for an Effective Network Forensic System’, in International Conference on Intelligent Computing and Smart Communication 2019: Proceedings of ICSC 2019, 2020, pp. 137–146. Springer |
|
P. Patsariya and R. R. Singh, ‘Classifier rank identification using multi-criteria decision making method for intrusion detection dataset’, Int. J. Innov. Technol. Explor. Eng, vol. 9, pp. 1732–1738, 2019. |
|
R. Richhariya, A. K. Manjhwar, and R. R. S. Makwana, ‘A hybrid approach for user to root and remote to local attack’, Int J Comput Sci, vol. 5, no. 6, pp. 73–79, 2017. |
|
R. Ranjan Singh and D. Singh Tomar, ‘Approaches for user profile Investigation in Orkut Social Network’, arXiv e-prints, p. arXiv-0912, 2009. |
|
R. R. Singh and D. S. Tomar, ‘Storage Efficient Capturing of Port Scanning Attack Traffic’, International Journal of Applied Engineering Research, vol. 12, no. 22, pp. 12652–12658, 2017. |
|
R. R. Singh and D. S. Tomar, ‘Port scanning attack analysis with Dempster--Shafer evidence theory’, Int. J. Appl. Eng. Res, vol. 12, no. 16, pp. 5900–5904, 2017. |
|
M. Dandotiya, R. R. Singh, A. S. Dandotiya, and N. Dandotiya, ‘A Deep and Efficient Analysis of DDOS Attack in Software Defined Network’, 2022. |
|
A. Gupta and R. R. Singh, ‘A Deep Learning Approach to Enhance Underwater Images with Low Contrast, Blurriness and Degraded Color’, in 2022 International Conference on Edge Computing and Applications (ICECAA), 2022, pp. 1287–1291. IEEE |
|
D. S. Tomar, ‘An Approach to Meta-Alert Generation for Anomalous TCP Traffic’, in Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9--11, 2019, Revised Selected Papers, 2019, vol. 939, p. 193. |
|
L. S. Tanvi Agarwal Rajni Ranjan Singh Makwana, ‘Estimation of Soil Electrical Conductivity using Dual -- Polarized SAR Sentinel -1 Imagery’, International Journal of Computer Applications, vol. 176, no. 19, pp. 0975–8887, 2020. |