NILAY MISTRY
NILAY MISTRY
Gujarat Forensic Sciences University
Verified email at gfsu.edu.in - Homepage
Title
Cited by
Cited by
Year
Volatile memory based forensic artifacts & analysis
R Dave, NR Mistry, MS Dahiya
International Journal for Research in Applied Science and Engineering …, 2014
152014
Review of Behavior Malware Analysis for Android
N Padriya, N Mistry
International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, 2008
42008
Signature based volatile memory forensics: a detection based approach for analyzing sophisticated cyber attacks
NR Mistry, MS Dahiya
International Journal of Information Technology 11 (3), 583-589, 2019
32019
VolNet: a framework for analysing network-based artefacts from volatile memory
N Mistry, MS Dahiya
International Journal of Electronic Security and Digital Forensics 9 (2 …, 2017
22017
An insight into file sharing artifacts using Xender application
S Khandelwal, IR Sailor, N Mistry, MS Dahiya
2016 8th International Conference on Computational Intelligence and …, 2016
12016
Covert Communication Techniques used by Next Gen High Tech Terrorists
H Patel, S Khadsare, MS Dahiya, NR Mistry
CSI Communications 40 (1), 24, 2012
12012
Volatile Memory Disk Forensics: Investigate the Criminal Activity of RAMDisk
N Mistry, A Christian, B Bhavsar
ICT Systems and Sustainability, 19-28, 2020
2020
iPhone Forensics: Recovering Investigative Evidence using Chip-off Method
BP Mistry Nilay, Dahiya M S, Koshy Binoj, Patel Harshal, Chaudhry Chirag ...
International Journal of Information Security and Privacy 10 (3), 2016
2016
Chameleon Salting: The New Concept of Authentication Management
B Koshy, N Mistry, K Jain
Proceedings of First International Conference on Information and …, 2016
2016
A Novel Methodology For Analyzing Malicious Behavior of The Android Applications
NM N Patel, V Ukani
International Journal of Advanced Research In Engineering And Technology 5 …, 2014
2014
File Carving - A concept building through the forensic perspective
DMS Mistry Nilay
International Journal of Multidisciplinary Educational Research 3 (1), 2014
2014
MAC OSX Lion Live RAM Acquisition And Analysis Gives You Tons Of Artifacts
VJM Mistry Nilay, Dahiya M S
eForensics Magazine: A Database Administrator’s Guide to Security, 42-46, 2013
2013
A Practical Approach To Monitor Suspicious Activity On Social Networking Using Sniffer Tools
M Nilay
eForensics Magazine, 46-49, 2013
2013
MULTIMEDIA DATA OWNER IDENTIFICATION FOR CAMERA BASED MOBILE PHONES
N Mistry, SB Patel, HP Sanghavi
2011
Preventive Actions to Emerging Threats in Smart Devices Security
NR Mistry, MS Dahiya, HP Sanghvi
2011
Email Spoofing Analysis
N Mistry, RS Bhati, H Jain, M Parmar
Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition
N Mistry, D Dave
The system can't perform the operation now. Try again later.
Articles 1–17