Follow
NILAY MISTRY
NILAY MISTRY
National Forensic Sciences University
Verified email at nfsu.ac.in - Homepage
Title
Cited by
Cited by
Year
Signature based volatile memory forensics: a detection based approach for analyzing sophisticated cyber attacks
NR Mistry, MS Dahiya
International Journal of Information Technology 11, 583-589, 2019
232019
Volatile memory based forensic artifacts & analysis
R Dave, NR Mistry, MS Dahiya
International Journal for Research in Applied Science and Engineering …, 2014
202014
Drone forensics: investigative guide for law enforcement agencies
NR Mistry, HP Sanghvi
International Journal of Electronic Security and Digital Forensics 13 (3 …, 2021
62021
Review of Behavior Malware Analysis for Android
N Padriya, N Mistry
International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, 2008
52008
A Comprehensive Study of Vulnerability Assessment Techniques of Existing Banking Apps
KP Joshi, NR Mistry, MS Dahiya
International Journal for Research in Applied Science & Engineering Technology 6, 2018
42018
VolNet: a framework for analysing network-based artefacts from volatile memory
N Mistry, MS Dahiya
International Journal of Electronic Security and Digital Forensics 9 (2 …, 2017
42017
Chameleon Salting: The New Concept of Authentication Management
B Koshy, N Mistry, K Jain
Proceedings of First International Conference on Information and …, 2016
22016
Cloud and Social Media Forensics
N Mistry, S Vora
Modern Forensic Tools and Devices: Trends in Criminal Investigation, 41-63, 2023
12023
Security and privacy aspects using Quantum internet
NR Mistry, AY Dholakiya, JP Prajapati
Limitations and Future Applications of Quantum Cryptography, 62-81, 2021
12021
Volatile Memory Disk Forensics: Investigate the Criminal Activity of RAMDisk
N Mistry, A Christian, B Bhavsar
ICT Systems and Sustainability: Proceedings of ICT4SD 2020, Volume 1, 19-28, 2021
12021
Email Spoofing Analysis
N Mistry, RS Bhati, H Jain, M Parmar
Institute of Forensic Science, 2019
12019
An insight into file sharing artifacts using Xender application
S Khandelwal, IR Sailor, N Mistry, MS Dahiya
2016 8th International Conference on Computational Intelligence and …, 2016
12016
iPhone Forensics: Recovering Investigative Evidence using Chip-off Method
BP Mistry Nilay, Dahiya M S, Koshy Binoj, Patel Harshal, Chaudhry Chirag ...
International Journal of Information Security and Privacy 10 (3), 2016
1*2016
Covert Communication Techniques used by Next Gen High Tech Terrorists
H Patel, S Khadsare, MS Dahiya, NR Mistry
CSI Communications 40 (1), 24, 2012
12012
Online Crime Reporting System for Digital Forensics
AAS Mahmoud, N Mandela, AK Agrawal, NR Mistry
2023 International Conference on Quantum Technologies, Communications …, 2023
2023
Volatile memory forensics of privacy aware browsers
NR Mistry, K Gajjar, SO Junare
International Journal of Information and Computer Security 18 (3-4), 313-326, 2022
2022
Volatile memory forensics of privacy-aware operating systems
NR Mistry, S Kanitkar, SO Junare
International Journal of Electronic Security and Digital Forensics 13 (6 …, 2021
2021
A Novel Methodology For Analyzing Malicious Behavior of The Android Applications
NM N Patel, V Ukani
International Journal of Advanced Research In Engineering And Technology 5 …, 2014
2014
File Carving - A concept building through the forensic perspective
DMS Mistry Nilay
International Journal of Multidisciplinary Educational Research 3 (1), 2014
2014
MAC OSX Lion Live RAM Acquisition And Analysis Gives You Tons Of Artifacts
VJM Mistry Nilay, Dahiya M S
eForensics Magazine: A Database Administrator’s Guide to Security, 42-46, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–20