Signature based volatile memory forensics: a detection based approach for analyzing sophisticated cyber attacks NR Mistry, MS Dahiya International Journal of Information Technology 11, 583-589, 2019 | 23 | 2019 |
Volatile memory based forensic artifacts & analysis R Dave, NR Mistry, MS Dahiya International Journal for Research in Applied Science and Engineering …, 2014 | 20 | 2014 |
Drone forensics: investigative guide for law enforcement agencies NR Mistry, HP Sanghvi International Journal of Electronic Security and Digital Forensics 13 (3 …, 2021 | 6 | 2021 |
Review of Behavior Malware Analysis for Android N Padriya, N Mistry International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, 2008 | 5 | 2008 |
A Comprehensive Study of Vulnerability Assessment Techniques of Existing Banking Apps KP Joshi, NR Mistry, MS Dahiya International Journal for Research in Applied Science & Engineering Technology 6, 2018 | 4 | 2018 |
VolNet: a framework for analysing network-based artefacts from volatile memory N Mistry, MS Dahiya International Journal of Electronic Security and Digital Forensics 9 (2 …, 2017 | 4 | 2017 |
Chameleon Salting: The New Concept of Authentication Management B Koshy, N Mistry, K Jain Proceedings of First International Conference on Information and …, 2016 | 2 | 2016 |
Cloud and Social Media Forensics N Mistry, S Vora Modern Forensic Tools and Devices: Trends in Criminal Investigation, 41-63, 2023 | 1 | 2023 |
Security and privacy aspects using Quantum internet NR Mistry, AY Dholakiya, JP Prajapati Limitations and Future Applications of Quantum Cryptography, 62-81, 2021 | 1 | 2021 |
Volatile Memory Disk Forensics: Investigate the Criminal Activity of RAMDisk N Mistry, A Christian, B Bhavsar ICT Systems and Sustainability: Proceedings of ICT4SD 2020, Volume 1, 19-28, 2021 | 1 | 2021 |
Email Spoofing Analysis N Mistry, RS Bhati, H Jain, M Parmar Institute of Forensic Science, 2019 | 1 | 2019 |
An insight into file sharing artifacts using Xender application S Khandelwal, IR Sailor, N Mistry, MS Dahiya 2016 8th International Conference on Computational Intelligence and …, 2016 | 1 | 2016 |
iPhone Forensics: Recovering Investigative Evidence using Chip-off Method BP Mistry Nilay, Dahiya M S, Koshy Binoj, Patel Harshal, Chaudhry Chirag ... International Journal of Information Security and Privacy 10 (3), 2016 | 1* | 2016 |
Covert Communication Techniques used by Next Gen High Tech Terrorists H Patel, S Khadsare, MS Dahiya, NR Mistry CSI Communications 40 (1), 24, 2012 | 1 | 2012 |
Online Crime Reporting System for Digital Forensics AAS Mahmoud, N Mandela, AK Agrawal, NR Mistry 2023 International Conference on Quantum Technologies, Communications …, 2023 | | 2023 |
Volatile memory forensics of privacy aware browsers NR Mistry, K Gajjar, SO Junare International Journal of Information and Computer Security 18 (3-4), 313-326, 2022 | | 2022 |
Volatile memory forensics of privacy-aware operating systems NR Mistry, S Kanitkar, SO Junare International Journal of Electronic Security and Digital Forensics 13 (6 …, 2021 | | 2021 |
A Novel Methodology For Analyzing Malicious Behavior of The Android Applications NM N Patel, V Ukani International Journal of Advanced Research In Engineering And Technology 5 …, 2014 | | 2014 |
File Carving - A concept building through the forensic perspective DMS Mistry Nilay International Journal of Multidisciplinary Educational Research 3 (1), 2014 | | 2014 |
MAC OSX Lion Live RAM Acquisition And Analysis Gives You Tons Of Artifacts VJM Mistry Nilay, Dahiya M S eForensics Magazine: A Database Administrator’s Guide to Security, 42-46, 2013 | | 2013 |