exe_registrar@nfsu.ac.in (079) 239 77103
parag.rughani@nfsu.ac.in
079 239 77187
15+ Years (Academic and Research)

Dr. Parag Rughani

Designation : Associate Dean & Associate Professor Qualification : MCA, Ph. D. Experience : 15+ Years (Academic and Research)

Specialization

Digital Forensics and Cyber Security

Research Area

Machine Learning, Memory Forensics, Malware Analysis, Linux Forensics

Books

01 Book

Publications

  1. Vaidya, N. S., & Rughani, P. H. (2020). A forensic study of Tor usage on the Raspberry Pi platform using open source tools. Computer Fraud & Security, 2020(6), 13-19.
  2. Vaidya, N. S., & Rughani, P. H. (2019). An Efficient Technique to Detect Stegosploit Generated Images on Windows and Linux Subsystem on Windows. International Journal of Computer Sciences and Engineering, 2019(12), 21-26
  3. Byabazaire, F., & Rughani, P. H. (2018). Comprehensive Analysis and Forensic Recovery of Vipasana Ransomware. International Journal of Computer Sciences and Engineering, 2018(4), 110-117
  4. Tandel H. & Rughani, P. H. (2018), Forensic Analysis of Asterisk-FreePBX based VoIP Server, International Journal of Emerging Research in Management and Technology, 2018.
  5. Rughani, P. H. (2017). ARTIFICIAL INTELLIGENCE BASED DIGITAL FORENSICS FRAMEWORK. International Journal of Advanced Research in Computer Science, 8(8).
  6. Rughani, P. H., & Bhatt, P. (2017). Machine learning forensics: a new branch of digital forensics. International Journal of Advanced Research in Computer Science, 8(8).
  7. Rughani, P. H.. Data Recovery from Ransom ware Affected Android Phone using Forensic Tools. International Journal of Computer Sciences and Engineering, 8(5), 67-70
  8. Rughani, P. H. (2017). Forensic analysis of content hiding android applications. Int. J. Adv. Res. Comput. Sci. Software Eng., 7, 404-408.
  9. Rughani, Parag H. "ForMaLity: Automated FORensic MAlware Analysis using Volati 1." International Journal of Advanced Research in Computer Science 8, no. 3 (2017).
  10. Rughani, V., & Rughani, P. H. (2017). AUMFOR: Automated Memory Forensics for Malware Analysis. Asian Journal of Engineering and Applied Technology, 6(2), 36-39.
  11. Rughani, P. H. (2017). IoT evidence acquisition–issues and challenges. Advances in Computational Sciences and Technology, 10(5), 1285-1293.
  12. Rughani, P. H. (2016). Detecting blacklisted ip access from android phone. Indian Journal of Science and Technology, 9(48).
  13. Parikh, S., Chavda, D., Chakraborty, S., Rughani, P. H., & Dahiya, M. S. (2015). Analysis of Android Smart Watch Artifacts. International Journal of Scientific & Engineering Research, 6(8).
  14. Rughani, P. H., & Pandya, H. N. (2012). Possibilities Of Android Phone Based Cyber Crimes Due To Security Permissions--A Critical Study. International Journal of Advanced Research in Computer Science, 3(5).
  15. Rughani, P. H., & Pandya, H. N. (2012). Steganography on ANDROID based smart phones. International Journal of Mobile & Adhoc Network, 2(2), 150-152.
  16. Rughani, M. P. H., & Pandya, H. N. (2012). Steganography in Java Supported Mobile Phones. International Journal of Computer Information Systems, 5(5), 18-48.

Research Guidance

04