关注
Hepi Suthar
Hepi Suthar
Assistant Professor, Marwadi University
在 marwadieducation.edu.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
An Approach to Data Recovery from Solid State Drive: Cyber Forensics
H Suthar, P Sharma
Advancements in Cybercrime Investigation and Digital Forensics, 185-204, 2023
62023
SSD forensic investigation using open source tool
H Suthar, P Sharma
Examining Multimedia Forensics and Content Integrity, 56-78, 2023
32023
Method for Extracting Data from an Overprovisioned SSD
H Suthar, P Sharma
2022 IEEE Pune Section International Conference (PuneCon), 1-6, 2022
32022
Guaranteed Data Destruction Strategies and Drive Sanitization: SSD
H Suthar, P Sharma
32022
A Technique for decreasing the SSD’s Garbage Collection overhead using ML techniques
H Suthar, P Sharma
Rku. Ac. In, 2022
32022
Traffic Analysis and Relay Finding in Tor Survey
K RATHOD, H SUTHAR
Multidisciplinary International Research Journal of Gujarat Technological …, 2020
22020
How to Recover Deleted Data from SSD Drives after TRIM
H Suthar
Advanced Techniques and Applications of Cybersecurity and Forensics, 248-263, 2025
2025
An Investigation on File Carving Tool Methodologies Using Scenario Based Image Creation
H Suthar, P Sharma
Indian Journal of Science and Technology 17 (3), 215-227, 2024
2024
Techno‐Nationalism and Techno‐Globalization: A Perspective from the National Security Act
H Suthar, H Rawat, M Gayathri, K Chidambarathanu
Quantum Computing in Cybersecurity, 137-164, 2023
2023
Mitigation for Brute Force Attack against IP/CCTV Camera Login
H Suthar
International Journal for Research in Applied Science & Engineering …, 2020
2020
Malware Analysis with Volatility
H Suthar
IJSRD - International Journal for Scientific Research & Development 6 (Issue …, 2018
2018
Social Media Crime Investigation
H Suthar
International Journal for Research in Applied Science & Engineering …, 2016
2016
Big Data Forensics: Challenges and Approaches
H Suthar, M Lunagaria
Advanced Techniques and Applications of Cybersecurity and Forensics, 82-98, 0
A SURVEY ON THE USE OF OPEN-SOURCE FIREWALL FOR MAJOR SCADA PROTOCOLS
H Maru, H Suthar
系统目前无法执行此操作,请稍后再试。
文章 1–14