Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Author
Title
Subject
Issue Date
Material Type
Language
Access Rights
Help
OAR@UM Help
FAQs
OAR@UM Policies
Submission Forms
Sign on to:
My OAR@UM
OAR@UM
Browsing by Subject Computer security
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 57 to 71 of 71
< previous
Issue Date
Title
Author(s)
2009
Resource-bounded runtime verification of Java programs with real-time properties
Colombo, Christian
;
Pace, Gordon J.
;
Schneider, Gerardo
2024
A review of the consent management literature
Bonnici West, Christian
;
Grima, Simon
2014
Secure installation of un-trusted applications
-
2004
Secure P2P backup system
Psaila, Walter (2004)
2002
Security issues on the internet : a technical overview
Montebello, Matthew
;
Attard, Gillian
;
Attard, David
2004
A single sign-on authentication framework for security-critical Web applications
Schembri, Bernard (2004)
2022
Smart secure homes : a solution to the cyber security threats in our smart homes
Sinagra, Jayden (2022)
2019
Specifications of requirements to ensure proper implementation of security policies in cloud-based multi-tenant systems
Zahra, Rebecca
;
Vella, Joseph G.
;
Cachia, Ernest
2015
SUDUTA : script UAF detection using taint analysis
Galea, John
;
Vella, Mark Joseph
2008
Testing a web application for security using static code analysis and dynamic analysis
Sant, Lindsay (2008)
2017
The threat of cybercrime to financial services
Cauchi, Andre
2014-11
Using dynamic binary analysis for tracking pointer data
Galea, John
;
Vella, Mark Joseph
2022
Using runtime verification to generate intrusion timelines from memory images
Cutajar, Jonathan (2022)
2017
Verifying data- and control-oriented properties combining static and runtime verification : theory and tools
Ahrendt, Wolfgang
;
Chimento, Jesús Mauricio
;
Pace, Gordon J.
;
Schneider, Gerardo
2015
WeXpose : towards on-line dynamic analysis of web attack payloads using just-in-time binary modification
Bellizzi, Jennifer
;
Vella, Mark Joseph