Browsing by Subject Computer security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 57 to 71 of 71 < previous 
Issue DateTitleAuthor(s)
2009Resource-bounded runtime verification of Java programs with real-time propertiesColombo, Christian; Pace, Gordon J.; Schneider, Gerardo
2024A review of the consent management literatureBonnici West, Christian; Grima, Simon
2014Secure installation of un-trusted applications-
2004Secure P2P backup systemPsaila, Walter (2004)
2002Security issues on the internet : a technical overviewMontebello, Matthew; Attard, Gillian; Attard, David
2004A single sign-on authentication framework for security-critical Web applicationsSchembri, Bernard (2004)
2022Smart secure homes : a solution to the cyber security threats in our smart homesSinagra, Jayden (2022)
2019Specifications of requirements to ensure proper implementation of security policies in cloud-based multi-tenant systemsZahra, Rebecca; Vella, Joseph G.; Cachia, Ernest
2015SUDUTA : script UAF detection using taint analysisGalea, John; Vella, Mark Joseph
2008Testing a web application for security using static code analysis and dynamic analysisSant, Lindsay (2008)
2017The threat of cybercrime to financial servicesCauchi, Andre
2014-11Using dynamic binary analysis for tracking pointer dataGalea, John; Vella, Mark Joseph
2022Using runtime verification to generate intrusion timelines from memory imagesCutajar, Jonathan (2022)
2017Verifying data- and control-oriented properties combining static and runtime verification : theory and toolsAhrendt, Wolfgang; Chimento, Jesús Mauricio; Pace, Gordon J.; Schneider, Gerardo
2015WeXpose : towards on-line dynamic analysis of web attack payloads using just-in-time binary modificationBellizzi, Jennifer; Vella, Mark Joseph