Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Author
Title
Subject
Issue Date
Material Type
Language
Access Rights
Help
OAR@UM Help
FAQs
OAR@UM Policies
Submission Forms
Sign on to:
My OAR@UM
OAR@UM
Browsing by Subject Computer networks -- Security measures
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 9 to 28 of 39
< previous
next >
Issue Date
Title
Author(s)
2023
Digital transformation, strategic resilience, cyber security and risk management
Sood, Kiran
;
Balusamy, Balamurugan
;
Grima, Simon
2023
Digital transformation, strategic resilience, cyber security and risk management
Grima, Simon
;
Thalassinos, Eleftherios
;
Noja, Graţiela Georgiana
;
Stamataopoulos, Theodore V.
;
Vasiljeva, Tatjana
;
Volkova, Tatjana
2023
Digital transformation, strategic resilience, cyber security and risk management
Grima, Simon
;
Thalassinos, Eleftherios
;
Cristea, Mirela
;
Kadłubek, Marta
;
Maditinos, Dimitrios
;
Peiseniece, Līga
2012
Distress detection (poster abstract)
Vella, Mark Joseph
;
Terzis, Sotirios
;
Roper, Marc
2021
An efficient sound and data steganography based secure authentication system
Datta, Debajit
;
Garg, Lalit
;
Srinivasan, Kathiravan
;
Inoue, Atsushi
;
Reddy, G. Thippa
;
Reddy, M. Praveen Kumar
;
Ramesh, K.
;
Nasser, Nidal
2013
Enhancing the effectiveness of signature-based detection
Galea, John (2013)
2002
FTP security extensions
Farrugia, James P. (2002)
2013
Information security in enterprises - ontology perspective
Schiavone, Stephen
;
Garg, Lalit
;
Summers, Kelly
2015
Information systems security and audit firms
Spiteri, Cristian
2016
A legal analysis of cyberterrorism : threats and emerging legal responses
Mulligan, Kristina
2012
Legal aspects of distributed denial of service attacks
Schembri, Katia (2012)
2001
Legal aspects of Internet security and on-line privacy
Ghio, Antonio
2003
A log analysis based intrusion detection system for the creation of a specification based intrusion prevention system
Muscat, Andre
2016
A machine learning based approach for intrusion prevention using honeypot interaction patterns as training data
Zammit, Daniel
2017
Memory forensics of control flow integrity violations
Cilia, Rachel
2007
A multi-tier, multi-role security framework for e-commerce systems
Cachia, Ernest
;
Micallef, Mark
2012-11
Novel attack resilience by fusing events related to objectives
Vella, Mark Joseph
2014
Ontology of information security in enterprises
Schiavone, Stephen
;
Garg, Lalit
;
Summers, Kelly
2018
Privacy and surveillance as a result of the digital world
Girlando, Alessandra
2008
Process fact extraction from the web
Buhagiar, Stephanie (2008)