Browsing by Subject Computer networks -- Security measures

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 9 to 28 of 39 < previous   next >
Issue DateTitleAuthor(s)
2023Digital transformation, strategic resilience, cyber security and risk managementSood, Kiran; Balusamy, Balamurugan; Grima, Simon
2023Digital transformation, strategic resilience, cyber security and risk managementGrima, Simon; Thalassinos, Eleftherios; Noja, Graţiela Georgiana; Stamataopoulos, Theodore V.; Vasiljeva, Tatjana; Volkova, Tatjana
2023Digital transformation, strategic resilience, cyber security and risk managementGrima, Simon; Thalassinos, Eleftherios; Cristea, Mirela; Kadłubek, Marta; Maditinos, Dimitrios; Peiseniece, Līga
2012Distress detection (poster abstract)Vella, Mark Joseph; Terzis, Sotirios; Roper, Marc
2021An efficient sound and data steganography based secure authentication systemDatta, Debajit; Garg, Lalit; Srinivasan, Kathiravan; Inoue, Atsushi; Reddy, G. Thippa; Reddy, M. Praveen Kumar; Ramesh, K.; Nasser, Nidal
2013Enhancing the effectiveness of signature-based detectionGalea, John (2013)
2002FTP security extensionsFarrugia, James P. (2002)
2013Information security in enterprises - ontology perspectiveSchiavone, Stephen; Garg, Lalit; Summers, Kelly
2015Information systems security and audit firmsSpiteri, Cristian
2016A legal analysis of cyberterrorism : threats and emerging legal responsesMulligan, Kristina
2012Legal aspects of distributed denial of service attacksSchembri, Katia (2012)
2001Legal aspects of Internet security and on-line privacyGhio, Antonio
2003A log analysis based intrusion detection system for the creation of a specification based intrusion prevention systemMuscat, Andre
2016A machine learning based approach for intrusion prevention using honeypot interaction patterns as training dataZammit, Daniel
2017Memory forensics of control flow integrity violationsCilia, Rachel
2007A multi-tier, multi-role security framework for e-commerce systemsCachia, Ernest; Micallef, Mark
2012-11Novel attack resilience by fusing events related to objectivesVella, Mark Joseph
2014Ontology of information security in enterprisesSchiavone, Stephen; Garg, Lalit; Summers, Kelly
2018Privacy and surveillance as a result of the digital worldGirlando, Alessandra
2008Process fact extraction from the webBuhagiar, Stephanie (2008)